RLBA-2019:3337 perl:5.24 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2019:3511 libvarlink bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvarlink. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libvarlink-18-3.el8.aarch64.rpm eefac8affba9f0ffe661e20b095f8a311eb454880c7514edea46b19289ba9e20 libvarlink-util-18-3.el8.aarch64.rpm f3258bbd49606763bacb796b2ca9fcdfb93d1f2af2263eef51f4aa617525c0f9 RLBA-2019:3522 perl-DBD-SQLite bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-SQLite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLBA-2019:3529 perl-Math-BigInt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Math-BigInt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac RLBA-2019:3537 checkpolicy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for checkpolicy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms checkpolicy-2.9-1.el8.aarch64.rpm 85a92ea40d179d5c8d575353016577773b38797ed48d3220b795a0610c9bcb4a RLBA-2019:3546 perl-Socket bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Socket. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-Socket-2.027-3.el8.aarch64.rpm 625e2506fc309b87c95b87aee1e9cc7a4b19e08f9806abc5e330416fa821bb4c RLSA-2019:3553 Low: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gdk-pixbuf2-2.36.12-5.el8.aarch64.rpm a826981c0a518d67df3e9c947cfb96bc61b09b19a601272c8206bcde4eb9f849 RLBA-2019:3558 libzfcphbaapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libhbaapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libhbaapi-2.2.9-13.el8.aarch64.rpm 2a982d38686268ce946a35b140323843b41bcf4f86f04e15a2c6f2592172d109 RLBA-2019:3593 ipset bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ipset-7.1-1.el8.aarch64.rpm 0a2b56f8aa34fad5ee219a692eccc91d300286b8b63b18937f16c413267c3ec0 ipset-libs-7.1-1.el8.aarch64.rpm 353a637a19c14f9cd5a3bc8bb0d4c2c94b45ddbdebcff2d40c350e076f4bb23b ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 RLEA-2019:3608 libaio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libaio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libaio-0.3.112-1.el8.aarch64.rpm da76d734ed31d9ec6899557ae3aa2c2e5112c15ba906136d4318953bcb75d1d9 libaio-devel-0.3.112-1.el8.aarch64.rpm 4ba0ee7717a098b88567c1d3d59c881869a3331c54cba51c293f64599e7d2f79 RLBA-2019:3614 dbus-python bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-dbus-1.2.4-15.el8.aarch64.rpm 8865a9e80253f34442bfee4070e82cd34f774c26888f95db85703b4a8e374ce5 RLBA-2019:3616 system-storage-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for system-storage-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f RLBA-2019:3621 libidn2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libidn2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libidn2-2.2.0-1.el8.aarch64.rpm aa0cb5360ef9778dcc983ec8bb5e007829fd6345b855506ce807c760cef9b394 RLBA-2019:3627 python-schedutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-schedutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-schedutils-0.6-6.el8.aarch64.rpm ce7de99e86be728beb50ea2d48bc8ae96057a7820c0490bc75d2dcd56af0c1c9 RLBA-2019:3634 blktrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for blktrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms blktrace-1.2.0-10.el8.aarch64.rpm 54ae41a6892ff437cd7507501c24fb7e7a12ff43df79b85616cdb647b50269f2 RLSA-2019:3643 Low: gettext security update The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs. Security Fix(es): * gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for gettext. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs. Security Fix(es): * gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gettext-0.19.8.1-17.el8.aarch64.rpm 1eff0d87b3a2c04af01d5366fa2b0e0e44d04c1d8d817303034d4957bc92446e gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-devel-0.19.8.1-17.el8.aarch64.rpm 9228e47301a7d17a84388335781d21930961bf8ecf8bfe7b86a36abcf3e3c46f gettext-libs-0.19.8.1-17.el8.aarch64.rpm a6b06b4f33a3d0de31e4bcfac261ba4606105c437da6ba3cdf2ffd4fca3bef1d RLBA-2019:3645 gmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gmp-6.1.2-10.el8.aarch64.rpm 71df60a64752e3624879da78d1148e416510992872c4a62eedbe830d0331a238 gmp-c++-6.1.2-10.el8.aarch64.rpm 502a470b708be3f50328810e8f921fe843e7824f4fcb9e26fad5a7bd7b574679 gmp-devel-6.1.2-10.el8.aarch64.rpm e124830c0b3bd4fa020a931300ecbc4b6fd626622fc716a98caf6d13823f7b60 RLBA-2019:3664 nfs4-acl-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs4-acl-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms nfs4-acl-tools-0.3.5-3.el8.aarch64.rpm 9f5ae78a3c9d4be4c32e42cbdd2ab5a0acb6a942fc0b7fb9a75a8cdfa30ad0a6 RLBA-2019:3667 mtr bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms mtr-0.92-3.el8.aarch64.rpm d64bb179e1f8050d4e9695581256daeb1703f5b903a363a6529d85a824faae2f RLEA-2019:3677 isns-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for isns-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms isns-utils-0.99-1.el8.aarch64.rpm dcadba74a2077c3053b21afaf641ec94fa195aaccfcebcc3b249f19a962bf7d1 isns-utils-devel-0.99-1.el8.aarch64.rpm 3372f3ade84baf469852bda0060204047162e39785eabec0edc7cdec09c908f0 isns-utils-libs-0.99-1.el8.aarch64.rpm 9f55208fcf4b82fcd97186b2aee678e3161d6ab96aec0d72b5670464b375f6df RLBA-2019:3693 python-requests bug fix update The python-requests package contains a library designed to make HTTP requests easy for developers. Bug fix: * The fix CVE-2018-18074 leads to a regression (BZ#1758261) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-requests package contains a library designed to make HTTP requests easy for developers. Bug fix: * The fix CVE-2018-18074 leads to a regression (BZ#1758261) rocky-linux-8-aarch64-baseos-rpms python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 RLSA-2020:0633 Important: ppp security update The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line. Security Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for ppp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line. Security Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc RLSA-2020:0902 Important: icu security update The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for icu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms icu-60.3-2.el8_1.aarch64.rpm ffc8c07efaa33ccf0ca1a5742254b5bb1e2e067c443362d031f9cfd0919ad777 libicu-60.3-2.el8_1.aarch64.rpm cf3e51d81ade44c08d4e0656622e72182ac946ef2dc13e69c7219b6c87b451bd libicu-devel-60.3-2.el8_1.aarch64.rpm b1f56820b30ab248d7c27c2eef95a93c33fe13bfc9f903105749b558c71401a6 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 RLBA-2020:1759 newt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for newt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms newt-0.52.20-11.el8.aarch64.rpm fce833e684bdc6bc0f5535938c1c6f51193a72d7e8639b7f5df8671630463c38 RLSA-2020:1766 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms mozjs52-52.9.0-2.el8.aarch64.rpm b0c7147dc767378dda468419b1c5a957b2ceb61c1abda4150bf359444db42990 mozjs60-60.9.0-4.el8.aarch64.rpm 50bfb770c46f602468bf975a7f045cba587233f3e98178df93431b1cdca7b5fa RLEA-2020:1767 flatpak bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bubblewrap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms bubblewrap-0.4.0-1.el8.aarch64.rpm 6f6c80914ad5b49b919ab98d41aa1f53788c67f8b11a710a5f9cce378ec9ce9a RLBA-2020:1768 ipcalc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipcalc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ipcalc-0.2.4-4.el8.aarch64.rpm ed85625f7d445ec09e6899decca59a937fb2fef7233793d7aa7e2275715912f8 RLBA-2020:1781 ModemManager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ModemManager, usb_modeswitch-data, mobile-broadband-provider-info, libmbim, libqmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd RLBA-2020:1791 libnetfilter_cthelper bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnetfilter_cthelper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libnetfilter_cthelper-1.0.0-15.el8.aarch64.rpm 8b5f5cbfd75bb73091e7bc55c5ab363cd3dc5d6e63c9d33dea0a124015190bc5 RLBA-2020:1822 pywbem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pywbem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 RLBA-2020:1839 mcstrans bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mcstrans. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms mcstrans-2.9-2.el8.aarch64.rpm 85b6efbfad0178032d180e2dfbbb81660bc547a92f87107ee1a334242c87e0d4 RLBA-2020:1846 conntrack-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for conntrack-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms conntrack-tools-1.4.4-10.el8.aarch64.rpm d7f42bcce048a313193c586871f37f1dddef88e03dd81b01ebfea072ef59aad1 RLBA-2020:1850 pigz bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pigz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms pigz-2.4-4.el8.aarch64.rpm 0c5fe94281f32a67bd797950594f7edb8997055d2ad0ec8c35ccf0917cff6f07 RLSA-2020:1852 Moderate: patch security and bug fix update The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file). Security Fix(es): * patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for patch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file). Security Fix(es): * patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms patch-2.7.6-11.el8.aarch64.rpm 122ffe9bdd3f7b881a06ebbf0ec5297304e28ccd21600b19383bfb09e2c6629f RLBA-2020:1853 diffutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for diffutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms diffutils-3.6-6.el8.aarch64.rpm fb48a106969405619bd9e14a8b1012d9d6c1e95cc96c4a5af56cfd6a4a498917 RLBA-2020:1871 openssl-pkcs11 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssl-pkcs11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms openssl-pkcs11-0.4.10-2.el8.aarch64.rpm 3ddcd2baa25dab6f06bf2f6e92ceac9a7b90ebf2bb33e6e2daed5e959d81467f RLBA-2020:1891 arpwatch bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for arpwatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms arpwatch-2.1a15-44.el8.aarch64.rpm c09fe629652967c850802963580eca1f5251279da9f44c4c4aa2c24bce68b659 RLBA-2020:1902 liberation-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liberation-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff RLBA-2020:1910 cifs-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cifs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cifs-utils-6.8-3.el8.aarch64.rpm dc9b7440091788f957db2a1a360218237d984212a0c25283c3658a4c6a4f8411 pam_cifscreds-6.8-3.el8.aarch64.rpm ad108ac76809ca43a523f5be6a1abaebb041f1a854bc6cd89a1ec681466e570b RLBA-2020:1919 ppp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ppp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc RLSA-2020:2755 Important: nghttp2 security update libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nghttp2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libnghttp2-1.33.0-3.el8_3.1.aarch64.rpm be36021cc5b45a2de10b59592486ebb8850d0da196721e05807caf6340362cd8 RLSA-2020:3654 Moderate: libcroco security update The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library. Security Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libcroco. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library. Security Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libcroco-0.6.12-4.el8_2.1.aarch64.rpm 073f402932fa613540e4ebefa3c221df051ded054eaf44be03b590699c3e77e7 RLBA-2020:4434 net-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms net-tools-2.0-0.52.20160912git.el8.aarch64.rpm 0d27b2b67161f9c092266a10c8e68c2f135fb3b9461721be098a9e358e94aa22 RLSA-2020:4436 Low: gnome-software and fwupd security, bug fix, and enhancement update The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for appstream-data, libxmlb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libxmlb-0.1.15-1.el8.aarch64.rpm 358fb3cf46f764f7e110314ba256e83667a36bfbbc62594ec017277fa3c70614 RLBA-2020:4437 python-setuptools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 RLSA-2020:4451 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libsoup-2.62.3-2.el8.aarch64.rpm 9908cdbae42df3f5c2715d0b256afbbacb31c65f466cd1375aeeeec76c6336eb python3-gobject-base-3.28.3-2.el8.aarch64.rpm 40a1899ca1bd4dc2eef88d82ec231dccc92f29d4d3832b9428210703c3886bd4 RLBA-2020:4452 libhugetlbfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libhugetlbfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libhugetlbfs-2.21-17.el8.aarch64.rpm 11f2050d2d08542d98902124eb5b99c4311a09651c90cc64a5268b04f25f6058 libhugetlbfs-devel-2.21-17.el8.aarch64.rpm da632c6fd4d2d94e6c0ce0d6ab0e1fd507094baf8af2e1d39682ff8d738437a6 libhugetlbfs-utils-2.21-17.el8.aarch64.rpm 155dc4ea3914c69133c4c3533f005b3349cbfa0205e691fe866adc24e3c1afba RLEA-2020:4468 lsof bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lsof. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms lsof-4.93.2-1.el8.aarch64.rpm 66bb72e26ca364c07e51755e6507fa6d97f0e9bb1294da44efde063899630fb4 RLEA-2020:4487 smartmontools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smartmontools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms smartmontools-7.1-1.el8.aarch64.rpm fa7401bd0681ddb28fb820c5c8d17535ca13e1fc1e563d59abcb5440ccc1c723 RLBA-2020:4488 libkcapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkcapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libkcapi-1.2.0-2.el8.aarch64.rpm 40bb0bf7d09b0511266a088b3880a7882946e499f6dd15f0c594821183790eb6 libkcapi-hmaccalc-1.2.0-2.el8.aarch64.rpm 1a85bda175b9d2bce6e9af14a22536fbad39dae41f53e14f12b19574e78f9e12 RLBA-2020:4501 iprutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iprutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iprutils-2.4.19-1.el8.aarch64.rpm ce5743a99f1e525a2eebba40baef710e74961ab322e8eadd17f00579f719cdfa RLEA-2020:4506 python-configshell bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-configshell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff RLBA-2020:4512 libteam bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libteam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libteam-1.31-2.el8.aarch64.rpm 0443964bf4c1e40b75149c169b2114eebc1ec40c9b980e274cb0de21c8894044 libteam-doc-1.31-2.el8.aarch64.rpm ec10ce62c69236dc0267fc4af6fb69079205180200e409f72459097391669703 network-scripts-team-1.31-2.el8.aarch64.rpm 5f602e449cdd77a2125d5afbc4565474a927b8a227e864850595dafe653c405a teamd-1.31-2.el8.aarch64.rpm 4abfc50b32b2cdc5b74337b8d5b48b756fbfa0c049c2b7081161721c306b103a RLBA-2020:4522 libqb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libqb-1.0.3-12.el8.aarch64.rpm 1b4ae223f3471acfcbd5847999e548773ab3a671d89b9ef494ac7342c627d0c7 libqb-devel-1.0.3-12.el8.aarch64.rpm d566020d31af71c1fadb7bd98177567842ef6d1d85e9e292c3c69dc20ad8eaad RLBA-2020:4538 logrotate bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for logrotate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms logrotate-3.14.0-4.el8.aarch64.rpm 59f7ee3b84da5742845d9c7b4938c92b7219c3eeda69aa1d9b2f3fb920d7f859 RLEA-2020:4555 libpsl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpsl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libpsl-0.20.2-6.el8.aarch64.rpm 7ea182e4df97af9e073eedec5717ac3ade26bf1a0e8e166f527c2a5eca5493c6 RLEA-2020:4556 libnetfilter_queue bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnetfilter_queue. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libnetfilter_queue-1.0.4-3.el8.aarch64.rpm b027c8d0be850086db4f228064e579f186cb2506ecc9523ae609c61b4ed5ad41 RLBA-2020:4557 zstd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zstd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libzstd-1.4.4-1.el8.aarch64.rpm 44d11e194b4d5ebf9bad5f1dc8adb136061e747c68a20bc14034359c98feda87 libzstd-devel-1.4.4-1.el8.aarch64.rpm b3befd27564abf4dcca29cbc7d236f7d2def40b3a3b6060ea5ba3ec47e978b50 RLBA-2020:4564 kabi-dw bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kabi-dw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kabi-dw-0-0.10.20200515gitb52ac13.el8.aarch64.rpm 702cbce378eccc1a203e651e691982fcffa69c5dd6cf35030f36153fec56a537 RLBA-2020:4580 kbd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kbd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kbd-2.0.4-10.el8.aarch64.rpm bab8ec1ce9458548c9c6f841987aa619481186889e5557cec9349b863e261e1a kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c RLEA-2020:4587 libusbx bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libusbx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libusbx-1.0.23-4.el8.aarch64.rpm dcb16d11caf370d59d350957aa9ae26e34b2990a5c1bfafdc7acd6da6ccef185 libusbx-devel-1.0.23-4.el8.aarch64.rpm a2a01cbb30bcd0b6afafdd999647ddf0132b3e096705ea68db273a5d873ec303 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 RLBA-2020:4592 psmisc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for psmisc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms psmisc-23.1-5.el8.aarch64.rpm 386de99da2075353af278c277373d7bde3a7302062f9a48a3b6526d74aa8f215 RLEA-2020:4596 efivar bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for efivar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms efivar-37-4.el8.aarch64.rpm b9b312e223b37e0dde17c2f193ea4ca5d3fdb53a5506eefaea1f15d8ed8c17d8 efivar-libs-37-4.el8.aarch64.rpm e6d21a1930022b4df95246a99a9611e6322d00417ad0608c7f40c5f039d6c38f RLBA-2020:4600 snappy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for snappy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms snappy-1.1.8-3.el8.aarch64.rpm d6e0b0098a14cc64a1bd7b19932ffdc1a1ec9f03cebbaa3baf28a155328cd9f4 RLEA-2020:4680 lmdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lmdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms lmdb-libs-0.9.24-1.el8.aarch64.rpm a4c3990f0faed2b2459af07c65bb757490389f1f47aa1c7ece2b72729f435ef5 RLEA-2020:4727 new module: perl:5.30 This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2020:4767 perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2020:4802 perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLBA-2020:4841 liburing bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liburing. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms liburing-1.0.7-3.el8.aarch64.rpm e0878d1379098814dc136eff0b799722e61b3b892851e4d923366b7308bc14f9 RLBA-2021:0564 dbxtool bug fix and enhancement update The dbxtool packages provide a command line utility and a one-shot systemd service for applying UEFI Secure Boot DBX updates. Bug Fix(es) and Enhancement(s): * [Dell Rocky Linux 8.2 BUG] dbxtool: fails to list with 'EFI Signature List is malformed' (BZ#1912474) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbxtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dbxtool packages provide a command line utility and a one-shot systemd service for applying UEFI Secure Boot DBX updates. Bug Fix(es) and Enhancement(s): * [Dell Rocky Linux 8.2 BUG] dbxtool: fails to list with 'EFI Signature List is malformed' (BZ#1912474) rocky-linux-8-aarch64-baseos-rpms dbxtool-8-5.el8_3.2.aarch64.rpm 81574994613d7da0398a586a5ffa448637101166726bc38010d8ffec2556c692 RLSA-2021:0618 Important: stunnel security update Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption. Security Fix(es): * stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for stunnel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption. Security Fix(es): * stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms stunnel-5.56-5.el8_3.aarch64.rpm 92fa548366ecda345c6a4fbf228e6f521ad0099554d2223d2de8bfd8619f317e RLSA-2021:1586 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gamin-0.1.10-32.el8.aarch64.rpm 5b38532025539581fbf6ce1b15d9abf6957bbc802abb71a0f8aadcae8478e256 RLBA-2021:1587 librabbitmq bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librabbitmq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms librabbitmq-0.9.0-3.el8.aarch64.rpm 0fec7ddd4d7a4b6de68b3ad79843b82764c4a5d7f8565fad973c9b2793b5081e RLBA-2021:1591 libxslt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxslt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libxslt-1.1.32-6.el8.aarch64.rpm c931a36d09edc1c8d70174979d25881755b03613041ac8915c0dcce812b9baab RLSA-2021:1600 Moderate: opensc security, bug fix, and enhancement update The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures. Security Fix(es): * opensc: heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570) * opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571) * opensc: stack-based buffer overflow in tcos_decipher (CVE-2020-26572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for opensc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures. Security Fix(es): * opensc: heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570) * opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571) * opensc: stack-based buffer overflow in tcos_decipher (CVE-2020-26572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms opensc-0.20.0-4.el8.aarch64.rpm 164d3a5d5354414bb3d3d20b7cb1de9fb74d0d9c900811e5aaa93778b7587ce1 RLSA-2021:1609 Moderate: p11-kit security, bug fix, and enhancement update The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files. The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853) Security Fix(es): * p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361) * p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362) * p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for p11-kit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files. The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853) Security Fix(es): * p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361) * p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362) * p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms p11-kit-0.23.22-1.el8.aarch64.rpm 08f2c614565050ddc0b24e6f0cf6f70b15fe5dd932ec90ffddb46598e6ebf25e p11-kit-devel-0.23.22-1.el8.aarch64.rpm 6159beebcc1ad813d690297e11f3119f15d6c944f189e9bc20607f31aacc9013 p11-kit-server-0.23.22-1.el8.aarch64.rpm 4e7583b3d5c634bccda9397c2f3c1380e02189e4b96a3423a46b7e35d696e599 p11-kit-trust-0.23.22-1.el8.aarch64.rpm 3dd1ad4e759faef4efcdb435a85b28d92e6f1dc268680415b7b22de588d2f2da RLBA-2021:1612 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms avahi-0.7-20.el8.aarch64.rpm 5ea165cfb19344e5d3cf9e67d4314594283a93e058159c88d2a919a3c5194d8d avahi-autoipd-0.7-20.el8.aarch64.rpm 0576f5168271971c0e0e52dbb8d0482eb93fa111fa6102af4014eda72791dec9 avahi-glib-0.7-20.el8.aarch64.rpm 4b7f151019e0a7ff73ba538b7049149524c9065416b0aec9818bf059a26d9ec7 avahi-gobject-0.7-20.el8.aarch64.rpm b82928be917bc2c5ce721917673f6c091ae4fee848f9fa20f3bf949ef2ec9fdc avahi-libs-0.7-20.el8.aarch64.rpm df0704d7a1e6e8322c9537cbe558cb0df331ffa2c79433e112d46eeb39e8a715 python3-avahi-0.7-20.el8.aarch64.rpm be5a19239e15bb708477a693de8d0a69dff6e1e5406dca7dfd5c649bede13745 RLBA-2021:1619 efi-rpm-macros bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for efi-rpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 RLSA-2021:1627 Moderate: trousers security, bug fix, and enhancement update TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware. The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782) Security Fix(es): * trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331) * trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332) * trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for trousers. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware. The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782) Security Fix(es): * trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331) * trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332) * trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms trousers-0.3.15-1.el8.aarch64.rpm e35cc3701b3030b5abf176e380118f1df2f6e4ff4d19438c53976453773ed893 trousers-lib-0.3.15-1.el8.aarch64.rpm b7c7bd8861a9d3ce807f2d3c0b8bd4afda6a8f4587db20e4ac96d2fde4fafacd RLBA-2021:1628 tpm-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tpm-tools-1.3.9.2-1.el8.aarch64.rpm 5aac85af139bc5277ae056757fe3295c575d591ed3f017f12eb1fe0c50af1805 tpm-tools-pkcs11-1.3.9.2-1.el8.aarch64.rpm 371fb273440254bd8398791a97190abf324bff6273e97580a0cd79786586c9a8 RLSA-2021:1631 Moderate: python-urllib3 security update The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-urllib3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 RLEA-2021:1658 pciutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pciutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms pciutils-3.7.0-1.el8.aarch64.rpm d17271f11a438ed284093af131297bf122422c9ecb49fbd309b7281d5bd1a54e pciutils-devel-3.7.0-1.el8.aarch64.rpm 116a768e1328ca72401320aad8ea3b22f37bca143d702e8afb09f5a1594ba8e2 pciutils-libs-3.7.0-1.el8.aarch64.rpm 944e24132bdbe169250f5786bcb4d0db46b84d5891ee903857916927bc511e73 RLBA-2021:1660 tpm2-abrmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-abrmd, tpm2-abrmd-selinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b RLEA-2021:1673 crda bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b RLBA-2021:1681 vhostmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vhostmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms vm-dump-metrics-1.1-5.el8.aarch64.rpm 28f9ee66b9c4b7f68f45ea99fff0da8ec9ed93e75f9d768f9dbc2718569f3529 vm-dump-metrics-devel-1.1-5.el8.aarch64.rpm c527f061d8414de4aea3089676ac5a1576be122b1dcf1107074471b9cb7be3f0 RLBA-2021:1687 dejavu-fonts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dejavu-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 RLBA-2021:1689 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo, librhsm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms librhsm-0.0.3-4.el8.aarch64.rpm 37f7bca8aca864d085b0060a2aada53eccca0c7b22ae9c58cc7b2f9e9646b0a1 RLBA-2021:1691 iptraf-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptraf-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iptraf-ng-1.2.1-2.el8.aarch64.rpm c25d4dc4050caad8d3b6d177a34bdd58874e9c323bd4627c12a8dd82e25dc7d6 RLBA-2021:1698 python-ply bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ply. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 RLBA-2021:1699 crontabs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crontabs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 RLSA-2021:1702 Moderate: brotli security update Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for brotli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms brotli-1.0.6-3.el8.aarch64.rpm 70943540adca1c0501ce9d356730014e327797413bf1028aacfc7d2cde029ca0 RLEA-2021:1707 bolt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bolt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms bolt-0.9.1-1.el8.aarch64.rpm 44f115e18df5c6a616e896f350a7c75b04bc0cdbea5cc64ac2b04a3252138979 RLBA-2021:1709 popt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for popt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms popt-1.18-1.el8.aarch64.rpm 0b152ba0c29df0d4f7d079a367e9bb81513c4e69955dbe494bf38b772634d0f2 popt-devel-1.18-1.el8.aarch64.rpm 4b346d06e512c4ea8d1d38adc9d7460bf242d1f705ab63cd64b64160299015da RLEA-2021:1712 libpcap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libpcap-1.9.1-5.el8.aarch64.rpm c1bc09b7c980260a8c79b40b9e34a1a3de4307652d369c77bbe17e8eb1785728 RLEA-2021:1720 ima-evm-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ima-evm-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ima-evm-utils0-1.3.2-12.el8.aarch64.rpm e09bc4c91ab0f6318f0eb8085175af591e963a21c51eb00626000cc9898b1e06 ima-evm-utils-1.3.2-12.el8.aarch64.rpm bfeaf876c3ee8d48cc90e8e88e0c55b9a3ca10f02cd9299b8c9b3ca637a68456 RLBA-2021:1731 userspace-rcu bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for userspace-rcu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms userspace-rcu-0.10.1-4.el8.aarch64.rpm b79de5dd720e0bf496b56663acf6a10878258b971e891258275fa4af16d3a1b1 RLBA-2021:1732 squashfs-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for squashfs-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms squashfs-tools-4.3-20.el8.aarch64.rpm 891b0fa964778bdb794b5b398bff430b70eaae0e8d6899015703e7253fbf7b65 RLSA-2021:2575 Moderate: lz4 security update The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems. Security Fix(es): * lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for lz4. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems. Security Fix(es): * lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms lz4-1.8.3-3.el8_4.aarch64.rpm 696c7dfc2e3b01a795fedfc0808fc7de5a82e4d1f49654e90b86041417d5c0c6 lz4-devel-1.8.3-3.el8_4.aarch64.rpm 193cc35b57a8d161be73c6372730b21306f35a2accadc6cc29830399e2f0e61b lz4-libs-1.8.3-3.el8_4.aarch64.rpm d76fb7b3e3cefe2a66de064138c1f85d3a7a9a18b34360bbd679bd966b2a0d4d RLBA-2021:3049 pcsc-lite bug fix and enhancement update PC/SC Lite provides a Windows SCard compatible interface for communicating with smart cards, smart card readers, and other security tokens. Bug Fixes: * Increase global reader array size to 48 to address issue with RHCS secure channel creation (BZ#1972569) * Increase global reader array size to 48 to address issue with RHCS secure channel creation (pcsc-lite-ccid) (BZ#1973405) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcsc-lite-ccid, pcsc-lite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PC/SC Lite provides a Windows SCard compatible interface for communicating with smart cards, smart card readers, and other security tokens. Bug Fixes: * Increase global reader array size to 48 to address issue with RHCS secure channel creation (BZ#1972569) * Increase global reader array size to 48 to address issue with RHCS secure channel creation (pcsc-lite-ccid) (BZ#1973405) rocky-linux-8-aarch64-baseos-rpms pcsc-lite-ccid-1.4.29-5.1.el8_4.aarch64.rpm 3344f5849a894d9a1b794dff7b6855ee738988deb423237e87ce370a139a9461 RLBA-2021:3594 libdb bug fix and enhancement update The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) rocky-linux-8-aarch64-baseos-rpms libdb-5.3.28-42.el8_4.aarch64.rpm f1b46b46efe469ee828526cc8840a0491b454c9f8bd55a89a91313111176d02e libdb-utils-5.3.28-42.el8_4.aarch64.rpm 837085b66d2b6498e6c67b92eb52b4589c557f207cc11769b2774bb2acaf33fd RLBA-2021:4353 lm_sensors bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lm_sensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms lm_sensors-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm ffc729370897eee6b4b7daa3bf878eee28866a005a3f24e2ba47aba133ca701d lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 0f256d299942ad27e27bbe2fb91b09105478df66c65993054648a554882b8d9a lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 3b817b2e17006d5f76598e41fe2d967710d0e1b295f0cd468ff26be0ffeffbc5 RLBA-2021:4354 libndp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libndp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libndp-1.7-6.el8.aarch64.rpm e0e5752c2929eb2c831052d390e51807e2b5850a6ffe03192f6dfb2122be6306 RLBA-2021:4363 gfs2-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gfs2-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gfs2-utils-3.2.0-11.el8.aarch64.rpm 677c3378eb14afdb6a0f71cbdae0e8dd388f4efbf1d777c688881db82e731958 RLBA-2021:4371 libxcrypt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libxcrypt-4.1.1-6.el8.aarch64.rpm 4297629a9d4951880629af6c9c87f48bc6b785577196fa690b377dbd48a513fd libxcrypt-devel-4.1.1-6.el8.aarch64.rpm da9307e19104245a81d4174b81135d92376dfd15397383245532001838a2de19 RLSA-2021:4373 Low: pcre security update PCRE is a Perl-compatible regular expression library. Security Fix(es): * pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838) * pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pcre. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PCRE is a Perl-compatible regular expression library. Security Fix(es): * pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838) * pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms pcre-8.42-6.el8.aarch64.rpm d2233f6aebbb5ac9f90a6d374650c445794fe5ecf857236228a4cc006206b068 pcre-cpp-8.42-6.el8.aarch64.rpm 11747984326dd29836ed4544cb6c652041ed0e6ed9e925768a6ce4261db51d6b pcre-devel-8.42-6.el8.aarch64.rpm 287960d8b6336ef28563b412c7a059d5657e55382f515f3b9eb1bd378789da79 pcre-utf16-8.42-6.el8.aarch64.rpm 55c0ac0f4c6959e1c9383a62e36a58df4eed153d17f152cad9699aae5e5c4c34 pcre-utf32-8.42-6.el8.aarch64.rpm bae262449b3463dd12d59aa9cfaed79f208482d80d8ce72e89a5ec6a2cef3dbe RLBA-2021:4377 quota bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for quota. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms quota-4.04-14.el8.aarch64.rpm 78583ab44caf019a1adc6cf81d3cc4126e7b384ef404f57d311a50873e35ebf6 quota-doc-4.04-14.el8.noarch.rpm 7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6 quota-nld-4.04-14.el8.aarch64.rpm 211fdbc263f69c13bcc1dd6d308421c79078dec59b8ab6967511fc1a26d8f2c1 quota-nls-4.04-14.el8.noarch.rpm e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a quota-rpc-4.04-14.el8.aarch64.rpm d559be3c53591efe8d795304a71b5ebd5f7e314fb0453bdde5850b99816e4eb8 quota-warnquota-4.04-14.el8.aarch64.rpm dacf17ecb1d1af92f7361781a4f55ffa85d799afd60f689c985743c2fe4a941f RLBA-2021:4379 watchdog bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for watchdog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms watchdog-5.15-2.el8.aarch64.rpm 8e6c800a51ea317dccd0db1b4a59d690a110b9428cf12b67ceb6d9302596179b RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gsettings-desktop-schemas-3.32.0-6.el8.aarch64.rpm 49caae3bfdce01c6951e199c96d03ac8b355cafc46d1bb33732574b0e5ed7045 RLBA-2021:4383 nvmetcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvmetcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms nvmetcli-0.7-3.el8.noarch.rpm 4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743 RLBA-2021:4397 logwatch bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for logwatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms logwatch-7.4.3-11.el8.noarch.rpm f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764 RLEA-2021:4405 libmodulemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmodulemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libmodulemd1-1.8.16-0.2.13.0.1.aarch64.rpm 78bb230cee09bd30eb92525dec0b229bdc522af52ce5165774c37b3f136f76db libmodulemd-2.13.0-1.el8.aarch64.rpm 2187b3843488bcc57c6d2857b67c739227904e28a751efc9e1b21871105b4e4a RLBA-2021:4406 numactl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms numactl-2.0.12-13.el8.aarch64.rpm d5d198885820fc54e9320e19a62e328e6a2e10e21658686764860d5654feb985 numactl-devel-2.0.12-13.el8.aarch64.rpm ef351ddce4f240b5b7f91908b71330c421584d6e89b48ce3d0f909ac46792af0 numactl-libs-2.0.12-13.el8.aarch64.rpm b30a38428169b9be57f364e4e64a194fa3700db2faa8c198a78717524e4504e4 RLBA-2021:4411 tpm2-tss bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-tss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tpm2-tss-2.3.2-4.el8.aarch64.rpm 06a3a6cf98cb1c786f9c395c99bf429fded9890aaf583a3ab019d53c92cdeeeb tpm2-tss-devel-2.3.2-4.el8.aarch64.rpm aa26a8fefcae86a3d289d0cd248c7db40f0dc604f1688c87f8958cf58b557935 RLBA-2021:4412 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms opensm-3.3.24-1.el8.aarch64.rpm cdd6b8bd4abc9b43d5f5638f54373eb80b1a98442daed6f39f9ce101befb2f1d opensm-libs-3.3.24-1.el8.aarch64.rpm 72baffdb15d49074e5097cd0edcb5d3f7a2c778bf3d9ff25abe405d72963829d perftest-4.5-12.el8.aarch64.rpm bdb7dfeb36bf8cde96daf92fabff38b85eca2b7a459a0bcc444ac845e7e35b68 RLSA-2021:4413 Moderate: tpm2-tools security and enhancement update The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space. Security Fix(es): * tpm2-tools: fixed AES wrapping key in tpm2_import (CVE-2021-3565) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tpm2-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space. Security Fix(es): * tpm2-tools: fixed AES wrapping key in tpm2_import (CVE-2021-3565) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tpm2-tools-4.1.1-5.el8.aarch64.rpm fbf67a9fffbba81330aceb0591af5c331b8034d2e1b87023aa455bebe97fa6d6 RLBA-2021:4421 hdparm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hdparm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms hdparm-9.54-4.el8.aarch64.rpm 701b24d173f4461481c56d7660281b0dd30b90823c72ffa05bb0d09c474b0213 RLSA-2021:4426 Moderate: ncurses security update The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. Security Fix(es): * ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594) * ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ncurses. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. Security Fix(es): * ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594) * ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ncurses-6.1-9.20180224.el8.aarch64.rpm 9ea3641642f3e885ced4ce7f30cc569ae668ef0ee37450275dd77af323c17bfe ncurses-base-6.1-9.20180224.el8.noarch.rpm 0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1 ncurses-c++-libs-6.1-9.20180224.el8.aarch64.rpm f4ae3086dd69cefc41cadc9c400b534dbc8b9fc5ad6505e656eb3313f70dc898 ncurses-compat-libs-6.1-9.20180224.el8.aarch64.rpm 78d1a4263b6495345e40e8d0e3ec9ff3d29a5c3c0a5f5734cf4a8531c297e457 ncurses-devel-6.1-9.20180224.el8.aarch64.rpm fa1daaf74f5415199a49db02f2f0e4def0fdbf160715b5e42f2c92dd810b60f0 ncurses-libs-6.1-9.20180224.el8.aarch64.rpm 4481f8a571f8d3775e1ee733f75c8199edd4de6a72a53b97cf36c4dff50e8173 ncurses-term-6.1-9.20180224.el8.noarch.rpm 165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066 RLEA-2021:4434 libcap-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libcap-ng-0.7.11-1.el8.aarch64.rpm ca0c5cd3a6ff1505113b2b220844603077d282b81f790a205e7d23ab6cf68a61 libcap-ng-devel-0.7.11-1.el8.aarch64.rpm 7936904f9dd845e5490d9f12e85b332a0dae4bcd5d7cd87ebc10e0ce1624e681 libcap-ng-python3-0.7.11-1.el8.aarch64.rpm 87a6b0035917dc49cd5348a82ceb0e56d5decf421466afff1791f15a848f91b5 libcap-ng-utils-0.7.11-1.el8.aarch64.rpm db12ab01654b8c97c6fab2df6842ccb19d32572f8a94a54821f664b5779c2599 RLBA-2021:4441 microdnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for microdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms microdnf-3.8.0-2.el8.aarch64.rpm c5012008ea930d17fc413ba57779640da4e4aaf4cbf998738c498e64a1e3fe41 RLBA-2021:4442 lshw bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lshw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms lshw-B.02.19.2-6.el8.aarch64.rpm 2d2687796f9b42f059578b19110ba870bf351eeb5b0b079a3d798343f16efb40 RLBA-2021:4443 python-cryptography bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-cryptography. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-cryptography-3.2.1-5.el8.aarch64.rpm 8d3d653d08e3be1edec2f1e36c0b6446834560d4aec26eef28f4b4e480f94285 RLBA-2021:4445 fcoe-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fcoe-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms fcoe-utils-1.0.33-4.git848bcc6.el8.aarch64.rpm 6b65f627098eb91211f338c02257b2d61813d36c9f4731407e1403566a6d24f4 RLBA-2021:4446 iscsi-initiator-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.aarch64.rpm fd19dda7daa6c82f797542c1556e082fd7ac26c8ab963677c0b2af140fba1af6 iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.aarch64.rpm fb9c2ff9e5987a18f7aa092064d0b665431963dbac119841b84ca6294a31747c python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.aarch64.rpm 1f82149dfb5d46da386afbbf5d87758ff37552234b424697a25ec94bf0688d47 RLBA-2021:4449 openldap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms openldap-2.4.46-18.el8.aarch64.rpm a7bbbc01764348528bed3b52449e2b8ddd9d97dd85a4ce38bc2a968943cc8098 openldap-clients-2.4.46-18.el8.aarch64.rpm 091f5ca639a5fac96e66ddb6f9c7a1c0644b93157886f929f7177c6333b9058e openldap-devel-2.4.46-18.el8.aarch64.rpm 73ec92205626d93ee5bf5f466f942cde2adfe4c75b22dad6299d7fc1e6f287c7 RLSA-2021:4451 Moderate: gnutls and nettle security, bug fix, and enhancement update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms nettle-3.4.1-7.el8.aarch64.rpm 51eabb0ae5bf19165967d8926043b01302dd36590a0333126ca88b43c480afe8 RLBA-2021:4453 adcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms adcli-0.8.2-12.el8.aarch64.rpm c08a88685bee70332aafb9a88544bfde4209f39f5725ed6c915a25c82af45df4 adcli-doc-0.8.2-12.el8.noarch.rpm 8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39 RLBA-2021:4454 keyutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for keyutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms keyutils-1.5.10-9.el8.aarch64.rpm 8187b646e2dba4ea0237c9a13dc38bff71a9a1d62d7b30fe801ca8b409bf5a32 keyutils-libs-1.5.10-9.el8.aarch64.rpm e292a3399c4f77784ec88a2a0429ca018de5dcdb8bede782bed68b81a27d45fa keyutils-libs-devel-1.5.10-9.el8.aarch64.rpm e8203f5aba3186e1b55a5c356441051b4dddf3e1f1e1bbb54a42cb45d5a43587 RLBA-2021:4456 boom-boot bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for boom-boot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms boom-boot-1.3-2.el8.noarch.rpm e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06 boom-boot-conf-1.3-2.el8.noarch.rpm c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b boom-boot-grub2-1.3-2.el8.noarch.rpm 65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461 python3-boom-1.3-2.el8.noarch.rpm a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978 RLBA-2021:4461 filesystem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for filesystem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms filesystem-3.8-6.el8.aarch64.rpm 71f0011c4ad7cbc532703435aa8a08e0708211aa1fe3bcf3bc558e728e86a21f RLBA-2021:4470 man-db bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for man-db. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms man-db-2.7.6.1-18.el8.aarch64.rpm 706e5fa9dc865141adfa04c4718a3ec66dcb95fb95425de3cf3d06aaa45df91f man-db-cron-2.7.6.1-18.el8.noarch.rpm 4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6 RLBA-2021:4475 freeipmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms freeipmi-1.6.8-1.el8.aarch64.rpm 752dae7d1a46252424ff5969f0b0464dae89b96a9b90d4c8330b2a4db34e9b5e freeipmi-bmc-watchdog-1.6.8-1.el8.aarch64.rpm f1eaf8f776911d619fa11ad4847bf2bee32ed82e79fc57b1c466111aae39edd9 freeipmi-ipmidetectd-1.6.8-1.el8.aarch64.rpm 783620e8d99668786788127902b21ef3f38ab0d577e35c1155ee6a5a0ee5acc0 freeipmi-ipmiseld-1.6.8-1.el8.aarch64.rpm 4a71ba37b2970a5adc870c9674dbf68dff5ef02944ee4f31d83dbf4d36aa5399 RLBA-2021:4477 parted bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for parted. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms parted-3.2-39.el8.aarch64.rpm bfdbff9ea27a733bd2959f63ea81985ce171c5eb2849c1ba9729e155af08987c RLBA-2021:4483 OpenIPMI bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for OpenIPMI. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms OpenIPMI-2.0.31-3.el8.aarch64.rpm b9ecec7ec2dacba9c388cbfb8d2b6bb3b4fdb9f382fac86807c1c2b50982acf6 OpenIPMI-lanserv-2.0.31-3.el8.aarch64.rpm 03cf43e936333ebcd20f70165e5d931aa2c0c2c0349fd4f11d55c9be916ef726 OpenIPMI-libs-2.0.31-3.el8.aarch64.rpm 2f4c2f26274b2933c5a840178aebecb70872e9c378b9875b7a18c1481ef9ecb8 OpenIPMI-perl-2.0.31-3.el8.aarch64.rpm fd6d40baa24c93513a60ba55ea982e9a888f760bd7ca1f19f30494a966a50da8 python3-openipmi-2.0.31-3.el8.aarch64.rpm 09c86d590c5028c0eeeef7aaa5122cb0137848ee993b2a8d342cbcbbc3fa7caf RLEA-2021:4488 hwloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms compat-hwloc1-2.2.0-3.el8.aarch64.rpm 8ffbf52855b756a3fc65d10d801c420c2c4a8e8dd7fea09a1d6c4076defede4f hwloc-2.2.0-3.el8.aarch64.rpm aac8aa107cc7e3577bcea2ce55183328590bb5bf142ec5cf28118aa032709059 hwloc-libs-2.2.0-3.el8.aarch64.rpm 464f138c1c39e9a5add64c78e679712a7538321d9d24a64ba95112beae454418 RLBA-2021:4496 chkconfig bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chkconfig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms chkconfig-1.19.1-1.el8.aarch64.rpm d2850969a3f8263be656456d0ac703465d4ead7c0470bad62e4abe6e66b71ef4 ntsysv-1.19.1-1.el8.aarch64.rpm 09eaf5d3abf9f40ac35e931367fdcab0f3cbb0ce092d02a5f203a54d3b2bcbfb RLBA-2021:4501 emacs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms emacs-filesystem-26.1-7.el8.noarch.rpm 0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97 RLBA-2021:4505 mobile-broadband-provider-info bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mobile-broadband-provider-info. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms mobile-broadband-provider-info-20210805-1.el8.noarch.rpm b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87 RLBA-2021:4507 fontconfig bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fontconfig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms fontconfig-2.13.1-4.el8.aarch64.rpm 5ef0bde77e19628d72c91a9c4eac7c2a220587aa5c260f7cb2da20e818352ed2 fontconfig-devel-2.13.1-4.el8.aarch64.rpm 29cdf2426574c666841640752a84e50dea4f7d23531e17ae48973c4902ca191f RLBA-2021:4508 lsscsi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lsscsi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms lsscsi-0.32-3.el8.aarch64.rpm 585ef55d8d660059ee009a2b2e11a51698d40dfe056ba543631c7199b4abed31 RLSA-2021:4510 Low: lua security update The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for lua. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms lua-libs-5.3.4-12.el8.aarch64.rpm c1c84a33cec9d1a40de3b87b2c2607078137cf6491b638f97fb5b89670ec5e3a RLBA-2021:4512 os-prober bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for os-prober. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms os-prober-1.74-9.el8.aarch64.rpm 5559ba9568f586c136e94e5460198cf591066677812de1188a340b269c2bb09f RLSA-2021:4513 Moderate: libsepol security update The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings). Security Fix(es): * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) * libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) * libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsepol. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings). Security Fix(es): * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) * libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) * libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libsepol-2.9-3.el8.aarch64.rpm e2c55fc5738b9129c59a4fb29fd81be32ee242380398dc007f88ef19429cb747 libsepol-devel-2.9-3.el8.aarch64.rpm 317705b5f8b8a267fa79aa17d581fd13d8d7b40cf94a538d7b9a9dfef9394933 RLBA-2021:4516 usermode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usermode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms usermode-1.113-2.el8.aarch64.rpm f00f3dacf721e61a4a9e4fd3b72ea86300d9e3cc3bad24825c5b181647a91ec0 RLSA-2022:0658 Important: cyrus-sasl security update The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cyrus-sasl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms cyrus-sasl-2.1.27-6.el8_5.aarch64.rpm 332f1daeee3e1dc2740a5047d2c85bcc6a565a21cab1ed04f19760e71690b2c7 cyrus-sasl-devel-2.1.27-6.el8_5.aarch64.rpm 91b9d7083ee108037e9e2369278d742d37405fbb2667c1be556cb5d219a96b31 cyrus-sasl-gs2-2.1.27-6.el8_5.aarch64.rpm ce163751e84cf6f7b33785a51db0e1d413e8979bef6d6b01aef9d5f7d40a7c23 cyrus-sasl-gssapi-2.1.27-6.el8_5.aarch64.rpm b44d22cfbe12c7e06d2e6abbdbef6679e55b28202d68476845931d63a64b34a3 cyrus-sasl-ldap-2.1.27-6.el8_5.aarch64.rpm a2a7506adee7d315891d07c2d23192ae9794c58b329b120ee5d61ba96512cae0 cyrus-sasl-lib-2.1.27-6.el8_5.aarch64.rpm 41972a29bcab934002e888d22b87226491ac4bc08bc43ef020aa3d8304049e4a cyrus-sasl-md5-2.1.27-6.el8_5.aarch64.rpm 5d2832fc70c31bfe2bf998e0642da4c7dd090887e3d2b0fe5b6bb0d0385b8230 cyrus-sasl-ntlm-2.1.27-6.el8_5.aarch64.rpm 6e0c8e206f2cd3334b19c2e812384394402a0e23f3eabe5652e1dcab65f86414 cyrus-sasl-plain-2.1.27-6.el8_5.aarch64.rpm acc6f87f6980faa27999c52c8157730319724152216918efc0a03dd49b215765 cyrus-sasl-scram-2.1.27-6.el8_5.aarch64.rpm 12755565608594ac2b71107a5904b754d9718c6b68c343c4d02be84868c95313 RLSA-2022:1537 Important: gzip security update The gzip packages contain the gzip (GNU zip) data compression utility. gzip is used to compress regular files. It replaces them with files containing the .gz extension, while retaining ownership modes, access, and modification times. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gzip packages contain the gzip (GNU zip) data compression utility. gzip is used to compress regular files. It replaces them with files containing the .gz extension, while retaining ownership modes, access, and modification times. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms gzip-1.9-13.el8_5.aarch64.rpm f106a7f7904c1caf97eead75f1fa6031aa6d2ca66b77b3b65fa5671976700ac1 RLSA-2022:1546 Moderate: polkit security update The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Security Fix(es): * polkit: file descriptor leak allows an unprivileged user to cause a crash (CVE-2021-4115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Security Fix(es): * polkit: file descriptor leak allows an unprivileged user to cause a crash (CVE-2021-4115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms polkit-0.115-13.el8_5.2.aarch64.rpm 9b0d4505b0aacc3810aabad0f3ac0f1dbaef8a1473a9cc6e9007388e164b38f1 polkit-devel-0.115-13.el8_5.2.aarch64.rpm 06d34be7d7015fcba8c6f2d9e33c958c8ca264cd692892c5e227f3d5d1e9b7f2 polkit-docs-0.115-13.el8_5.2.noarch.rpm 07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653 polkit-libs-0.115-13.el8_5.2.aarch64.rpm 7f5723107b0b173ba28589bbe4e36451e3b004bfd687c317c74f0ebddda1db4f RLEA-2022:1954 perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2022:1956 perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLSA-2022:1991 Moderate: cpio security update The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. Security Fix(es): * cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file (CVE-2021-38185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cpio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. Security Fix(es): * cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file (CVE-2021-38185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cpio-2.12-11.el8.aarch64.rpm 45c839cc0ecf28ad0d8e8c577b98a9e26d8e714337bc6f3f2692eadc4c2b506a RLEA-2022:2014 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perftest-4.5-12.el8.aarch64.rpm bdb7dfeb36bf8cde96daf92fabff38b85eca2b7a459a0bcc444ac845e7e35b68 RLBA-2022:2023 net-snmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms net-snmp-libs-5.8-25.el8.aarch64.rpm 4f6a4b2cf076272c0542ca782f1ab967c965238dd006333b6244b5980ec6468f RLBA-2022:2027 json-c bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms json-c-0.13.1-3.el8.aarch64.rpm 2b9864631453555d917c715ed9fe356e644835e6f1f916c2b0236f18d4ea6a3c RLEA-2022:2029 libseccomp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libseccomp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libseccomp-2.5.2-1.el8.aarch64.rpm 00163c8639df2c21996a6ad4d725d4df3026f0ac725ff2ec51d2805ad5953bce RLBA-2022:2041 openhpi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openhpi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms openhpi-3.8.0-10.el8.aarch64.rpm 30b66fc2fe218a0defb45a822b312253a63f916de8ecc660e9df23020f161aab openhpi-libs-3.8.0-10.el8.aarch64.rpm cda2585238b545931760f6f775a6d54c74e59fcbbe1cb074386e24112b2ab145 RLBA-2022:2044 crypto-policies bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crypto-policies. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm 83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9 crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183 RLBA-2022:2054 libffi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libffi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libffi-3.1-23.el8.aarch64.rpm f6afab76456adcc3407ba78babdb4c13ea931ee967dbeca7171a7af693f28452 libffi-devel-3.1-23.el8.aarch64.rpm 2b6e6a0e547e5a8e332182b50c3eea1c65ac27608b486e596e01819c26df47bc RLBA-2022:2060 kmod bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kmod-25-19.el8.aarch64.rpm 1ab1a56ffda4f0b37e0913237283fcdaeadc06c2454a404e91cde90eff825eb4 kmod-libs-25-19.el8.aarch64.rpm 754c6d1db5fbd7daee3cbcea722a71971595c45d09cd3346ccef0494ea2e37d0 RLBA-2022:2062 wpa_supplicant bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wpa_supplicant. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms wpa_supplicant-2.10-1.el8.aarch64.rpm af5ab7c5a6c75d6b5e9cafc72d94ba54acb2a4d8dca92a7bb1d6037ad28f8a59 RLBA-2022:2080 sudo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms sudo-1.8.29-8.el8.aarch64.rpm 2a69fa9baf56512e72f8d89af4c0bb8c98acf42dfa97caf5d9454ffaef39ff25 RLBA-2022:2098 unzip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms unzip-6.0-46.el8.aarch64.rpm ba9b759130b0597e1ad63652e8895b42a045c2e82afe95a426e873f152ae3f06 RLBA-2022:2111 ksc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ksc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ksc-1.9-2.el8.noarch.rpm 62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96 RLEA-2022:1869 new module: perl:5.32 This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2022:1955 perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2022:1990 rasdaemon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rasdaemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms rasdaemon-0.6.1-12.el8.aarch64.rpm 42a74309880b8546d92e43230b1c76497ace5d0f09797a650256707e129f6992 RLBA-2022:1994 libqmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libqmi-utils-1.30.2-1.el8.aarch64.rpm b2e4059ace86f92dd1bbea769bb049c0053dcfcdc7e1de4a1c69b41b8920b60f libqmi-1.30.2-1.el8.aarch64.rpm 41cbd1100c34b4b260467f6b22b86ba0c681990fe4c9ba234139ea2daabced45 RLBA-2022:1996 sed bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sed. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms sed-4.5-5.el8.aarch64.rpm ddf5d10a779abd3fe3f75d2a49fbc872896412859c4246e1a6a9dd139ee49690 RLBA-2022:1997 libmbim bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmbim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libmbim-1.26.0-2.el8.aarch64.rpm d552349ee145265dd81c8311b00058b448e4985ff93faac5af767360a8328a37 libmbim-utils-1.26.0-2.el8.aarch64.rpm e8642872288af0d3e248483399e4d6eb5ac91e878a11d8ac49d186c9c12b6338 RLBA-2022:1999 trace-cmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trace-cmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms trace-cmd-2.7-10.el8.aarch64.rpm 51de7c791b33a726c2f232bc84a79fe6f17674b08a423ea97902d09d489f2b22 RLBA-2022:2009 ModemManager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ModemManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ModemManager-1.18.2-1.el8.aarch64.rpm 614e1130d623c3d191f6292cf6a28df81b65032c4f2d953f0ab61d18d54f3510 ModemManager-glib-1.18.2-1.el8.aarch64.rpm 48cd4a4e180c1db310f937810013f6bfe227b34c36ff8243993df79d2199f5e9 RLBA-2022:2015 make bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms make-4.2.1-11.el8.aarch64.rpm 2b734a70ce6b5a957b3c302c77f0c07d7ab57b5c2ebd9c9bcd79df37d744667d make-devel-4.2.1-11.el8.aarch64.rpm f198e239d9f5a6a415232bfb5f7b61bf2e747574e1c45423afe47dc1e70675dc RLBA-2022:2018 perl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-IO-Zlib-1.10-421.el8.noarch.rpm 087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25 perl-Errno-1.28-421.el8.aarch64.rpm 34ecce44680a107dd02ab2562491411e2763126ec2883fb332760071201dc823 perl-interpreter-5.26.3-421.el8.aarch64.rpm 6a52f0faef386d8bfeea1bd34b57c6753e1c067bfa4987cbedbcee1c03ca22bd perl-IO-1.38-421.el8.aarch64.rpm 59671e68e2bc45e8b83a00107c09b74a534e8309b20321249facc85141275364 perl-libs-5.26.3-421.el8.aarch64.rpm 3d09956cc75238e3e9290b911da7a581744fb0a82470bf81b2bba71ea913d692 perl-macros-5.26.3-421.el8.aarch64.rpm 36bcc6016692a87410b729478eb543e97ca2e386baa84585597b16f7a24a2c4a perl-Math-Complex-1.59-421.el8.noarch.rpm 8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a RLBA-2022:2024 ps_mem bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ps_mem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ps_mem-3.6-9.el8.noarch.rpm 056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libssh-0.9.6-3.el8.aarch64.rpm befdae1b2d3f4a16811a1e57f8243b194c2e50e6624c851db5bc118020d10b21 libssh-config-0.9.6-3.el8.noarch.rpm 24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549 RLBA-2022:2034 dmidecode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dmidecode-3.3-4.el8.aarch64.rpm 79a38f27953434301d0ee92b817ce71c2e2b9633440cd5910e7137359413435d RLBA-2022:2035 libstoragemgmt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libstoragemgmt-1.9.1-3.el8.aarch64.rpm 7c5e4f09bb5a3cd0ec5a2565d218c51be2725972a96a0972df2a76e03cbb7c70 libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm 4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm 3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559 libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23 libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm 59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2 libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm 9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb libstoragemgmt-udev-1.9.1-3.el8.aarch64.rpm 3bef2c6f20a893cd7468f7ba5a0b30047647b54fdfdbbc8582ee4a506931b6e2 python3-libstoragemgmt-1.9.1-3.el8.aarch64.rpm 065d96f2a85cf84f3f4292b72c4de31317e2cdf273a553d1e304b169621a1248 RLBA-2022:2040 libuser bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libuser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libuser-0.62-24.el8.aarch64.rpm c661dc2fe0314f936dfc856462560918f8c1a07eb1fafba94bed65debd937278 python3-libuser-0.62-24.el8.aarch64.rpm 09a954d2b3f35ac14a2b9af322bbf27cd2e30ae160cf404d046dea1c2f5892a1 RLSA-2022:2043 Moderate: c-ares security update The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms c-ares-1.13.0-6.el8.aarch64.rpm 8225a0ed737eeda108db25266079fbb6518ee59d078a771cd45a0e3295bd11b3 c-ares-devel-1.13.0-6.el8.aarch64.rpm 4aa2238ad16931ee7a04d41e2e70ad777dac7f56043d3656d1f8b183a4877a02 RLBA-2022:2046 libcomps bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcomps. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libcomps-0.1.18-1.el8.aarch64.rpm 14501e88c053a8ff81112ebd05f7346a9d62e1691758e5a70574747c83a200ed python3-libcomps-0.1.18-1.el8.aarch64.rpm b6762a8e5df23f338919efdb6398e87e21bded199267b547062f24f4ed6a9e76 RLBA-2022:2061 jansson bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jansson. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms jansson-2.14-1.el8.aarch64.rpm 1ec0a962c3663f00d05c8056ba611a88582680453d226ee23f31e55b0316be32 RLBA-2022:2064 python-linux-procfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-linux-procfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-linux-procfs-0.7.0-1.el8.noarch.rpm 4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4 RLBA-2022:2063 firewalld bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms firewalld-0.9.3-13.el8.noarch.rpm 94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8 firewalld-filesystem-0.9.3-13.el8.noarch.rpm 9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0 python3-firewall-0.9.3-13.el8.noarch.rpm c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5 RLBA-2022:2078 xfsprogs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms xfsprogs-5.0.0-10.el8.aarch64.rpm dab31500b020c6b5caf69b5d6b8fdff9637e4cc84ce5a13464c38a12cadc55c4 xfsprogs-devel-5.0.0-10.el8.aarch64.rpm d2a76cb9bde3a18aad91add45c3411e30954ff49475b0046540d952d81ddcd08 RLBA-2022:2079 setools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-setools-4.3.0-3.el8.aarch64.rpm 575c6e7dada7547d94f2d67b16a0e971f3d79a924832a36b93b94b2634c99c61 setools-console-4.3.0-3.el8.aarch64.rpm 713f6e45f5ae611aa0919db766e024be705c5562ff407244ba23cc9b110d5fc6 RLBA-2022:2088 realmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for realmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms realmd-0.16.3-25.el8.aarch64.rpm 67f2c2b4e4b12ed4d23677389b779a5eed53b98b686368333e94ebf923ddea59 RLBA-2022:2089 pcsc-lite bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcsc-lite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms pcsc-lite-1.9.5-1.el8.aarch64.rpm 2c7032d00a96a124b49d19542b0208423ee016fb2e7d3616cc91186a2758fc54 pcsc-lite-doc-1.9.5-1.el8.noarch.rpm 45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1 pcsc-lite-libs-1.9.5-1.el8.aarch64.rpm a7d5bc5f6ea803c1c9a38e28c45ec265a992eab394697ac258281f934ea9a134 RLBA-2022:2091 postfix bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postfix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms postfix-3.5.8-4.el8.aarch64.rpm 51e04123a82e3d672c2bb9f55080be884fbc6e194e40e894f8552e5714697cab RLBA-2022:2095 python-ethtool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-ethtool-0.14-5.el8.aarch64.rpm 13449b4259462ab6b39946398c5e7c6ece93d678a30bd8f77241453506c9ff12 RLBA-2022:2097 cryptsetup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cryptsetup-2.3.7-2.el8.aarch64.rpm 9c95eaff255efbcd678f50783012223b1463ab637468a588d3347198628c6e6b cryptsetup-libs-2.3.7-2.el8.aarch64.rpm ff9d0c274ad6f9332981dda14a07e5021ba81ef81294fc2bd63ae732df477cc3 cryptsetup-reencrypt-2.3.7-2.el8.aarch64.rpm e90306211cd7b047f8c9e7d85631922df7177e1ebfcda24119fce08ec5056261 integritysetup-2.3.7-2.el8.aarch64.rpm ab63dd0d41af2cc8a2f812b143379d0e1784007ab871842276dd225b1516c87f veritysetup-2.3.7-2.el8.aarch64.rpm b6aea7ac20bebeb9d9161416fb14b95bf910768c388d3f88ea0f9c29648955c4 RLBA-2022:2099 sysfsutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysfsutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libsysfs-2.1.0-25.el8.aarch64.rpm 275b70e8969c060ea185e483255bc9ff865d67b48bf0e78780a26e009c282ec9 RLBA-2022:2101 libnftnl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnftnl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libnftnl-1.1.5-5.el8.aarch64.rpm cd85f0f44d1e72c86ce0ba673ed779a479399d5a6d349cec6228d3c82620538c RLBA-2022:2108 man-pages bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for man-pages. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms man-pages-4.15-7.el8.aarch64.rpm 5e36a9344a4b892cd82ae9c27d795797c9395c9ce06eb8a61a318e1217a204a9 RLBA-2022:2114 passwd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for passwd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms passwd-0.80-4.el8.aarch64.rpm 40fa894692aaeecd73edd1dbc1f4ac2defec288d4e2a7a3afdd560b97d9cb124 RLBA-2022:2115 xfsdump bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms xfsdump-3.1.8-4.el8.aarch64.rpm 3c5ce452105fc1b6a5e900b9016b8928ab4d4cfb4c1c5b27df59f52ed3a23df3 RLBA-2022:2116 iotop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iotop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iotop-0.6-17.el8.noarch.rpm d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c RLBA-2022:2117 gpgme bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gpgme-1.13.1-11.el8.aarch64.rpm 4acee00582eef4234d6e22b59f381015e643544abb53d170d4439ae88fbc4996 gpgmepp-1.13.1-11.el8.aarch64.rpm b29d190b61010e024a585abd1816004d52e1395ccbb8ba2f9d87978a5ddeca29 python3-gpg-1.13.1-11.el8.aarch64.rpm 34fabfff5b0bab1a62773792c7535ccaebbe49ebb729bedb34f2f10faac46408 RLBA-2022:2118 texinfo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texinfo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms info-6.5-7.el8.aarch64.rpm f06bb14b1fd53ce2ba9a52520d6cdff9e3029b4e92d284ca8b8dc1d30969954e RLBA-2022:2122 gawk bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gawk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gawk-4.2.1-4.el8.aarch64.rpm e5dee734235635b7181069d5d4ec685baa6dd0ca72b49e55614225400768d8cf RLSA-2022:4991 Important: xz security update XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for xz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms xz-5.2.4-4.el8_6.aarch64.rpm a6e66abf0ec31dc6531ad1c7bc15ae596264c95ec4f630045c74f57c85f87158 xz-devel-5.2.4-4.el8_6.aarch64.rpm 2c915df260a0cf9280625dd99345a5b86f7f050385d1bb881058801fdb625671 xz-libs-5.2.4-4.el8_6.aarch64.rpm 5813ddb231f6b96c4de61e76b8b393b9506d39e490e0b51e54000412b41474f5 RLSA-2022:5095 Important: grub2, mokutil, shim, and shim-unsigned-x64 security update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) * grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695) * grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696) * grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697) * grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734) * grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735) * grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736) * shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for grub2, shim, shim-unsigned-x64, mokutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) * grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695) * grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696) * grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697) * grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734) * grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735) * grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736) * shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms shim-aa64-15.6-1.el8.aarch64.rpm 2622c680a378a673713d42c96c305f63b96edee4be16866ec04e722d26e87d75 RLSA-2022:5311 Moderate: libgcrypt security update The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Security Fix(es): * libgcrypt: ElGamal implementation allows plaintext recovery (CVE-2021-40528) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Security Fix(es): * libgcrypt: ElGamal implementation allows plaintext recovery (CVE-2021-40528) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libgcrypt-1.8.5-7.el8_6.aarch64.rpm a8c17e9299608dbbae8f31c9a2f20b4eff4fb139a676cdbbd4cfd02c56a3ea8f libgcrypt-devel-1.8.5-7.el8_6.aarch64.rpm c3e308322373badd6ea9e6264afdd7abbbf4fbadcfe85a34f8486b0ac2ff79ce RLBA-2022:5322 mtools bug fix and enhancement update Mtools is a collection of utilities for files created in the MS-DOS operating system. Mtools allow you to read, write, and move MS-DOS file system files (normally on MS-DOS floppy disks). Mtools supports Windows95 style long file names, IBM extended density format (OS/2 XDF) disks, and disks formatted in the 2M program. Install Mtools if your scenario requires using MS-DOS disks. Bug Fix(es) and Enhancement(s): * mtools missing glibc-gconv-extra dependency (BZ#2080999) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mtools is a collection of utilities for files created in the MS-DOS operating system. Mtools allow you to read, write, and move MS-DOS file system files (normally on MS-DOS floppy disks). Mtools supports Windows95 style long file names, IBM extended density format (OS/2 XDF) disks, and disks formatted in the 2M program. Install Mtools if your scenario requires using MS-DOS disks. Bug Fix(es) and Enhancement(s): * mtools missing glibc-gconv-extra dependency (BZ#2080999) rocky-linux-8-aarch64-baseos-rpms mtools-4.0.18-15.el8_6.aarch64.rpm d2eae7cbe81115d5c3a0e3c276d1a6ca2c1ea667d3248d734566db2b5f3ccd03 RLSA-2022:5809 Moderate: pcre2 security update The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pcre2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms pcre2-10.32-3.el8_6.aarch64.rpm 199691f32077d934d813c94a40310e6e54770032ded2dddf0cd7002f4b9434ab pcre2-devel-10.32-3.el8_6.aarch64.rpm 322ba90a7f2dd17d6012d8822b92cfcd0f8bb466fc96bbc192d877bca25a56fc pcre2-utf16-10.32-3.el8_6.aarch64.rpm 5f4fc003b5e7bf176ef9e073c394292f78d57d0f22b4f6eb48c269fc0bc7da10 pcre2-utf32-10.32-3.el8_6.aarch64.rpm 1096d125f218c2a1aab00679612e9a0b859b973b0e030578cff89d7c5e63762d RLSA-2022:5813 Moderate: vim security update Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms vim-minimal-8.0.1763-19.el8_6.4.aarch64.rpm 99225e903ab6362d7ab2e4b2677fae22d14e4f04ad5d8febc21c08b74a8bcd3e RLBA-2022:5815 bash bug fix and enhancement update The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux. Bug Fix(es) and Enhancement(s): * Segfault in 'buffered_getchar()' function in bash (BZ#2097659) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux. Bug Fix(es) and Enhancement(s): * Segfault in 'buffered_getchar()' function in bash (BZ#2097659) rocky-linux-8-aarch64-baseos-rpms bash-4.4.20-4.el8_6.aarch64.rpm 2da0398e2a0bbfac7aeeef962f12c8e48be6cf4797a2fe625cbbe27b0cc33c22 bash-doc-4.4.20-4.el8_6.aarch64.rpm f0feb2cd8b50de23659d62069e13600a15622bd86185afbe634c59c4600295ad RLSA-2022:5818 Moderate: openssl security update OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: c_rehash script allows command injection (CVE-2022-1292) * openssl: the c_rehash script allows command injection (CVE-2022-2068) * openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: c_rehash script allows command injection (CVE-2022-1292) * openssl: the c_rehash script allows command injection (CVE-2022-2068) * openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms openssl-1.1.1k-7.el8_6.aarch64.rpm 269acb1e995e9ca1cb690110dac77f6f2261c9316c6f72b75c94461ea2065f89 openssl-devel-1.1.1k-7.el8_6.aarch64.rpm 7d857b7ca18bab2302a7e2f75da0c9ebc6ffd0185f082fd844cf220a439613b5 openssl-libs-1.1.1k-7.el8_6.aarch64.rpm dafeb07a3889c472136a9913fed1689e718e675c4d4eb08dca365118570fbeb9 openssl-perl-1.1.1k-7.el8_6.aarch64.rpm f8fd821099cc8921527e00c0fb1ea81b5d5ae599d26c3159b143bc7dd18b50fb RLBA-2022:6459 ca-certificates bug fix and enhancement update The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Update ca-certificates package in Rocky Linux-8.6.0.Z.MAIN+EUS to CA trust list version (2022) 2.54 from Firefox 102 (bug 2100189) * QuoVadis Root Certification Authority certificate is expired in March. (BZ#2118462) * Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 (BZ#2118463) * ca-certificates need to add support for signing certs for .NET (BZ#2121485) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ca-certificates. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Update ca-certificates package in Rocky Linux-8.6.0.Z.MAIN+EUS to CA trust list version (2022) 2.54 from Firefox 102 (bug 2100189) * QuoVadis Root Certification Authority certificate is expired in March. (BZ#2118462) * Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 (BZ#2118463) * ca-certificates need to add support for signing certs for .NET (BZ#2121485) rocky-linux-8-aarch64-baseos-rpms ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm 096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1 RLSA-2022:6463 Moderate: gnupg2 security update The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gpg: Signature spoofing via status line injection (CVE-2022-34903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnupg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gpg: Signature spoofing via status line injection (CVE-2022-34903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms gnupg2-2.2.20-3.el8_6.aarch64.rpm 2a9c5b3ce0a5397f0e41321983d58e61a2084487c7b4eb0e2adefda45bb591f7 gnupg2-smime-2.2.20-3.el8_6.aarch64.rpm baa39f7719aef967ff00c36d29266de34ca4256c21e0e7f65e92f1f88117a504 RLSA-2022:7089 Important: libksba security update KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libksba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libksba-1.3.5-8.el8_6.aarch64.rpm 8cdf1933b2245ad3191d3179c38d4ed45bf969621ed7bb505b367f107ce4abea RLSA-2022:7105 Moderate: gnutls security update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms gnutls-3.6.16-5.el8_6.aarch64.rpm d9eb93987fc7832053fee67d9086e09fe1a4e765c148a0f9a1e81e594590dc91 RLBA-2022:7107 glib2 bug fix and enhancement update GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es) and Enhancement(s): * Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es) and Enhancement(s): * Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615) rocky-linux-8-aarch64-baseos-rpms glib2-2.56.4-158.el8_6.1.aarch64.rpm 5183edb75014cfb1b3d341b12c19692d7c331bbff17cf767b6d4cb99d92c0830 glib2-devel-2.56.4-158.el8_6.1.aarch64.rpm ea8ece579861a004a9d3ef7edcc83e33b242d1ea666c30f8ee0c481f2f87e8bf glib2-fam-2.56.4-158.el8_6.1.aarch64.rpm 83f3317938248342e2ef36c029f0d1b9e9f52b86c8c645d5b38b95c4c5fcaf88 glib2-tests-2.56.4-158.el8_6.1.aarch64.rpm 0e82c10313b40160ec9d95e8b1ce9f3570de15fb7c8ad7d377947c1c8dd0b9bd RLSA-2022:7108 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms sqlite-3.26.0-16.el8_6.aarch64.rpm b34d9a706cd072df44bb711fe69e7d2ceab23c8034210ab1844fe214b26f7e35 sqlite-devel-3.26.0-16.el8_6.aarch64.rpm 875a9eb15e1f86210ce55934b3c4ef79d08ee1cae7b00f0569f32ac82f4e5907 sqlite-doc-3.26.0-16.el8_6.noarch.rpm c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d sqlite-libs-3.26.0-16.el8_6.aarch64.rpm d3fa6ff233fd4eeef3f4ff824726c8142ea4d1ef0b46512d5e62ce2e9f6b3d08 RLBA-2022:7115 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) rocky-linux-8-aarch64-baseos-rpms python3-rpm-4.14.3-24.el8_7.aarch64.rpm c9927c97d69913572bb7ff3a695c329ba023a92dc37eec864cee2b188025f7f9 rpm-4.14.3-24.el8_7.aarch64.rpm 0d0117a179a20abc617a4a47473f757ab55696a4d89413718dc65c0b1c0d6fab rpm-apidocs-4.14.3-24.el8_7.noarch.rpm a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b rpm-build-libs-4.14.3-24.el8_7.aarch64.rpm b5c2b41fb6f91def661b1684cd142586a634b89fd7a007cd66206e170eecd9fe rpm-cron-4.14.3-24.el8_7.noarch.rpm b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f rpm-devel-4.14.3-24.el8_7.aarch64.rpm 6cdd4b81da7a942c9421e6294a831d2ff76679b1fc914be7c1e81fefb22fdd3d rpm-libs-4.14.3-24.el8_7.aarch64.rpm 4e6f21d79a5363e24486e75cd7bdaca1b280ac3dfc67ad53eb4e518e49b5c274 rpm-plugin-ima-4.14.3-24.el8_7.aarch64.rpm 7cee4cfd57f17ebdcf01ea3575d1cdbd796978154f39a62c399865ea062e63f1 rpm-plugin-prioreset-4.14.3-24.el8_7.aarch64.rpm deb2fd79b798f3de854fe81a6e7229db694a8d58b671a91ba5aefa2cc583d209 rpm-plugin-selinux-4.14.3-24.el8_7.aarch64.rpm 42970eaedf7385ec475ba67126ab37c2579d3e03525c8ed4a42ed37b20623f89 rpm-plugin-syslog-4.14.3-24.el8_7.aarch64.rpm 9e254538db70708897180623b4a6631b03d4b10eabb4097378527215682f1e2d rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.aarch64.rpm 22cfd5523cab528991fabb2c5d32179288498d05e600b9e9e7060fb8f232ccd4 rpm-sign-4.14.3-24.el8_7.aarch64.rpm 3395b5e2eeac8bec0930f4ce95fbe163923c768545da2b829e8f868744a806b4 RLBA-2022:7116 libsemanage bug fix and enhancement update The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es) and Enhancement(s): * libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es) and Enhancement(s): * libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139) rocky-linux-8-aarch64-baseos-rpms libsemanage-2.9-9.el8.aarch64.rpm 42c73e3fd94d62928882f6defbb0d78759c80f54971b161c2725ce1b3af61fc9 python3-libsemanage-2.9-9.el8.aarch64.rpm 5cd9a3d2868464a09b6d4c8c8d546ecaf628192c8207aa72b53e7eacf6b17f2d RLBA-2022:7404 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-8-aarch64-baseos-rpms tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 RLBA-2022:7681 audit bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for audit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms audispd-plugins-3.0.7-4.el8.aarch64.rpm f8201e2ecad2fc6a9d0615abb90bb306c96e33f3922da3d69fb723ec0ffac9f7 audispd-plugins-zos-3.0.7-4.el8.aarch64.rpm dd516f5c2063f92f129a4efd46b0260fe8b81378a42beaf1e73029bac6b9f649 audit-3.0.7-4.el8.aarch64.rpm ecf2595e8fbfcc6bd677c20e44a3641f79eda4006fba1ba145b49f54ab318e3f audit-libs-3.0.7-4.el8.aarch64.rpm b74f36177468b6d2ab83388e78d498b6e2691ac11bc85e28d573e80a6a2435be audit-libs-devel-3.0.7-4.el8.aarch64.rpm 370595411de87116dbc3569eda1f3a90d49216f1e54a44222a03df6ca9ff46ea python3-audit-3.0.7-4.el8.aarch64.rpm 850fa7448c71e67e4ad7d6b3405dc71ae39c4170aef06abff89eacfcd393adb3 RLBA-2022:7682 babeltrace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for babeltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libbabeltrace-1.5.4-4.el8.aarch64.rpm bf1b471001d16651e9c3fbbde98b9e6f032d6a132535f604c7afd049ece935bf RLSA-2022:7683 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938) * net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * Spectre-BHB (CVE-2022-23960) * Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * memory leak in drivers/hid/hid-elo.c (CVE-2022-27950) * double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938) * net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * Spectre-BHB (CVE-2022-23960) * Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * memory leak in drivers/hid/hid-elo.c (CVE-2022-27950) * double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-425.3.1.el8.aarch64.rpm 6942240e737414cb101e4ea989b2205bab145d8a8fafd7c929a92463f71746b3 kernel-4.18.0-425.3.1.el8.aarch64.rpm ef94f46e20952c5d5a81697fde82c8a23fa56aa74a7561cfafdfeabf910dc89e kernel-abi-stablelists-4.18.0-425.3.1.el8.noarch.rpm 7502d39b6c6a1298db08b7e84273413b6cbe84299fd31cb2266e8d6711947bd9 kernel-core-4.18.0-425.3.1.el8.aarch64.rpm b9e085ca90392f23347ebab787d1567271707756bd1b5e51330233104e646c5c kernel-cross-headers-4.18.0-425.3.1.el8.aarch64.rpm 39fb365895f5ac52254fb7f4a3204e390eb4c03379b4ca27b8c9e40220e6b012 kernel-debug-4.18.0-425.3.1.el8.aarch64.rpm 211333bf226a9f1b5646a4703107d8064e8fde85d352f3690738f2c70c4d1ff1 kernel-debug-core-4.18.0-425.3.1.el8.aarch64.rpm c597569d27490f422e006d501d287db1c3561b67555ccb599a4b4d3618f87352 kernel-debug-devel-4.18.0-425.3.1.el8.aarch64.rpm af7740829b30eb81eaf3647250a3274c59c850911d32248f66f22c1467dbcf44 kernel-debuginfo-common-aarch64-4.18.0-425.3.1.el8.aarch64.rpm 4930df4f7633d3ad976e9156e3951464e553cbec717feb54270606582d05cda5 kernel-debug-modules-4.18.0-425.3.1.el8.aarch64.rpm 7cd377c49c52e658a64c55848da558e169034acb57a922a455781039d10110ab kernel-debug-modules-extra-4.18.0-425.3.1.el8.aarch64.rpm 58087146132aa05199503bb268f578cd1095d1e4968f476ec6125cda9b7509f1 kernel-devel-4.18.0-425.3.1.el8.aarch64.rpm 2a5bba03c87111e68ccdcdfef04cf1a7b891648aa7eec7bcf2e96eccc498fc82 kernel-doc-4.18.0-425.3.1.el8.noarch.rpm dfd007ce8dc51176e8566453017d2319a2430dfea645a11ecddbfbf2d299aea0 kernel-headers-4.18.0-425.3.1.el8.aarch64.rpm 44bab6896932c62b8898bf9f48506cec2df89e158b911b6bd0401356822f5751 kernel-modules-4.18.0-425.3.1.el8.aarch64.rpm 647d9db26d8c453615723d49df4d4f0e966513cdaea82c9ba6704e4e2e42777a kernel-modules-extra-4.18.0-425.3.1.el8.aarch64.rpm 374fcda68c0740221b462e133a7775444cc4339cc7b2b7b92a785d56669eea1c kernel-tools-4.18.0-425.3.1.el8.aarch64.rpm 7adbe65e0e0069e933a454a67892895f9c9aa9e9955fb46dde82475e42e4211b kernel-tools-libs-4.18.0-425.3.1.el8.aarch64.rpm 1e1a635dc340f78e6a7a34bd38ae3d3f7800174ad3b505ddb286da1ebde2e941 perf-4.18.0-425.3.1.el8.aarch64.rpm 3092f8426c5b5eff8509e9a0b74fcf49271dd8a0397ae342c2038d65abe70a47 python3-perf-4.18.0-425.3.1.el8.aarch64.rpm 921d5443b2d96b7443f36040e5c6bca983fb1459f181fbe39eec4b8fbf65a09d RLBA-2022:7684 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms glibc-2.28-211.el8.aarch64.rpm af400a51bae252291073278f1a25244d08c4b14be24e5c7e6086cbc7e56d7469 glibc-all-langpacks-2.28-211.el8.aarch64.rpm 2e21c17e7a748b6f708c4409d1dd96c9014d964fa4d8255f26e5cbb0b0a5cc7e glibc-common-2.28-211.el8.aarch64.rpm 06e12940e38d6167e9107cc920c983bcf743533b6a68bc88eba67b479e2db673 glibc-devel-2.28-211.el8.aarch64.rpm 2c4ca4212a8504c15cbf89b747a3b7ce0daf508a8bf8e7decfd336827622e6fc glibc-doc-2.28-211.el8.noarch.rpm 651c1bcdd3292c68b98e3f102ea239fa39a639f17539d011589a2ca80621ddbf glibc-gconv-extra-2.28-211.el8.aarch64.rpm 9c1965f34c347d2f373a63d1d7758a05064643522c9ceb605aff208a3eeb190c glibc-headers-2.28-211.el8.aarch64.rpm eeda97ad0e8a742b62332b3fcfbb606913a95c483ab4274c054c2bbf5b0818b2 glibc-langpack-aa-2.28-211.el8.aarch64.rpm bac0b278bd0fdacf679241a84312373cd5b2285b3e9fdb516e54beb98e7c4a76 glibc-langpack-af-2.28-211.el8.aarch64.rpm d7ca622ceb122843762c584cf7898f90bda85ca4caa5804f852573d6feca89f3 glibc-langpack-agr-2.28-211.el8.aarch64.rpm 7bd424faa98f3ec6708b566e9eb5ef0bd000793e5916cb86d8e2bfe035214c84 glibc-langpack-ak-2.28-211.el8.aarch64.rpm 4587fb6e40386c08b69a99ea04221b0850820483f25f3085cf27f4d3ad12bf22 glibc-langpack-am-2.28-211.el8.aarch64.rpm 434f26d1d8e296a6f5c23ee9100a9b8ee8c8d7b5dda8227522442c8007e787cd glibc-langpack-an-2.28-211.el8.aarch64.rpm 857ab033ba2fa411449abb753d26446f529ca2700ba1d8d4dfafe3522352b5bc glibc-langpack-anp-2.28-211.el8.aarch64.rpm f9e0897ce282e072a060b02999c143ebe85e53bbf1303385b2632f1521735430 glibc-langpack-ar-2.28-211.el8.aarch64.rpm daf88a10b34a23c0cdc6ce267ee86e2e12d227cc5ee4ac5c9db66611022b14c6 glibc-langpack-as-2.28-211.el8.aarch64.rpm a935bea1f6f0b328581321003882090154c6b790b14df22196b05243de3624c4 glibc-langpack-ast-2.28-211.el8.aarch64.rpm 1929d52e625ca5db7bc436c1c952001c2757e70ba082ad33747ee0f9f379f459 glibc-langpack-ayc-2.28-211.el8.aarch64.rpm 61141aff1e3a260fc8d9d7d56f775efc37301f96537fff4a8dd2bd7c5946d3ae glibc-langpack-az-2.28-211.el8.aarch64.rpm 0e446e6e6a2feb26c019168126f7a23e034b4e0b440889f75658f6ac9fff3ff3 glibc-langpack-be-2.28-211.el8.aarch64.rpm 7da46105101c2bd7e89b870ede28a4534f4f0c8f2786236b3956dc1cdda2f243 glibc-langpack-bem-2.28-211.el8.aarch64.rpm cb3af915934d4dc40b65a4d2c305391d1228e319d2f1acd278934d7f4c431be0 glibc-langpack-ber-2.28-211.el8.aarch64.rpm 488d5d615da4a7f29b0a8d985b7c5bba3d06337ba804c3d96dbe11e3010b9905 glibc-langpack-bg-2.28-211.el8.aarch64.rpm 5ea1ace086088f90bc9c90fffd6b68cd0547ca5c63958dfa53963a20e9d50b50 glibc-langpack-bhb-2.28-211.el8.aarch64.rpm d46e571eb1663e64275c86df436a3dbcf41df5d43dcfb315535b69e4cc3342cc glibc-langpack-bho-2.28-211.el8.aarch64.rpm e50514e45dfe8b668993d680455fa504de14b478b6c50ae4c5d1bea07b1bffe0 glibc-langpack-bi-2.28-211.el8.aarch64.rpm e8f9a595a7f623b5a70872cc562e16ae8cbbb2b3e83ae7801567af4b486d3590 glibc-langpack-bn-2.28-211.el8.aarch64.rpm 22523a73438c5bcad8c9099023ebda8c93e70576750c9467c9bebdc887e3aa46 glibc-langpack-bo-2.28-211.el8.aarch64.rpm 0e7e64b560310b980c8d6337d2c076075fc8da3118ddc76780718a4a55f68fda glibc-langpack-br-2.28-211.el8.aarch64.rpm e5943426fe3cd4f44b1d4cf1d3e82e6dfe77e3e43c615c3a47271c4f6d535974 glibc-langpack-brx-2.28-211.el8.aarch64.rpm 259bd72aabedcaf608a2eba4fada49d6ef30c3a3eca0c03df9a68d160870910f glibc-langpack-bs-2.28-211.el8.aarch64.rpm 7292d8a1b4be8d1334d8a6253dd8d8f8f2fef4ab6b34951c5102f39ec156415c glibc-langpack-byn-2.28-211.el8.aarch64.rpm bec434e0d25a638d986edf9c768809cdf0166d01b0858a5ab853f66d5d367b44 glibc-langpack-ca-2.28-211.el8.aarch64.rpm 14b4364d921b746518935d8275ad4bbd6505b12f631dbd8e29c83dd2367f7c66 glibc-langpack-ce-2.28-211.el8.aarch64.rpm 9666955354a55f483ee58b9caaf0de4a5f22e1cdc0659b67d3964d4aedc832fe glibc-langpack-chr-2.28-211.el8.aarch64.rpm b1effc771a4f08440da172c9ec35d2278b4b1a2c93b2ccbf0a5d22a274ae6d9d glibc-langpack-cmn-2.28-211.el8.aarch64.rpm f33554c9daa2279cfa11fc965230236fb5a3d0c2a8d7d510988fef8fa42ea6b5 glibc-langpack-crh-2.28-211.el8.aarch64.rpm a06616c8b23d563dd70b24a743eb33ce22c410d1ceb693d2ecc1d4aca7a0ece8 glibc-langpack-cs-2.28-211.el8.aarch64.rpm a14ddcffe1389178b197184d5c8105553505b2ead42f35ce1cf9cb5e769b41e9 glibc-langpack-csb-2.28-211.el8.aarch64.rpm fcf6508dcf131ff04eca7f035202d1aefadad194d8f25f047743ce29bd784d17 glibc-langpack-cv-2.28-211.el8.aarch64.rpm 4bdccbf7984935de819415c31c51fc4927e3773310e0864dfa6f7891dd63402d glibc-langpack-cy-2.28-211.el8.aarch64.rpm b2d31442787fb3f7233bb86732346e7adccf57f00152ad1ab08d42e5f4b00a3c glibc-langpack-da-2.28-211.el8.aarch64.rpm cba23baabeec57c2476f2bfdca0a3e69ea105c6490d130a908e1349bfd418f4d glibc-langpack-de-2.28-211.el8.aarch64.rpm d63a9f3aa1476e1345b231e8808274c29c3aa7c5e7cf0c82500004796143d13c glibc-langpack-doi-2.28-211.el8.aarch64.rpm c15da2fcb48ed2a5c02060ad70c5e89a015a2a28de277ca1c2af1e81eb0e1c3c glibc-langpack-dsb-2.28-211.el8.aarch64.rpm aef01e9ae2b15f11a925732dc29819c69441bc99ee3486461d2edebbfe9f94e6 glibc-langpack-dv-2.28-211.el8.aarch64.rpm e6d4f6f0ebf99d7d6f912c8cb77dbc6eb00174b4df428790730561d6a7418ec2 glibc-langpack-dz-2.28-211.el8.aarch64.rpm d3a076c2245075aa7cdf1e541c0d0da4db52cdd4f38afe73624fe7d9ab21557c glibc-langpack-el-2.28-211.el8.aarch64.rpm 6ceb0ab13d0164bc085b834679fdc1457d6f4b89ab0e5eaa6e036ef7b42a08e2 glibc-langpack-en-2.28-211.el8.aarch64.rpm 940ea09bc71c9e1f8868b3c90e6438ebbd501729ea54c32cae1911edb90ffcef glibc-langpack-eo-2.28-211.el8.aarch64.rpm 5bb62573fd759654e77130404e2f27e074b75430d2490cf536af5d3fd33cc057 glibc-langpack-es-2.28-211.el8.aarch64.rpm ee448ac7f19ac1fae1575774c090840ed861cc254a3ff8204d16e8c8631cdc27 glibc-langpack-et-2.28-211.el8.aarch64.rpm b340066e8e0fe63913e4dba943f73912623f49355357779200b8e57dd72ed093 glibc-langpack-eu-2.28-211.el8.aarch64.rpm 79f7070ef415046946898743a2c148c64f947cc8b4e8bf9c1a4787425cbc903b glibc-langpack-fa-2.28-211.el8.aarch64.rpm 2dc1c190b0dbbfe3f05655a64d7d4156b7b8e7fa556d217e4be7da5055768376 glibc-langpack-ff-2.28-211.el8.aarch64.rpm 1e60869e6d1940da4c443d3b97ef6a8c690165a6dee29e4b741b2fe7388171a1 glibc-langpack-fi-2.28-211.el8.aarch64.rpm a76963894dcbb97ed4ea9e035334274a163276d177b009f8e80c787b89d8319e glibc-langpack-fil-2.28-211.el8.aarch64.rpm d470b78f9065e7a5676b57ca2354431227414ea03896b860f239d2680e0daf3e glibc-langpack-fo-2.28-211.el8.aarch64.rpm d4ef27c149d852ad5d2de86ed98159a62204b9cd1a9046fa322f4b5bfd42b876 glibc-langpack-fr-2.28-211.el8.aarch64.rpm 85d7cf9a293cfc00e3b6bb912b372c0ac2a4fa26bea586d0dcad7f6140326572 glibc-langpack-fur-2.28-211.el8.aarch64.rpm 4c1fcd865623b7cc7145d71f08833bcf721b9a76196c529b5fb70df4b1471718 glibc-langpack-fy-2.28-211.el8.aarch64.rpm 0ec6737a8b97b333c83c10c0b151b79b8ec0e1a5e635329e7cec1d3aae8ddd5b glibc-langpack-ga-2.28-211.el8.aarch64.rpm 031d3880aef6248dc904599acf15c5a9c8cf8fe729913f8ec38e165aba8b152c glibc-langpack-gd-2.28-211.el8.aarch64.rpm 15c2f9cad5fed95091bed242b2c4dcf78e0c91423885a7753a2dfe34cf173055 glibc-langpack-gez-2.28-211.el8.aarch64.rpm df2a0d4cc35b50db4496cf44322c9123eb5550730189f77e1d6681f5bb021c9c glibc-langpack-gl-2.28-211.el8.aarch64.rpm 8a379537f10ca00ac6560f37efe0843510c955fbbc0efa32930537717af9584e glibc-langpack-gu-2.28-211.el8.aarch64.rpm 0f3fe7e7f954c2ea8e6feee403250407b8b312cee9e78e3dd126dff7446b1e0a glibc-langpack-gv-2.28-211.el8.aarch64.rpm 893e99745e7225dccabbc4ae16788e0b100da4c01eee0f5b609392f2f819b599 glibc-langpack-ha-2.28-211.el8.aarch64.rpm 437855a05529977f55b6671f272b22160e8ade59564bc9e80bf973c308685a3d glibc-langpack-hak-2.28-211.el8.aarch64.rpm bcde1d39458424d0bef0d07a583347efcd4b0e026b365807f8647f33e1feef1a glibc-langpack-he-2.28-211.el8.aarch64.rpm c6d981e2c0e49923ac8e4224b5e7e2011a0acb4b70f887deadf1ca6dd18e60dc glibc-langpack-hi-2.28-211.el8.aarch64.rpm 5c38dd83a227acffa0f941a05e568ba38b446a2720ef0bbadc01cbf39909f269 glibc-langpack-hif-2.28-211.el8.aarch64.rpm c4d195aaf8bdac693ba2370994ff0d62ecffa0ac1510f103ce55d05e0ae62e5c glibc-langpack-hne-2.28-211.el8.aarch64.rpm fb083a139db4f763416f9abbdeb798888ff3e7cd7438e618b0b9d906f602607b glibc-langpack-hr-2.28-211.el8.aarch64.rpm d34639a2aa4efd40fb11f1f503eb667e140dedfed62999af07960cbe0ebc04fb glibc-langpack-hsb-2.28-211.el8.aarch64.rpm 05e6ac39820be6026e89afef8d10899ca89883367ae6a12610d7a8a2251c3782 glibc-langpack-ht-2.28-211.el8.aarch64.rpm 8b9e873d977ba85279998b222e030c70ed879c4bd0bbc957eb1757500d9f6684 glibc-langpack-hu-2.28-211.el8.aarch64.rpm e3dfcc4a2090ed70929ffdc9b41748ffd0f9cf9c2e1dfe5364b04c05d88f3b00 glibc-langpack-hy-2.28-211.el8.aarch64.rpm be764d49079756a3142d6c083e283e0488d77b24ea369c23711d515b0607d1e7 glibc-langpack-ia-2.28-211.el8.aarch64.rpm 8700362e97cdbc28fb4245d09f6268ec5693dce85682cfb1fafb4c66d2529d9c glibc-langpack-id-2.28-211.el8.aarch64.rpm af2c3262aadd578b4b5ed4b2e1532ccddd16779623ebba6b13efb4abbfd305bd glibc-langpack-ig-2.28-211.el8.aarch64.rpm 00e51e7d3565e12428ba2fa9728e62c43edc35c17999f24e0fd13c32c6f158dd glibc-langpack-ik-2.28-211.el8.aarch64.rpm 500acdca517ca37f45268e1e785af749f99070c5b09081e76ed5ffe265c7d33c glibc-langpack-is-2.28-211.el8.aarch64.rpm 7ce4e2be2c2ee60c3eb5aedc70cdd76572b8cf5ec14f2274d20e84fadacf075d glibc-langpack-it-2.28-211.el8.aarch64.rpm b1e528a83891d0cb14afb20c6a853fed8dbc6a00b3be6d1f4ccd33ee61406502 glibc-langpack-iu-2.28-211.el8.aarch64.rpm 1ded143fb538220ada8d75a88b23719437b54a4d9bde6646e72a3708d5895342 glibc-langpack-ja-2.28-211.el8.aarch64.rpm 002087d4c5bb815a5f12ed8a8c3fdeec975ff3450e1ceb16f3042ac4fa31d7d3 glibc-langpack-ka-2.28-211.el8.aarch64.rpm 94f7d5f8989de04aacb84b3a881650891762a68b1ea5c7c224de85443d6e0bc9 glibc-langpack-kab-2.28-211.el8.aarch64.rpm 22bbe790971a1cd4bc8dce89a75956631457ecbd2bb7b3520c0abc5f80bc8e2e glibc-langpack-kk-2.28-211.el8.aarch64.rpm 3e022a529cd9fb1a5b646935a85c06444dcfa9bab6fc4c3ca00bc4141b0943c4 glibc-langpack-kl-2.28-211.el8.aarch64.rpm d26231ac217b9e6d452ed7bc72ca0a0eb7aac42aa2e9785c5dd47a3e2d44c923 glibc-langpack-km-2.28-211.el8.aarch64.rpm e19d355edb793964b3911065c6e54b10e91618deb8da077fa8ec2e93f147eea0 glibc-langpack-kn-2.28-211.el8.aarch64.rpm fb504b3a4da913d8d562826243c87d15b32d9e601283f2d6a4b6985ebc3c3db3 glibc-langpack-ko-2.28-211.el8.aarch64.rpm 8365137d4a19d246241904eeca1f04ef2cceb13f241c5ea418f3d20cfe77a94c glibc-langpack-kok-2.28-211.el8.aarch64.rpm 71864c34e4bec950efe3266726802f44dbe41a052d62a444b496904ca19cb509 glibc-langpack-ks-2.28-211.el8.aarch64.rpm cea66a7ed46cbddd5129cdf745a522c8fdf274f9450e3bac8f88a1acbc31cac1 glibc-langpack-ku-2.28-211.el8.aarch64.rpm fd46de1426eb5a88c50c56ed72bc88c6fcaba2b127853769a54109093c7651c3 glibc-langpack-kw-2.28-211.el8.aarch64.rpm e4b213af949639a8956477f92070d938961ad82dc099592ca0c9ab97ae5f7f65 glibc-langpack-ky-2.28-211.el8.aarch64.rpm 96aa595109365b37e3748038aabae9794f4f7efb4732a9cf14e78efb06ab89be glibc-langpack-lb-2.28-211.el8.aarch64.rpm 3a3b28108e42a5aa416cc7b1e195eefce725d07ca27bd47238ccc24d098554f9 glibc-langpack-lg-2.28-211.el8.aarch64.rpm 38d39e3189fedf133cbaa69c3e324422221e7677d275d6f47f9e9df48ea48db1 glibc-langpack-li-2.28-211.el8.aarch64.rpm fb50f56f1cc1c681a8c92dd4487f2bbbb157a97f2d728407c2e7cbdebd44dea4 glibc-langpack-lij-2.28-211.el8.aarch64.rpm 86217a179a57a786f361ad2374a7a69eb195028c0475b4823c65b6616bdf1298 glibc-langpack-ln-2.28-211.el8.aarch64.rpm d5dfe59c37e723f09589a0568a1aa67e46e845ab9dbf46140952b063ad2744d1 glibc-langpack-lo-2.28-211.el8.aarch64.rpm 8c59defe4e6457f6fea8b7877eff4d3007ff117450b09de6338c0345bb8dc5ee glibc-langpack-lt-2.28-211.el8.aarch64.rpm a63689fe130c62d9174474fdca5c7611d41ff38ed02e343ea24848e7c7838e4f glibc-langpack-lv-2.28-211.el8.aarch64.rpm 1caf8b7d271a91a954607b45de9a01450c22e39861c489fe3a3cf8f9396a8cc3 glibc-langpack-lzh-2.28-211.el8.aarch64.rpm 3016e9ace9bec727766243cda2977a94c30e2f13d0bb38de41f6abaa79c9e493 glibc-langpack-mag-2.28-211.el8.aarch64.rpm 9cc0a1f7a3ca6853ca875f79d9b0ba0ce95b1fed2e6311874689f9dda3cf398f glibc-langpack-mai-2.28-211.el8.aarch64.rpm 447c44c4e88031d00a259383882465930402f5e1f0f38ced1a649d65a9471eb2 glibc-langpack-mfe-2.28-211.el8.aarch64.rpm 65c49a79545761fd8f287356f0bd372dfa6f400567d38d89de8c74abd859526f glibc-langpack-mg-2.28-211.el8.aarch64.rpm 0d22b9a80a5af7c36b55966b6b935bc4b21e742cc5f9edc14a655b27316ee459 glibc-langpack-mhr-2.28-211.el8.aarch64.rpm 0b5edf7e73560c22a0649121634c3cc8e8359469926e66ad622d91414c959c53 glibc-langpack-mi-2.28-211.el8.aarch64.rpm 245c003ba111a5ce64d62870d11dde439291f95acd9c55a5bd57cf3dc6cb0a08 glibc-langpack-miq-2.28-211.el8.aarch64.rpm c978d6c5a69718e025238c41d48e2b42dc547b482e4cc3cf1cfc8ffa901e2b1b glibc-langpack-mjw-2.28-211.el8.aarch64.rpm 3a945833218c9c1a72fccf630a6ba29d4a82c103546a32cc4d2993eed0b86713 glibc-langpack-mk-2.28-211.el8.aarch64.rpm 39d92561e8db8631e324e1a544531a4c1faa295737c27d4b6e229eb830030caf glibc-langpack-ml-2.28-211.el8.aarch64.rpm 697623fc8e6a6eabe27a213f84b9c73a997d440b02dd77da65d3b70af8c1b472 glibc-langpack-mn-2.28-211.el8.aarch64.rpm fe5c5f73a79ace27fc23e0e499c94e07319b0580565ea785a5f7ca51f426374c glibc-langpack-mni-2.28-211.el8.aarch64.rpm 46a70bd7b215e2face03d672b978afa23a730ff14db3f22f7b4f07ae0e81478b glibc-langpack-mr-2.28-211.el8.aarch64.rpm 4aa743e510bc36deffc0e455e439fd870ca654080e8e5e5f8296bdb9fcc69590 glibc-langpack-ms-2.28-211.el8.aarch64.rpm 53f3b1afd131e85e91e7ab0f6f48503333249d05d0159fe7d25c0f53cf234f1c glibc-langpack-mt-2.28-211.el8.aarch64.rpm c434b0c4632380d007aa03050bdf79937ff42361495c703bda809622dfdf4f9e glibc-langpack-my-2.28-211.el8.aarch64.rpm 3c43d7698bbb312c4ef9a69970357063fe139d1cb988b188da73a7b001156206 glibc-langpack-nan-2.28-211.el8.aarch64.rpm 0af068a9612b79a6db71006cb7b5019bff34c9b629503700468aecc5b09187f8 glibc-langpack-nb-2.28-211.el8.aarch64.rpm 1be29ec5f71cd330bd2008397f9344a963cb8d5700b13787ec9d14c157a5da46 glibc-langpack-nds-2.28-211.el8.aarch64.rpm c22529dbbeff97fe382ecd8bfe4c24101644a9dfcf8cf297017e4ca499006367 glibc-langpack-ne-2.28-211.el8.aarch64.rpm 755872c0005adad08caa402a2eb3a041c4cafb27f3806ebed542fe269afc1b00 glibc-langpack-nhn-2.28-211.el8.aarch64.rpm 26beea1ea27041689a8529ad215b92ba254c4e8ef66f75b146af06d4e11fd06c glibc-langpack-niu-2.28-211.el8.aarch64.rpm 54d8fb934c7b28460ab47fb02afa6a2b45c4f22172ea9287158007ebb6369768 glibc-langpack-nl-2.28-211.el8.aarch64.rpm 4820a957d42df23b8d6c23ef57b451570e3adc8db97a342cd7ed54e2fd2b433f glibc-langpack-nn-2.28-211.el8.aarch64.rpm 8d3294879d3c2d96036dad763b2b3af6362616ac6f806e8790eef5e3d87351bb glibc-langpack-nr-2.28-211.el8.aarch64.rpm 46dbda9420861f969e1d419894d84ba700efa2e1a7eadf89db371dcd56127414 glibc-langpack-nso-2.28-211.el8.aarch64.rpm ca88ebaf2b152858482d4bedc3dfb7d14fdb5e9aa217380da779dc6e463b5c4b glibc-langpack-oc-2.28-211.el8.aarch64.rpm 133386bffa21001b8015128b01a7b27b60b669ccf10fdc5c207b264c268fbeca glibc-langpack-om-2.28-211.el8.aarch64.rpm f5e2445f7c6285d59bb216b41bc6b199dbbcf5753b3c5ce2716ca86015f5b553 glibc-langpack-or-2.28-211.el8.aarch64.rpm 6f7ac50390780012ebc7e8317831879528d2b2122c66d08ce0cc138f63e2cdd0 glibc-langpack-os-2.28-211.el8.aarch64.rpm 1f0e520a461082a7f817b82ddd951b5bca7571ea40f36e67560625587eab9d66 glibc-langpack-pa-2.28-211.el8.aarch64.rpm 09405e2f7aabb39c7bda6bdf9417b04fd9367c64f5cbda0ceb9b5c163c9f0c98 glibc-langpack-pap-2.28-211.el8.aarch64.rpm 5b201907a0e5a39b89b14f2010c120470c61d35a3e938ebaefc0fdeebfc70ddd glibc-langpack-pl-2.28-211.el8.aarch64.rpm 22c79b6a6a110a9c3bd9d74d508ba70394ca99be0b3afd495ef5f41da87dd291 glibc-langpack-ps-2.28-211.el8.aarch64.rpm d3f2226c5a75e66a0333b9dffa749748e082720c5122f7195ad2680de150c9d0 glibc-langpack-pt-2.28-211.el8.aarch64.rpm c617e9d20ceb45d68dd69c35460d472ea695632693c3a7e9b53e3b15af9c7832 glibc-langpack-quz-2.28-211.el8.aarch64.rpm d2d283fc20dce2e295e3d0e4dcdce442e81dc3d3f6ded6ee8dd2947444ae4685 glibc-langpack-raj-2.28-211.el8.aarch64.rpm 069f7828ba871d1b99617e25d89c61d20fc29b7117cc594708ce2d3638f6aa93 glibc-langpack-ro-2.28-211.el8.aarch64.rpm db7f2f97100e6a0765b0b9c5186a5a9bd1af18de2861bb3ebc8115d3f0252d2e glibc-langpack-ru-2.28-211.el8.aarch64.rpm 4dbcf18af09fd2981ebe9c3602b953ea345802f332c115899dcd7c934c3e5a2b glibc-langpack-rw-2.28-211.el8.aarch64.rpm 8e7658083c4d38a0c80a319ecbce006b19ed9a120e52b4391c5a0695c3f4d81b glibc-langpack-sa-2.28-211.el8.aarch64.rpm b51605d4589bb3a123e5494ae1dcca93ceea130c4e0121a15b0482fa1aec62ef glibc-langpack-sah-2.28-211.el8.aarch64.rpm ff1e5bf142f0814c07180cefc99dace86e58a0d07800b4455dd1a55d14e983c9 glibc-langpack-sat-2.28-211.el8.aarch64.rpm cc38f9c4d0a4552ceb863d2a50c83bfaba4ef25c1ebe42a16e605fd74681b385 glibc-langpack-sc-2.28-211.el8.aarch64.rpm 9fa11960a9916ee9e1cae6bde0d76de0bd7e400e92f9cda6740129a23c539892 glibc-langpack-sd-2.28-211.el8.aarch64.rpm 6f5676d6b2d5e028ac3298284726959ba736fe9eba94dfd4ac6124faf1ddc028 glibc-langpack-se-2.28-211.el8.aarch64.rpm d688e69fc79fa49b3d0b1c3d8c4f2471ef245de0bb1a49e886ff12d3765361b6 glibc-langpack-sgs-2.28-211.el8.aarch64.rpm 783395e137e3b01322c2d33d8d066cf7704bbd9c5d32703a1bda35d68564037e glibc-langpack-shn-2.28-211.el8.aarch64.rpm 46f62ce9cf06e09b644bc5bfaf32ef19ae9784514a15e2b50d0570a520010c40 glibc-langpack-shs-2.28-211.el8.aarch64.rpm 56ef08d3616361effffb1e607f45ed4b00c518be8777d5bb108184c17715e2e1 glibc-langpack-si-2.28-211.el8.aarch64.rpm 64d811ee9e20fa53ecbf1775885d03cd59124e33923f4c2b8ccff70052cbeb92 glibc-langpack-sid-2.28-211.el8.aarch64.rpm 54c94743d7520a813cda6d91cb31d493844d45432d260628837e731493d24e02 glibc-langpack-sk-2.28-211.el8.aarch64.rpm 4a6fa32e9ada3392fece068cf9887d9136c0a0d2165111ae5661d85cc16b2ff2 glibc-langpack-sl-2.28-211.el8.aarch64.rpm dc20af3c7f7b67c5b6cce010503178b87d4f2e036c140c64e7d2e85cad44ada4 glibc-langpack-sm-2.28-211.el8.aarch64.rpm dd2702296213ab2aa4633e09ef7189de72fb10c94c630c2841b6456c08a2033c glibc-langpack-so-2.28-211.el8.aarch64.rpm a49583fd86db2bd77469e0899581a144382cff940072d818040dbe871ee180aa glibc-langpack-sq-2.28-211.el8.aarch64.rpm 9ed363792c810b659631c6861de46c6f38884e824c95588c8b15528230c7d030 glibc-langpack-sr-2.28-211.el8.aarch64.rpm 5b91e27fc2472f7117e8212084247216bff71fb860d11c5276188efc451f95c2 glibc-langpack-ss-2.28-211.el8.aarch64.rpm a33599e86fee1e1a47a809b5792ceb823927af3c668255ac1819dd7dae419229 glibc-langpack-st-2.28-211.el8.aarch64.rpm eeaa1ea6a94f40c71b5b80444fbaaf80ed1f5b5dbfd4534d5f1d67a688af61fc glibc-langpack-sv-2.28-211.el8.aarch64.rpm e1c2a61b081036d0401a800346e0081c5fe4829a7ffdc67f12b998bfb77c190b glibc-langpack-sw-2.28-211.el8.aarch64.rpm 7d7080ad8f5003ffd7fa3cdc2c58a2eb9805cfb14d49b9e0d0c127ec80cec3a3 glibc-langpack-szl-2.28-211.el8.aarch64.rpm c1bdcdd7a76a95d1cfef0cda8adda636700dfdaa22e0a780b81e1667f2207028 glibc-langpack-ta-2.28-211.el8.aarch64.rpm 9f5fcd83d10300dde4f043580731299eb3e843a3098d2ff4bfa814da75e4d78c glibc-langpack-tcy-2.28-211.el8.aarch64.rpm f79757be971a2f0acdde597b6b47554978fb8b5a7b02422079c9cd54a6d2199b glibc-langpack-te-2.28-211.el8.aarch64.rpm 3ef99b81ccd351bd9470ec6d72efd653fe6f3c01ebd3baa5c84ca214bf0ab14e glibc-langpack-tg-2.28-211.el8.aarch64.rpm b15bfb692ca8b39e0f3b86c6283ce19bd80e4651bf4abef680d8acc805f7e834 glibc-langpack-th-2.28-211.el8.aarch64.rpm 765759365d719b31dc43065e75c478c341c4c39894c7bf4c516860858d03dded glibc-langpack-the-2.28-211.el8.aarch64.rpm 4048db33557a8ac9c46150b6be7f530f56a74a76bef3b3160dedbb775af272ee glibc-langpack-ti-2.28-211.el8.aarch64.rpm 135680885e738fc1f69cbf9d3f30e740b3361ecb433b81bd1a343e7c2907d79b glibc-langpack-tig-2.28-211.el8.aarch64.rpm f3ac28f86613bf68a2e6fb1dc3467ef0d72b2759bb79f69b61c9a47be5a5cf24 glibc-langpack-tk-2.28-211.el8.aarch64.rpm c3a1aa309c80b924eb31d24edbb5a70020fd4acf66b0203ce57a2481ba064590 glibc-langpack-tl-2.28-211.el8.aarch64.rpm ab7dcc9be5d14bc90ecefca9dbc7792ce4aee7c12e252338fdf6328a9fe25c08 glibc-langpack-tn-2.28-211.el8.aarch64.rpm be6f2849f22b2c1c21bb933dbf50aa82c64cd8164c53fa9e9566327ed7b4ca6b glibc-langpack-to-2.28-211.el8.aarch64.rpm 91b462f7e8fa267ab98d5006327244f1ce3af8481d69ff2f81eee7b2b88532ab glibc-langpack-tpi-2.28-211.el8.aarch64.rpm d478a6dbac895c6f27aa9e04e84000eebd8bd4d58bedd6deea3aa8126ecedfce glibc-langpack-tr-2.28-211.el8.aarch64.rpm 288e1df570bf908a5aad9f750fbb2256a2766057b8fa758e382550acde37961c glibc-langpack-ts-2.28-211.el8.aarch64.rpm bb8f1f687eae71726606e37e43e5bf9adce0cfab7d010362ef05a831dc61a015 glibc-langpack-tt-2.28-211.el8.aarch64.rpm 1e7ff9f2d3d59faed0e18d3ac8f8943ac49efbf679cb3ad93ecd5bf3d6412483 glibc-langpack-ug-2.28-211.el8.aarch64.rpm d34153b73a45ee8fbaf547992d7b8cc9899a3ac202509c9ae67a298f11c270af glibc-langpack-uk-2.28-211.el8.aarch64.rpm d3008b5e2c6ecc8fb4cf5ceb0f62729af77a4976bff2225fe575f05f38f7fc4a glibc-langpack-unm-2.28-211.el8.aarch64.rpm 90db67f420ea17686f462adb9baeaa3fa04f11bd50b84822b0c60f4baa3ba1b0 glibc-langpack-ur-2.28-211.el8.aarch64.rpm 147f9c17b7ad2364bcd17264933cc0ed8e3562b479a65f8e4b7eba85f9321d18 glibc-langpack-uz-2.28-211.el8.aarch64.rpm 730807bf7455a7adb1f4780b91881e7c9994ab8318d8404d34209ba29c15a988 glibc-langpack-ve-2.28-211.el8.aarch64.rpm e3c5c9c5734032818bf890d1f099ba2f91ca015693a6c542d4542656a10a6b22 glibc-langpack-vi-2.28-211.el8.aarch64.rpm 6a2b5b1ef2d07ccc77eadea4a54d602cdfc5c5aa11913215cc9ddb063fc55215 glibc-langpack-wa-2.28-211.el8.aarch64.rpm 4140524bdb6ca60a6d3ef67a555bcba6f1a0df8609fbfd0ca6dbf5624c57b4f5 glibc-langpack-wae-2.28-211.el8.aarch64.rpm cc4f23815a674070750768b8841cef736668fe34b9500cc112e1575c5e1046b1 glibc-langpack-wal-2.28-211.el8.aarch64.rpm 6bc4fbf3b5270cf187bb63fb6365d92cdb7fa2606c9c9c26ce08d8e29e147e44 glibc-langpack-wo-2.28-211.el8.aarch64.rpm 5784bb1cafb394e663ad1a3eabc7e48a866e427e5a987521d7694c4dbb821485 glibc-langpack-xh-2.28-211.el8.aarch64.rpm bfc8547f5081e66ca7bf831390a760b7c90e8e83d836ffcae8174585e1bb644d glibc-langpack-yi-2.28-211.el8.aarch64.rpm 1dd7d83a43f0cbbd01f9cd51d298b08d6638dbad650f07fd1b5825c1608a91f5 glibc-langpack-yo-2.28-211.el8.aarch64.rpm 737610ac52682442cd2812c9802671779200749d9112bf15212e5e99362cdc3e glibc-langpack-yue-2.28-211.el8.aarch64.rpm 5fcbc8b31f06603fcbea5ca2f043178dbc5b7b6f9cb995aaf83bb6300144f105 glibc-langpack-yuw-2.28-211.el8.aarch64.rpm e18e1092c2ea8d051a69cb147aa02f92da3164a9658209f6b27e05eeda9394f2 glibc-langpack-zh-2.28-211.el8.aarch64.rpm 2492c3abdc0dd71403c9f05c8b70ddc47ad5c244e37b6b183ffa7c00108f4b44 glibc-langpack-zu-2.28-211.el8.aarch64.rpm ebab31a9e3931335db4bf7d9f9d97220e42b6621922ba64be2a353d8e868356f glibc-locale-source-2.28-211.el8.aarch64.rpm 3645a65b67f840c5c2a5cd2a2ffdc7901563f7258857bf59876f35b1f8d462d0 glibc-minimal-langpack-2.28-211.el8.aarch64.rpm cf8eb5a34bb051c848d4cbbb64ead25704f852afbead51356e073d6a2e7a9e1b libnsl-2.28-211.el8.aarch64.rpm 5964a087bacd6c3776abb95e61202a654865b6e696ace907ef6d01aec7e48279 nscd-2.28-211.el8.aarch64.rpm 42c9d335cd2f70eca720ef6ec760a737ff0e67dedd51d311b64b409d39e8f4a7 nss_db-2.28-211.el8.aarch64.rpm f687dfd2703126603149e940b3af8ca2a45779a1b1cf762d80b94442700fbf47 RLBA-2022:7686 iputils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iputils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iputils-20180629-10.el8.aarch64.rpm d381eb6db9e627bfd6d37f7fcabc0c620eaf1dd0c936cd6d4ea98ead750c5dcb iputils-ninfod-20180629-10.el8.aarch64.rpm 07af18224c186fd68ae0bad54f1f65ad64369a57926931b065d878380e36f8a9 RLBA-2022:7687 procps-ng bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for procps-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms procps-ng-3.3.15-9.el8.aarch64.rpm 200c964de4dc6cd9a526c14729e22a25bcc055012fb660ae67185a0c4244723c procps-ng-i18n-3.3.15-9.el8.noarch.rpm df5d21d0a9941e6b283de24c4daefe6ec93e8ceab3e7acce43f3aa91546f6c0f RLBA-2022:7688 gcc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libasan-8.5.0-15.el8.aarch64.rpm aff6bc439fc40008fd9488cafb906584f90ff0615b28e41e2d10b3cca12296e1 libatomic-8.5.0-15.el8.aarch64.rpm 1be6a0597d1e5c68c8eb1add30e17fa3d036a10c972786b55e27b00d87dac4ff libatomic-static-8.5.0-15.el8.aarch64.rpm b4cbf072e2a17994df0c1ce01f43e77acd9609a59a4c9974ba53ae1d22e24f42 libgcc-8.5.0-15.el8.aarch64.rpm 6ac40a40fbc847c654b9b696e6d8a12ed7bb3c8b1d1c31372588172fba17cbb9 libgfortran-8.5.0-15.el8.aarch64.rpm f14c84d41c34bd3811460fcfb538f1bbc80ef82bdf8099dce78e149d26ae4140 libgomp-8.5.0-15.el8.aarch64.rpm a305c2fc725fcf9f617d98b9f1923d68ded5faa8508781bc11b101628a0af3b1 libitm-8.5.0-15.el8.aarch64.rpm 8ee341e72d12c03949bc0128c98356bcbe6d92a36af6f8ccab32d6dc6cb91fc1 liblsan-8.5.0-15.el8.aarch64.rpm 342d0f06eedb1706536f121f3f74e02ace6e33ea28f18ce28fa6cbdb8d5044fa libstdc++-8.5.0-15.el8.aarch64.rpm 9bd55215b064014b258afe2662729a77ebddcac87e687a428f6a1a72511ac25a libtsan-8.5.0-15.el8.aarch64.rpm 93b6ae5c8d6b631753155cbbb0cc1535c712640e56a84dfff5278a5ad05fd069 libubsan-8.5.0-15.el8.aarch64.rpm f4006e23f4536eff861c1a4b9456250e6f90479727b7b30dddc92adbd6b69492 RLBA-2022:7691 selinux-policy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms selinux-policy-3.14.3-108.el8.noarch.rpm c8034fbd86e19f9162ab575001f2ad66d5dbc900e97fa9a95ae3e70aec8e7dde selinux-policy-devel-3.14.3-108.el8.noarch.rpm cd4a2d1bdf0dd76ab84f0b5d2e5fc51361e2aaa25817bf04f96d968324a47465 selinux-policy-doc-3.14.3-108.el8.noarch.rpm df6debc6a1a0e39d5907151d541899d4fbf35a6ae6689f94404767cd67daa65a selinux-policy-minimum-3.14.3-108.el8.noarch.rpm 09f25bf811f906c626041136acfb157ccad7234b66553a191616bfd087c32eb1 selinux-policy-mls-3.14.3-108.el8.noarch.rpm 5f9f7e496c7efeb6bd3507ded0921c4187f3a954d1afc8f649f46d293abafd5e selinux-policy-sandbox-3.14.3-108.el8.noarch.rpm d3b78e4cd13f6102348a39898910ca247f6963937e114f21d5041ee96e8bac55 selinux-policy-targeted-3.14.3-108.el8.noarch.rpm f7d7192718b7ac1997ef75f6d3b4fbc0e4e931ede22df6b538ca0719dcf7e5ab RLSA-2022:7692 Moderate: xmlrpc-c security update XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms xmlrpc-c-1.51.0-8.el8.aarch64.rpm 341bc55b17daf302817098b8153e3f06ddfdd2a1bcd28419ce42470d583f1b37 xmlrpc-c-client-1.51.0-8.el8.aarch64.rpm c833ece05ba9350a70ecf2fb0e88bcab410b8af9f9e390d4d84fb3aa798a7fa2 RLBA-2022:7693 binutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms binutils-2.30-117.el8.aarch64.rpm 52ca3e2c4d5746334a06d58fb1433dc8db28b326697c4bb52d2dfee75da9b239 RLBA-2022:7695 virt-what bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-what. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms virt-what-1.25-1.el8.aarch64.rpm 52f657e37dca6203008e30bec18798a73741481cc11b5be8e4b37b71391b0803 RLBA-2022:7694 tuna bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tuna-0.18-1.el8.noarch.rpm 58812fb015dcd75c62973e25433bd7333239d1239cabab22e2d022d60e268623 RLBA-2022:7696 krb5 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms krb5-devel-1.18.2-21.el8.aarch64.rpm f93b2288f852bf6035768f62234daa4d9fdb53b7c7636b1a3220860e00209c58 krb5-libs-1.18.2-21.el8.aarch64.rpm 7784c5b5fe04d4814824d60f0d8704a428bd3a5bcded30900f01586e99d9d40c krb5-pkinit-1.18.2-21.el8.aarch64.rpm 7485af41b8f7ae01c567c2d2ef72e84ef27a373a0cfa43ef0e34ad6d037855b5 krb5-server-1.18.2-21.el8.aarch64.rpm 7801e71174c21c2bbc3764e547b3dd871046288d62ea912ce947cc0d936c2a1f krb5-server-ldap-1.18.2-21.el8.aarch64.rpm bf86dbed3a99885d35906d7c4a46bd558c8b1bdf4edd17af75d2b3e082293e0d krb5-workstation-1.18.2-21.el8.aarch64.rpm 66f908dcece1a942d7b58e9ab75d8a3c454bc922c32dbc98798eeddec4f28e21 libkadm5-1.18.2-21.el8.aarch64.rpm 854efe4e7029c52886ca198de6f90ebbf18ba7c63b0eb23cfc154e31f35c0395 RLBA-2022:7697 python-dns bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-dns-1.15.0-11.el8.noarch.rpm edf964bdcc51d9bed6d9652a1e3f86add29616c7d5ae6e5be2667f7bdb82145e RLBA-2022:7698 samba bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ctdb-4.16.4-2.el8.aarch64.rpm 373c6f7564c54e10cfbc059906be9378eaf4e1aed54a90062d913649053b5262 libsmbclient-4.16.4-2.el8.aarch64.rpm b8cc880c2b00855c9d7409e64f0fc483d6597217a209424c56f2a18a18e843fc libwbclient-4.16.4-2.el8.aarch64.rpm 2d583b34b4dd1c316138aadd710fa89e70e878c18b7dc93ddf380d9c7f06067d python3-samba-4.16.4-2.el8.aarch64.rpm 371d05313653e66148f74cc968f79e2fc21bcfa91299c5aad0dcdfd9703dfe28 python3-samba-test-4.16.4-2.el8.aarch64.rpm 1aa43dae83437562f6a18ed6b1940ebf31f56c231caa3bad14dcc6ca0d6c5f51 samba-4.16.4-2.el8.aarch64.rpm 4211992158e00809236b4f8f36f4211032465568f32eddc6af3839f1f41e601f samba-client-4.16.4-2.el8.aarch64.rpm 95e9b0734e4c53a8dee491063d28cfaca0e83c5ab437a61f39bdcb2085bae03d samba-client-libs-4.16.4-2.el8.aarch64.rpm 893c71be87e9f2857af897a881d6675f8b06d40570a7b95e728a2314d13db0a7 samba-common-4.16.4-2.el8.noarch.rpm 64ca28af1e9830cd10c7b6f5e971fbed4f5b32f49e10a5a6b35c49b39149566f samba-common-libs-4.16.4-2.el8.aarch64.rpm 92351ddfb6a48d3972dc15a11d496f759ce431f178e5de242fc8f8280c0f3933 samba-common-tools-4.16.4-2.el8.aarch64.rpm 9b2a1bc041dd24aa4d3717cf42fb7e4400d19772bbaf3d32bf1881b490cd7ddd samba-krb5-printing-4.16.4-2.el8.aarch64.rpm d5448647be58c0c6ce2ce5b010e8287c3954ccbf13513d870b36671157c97a14 samba-libs-4.16.4-2.el8.aarch64.rpm e4b5ad42bd28b70a0c53a60fd595b09c0e10a974ddcd8e068b06df56dbef89b9 samba-pidl-4.16.4-2.el8.noarch.rpm 4cc8b11a0da7253d955db6718ecb3a2e135c35ee7252f097fa2086390514eeee samba-test-4.16.4-2.el8.aarch64.rpm 849723c0d3327ce435df22d0a13a07067b8f29e6258ed8b39735f49b02445540 samba-test-libs-4.16.4-2.el8.aarch64.rpm 1d6ab4f620d703b4d6a858f7dd473b26fdabb017038972a619226ac367378c24 samba-winbind-4.16.4-2.el8.aarch64.rpm c357b10b9ee86dfa841c50b1470f2953d048b714cd40f7edbce33c691ba40222 samba-winbind-clients-4.16.4-2.el8.aarch64.rpm 450ca76b3227a6130b3c97d7750784ea73246326672bf6e94915b640054867ea samba-winbind-krb5-locator-4.16.4-2.el8.aarch64.rpm 3505e4846977d7ae2af17681f4306df3c1a89792bcb48ee4a7aebd076f266867 samba-winbind-modules-4.16.4-2.el8.aarch64.rpm 6b73f84d5c9193f21fd64a591dffefbbfae34946fd1ee9092aa47b6a240879ac RLSA-2022:7700 Moderate: gdisk security update The gdisk packages provide the gdisk partitioning utility for GUID Partition Table (GPT) disks. The utility features a command-line interface similar to fdisk, direct manipulation of partition table structures, recovery tools to deal with corrupt partition tables, and the ability to convert Master Boot Record (MBR) disks to the GPT format. Security Fix(es): * gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc (CVE-2020-0256) * gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc (CVE-2021-0308) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gdisk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdisk packages provide the gdisk partitioning utility for GUID Partition Table (GPT) disks. The utility features a command-line interface similar to fdisk, direct manipulation of partition table structures, recovery tools to deal with corrupt partition tables, and the ability to convert Master Boot Record (MBR) disks to the GPT format. Security Fix(es): * gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc (CVE-2020-0256) * gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc (CVE-2021-0308) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gdisk-1.0.3-11.el8.aarch64.rpm 31de6f698b4a43d5dd1895414cacaa2fa4f1b656c6d4c7d70abc074dfcc7fa18 RLBA-2022:7701 at bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for at. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms at-3.1.20-12.el8.aarch64.rpm 4183db36570c37d3471a52d9c5b8042fbd86b9538e7d00894d0c2d11cce991a0 RLBA-2022:7702 mokutil bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mokutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms mokutil-0.3.0-12.el8.aarch64.rpm 8013721b4692a704a2bcb678d297ea519108efe028d12d1d6786e2daa7f8bfad RLBA-2022:7703 python-slip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-slip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-slip-0.6.4-13.el8.noarch.rpm 969e55a97a50fc39da7bfdd3ef25fe8f31c8485db610e2cbf15586f8e956517c python3-slip-dbus-0.6.4-13.el8.noarch.rpm 42102433519b624f384a59b9eb824ac7e37d917ee08dda1c3f4c454be89e06d6 RLBA-2022:7705 kexec-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kexec-tools-2.0.24-6.el8.aarch64.rpm 6e43ec02a6dbbcbf12563d737eba2ac8b5c74a63cebdba34f9efcd4dd8e276c9 RLBA-2022:7706 which bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for which. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms which-2.21-18.el8.aarch64.rpm 41054bc8f83b774d48e4f53822cb25ff1d96fc2d612d6ea3a83222c8efb3bf10 RLBA-2022:7708 expat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms expat-2.2.5-10.el8.aarch64.rpm 1a4d6629d01b30ab165269869db246fdcf821b787af9d19c8f72b984223d907b expat-devel-2.2.5-10.el8.aarch64.rpm aace88d2b38ac8563b4110c94a650a1ac1c980e4f3c9feaee96fd592dd3e0cfd RLBA-2022:7707 nftables bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms nftables-0.9.3-26.el8.aarch64.rpm 02a4f8f9f2cb39a6c5af5717c54489f217c19cc142006f53bf7521df779938fe python3-nftables-0.9.3-26.el8.aarch64.rpm 8e6dd7444905087bcd502df09affcce2b00351d5a14745c86ab6a2bbdcc6cccd RLBA-2022:7710 rng-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rng-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms rng-tools-6.15-1.el8.aarch64.rpm 5043f5c2ae5183e085bb85e66dd1ce5b8c08a9b8ff2d37dece03a51884eb79a7 RLBA-2022:7711 libdnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libdnf-0.63.0-11.1.el8.aarch64.rpm a3378a0d62d8207115e8d95cd14e8331b4f0b00ee8e523d30538ef3fca857e57 python3-hawkey-0.63.0-11.1.el8.aarch64.rpm 0208293953fe904d5aa56e64c3eab83d7ca1de1b7211f380f43fc9109bcf8a13 python3-libdnf-0.63.0-11.1.el8.aarch64.rpm 8ed15a58f64f07b4128affac69a06c2d2bc02c48a3f075cc601ecbe68d6dba94 RLBA-2022:7712 dnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dnf-4.7.0-11.el8.noarch.rpm 948fff4b3cea109242e6d308e3256bbdcd26f214a044898075f7b8f77a0b80a8 dnf-automatic-4.7.0-11.el8.noarch.rpm 2ff731967901546be305af1b8d7452e53e3bb8660c6d00cbf939060977415603 dnf-data-4.7.0-11.el8.noarch.rpm 48782a17c1a4f7c89035d7eea46f681fce219210e17e727a0f816c0913fe32c2 python3-dnf-4.7.0-11.el8.noarch.rpm 075e1145f2523acd593dc9133ad5d094efa3bf7d76816756b2966a77ee4203a6 yum-4.7.0-11.el8.noarch.rpm 58f20b0790242c6216c79ee52c72e4edbe869b66aa14e2d8364c41b22aa2b50f RLBA-2022:7713 libsolv bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libsolv-0.7.20-3.el8.aarch64.rpm f3b25b4127dbb41a459dda58bfcb24fee8f68599dfbf7d77164d709c68976d7a python3-solv-0.7.20-3.el8.aarch64.rpm 2051e9b66bb68249b03a4875d4b99ab944b14ce6e2d7afe8844532cce11eb09f RLBA-2022:7714 device-mapper-multipath bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms device-mapper-multipath-0.8.4-28.el8.aarch64.rpm 9d799ca1bef26086197d96e92b67718b96a5a0a3c2c01297cbcac1698be45f7d device-mapper-multipath-libs-0.8.4-28.el8.aarch64.rpm a5911f7f5d16abb547486d90972e5bb8f95af224e8e57d1e32dd1eb45d23c6d6 kpartx-0.8.4-28.el8.aarch64.rpm 0d6cc830d05f15e12a01e03dd012a9a864d7153d241936d35c2e3318fadfd78d libdmmp-0.8.4-28.el8.aarch64.rpm 3e64bd0ecc47d3175673c399752efdc867cfbeafbaddbaf1b64ddac4b7f02ffb RLSA-2022:7715 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libxml2-2.9.7-15.el8.aarch64.rpm 43e683ddabc66c02bbd94f3919959e282cc9cd7c046e018ecba1155f09f66888 python3-libxml2-2.9.7-15.el8.aarch64.rpm c5232872ace6a15cb0affec511f7becda665623e5a94f6aeb836052a5c309dd3 RLBA-2022:7716 cups bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cups-libs-2.2.6-50.el8.aarch64.rpm c75c73fe017051b6475e875dc68aacf1d7e84a1429d62f37b20dd0a1dd7cd372 RLBA-2022:7717 elfutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms elfutils-0.187-4.el8.aarch64.rpm b197ff9345104888bd020a0eab56549dfab4d69a32a3b934dd4adc7f5fd096bd elfutils-debuginfod-0.187-4.el8.aarch64.rpm b9a8ac1745e2d9ccd4c8fe82bdfd40286509caea69a836861d33d8e5aef34e12 elfutils-debuginfod-client-0.187-4.el8.aarch64.rpm 43663f8d52f375180446bd24d1fef9a2e91be00d707cd86876af5206631d2066 elfutils-debuginfod-client-devel-0.187-4.el8.aarch64.rpm 7b5f77e658bc0ed0ecba9ca45eb071a2be74bd894b99bd3bb229787e80da8a93 elfutils-default-yama-scope-0.187-4.el8.noarch.rpm b01511cf066f23b46d7e0dbf923e653635f3265b7619d30414a5f1ca25ad6e73 elfutils-devel-0.187-4.el8.aarch64.rpm 65e951b75e3c5f0b9d939e8b9557869b23883e80b6ea0915ef11c21168d0f636 elfutils-libelf-0.187-4.el8.aarch64.rpm 3f6c94500494649d6891baffa568e269d3c4768cd43fa536b5ad1952d2df5718 elfutils-libelf-devel-0.187-4.el8.aarch64.rpm fb177dc94282b6d51d0327aee1a6465cf3eea92ee26f8657ffa485561a1596eb elfutils-libs-0.187-4.el8.aarch64.rpm 3a89cf77b460201241ceea83cfbecf8d42af13c7e7950ff3d70b17f8e39273c6 RLBA-2022:7718 cockpit bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cockpit-276.1-1.el8.aarch64.rpm 31c45064844599834958ae7fb10560da088406eaea97321e26377faf55af8cf1 cockpit-bridge-276.1-1.el8.aarch64.rpm d74dc791c3d29ea3906126a5629d53fef5c8d79c1325c56e2ea2687b36d00f6b cockpit-doc-276.1-1.el8.noarch.rpm 891dcb760e2e7df7ff43831e2874fb96dcb15aaa16d03baafe7a2f18d06c9787 cockpit-system-276.1-1.el8.noarch.rpm e1ecbc2e62b5aca745ed0929da469ae80504d3baecee1fb61a5150cad1ce4537 cockpit-ws-276.1-1.el8.aarch64.rpm 8f7710f75a5c38d5287e4d5d431252b04c3268f650c7a5e52c2df236205dadd1 RLEA-2022:7719 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dnf-plugin-subscription-manager-1.28.32-1.el8.aarch64.rpm efee581fa7518cf70e09a5d2fe8c0f461f459d15622cb58dd3843e6a9d1fe64a python3-cloud-what-1.28.32-1.el8.aarch64.rpm 0155dfb1d4c6ae08aa6fd6b9168b87a5b7716a12ce76a6ebcde703303e7ad1f5 python3-subscription-manager-rhsm-1.28.32-1.el8.aarch64.rpm db1e4daa11011f399d2589ebdde213187b501171906aa65dea9c8d94004b20d4 python3-syspurpose-1.28.32-1.el8.aarch64.rpm cf0f74058abbe15733bafc24b4c37c4fc647745f9d6bb5a8def301440fdbb032 rhsm-icons-1.28.32-1.el8.noarch.rpm f644f44033ecb86e842fd031abc77e9749f3fe82ec978af9b936003fa63b8d3a subscription-manager-1.28.32-1.el8.aarch64.rpm b172f7e474009856babf32ab682adb98ea937edb9666d8cd1cc9f35b10bdc148 subscription-manager-cockpit-1.28.32-1.el8.noarch.rpm 0d02c1271b223de8b704ff7dd8015a0f69d2be13709a4c3033ac7a6ec1b8ba63 subscription-manager-plugin-ostree-1.28.32-1.el8.aarch64.rpm 2f70504faa9272eb9ae31b456c6fc60da7c6811417656b7053ceecca73c928cf subscription-manager-rhsm-certificates-1.28.32-1.el8.aarch64.rpm 5476d2b0b26b9e824e7c06a1aed6c38037a37b1d117ebdf84495f766f6aba36c RLBA-2022:7721 cronie bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cronie. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cronie-1.5.2-8.el8.aarch64.rpm 1028a30e4ffc27675dc090a63843beb8d2a4e7c35dcdf92eb5c35c05cede283b cronie-anacron-1.5.2-8.el8.aarch64.rpm 46c894d2c6686d91e7cb865b5996e040aa8b80ac0961ac0ca379a5b70bc216fd cronie-noanacron-1.5.2-8.el8.aarch64.rpm 03d935a9c85b8452bc7576771b2c73dd703c083956d2d1f7f8b831509436c6ed RLSA-2022:7720 Moderate: e2fsprogs security and bug fix update The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for e2fsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms e2fsprogs-1.45.6-5.el8.aarch64.rpm f52e817441ae687a686aacc76de7ae07736cd90bafd63f8b125e519244311ca3 e2fsprogs-devel-1.45.6-5.el8.aarch64.rpm f2570247b5cd3bc7a2b0ca550b457f43bc3fbae6e96ef73f8c9a933e42ac6d25 e2fsprogs-libs-1.45.6-5.el8.aarch64.rpm 322d25761e7dbd03de6b0aa38fa35670956664cddc9da2a3708a525500d24707 libcom_err-1.45.6-5.el8.aarch64.rpm 04345d892920580a6537dbf7fa6b250d6fa99d2fd88c7c968dee035b8357d9fb libcom_err-devel-1.45.6-5.el8.aarch64.rpm ae502367f259788a82ba041fd11dc76323618afd245a27f0d61ae61b549c72a8 libss-1.45.6-5.el8.aarch64.rpm 1685db6916a9f177c293384543cc7b60d3633c9bbb44a709edff0b4de3d74145 RLBA-2022:7722 libcap bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libcap-2.48-4.el8.aarch64.rpm e0f4d5d562d39babf5d84be3f45160fc074dc7b03b9c7747d664b1ec5277a196 libcap-devel-2.48-4.el8.aarch64.rpm 8f01cfbddb47ee443fc58a2704513ad220e0b20424cde2c9f4df964c0ac1f9d7 RLBA-2022:7723 pam bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms pam-1.3.1-22.el8.aarch64.rpm c0d4909fe50c180104be117994926fb59ccd8c70a64b64fe1b007ea89d021b8f pam-devel-1.3.1-22.el8.aarch64.rpm bba09141115a9737df62c4cb9821160d135d003aa1eae2b4cedc9a3aee90aefb RLBA-2022:7724 zlib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms zlib-1.2.11-20.el8.aarch64.rpm e125c1fad08781fa7fc040e1226812b5db49d4d75199fe937e1dca26a48a2864 zlib-devel-1.2.11-20.el8.aarch64.rpm 9b7d238d0291e7d6eeae4addc992f789aafd1358d06a19b277e9bef8a50977fd RLBA-2022:7725 dracut bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dracut-049-209.git20220815.el8.aarch64.rpm 7a3c09062109db831898b3fc0ff522384bfab279762a1add054a06043eadca3e dracut-caps-049-209.git20220815.el8.aarch64.rpm 8596dea8ff9ba138189917aa339979012583b6f3f385cafdbd356bd57c1385a2 dracut-config-generic-049-209.git20220815.el8.aarch64.rpm 69d796f04adb3aad56b3cf502658d5d0e948b44717cf7d6aa93830f8e2b434ed dracut-config-rescue-049-209.git20220815.el8.aarch64.rpm 87aaa19d8cd163a5dc230cc6eeb0091db7bbe780bb68c7a59f89a0509fb20e4f dracut-live-049-209.git20220815.el8.aarch64.rpm ade369e031ca7628f14269289327e08d927dc6cb92d1ca4d58e7a4c57421f284 dracut-network-049-209.git20220815.el8.aarch64.rpm de82ead1daab19cfdf70857bf2252b444b9d52429873cb965a21116f795b8db6 dracut-squash-049-209.git20220815.el8.aarch64.rpm 8f29856ae4598ec1de24b6a2a6657471f41842fa0e6bd597c5d065b0a2737626 dracut-tools-049-209.git20220815.el8.aarch64.rpm 0ec31db9ea0b2431cd65e080ff8d69557f464ff963c988db0917eaa2e0f99e6b RLBA-2022:7727 systemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms systemd-239-68.el8.aarch64.rpm 7d73207ef3dfb42a0bbfb9afd82dacee2b23e4a8b6e5a07b3752b05ad976b887 systemd-container-239-68.el8.aarch64.rpm 3a793e428720878cfdc25b7c4692055b716678bb4b933f849a6f3b5ce6cd102a systemd-devel-239-68.el8.aarch64.rpm 1c49d251b203a36ce92016f1b8f2b958d54ad2ed1ea28c9865455157c57c7eb3 systemd-journal-remote-239-68.el8.aarch64.rpm f9cb9d0e084e5a95a8ff3360d0340134f5f9d96ba673edc9c25847be8a565ab9 systemd-libs-239-68.el8.aarch64.rpm 39e9441543bdd4adcc37355da183ff57c659a553c2dc3f4bb8c227bb20351b31 systemd-pam-239-68.el8.aarch64.rpm 58ee752d2d291e01ac25143379d816dccaec4aa8fe003604bbec215cade2fa79 systemd-tests-239-68.el8.aarch64.rpm d98c97b63e0d66fdd7f6456828750d61abba89e34646eb033883c2dafb54aea8 systemd-udev-239-68.el8.aarch64.rpm c74e59a7135dec2aee660d58cd3ae401ecfa0ea43d69e4ec40f8bffbc103f6e6 RLBA-2022:7728 libtevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtevent-0.12.0-0.el8.aarch64.rpm a852c69a39ef394eb3e0c5804212247fc9453f630d493226316a3b9ee94bc9d2 libtevent-devel-0.12.0-0.el8.aarch64.rpm 02cf1186cbf018ffa58d51d451e4cbf14b10c9bcb44b5091caeb1eef1ee31bdf python3-tevent-0.12.0-0.el8.aarch64.rpm 194da3b5f39ed5dbddcd84fbbb1581714b95396af0e3e21abee630ae64b9d668 RLBA-2022:7729 libtdb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtdb-1.4.6-1.el8.aarch64.rpm 28e72fec7a88d6edc2ac0615794bca414e33491ec498c953e3fec2b353f5a1be libtdb-devel-1.4.6-1.el8.aarch64.rpm 7ef9ddffc50e3abdab962317ee7ad7c98d30bab3dc564d1e564baac6b19ab55e python3-tdb-1.4.6-1.el8.aarch64.rpm 11be3430e90656cd1cf21124f18facef26978bc0ad9827a8ee9556175b67eab0 tdb-tools-1.4.6-1.el8.aarch64.rpm 42f896fd8d072a286ded11e731d353e7e799dbbf07aeb8f7f24fcd9c30cec6d5 RLBA-2022:7731 ding-libs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ding-libs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libbasicobjects-0.1.1-40.el8.aarch64.rpm ed623791870778478a01619045ba86d73c01d9f04b4e6cc258f5866cb2048e33 libcollection-0.7.0-40.el8.aarch64.rpm 69d2c132badcdf45e86df1e1ba358237b599284c22e3dbfa7638d902e0652193 libdhash-0.5.0-40.el8.aarch64.rpm aa5d496dfa7f798184cd964156c674fef28436a86e275462a985088d20872e27 libini_config-1.3.1-40.el8.aarch64.rpm eec9c0c59ddf5df518666b260dd7c1515ab187782bd80637eaace5585153f49a libpath_utils-0.2.1-40.el8.aarch64.rpm 7d8e665d7cffada799046073a535da46a84b3ee7a5b02c398c5ba0102ed1f797 libref_array-0.1.5-40.el8.aarch64.rpm ad40da01469046f1eff11e8d00e1aeb569e27c4f4a0ba5150e6eea116e6d7718 RLSA-2022:7730 Moderate: libldb security, bug fix, and enhancement update The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484) Security Fix(es): * samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484) Security Fix(es): * samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ldb-tools-2.5.2-2.el8.aarch64.rpm fd9e9f04511fe6b138f7d74e9ae9fb7d0d57e981e66be613d542bd63d6ff79be libldb-2.5.2-2.el8.aarch64.rpm 11aea5bedcbf8869b0302d309acec8dbe1d49e9d03e76661d813369829f1e7eb libldb-devel-2.5.2-2.el8.aarch64.rpm 7a0a92bab36a2dbe0e3bb2eb56b012b0b9075a9b52cb711f7c506e9590c56f77 python3-ldb-2.5.2-2.el8.aarch64.rpm 268be5d108fda5034461cb05970664445d3a82b22c76317b700cf8fc0f3f0f9b RLBA-2022:7732 sos bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms sos-4.3-5.el8.noarch.rpm ee738963148db3a0e089207c8d3eae0476334897414147f59928f771b427fd4b sos-audit-4.3-5.el8.noarch.rpm 11f63711cbf952f7e5f0eaf592db922d8f08a7b93d42604859ac6e2f66c4a4d3 RLBA-2022:7734 rpcbind bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpcbind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms rpcbind-1.2.5-10.el8.aarch64.rpm 435709c555c6a03229eec4b5264663b2cb93eab60f8241c8b10fe545fe156f36 RLBA-2022:7735 bluez bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms bluez-5.63-1.el8.aarch64.rpm 334da38938a510a18a6d9968ff52f6bc9199f5e8fd40f6f99fd289b0d78d3ca7 bluez-hid2hci-5.63-1.el8.aarch64.rpm 4bae2a1725fc9b4d88b5f41a11b27427e81c0b5a74c0fc1ec968cf04235f1f54 bluez-libs-5.63-1.el8.aarch64.rpm 9e6beb99633cadca9f282c599134b79f7296d236b0f5681699d6a3932ef46e14 bluez-obexd-5.63-1.el8.aarch64.rpm 3ab18df88a241a8728c28e3268edeebfefc53aa54d670a49fbca8d5294bb78a6 RLBA-2022:7737 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms opencryptoki-3.18.0-3.el8.aarch64.rpm 154aacfb7e4c385afcbbaf1906b1ee10eb91f64a6d8c4cf610eb4dad813c4056 opencryptoki-icsftok-3.18.0-3.el8.aarch64.rpm 71bf2b98fcbfe59705ce707f8f608451e48423e298d1036e2f4ca2d6b6d350dc opencryptoki-libs-3.18.0-3.el8.aarch64.rpm 5448582e28488467b3fd6a44036af5f677dc18016a94dc42ec4de568ae6a3047 opencryptoki-swtok-3.18.0-3.el8.aarch64.rpm 23917ed66c5bdde810c1ed2d1ca1e5f12cedf2c947da28e541531e04f470e013 opencryptoki-tpmtok-3.18.0-3.el8.aarch64.rpm 4de016ee6cc8e4cdf9dfc1608b6fb2495a36982421a9afe6f206fe0abe7ed4fb RLBA-2022:7738 authselect bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms authselect-1.2.5-1.el8.aarch64.rpm 29ea70ecbb39aac065908b764d7be2e047ead57e0c5fd7ec6d5b12f60831a7e1 authselect-libs-1.2.5-1.el8.aarch64.rpm 58dadbd9affe71b64c46273b0b8538c2645875aacc9fd55e607310ad357a8457 RLBA-2022:7741 mdadm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms mdadm-4.2-5.el8.aarch64.rpm 4836c8b354d3c11df1972d687f2d325a6da480f5d0d0fe1bea447d52e2b87be2 RLBA-2022:7740 libtirpc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtirpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtirpc-1.1.4-8.el8.aarch64.rpm 57d8beb5dadf3caa8624abcffd7e85f2faeccb86ede420d2e1fe06a5fadefc71 libtirpc-devel-1.1.4-8.el8.aarch64.rpm d725a2718b36630d1330db9e93b8224b48ace5d140f983c0395ed8da49b9e0bf RLBA-2022:7742 linux-firmware bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iwl1000-firmware-39.31.5.1-110.el8.1.noarch.rpm b392e895d3afbd5ed826372f3604d908bab2709f69c6d60d13750e8dc81e3dfe iwl100-firmware-39.31.5.1-110.el8.1.noarch.rpm 337a8fea74f082be29c60bee17d47093ef647a922bd506619bbeee0eb55a4da6 iwl105-firmware-18.168.6.1-110.el8.1.noarch.rpm 288ed43283f51c59b7e50a0dc593df6628870840f58321eae575a5b5380fdb5a iwl135-firmware-18.168.6.1-110.el8.1.noarch.rpm 9450cd2506434c5aec720a8e08bc33338266d96585599046ee05f63459de5ca2 iwl2000-firmware-18.168.6.1-110.el8.1.noarch.rpm 29f026eb5e715fcb37bbab8ea3c9d27cae17e540ac1c5b573f6aa32625c791f1 iwl2030-firmware-18.168.6.1-110.el8.1.noarch.rpm 62e23f22cda37774d7119e98c9b10705e1ecf6e0e32ba7c0967e9fa328dce004 iwl3160-firmware-25.30.13.0-110.el8.1.noarch.rpm de4b78e335e5932ba208394cc12aeffc7feed7acb2f18f394f3fb5cc568aba8b iwl3945-firmware-15.32.2.9-110.el8.1.noarch.rpm 2d4181863240f991d144bfdb7647f47cd1fda63b8a3e785bc7ec4111a261dd4d iwl4965-firmware-228.61.2.24-110.el8.1.noarch.rpm f130043513b361d6ec69c1ad373406524f4d4d80edd8b055f5f0549c4753e609 iwl5000-firmware-8.83.5.1_1-110.el8.1.noarch.rpm ceb43de383fa1e590c05ef040b769940f779212ecc27b3c719bd7c1305b43e2d iwl5150-firmware-8.24.2.2-110.el8.1.noarch.rpm ec9a2076dc4160925ab3972b816ad7a1b6f10297f66f8ad23aaaa5a340550724 iwl6000-firmware-9.221.4.1-110.el8.1.noarch.rpm 721c1b80f635aec0e4e243c20f4dd464bf5b1705b369e0a27cee734931d2c743 iwl6000g2a-firmware-18.168.6.1-110.el8.1.noarch.rpm 726669bdca669cf5abe6933d294f1248737844f315371c32716e13501842dd07 iwl6000g2b-firmware-18.168.6.1-110.el8.1.noarch.rpm b9cdf0312038d745cd0591bbe410fffec4d0ced7d58b844090da267e7da15348 iwl6050-firmware-41.28.5.1-110.el8.1.noarch.rpm 1174de416e10dfac15f61ea201d8f54c2da2d71725d8bedcc0cd8daca3a41bb0 iwl7260-firmware-25.30.13.0-110.el8.1.noarch.rpm 2986a3d51b14030af76e3fbe72208d266a3c6ae6afee4af5b4a94eb448b3b043 libertas-sd8686-firmware-20220726-110.git150864a4.el8.noarch.rpm 23ad7de4d4084fecd2719465ac68dd0fc87a09e6a02dd989e63dc8246a127752 libertas-sd8787-firmware-20220726-110.git150864a4.el8.noarch.rpm 8044c8712188cc19e15f04d2d8ffa9829cd3df1f267c8da9ffb4004ab0132b0c libertas-usb8388-firmware-20220726-110.git150864a4.el8.noarch.rpm 3de6570a0cbd700a823a5f1a9a2b495e8a26e451517ddb97f5bdbdeb57f0a6c2 libertas-usb8388-olpc-firmware-20220726-110.git150864a4.el8.noarch.rpm 32493d237acfe25379667ad067edc6306413783fee195ead85258ff95beec859 linux-firmware-20220726-110.git150864a4.el8.noarch.rpm a7e4b2efa8026d94832457e29367e854b7aa7e98c4a6adaf1402dd0be61ae2c5 RLBA-2022:7743 autofs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms autofs-5.1.4-83.el8.aarch64.rpm 23b2102b167ffadc17b45aa044a822e55e415c53aecc0f8efdb7bb72a83af1a4 RLSA-2022:7745 Moderate: freetype security update FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for freetype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms freetype-2.9.1-9.el8.aarch64.rpm 6b4b48a1202663dbb1fcf6333273938d1ecb16acd75368efc9b264fa046270f4 freetype-devel-2.9.1-9.el8.aarch64.rpm 19fc86a5b68199fe2294b121bf9e2e8a09c69d5850aef54d64338afc59b02202 RLBA-2022:7746 zsh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms zsh-5.5.1-10.el8.aarch64.rpm 0748ee41e423147a5761291b63e2396da5ce8b2be070bdac4c9374806f23d523 RLBA-2022:7747 tuned bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tuned-2.19.0-1.el8.noarch.rpm 8e8428e5485fd6f6db1417c72f7dce9ad3115424e79e6df675b4b3f5f9846679 tuned-profiles-atomic-2.19.0-1.el8.noarch.rpm a88e4f30555962ab6e526a8e9e1910c7fdb07d208f162f40163134c03adb7cc5 tuned-profiles-compat-2.19.0-1.el8.noarch.rpm 2fa950728ee6e10b81ce23f9a11702388d0f78137e31644908e94a84f422b4dd tuned-profiles-cpu-partitioning-2.19.0-1.el8.noarch.rpm 38d1470f454154f2fa1258fd042ab28abf7120b3bf2cbd6c9f147395b6add489 tuned-profiles-mssql-2.19.0-1.el8.noarch.rpm 9165bb6a4d2368005ec46773703e928dff9c64669370e8cad67214a626a6caf8 tuned-profiles-oracle-2.19.0-1.el8.noarch.rpm 1d51c3da8674233ff884f936846f25d795f3d2345a81459853634a5752b2d9e0 RLBA-2022:7753 ledmon bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ledmon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ledmon-0.96-2.el8.aarch64.rpm e30d4d468c4eeb0e18f288748c6e0e07bef8aed1e3b5a29b8d182b585416f557 RLBA-2022:7752 iproute bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iproute-5.18.0-1.el8.aarch64.rpm 0a83cfd263c2a9e56394e7a8f1cc4864069a19b24400ccf6a3bdd0ce77fbe369 iproute-tc-5.18.0-1.el8.aarch64.rpm 1cc4fe3e18e30bb1065b758519912128d0f54d1962ae373067860289f460c644 RLBA-2022:7754 environment-modules bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for environment-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms environment-modules-4.5.2-2.el8.aarch64.rpm aa8b8106185a9f4bfe3726e7f3a94d3ebb02b32a19bd051f2eb5a3ecfc0440ec RLEA-2022:7756 python-rtslib bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rtslib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-rtslib-2.1.75-4.el8.noarch.rpm d60cd075dbaf1d38752921078ed51980f4f8e1514fcd858de9f30d2dccffe397 target-restore-2.1.75-4.el8.noarch.rpm fd3ee14675eb7b215e5ec44ed958fbe2647eaf9615fc348ece11375ebaa99b85 RLBA-2022:7757 sg3_utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sg3_utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms sg3_utils-1.44-6.el8.aarch64.rpm 7acaa63a419d3459c20ae077812d0c90d9a8d65eb6f29ae1dbbab62a5bf3b7d4 sg3_utils-libs-1.44-6.el8.aarch64.rpm 10cb2a71a204b51722f393b571f1e2cb1be5e7fb748a8904a9d0c973fe2273d5 RLBA-2022:7758 coreutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for coreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms coreutils-8.30-13.el8.aarch64.rpm 46023daf2614bb5c6854b4437d80865d146818c2809ab148723f04f00404bd11 coreutils-common-8.30-13.el8.aarch64.rpm 249f34a8e5818881ab99cc2ba04190e1736069fa8554acab5b835acf0c58bbca coreutils-single-8.30-13.el8.aarch64.rpm f90b171face4602d82296ad88c6b1b0fab26e76503a9125e7e7e4b70aa76b1e2 RLBA-2022:7759 dnf-plugins-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm f289b75df81b2d9ad9933b59b05c546239d3def15d0ee3182b9e9bdfda0ca34f python3-dnf-plugin-post-transaction-actions-4.0.21-14.1.el8.noarch.rpm 32c2dfc400c7c6e21792d9409b37aca81ab3577e611873017df164f505d1c8e9 python3-dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm 3ea9ee75f9402e4d86a5b21828a0a49e933508de2b60ae2803eb7bfbd7d31b21 python3-dnf-plugin-versionlock-4.0.21-14.1.el8.noarch.rpm e3b7dd311d9d0cc78f7aa964edf8e0a8cbe482dd58c82279b55486daf009d973 yum-utils-4.0.21-14.1.el8.noarch.rpm 8250e9f58056269892bcad80f19fa592c670e47a047082892e452f9b5ea91169 RLBA-2022:7760 ndctl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ndctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms daxctl-71.1-4.el8.aarch64.rpm 7ec9c82419c6d19f63ef48b0e5908a114a9d9d8e1af0d27776418e2035e5258d daxctl-libs-71.1-4.el8.aarch64.rpm 6e29f6d57950ca242ceee01ab0aadce1b8bad7bf6a230ad032030be892768eda ndctl-71.1-4.el8.aarch64.rpm cc988032ab22cee018d018b1f8fe7d8a45fdb9c76e44e4297bf51dd73008484e ndctl-libs-71.1-4.el8.aarch64.rpm 1178f34b89ccb8f820d01df308eba4feb9f9c4143e40e74f690562e0e6b3e2f1 RLBA-2022:7761 fuse bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms fuse-2.9.7-16.el8.aarch64.rpm b1be35d06c89612fab22faf58fb478aa5f9ebd5664122b158c949c40c57d32f8 fuse3-3.3.0-16.el8.aarch64.rpm 8b9f65dd804ee6952bb71f9eb65f3a42e6012db93572d620b078b6a2b861611d fuse3-devel-3.3.0-16.el8.aarch64.rpm a8f488e5d53caaaf1a83cae1c0cce87efd4ce8225c836e6c510f629b2f1d1ced fuse3-libs-3.3.0-16.el8.aarch64.rpm df689a9c829991499c43dd10f2bbd84fd656d957e268b430c15433d2e98bb39f fuse-common-3.3.0-16.el8.aarch64.rpm 25817e5c4d65dce7b310479a1577d0483f61ffa2f961c22186ffdc635f43fef0 fuse-devel-2.9.7-16.el8.aarch64.rpm 7cc3957c7a4d5ef7e0a6cd0dfa6ab7bdeaa8b1cc618a6e2daf7bfec225b718b0 fuse-libs-2.9.7-16.el8.aarch64.rpm 392a9ebe5f882f4c36b91b5786b9a0bc7d747b0f7331c2bd96d209fb23b9c669 RLBA-2022:7762 hwdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms hwdata-0.314-8.14.el8.noarch.rpm f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343 RLBA-2022:7763 openssh bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms openssh-8.0p1-16.el8.aarch64.rpm 9ea64cc540a49ae272ed532ce8922a6a4bbcb5cf817d07f4295e03ebb67d0a07 openssh-cavs-8.0p1-16.el8.aarch64.rpm 538679ddaa17f9ab0df40bd3c473369c215a6a1bbd51f070bb0ff31f29f6f586 openssh-clients-8.0p1-16.el8.aarch64.rpm e7f498c1115f571341ecdd0a78072a61ca3b82456dec9dffac6c1571c387280b openssh-keycat-8.0p1-16.el8.aarch64.rpm 76734e5e6391c34ec2fa2176fc87962bc92d55d26a770522b4d68a5fc025b07f openssh-ldap-8.0p1-16.el8.aarch64.rpm 371a21f8ddd7698cfb7ef40e6dbbdb166a961649bc63a5aa3b2e4d23a2b18598 openssh-server-8.0p1-16.el8.aarch64.rpm b991c98b9f8cc22a7b79fb6ec89fc23b6b9be016fb53f5b53e9d34345d4e5e6f pam_ssh_agent_auth-0.10.3-7.16.el8.aarch64.rpm 1d6fce8d5f0adb8fd8d47247c593d7a09214903ac445894c221c7fa348443d24 RLBA-2022:7764 kpatch bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kpatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kpatch-0.9.4-3.el8.noarch.rpm f015d9416b817158f4ebec7c421dfa4c3966e1226934aa621291ae5e6ba14f3b kpatch-dnf-0.4-3.el8.noarch.rpm 37135ce718031624a4e063a1279bcd8961fe8672f9aa31d735400e1e96f747bf RLBA-2022:7765 ethtool bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ethtool-5.13-2.el8.aarch64.rpm 534bb57d24f7aa2da23197a8b38715970be11ea7c5a7f1e284bbf88475a45267 RLBA-2022:7767 libbpf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbpf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libbpf-0.5.0-1.el8.aarch64.rpm ad7cb1bbc34647c0680451ed9467790766b0e1433d0de29c830c602d9bd94eb0 RLBA-2022:7768 nfs-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libnfsidmap-2.3.3-57.el8.aarch64.rpm bfbd77bc5e93d17ad3bcd4debc9e03c8273df29fca6ffaa123a017e4fc262f01 nfs-utils-2.3.3-57.el8.aarch64.rpm a77e705a6de7417e92def62209d41ff1071fd8bdf3305b5c0f2b3d82e670994a RLBA-2022:7769 dbus bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dbus-1.12.8-23.el8.aarch64.rpm 56943f4d010328992a964ea62efe7a3e8e59b349f9acc49fa8f7164fc6977a7b dbus-common-1.12.8-23.el8.noarch.rpm 58d1cd7b3c07140cc19a76f6d548bbdd99ff5917de84efd15693bca0561e8cb5 dbus-daemon-1.12.8-23.el8.aarch64.rpm 70575113a295243c480e375f6e14127803ba0570c8289ceafcc4b19251438f7f dbus-libs-1.12.8-23.el8.aarch64.rpm e9173f6df4b19e672d97a0b443706af370df5c81df1a0f78e9226e538c7e9547 dbus-tools-1.12.8-23.el8.aarch64.rpm d0574605c91490fc6027ee40813cdb3a02576cb2d02452fec6fd39593f0f84ee RLBA-2022:7770 tar bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tar-1.30-6.el8.aarch64.rpm 0a2b06b2d86a366d7e738e58269ee3e2866407ca57f6ef0bf98bbe544d018363 RLBA-2022:7771 device-mapper-persistent-data bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-persistent-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms device-mapper-persistent-data-0.9.0-7.el8.aarch64.rpm a5964a029ab2e25d05b8664209864ba6a7197d5eb3927f89be20d8271fc85ae8 RLBA-2022:7772 smc-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms smc-tools-1.8.1-1.gitbbf7e8c.el8.aarch64.rpm 7cf456c583d8d8dc1ac50300c867fe3e37367b3e1d0e94da4f66db55c328849f RLBA-2022:7773 setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms setup-2.12.2-7.el8.noarch.rpm e470141a5e3db486e3c26d6d071677489888b09e703093d3f59e22e30b92e155 RLBA-2022:7774 sanlock bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms sanlock-lib-3.8.4-4.el8.aarch64.rpm 71fe1aa717fc05ef342377a0dfd5b7e7aca648e7a10412d415688a34281f38e7 RLBA-2022:7775 libnl3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnl3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libnl3-3.7.0-1.el8.aarch64.rpm 0110c7329976d152551a79b498b728d98ec4c79ec7dac05b32ab788ad47c6a6b libnl3-cli-3.7.0-1.el8.aarch64.rpm 1ec8ea11a547686cea0513699d68e110515ee25e54e2336d8bf796d703c1fbe4 libnl3-devel-3.7.0-1.el8.aarch64.rpm 58395d42ada00b14c764ba7ff850b04ca2d253f5b6a1c3b10063d53c31b7aaaf libnl3-doc-3.7.0-1.el8.aarch64.rpm ec52fd6fdfd1a32373536649082396350645ff0f00d802d805639d3a326b3e63 python3-libnl3-3.7.0-1.el8.aarch64.rpm 6e40fab42b4cfe8dbd1b1a7223a4b2beef8594bc9909a3a60763a49537e50b93 RLBA-2022:7776 libverto bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libverto. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libverto-0.3.2-2.el8.aarch64.rpm e4ddc4cd25f70d80627e43a09ac1ad358910f1ea99404e429dcef457951ebebb libverto-devel-0.3.2-2.el8.aarch64.rpm 971b5295750d252cbaf71e7c31a5157d50bb2546a0e2318b3c860bc71a5164d6 libverto-libevent-0.3.2-2.el8.aarch64.rpm a9ac9a7a67ce7dd2d32e77964365a981248d6f72c4aa37a79d385c96ac50a4ef RLBA-2022:7778 kmod-kvdo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo, vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kmod-kvdo-6.2.7.17-87.el8.aarch64.rpm 2a9564faab4bcca5d511660bb9af1819e140a0165de49ac6e39a876dbb7c8686 vdo-6.2.7.17-14.el8.aarch64.rpm 7dcf1ae56f5e6eee746cb4bbfa7811d3d3496cc28c99498940091b8c7e1e4ddf vdo-support-6.2.7.17-14.el8.aarch64.rpm 9f8749bf98a1148a38479985f948d7885a1abeb01306645064c1e1ef10aec100 RLBA-2022:7779 curl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms curl-7.61.1-25.el8.aarch64.rpm b981fef665f0332215e318f26ae24dd098bef5091fdc5ec809028a18325ed21d libcurl-7.61.1-25.el8.aarch64.rpm 63d5e3a1a5d5b238bc2712398ccef5c0727caea70041304a826fb7d8edb78231 libcurl-devel-7.61.1-25.el8.aarch64.rpm f3d4056277d05ad21033f82deef468ec1a7e717ee7ffd4e5853bcf60d05f9145 libcurl-minimal-7.61.1-25.el8.aarch64.rpm 6a4435ed437d24f5ec3257711ca275598cd8265516a405a0e262d40356bdc556 RLBA-2022:7780 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms librepo-1.14.2-3.el8.aarch64.rpm 816c1e1d3f912812a2eed48fcca9712653353ad20f515d83e280f07a2d83eba9 python3-librepo-1.14.2-3.el8.aarch64.rpm 97a6171af3eae2ccae633ae990b527c76595b4b7e91f9c0f971a506f74447dac RLBA-2022:7781 gdbm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdbm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gdbm-1.18-2.el8.aarch64.rpm 889c94613424f05568f5a8168f6900b0892de4deb1e5f0b7b92d05092343faac gdbm-devel-1.18-2.el8.aarch64.rpm fe9b81519d961d73ce03b29e7f5cf2e1b11cc37228a389c1c370308d8828e56d gdbm-libs-1.18-2.el8.aarch64.rpm 757a7b77239d690b9ec7dc2c9ece601f68937dc3c32d52024437fb8a9ff85b8d RLEA-2022:7782 strace bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms strace-5.18-2.el8.aarch64.rpm 4cf10ded21ce208ae40b96c3d5a076a79d3ba7818662e941154d4a80858764c8 RLBA-2022:7783 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libblkid-2.32.1-38.el8.aarch64.rpm 2489ce02f28396bed800e976286b5ef854a9a8ed288003b99202fa0af6b06cd7 libblkid-devel-2.32.1-38.el8.aarch64.rpm 048c10225569da196929f33e2cac1cf16c612356cd5aa8984800b6000ae71c37 libfdisk-2.32.1-38.el8.aarch64.rpm 6742e311f7c77cd63e2b9227c5f658bcaa11d07dc293a99de1c56bdd882a00b4 libfdisk-devel-2.32.1-38.el8.aarch64.rpm 7e637b48786aa587a1504d1775a4afd6b2a171659ad67e65afc14dd7f954945c libmount-2.32.1-38.el8.aarch64.rpm c6881554fe953e87f7b1912ac1fbe52f3c93dc7ce724013f2a3a589e35ed621c libsmartcols-2.32.1-38.el8.aarch64.rpm bfad837820729e47016f1025b1d76e7571e63d804599a26daae09f263929306e libsmartcols-devel-2.32.1-38.el8.aarch64.rpm 28c6f2448776e6e6e9a18b679297747a5b4f8e9439bec2b53b4cab2ff6dbd6e1 libuuid-2.32.1-38.el8.aarch64.rpm 5be535b4fbadfcbc44ea07dda43ddb05ecea440fc9cf4dd539cf2a6fe39074ee libuuid-devel-2.32.1-38.el8.aarch64.rpm 094be6c5eaf6306611ed102f35c8a3909f75f048479448cb1152ad81fd0bd67b util-linux-2.32.1-38.el8.aarch64.rpm 16c074c6d64a4479a0942a45354a80ff24ae5223bcb27dd5f06bd613739f5396 util-linux-user-2.32.1-38.el8.aarch64.rpm 901c19733abbe6718ed84b3f10cb4b233f06d6d5ff90779433039a122641f459 uuidd-2.32.1-38.el8.aarch64.rpm 1354f36641bc85fd1bf256f0431220fca9d7ca979818d8e969601118ec47e64e RLBA-2022:7785 nvme-cli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvme-cli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms nvme-cli-1.16-5.el8.aarch64.rpm fd583fd32a66673a420f80629ba4dc7de33b2895804658b339909f9adc2731e5 RLBA-2022:7786 libselinux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libselinux-2.9-6.el8.aarch64.rpm abc20d7c41df771da4e5b3f813d41585b7feaf840c70e4979ecfd8127f79b234 libselinux-devel-2.9-6.el8.aarch64.rpm 3af85183bd8b03b2367246aa080cde19637d94af82cc8094d6aa0e48b22a69b4 libselinux-utils-2.9-6.el8.aarch64.rpm 341b79e728ede7478f96a51f04cfe1daaeafd063ad6f9ebc592c19e1ffc6ac71 python3-libselinux-2.9-6.el8.aarch64.rpm 4b38a482781e27998320ef7bc889b13aac52774be8d59b88b7032d106ba1c603 RLBA-2022:7787 irqbalance bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for irqbalance. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms irqbalance-1.9.0-3.el8.aarch64.rpm aa50e055b1660c675166197934f15167f8e77811e20bac2e2c211c824ad95d66 RLBA-2022:7788 libarchive bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libarchive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms bsdtar-3.3.3-4.el8.aarch64.rpm 6829b3a8dfe3a6ae92802ec1b93deb3d01279faf3cf241639212e653b88021e3 libarchive-3.3.3-4.el8.aarch64.rpm 21de63ec3b04e67e1a8536436d16f4ed24bfc052c253da53b3d34dcdd8bf299f RLBA-2022:7789 dhcp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dhcp-client-4.3.6-48.el8.aarch64.rpm f6793a29d011272eedcb62e07e8475412d93edf8ff9882be3b651ec6a36ad58f dhcp-common-4.3.6-48.el8.noarch.rpm e13712a0dfd2a88079f47a1507913848a61e238fc82e60d20c863c7a1594124f dhcp-libs-4.3.6-48.el8.aarch64.rpm 79b00b8cab75ca7c99d386492d1129c014cdef0515b47b8a6d6b81829e89f190 dhcp-relay-4.3.6-48.el8.aarch64.rpm 43fb3b568c1a3e91e42ae863564c848766029cd1a320aaf5d363283b94c6ce32 dhcp-server-4.3.6-48.el8.aarch64.rpm 15f4f6e846b61c04c02a00bfbbea6f4c8aee0a37868ef25d90cebabb91237b1b RLBA-2022:7792 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms device-mapper-1.02.181-6.el8.aarch64.rpm 515cbe27579d14f8a377f831252d8a76db713eda53c218290c9b63700026a553 device-mapper-event-1.02.181-6.el8.aarch64.rpm 039633cca65cd6723eef9e0353d2c3fd802cc8bd0cb34958995ce78c16db2dc1 device-mapper-event-libs-1.02.181-6.el8.aarch64.rpm 891aff3102389366ce85444ca82fed2413d629f636eaf55292d2046de5a0565f device-mapper-libs-1.02.181-6.el8.aarch64.rpm bbe4b5da4c8ab61bf63ad4e39aac6c6c241ba57f1722ada1e9fd8ccbe59327b1 lvm2-2.03.14-6.el8.aarch64.rpm 856c9752842a3f064f59f91aa7dec45c121af084990a0f4e8e26cebaac66903f lvm2-dbusd-2.03.14-6.el8.noarch.rpm 2c066ef7fb9501e667b432d9a0d6dd02d4f161695de7bbd3e66530a654621db5 lvm2-libs-2.03.14-6.el8.aarch64.rpm 6820fd510e4ee4dd30cd6926ba970bf0d63300737bda3f6c2ee49ed604fa1aee lvm2-lockd-2.03.14-6.el8.aarch64.rpm b53869e35c12881cca41e8953b4cc976d3b9b2ea6a2b764e458f0ca7e7b570c1 RLSA-2022:7793 Moderate: rsync security and enhancement update The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms rsync-3.1.3-19.el8.aarch64.rpm 591c18962c35b9d5564181cc09987b1ed99535fb634adc4b8ce28fcf2e83f4da rsync-daemon-3.1.3-19.el8.noarch.rpm 3c1e198412a68878c3ce5e1c516ba4b700a0eda6ee00e63eaace2e467b5b0edb RLBA-2022:7794 shadow-utils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shadow-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms shadow-utils-4.6-17.el8.aarch64.rpm 187aaa6bae4b09ee63b160fa85ab9b531b0b0dc43c882c61c9dfe9f764b4982e shadow-utils-subid-4.6-17.el8.aarch64.rpm 317c754af1dab336c0e45c69e3ba472522d9715c86795e9de85766b41c597eb0 RLBA-2022:7795 gssproxy bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gssproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms gssproxy-0.8.0-21.el8.aarch64.rpm b39ab6ed779c99afc8dba0bc4c1772a3acbea2cb6318c60fa1b709ae98afbaaa RLBA-2022:7796 iptables bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iptables-1.8.4-23.el8.aarch64.rpm ea4636ee30470cb685f02f9c2165d41562c628c9d0887094903e727317cb29a6 iptables-arptables-1.8.4-23.el8.aarch64.rpm 980b29a6e0045becc7a960bbf071f60a017218ccb6d45bcfa517920ab0ab25d3 iptables-devel-1.8.4-23.el8.aarch64.rpm 92481bd559ba60fedbbf752efb9ebe15cf71e594ea3377bc99ad1ef9eb99fcba iptables-ebtables-1.8.4-23.el8.aarch64.rpm d4299317548f9659f529d91cf5d418691f818fb058ed7cbdda25047b95baf50a iptables-libs-1.8.4-23.el8.aarch64.rpm 0a515e48c4015665e1a868ca90594a3b7fa3437867b95cd7edb25ff6caefdd86 iptables-services-1.8.4-23.el8.aarch64.rpm 4dbff8f4b10a001201e773651f3d5d7750edbad3729cf128a9b8907168ac9049 iptables-utils-1.8.4-23.el8.aarch64.rpm 06206477593450e0b3270b6708d22f54f2e97660c954c55d3a0ccc8750633c17 RLEA-2022:7797 RDMA stack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ibacm-41.0-1.el8.aarch64.rpm 8bad7001d372091b664334b96669c4f9d051b3439a84fdc8e2e0eddff7652d56 infiniband-diags-41.0-1.el8.aarch64.rpm 6825b589b848f389000fd87b9c0c3d965d2b89316efab1ec40c99c3b34a68124 iwpmd-41.0-1.el8.aarch64.rpm 7dee8b2c5412f833adb8dd6115f41a80c1afde3af353859ee47189d689c6e309 libfabric-1.15.1-1.el8.aarch64.rpm c7c5ed9507fbaaa921a292471284d6c7ca1d9edb1873944a44cd9213da8ccfde libibumad-41.0-1.el8.aarch64.rpm ceaa9fa02db3af0eaa46fd33101ad480542d483119eb9b29e1956613cbcbaab0 libibverbs-41.0-1.el8.aarch64.rpm 600252f17726e48d5b93ba9548ef639f6a5629de602eb2c2fbf835bd5d138e3b libibverbs-utils-41.0-1.el8.aarch64.rpm e908cb170dbb423bfdc1c347806485158350379492ebaac93fb3c77dd2d4e04a librdmacm-41.0-1.el8.aarch64.rpm ec9d80f841424b7cd6cf28c98d28cdac779e9297d42485f5f208524e5716b75e librdmacm-utils-41.0-1.el8.aarch64.rpm 31a6c495a58913bc01acf604668e071b69b1cd1bcc3e19410989cab9b23dce7d python3-pyverbs-41.0-1.el8.aarch64.rpm 00d5c9ad9227845f597350d61330638f9f57ef4e2a9ce7725d6ddce93bd497c4 rdma-core-41.0-1.el8.aarch64.rpm 73fe93d3bb9762f48ab2a2295f81cb1734deca41a949011d6492c592842920f7 rdma-core-devel-41.0-1.el8.aarch64.rpm 83d6593fcb1ce9a8fa06cfc606eedc680b00c15386f5112de8b8f85b86c288b5 srp_daemon-41.0-1.el8.aarch64.rpm ef722e8554180bc7d2d7ebf6edbe176515a120aaeb58cb1b0b4810fcefb0db7c RLBA-2022:7798 initscripts bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for initscripts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms initscripts-10.00.18-1.el8.aarch64.rpm 83b6e124ea1c18f5f5a865f31d695ef5d387ae6d54fe644b909ed9874aebde94 netconsole-service-10.00.18-1.el8.noarch.rpm 01a0b14c2c9286a8dddb8b86d432c0319feccbfbfd26c9e5a11aac1513d7aa6d network-scripts-10.00.18-1.el8.aarch64.rpm 9997e7585dad04a4e59cee16b2d7cb5717d94092da2d1b42bf6a6a949f889183 readonly-root-10.00.18-1.el8.noarch.rpm cdc79cf85b3769685f257187953ec57a5aa8bbd06dde1e28b832acbb5a5a2f22 RLBA-2022:7799 grubby bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grubby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms grubby-8.40-47.el8.aarch64.rpm 9856a74869e8e425d8ca10d7bb59958d8db6e92f13178f6af36cf026afc82b6f RLBA-2022:7800 tpm2-abrmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-abrmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tpm2-abrmd-2.3.3-3.el8.aarch64.rpm 94a8b87f04c645e09ac27faa23b328cc76346ed77388edc4bf42a63453e692c5 RLBA-2022:7801 memstrack bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memstrack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms memstrack-0.2.4-2.el8.aarch64.rpm c090b2fe7d1c23cf103d742b62308e3c002e209b88a9f8d4133fada6ffb8269a RLBA-2022:7802 liblockfile bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liblockfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms liblockfile-1.14-2.el8.aarch64.rpm 835821b7de4c2f2603673eef08fb6f548be9c25ad24e8d856aeebff7cceb837a RLBA-2022:7803 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtalloc-2.3.3-2.el8.aarch64.rpm ea31361d31c2329490ae00cee863a1879914c07259004f273a0b78d855f2f20f libtalloc-devel-2.3.3-2.el8.aarch64.rpm 60f064adf01c4ae1a72c84116f61b312ef8581a4b78cdb6edae54e0313c2e474 python3-talloc-2.3.3-2.el8.aarch64.rpm 4f7170d927e91ef492f5588716e33af1733b5b02691947ec3e6537c9d1866cc9 RLBA-2022:7804 libsemanage bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libsemanage-2.9-9.el8.aarch64.rpm 42c73e3fd94d62928882f6defbb0d78759c80f54971b161c2725ce1b3af61fc9 python3-libsemanage-2.9-9.el8.aarch64.rpm 5cd9a3d2868464a09b6d4c8c8d546ecaf628192c8207aa72b53e7eacf6b17f2d RLBA-2022:7805 policycoreutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms policycoreutils-2.9-20.el8.aarch64.rpm a07a3a903174b35c7a9b0dae691a9d4a312133704cbede54e0fbfa3f80d0886d policycoreutils-dbus-2.9-20.el8.noarch.rpm 7469bfbae4fe7597b05e5bf0af996be891c0603a2d20b2efa793b47bd850ca98 policycoreutils-devel-2.9-20.el8.aarch64.rpm 7b112f4172a4f47fa331104b75069cccc990d2dd2a8b712d6791aef7b579a508 policycoreutils-newrole-2.9-20.el8.aarch64.rpm b219134008e8ea15a8ce065d00f6dc8cf191033cf77649d72ffe1d44751498ce policycoreutils-python-utils-2.9-20.el8.noarch.rpm 4f48c6d787965dec6db81f43a20279aa0aa246002c02afa4ec719155890a0423 policycoreutils-restorecond-2.9-20.el8.aarch64.rpm d75520cd2c6a0ae242902fa8b1ffdf613472031fd31a67716b28875eb90f4823 python3-policycoreutils-2.9-20.el8.noarch.rpm 601dd458e26f2a412f2c7d0a9feffbc5f0bdbb2835186ba5880a6640d731868b RLBA-2022:7806 syslinux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for syslinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms syslinux-tftpboot-6.04-6.el8.noarch.rpm 25ec61fb83f952c8d40fc9309126a9f37ad7acfe4f49ea4cce93757dd1288cc6 RLBA-2022:7807 lldpad bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lldpad. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms lldpad-1.0.1-19.git036e314.el8.aarch64.rpm 0506cb59eb2a04c36f84949d4585cfb41f5b711ba43b99fdee7f57b41b39da59 RLBA-2022:7808 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms file-5.33-21.el8.aarch64.rpm ec2d75e6920a192aaa15470df68d22a74c2419a1cf3e169ebd1c4bb8ac009598 file-libs-5.33-21.el8.aarch64.rpm 61821e076c7a20df3e4c68cd37d22605c94552d6031ce2fb04d3bdf739d315bd python3-magic-5.33-21.el8.noarch.rpm f2d3628e48e4c8a3e869939665ad34a0174deddd88e2544f1a203f19e0132d6a RLBA-2022:7809 libpwquality bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpwquality. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libpwquality-1.4.4-5.el8.aarch64.rpm 27f75248d473950ed6354f814ffc5538c678d82b611ffd32b4ce12066ca1f564 python3-pwquality-1.4.4-5.el8.aarch64.rpm 918b6c99f9f88e9307988b72ac9687d35d6adaef266152359e09b919ddb4ceed RLBA-2022:7819 rpm bug fix and enhancement update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) rocky-linux-8-aarch64-baseos-rpms python3-rpm-4.14.3-24.el8_7.aarch64.rpm c9927c97d69913572bb7ff3a695c329ba023a92dc37eec864cee2b188025f7f9 rpm-4.14.3-24.el8_7.aarch64.rpm 0d0117a179a20abc617a4a47473f757ab55696a4d89413718dc65c0b1c0d6fab rpm-apidocs-4.14.3-24.el8_7.noarch.rpm a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b rpm-build-libs-4.14.3-24.el8_7.aarch64.rpm b5c2b41fb6f91def661b1684cd142586a634b89fd7a007cd66206e170eecd9fe rpm-cron-4.14.3-24.el8_7.noarch.rpm b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f rpm-devel-4.14.3-24.el8_7.aarch64.rpm 6cdd4b81da7a942c9421e6294a831d2ff76679b1fc914be7c1e81fefb22fdd3d rpm-libs-4.14.3-24.el8_7.aarch64.rpm 4e6f21d79a5363e24486e75cd7bdaca1b280ac3dfc67ad53eb4e518e49b5c274 rpm-plugin-ima-4.14.3-24.el8_7.aarch64.rpm 7cee4cfd57f17ebdcf01ea3575d1cdbd796978154f39a62c399865ea062e63f1 rpm-plugin-prioreset-4.14.3-24.el8_7.aarch64.rpm deb2fd79b798f3de854fe81a6e7229db694a8d58b671a91ba5aefa2cc583d209 rpm-plugin-selinux-4.14.3-24.el8_7.aarch64.rpm 42970eaedf7385ec475ba67126ab37c2579d3e03525c8ed4a42ed37b20623f89 rpm-plugin-syslog-4.14.3-24.el8_7.aarch64.rpm 9e254538db70708897180623b4a6631b03d4b10eabb4097378527215682f1e2d rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.aarch64.rpm 22cfd5523cab528991fabb2c5d32179288498d05e600b9e9e7060fb8f232ccd4 rpm-sign-4.14.3-24.el8_7.aarch64.rpm 3395b5e2eeac8bec0930f4ce95fbe163923c768545da2b829e8f868744a806b4 RLBA-2022:7825 bind bug fix and enhancement update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) rocky-linux-8-aarch64-baseos-rpms bind-export-devel-9.11.36-5.el8_7.2.aarch64.rpm cac036e9f739d175ccfe317187447784e04bfd1382f0172b148e0db682b30865 bind-export-libs-9.11.36-5.el8_7.2.aarch64.rpm 744eb1121a493e66cdb806b7d92c94b75a261740adf56933a3080487e906abf1 RLBA-2022:7828 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) rocky-linux-8-aarch64-baseos-rpms NetworkManager-1.40.0-2.el8_7.aarch64.rpm 49a6fb399dcb2ba9420c7944744a928e8ebfe51a3afbbb5733c96cc5cb41dadd NetworkManager-adsl-1.40.0-2.el8_7.aarch64.rpm ac0afddca496fb033aea5e6d11d6a6cb235910d33947e0fea905cc0a3c413f81 NetworkManager-bluetooth-1.40.0-2.el8_7.aarch64.rpm 8ac05b97b0ebad7754151062a785c082a0c0c0502a968a690f04098dec2424eb NetworkManager-config-connectivity-redhat-1.40.0-2.el8_7.noarch.rpm be319eb37936b7a8d6e4d5b5bd42e0fe336b107ce90c36bdd4d42cfaea003e7a NetworkManager-config-server-1.40.0-2.el8_7.noarch.rpm 6e046436cc56ab9f86369ac70d9450227b31eecb9c9f8bd913b64b8987dcf1f0 NetworkManager-dispatcher-routing-rules-1.40.0-2.el8_7.noarch.rpm 195a4a4a8ddcd55676d48c91959b6341c437d274cc3aaf0a0555add408df8dcd NetworkManager-initscripts-updown-1.40.0-2.el8_7.noarch.rpm cda38500bd87db0d35acbce54b4272d1510cd0bfa02c646c83fcdcb48f0fa2e7 NetworkManager-libnm-1.40.0-2.el8_7.aarch64.rpm 5595236eb31ef1028858cd825a5fbbfbdaa36e1256d43d7ff4a1d49a5a0a705d NetworkManager-ovs-1.40.0-2.el8_7.aarch64.rpm fb8b07d819cfcdd4df0e3aad6f1b9482271b30bbba88d6aa15c778be292557d8 NetworkManager-ppp-1.40.0-2.el8_7.aarch64.rpm 64d0f3182e92ce09197115c5afc46ffaedab279b283d136d3b6a5195b14522e1 NetworkManager-team-1.40.0-2.el8_7.aarch64.rpm cb5f174003ab5ad3428f8b57cb38465906b518f5b7e99c0e24d6f95fb942cc52 NetworkManager-tui-1.40.0-2.el8_7.aarch64.rpm 43a677ff990358b1f3b430ceac9668ce96cdbd9049de0c1c20471bc7abbe1bde NetworkManager-wifi-1.40.0-2.el8_7.aarch64.rpm 1d101e117eb02f6c138ab24b7126532e49258f0aed599d7357750e65b12890eb NetworkManager-wwan-1.40.0-2.el8_7.aarch64.rpm 1ac43fd29c0cae8fcc91421d369ec0f6eda1a8cb34969855cf3efb097abb9939 RLBA-2022:7829 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) rocky-linux-8-aarch64-baseos-rpms libipa_hbac-2.7.3-4.el8_7.1.aarch64.rpm f6ca2b24f0094be6e8d8f1bb1400989c7bb09ceada8343d4e81294bc404a8278 libsss_autofs-2.7.3-4.el8_7.1.aarch64.rpm 8988f55f5f17c81049b97f280d8745f88491bf9a82e83465028c90ca89125d15 libsss_certmap-2.7.3-4.el8_7.1.aarch64.rpm a9454aaa161abdac527c120ddc2e4c08a80407004f4eb7697afff9b7f1b3b452 libsss_idmap-2.7.3-4.el8_7.1.aarch64.rpm a1ee51f3874cf52d1c9d5bc4d6b17afd98bfc779220d856a483876f543cdd41f libsss_nss_idmap-2.7.3-4.el8_7.1.aarch64.rpm f5f688cdbc09bfb23fb13b086113df23d3977676ad1c6af2828c03040cbab3d5 libsss_simpleifp-2.7.3-4.el8_7.1.aarch64.rpm ee7a2cf5e9f157944b7c6f710f4b3555ddba1b164aa2cba35a49a0be992a0a0c libsss_sudo-2.7.3-4.el8_7.1.aarch64.rpm 38b1770a78bbfcc1e3dceb89b0c84c1e60d339f235189881bd46214749c03a6d python3-libipa_hbac-2.7.3-4.el8_7.1.aarch64.rpm 0256a0d370205f1342febe2316bc8374f106d55336a34ee22a71f9b91d91486a python3-libsss_nss_idmap-2.7.3-4.el8_7.1.aarch64.rpm 6d5ca0b568fee971d5ba0e228e00f710bd4f02480b71503c7989856707e9b40d python3-sss-2.7.3-4.el8_7.1.aarch64.rpm b2075424a1ae98c819326d6ca212bafa6d4de2fb0071d8f6aade9a52917fe04d python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm 6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c python3-sss-murmur-2.7.3-4.el8_7.1.aarch64.rpm e4589d466fe5b91f31af1133764d188b9ac7dec579e896efbeedc81f4f160055 sssd-2.7.3-4.el8_7.1.aarch64.rpm 53b9778e7f74b30592a792ee307223c152ae8b54a781983e43df0396b755a24d sssd-ad-2.7.3-4.el8_7.1.aarch64.rpm e1f9df087cb16869a4802174b5bcc8e4a1d078e1f1705c119fd3e96bbbba0d09 sssd-client-2.7.3-4.el8_7.1.aarch64.rpm 41549ade31322026fa9727f97616ce6d6d97060e22d7aa6313a2f0ccfb574de5 sssd-common-2.7.3-4.el8_7.1.aarch64.rpm 901e447910ccd0a2de3b87b6c214f0d59e90af84a9f509c05d2d2c1e2846d50d sssd-common-pac-2.7.3-4.el8_7.1.aarch64.rpm 3ae9235f551fa5b3a60f3402bc45adbfd0cf25f3446b4b8b1a773c2414fb20db sssd-dbus-2.7.3-4.el8_7.1.aarch64.rpm 6fdf3e565cc091c308b5e9c93ead29304999c2daa293eafbe3191e770b30568c sssd-ipa-2.7.3-4.el8_7.1.aarch64.rpm 97c0610f3d7b7ba7ecfa9f9f235abac8c1dcf207ba14d42b242083c2deb0c3c7 sssd-kcm-2.7.3-4.el8_7.1.aarch64.rpm f14e314cdf3c8219686dcb63fecb701fb908243c3f11f39b17233a55cb2b8877 sssd-krb5-2.7.3-4.el8_7.1.aarch64.rpm 183067a7111c75c935f6f1a3169ad498b3f56cad2b34f8fde63e06c67d5c0743 sssd-krb5-common-2.7.3-4.el8_7.1.aarch64.rpm a0b2344f398c259b58a689c41a05090e0f6fd0c441228eaca08bc03ba967f6c0 sssd-ldap-2.7.3-4.el8_7.1.aarch64.rpm 71d6b994645253eaba4e6566a2fb3938dd072d2a3d3b250c58b27b56ce5cf368 sssd-nfs-idmap-2.7.3-4.el8_7.1.aarch64.rpm 3122023820615f39f71aa8cab46fb0d366877c9a8b2674c54847b0ccf024a710 sssd-polkit-rules-2.7.3-4.el8_7.1.aarch64.rpm 4e39328478a67acc3d3df1ed01729c8ad3f643866057cd43e72657dc6cc157f5 sssd-proxy-2.7.3-4.el8_7.1.aarch64.rpm 97a736d8a1b73b1b5d25d357256e787a227177a91aafdf28eaed2a02a1b1ae0a sssd-tools-2.7.3-4.el8_7.1.aarch64.rpm 08edbdecee4de860ae28e94fd11903411d226c5512849ec5dfebdb523fb68fea sssd-winbind-idmap-2.7.3-4.el8_7.1.aarch64.rpm e555c731c11ad6807d8c413a4323d7fa8dde9b7d85f9241aaffeb9083887f91d RLBA-2022:7884 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). rocky-linux-8-aarch64-baseos-rpms tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 RLSA-2022:7928 Important: device-mapper-multipath security update The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Security Fix(es): * device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Security Fix(es): * device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms device-mapper-multipath-0.8.4-28.el8_7.1.aarch64.rpm 477bf33d56141e0517a23bbe4d9662e82744726ba2793f5089c95f33c9d283bc device-mapper-multipath-libs-0.8.4-28.el8_7.1.aarch64.rpm 8d5b36bc9f026200b5cb9373e7dceef4d7444c5f0781b121be0321b66009c01c kpartx-0.8.4-28.el8_7.1.aarch64.rpm 32a9a90c06230f4ad7f5e7658328f13f6cf05e36bdd2cc950a64940011f09c18 libdmmp-0.8.4-28.el8_7.1.aarch64.rpm c0c755af7e4910eb12963fe0d7a02b747fe955e516de57e615708bdc869ac016 RLSA-2022:8638 Important: krb5 security update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms krb5-devel-1.18.2-22.el8_7.aarch64.rpm 8aa75ec82a78ea65708116e3d1028eda74d74aa61513398a2c4b73dfefde5316 krb5-libs-1.18.2-22.el8_7.aarch64.rpm a8f2a13bc353e9989d1ad3ae184def628941e5b1446267a407df86a06a0a60d3 krb5-pkinit-1.18.2-22.el8_7.aarch64.rpm a505df104fbfc55047b1688cac3f5166aa9202b9cb2596ab786b120a70602a8e krb5-server-1.18.2-22.el8_7.aarch64.rpm a1d7bd77da87c20b01a0d0f1aa26e7cb01364ca0b9cf6f66f10baa06d13d76c3 krb5-server-ldap-1.18.2-22.el8_7.aarch64.rpm 956f90647a936a6e7effef18207ede991b82b934d301fc58c5514170fbbff859 krb5-workstation-1.18.2-22.el8_7.aarch64.rpm f4599c52ccce9bd4bb17868d7cfa05798760c982c407442b162d0b7d65641bd2 libkadm5-1.18.2-22.el8_7.aarch64.rpm c1913ebb43e8659e42914ac67b0d2c41adc924c27188635d093d2d4772e0b3e8 RLBA-2022:8785 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. rocky-linux-8-aarch64-baseos-rpms tzdata-2022g-1.el8.noarch.rpm 808522f695bbe1b624724328f2ab6ff9a615a4220bb9611549fe67ccddcb383a RLBA-2022:9028 libsolv bug fix and enhancement update The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Bug Fix(es) and Enhancement(s): * Transaction picks old build to satisfy dependencies (BZ#2151895) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Bug Fix(es) and Enhancement(s): * Transaction picks old build to satisfy dependencies (BZ#2151895) rocky-linux-8-aarch64-baseos-rpms libsolv-0.7.20-4.el8_7.aarch64.rpm 484e387a8c85503ed55dd25dcfb5f1581c670da6b71d28707c58eb114156b791 python3-solv-0.7.20-4.el8_7.aarch64.rpm b396061f35d4cb6b34e7569a120201d3f5431055bc41a8cf1a53084a2e4fd6ed RLBA-2023:0085 net-snmp bug fix and enhancement update The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) rocky-linux-8-aarch64-baseos-rpms net-snmp-libs-5.8-25.el8_7.1.aarch64.rpm 998cfd09379b26f9d5b81f641010104cf38d1f4000cc3d1b958c84c5531f333f RLBA-2023:0086 opencryptoki bug fix and enhancement update The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059) rocky-linux-8-aarch64-baseos-rpms opencryptoki-3.18.0-5.el8_7.aarch64.rpm 21a76c83ca635c90f9df2b83e7d43db792df1f2d65f95ccf28ca7b846b4a215d opencryptoki-icsftok-3.18.0-5.el8_7.aarch64.rpm 870c730cb00bee134a0dc84d3140b631274f4a14e9f4695bf3fe02e8e45ace03 opencryptoki-libs-3.18.0-5.el8_7.aarch64.rpm 0d02f076621490c0e4315e00c4abcf2a6a9ecea8eb63e14a84efeed811485e7d opencryptoki-swtok-3.18.0-5.el8_7.aarch64.rpm a5318b00892785330215eec56943cbb444f1e2e215b521257841fdec194092fd opencryptoki-tpmtok-3.18.0-5.el8_7.aarch64.rpm 080cf84289a0a71921b12b4eeeb587c6cdc41c30ca462b684abe6468ba816340 RLBA-2023:0090 zlib bug fix and enhancement update The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336) rocky-linux-8-aarch64-baseos-rpms zlib-1.2.11-21.el8_7.aarch64.rpm 20a747975777d59fff85c98796b15151068fd11da077aca7863cc5afda3f90a6 zlib-devel-1.2.11-21.el8_7.aarch64.rpm 941647e609730ddaebf3d1eccb5ab972ddb882d30b8c81605f7ea877eae55a2a RLBA-2023:0094 rsync bug fix and enhancement update The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Bug Fix(es) and Enhancement(s): * rsync-daemon fail on 3.1.3 (BZ#2139118) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Bug Fix(es) and Enhancement(s): * rsync-daemon fail on 3.1.3 (BZ#2139118) rocky-linux-8-aarch64-baseos-rpms rsync-3.1.3-19.el8_7.1.aarch64.rpm 8026b069c506b8a1f73a6767f26d22c216222c3d69aa0d29dfa1dd2607a54af6 rsync-daemon-3.1.3-19.el8_7.1.noarch.rpm fb059776c3978eaa94acb4e4b0f7944756f454824eab3a3178764226c1d50fbe RLSA-2023:0096 Moderate: dbus security update D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms dbus-1.12.8-23.el8_7.1.aarch64.rpm 5681430586fbfe8a5a7aad2c7fc69f21c38b9f4269a1c9dd884fbfa37badd221 dbus-common-1.12.8-23.el8_7.1.noarch.rpm d0e4859f6054c5ea4e81571f6569cad02b9700981fb122d7e2f104bce4214d32 dbus-daemon-1.12.8-23.el8_7.1.aarch64.rpm 6dcf33aa4cbab4b7c980d3a6cf48ec2e932845342efdca0b2636d5c80a4a9c96 dbus-libs-1.12.8-23.el8_7.1.aarch64.rpm 006e19115a1b61dd6e5347bfc110260639da961435f60ece029aea5359575bcf dbus-tools-1.12.8-23.el8_7.1.aarch64.rpm 36b5e150a2b4c66d3400ae16a8cf0bbec6194a9a03061334d46f42c7eb000580 RLBA-2023:0097 selinux-policy bug fix and enhancement update The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * 2136762 - [Rocky Linux8/Insights/Bug] SELinux violations insights client with Satellite 6.11 (BZ#2136762) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * 2136762 - [Rocky Linux8/Insights/Bug] SELinux violations insights client with Satellite 6.11 (BZ#2136762) rocky-linux-8-aarch64-baseos-rpms selinux-policy-3.14.3-108.el8_7.1.noarch.rpm 321ec9f773d2082212881711c4346ccd77ef92167a46cae8418da5d93cfe1452 selinux-policy-devel-3.14.3-108.el8_7.1.noarch.rpm 6f11096869a4305c31ef274c3bd2dfc1e89be4c3ce21ae09aaae8081480a6204 selinux-policy-doc-3.14.3-108.el8_7.1.noarch.rpm d9d0cf27ff71a508cb6dda32bb99f2f51772b4f681002b327e5710d7d2c53ef3 selinux-policy-minimum-3.14.3-108.el8_7.1.noarch.rpm 2dde92278499e82d3ed0bf620410e6f398bfd921838cc53716abfaa292102ebd selinux-policy-mls-3.14.3-108.el8_7.1.noarch.rpm 550c511de341ff9c24ea63e8ae9e8ac53b91b0e517ff3f417dbe6d7113794d7b selinux-policy-sandbox-3.14.3-108.el8_7.1.noarch.rpm 1119c34c00aaeafcf37bea9cd8d2013bf26286ab651a6b069d53f2ff7410eeb8 selinux-policy-targeted-3.14.3-108.el8_7.1.noarch.rpm 72864ab192aedd31c706b240d261b637f2b9fdae98c0e7ac638579ea7402c42b RLBA-2023:0098 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) rocky-linux-8-aarch64-baseos-rpms NetworkManager-1.40.0-5.el8_7.aarch64.rpm 950b80d29270489c26fac177eab0e544928934b49bc1f3af8bd91de2dfdf748e NetworkManager-adsl-1.40.0-5.el8_7.aarch64.rpm 974aacdc9079b199aebbd9a85ac5014d756bd92c76d9f1af9fef1f875a97ad38 NetworkManager-bluetooth-1.40.0-5.el8_7.aarch64.rpm ceee8b34e1cca11d6bbe5b4c655ed149b1d9fee29dfc0d9a1ca2c7c87190d94a NetworkManager-config-connectivity-redhat-1.40.0-5.el8_7.noarch.rpm cd5378c72e78016a45d76be43a70202b6ede6826006fe1efe7762a3c00eb48f3 NetworkManager-config-server-1.40.0-5.el8_7.noarch.rpm 4d7c618d1898b37ae728a3fd4cf989463ca9fdf77041e567b60cbbac70cac043 NetworkManager-dispatcher-routing-rules-1.40.0-5.el8_7.noarch.rpm 9c4b87f46150a5d9751a10dbcb06a581d3acfacbe1075648ffbd2075f71ebc4d NetworkManager-initscripts-updown-1.40.0-5.el8_7.noarch.rpm c5c0347bd11f92b5a5cb4c618e04e1e631e69363c2ed4ff23cf4bd87c08d8847 NetworkManager-libnm-1.40.0-5.el8_7.aarch64.rpm f3ab320705577f3b1131c2127ff85c2edd3ac14c83ee6a44e7e8cd6252ba5ba7 NetworkManager-ovs-1.40.0-5.el8_7.aarch64.rpm 754619bc03085d79131afeb5608d523fb6dedaf2220ba9fe0b648839d69f9fdf NetworkManager-ppp-1.40.0-5.el8_7.aarch64.rpm 21883084c430f71ffe750ed1a5e1d26cbf06cdb573560512de8c868d7621e121 NetworkManager-team-1.40.0-5.el8_7.aarch64.rpm 37a9241378af8c20da95bb6c557c3955acbdd71b8ddeb339fbd3540efd29c4a2 NetworkManager-tui-1.40.0-5.el8_7.aarch64.rpm ef9286fa1342eaf573938c960de50e31329dc11b6541ce16cfe0e37d970237ee NetworkManager-wifi-1.40.0-5.el8_7.aarch64.rpm e89c99d5ead4ac4c25489a06c796e4a33686e557e3ff8c5e823f86ca31cdd70b NetworkManager-wwan-1.40.0-5.el8_7.aarch64.rpm 040e4053dd4d385b4ac69897f7fe2ac9a6e33137313dbe9f751b023e3c0b7622 RLSA-2023:0101 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849) * vfio zero page mappings fail after 2M instances (BZ#2128515) * ice: Driver Update up to 5.19 (BZ#2130992) * atlantic: missing hybernate/resume fixes (BZ#2131935) * Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084) * Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813) * ice: Intel E810 PTP clock glitching (BZ#2136036) * ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216) * ice: dump additional CSRs for Tx hang debugging (BZ#2136513) * ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270) * After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157) * i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205) * WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953) * DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216) * Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152) * Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878) * mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957) * net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017) * Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583) * AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218) * Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374) * net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130) * iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081) * Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742) * Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912) * Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849) * vfio zero page mappings fail after 2M instances (BZ#2128515) * ice: Driver Update up to 5.19 (BZ#2130992) * atlantic: missing hybernate/resume fixes (BZ#2131935) * Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084) * Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813) * ice: Intel E810 PTP clock glitching (BZ#2136036) * ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216) * ice: dump additional CSRs for Tx hang debugging (BZ#2136513) * ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270) * After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157) * i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205) * WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953) * DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216) * Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152) * Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878) * mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957) * net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017) * Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583) * AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218) * Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374) * net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130) * iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081) * Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742) * Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912) * Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-425.10.1.el8_7.aarch64.rpm 655376e7923a5cd6e7e1e4215ca9de11b826c5c8276334a4ed30b81c33e60bf8 kernel-4.18.0-425.10.1.el8_7.aarch64.rpm 253aa8da58777911c48c9f2f5394d6723b692279ac4b9611d7e5bd0bccfe5987 kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm 5f88073317993ccc745d08d87c5ac76fe6cef8acc5d26a3b7349dd6b0d8f0669 kernel-core-4.18.0-425.10.1.el8_7.aarch64.rpm f38ef2865d5b9c03a90ad21744530a03e66086d505d7f6d00cf48717e235fc30 kernel-cross-headers-4.18.0-425.10.1.el8_7.aarch64.rpm f2b296167528c4fc42e9ce9f390ab498e53eb4736a2bd3259296fcc201372442 kernel-debug-4.18.0-425.10.1.el8_7.aarch64.rpm 2096a3b99788524bbac746b73330c736130d1ee8a90f30e9c23c47ae9a09a8c9 kernel-debug-core-4.18.0-425.10.1.el8_7.aarch64.rpm 6d11abc288081b2383f43544d27db2fa97e90e3a48dbe6404e6557f0bb7dbd5b kernel-debug-devel-4.18.0-425.10.1.el8_7.aarch64.rpm 8523f2825ac2a90d666b6176c5ebea3eb2567d8641a1d9ebf303424e66aa753a kernel-debuginfo-common-aarch64-4.18.0-425.10.1.el8_7.aarch64.rpm 20f0f57b81350f149c0391ad2876f47aa0aa5ddda77846d25bcfedd771e81fa5 kernel-debug-modules-4.18.0-425.10.1.el8_7.aarch64.rpm 4bbcfb29ab3dbe3c8778d3fac356f6bf81d792718631c87cc03ab197fc8dc959 kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.aarch64.rpm a3976cb267775772d9afbe1a0c9944d4935f34d1d7997a230d4aedd0e2e6e13e kernel-devel-4.18.0-425.10.1.el8_7.aarch64.rpm e71a1eaf35aaa9e721382c2f199b371bb43e4821f12446fde6856db2e04f26a2 kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm a5841e7bb9d35f714ceaf835b19d2d07b9171354addf2353c43a3600bd0f1b3e kernel-headers-4.18.0-425.10.1.el8_7.aarch64.rpm e57c1ff64193ffa75ac37c647ff26c016cd457b6717840fd7334ef8cb79e260c kernel-modules-4.18.0-425.10.1.el8_7.aarch64.rpm 5446e8128119feb9d10c37fbd3aca39cdcd4c7cfceb403673a2dc9ae0951b646 kernel-modules-extra-4.18.0-425.10.1.el8_7.aarch64.rpm 41cc3e9c91be3c9e5b077ddaef6a1517529ae87623ba20b3055d2fc9508c61bc kernel-tools-4.18.0-425.10.1.el8_7.aarch64.rpm 978e39ca44e9e8e55a4cd14fe3f23479b5761632abaa39fc069303f38fe6fff1 kernel-tools-libs-4.18.0-425.10.1.el8_7.aarch64.rpm 9794b6f8526915bed89be61897ce19ad82eeed48d0ded3b7d0d27ece246d1b3b perf-4.18.0-425.10.1.el8_7.aarch64.rpm 93991ef9fe041674624a898f8c763fbf4d0986e7adfa2bb488bd1f62470c65e4 python3-perf-4.18.0-425.10.1.el8_7.aarch64.rpm fbc0af1bb4aa27cd537a9a6fed27f388f51d1707937364cf8f1893f223beba85 RLBA-2023:0104 dracut bug fix and enhancement update The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition. Bug Fix(es) and Enhancement(s): * booting over iscsi can enter a loop forever in dracut-initqueue if one netroot path is lost. (BZ#2132045) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition. Bug Fix(es) and Enhancement(s): * booting over iscsi can enter a loop forever in dracut-initqueue if one netroot path is lost. (BZ#2132045) rocky-linux-8-aarch64-baseos-rpms dracut-049-218.git20221019.el8_7.aarch64.rpm de520e82a2fa3487ac44311137e2cc3ed56ea920dcc4fb0945c22f796961eab7 dracut-caps-049-218.git20221019.el8_7.aarch64.rpm 12dfa34259d427129fcd1c76e52b2b6f8a059efe35c57c35ba94af4fcd6b1e7b dracut-config-generic-049-218.git20221019.el8_7.aarch64.rpm 1ee3ebbf175c5ca5e16c66c59ae979fac5fd35e155b2ef6e605ed9d9dd437134 dracut-config-rescue-049-218.git20221019.el8_7.aarch64.rpm 900229471ea2657f16d5a85e26de497a7234b773737d96535a9afb27fc63c820 dracut-live-049-218.git20221019.el8_7.aarch64.rpm b3a9e789b0d3723e13d06a6ccb943f103d010d59a240337f546ffa99c3de0660 dracut-network-049-218.git20221019.el8_7.aarch64.rpm 666eb7155d1cf915dea2b77688bb2a93f36ba258a9eca62e7e9896f85dea455d dracut-squash-049-218.git20221019.el8_7.aarch64.rpm 2e43997fec1e908266bae7c0caadf4495210ec5f4db69770f868649eba313c59 dracut-tools-049-218.git20221019.el8_7.aarch64.rpm 501abfa427c24beccd4b47a070e5f256b46124392df3c68fdefb7b906c887326 RLSA-2023:0103 Moderate: expat security update Expat is a C library for parsing XML documents. Security Fix(es): * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms expat-2.2.5-10.el8_7.1.aarch64.rpm f24c6d74b9e1c422442b39248f049f82a874a2c0827806a992ceb30a8285cccd expat-devel-2.2.5-10.el8_7.1.aarch64.rpm 04efac0a114bff05c81e111b72aa5b334c57c2e843a53050cd68c3db9cdedc8c RLBA-2023:0105 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) rocky-linux-8-aarch64-baseos-rpms libblkid-2.32.1-39.el8_7.aarch64.rpm c64e2852190d2108d9aecf05528f719ca0d4573e89ca72b85e2c3899d1378088 libblkid-devel-2.32.1-39.el8_7.aarch64.rpm 68af95be57789e6928fc76420fbed2b1472a0a71f33f886f68d5174fb184a015 libfdisk-2.32.1-39.el8_7.aarch64.rpm 938bfb791a72a438c0453f5527e53474e918039da98679da9dfdb74d7277f8cc util-linux-2.32.1-39.el8_7.aarch64.rpm e2da688eaa8a0ac797811140e403914c2e0c2dbeed33fa902d3c64e496e23c8d libfdisk-devel-2.32.1-39.el8_7.aarch64.rpm 31699548d7ef164c9e620930d6acc014406839533d644588b5350bdbe82e4c41 libmount-2.32.1-39.el8_7.aarch64.rpm c4862acb1732d75f563f0776a8c2dcfeee0bc6b1bef3838423e3ebe663908040 libsmartcols-2.32.1-39.el8_7.aarch64.rpm 9e447bfe23b9499ff6156341f3c0d70602772ea2113c48016a3c9274b7a99c5a libsmartcols-devel-2.32.1-39.el8_7.aarch64.rpm 0174b45145386a284aaebfe738bcfd333c7993d34f91c4edbd205505375a3815 libuuid-2.32.1-39.el8_7.aarch64.rpm 8298c67523f164645b1262225f3db5aef46e368c4e19cf06676140092288fc02 libuuid-devel-2.32.1-39.el8_7.aarch64.rpm 48c70d4149b9c846a8342c613a9b694f6c41430deb90e4857c5f2d4aa23e234d util-linux-user-2.32.1-39.el8_7.aarch64.rpm 91a67144d1202403ac6e64e360735807e4e6cf665e533b3ece721c0051135ee0 uuidd-2.32.1-39.el8_7.aarch64.rpm fbcebec4fcb17436b3d6eedd1afb547c7296dc1c53a8f99c93c7da70dd1109f7 RLBA-2023:0106 gcc bug fix and enhancement update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) rocky-linux-8-aarch64-baseos-rpms libasan-8.5.0-16.el8_7.aarch64.rpm 7bb117589dac16b12139c0908c1a6a453900e6a0059b2a6a5168b5ec2495d1cb libatomic-8.5.0-16.el8_7.aarch64.rpm cf094e446587955b88df77091ef516eb87ec3f873de6b4da09a617d26e4bc172 libatomic-static-8.5.0-16.el8_7.aarch64.rpm 81f150ddb7d43b42f47509844dce047bbb76708fb1e1052b29598b09a4814189 libgcc-8.5.0-16.el8_7.aarch64.rpm 69810345e10c44f8b02ae8ad793b49d61b7d0455487169cd5007406fc5f39645 libgfortran-8.5.0-16.el8_7.aarch64.rpm e1688bb37ecff5284693155697118f3eebc2baff31f34afad7e5e0fc16f88cf5 libgomp-8.5.0-16.el8_7.aarch64.rpm d5d3b463dc4f688779d1ca7ea2d15a23365a83a4983eb72adada32f7b5b097a5 libitm-8.5.0-16.el8_7.aarch64.rpm 6430f8a4f425f076dec54b2484afc8fc7d9e43cb5cf3a113ae48f5129340dc73 liblsan-8.5.0-16.el8_7.aarch64.rpm 12314a1be0ddb73c65fb13bf32943cbe6f65907f83f37e3dca9669d7c6e71619 libstdc++-8.5.0-16.el8_7.aarch64.rpm 8a2f84baee858119a090eb9496d915098502c4e1ee79f4544c14bac61233e49d libtsan-8.5.0-16.el8_7.aarch64.rpm d313d0fcc505e605bc0515ff4a9b8bab110b674e3be4169b4cb9965d0e5ed0dc libubsan-8.5.0-16.el8_7.aarch64.rpm 4fb73c9ceab30894956a5615d32de56f4e69ec40dc640a3eeb42fc51de3cc29f RLBA-2023:0107 dhcp bug fix and enhancement update The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Bug Fix(es) and Enhancement(s): * dhcp: does not send dhcp6.vendor-opts back to clients (BZ#2142025) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Bug Fix(es) and Enhancement(s): * dhcp: does not send dhcp6.vendor-opts back to clients (BZ#2142025) rocky-linux-8-aarch64-baseos-rpms dhcp-client-4.3.6-48.el8_7.1.aarch64.rpm 7c52e0dfd3b13c1f59c33237c7265c88f60df66e7fba9c7e2b0eba20a82abb17 dhcp-common-4.3.6-48.el8_7.1.noarch.rpm f934465c675e5be123b5d7f7aae7c0e894b5cd6c6cd2e73c752655f8d295bfd8 dhcp-libs-4.3.6-48.el8_7.1.aarch64.rpm 22ca669b116874e70847c6f7b11c5049c5d1b249c88862c52f310a9a6a8ddea1 dhcp-relay-4.3.6-48.el8_7.1.aarch64.rpm ccd6e17a6c2e4159fe820226914071833b4981c5fa993814c859fe3f843e7ae3 dhcp-server-4.3.6-48.el8_7.1.aarch64.rpm 7e6cc971755904017d0a3c3462dd0b85310f5bf86f81d6139c3107e8242c1644 RLBA-2023:0109 systemd bug fix and enhancement update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * Ordering cycles at shutdown time causing delay in the shutdown (BZ#2143100) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * Ordering cycles at shutdown time causing delay in the shutdown (BZ#2143100) rocky-linux-8-aarch64-baseos-rpms systemd-239-68.el8_7.2.aarch64.rpm fff9a78110a069c83a7c58735fd08d76eef04309fb22c1ef84b44e94fa72bfd2 systemd-container-239-68.el8_7.2.aarch64.rpm 93de7faa67575b08038f58572b218768c6f49ef08518b785deccae37d51385bf systemd-devel-239-68.el8_7.2.aarch64.rpm 6f12910303707a2791f5fb77e442453e48da263591743572ff6d676bb7a5e609 systemd-journal-remote-239-68.el8_7.2.aarch64.rpm f1faeb3ca1643720ea243300a896d2587fd4b64a32589bdf1ed86f96e5c6d16b systemd-libs-239-68.el8_7.2.aarch64.rpm b15bb17d57100447bc389f4bfe9c4f798dcdcf77f704f677e8cec4c93b56e3be systemd-pam-239-68.el8_7.2.aarch64.rpm 8eee3c99a4fd7acfccb3a970403977eeee8d2c41b70e641d6fb0340b48eb59b6 systemd-tests-239-68.el8_7.2.aarch64.rpm cffd4cde3fe68ef993eeef6d34c75d507a53d28208303239435abe351fa9d934 systemd-udev-239-68.el8_7.2.aarch64.rpm a6ebe69e8341e09091e97d321e37e304b160fe7bc2a41f0f02fadffa3154b185 RLSA-2023:0110 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms sqlite-3.26.0-17.el8_7.aarch64.rpm 3887f489a80e4aa991adcef79d2716e24bb0d1d8d704097f8b0d623669c4f12b sqlite-devel-3.26.0-17.el8_7.aarch64.rpm 5305ecce03b91a9f6749d98b0aec32a41d28d43a4866499cc173eadb641be932 sqlite-doc-3.26.0-17.el8_7.noarch.rpm 62de890713f95e66cecfbf4c9411060f95a3d58ba10b473b277294f7877ba70a sqlite-libs-3.26.0-17.el8_7.aarch64.rpm 06c57b9b8b9d0bcedb122776cf14fc36750733c5c2068f7c75adb925d04758fa RLBA-2023:0111 curl bug fix and enhancement update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * Fall back automatically to HTTP1.1 from HTTP2.0 when performing auth method. (BZ#2144493) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * Fall back automatically to HTTP1.1 from HTTP2.0 when performing auth method. (BZ#2144493) rocky-linux-8-aarch64-baseos-rpms curl-7.61.1-25.el8_7.1.aarch64.rpm 3b36c930e925f55247ee2f8f8cbbf29eb4e77db6540cd395be2a9fc6954acf32 libcurl-7.61.1-25.el8_7.1.aarch64.rpm b2bf4ebe6aafbfc813d5a20ecf1acfe70e9d706f3604e43c0adb9730ed0de985 libcurl-devel-7.61.1-25.el8_7.1.aarch64.rpm 141137fa2a6a818e48428dd45d29ce9f74ec5d15314c7c5c0e30d01f2db1c28a libcurl-minimal-7.61.1-25.el8_7.1.aarch64.rpm 50acd07115bdb8a9ffb58e10df534c0caea8b655c206623247a4c87ada9b8507 RLSA-2023:0116 Moderate: libtasn1 security update A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libtasn1-4.13-4.el8_7.aarch64.rpm 5b648be244c23d9ff819e0878ddce6e1b08a0b90563d8db614bfa8902a5dadd5 RLBA-2023:0120 authselect bug fix and enhancement update The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) rocky-linux-8-aarch64-baseos-rpms authselect-1.2.5-2.el8_7.aarch64.rpm b87be0458659a4c0639fc7b61e0b7d2df899ff4ad4b4d25ffcaed4918ebb1a80 authselect-libs-1.2.5-2.el8_7.aarch64.rpm 5e9b87ca44da9e4292f7251a6309a5798de786e10ee64887adf38abef8c4c0c8 RLBA-2023:0121 libqb bug fix and enhancement update The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Bug Fix(es) and Enhancement(s): * pacemaker command "crm_attribute" intermittently fails with error code 102 (BZ#2151300) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Bug Fix(es) and Enhancement(s): * pacemaker command "crm_attribute" intermittently fails with error code 102 (BZ#2151300) rocky-linux-8-aarch64-baseos-rpms libqb-1.0.3-13.el8_7.aarch64.rpm c2aaead054e587dbc69dd24ae166c004f20f5d4b8b8a177bcf8517e662bc537d libqb-devel-1.0.3-13.el8_7.aarch64.rpm f46d441721960fd16039bcf3e2442e8301a8f319225c2caafb506eec6b57ef9e RLBA-2023:0124 sssd bug fix and enhancement update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) rocky-linux-8-aarch64-baseos-rpms libipa_hbac-2.7.3-4.el8_7.3.aarch64.rpm 7dabc262cc08afb60171c9b92ea30096f551db55a39b9a65cb5cfc6076c60877 libsss_autofs-2.7.3-4.el8_7.3.aarch64.rpm 16ce414b8e864d62505d47b2dbbc3d15040e2034fa66d855276f1bf5f288e0d8 libsss_certmap-2.7.3-4.el8_7.3.aarch64.rpm f1da81d814f7c67a4e7bff0783b9906ac88b37eab357a0a888df3cd0ed8e145f libsss_idmap-2.7.3-4.el8_7.3.aarch64.rpm a32e2ad1cc5487a8f324279ecdffe2cf52c018f8677a3fff8efcd8f5240c4546 libsss_nss_idmap-2.7.3-4.el8_7.3.aarch64.rpm a13c5c4e365d3ee4e7e0e69978dd16374b5274602f90c829401b5cff4384a436 libsss_simpleifp-2.7.3-4.el8_7.3.aarch64.rpm 858a71ca604a28237f6ec31d94d26175cdebe69d90e5a1a21aba85431dc70446 libsss_sudo-2.7.3-4.el8_7.3.aarch64.rpm bf7df035b7a78f7383eeae21c6b6fa8f75d477bfc362465097a2ccd3a553c2b3 python3-libipa_hbac-2.7.3-4.el8_7.3.aarch64.rpm 4e4cebe951fcf35222ed7835d33b9dd2117fa1d7c0b19c7a59cd86e1c8354d93 python3-libsss_nss_idmap-2.7.3-4.el8_7.3.aarch64.rpm 0d5d758524854df329cca7dac78b1ad617fb808e5e485988cda2c6b2c29ca00b python3-sss-2.7.3-4.el8_7.3.aarch64.rpm 4033a1c11e8e7c53d9b396008e2136c2981353cfb0d836bee9a61b90b6acf7b9 python3-sssdconfig-2.7.3-4.el8_7.3.noarch.rpm 3f970ce3ad4b982366c148cf5018cc84fe95ef2806a4ace624ac1aeeaf83841b python3-sss-murmur-2.7.3-4.el8_7.3.aarch64.rpm 7a6dac950aab9af103943d12ace1e541d2d0d7012933d6856e586ef0245c753b sssd-2.7.3-4.el8_7.3.aarch64.rpm bc66608ce5c266858eaff4948e6140c7c464b6b50e097d645383227861dea318 sssd-ad-2.7.3-4.el8_7.3.aarch64.rpm f6c1a5786e2f173c176b61ea1270173a6cd7fb1c80930b33597ae2c75891efad sssd-client-2.7.3-4.el8_7.3.aarch64.rpm 6307f60b1d2dc2cf01c1ea747c4eb5508f3e7d8e102a75e92f6a4a9baded8307 sssd-common-2.7.3-4.el8_7.3.aarch64.rpm 159bf4fb7bca589ecf093898345c3837690143d4e8edad5e25915bb49cac9b68 sssd-common-pac-2.7.3-4.el8_7.3.aarch64.rpm 16a46dd7194e3f285bfa5b57ef3fc88a4f11c8a1a844694ee6b1faea4326f3f2 sssd-dbus-2.7.3-4.el8_7.3.aarch64.rpm 13e27f35733a71a97283e9d24b8acf01ea8ff19efeb16c58bb2934f22bbc1902 sssd-ipa-2.7.3-4.el8_7.3.aarch64.rpm d2966b63f55efe752c625b4ca0cc344be30b1b83bfc37a69996e85f9f16b6dca sssd-kcm-2.7.3-4.el8_7.3.aarch64.rpm 5f68298e608d8fe536bd76ef738d78f4691a6f73da4a399e9f2c7354cf139cf0 sssd-krb5-2.7.3-4.el8_7.3.aarch64.rpm c366c7d78729154a05b2c01a67bd7dbe7b5d1cdb012e46eef012bf30de9fc028 sssd-krb5-common-2.7.3-4.el8_7.3.aarch64.rpm a7a152f20adfd3520151e27aaf409d8a083ee3e2caf677647da66afcc3604934 sssd-ldap-2.7.3-4.el8_7.3.aarch64.rpm 01434bae2c68af104962ff129ba83557492526a7690738127c9203ee61219e4b sssd-nfs-idmap-2.7.3-4.el8_7.3.aarch64.rpm 9d4b207c51c5bf6c44874837f7ff2121abfff1f24bfe8ceafa839fc3fa96d3e1 sssd-polkit-rules-2.7.3-4.el8_7.3.aarch64.rpm ba8d53e20c0ba9cdb668df0b522197ce95f71dd7a62ae56238f573e126e9ddba sssd-proxy-2.7.3-4.el8_7.3.aarch64.rpm 4a4ed6066660bdce3a04493788167b70de06064612d8cbc8a6b0b80e6f415cce sssd-tools-2.7.3-4.el8_7.3.aarch64.rpm 411ef474850a6250fa3f1d6333c9967f71077fd959cb64872acdce2a1b56ea5c sssd-winbind-idmap-2.7.3-4.el8_7.3.aarch64.rpm eda0f7ae463df47c5831aa6f1805504eba7a302d578d3ce565c3f769b10ae1bb RLSA-2023:0173 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libxml2-2.9.7-15.el8_7.1.aarch64.rpm 8082aca701eace0d912c01aac15728280e0f2876aa1038d93e235bfd34545d99 python3-libxml2-2.9.7-15.el8_7.1.aarch64.rpm a74dc2f40eec968c29cb4cdfa2886138c881a46a1e441c03183d1a4dcfb2f31d RLSA-2023:0284 Important: sudo security update The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms sudo-1.8.29-8.el8_7.1.aarch64.rpm 2e036b6b7181b3837fae5ed883f13df10df2ebf32170fc3fbc85d68e0a994677 RLBA-2020:4435 abrt bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-abrt, abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libreport-filesystem-2.9.5-15.el8.rocky.6.3.aarch64.rpm 4695adc6d30e666d097155de8a950ddee663626f3486b1fc6e00c7f5e7f12117 RLBA-2021:4402 opencsd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencsd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms opencsd-1.0.0-4.el8.aarch64.rpm 0eab55e32ce2f92bf7d376f9097e89a2ab12d70d60b3fd3111d85a6ff4f37143 RLEA-2019:3448 perl-Net-SSLeay and perl-IO-Socket-SSL bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Net-SSLeay. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-Net-SSLeay-1.88-1.el8.aarch64.rpm 4d8fd563a8009b25df70a82b39d74b2e8e5a9ca3dce60f0957df45cf480dc3ca RLBA-2020:4499 NetworkManager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for network-manager-applet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms jimtcl-0.77-6.el8.1.aarch64.rpm 87d714e47cc7fa5195d68974ad1027f044ea098f0c6210d9634653044272a833 RLBA-2022:2000 glib2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms glib2-2.56.4-158.el8_6.1.aarch64.rpm 5183edb75014cfb1b3d341b12c19692d7c331bbff17cf767b6d4cb99d92c0830 glib2-devel-2.56.4-158.el8_6.1.aarch64.rpm ea8ece579861a004a9d3ef7edcc83e33b242d1ea666c30f8ee0c481f2f87e8bf glib2-fam-2.56.4-158.el8_6.1.aarch64.rpm 83f3317938248342e2ef36c029f0d1b9e9f52b86c8c645d5b38b95c4c5fcaf88 glib2-tests-2.56.4-158.el8_6.1.aarch64.rpm 0e82c10313b40160ec9d95e8b1ce9f3570de15fb7c8ad7d377947c1c8dd0b9bd RLBA-2019:1957 python3 bug fix update Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-48.el8_7.rocky.0.aarch64.rpm 2cbdc696809c998a98df3588174a4867bbff5dab2aee3ed2f04582adfcf3bf58 python3-libs-3.6.8-48.el8_7.rocky.0.aarch64.rpm 0911260fb7e4c19d0f7950da395e71ce080aa134bbe2eb92161817f75e604ee2 python3-test-3.6.8-48.el8_7.rocky.0.aarch64.rpm 68e6b32bb1f0cbbadfeb68b215ac93969b8bd724869e6518484bf69649fd62ca RLBA-2019:3596 hwdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms hwdata-0.314-8.14.el8.noarch.rpm f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343 RLBA-2019:3628 xfsprogs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms xfsprogs-5.0.0-10.el8.aarch64.rpm dab31500b020c6b5caf69b5d6b8fdff9637e4cc84ce5a13464c38a12cadc55c4 xfsprogs-devel-5.0.0-10.el8.aarch64.rpm d2a76cb9bde3a18aad91add45c3411e30954ff49475b0046540d952d81ddcd08 RLEA-2020:4552 atlas bug fix and enhancement update For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for atlas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms atlas-3.10.3-8.el8.1.aarch64.rpm 3281c1ad7e4b864147e913413f4e37389e5bd9100803f9049b0c2d9f9062d223 atlas-devel-3.10.3-8.el8.1.aarch64.rpm ca99f99c3a72acd833e7e944073102a5b644ea0a84a39d5435e49297529779c6 RLBA-2022:2006 python-pip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-pip-9.0.3-22.el8.rocky.0.noarch.rpm 4dc82e21beb0c285c4a765dfe48f5df6d8ee15c38bb4d0cda37cc826a2c7e951 python3-pip-wheel-9.0.3-22.el8.rocky.0.noarch.rpm b2beb19f4cc4a7865bcc4394b24994f53c675d14865ad39bcf2bcb3ca67a2ad1 RLBA-2022:7726 grub2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms grub2-common-2.02-142.el8.rocky.0.2.noarch.rpm 6175338b02c00922aae1c9241c84ea5c71cd59bb24bec6dd84981f9f6143f9e6 grub2-efi-aa64-2.02-142.el8.rocky.0.2.aarch64.rpm 44921fce9c4c369c8e24c35c668a99a642d4bf43632b287e0a61b72bc17a9a97 grub2-efi-aa64-cdboot-2.02-142.el8.rocky.0.2.aarch64.rpm c4fd913a470902d33a14e93c6b9b993066486fec80878628dd06b6b63d69f215 grub2-efi-aa64-modules-2.02-142.el8.rocky.0.2.noarch.rpm 3963bf6faa29aaea861bc1a256d0423698ba885faee100d9dc9b6037dc296a75 grub2-efi-ia32-modules-2.02-142.el8.rocky.0.2.noarch.rpm b986ac569ebe723ae5bab0de5a3779a30f27752791db7cedcf71be257016768c grub2-efi-x64-modules-2.02-142.el8.rocky.0.2.noarch.rpm 0a51865aec1df2804e25f67978bbdd93278cd4f94641afe8304e0c948373d025 grub2-pc-modules-2.02-142.el8.rocky.0.2.noarch.rpm c2374cad2069df6c2fbf3fe92b892c9bd04ebab2f8794cd38c2827b3b9c71ce6 grub2-tools-2.02-142.el8.rocky.0.2.aarch64.rpm bfde4af1e96ce6dc24979c4dd2dffb40a4ac37444dc802a30305b0cdc21153c5 grub2-tools-extra-2.02-142.el8.rocky.0.2.aarch64.rpm f3eb57e7ba3a08f6d7a2ec80bbd09b2a38d1eb1f5903564990184cee441d8cfc grub2-tools-minimal-2.02-142.el8.rocky.0.2.aarch64.rpm 77c6568b7ab29c608f88d10e8123377c10f8deb19bf44543de42a53f77ec6f20 RLBA-2022:7739 sssd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libipa_hbac-2.7.3-4.el8_7.1.aarch64.rpm f6ca2b24f0094be6e8d8f1bb1400989c7bb09ceada8343d4e81294bc404a8278 libsss_autofs-2.7.3-4.el8_7.1.aarch64.rpm 8988f55f5f17c81049b97f280d8745f88491bf9a82e83465028c90ca89125d15 libsss_certmap-2.7.3-4.el8_7.1.aarch64.rpm a9454aaa161abdac527c120ddc2e4c08a80407004f4eb7697afff9b7f1b3b452 libsss_idmap-2.7.3-4.el8_7.1.aarch64.rpm a1ee51f3874cf52d1c9d5bc4d6b17afd98bfc779220d856a483876f543cdd41f libsss_nss_idmap-2.7.3-4.el8_7.1.aarch64.rpm f5f688cdbc09bfb23fb13b086113df23d3977676ad1c6af2828c03040cbab3d5 libsss_simpleifp-2.7.3-4.el8_7.1.aarch64.rpm ee7a2cf5e9f157944b7c6f710f4b3555ddba1b164aa2cba35a49a0be992a0a0c libsss_sudo-2.7.3-4.el8_7.1.aarch64.rpm 38b1770a78bbfcc1e3dceb89b0c84c1e60d339f235189881bd46214749c03a6d python3-libipa_hbac-2.7.3-4.el8_7.1.aarch64.rpm 0256a0d370205f1342febe2316bc8374f106d55336a34ee22a71f9b91d91486a python3-libsss_nss_idmap-2.7.3-4.el8_7.1.aarch64.rpm 6d5ca0b568fee971d5ba0e228e00f710bd4f02480b71503c7989856707e9b40d python3-sss-2.7.3-4.el8_7.1.aarch64.rpm b2075424a1ae98c819326d6ca212bafa6d4de2fb0071d8f6aade9a52917fe04d python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm 6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c python3-sss-murmur-2.7.3-4.el8_7.1.aarch64.rpm e4589d466fe5b91f31af1133764d188b9ac7dec579e896efbeedc81f4f160055 sssd-2.7.3-4.el8_7.1.aarch64.rpm 53b9778e7f74b30592a792ee307223c152ae8b54a781983e43df0396b755a24d sssd-ad-2.7.3-4.el8_7.1.aarch64.rpm e1f9df087cb16869a4802174b5bcc8e4a1d078e1f1705c119fd3e96bbbba0d09 sssd-client-2.7.3-4.el8_7.1.aarch64.rpm 41549ade31322026fa9727f97616ce6d6d97060e22d7aa6313a2f0ccfb574de5 sssd-common-2.7.3-4.el8_7.1.aarch64.rpm 901e447910ccd0a2de3b87b6c214f0d59e90af84a9f509c05d2d2c1e2846d50d sssd-common-pac-2.7.3-4.el8_7.1.aarch64.rpm 3ae9235f551fa5b3a60f3402bc45adbfd0cf25f3446b4b8b1a773c2414fb20db sssd-dbus-2.7.3-4.el8_7.1.aarch64.rpm 6fdf3e565cc091c308b5e9c93ead29304999c2daa293eafbe3191e770b30568c sssd-ipa-2.7.3-4.el8_7.1.aarch64.rpm 97c0610f3d7b7ba7ecfa9f9f235abac8c1dcf207ba14d42b242083c2deb0c3c7 sssd-kcm-2.7.3-4.el8_7.1.aarch64.rpm f14e314cdf3c8219686dcb63fecb701fb908243c3f11f39b17233a55cb2b8877 sssd-krb5-2.7.3-4.el8_7.1.aarch64.rpm 183067a7111c75c935f6f1a3169ad498b3f56cad2b34f8fde63e06c67d5c0743 sssd-krb5-common-2.7.3-4.el8_7.1.aarch64.rpm a0b2344f398c259b58a689c41a05090e0f6fd0c441228eaca08bc03ba967f6c0 sssd-ldap-2.7.3-4.el8_7.1.aarch64.rpm 71d6b994645253eaba4e6566a2fb3938dd072d2a3d3b250c58b27b56ce5cf368 sssd-nfs-idmap-2.7.3-4.el8_7.1.aarch64.rpm 3122023820615f39f71aa8cab46fb0d366877c9a8b2674c54847b0ccf024a710 sssd-polkit-rules-2.7.3-4.el8_7.1.aarch64.rpm 4e39328478a67acc3d3df1ed01729c8ad3f643866057cd43e72657dc6cc157f5 sssd-proxy-2.7.3-4.el8_7.1.aarch64.rpm 97a736d8a1b73b1b5d25d357256e787a227177a91aafdf28eaed2a02a1b1ae0a sssd-tools-2.7.3-4.el8_7.1.aarch64.rpm 08edbdecee4de860ae28e94fd11903411d226c5512849ec5dfebdb523fb68fea sssd-winbind-idmap-2.7.3-4.el8_7.1.aarch64.rpm e555c731c11ad6807d8c413a4323d7fa8dde9b7d85f9241aaffeb9083887f91d RLBA-2022:7766 fwupd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms fwupd-1.7.8-1.el8.rocky.0.3.aarch64.rpm a976f5167496b2def93a551777946c778d8571dd4a4202e5762b7617ffd4db98 RLBA-2022:7784 chrony bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chrony. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms chrony-4.2-1.el8.rocky.0.1.aarch64.rpm bb21f910d5368e3394b5f5bd81676c4d8026a2a757833ba22cad90f79ab25c7a RLSA-2022:7790 Moderate: bind security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms bind-export-devel-9.11.36-5.el8_7.2.aarch64.rpm cac036e9f739d175ccfe317187447784e04bfd1382f0172b148e0db682b30865 bind-export-libs-9.11.36-5.el8_7.2.aarch64.rpm 744eb1121a493e66cdb806b7d92c94b75a261740adf56933a3080487e906abf1 RLBA-2022:7832 python3 bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-48.el8_7.rocky.0.aarch64.rpm 2cbdc696809c998a98df3588174a4867bbff5dab2aee3ed2f04582adfcf3bf58 python3-libs-3.6.8-48.el8_7.rocky.0.aarch64.rpm 0911260fb7e4c19d0f7950da395e71ce080aa134bbe2eb92161817f75e604ee2 python3-test-3.6.8-48.el8_7.rocky.0.aarch64.rpm 68e6b32bb1f0cbbadfeb68b215ac93969b8bd724869e6518484bf69649fd62ca RLSA-2023:0049 Moderate: grub2 security update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601) * grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601) * grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms grub2-common-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 5b88d6f55060a730cf0f5b8688ae26c8eff68c853c842247a090d6e81c50a4b9 grub2-efi-aa64-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm e4527f13d0a56e4aa6e230a158103053e16e9288ca571eea25edb7c246bad49e grub2-efi-aa64-cdboot-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm 12902e75bf00ddc063d5f3526bdbb99acab44515b608fa9c9d5e164af8316986 grub2-efi-aa64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 4f09a4d990d333e3265c18b4c0a5158e47d639596d85deecfd57a2abb8f5e31b grub2-efi-ia32-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm defdae03ca69e0522d87a043586cf9d9935f951cb0e0ef419eaa2754992664e9 grub2-efi-x64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 96dbda0fb20996d949e00180be8c7abbb3d43e8ad2e6baf5ae0f80a16ef0aceb grub2-pc-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm ded04f98279737ee20b5f99c735b31ab66168490b763fff0d3670e8af01243da grub2-tools-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm b352f0f39cfbe35b244853379699821a0b99da89e1e657cf044f260d506b0625 grub2-tools-extra-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm 0238d279a49dba959f21d2d9c7e6d630a753bfe31a61a0f967291e45658d41b2 grub2-tools-minimal-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm 09951dd97b206d390b931fbeee0325bc5bb30db539fe0e9cd3ea5df809ede60f RLSA-2023:0625 Important: libksba security update KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libksba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libksba-1.3.5-9.el8_7.aarch64.rpm 6c81a2178037a7f546d1a9e4388f8b42b660c3e7b51e3b7a229a7445cfa124b8 RLBA-2023:0830 iptables bug fix and enhancement update The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * Rocky Linux8.6 Packet drop in ebtables (BZ#2144922) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * Rocky Linux8.6 Packet drop in ebtables (BZ#2144922) rocky-linux-8-aarch64-baseos-rpms iptables-1.8.4-23.el8_7.1.aarch64.rpm db2b5896e4395660d4e76880e07828b12a51c03b6ce70757c3ded5bff591f0db iptables-arptables-1.8.4-23.el8_7.1.aarch64.rpm 33bbf5d2fe8bb7c13d91d1e3c95f3e308757927abe36290d93384bfa09071199 iptables-devel-1.8.4-23.el8_7.1.aarch64.rpm 234093b652bf78d13a9dda6edf6dea983e741c890f29ccd77f9e09d071e8cb3a iptables-ebtables-1.8.4-23.el8_7.1.aarch64.rpm f48bad6f88e004270eab32e4a11ac9d6a92d8e56194e7fb9cf78b53268843f59 iptables-libs-1.8.4-23.el8_7.1.aarch64.rpm 565b7bae7d31a0570f88dac73c55b016d7907884883f45c4dd3aeb3e43d3e235 iptables-services-1.8.4-23.el8_7.1.aarch64.rpm fae1b81df3761bae19df0a36c4b1d4ddccfc0049e1975c380b5767cebbce9568 iptables-utils-1.8.4-23.el8_7.1.aarch64.rpm dae661560154654e358428ad4d14e893d01c7966cfd318c2ab4c838ea7aada88 RLBA-2023:0831 nfs-utils bug fix and enhancement update The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899) rocky-linux-8-aarch64-baseos-rpms libnfsidmap-2.3.3-57.el8_7.1.aarch64.rpm bb2e77f49138a9935289b67869ff329e0ff4afac3c58f748924dab2f1b462e2f nfs-utils-2.3.3-57.el8_7.1.aarch64.rpm c94448365687f2a29df3d60e6cb561c4dd0e32d644bceb6bef30c1bcfa3d1419 RLSA-2023:0832 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586) * Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592) * Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580) * MEI support for Alder Lake-S (BZ#2141783) * Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959) * Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287) * Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474) * i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745) * Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530) * error 524 from seccomp(2) when trying to load filter (BZ#2152138) * Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734) * Connectivity issue with vDPA driver (BZ#2152912) * High Load average due to cfs cpu throttling (BZ#2153108) * The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230) * Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653) * kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460) * Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272) * Azure: VM Deployment Failures Patch Request (BZ#2155280) * Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289) * MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437) * GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797) * Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905) * Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813) * ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182) * (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221) * i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460) * iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586) * Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592) * Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580) * MEI support for Alder Lake-S (BZ#2141783) * Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959) * Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287) * Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474) * i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745) * Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530) * error 524 from seccomp(2) when trying to load filter (BZ#2152138) * Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734) * Connectivity issue with vDPA driver (BZ#2152912) * High Load average due to cfs cpu throttling (BZ#2153108) * The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230) * Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653) * kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460) * Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272) * Azure: VM Deployment Failures Patch Request (BZ#2155280) * Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289) * MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437) * GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797) * Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905) * Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813) * ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182) * (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221) * i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460) * iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-425.13.1.el8_7.aarch64.rpm 032ce3ccec59ea3c047ab6258f38af6cfa4e5c8ec8e06d8ee254614eda10bd1a kernel-4.18.0-425.13.1.el8_7.aarch64.rpm f230a1e1b0be0c1950cba07817c20045a6704095ee6bc82f8b70a23def762f36 kernel-abi-stablelists-4.18.0-425.13.1.el8_7.noarch.rpm 112fd585aeb8f69a65d5191dfb7710c00a2fa0818413eb730a52c519c9e798a6 kernel-core-4.18.0-425.13.1.el8_7.aarch64.rpm 5d4a3f5ec1c8b7665aa23c45a66626ae91838b0554b0232189704aa2ef5f2b36 kernel-cross-headers-4.18.0-425.13.1.el8_7.aarch64.rpm 60bc2fcc9d6999ee511379b6e5f9d19faa04b478fec47a70400e3b40278c2336 kernel-debug-4.18.0-425.13.1.el8_7.aarch64.rpm bd618748ef51663b21b46c3f0a2c32f0a81ee9c2825f88a54fd2ea3fbe3447d4 kernel-debug-core-4.18.0-425.13.1.el8_7.aarch64.rpm 7751b2c7b8bd8984ee03b5c4936ae07501f152d071d88fe7b53f546d8ab7ed69 kernel-debug-devel-4.18.0-425.13.1.el8_7.aarch64.rpm 50eb312c239567ca035750e9b0d5779f9da8b4a30e76a340f6f743a0db34aab0 kernel-debuginfo-common-aarch64-4.18.0-425.13.1.el8_7.aarch64.rpm a6c79786677536266cc11ffb8b3dd5f8ba681ab52dfd752916cf68981b6b6a8d kernel-debug-modules-4.18.0-425.13.1.el8_7.aarch64.rpm 9754804488edda8a09a8c58d941629f4d75e1dab08a5ecc603ef01a978e8b2de kernel-debug-modules-extra-4.18.0-425.13.1.el8_7.aarch64.rpm 4d88b99dba2294c746eddf676912a1384d3b434d1a67404ee2b2bfa09013d555 kernel-devel-4.18.0-425.13.1.el8_7.aarch64.rpm efa7bd275a36028561fba78e22907c2f1109715b6d37101572566c942aa00fea kernel-doc-4.18.0-425.13.1.el8_7.noarch.rpm d29d0316ba11bbbfb22ebf404f6aa18c7d6f67d1cb3d705b22918ebbe1e272a6 kernel-headers-4.18.0-425.13.1.el8_7.aarch64.rpm c7a1fc914387daf0fd280f7d24e69c6281f8df745698274d8103a8e45e023042 kernel-modules-4.18.0-425.13.1.el8_7.aarch64.rpm 9905c0fb0d0122fbc71f1bdbe813c7cefccb2538d3f67394c1ad661d24b0f982 kernel-modules-extra-4.18.0-425.13.1.el8_7.aarch64.rpm fa6388e53ccef0a4e41fc8edfc476667b7f4fc63d59dca32e7582f3e09f3a340 kernel-tools-4.18.0-425.13.1.el8_7.aarch64.rpm 5713099e6e8d206551ee0447d1fb1a6e54c49b3a410055e96f672b7ae477772c kernel-tools-libs-4.18.0-425.13.1.el8_7.aarch64.rpm ecd16e51b799aa951cfbacbbf21f4ccba14cb682b9241cd105072e9514afc4f6 perf-4.18.0-425.13.1.el8_7.aarch64.rpm 6278a6509e632bbfa21cb21bba95b236b052cf61fb6caea3a843065e00051981 python3-perf-4.18.0-425.13.1.el8_7.aarch64.rpm 2578986d17c39926b86f5f117ebc21293ec3621b8ca06954d3008258d80ec090 RLSA-2023:0833 Moderate: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm 032f12d764303afbe4db7ff9c2c7ae7297372fc34baec25af080b2c4eeba4b8a python3-libs-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm c380184a5a8bbf379dbc8c82f6d04b9e571f62bf7ec562d176c27bfa77fc6136 python3-test-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm 9271bca1ec9d4a7dd71a3a6dbb74120aea956cee8a5901c81bc39d5cc8657185 RLBA-2023:0834 kmod-kvdo bug fix and enhancement update The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage. Bug Fix(es) and Enhancement(s): * Rebuild kmod-kvdo against kernel version 4.18.0-425.10.1.el8_7 (BZ#2158783) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage. Bug Fix(es) and Enhancement(s): * Rebuild kmod-kvdo against kernel version 4.18.0-425.10.1.el8_7 (BZ#2158783) rocky-linux-8-aarch64-baseos-rpms kmod-kvdo-6.2.7.17-88.el8_7.aarch64.rpm 123190f3249c81165ea0ed6d3dd9612cab036359a7a0665b79917a050e5a1267 RLSA-2023:0835 Moderate: python-setuptools security update The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages. Security Fix(es): * pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages. Security Fix(es): * pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-setuptools-39.2.0-6.el8_7.1.noarch.rpm 79df645d4964ddd0977ff1df4c6eab07573681474107927e5c1a236a8db7682e python3-setuptools-39.2.0-6.el8_7.1.noarch.rpm 086432d50e40817e2dc2c45c54f60802f4368f5bde2949757f65804f48c9120b python3-setuptools-wheel-39.2.0-6.el8_7.1.noarch.rpm a088f6171dec158f26bf60f942294f5ec8ba1f30f447f3828ff201b59a87a19e RLBA-2023:0836 OpenSSH bug fix and enhancement update OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) rocky-linux-8-aarch64-baseos-rpms openssh-8.0p1-17.el8_7.aarch64.rpm 9492b5ceece55e95a480503e9c170cea3df1d17c752f0b6cdccd39f5b3885464 openssh-cavs-8.0p1-17.el8_7.aarch64.rpm 66644b4859986b9c52da00a6f7597711d2034c23d789209786d5203213f5b44d openssh-clients-8.0p1-17.el8_7.aarch64.rpm ce95fe60e47438a9bc3ca5b8b437444bba79d64d482f8dbd91316fbed3d2aaf5 openssh-keycat-8.0p1-17.el8_7.aarch64.rpm fb4ab8cc87b4fa55e58b558be3de75cd7173f98025259d420aca9ca6ba43a43d openssh-ldap-8.0p1-17.el8_7.aarch64.rpm 1028ebf570c8a8d3c0a2902e3d9bf78d0c622bd8aab212188e55785fb269a0ec openssh-server-8.0p1-17.el8_7.aarch64.rpm 33772ddaf431e6f1413e524c7a5f53abe70dbe3dc27d9735405c25be79245bf6 pam_ssh_agent_auth-0.10.3-7.17.el8_7.aarch64.rpm ab5a6997bf9f094acd4bd33ab6c0ece4fd40bbd70c35b7fb741b6f217d8e94d7 RLSA-2023:0837 Moderate: systemd security and bug fix update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd doesn't record messages to the journal during boot (BZ#2164049) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd doesn't record messages to the journal during boot (BZ#2164049) rocky-linux-8-aarch64-baseos-rpms systemd-239-68.el8_7.4.aarch64.rpm 39402bde20dea199a88e4d01c31497a6554bfabd2638ae25a6bd96a63f047528 systemd-container-239-68.el8_7.4.aarch64.rpm 8bcf6b864ddcd8bda0d470d33d7ccfe1db9dfccd2d4cfbf2cc5b6d46ed667924 systemd-devel-239-68.el8_7.4.aarch64.rpm cc5fbb74aea6a3c417ee653977ea7121f70a2e4e55876a715dfe4624a27f3074 systemd-journal-remote-239-68.el8_7.4.aarch64.rpm 06ab1cf2b86c2627c904102e7ca2579bcbc6261b2439ec35da0d8f8a44a3362c systemd-libs-239-68.el8_7.4.aarch64.rpm 3e5a0d0d36f9e86d6a147f4068a6f8676305f847bdd48f11290c5a8d347770ba systemd-pam-239-68.el8_7.4.aarch64.rpm 9de00813af7bd36bb95de6d98ed6699fb7ac12afd44ca7b3c1a3d08628c71031 systemd-tests-239-68.el8_7.4.aarch64.rpm e3d640f9b3d63e6ef345815472e34d3d2de9c3f3bd8067973387482f0a4d487b systemd-udev-239-68.el8_7.4.aarch64.rpm e6dae4fc72c953c051586f2113aa0835d8fbe397d80392cb78fc4331ac973f01 RLSA-2023:0838 Important: samba security update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms ctdb-4.16.4-4.el8_7.aarch64.rpm 5df20949e8fa35998483cb15f53561f572741ec296ef754d14c50b219279bce0 libsmbclient-4.16.4-4.el8_7.aarch64.rpm 18833ab26eef75b6a0558a403d5d768b4944c9a9aaf9554b36da20581046b9a6 libwbclient-4.16.4-4.el8_7.aarch64.rpm d53c33eb7baa820ecf352644681c3ce089bcf9821af8f4fb110229b7d884338c python3-samba-4.16.4-4.el8_7.aarch64.rpm 95ebd3ea6c2825e8c9330375ea9092833adf47fbb51c0a0bb898df2288597f12 python3-samba-test-4.16.4-4.el8_7.aarch64.rpm cd71cda6b7621c1dda1ca4541fc7ef57d3c9df9c9ed242bd5dc1a0741a9be6e5 samba-4.16.4-4.el8_7.aarch64.rpm e71953221c56e7dc1cc8cc5324ad5b178414f740e50268897d774e1835118ede samba-client-4.16.4-4.el8_7.aarch64.rpm 6a142414433bfae3549a38f8c0726d9ab7c9fb88178d32d8c3bae1ccbb990f7a samba-client-libs-4.16.4-4.el8_7.aarch64.rpm 122c7cf5264ce982fb10d32fa9ab408e000cbba40130070fd50d8ee2271efa76 samba-common-4.16.4-4.el8_7.noarch.rpm 920a53593c8fc91fbcb9b53fda376f997eaf9ebc446e682369e57001c749c535 samba-common-libs-4.16.4-4.el8_7.aarch64.rpm e4ebf8d71ffef3f47ab3987c4b688623ce3c18898775830a638984b971a8c125 samba-common-tools-4.16.4-4.el8_7.aarch64.rpm a6e8d33c3106c067c68731390c846401c4ccfcb746a9249a83e8785e38d6c4ab samba-krb5-printing-4.16.4-4.el8_7.aarch64.rpm e675b8297290674d8f3b0cd8996739e61d773bdfa04a5a456d39081643c6766a samba-libs-4.16.4-4.el8_7.aarch64.rpm 00d62e442032122a365ece93b410ac5f61417b562324d560a384972aa2795f46 samba-pidl-4.16.4-4.el8_7.noarch.rpm b4ed5fcbf7bb9802c768852c4a23821a354feb7440f5cc28df778882400c41d4 samba-test-4.16.4-4.el8_7.aarch64.rpm c97174f442d5679d9f24ce7071e58c543857e2a556f268b34a2b399f01ca94d1 samba-test-libs-4.16.4-4.el8_7.aarch64.rpm 9973894c6356954ac735f85af445bb205d62d065c912bafc8cc565e0b0667fea samba-winbind-4.16.4-4.el8_7.aarch64.rpm 8befb32b738ab1742f378e0d1a51d95f6721e20fd1e2d2d53f4432bc8edb0bb5 samba-winbind-clients-4.16.4-4.el8_7.aarch64.rpm e4a4a3143dbb29e73bb5219e1e17672d2831f297b14b12b0833f37a118687cba samba-winbind-krb5-locator-4.16.4-4.el8_7.aarch64.rpm 5a46f987aa0fcf75b7d1d288407f7c747c50f8dfeefe94e88c54dbcc86d5b557 samba-winbind-modules-4.16.4-4.el8_7.aarch64.rpm 72dd58b77888e98c092fa30d7c01240306ea56989deb4f6da014510de0a17506 RLBA-2023:0840 curl bug fix and enhancement update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * curl fails large file downloads for some http2 server (BZ#2167825) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * curl fails large file downloads for some http2 server (BZ#2167825) rocky-linux-8-aarch64-baseos-rpms curl-7.61.1-25.el8_7.2.aarch64.rpm 583843322d6e2c178a03dcb9dd43d78e72a5fc5a29674cca908af8e5081acec3 libcurl-7.61.1-25.el8_7.2.aarch64.rpm a9b2bf5b6427f517ee4bb4b7f4b0576b359399d8a31d7fba35104bb10326241c libcurl-devel-7.61.1-25.el8_7.2.aarch64.rpm 7594dfa55739eadf1edea5e278adae57f92a2ec31edbd0c618221e763257f057 libcurl-minimal-7.61.1-25.el8_7.2.aarch64.rpm 196d6b011ace92ad917841e7c51bad5a5a8a6a912b9f2343318e0acd0a42aae9 RLBA-2023:0841 grub2 bug fix and enhancement update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es) and Enhancement(s): * HOT:ISST-LTE:[P10]:LPAR is not booting up after inactive LPM (BZ#2162411) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es) and Enhancement(s): * HOT:ISST-LTE:[P10]:LPAR is not booting up after inactive LPM (BZ#2162411) rocky-linux-8-aarch64-baseos-rpms grub2-common-2.02-142.el8_7.3.rocky.0.2.noarch.rpm d9144ef96e60849f7499704dccc1769bf2e202b10c020e8e60e990a94073c7a5 grub2-efi-aa64-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 069d7da6a072f4ed18240e150622569d7b1b81159a4996e5681d5b08aa5919a7 grub2-efi-aa64-cdboot-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 4649be4df18b0d1b382ee61a58de03f9c1090162486fef14b088ad089b768a17 grub2-efi-aa64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm c35195531f6ad155e0bbb19a5cbdb30ea89aa1088eb0aec40af8cc31c4753f4b grub2-efi-ia32-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 0a31dfc5494ba26886bb20882418e884a2f4fc51ecf2cc3bbf33c51e86b05571 grub2-efi-x64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 53b84245064eb9a42bae0cc85e1fa43b7871085446b813bcf71dfd0c734acb29 grub2-pc-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 8d96bea14500c3f01fc24e2c37ae18dfa8f92c27c0b0721ff923d568b6ed8400 grub2-tools-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 1ea4ecc946f8d4732c78e303cd55b2cfa1a30d21e25e2ac9ce38959907502211 grub2-tools-extra-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 8e49b9e598f96f983018219a7df54e6cd5092befc108f45cf711cf4b5e75be16 grub2-tools-minimal-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 4eee270ce37bf57fbdeb2d828afd3cf6490f0765bd1c6c34de6276c6e6cbe3f6 RLSA-2023:0842 Moderate: tar security update The GNU tar program can save multiple files in an archive and restore files from an archive. Security Fix(es): * tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU tar program can save multiple files in an archive and restore files from an archive. Security Fix(es): * tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms tar-1.30-6.el8_7.1.aarch64.rpm 3dda4f6793ebb52c614eb18e44ee52a7bd6544ee6b200cdff37b56ac9a2fa83f RLSA-2023:1140 Moderate: curl security update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: HTTP multi-header compression denial of service (CVE-2023-23916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: HTTP multi-header compression denial of service (CVE-2023-23916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms curl-7.61.1-25.el8_7.3.aarch64.rpm acf1ea3733bc52a80e12bb82d2770aaf0398b0436c331dd0931aa9440616cdde libcurl-7.61.1-25.el8_7.3.aarch64.rpm 24bf3e171023587c37593d5eb8c0cd088825882ea7bd7db2da27f622c55a2a93 libcurl-devel-7.61.1-25.el8_7.3.aarch64.rpm b7ab317ff955affaa301102d9eabfca077f11ab74c7c2d48fea781e3243ae05e libcurl-minimal-7.61.1-25.el8_7.3.aarch64.rpm 71792b5b40cf2487aa164e115fd4aacaa13ed9717bd58ec9ac473fa5b43d89b6 RLBA-2023:1300 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos tool has been upgraded to the latest 4.5.0 upstream release, which includes a lot of underlying improvements and fixes. (BZ#2166655) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos tool has been upgraded to the latest 4.5.0 upstream release, which includes a lot of underlying improvements and fixes. (BZ#2166655) rocky-linux-8-aarch64-baseos-rpms sos-4.5.0-1.el8.noarch.rpm 09cecb873d49432c060f6a8e741833a7cbe0ddae4d2cee238694b9c3dd7eaed4 sos-audit-4.5.0-1.el8.noarch.rpm d11f01fb828ef8de3e04bcc64f976a61fe0955eec21da53e379a03263f9254bf RLSA-2023:1405 Important: openssl security update OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms openssl-1.1.1k-9.el8_7.aarch64.rpm 603a7b2c935add53fbdfde77ee27afe911606868ad96afd42512986886cd71ea openssl-devel-1.1.1k-9.el8_7.aarch64.rpm 87318f73db6c692abbe3991e4d1e67fa68701866cf5cd2835a534350d89bb8cf openssl-libs-1.1.1k-9.el8_7.aarch64.rpm 648a25c2c5f1b26fbd9ed50bdff45848c252326ef073eae5ef7d52ae0b6c2e87 openssl-perl-1.1.1k-9.el8_7.aarch64.rpm dbaadb6d30b3558ad3ed40dc63ac3daa556cbf846c1f585046a6473674116834 RLBA-2023:1553 linux-firmware bug fix and enhancement update The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.8 Bug] amdgpu firmware update to fix certain "multiple monitor scenarios" (BZ#2165148) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.8 Bug] amdgpu firmware update to fix certain "multiple monitor scenarios" (BZ#2165148) rocky-linux-8-aarch64-baseos-rpms iwl1000-firmware-39.31.5.1-111.el8_7.1.noarch.rpm d6b1367a96fdd1328070287bb4808db9036e0ead5df550f929a210ff32613e50 iwl100-firmware-39.31.5.1-111.el8_7.1.noarch.rpm 9351ea8cf87ea5bc4b95cb42948d128b83c9f9e197c60f7a277464cf5d7b45e0 iwl105-firmware-18.168.6.1-111.el8_7.1.noarch.rpm a84292a42a7de195a2f9f1ba0f2f085388640c34e4439221995298e649602c05 iwl135-firmware-18.168.6.1-111.el8_7.1.noarch.rpm 9e3f315d2d1719b3156279f942cbf1c1fdc25f5282ef217166a64086f73d4f9a iwl2000-firmware-18.168.6.1-111.el8_7.1.noarch.rpm 95a9a8cc0bd908b16231a6877dd2e47b204ce5136207b94d8e59aa262106c2a8 iwl2030-firmware-18.168.6.1-111.el8_7.1.noarch.rpm ff8807423de5c5f552e6f461d95abf901b87e7eb66d6698145c33cfb39c30ae3 iwl3160-firmware-25.30.13.0-111.el8_7.1.noarch.rpm 2aef2e06db9609c3bddddec5d828b21cd265ea81205d5e655e9ee15c282e5134 iwl3945-firmware-15.32.2.9-111.el8_7.1.noarch.rpm 4f486d13a3599d5c73f7cdcfb2e2a7ad444643930cb14044f5f7f92d5ea2ba3c iwl4965-firmware-228.61.2.24-111.el8_7.1.noarch.rpm e689b272104b1c62146234ca94c391f976fac7f53d80745673301df28b9038b3 iwl5000-firmware-8.83.5.1_1-111.el8_7.1.noarch.rpm 9f8c9d2ae7c6456db27a0a3f2becce130b920eb15ac1f5c0b3e75272e1052015 iwl5150-firmware-8.24.2.2-111.el8_7.1.noarch.rpm 11f4c5d536e5b92d575f449f49887352dbfdb32bec6c2a59d0cc71e0d262997f iwl6000-firmware-9.221.4.1-111.el8_7.1.noarch.rpm 05c572d66c3c2a9e5da10cf5ae3255c8e0cc635b4e1124be89d1c9066326c909 iwl6000g2a-firmware-18.168.6.1-111.el8_7.1.noarch.rpm 24d02231cd1281febee88652dd4ea1d3dd6321af83ea46b09dba23f7e09dd250 iwl6000g2b-firmware-18.168.6.1-111.el8_7.1.noarch.rpm d8f57463a148d115ea1752681e53cbba329663911533c13c3940d0499a1786c2 iwl6050-firmware-41.28.5.1-111.el8_7.1.noarch.rpm 107934970687d8b2b9276784202c13a32de90650ed51d14bfe1e18b40d1f99b2 iwl7260-firmware-25.30.13.0-111.el8_7.1.noarch.rpm 29e46c7cde1633402e3bdec2037d2527b627750aca1c901e21cf8c6cf46bba5a libertas-sd8686-firmware-20220726-111.git150864a4.el8_7.noarch.rpm fcab71d89332db55570bca52f189db1572548cd366cfab8d774da3773c89ac79 libertas-sd8787-firmware-20220726-111.git150864a4.el8_7.noarch.rpm 1a970311eccdfe89500206af694759b499ab95f0f24f7f44d43fce468b581db8 libertas-usb8388-firmware-20220726-111.git150864a4.el8_7.noarch.rpm 8f58245633ae3a6e5be2daaed4d25d79fe90574c7dc0ddad0309a6ef26a79ed2 libertas-usb8388-olpc-firmware-20220726-111.git150864a4.el8_7.noarch.rpm a848ed27770fda7824850fc415d1704bbd759c97cbfabba5499a469956143ff5 linux-firmware-20220726-111.git150864a4.el8_7.noarch.rpm 1ef0b17c57975748cbdb64e31cd5aab909b31589cd1483fa0775907fc386dacd RLBA-2023:1565 device-mapper-multipath bug fix update The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es): *Multipath segfault after running newest patched version (BZ#2161393) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es): *Multipath segfault after running newest patched version (BZ#2161393) rocky-linux-8-aarch64-baseos-rpms device-mapper-multipath-0.8.4-28.el8_7.3.aarch64.rpm e5fa857ab81c6b899b8d88cc794b7346ab95d5d4b5d72234cd7e5a302c159f51 device-mapper-multipath-libs-0.8.4-28.el8_7.3.aarch64.rpm 5af6e74914d8c1dedb825eea4ac8b258bcd82253367ca04c51a1763939180c8a kpartx-0.8.4-28.el8_7.3.aarch64.rpm d1f247cbcc5214090cdaeb16bb0cd4da28832964be9cd90a64305b1c37248f6a libdmmp-0.8.4-28.el8_7.3.aarch64.rpm 1c06901e9108460612d63e275c90179aea0b87d04205ec5dec88800b204112e8 RLSA-2023:1566 Important: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770) * Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170) * AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275) * Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750) * Kernel panic observed during VxFS module unload (BZ#2162763) * Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587) * Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296) * kvm-unit-test reports unhandled exception on AMD (BZ#2166362) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368) * Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665) * panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602) * net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640) * Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645) * mlx5: lag and sriov fixes (BZ#2167647) * Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776) * GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896) * Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228) * fast_isolate_freepages scans out of target zone (BZ#2170576) * Backport Request for locking/rwsem commits (BZ#2170939) * ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550) * Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103) Enhancement(s): * Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770) * Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170) * AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275) * Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750) * Kernel panic observed during VxFS module unload (BZ#2162763) * Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587) * Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296) * kvm-unit-test reports unhandled exception on AMD (BZ#2166362) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368) * Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665) * panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602) * net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640) * Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645) * mlx5: lag and sriov fixes (BZ#2167647) * Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776) * GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896) * Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228) * fast_isolate_freepages scans out of target zone (BZ#2170576) * Backport Request for locking/rwsem commits (BZ#2170939) * ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550) * Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103) Enhancement(s): * Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-425.19.2.el8_7.aarch64.rpm d2f4bcb7d8eff462c755a9355a19308df1e9664d584c91f3e5a57716a99a1aab kernel-4.18.0-425.19.2.el8_7.aarch64.rpm eff75bdc5c1e2d3460385ac309822c0152ef3ae2ef59cbc71ee3c4169b975055 kernel-abi-stablelists-4.18.0-425.19.2.el8_7.noarch.rpm 42e95052460987534f500f7d2475155e2253339a854c66081b660da0e93a2963 kernel-core-4.18.0-425.19.2.el8_7.aarch64.rpm 5d3d148f51837a1aec1436fc718c0b47654f4da3df6dfffe0e8024a15cbfa324 kernel-cross-headers-4.18.0-425.19.2.el8_7.aarch64.rpm 834cdaaea33e57a803fec786456f1b82f36abe4d0c1b5073d32abd8d9a640ed2 kernel-debug-4.18.0-425.19.2.el8_7.aarch64.rpm 6f951026c61c69023d3587e4e8dffc1fd90ebb182e6f8e3f5234898b2bd4599c kernel-debug-core-4.18.0-425.19.2.el8_7.aarch64.rpm d90e5b220ea2421f380784875db748db756d2729e373b6083aa3023b47bab94c kernel-debug-devel-4.18.0-425.19.2.el8_7.aarch64.rpm 74cc8f69654bcafb1139320d02e01989b6f2132bb43cbd3ae9da09cfb83bc618 kernel-debuginfo-common-aarch64-4.18.0-425.19.2.el8_7.aarch64.rpm 866d61df6d095006845a317696d06b2c625ff2528d72f1d9f032cbdbe90d8469 kernel-debug-modules-4.18.0-425.19.2.el8_7.aarch64.rpm dba6a41316940762ba4a47cb1e7f8e6b467859e0d4fcf219d5013f0db6bdfdfc kernel-debug-modules-extra-4.18.0-425.19.2.el8_7.aarch64.rpm fb4130a8c4fb9682884d626ffda0d288366f5866fdec9f6dfe0380690a9ba722 kernel-devel-4.18.0-425.19.2.el8_7.aarch64.rpm 57dfd7e8a6753bfd961062c729333356246fd923a5c1f0e0e84b4557f52be8e7 kernel-doc-4.18.0-425.19.2.el8_7.noarch.rpm c72d6e283b89b4330922b34ba4cf3dbda58d9e847fd00d75d963d139ea2c53c9 kernel-headers-4.18.0-425.19.2.el8_7.aarch64.rpm deddb885d67f53f2cb0c4814a0cb32c0fd6484a8dc75469bd5343f705423f68b kernel-modules-4.18.0-425.19.2.el8_7.aarch64.rpm 1363fc5717ef871fd0d18db0b84daff04620d2b1c7ba992f7595327c57f1a753 kernel-modules-extra-4.18.0-425.19.2.el8_7.aarch64.rpm e952a099ad4af42a29d8592460ed7ba887780aeff64d8806ebc37115f12ec7f4 kernel-tools-4.18.0-425.19.2.el8_7.aarch64.rpm 8cbed7f5ece89eb5c50849a24bf8fcfee89aff8c000049ee67169a6939395d75 kernel-tools-libs-4.18.0-425.19.2.el8_7.aarch64.rpm 0f20402f16f2be67052c071eae1bcf7ed0709d06a228606b33218ce4979dfe3e perf-4.18.0-425.19.2.el8_7.aarch64.rpm d1e6e6d638ef71f14c5d51f3f0b995c4fca1f7883461ebc2fb103dafd3e80963 python3-perf-4.18.0-425.19.2.el8_7.aarch64.rpm b7abe990de788164f07be81ae1f2b53d30517c31adadaaecea827ae1dafbc835 RLBA-2023:1567 samba bug fix and enhancement update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394) * ctdb should have dependency for package samba-winbind-clients (BZ#2170467) * Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468) * samba-tool reports an uncaught exception (BZ#2170469) * Ship new samba subpackages (BZ#2173975) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394) * ctdb should have dependency for package samba-winbind-clients (BZ#2170467) * Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468) * samba-tool reports an uncaught exception (BZ#2170469) * Ship new samba subpackages (BZ#2173975) rocky-linux-8-aarch64-baseos-rpms ctdb-4.16.4-6.el8_7.aarch64.rpm 56799dc0955859aecc67bf659dd049776d4fbe668b89c92add3b9a68aeed4528 libsmbclient-4.16.4-6.el8_7.aarch64.rpm cb3ce2b06b3f9a276626be38be59170119bd334d4d1f6bac0c54b6ab19f15330 libwbclient-4.16.4-6.el8_7.aarch64.rpm efa974b869430f1f53e1900ee1420d551ffcbe1b76fbea6dfde89679be52e642 python3-samba-4.16.4-6.el8_7.aarch64.rpm 864bef79a637c0d109cd18a9269a1716f0dc12f144ec3e133b4736f2e4dfbe45 python3-samba-test-4.16.4-6.el8_7.aarch64.rpm c629fb96bb551604a4640788efde38ce7ab6be89b0a6b680548384cce7b9f6da samba-4.16.4-6.el8_7.aarch64.rpm f675da829a6f18474b5e2d58a595f8dade4ce567aee8b55707ae2836d475602f samba-client-4.16.4-6.el8_7.aarch64.rpm 1ffce194d5d6c730012f34b4c9e66f4e674e558b4670bfa3308d7df4bdb40c3b samba-client-libs-4.16.4-6.el8_7.aarch64.rpm 1dd6eccb5452e386a183a4bbdf623fb424b1a358ddca345e25b4aacc41b3c19c samba-common-4.16.4-6.el8_7.noarch.rpm 97d51a6b773106001a616d443beb10dc4f2720de02c2cdebe92cc6fb33289395 samba-common-libs-4.16.4-6.el8_7.aarch64.rpm c3a4266a76e137b9594ffafcacd7d4028190a16e62d06e6682f7880b9d97425a samba-common-tools-4.16.4-6.el8_7.aarch64.rpm 4d408a4211ff806eef10920e0fd01c522bc581a573d69e2d112e577f821736ab samba-dcerpc-4.16.4-6.el8_7.aarch64.rpm c80bb7bcdc6cb495e94f0c1ee29427052b00862a0315b714f91d4a1dc8ddf2fc samba-dc-libs-4.16.4-6.el8_7.aarch64.rpm 5a7a2273757670b0fe6846aa9a999a94a0a7e1d975760e4cf9b191ff866368e1 samba-krb5-printing-4.16.4-6.el8_7.aarch64.rpm dd8ed9ab82b9c91c9d9a60db4484f1ae8766dbb856ff30f6beb7c12bce69895b samba-libs-4.16.4-6.el8_7.aarch64.rpm 27bff6adeb16b7fde8414b2e492952b375bebed5c3e315d04c0d6bf7b7965d25 samba-pidl-4.16.4-6.el8_7.noarch.rpm 934707d614ffd5c2222c70f953a539bc8b92ffc4b75414a8ad034e53d82ea84e samba-test-4.16.4-6.el8_7.aarch64.rpm c3085909b39ca93bee037ee3fd02d11a441f23604e20008fcd06c20dcad8c3d5 samba-test-libs-4.16.4-6.el8_7.aarch64.rpm 55762d80cb5a9cc20a4623cb538400301df935be60f527b707ed3c236b0223da samba-winbind-4.16.4-6.el8_7.aarch64.rpm 15a2fb843ec99659541b2b231980becd03596da9d6987f9868a86e8fc1322777 samba-winbind-clients-4.16.4-6.el8_7.aarch64.rpm 1110407b7d618b38b42e30a0bb9f46437f1b472a9236ea184996e171bae26bd5 samba-winbind-krb5-locator-4.16.4-6.el8_7.aarch64.rpm dc2013990ed7b8e235c0195aaefd43f5a4d5131a309f08b9b08dae55eb681398 samba-winbind-modules-4.16.4-6.el8_7.aarch64.rpm 9f59cf88cc1d1d752e122001ca2d6e59f90cca79dc96efd80c871883ac32a0a1 RLBA-2023:1568 selinux-policy bug fix and enhancement update The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * [Rocky Linux8/Insights/Bug] SELinux violations insights client SAPHostAgent (BZ#2170510) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * [Rocky Linux8/Insights/Bug] SELinux violations insights client SAPHostAgent (BZ#2170510) rocky-linux-8-aarch64-baseos-rpms selinux-policy-3.14.3-108.el8_7.2.noarch.rpm 2013aed46a43d0a5dc40c88703d4d87f417fac5e30b5fc4a0aa22f971e85839c selinux-policy-devel-3.14.3-108.el8_7.2.noarch.rpm 862b21fb9d39d528ba3c4706401063f5cd769ddd246aeb2784f0bc204833d5cb selinux-policy-doc-3.14.3-108.el8_7.2.noarch.rpm c7960959abe31333dbdfc42cf004e54bec43c5b82816d0efe13f3c5dc65c3e16 selinux-policy-minimum-3.14.3-108.el8_7.2.noarch.rpm 59ba05d47369d385080c7601f5a0f110ed043454bc2f8a2442b90f1450e5dccc selinux-policy-mls-3.14.3-108.el8_7.2.noarch.rpm 9644f8b01fa6ff683ab447ce29d6433db26f6516bb67e147a87bc50d603876f4 selinux-policy-sandbox-3.14.3-108.el8_7.2.noarch.rpm 800716bd8afd4b143ad5d2da713ce0c9c27b5775f7ee840ea6e1f27e6264f8f7 selinux-policy-targeted-3.14.3-108.el8_7.2.noarch.rpm edca9f783ee64438467aab41236f4d68bf0cc390c4b6975cdaad10d04b5d5591 RLSA-2023:1569 Moderate: gnutls security and bug fix update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152) rocky-linux-8-aarch64-baseos-rpms gnutls-3.6.16-6.el8_7.aarch64.rpm 3ccff4c553d33bc67c5b4dad6ea92f37d26fc22138654eab7a68400ee3d62bc4 RLBA-2023:1570 NetworkManager bug fix and enhancement update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager hostname lookup fails with IPv6 (BZ#2174362) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager hostname lookup fails with IPv6 (BZ#2174362) rocky-linux-8-aarch64-baseos-rpms NetworkManager-1.40.0-6.el8_7.aarch64.rpm c95f99ea8e877260f7160e39b20c5e3c1832915b6286bbd0982cdeafd8869102 NetworkManager-adsl-1.40.0-6.el8_7.aarch64.rpm be9f9fe9ada8fcf0a1e9fe49fccae55c36224fe9bbb81ad07c44bcef56238166 NetworkManager-bluetooth-1.40.0-6.el8_7.aarch64.rpm a82032f1709e2aaa1ac88b5221023237e9ae6aee22d88a8a3cc8615528e04817 NetworkManager-config-connectivity-redhat-1.40.0-6.el8_7.noarch.rpm 6cbb3a4599412d4f9532c78c37a25a7fc1d13c3db025c56ca81b018ceb4474b8 NetworkManager-config-server-1.40.0-6.el8_7.noarch.rpm c19ab8732408c8519100a185a29a88f6552b6c13f88179999a3478c61a98fa0a NetworkManager-dispatcher-routing-rules-1.40.0-6.el8_7.noarch.rpm f5b804bb2124b9760066f570061afcedb5c51ac16c6fb7d78c8d987a4472d69a NetworkManager-initscripts-updown-1.40.0-6.el8_7.noarch.rpm bd3bb61ec99c1b671a3cd14b349cf56bd38d4951dc63bdc5d5c33b964df64731 NetworkManager-libnm-1.40.0-6.el8_7.aarch64.rpm de5910008f184f0421cb5048bbd41e4f928d41ff4040d5fa06fe3a5570727ddc NetworkManager-ovs-1.40.0-6.el8_7.aarch64.rpm 4e322109991380ca359eebd1f85f3894359ad3a845910199351e49672042cc97 NetworkManager-ppp-1.40.0-6.el8_7.aarch64.rpm 63ac3c1ff897171885744e531ad625b039dec726bcaf82541715475eebedf284 NetworkManager-team-1.40.0-6.el8_7.aarch64.rpm 9e67495cb808dff86f676820f4c44197ba2ce081da3a37b92c3cda4d2f8a010a NetworkManager-tui-1.40.0-6.el8_7.aarch64.rpm 4f855119e3d47ddd5cda3baa27a46011a7abc0aab9019227a4eb4f739dfab119 NetworkManager-wifi-1.40.0-6.el8_7.aarch64.rpm d5c5eb6ec76f824a99c58c5092bfe0161c0aa6371b2eaeaee9c963d6f7b8e93c NetworkManager-wwan-1.40.0-6.el8_7.aarch64.rpm 7769d5855dc8a57b496cbcff7aa555d7b6279f86548902d50b183499aee1b143 RLBA-2023:1571 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [rebase] rebase sos to 4.5.1 (BZ#2175806) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [rebase] rebase sos to 4.5.1 (BZ#2175806) rocky-linux-8-aarch64-baseos-rpms sos-4.5.1-3.el8.noarch.rpm 6b7406d995defe6c7158fd2342a79920920c06c94b0ed3670423892afb782297 sos-audit-4.5.1-3.el8.noarch.rpm 43723ff3f321f3847b20a5162268aace1d60dbb7812534ae808add2d3ba93133 RLSA-2023:1930 Important: emacs security update GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: command injection vulnerability in org-mode (CVE-2023-28617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: command injection vulnerability in org-mode (CVE-2023-28617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms emacs-filesystem-26.1-7.el8_7.1.noarch.rpm e818eac7fc25269dec708905b869d866a00355e16ca5524cacb291d1f6d383f0 RLBA-2023:3103 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably: * The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25. * This update also includes changes for Egypt, Morocco, and Palestine that shipped with tzdata-2023a. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably: * The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25. * This update also includes changes for Egypt, Morocco, and Palestine that shipped with tzdata-2023a. rocky-linux-8-aarch64-baseos-rpms tzdata-2023c-1.el8.noarch.rpm 172d38efe4e48e867246cfc57b33d60043c4b31cd7787e9a2b2567e89753c9d0 RLBA-2023:2953 kexec-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kexec-tools-2.0.25-5.el8.aarch64.rpm 467492387a44e85dd26ac4ebf5049ba3a2fc09a2189fa220efa23c2638ff51db RLBA-2023:2956 libteam bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libteam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libteam-1.31-4.el8.aarch64.rpm 221167622197fde92909db4f7985ebc7e5987f7ccd18c16a78cf8b4b90c61dd2 libteam-doc-1.31-4.el8.aarch64.rpm 5af97c9f55caea1f24af55d6b950b6367e5b6e180a0daeefb37985fa2fb59166 network-scripts-team-1.31-4.el8.aarch64.rpm 080842a645df15cecbea6c357dd74f7931564ea31b7af79bb7cb323078a21650 teamd-1.31-4.el8.aarch64.rpm 1e9348a132ee41318fcb184d4fa335234ed8844ebf1ceee4a5dfefc0cf4cbc3d RLBA-2023:2957 kmod-kvdo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kmod-kvdo-6.2.8.7-88.el8.aarch64.rpm 054763ec23801d6a7b290c1274da897610d742988c50e2a4598db474cc6f6099 RLBA-2023:2978 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms opencryptoki-3.19.0-2.el8.aarch64.rpm 1360f9ce271d1eb1fec0002478aa659ff222381d83ca85e58c9d041a24a55c88 opencryptoki-icsftok-3.19.0-2.el8.aarch64.rpm 253304292ed29c381ebd371d6a1d97d09527987a4f50a2ac5d1ee9db59147de1 opencryptoki-libs-3.19.0-2.el8.aarch64.rpm 2e0194ee63e3329c8a9446418eaed65af977985711cab32b8b24a6f299dd41a9 opencryptoki-swtok-3.19.0-2.el8.aarch64.rpm 61710002c198a06860e88fe6c13ea8c87ad92da2938cb7ebc652cc9ea31cee5c opencryptoki-tpmtok-3.19.0-2.el8.aarch64.rpm 7a50cd4e281527ba77b98b4a6feb24a7af4782b0a82242e1eae644890d7792cb RLBA-2023:2979 libdnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libdnf-0.63.0-14.el8_8.aarch64.rpm 6726756fb07a0dae3c032fa03408b329fd7622973163b67d0084a96e5184f6ad python3-hawkey-0.63.0-14.el8_8.aarch64.rpm 8231fc0fde1f0b11d57ac3875a12b48e6f1ec2635974dbe14155b6a941174f82 python3-libdnf-0.63.0-14.el8_8.aarch64.rpm 9a6889a00e43cd923513efd595b06460b8552976ff6b955e2a99a77b1156ed4d RLBA-2023:2984 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dnf-plugin-subscription-manager-1.28.36-2.el8.aarch64.rpm d2003ed981ac4d47de67a204ffde4e661515c6aa984267fcd35ab5cf819ad9c5 python3-cloud-what-1.28.36-2.el8.aarch64.rpm a60e74d611a7d2c6dd92b98307b78980ce61df5c86be79e4746f21c529211474 python3-subscription-manager-rhsm-1.28.36-2.el8.aarch64.rpm a8a07caa0ae458c33fdc9ec4e1d43917be834f5a92d254f102490de6f78c9768 python3-syspurpose-1.28.36-2.el8.aarch64.rpm 22a984e00abc477b0b24f21a27c392c165f7405447fc7140022bb1ce0574e1b0 rhsm-icons-1.28.36-2.el8.noarch.rpm cd7db5da1b82708148a5720eed115437564328817ef9c61cb33c4c140f70da1f subscription-manager-1.28.36-2.el8.aarch64.rpm 027bc79d91648e308f83e663e31a2bff0c6cac678b30f0cfd66e8e6a25808ba7 subscription-manager-cockpit-1.28.36-2.el8.noarch.rpm d82b6f2e75b756e034caacd882e52fc8378568e89b82a82a60c11ef9ed8af904 subscription-manager-plugin-ostree-1.28.36-2.el8.aarch64.rpm 82ca3d1d8380322cab2683f118cbd777d23758f02dc505157821c7fe198f93bc subscription-manager-rhsm-certificates-1.28.36-2.el8.aarch64.rpm 0dd6f2bc092416ce7246c5b6c2411e5950238469e01b8dbd8e1749c472831ed8 RLBA-2023:2991 libtalloc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtalloc-2.3.4-1.el8.aarch64.rpm bf04fd1e09059e596232affcf4374ce47cba4b02a8d62fc2f1b9e26bdc2fc4fa libtalloc-devel-2.3.4-1.el8.aarch64.rpm dff0208ba8b20d80ecfcbffa24e3f84e2ca01efc01aa2c6c5a888b648fe45914 python3-talloc-2.3.4-1.el8.aarch64.rpm fb232656f22f92bf2be091f0e58c2f48cd8b5c10d79ef9fd304ff3860239fbcb RLBA-2023:2996 cryptsetup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cryptsetup-2.3.7-5.el8.aarch64.rpm 78443d578295c56bf0bd24d21055f86d9e6ca5ad0527a88779b787cbe977bcf0 cryptsetup-libs-2.3.7-5.el8.aarch64.rpm 7c71894f4273c532ba07a7a7b24b192fd2ae8ae20861564713f797a32f27b9b4 cryptsetup-reencrypt-2.3.7-5.el8.aarch64.rpm 22dc30c96b45d35bf2a11535258f9bbd47df67609d0f4b972ff90de17ad1f553 integritysetup-2.3.7-5.el8.aarch64.rpm dcbb69559941ab0bc74fd3b0252ccdbdfe8be059e44c28a033eeb84e19440f86 veritysetup-2.3.7-5.el8.aarch64.rpm 3f3388a3aaf70f2f1a53c03b9a3de3d52e582a865050c11cbf118e8fe8192957 RLBA-2023:2997 adcli bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms adcli-0.9.2-1.el8.aarch64.rpm 5b7359e76fd820b53bb8d24f18f3f6b2b29510d5222dee4fbe07d5331e6d72e8 adcli-doc-0.9.2-1.el8.noarch.rpm 15217133c085f89b79dc4b20a9e14b0e0b0f0f1884f3aef111327d47fa8df53e RLBA-2023:3007 libtraceevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtraceevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtraceevent-1.5.3-1.el8.aarch64.rpm 3cdb13bd872a3f7aea48ebccfd6b7598453216a9f10830bb6757ca11d8c7c31e RLBA-2023:3010 libtracefs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtracefs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtracefs-1.3.1-2.el8.aarch64.rpm de4d063ecaf00f0c11f11ce0e4370743f240df0f6868d5fd13da2462802648b1 RLBA-2023:3016 tar bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tar-1.30-9.el8.aarch64.rpm f92312f6da5bc8167ae07dfe31be1ed87314741263dc663178323ea84d55d058 RLBA-2023:3036 librhsm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librhsm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms librhsm-0.0.3-5.el8.aarch64.rpm 626ddbf9753000ccfc235cc4437668b643f0a3d8f26077ed1e46fb092f3ee1de RLBA-2023:3043 perl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-Errno-1.28-422.el8.aarch64.rpm baa63922875404ce1932ad475b44760dc557fa6e61c75a2bc7e3eea7356c218c perl-interpreter-5.26.3-422.el8.aarch64.rpm 9ebfe2bf3764169f1ba29d2746a160f230c8844d544103c57a235637a12620fb perl-IO-1.38-422.el8.aarch64.rpm 783504d6785993bc302ffed5cb707972697798b43034835e053d0b9cb99b6289 perl-IO-Zlib-1.10-422.el8.noarch.rpm 0d3e1c768da883fe6c7f9c2b889eb0f6b2d0618d3897dac5e9db54cac1b396c0 perl-libs-5.26.3-422.el8.aarch64.rpm 43c7a7362df2821a2dbddfdc41cad09ca1877bff1a7694c1a2a9d73f000f68f5 perl-macros-5.26.3-422.el8.aarch64.rpm ba9a0f21d314edb3e259a47e1e1e9b03f9775d7126e42ab50fc862bbfd9e0e86 perl-Math-Complex-1.59-422.el8.noarch.rpm 39ea34de65b999e9d930e330d681f41de8e33867cc8b21f81ecd8c3a2983c40a RLBA-2023:3048 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms device-mapper-1.02.181-9.el8.aarch64.rpm d532bed0061391969f61706fca883c180099a060d5ac58d3e6f1e1e18b225c7f device-mapper-event-1.02.181-9.el8.aarch64.rpm 356706d0d76f462e41ebd251348d01c89130f30db1bde83f7ab0393b5ada517d device-mapper-event-libs-1.02.181-9.el8.aarch64.rpm 6eddba0fd1e1cb80c896e887588f1240e9bf451f6895d9f546d1fceecf9d0c98 device-mapper-libs-1.02.181-9.el8.aarch64.rpm a8b8f6454325ce803af7373e1cdc3de996722b657b7a3ff7e8d19b0b9cb0590a lvm2-2.03.14-9.el8.aarch64.rpm 702ecf3d76c1625309094572aa5272b828f451270c4fd9c5dc7436d61be7ce13 lvm2-dbusd-2.03.14-9.el8.noarch.rpm 9009cba46706d0f596478343943c8c4d13896b61ccb641a836658735f8d51277 lvm2-libs-2.03.14-9.el8.aarch64.rpm b33670318b7feea6ef3bea1144a3ee6cd4095f755800e955f5539a70a3f76430 lvm2-lockd-2.03.14-9.el8.aarch64.rpm cac02f1d76e323d53bf6d4e9955601517d21a7076b79adc3af3167d8df4ebf69 RLBA-2023:3063 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms file-5.33-24.el8.aarch64.rpm d5bbc1bee7d4a472436db834875f103014f64b103bf35b31a49d586869e3790e file-libs-5.33-24.el8.aarch64.rpm 7d492277743031bb154f0032c97bb0d5389ccf7b82e877dd9efaafd9e0e2db2a python3-magic-5.33-24.el8.noarch.rpm e1561599f12135b7b36a64fe32ccea7c919aaf5ec469b42f42a6acfee796673d RLBA-2023:3102 util-linux bug fix and enhancement update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Backport hint about systemd daemon-reload. (BZ#2180442) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Backport hint about systemd daemon-reload. (BZ#2180442) rocky-linux-8-aarch64-baseos-rpms libblkid-2.32.1-42.el8_8.aarch64.rpm 9fb707eee5bd9351ada2dd2a232a2e9dc945d30820eaffded55ffebbd54ffbad libblkid-devel-2.32.1-42.el8_8.aarch64.rpm 160ac451b9fdb4bf39979fb7c5e08706b0e69705da0f74d194680b9677443b06 libfdisk-2.32.1-42.el8_8.aarch64.rpm 88d83e2e237751a722eb2cc239d326917cc62e0e112e200bd238b1e534c4d9a1 libfdisk-devel-2.32.1-42.el8_8.aarch64.rpm a9cf7d886477fc210fabd71bec814105e787edb0c567d012cc010e424ebba448 libmount-2.32.1-42.el8_8.aarch64.rpm 7690cadf7a0728ac02dbd1ac33d032c846ebdc23513157301910fb7ae431ecf3 libsmartcols-2.32.1-42.el8_8.aarch64.rpm efac17454e401f87960b08b9ff1ca8958e524167ef4ff458c1548be8ca70fc4a libsmartcols-devel-2.32.1-42.el8_8.aarch64.rpm 2582eaad26c6660ebb2ef4e36b0ee3b89ffcdd5caaf1586fea5046eac794b2a4 libuuid-2.32.1-42.el8_8.aarch64.rpm a608f154af45578e4fa7ac66503be083b50279ef9837d65b9bbefac7fbd02e0f libuuid-devel-2.32.1-42.el8_8.aarch64.rpm 3f9843f29d5653f8d9a51c27f3faab69851ae965730fedabea453497975b25df util-linux-2.32.1-42.el8_8.aarch64.rpm d94d9770eeb4db7192d11a25f7769370b2f1a0650076387c8160d663adedc131 util-linux-user-2.32.1-42.el8_8.aarch64.rpm f131597d3fc6e73034a2f767a045a9c827846933772385daea74fbc887e52d65 uuidd-2.32.1-42.el8_8.aarch64.rpm 677d8bf524f444d7cac9e99595f832f5457989d4947765c48c800dca6d5ff4c4 RLSA-2023:3106 Moderate: curl security and bug fix update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: FTP too eager connection reuse (CVE-2023-27535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Cannot upload files to Jscape SFTP server: file gets created empty (BZ#2188029) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: FTP too eager connection reuse (CVE-2023-27535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Cannot upload files to Jscape SFTP server: file gets created empty (BZ#2188029) rocky-linux-8-aarch64-baseos-rpms curl-7.61.1-30.el8_8.2.aarch64.rpm 902935689a900c013836688f9795afae8f647148ec4e725aead278dbbb60207a libcurl-7.61.1-30.el8_8.2.aarch64.rpm ffbcf2b126a8cab46bd89e9a2529d7214511ab1ec8ced49fa8a882320ab53140 libcurl-devel-7.61.1-30.el8_8.2.aarch64.rpm a1129e4f5de388553c06773be7ce96b14c8c85db8c6e091f1c4472148ae2cb93 libcurl-minimal-7.61.1-30.el8_8.2.aarch64.rpm 646abb83fddca4afcb0c22cb541b193a4bad6daa873eceb3eb47e9afc00c2bc4 RLBA-2023:3414 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * unpackaged gives false positive about /usr/lib/jvm/java-*-openjdk-*.x86_64/bin/jfr (BZ#2169684) * [Rocky Linux9] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2174254) * [cee/sd][RFE]sosreport is not capturing ceph Orchestrator CLI outputs. (BZ#2116602) * [Rocky Linux8] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2143272) * sos subscription_manager plugin may collect proxy passwords (BZ#2177282) * [virsh] may collect SPICE passwords in virt-manager logs (BZ#2184062) * sosreport collect configs that contain plaintext passwords - /var/lib/iscsi/nodes/<IQN>/<PortalIP>/default (BZ#2187859) * [powerpc]: This patch updates powerpc plugin to collect the slots and active memory sharing information (lsslot, amsstat) (BZ#2190176) * Collecting logs for lparnumascore in IBM Power Systems (sos/sosreport) (BZ#2177984) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * unpackaged gives false positive about /usr/lib/jvm/java-*-openjdk-*.x86_64/bin/jfr (BZ#2169684) * [Rocky Linux9] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2174254) * [cee/sd][RFE]sosreport is not capturing ceph Orchestrator CLI outputs. (BZ#2116602) * [Rocky Linux8] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2143272) * sos subscription_manager plugin may collect proxy passwords (BZ#2177282) * [virsh] may collect SPICE passwords in virt-manager logs (BZ#2184062) * sosreport collect configs that contain plaintext passwords - /var/lib/iscsi/nodes/<IQN>/<PortalIP>/default (BZ#2187859) * [powerpc]: This patch updates powerpc plugin to collect the slots and active memory sharing information (lsslot, amsstat) (BZ#2190176) * Collecting logs for lparnumascore in IBM Power Systems (sos/sosreport) (BZ#2177984) rocky-linux-8-aarch64-baseos-rpms sos-4.5.3-1.el8.noarch.rpm 7f0a8ece1f9aef2b5284bb694100b677b74d6fa26017d106cc1d6d5e66be5b3f sos-audit-4.5.3-1.el8.noarch.rpm 775fe1c26d95e93cb646eb46b0f9b89b9322f55e1be3e39a360e9d816165248f RLSA-2023:3584 Important: c-ares security update The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms c-ares-1.13.0-6.el8_8.2.aarch64.rpm 5111c729ffe36b14b30f03fe8ad3abdf75518adfdcda18df26931cb7f6ed404b c-ares-devel-1.13.0-6.el8_8.2.aarch64.rpm 9da7e43b88c5315e31236401c178b2067dd296442eb6422ca14790f063fa395f RLSA-2023:3591 Important: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-51.el8_8.1.rocky.0.aarch64.rpm f917f12982dfbd015bcf2deb7e277b371d13079d39b45be008187ffea3b84f12 python3-libs-3.6.8-51.el8_8.1.rocky.0.aarch64.rpm 30e20877e36bb914e77eb2f1a3fb1c85b0bda4724a836769d5cd50e5f7136556 python3-test-3.6.8-51.el8_8.1.rocky.0.aarch64.rpm 467d51aa54834a9ad2eaa243a211e9f34e6a068dfd475bcbab16ee8dd2aaf551 RLBA-2023:3845 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * NetworkManager brings down connection when the IPv6 link-local address is removed (BZ#2209355) * ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * NetworkManager brings down connection when the IPv6 link-local address is removed (BZ#2209355) * ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975) rocky-linux-8-aarch64-baseos-rpms NetworkManager-1.40.16-3.el8_8.aarch64.rpm 0e0634d42b6c0902d4ead00c0556d3a7b8f2e7d9740b1c670e533a1c35ab9d5e NetworkManager-adsl-1.40.16-3.el8_8.aarch64.rpm 74b04b5da0178821b7d8d11992bb14226695e72d7c4ffc2d671b423f374c8705 NetworkManager-bluetooth-1.40.16-3.el8_8.aarch64.rpm 777df2f217759dbd53c75952a503acbea6ce9765d24ef89e4bf1146d7b3f81e1 NetworkManager-config-connectivity-redhat-1.40.16-3.el8_8.noarch.rpm f555a68b7f7a51585c2e2292d108862b31b85209d3668c0e9c1678007cb79e34 NetworkManager-config-server-1.40.16-3.el8_8.noarch.rpm eb4c373898ee5ffaffb55512fa494558d19a0dcfd937431cdb402178a6bf9fd8 NetworkManager-dispatcher-routing-rules-1.40.16-3.el8_8.noarch.rpm 157c9fa8363f772c6097d63fa65cc10ed18314dd5f2315835acc256916fece26 NetworkManager-initscripts-updown-1.40.16-3.el8_8.noarch.rpm 7e6e14dc80f29ab22894c3f854fedd4973546c1713d98c6897b25b7d728f50fa NetworkManager-libnm-1.40.16-3.el8_8.aarch64.rpm b846b3e51b3aac34eda7f62e6d9500db998900e8fef05cebe4192e4214e106c0 NetworkManager-ovs-1.40.16-3.el8_8.aarch64.rpm 19cba337187dac6cc6cadcef14e21a258422af5e054e6c0bd9db63a192b75ddb NetworkManager-ppp-1.40.16-3.el8_8.aarch64.rpm f637b7de8817bc4911155275a5c9c916e2e67f8093e92939652c7e1661e43a75 NetworkManager-team-1.40.16-3.el8_8.aarch64.rpm 607e9e1f6a39c788abb3fbe59a70bed77df8c1f1074127bc9309e663a812c00c NetworkManager-tui-1.40.16-3.el8_8.aarch64.rpm 69ece4dc0cec2230749f7320af778f77e436963268c05321ee7a8260fc9d78a2 NetworkManager-wifi-1.40.16-3.el8_8.aarch64.rpm 94a609c91d6eeec993df033cd3aef322a583efba35d98ae15ef081e438fe3a9f NetworkManager-wwan-1.40.16-3.el8_8.aarch64.rpm 13c621ef8ad93a753bab043542f6828c4074d5fae1e039f7fe19a44f3f865aa8 RLBA-2023:3846 selinux-policy bug fix update The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * systemd-pstore fails to start due to avc denial (BZ#2188268) * Relabeling of /run/fsck (BZ#2212328) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * systemd-pstore fails to start due to avc denial (BZ#2188268) * Relabeling of /run/fsck (BZ#2212328) rocky-linux-8-aarch64-baseos-rpms selinux-policy-3.14.3-117.el8_8.2.noarch.rpm 7f6ad0f813879d1a51baaef4745c48cd432c147db3b72dcee814cb671635f3a3 selinux-policy-devel-3.14.3-117.el8_8.2.noarch.rpm dd9e5f89926683ec01278f6f61f08ceadfd5041833c4220e1c7b265619515e20 selinux-policy-doc-3.14.3-117.el8_8.2.noarch.rpm 26d11647b989995b16ece5dedc1b58881c25019c88b1b48e895dc0f9c4d84451 selinux-policy-minimum-3.14.3-117.el8_8.2.noarch.rpm 42709415e373b719dd05d16041fd82b5dc5e90c9d8243e742b4bfeef9f76685a selinux-policy-mls-3.14.3-117.el8_8.2.noarch.rpm 6762f3e25f7f9474012da46063831e81b81fcf1c0d9cc6e36b0845c7f79b3032 selinux-policy-sandbox-3.14.3-117.el8_8.2.noarch.rpm cc9920876bf370315c6b7646f5c547d6b2bf53a4bb3242550bd30b02199fe540 selinux-policy-targeted-3.14.3-117.el8_8.2.noarch.rpm 609cffecdf4eb34c9f6fbf929c027afa97b9af645d911a1c60335c1a412bcf70 RLSA-2023:3839 Moderate: libssh security update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667) * libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667) * libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libssh-0.9.6-10.el8_8.aarch64.rpm 48cca0d757bcf9c732ea6aba957ae65ca5422f3f3c7f4a7c50697100d1ce425a libssh-config-0.9.6-10.el8_8.noarch.rpm 3e5d27decdf556d137d933343df069c27646eddc24424daf0a955d734d0a9087 RLSA-2023:4102 Important: bind security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bind-export-devel-9.11.36-8.el8_8.1.aarch64.rpm a33e745db5a363d574b81c96243bfe44b9a73065f4abfe1b3399de9729ebca87 bind-export-libs-9.11.36-8.el8_8.1.aarch64.rpm c0bdd761e0da985daa1a4a0d374d8b3005678f3b90cdd3ab7d547726cf37bc21 RLBA-2023:4279 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * sos report collects data from container instead of host due to symlinks    Triaged (BZ#2075720) * sos report --clean doesn't obfuscate all MAC addresses. (BZ#2207562) * RFE: embed Grub's "custom.cfg" and "user.cfg" in the sosreport (BZ#2213951) * Exception raised by hpssm plugin in plug.setup(). (BZ#2216608) * rebase sos to 4.5.5 in rhel8.8 and 9.2 (BZ#2217943) * sos clean - Respect permissions of sanitised files (BZ#2218279) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * sos report collects data from container instead of host due to symlinks    Triaged (BZ#2075720) * sos report --clean doesn't obfuscate all MAC addresses. (BZ#2207562) * RFE: embed Grub's "custom.cfg" and "user.cfg" in the sosreport (BZ#2213951) * Exception raised by hpssm plugin in plug.setup(). (BZ#2216608) * rebase sos to 4.5.5 in rhel8.8 and 9.2 (BZ#2217943) * sos clean - Respect permissions of sanitised files (BZ#2218279) rocky-linux-8-aarch64-baseos-rpms sos-4.5.5-2.el8.noarch.rpm 5cd5a9aef2b3a62a5e1a27c419b5113af2b62c3f8323aa8875eedad8343727a0 sos-audit-4.5.5-2.el8.noarch.rpm d0f18c4d5e5b388aac649b277d7313885af6bbdc61b5ae7d62c3c56d2f487e98 RLSA-2023:4419 Important: openssh security update OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms openssh-8.0p1-19.el8_8.aarch64.rpm a3223be6d4ce5f839ffa3b080822d39f49a547e7ff552ec17faf0f27d1a37efd openssh-cavs-8.0p1-19.el8_8.aarch64.rpm e88f8bbb386b0afa96ece23103c67eac2dee665ae11e54da4f422688dfb43be5 openssh-clients-8.0p1-19.el8_8.aarch64.rpm d4d6b41657f205f573edd66b8cffa062075f4e2fb5c111a07173ca19441e18c3 openssh-keycat-8.0p1-19.el8_8.aarch64.rpm 7be1e0801cfacbcfef4140e29e62ba27ffdfb034018432700109a4c84d2b3682 openssh-ldap-8.0p1-19.el8_8.aarch64.rpm 2058d3e49f8eaa023f16785b2b0d56976f943b8a7809cd7bc95bd262785a3ded openssh-server-8.0p1-19.el8_8.aarch64.rpm 7d926da278d607ca4790f9f30b7c9bbcb193da975d6a667244eec07f68cab7a6 pam_ssh_agent_auth-0.10.3-7.19.el8_8.aarch64.rpm 6510c82c181c4b8f3c3b77d48988e498295a8e3665753668de0d3f0409da5d75 RLSA-2023:4498 Moderate: dbus security update D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms dbus-1.12.8-24.el8_8.1.aarch64.rpm 2bc9a54d699aef03e2687ef72fdf526d2b8618056dcb6105884e6c6b8eac3223 dbus-common-1.12.8-24.el8_8.1.noarch.rpm 51ab0fbbd3337ca006d0b4febe7f4b916195538845c87a8bbf1dddd9f9962f9c dbus-daemon-1.12.8-24.el8_8.1.aarch64.rpm ca14de2ad6ed84f2aa8bfc02c009fb51eea8264f291cf617b5316ccb7936c996 dbus-libs-1.12.8-24.el8_8.1.aarch64.rpm c9501a8f99e5efbb7fe904fcb97ebdcf651c21c17527e3cf9db90fef2c0ac9ea dbus-tools-1.12.8-24.el8_8.1.aarch64.rpm baf9bb7b9087c1e46b63946c582b2f769329e1249e7affbd9964b391d2f90bd2 RLSA-2023:4524 Moderate: libcap security update Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Security Fix(es): * libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603) * libcap: Memory Leak on pthread_create() Error (CVE-2023-2602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Security Fix(es): * libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603) * libcap: Memory Leak on pthread_create() Error (CVE-2023-2602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libcap-2.48-5.el8_8.aarch64.rpm d44102db00318d277fd18f6810194d13966704b820398bbc7e30cc9139b166f1 libcap-devel-2.48-5.el8_8.aarch64.rpm 0e6f8f1f8c7acea1b1681ce9c52f2a40ad0c65f988249061e5668f95ed9715f3 RLSA-2023:4520 Moderate: python-requests security update The python-requests package contains a library designed to make HTTP requests easy for developers. Security Fix(es): * python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-requests package contains a library designed to make HTTP requests easy for developers. Security Fix(es): * python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms python3-requests-2.20.0-3.el8_8.noarch.rpm b9245956faa62d6e4dd443679dd3aefd437c2510a3558a4a8772e50c6b5abeb0 RLSA-2023:4706 Important: subscription-manager security update The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform. Security Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform. Security Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms dnf-plugin-subscription-manager-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm 0c10003d7c57644233e715e5245b5518090d690482cea2f2ea07ef32a9483006 python3-cloud-what-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm 86a1e2cf454cdbeab4a3d6002c344bada749291af7d8c1b9e93194677b359b8d python3-subscription-manager-rhsm-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm 993fd439312d4fcf6d4ce5b243dd9a6f04db2f508a23717711f9e4ff844eccd3 python3-syspurpose-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm dba06152938b723ab9ea466cae48b92c51007200a45a000cecad4bf065cf3455 rhsm-icons-1.28.36-3.el8_8.rocky.0.1.noarch.rpm 7424b2d3e9d10f0a1c2c18bfe80b60f635d4dc924a8ac942a67f0574e041692f subscription-manager-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm d2474678ff6570b9de91e31eee25b788979703f79f60767f3fe52105a3a2a793 subscription-manager-cockpit-1.28.36-3.el8_8.rocky.0.1.noarch.rpm 6c04f3fc34a4cc4a8ad23a5ec1f19f496cd4974266d4540e1e17d520f77457e2 subscription-manager-plugin-ostree-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm a64ba6347fd5f2e2418918fa3401030a5e21fb534db5ea3dfbf557942a6848ab subscription-manager-rhsm-certificates-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm 93b9fb0dd1bf96362f35e54debec1afa04d12f97682c48da7f48fc314e2c3d20 RLSA-2023:3837 Moderate: systemd security and bug fix update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: privilege escalation via the less pager (CVE-2023-26604) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: privilege escalation via the less pager (CVE-2023-26604) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153) rocky-linux-8-aarch64-baseos-rpms systemd-239-74.el8_8.2.aarch64.rpm 12b64864c252b18bc759b0138e27de3826655d258ce06b9805d63fd45543d2bf systemd-container-239-74.el8_8.2.aarch64.rpm 415dcae3f610c7ee802fef6d0bd60993e5afb5934331da04d78031770dc48603 systemd-devel-239-74.el8_8.2.aarch64.rpm eb22acd7face8d3ff17a05b53cb4df54dc7ca8b7914e22d2c70d5982a1882806 systemd-journal-remote-239-74.el8_8.2.aarch64.rpm 90e48499ab73556caf2b52aa4b397c0829ee946bf196cdf75d3e01d2a9d44c39 systemd-libs-239-74.el8_8.2.aarch64.rpm 703df35a239160a23206dd2c53fc14ef333520244c0a4e5731909f208c294ea3 systemd-pam-239-74.el8_8.2.aarch64.rpm cfe25dd56cdb5c2c8b9bd3f3a71e2af46af190b74ae61ea0ccfc71742611cccd systemd-tests-239-74.el8_8.2.aarch64.rpm 992cbc5400fb73aa244330dd5dea5388377ef8666f0dfd743e587153f6895764 systemd-udev-239-74.el8_8.2.aarch64.rpm 545a84f2b7ba3eefea7a7543f5d596407e7b7253fdcb7fa9fe8615e4abb5de5a RLSA-2023:3840 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Crash due to misuse of window functions. (CVE-2020-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Crash due to misuse of window functions. (CVE-2020-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms sqlite-3.26.0-18.el8_8.aarch64.rpm 6f3a90af1541bcd5a0c2c9f0099706e45ddec86b533129029409831f1fa2291a sqlite-devel-3.26.0-18.el8_8.aarch64.rpm 9acf757ac781490b8db9b6fa16902d2b640b4230a8c949d250c076c35203852c sqlite-doc-3.26.0-18.el8_8.noarch.rpm 37bf72b866e31176a58ad1187061e3ce2ade2a2829677ca7d15a2ee3f5b7d4de sqlite-libs-3.26.0-18.el8_8.aarch64.rpm 3794e7cf7525f8e2e317870d8d5f352f15236f732f3c2a6973398f8d8992dad1 RLBA-2023:3841 kexec-tools bug fix update The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * [FJ8.6 Bug]: makedumpfile fails for crash dumps collected by Fujitsu's firmware dump tool when 5-level paging is enabled (BZ#2189377) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * [FJ8.6 Bug]: makedumpfile fails for crash dumps collected by Fujitsu's firmware dump tool when 5-level paging is enabled (BZ#2189377) rocky-linux-8-aarch64-baseos-rpms kexec-tools-2.0.25-5.el8_8.1.aarch64.rpm 21ee67b67b486ec41e7766825a114c480cfe141e3fffe389836811d97c51dfb5 RLBA-2023:3844 xfsprogs bug fix update The xfsprogs packages contain a set of utilities to administer the XFS file system, including the mkfs.xfs utility to construct an XFS file system. Bug Fix(es): * xfsprogs: ignore autofs mount table entries (BZ#2208391) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsprogs packages contain a set of utilities to administer the XFS file system, including the mkfs.xfs utility to construct an XFS file system. Bug Fix(es): * xfsprogs: ignore autofs mount table entries (BZ#2208391) rocky-linux-8-aarch64-baseos-rpms xfsprogs-5.0.0-11.el8_8.aarch64.rpm b2f552c2b4d237b0fbabb1ef9ac2227690a74ce12a9beb7f00600fe6dacd176d xfsprogs-devel-5.0.0-11.el8_8.aarch64.rpm c42a86040d3eff183bc3d2d4129d790a13c76f35519367e136d5e5cb8c411032 RLSA-2023:3847 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332) * iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092) * HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305) * kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623) * Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595) * block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236) * xfs: deadlock in xfs_btree_split_worker (BZ#2196390) * Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665) * Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214) * mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284) Enhancement(s): * Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332) * iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092) * HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305) * kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623) * Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595) * block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236) * xfs: deadlock in xfs_btree_split_worker (BZ#2196390) * Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665) * Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214) * mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284) Enhancement(s): * Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-477.15.1.el8_8.aarch64.rpm 838418bcf4a958499d37921837f16986d111f02ab47d7aeaae9dc6487b4d270d kernel-4.18.0-477.15.1.el8_8.aarch64.rpm cc9777444b4a47b480eba8d86381cc3727cf43e954d0ebc99907340dd5a2c8f8 kernel-abi-stablelists-4.18.0-477.15.1.el8_8.noarch.rpm 4b57da1f93ac79480252481b3447f34b1ff62e9d62d2a0c2d11b691fdd871ed1 kernel-core-4.18.0-477.15.1.el8_8.aarch64.rpm 91b989e39d2548879dc64e23e8377a217c1d4ae68486bf66eda7397f73f862f4 kernel-cross-headers-4.18.0-477.15.1.el8_8.aarch64.rpm b47a59b9f66721193026568988e56276ec559e975a289ed18fa4ab760ee47b3f kernel-debug-4.18.0-477.15.1.el8_8.aarch64.rpm 7d5227f5746cae7b4771a895f032045b4b94dd518d8439b60bdb195e1167645e kernel-debug-core-4.18.0-477.15.1.el8_8.aarch64.rpm 88c26433e2f2f4a09be1a90cc8b281a74ccf6bf582e0896ba5ba1d11e683702d kernel-debug-devel-4.18.0-477.15.1.el8_8.aarch64.rpm 6f61780a348c3c709de07ea301fd9216f1462a858488f68037d603bc6c6004e0 kernel-debuginfo-common-aarch64-4.18.0-477.15.1.el8_8.aarch64.rpm 622ccadf25713195dc6acaf9657018bb926775d6ee4a66011a001c4331d01fe4 kernel-debug-modules-4.18.0-477.15.1.el8_8.aarch64.rpm f9f893d8c25d4e66c77681c88bf481f4631e9213c75e1882717f69d7a5332f9d kernel-debug-modules-extra-4.18.0-477.15.1.el8_8.aarch64.rpm 3862e293e5398fa50d9c1bef02f3fdc7718b16af5b9074958a15675721e55b35 kernel-devel-4.18.0-477.15.1.el8_8.aarch64.rpm 892eb95f535581425bc9dd233f41778a7c2cce1811e051cf4e1d641fecada343 kernel-doc-4.18.0-477.15.1.el8_8.noarch.rpm 043697866fe6d669b7208572774446c3534f6783578414487bf872ee7ecb10bd kernel-headers-4.18.0-477.15.1.el8_8.aarch64.rpm 53007214fbc1b8cd422556ccc9f7e07a505a32c8c36e3f2f166117f05bd34567 kernel-modules-4.18.0-477.15.1.el8_8.aarch64.rpm 58a752a444fca124915e1c73883bec33a654c277ecaf9999b53d19cb972eea40 kernel-modules-extra-4.18.0-477.15.1.el8_8.aarch64.rpm aa59ca6575b65207a522019787929a4bae300cef8c4dcf2e7862eb03f280532e kernel-tools-4.18.0-477.15.1.el8_8.aarch64.rpm e12a80a1ce326c29df9fd738e636dfbe0ed1ac57fbeeaa339ec8cbcd04968792 kernel-tools-libs-4.18.0-477.15.1.el8_8.aarch64.rpm 9240544691100cb13bcf85a719c4c35646cb7f387c2339d67fd1ad86ca3c9625 perf-4.18.0-477.15.1.el8_8.aarch64.rpm 9402916d3bab92d8756cf211aeadbcae3f3d5c3f836e861f6df2e98036f8f0c6 python3-perf-4.18.0-477.15.1.el8_8.aarch64.rpm 012f575753263b18be2527a1521fcb028694df10d16fded2ae52dd03702e7e72 RLBA-2023:3848 autofs bug fix update The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * autofs fails to start with combination of +auto.master and local direct map lookups after upgrading to 5.1.4-93.el8 (BZ#2212588) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * autofs fails to start with combination of +auto.master and local direct map lookups after upgrading to 5.1.4-93.el8 (BZ#2212588) rocky-linux-8-aarch64-baseos-rpms autofs-5.1.4-102.el8_8.2.aarch64.rpm 65a03c725eded657b6638f400753f32cc12964823101bafdae6a06ebc0b92b3d RLEA-2023:3849 iproute bug fix update The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel. Bug Fix(es): * macvlan: Add bclim parameter (BZ#2209687) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel. Bug Fix(es): * macvlan: Add bclim parameter (BZ#2209687) rocky-linux-8-aarch64-baseos-rpms iproute-5.18.0-1.1.el8_8.aarch64.rpm 3468909070ca2016b684abfe130816331c2af966d88d968337f005e138175512 iproute-tc-5.18.0-1.1.el8_8.aarch64.rpm f2846127ac16787c2ff6bd8645191d00518c1d58b687abfc4f789e1b20f51fc9 RLEA-2023:3850 krb5 bug fix update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * CVE-2022-37967: MS-PAC extended KDC signature (BZ#2211390) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * CVE-2022-37967: MS-PAC extended KDC signature (BZ#2211390) rocky-linux-8-aarch64-baseos-rpms krb5-devel-1.18.2-25.el8_8.aarch64.rpm 303a386cfd445ce9c2fbb184f13d00bf88fb13ca4a28d9627db3b869c0f22705 krb5-libs-1.18.2-25.el8_8.aarch64.rpm a09732c284b329751c8c6e1a0a6d170f00b74ee781c0c18f0cad198364efba7e krb5-pkinit-1.18.2-25.el8_8.aarch64.rpm 371d7f650e5d586da5987c555717f42fa92540c7f87558ea486034a596799ef4 krb5-server-1.18.2-25.el8_8.aarch64.rpm 66c196c29e549a5ec16fcf7e029d7b88661a72a372209e2980f5ba0ca9d13e73 krb5-server-ldap-1.18.2-25.el8_8.aarch64.rpm f3700277d56298f5749fa9324568666162e85546d2f6f4b3b7ebb32e952a4dae krb5-workstation-1.18.2-25.el8_8.aarch64.rpm 44cbf1fac60ee038a334602b33218864c81a86dad059d889320a94f096f749d8 libkadm5-1.18.2-25.el8_8.aarch64.rpm 1fc3f6f30a2ae2b19034e0cfd09eb059f40a7a89d3b9b7c976e1167e09453ab6 RLSA-2023:4864 Important: cups security update The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms cups-libs-2.2.6-51.el8_8.1.aarch64.rpm 0b1c3528da55d897ab1ca144b78fcadbf4dfa55e8cebc095793aa3fda93a9528 RLBA-2023:4880 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos report does not gather /etc/grub2-efi.cfg when present. (BZ#2218563) * Add ovn-ic related changes for OCP 4.14. (BZ#2226682) * [rebase] Release sos-4.5.6 to 8.8 and 9.2. (BZ#2226724) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos report does not gather /etc/grub2-efi.cfg when present. (BZ#2218563) * Add ovn-ic related changes for OCP 4.14. (BZ#2226682) * [rebase] Release sos-4.5.6 to 8.8 and 9.2. (BZ#2226724) rocky-linux-8-aarch64-baseos-rpms sos-4.5.6-1.el8.noarch.rpm f47f98ca59d2b49077d1894cd6e92df557dbfc2edcd8d3f66dddfc8652e7f0f7 sos-audit-4.5.6-1.el8.noarch.rpm 56078dba10109b53639db2f7da13d8fdb2ef539f9b609f1ee496b714ffeb2987 RLSA-2023:5244 Important: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090) * kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * low memory deadlock with md devices and external (imsm) metadata handling - requires a kernfs notification backport (BZ#2208540) * Intel 8.9 BUG, SPR EMR FHF ACPI: Fix system hang during S3 wakeup (BZ#2218025) * OCS 4.8, cephfs kernel crash: mds_dispatch ceph_handle_snap unable to handle kernel NULL (BZ#2218271) * st_gmac: tx-checksum offload on vlan is not consistent with st_gmac interface (BZ#2219907) * refcount_t overflow often happens in mem_cgroup_id_get_online() (BZ#2221010) * avoid unnecessary page fault retires on shared memory types (BZ#2221100) * enable conntrack clash resolution for GRE (BZ#2223542) * ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (BZ#2224515) * libceph: harden msgr2.1 frame segment length checks [8.x] (BZ#2227073) * Important iavf bug fixes July 2023 (BZ#2228161) * i40e error: Cannot set interface MAC/vlanid to 1e:b7:e2:02:b1:aa/0 for ifname ens4f0 vf 0: Resource temporarily unavailable (BZ#2228163) * oops on cifs_mount due to null tcon (BZ#2229128) * iptables argument "--suppl-groups" in extension "owner" does not work in Rocky Linux8 (BZ#2229715) * Hyper-V Rocky Linux 8: incomplete fc_transport implementation in storvsc causes null dereference in fc_timed_out() (BZ#2230743) * Withdrawal: GFS2: could not freeze filesystem: -16 (BZ#2231825) * Rocky Linux 8 Hyper-V: Excessive hv_storvsc driver logging with srb_status SRB_STATUS_INTERNAL_ERROR (0x30) (BZ#2231988) * Rocky Linux-8: crypto: rng - Fix lock imbalance in crypto_del_rng (BZ#2232215) * Intel 8.9 iavf: Driver Update (BZ#2232399) * Hyper-V Rocky Linux-8 hv_storvsc driver logging excessive storvsc_log events for storvsc_on_io_completion() function (BZ#2233227) Enhancement(s): * Intel 8.9 FEAT, EMR perf: Add EMR CPU PMU support (BZ#2230152) * Intel 8.9 FEAT, SPR EMR power: Add uncore frequency control driver (BZ#2230158) * Intel 8.9 FEAT EMR perf: RAPL PMU support on EMR (BZ#2230162) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090) * kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * low memory deadlock with md devices and external (imsm) metadata handling - requires a kernfs notification backport (BZ#2208540) * Intel 8.9 BUG, SPR EMR FHF ACPI: Fix system hang during S3 wakeup (BZ#2218025) * OCS 4.8, cephfs kernel crash: mds_dispatch ceph_handle_snap unable to handle kernel NULL (BZ#2218271) * st_gmac: tx-checksum offload on vlan is not consistent with st_gmac interface (BZ#2219907) * refcount_t overflow often happens in mem_cgroup_id_get_online() (BZ#2221010) * avoid unnecessary page fault retires on shared memory types (BZ#2221100) * enable conntrack clash resolution for GRE (BZ#2223542) * ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (BZ#2224515) * libceph: harden msgr2.1 frame segment length checks [8.x] (BZ#2227073) * Important iavf bug fixes July 2023 (BZ#2228161) * i40e error: Cannot set interface MAC/vlanid to 1e:b7:e2:02:b1:aa/0 for ifname ens4f0 vf 0: Resource temporarily unavailable (BZ#2228163) * oops on cifs_mount due to null tcon (BZ#2229128) * iptables argument "--suppl-groups" in extension "owner" does not work in Rocky Linux8 (BZ#2229715) * Hyper-V Rocky Linux 8: incomplete fc_transport implementation in storvsc causes null dereference in fc_timed_out() (BZ#2230743) * Withdrawal: GFS2: could not freeze filesystem: -16 (BZ#2231825) * Rocky Linux 8 Hyper-V: Excessive hv_storvsc driver logging with srb_status SRB_STATUS_INTERNAL_ERROR (0x30) (BZ#2231988) * Rocky Linux-8: crypto: rng - Fix lock imbalance in crypto_del_rng (BZ#2232215) * Intel 8.9 iavf: Driver Update (BZ#2232399) * Hyper-V Rocky Linux-8 hv_storvsc driver logging excessive storvsc_log events for storvsc_on_io_completion() function (BZ#2233227) Enhancement(s): * Intel 8.9 FEAT, EMR perf: Add EMR CPU PMU support (BZ#2230152) * Intel 8.9 FEAT, SPR EMR power: Add uncore frequency control driver (BZ#2230158) * Intel 8.9 FEAT EMR perf: RAPL PMU support on EMR (BZ#2230162) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-477.27.1.el8_8.aarch64.rpm 1626b225490146531be107e984a802e530aee80f768b475ba5974bea23240b4e kernel-4.18.0-477.27.1.el8_8.aarch64.rpm 424eac8970397470516a01ee933b4a794b4c66ca889e54e6fa9ab752dfc34830 kernel-abi-stablelists-4.18.0-477.27.1.el8_8.noarch.rpm b55ead5c3ec3fb22192360a9fd9abf0cb41a072cca633990ad61d65d47c41e48 kernel-core-4.18.0-477.27.1.el8_8.aarch64.rpm 8194df20ebc17923fa54ce2918116fe807cbf61654c233e4e238a739d6f0faa9 kernel-cross-headers-4.18.0-477.27.1.el8_8.aarch64.rpm 31a8bb2e7ab7003d43d5aa293f2501640aea11a29ba1049af9fc36926afde1f7 kernel-debug-4.18.0-477.27.1.el8_8.aarch64.rpm f791e361137c5e4074ae1d9f94e9e0e57ef946098eef6c9b92aa3b0506a1833e kernel-debug-core-4.18.0-477.27.1.el8_8.aarch64.rpm 39718514d3f0c551990e5f125c1a69b1047f648c6e1436ec13beb5a4238be082 kernel-debug-devel-4.18.0-477.27.1.el8_8.aarch64.rpm 4ac61bd29099d89c64d09e11c60daf869b2d4bbd31b0e9250d86d883c4272a70 kernel-debuginfo-common-aarch64-4.18.0-477.27.1.el8_8.aarch64.rpm 7923ba970f5a9bb04ac4529924d04f8b70f61a59e58f6719a56e329bebfd8863 kernel-debug-modules-4.18.0-477.27.1.el8_8.aarch64.rpm d3af0cc70df6b4d71fc629fa819ee257dbdd0a9a6edb11e285d17a2523cb85ff kernel-debug-modules-extra-4.18.0-477.27.1.el8_8.aarch64.rpm 207b436f601be074c9e6e37f484d07d944d5b8baaac2622e4f001035dd033eec kernel-devel-4.18.0-477.27.1.el8_8.aarch64.rpm 30ae657eda52000c5cc1669db0b4c61ed9a0910c42439d1db468cf9393293718 kernel-doc-4.18.0-477.27.1.el8_8.noarch.rpm 349f57059306e84dd0facbd099645432eb38cd34e6ef15131e8a3183da3182c7 kernel-headers-4.18.0-477.27.1.el8_8.aarch64.rpm 4ee16f3008ad395a48365ccceecab2080c64855fac5007f5428c69c5ecc0f051 kernel-modules-4.18.0-477.27.1.el8_8.aarch64.rpm 031d1748ad3b2daeb42f2e2b4540389bdb7f7064cca5aad39c0e08c8319db6e9 kernel-modules-extra-4.18.0-477.27.1.el8_8.aarch64.rpm b6d16f7d4aab836564f3e40baf90f7f99ea0f45a5d0d8929187a83c0be6c03cd kernel-tools-4.18.0-477.27.1.el8_8.aarch64.rpm aa5fc96f035c951dbbbb2a441a5979de9678f8da7c2d7a597fc4def906345b2a kernel-tools-libs-4.18.0-477.27.1.el8_8.aarch64.rpm 54f41431526d42d659d6dd41178470ef14178ac075c1672ba8dce67423cb1f57 perf-4.18.0-477.27.1.el8_8.aarch64.rpm ef7e36b1efc341408dd5a60872605af92c21437b910dbd23e619a997b3c7b64a python3-perf-4.18.0-477.27.1.el8_8.aarch64.rpm 3efe05807c5b4769dec4b283ccb06ad82c0f2fbd0d1a3ba752fbd615bc95fdd1 RLBA-2023:5250 findutils bug fix update The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments. Bug Fix(es): * find not obeying option -ignore_readdir_race (BZ#2232514) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for findutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments. Bug Fix(es): * find not obeying option -ignore_readdir_race (BZ#2232514) rocky-linux-8-aarch64-baseos-rpms findutils-4.6.0-20.el8_8.1.aarch64.rpm 54973f0cc1bf93ab38688fe78cbb8e07f700695ca28f5412fd8929c55c11e2f6 RLBA-2023:5354 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Adding Huawei UltraPath commands to sos package (BZ#2187407) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2217906) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2218873) * Discovery plugin no longer captures data. (BZ#2222134) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Adding Huawei UltraPath commands to sos package (BZ#2187407) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2217906) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2218873) * Discovery plugin no longer captures data. (BZ#2222134) rocky-linux-8-aarch64-baseos-rpms sos-4.6.0-2.el8.noarch.rpm 9217d56c722350a4c2fcf26c9ddeec2a08b2bef49c2c5263bc7c0970508bae9f sos-audit-4.6.0-2.el8.noarch.rpm 67423124c974cf93feee2d9371a89ecfd17ca923daecb0889b9d6b297dfc4c4c RLSA-2023:5455 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911) * glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) * glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806) * glibc: potential use-after-free in gaih_inet() (CVE-2023-4813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911) * glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) * glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806) * glibc: potential use-after-free in gaih_inet() (CVE-2023-4813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms glibc-2.28-225.el8_8.6.aarch64.rpm 2cc78adf103748a4f5f02662f7a01672175f8667c780862e652075ab4001bba6 glibc-all-langpacks-2.28-225.el8_8.6.aarch64.rpm bd77930d162554adc259af530034917bf0313e444f92e44d76e2d9dd020191e0 glibc-common-2.28-225.el8_8.6.aarch64.rpm 05907dd4a51b34685a7dbd768ada66cb45713568bc8163a3c7972968b60122b1 glibc-devel-2.28-225.el8_8.6.aarch64.rpm 0a1cedeb2444a3ebdd87db089c9177a3941bc59301900118f9b6b9de2ec135b0 glibc-doc-2.28-225.el8_8.6.noarch.rpm 0d2c33d3ad73b6049df6396e1691aa379ded166ada58801e971528be28ab0529 glibc-gconv-extra-2.28-225.el8_8.6.aarch64.rpm 7c439caba78dbb9ac1e20c193ea3c0cf54ecd6c3cbe2b57c0a45c73504c616ae glibc-headers-2.28-225.el8_8.6.aarch64.rpm 3ab9b0357188c80dcd34232e2cbfbfd02b665078f09bbb81762626ae9ceccbf9 glibc-langpack-aa-2.28-225.el8_8.6.aarch64.rpm 2f4620f7616cae8a3f5aea3d9fd6d698dff81d7937799caf0608ca95d87c8e42 glibc-langpack-af-2.28-225.el8_8.6.aarch64.rpm 4f770cdd9da31c8c3c6ffa0f295d78d3de1ced016134abc57baa4d11ab0a6240 glibc-langpack-agr-2.28-225.el8_8.6.aarch64.rpm f3c347203147a342270281bd6a2299848c44a2d625a32a740cc847b9c3411ce5 glibc-langpack-ak-2.28-225.el8_8.6.aarch64.rpm 0a958ed917b26fc6551e734b15d03788f0b5aca18f0ed7c9bdcaa0a757efdeaa glibc-langpack-am-2.28-225.el8_8.6.aarch64.rpm ee767d3b08107d120162d12628f38ffb0eb6dd60e6568c10c99d2b1859f171ec glibc-langpack-an-2.28-225.el8_8.6.aarch64.rpm 18fcae3d693832bc22dd4e2f04f32994442634db53ef736431be040b7f77550b glibc-langpack-anp-2.28-225.el8_8.6.aarch64.rpm 61230608471f566344cd995949a7cb6cb4e9e1ac8c8c4562130c45f5376d86e1 glibc-langpack-ar-2.28-225.el8_8.6.aarch64.rpm 079be322488a9b361bae78262eb0f0b24b0cfe1590ec02aa55a4582e3db7c1c7 glibc-langpack-as-2.28-225.el8_8.6.aarch64.rpm 992c0552f4941df191c454d2cab850e272ad84189a198627d6268ed6b35f6947 glibc-langpack-ast-2.28-225.el8_8.6.aarch64.rpm fa0591fdce2353e086580942c793845628ec65cb0fc2964b8f4e1c97674dedc3 glibc-langpack-ayc-2.28-225.el8_8.6.aarch64.rpm b77e25a034b369e1f426952d98f1ae7053c7ff653b63ab802ed7c3d95d347f6a glibc-langpack-az-2.28-225.el8_8.6.aarch64.rpm b7d4d067d48be5ffa6ffb8e0cf25f65a82481592dbac0fad7daab19cbb16228b glibc-langpack-be-2.28-225.el8_8.6.aarch64.rpm 5e9dff2177d1c80f4170a9a67f6b5f073fd8675d35916f1a9db2ec001ee4da08 glibc-langpack-bem-2.28-225.el8_8.6.aarch64.rpm 8452cb375438923f04b7024a0abfad6e586ab3e1a785a8320a36e5aa28e278bc glibc-langpack-ber-2.28-225.el8_8.6.aarch64.rpm 5ec3c620622b607817997d528ecc04cb85c67b8323dba0bdbed7eef9df68c50c glibc-langpack-bg-2.28-225.el8_8.6.aarch64.rpm a3f2eca75183288d936b588a4c3ed4dbdeeaa74056a90f25dc6b5ae7d8e06c04 glibc-langpack-bhb-2.28-225.el8_8.6.aarch64.rpm e61f9c66e4e2f9801a25655dabf1df76c04668c4dea786afe2f28943f5304913 glibc-langpack-bho-2.28-225.el8_8.6.aarch64.rpm 155923cdf022f3d3acf3037710324e9ece8cb5f3e1f87e665c83184e0b92cf17 glibc-langpack-bi-2.28-225.el8_8.6.aarch64.rpm fe644ac2fb64ba69aa7c398dac17ae92587de03292943ecdc6fb6cbe8b53aa19 glibc-langpack-bn-2.28-225.el8_8.6.aarch64.rpm 8087297c24c3eed1a13312f2f95dc5ceb220d5b3ad674a318159d30c3e09b13e glibc-langpack-bo-2.28-225.el8_8.6.aarch64.rpm 744dd992219e02155a2d2f52c7669b8126f2913de39fe70aaba7cc8a9bc94cbd glibc-langpack-br-2.28-225.el8_8.6.aarch64.rpm a949ffc5fc423a56a2a3509af6454f558268d81ea922df55455cefbb7a5d633d glibc-langpack-brx-2.28-225.el8_8.6.aarch64.rpm 6ed093a8bf5e6fb493658d188668f531af2a9d4e7c850857c3c235a7bd76dcc0 glibc-langpack-bs-2.28-225.el8_8.6.aarch64.rpm b29942942950d74bfbd75050dc2af3d4a3f6cd14992224066050fc967e212114 glibc-langpack-byn-2.28-225.el8_8.6.aarch64.rpm 9f8f74f7ba35601b1064914648d0bfa031755277cd8febfe9942e0723ef9a47e glibc-langpack-ca-2.28-225.el8_8.6.aarch64.rpm fc7f09af9c090c6d75f3cdb1e2fb0d77deb9ceaed72ae5ca5af035e2ee1e80e3 glibc-langpack-ce-2.28-225.el8_8.6.aarch64.rpm 40c4b24f59214f0f1a6b06c4e329f6dacc31339a31ac428509760792e8ae14bf glibc-langpack-chr-2.28-225.el8_8.6.aarch64.rpm f141b4962c5b014597416a94072e6e3fd07447abf6568833e0d0b93a6f3c3103 glibc-langpack-cmn-2.28-225.el8_8.6.aarch64.rpm 0e8019a092f56d86799bac4dc893b1a1649539e782f6b7629e74790540c4c871 glibc-langpack-crh-2.28-225.el8_8.6.aarch64.rpm d2460a15321f4d728d311bafb762b49c266dc27010fadf29e59aef23059bbc89 glibc-langpack-cs-2.28-225.el8_8.6.aarch64.rpm 309e64c3381f0902ac8605ac368ac7bfc4e3a71cd39b92cb917ce7762f01a1ac glibc-langpack-csb-2.28-225.el8_8.6.aarch64.rpm 397de45337892a38ab79175b6e016836217b28fc17063265ebbfe6eb01f7228e glibc-langpack-cv-2.28-225.el8_8.6.aarch64.rpm 8b63e1fcce332368bb12dbf801145171c83d62e3c0178a063951183e5e943386 glibc-langpack-cy-2.28-225.el8_8.6.aarch64.rpm 720660869e85260c90d45bf4c8f2fb94adcd63055039e0d1a068cd5d675ec74c glibc-langpack-da-2.28-225.el8_8.6.aarch64.rpm 763ec481244d4d1ba712007b939f3c4f02cc293ec3dcc9c24e593d7f1c271c6f glibc-langpack-de-2.28-225.el8_8.6.aarch64.rpm d74a7eaf966dc94171237531b71d6afd3b64c79e3b4420aacc90343cd1c36008 glibc-langpack-doi-2.28-225.el8_8.6.aarch64.rpm 8672c44ba0695784f1d74e4c9685e04475e030d32b6f4e957bbcad13a8f2b163 glibc-langpack-dsb-2.28-225.el8_8.6.aarch64.rpm 390bae62aaed7aca980a6932ce2865fac5624a11a23556223735bbe3f1a5246a glibc-langpack-dv-2.28-225.el8_8.6.aarch64.rpm 122bfab927300c0910b2adb9c5d4ececee13e66e0de0f2dd68241b8d3836e23a glibc-langpack-dz-2.28-225.el8_8.6.aarch64.rpm c65a515ef1891c6ea24ccabbfcb32117758887ac694a64b0bde256405ebae533 glibc-langpack-el-2.28-225.el8_8.6.aarch64.rpm a80eeb234444acf79ee75f17b364bc3d11e53e91855841f3961b016418b02c93 glibc-langpack-en-2.28-225.el8_8.6.aarch64.rpm 86d13a099c963b22d4c747df8500567be2889b48c8c95fb2e2a1ed2bc356bb3f glibc-langpack-eo-2.28-225.el8_8.6.aarch64.rpm d5f9282a40e7429d97729cf4e6deb1c142bf25b6e74d54dd5f8439329952ce53 glibc-langpack-es-2.28-225.el8_8.6.aarch64.rpm 58b3f442d764a543d80e0e4fdde5f7c7f6f79dfe651a6c8eed385d936e51afbb glibc-langpack-et-2.28-225.el8_8.6.aarch64.rpm b4f0ad77f8c2cbe041c38220b5d70148bea955a9e7459c31fa1ad6999dfa51c8 glibc-langpack-eu-2.28-225.el8_8.6.aarch64.rpm c940ea2cbdc76edd7d88824abd9bf481a9bcd158f1e2bc0923cb27e89c026aeb glibc-langpack-fa-2.28-225.el8_8.6.aarch64.rpm 9b5eb2b6e64c0bd45b13802a82270eeff6b9c723569954416c7793195fc6cc44 glibc-langpack-ff-2.28-225.el8_8.6.aarch64.rpm 679977d3ca0cc31b51276432952718c17dda08e3c1305a690a9eb03c8bf6a7c9 glibc-langpack-fi-2.28-225.el8_8.6.aarch64.rpm 9ec0f14bde2bfd5f7a4542193180e496c997d6d5b6fff7ef544cc7d639a45d52 glibc-langpack-fil-2.28-225.el8_8.6.aarch64.rpm e405050c4d540ff69296cfa3049e811bca944eea5aab20b5fe90f702ef61e2a3 glibc-langpack-fo-2.28-225.el8_8.6.aarch64.rpm 8aa4c96c00e4d97bde520ace99ec27a6821546535ed59fdcd96b215f3c6bbb41 glibc-langpack-fr-2.28-225.el8_8.6.aarch64.rpm 3ee3a456edb161cab315b2f0d18aa696520eb1d36fb1c53341993eeac033a029 glibc-langpack-fur-2.28-225.el8_8.6.aarch64.rpm 8a94fe9af4d280b9c4e517fd38cc1775763ef9b23adaec54253fd5e46c276d60 glibc-langpack-fy-2.28-225.el8_8.6.aarch64.rpm 7aeb60fa9f23fa9b210aa7cd362cd9057b9fe35b89bc2fe47e27f70539523375 glibc-langpack-ga-2.28-225.el8_8.6.aarch64.rpm c1386d744ab9df45ba553624b66de0b81fb0fd1d2d7a864fc672e33f6930f808 glibc-langpack-gd-2.28-225.el8_8.6.aarch64.rpm ae2f297f8435a6c7dd8a437e7292ca8c36c43269308b5ec9e41eaee875208233 glibc-langpack-gez-2.28-225.el8_8.6.aarch64.rpm 52d5c15fd0957bdc4c5b3009a13439d17754ba183781082211702c76a9271c90 glibc-langpack-gl-2.28-225.el8_8.6.aarch64.rpm 05a3cf13abc5a5c000052777e66ef61e7de3f36b41d9d727e44f5c2a19d886f2 glibc-langpack-gu-2.28-225.el8_8.6.aarch64.rpm 4144c6c868659ccc1b76a6f8fa2f6abd6e14a9deea4f4a1caf8a5e6b5131ce8f glibc-langpack-gv-2.28-225.el8_8.6.aarch64.rpm bfcfe839052ead86a5362ebf5702077eb4eee3a20fa3f268d70f6e8779626ae1 glibc-langpack-ha-2.28-225.el8_8.6.aarch64.rpm 24248f8108bc252c3fa67cf57d1868dc46e2e343c43d474218686e909dd4e8e7 glibc-langpack-hak-2.28-225.el8_8.6.aarch64.rpm 4624a3ca819cb6349d82089bc6fadc1de6b1c60d8b3f739da87716f5f41c61ff glibc-langpack-he-2.28-225.el8_8.6.aarch64.rpm 4f7ed0e4ad20b4b91e0ef98c44ad69a330d5205b3aeacdb1301df00cd369cba5 glibc-langpack-hi-2.28-225.el8_8.6.aarch64.rpm 463e44fc3c63c728d54dba1bdef332fa5ba5e3f7df4ee3c2ba8eb09a864c7373 glibc-langpack-hif-2.28-225.el8_8.6.aarch64.rpm 6cd14cbb7aa5b14e775fad6843fba56f67c01565772c6c9b26eed78fda1f15cc glibc-langpack-hne-2.28-225.el8_8.6.aarch64.rpm 89204cc6a32089afe4bdde39ba6f07c2431657abc031c5d22d9328c0878f04fe glibc-langpack-hr-2.28-225.el8_8.6.aarch64.rpm 40dbb23ce14a5c74faf761373038dabbf6fb00fbde80c3f2529ce0c9c91a0430 glibc-langpack-hsb-2.28-225.el8_8.6.aarch64.rpm 8b385ca155c16c05702cf775bc53aff6d89ba554e744d42e369abe400a775dd6 glibc-langpack-ht-2.28-225.el8_8.6.aarch64.rpm 2b86a05b5d88ba7dae8f1e4229d2f3e0b43405bfa133134a6f30e558c2f9b429 glibc-langpack-hu-2.28-225.el8_8.6.aarch64.rpm 6b63a45252c2b69a229946f08022e82016598ef687aa267d6aee4d72bc7e4142 glibc-langpack-hy-2.28-225.el8_8.6.aarch64.rpm a02cbd824d913ad91ec1f0c1efe3602889d7a2a342356345796ce1b1876b5966 glibc-langpack-ia-2.28-225.el8_8.6.aarch64.rpm 8225fe915a68429fae68e3815155efaf6d44110e653258004eb653c311d28270 glibc-langpack-id-2.28-225.el8_8.6.aarch64.rpm aec145fb56c323e5f4f6d3e16e45346246674b4459df1c1a7d772d4f63f12411 glibc-langpack-ig-2.28-225.el8_8.6.aarch64.rpm ca1a079e466cf3b758caae05b90d9557a5e3d8bb4e1f293ac92f8d88aebaa02b glibc-langpack-ik-2.28-225.el8_8.6.aarch64.rpm 8d84f9cd9f699cfa80a4466b4977ad9822fd2cedcd50085c3134b05861910aaa glibc-langpack-is-2.28-225.el8_8.6.aarch64.rpm e6b12e61e28f75218ed45f2384dbe04ae8d540894bafb5f9630405bed16af547 glibc-langpack-it-2.28-225.el8_8.6.aarch64.rpm af9f4f3568fff5d54aa7a653d22af347f39a040c651825a4293d1f6a73b7dc5f glibc-langpack-iu-2.28-225.el8_8.6.aarch64.rpm e1944f52cc87245c439527a880f287fd12d5b9abe3eddbd5816c0d985a457cf4 glibc-langpack-ja-2.28-225.el8_8.6.aarch64.rpm edee9a329fa620a834266623bf54d1e76ba6aedcc386b606183cab67d8cfc490 glibc-langpack-ka-2.28-225.el8_8.6.aarch64.rpm f5ec83c02e5e24943d06d2e2b3b651018f8eabca03b528189748e3825e72d356 glibc-langpack-kab-2.28-225.el8_8.6.aarch64.rpm d6f13e15ccb219a3c6ccb626a614be5b3a74d1832478b1d44da47f96669bcff7 glibc-langpack-kk-2.28-225.el8_8.6.aarch64.rpm 5840b3c02e398e5864a30dd72c67db09edeb2ec7d8934b17b675c21c3ae04c68 glibc-langpack-kl-2.28-225.el8_8.6.aarch64.rpm 675c4f81b57b0d21d4dd161c4f9c407d3e59239b7980ad6d61b1d6cdc73addc9 glibc-langpack-km-2.28-225.el8_8.6.aarch64.rpm 318fd06a06df617cf3b38e207371584f704b25d2e8ca084fb3fbfbbbb716e8f7 glibc-langpack-kn-2.28-225.el8_8.6.aarch64.rpm d5696f839d81e1e16bceab299cf7aea8463f7ee4c930ba20eb803decf7cde698 glibc-langpack-ko-2.28-225.el8_8.6.aarch64.rpm 752dfffa04d6d5e2e3e3c378467c9f37888581e1e1d1c631d965e5ac914cecce glibc-langpack-kok-2.28-225.el8_8.6.aarch64.rpm e2f670b502d27acb91d0b76f26e1c3a780f7cd2f10c4c73e9532a88b2c272f53 glibc-langpack-ks-2.28-225.el8_8.6.aarch64.rpm 0af051b36144bcfeb2dfaeea8d60b6ba3b25840e08a982ca5189b1ab62609b79 glibc-langpack-ku-2.28-225.el8_8.6.aarch64.rpm 5c6adc5f4224b05aab12d3ec6dd2b23ae5d3ce078ab5651cd17a1c86ffb62e5b glibc-langpack-kw-2.28-225.el8_8.6.aarch64.rpm c69e3330265088e19b5fbb2cc68067077ced4ff1ad1c3fca591f5ee275c4df2c glibc-langpack-ky-2.28-225.el8_8.6.aarch64.rpm 35a191dd66bc7e7eae4bb16ff186c044693f3478531f34d58744583f01e3bb09 glibc-langpack-lb-2.28-225.el8_8.6.aarch64.rpm a16c336ab855b8ad90e4dd54cef495fe0cc85d1a2b12dde66a620fb739b7dacd glibc-langpack-lg-2.28-225.el8_8.6.aarch64.rpm ff21b3df964249998b13968e3d4bb6fd3e6e6442369c590033b57edc10dfafbc glibc-langpack-li-2.28-225.el8_8.6.aarch64.rpm a3bc84c4c24b83f16a3ee292f4576f37912a42fc79deeffe4565d43dcd6c8e25 glibc-langpack-lij-2.28-225.el8_8.6.aarch64.rpm a5bc6c699148f95c3dbee763aa236e5dcad2bc8ba43781308036b304c9beb6ff glibc-langpack-ln-2.28-225.el8_8.6.aarch64.rpm 474e395c23f4102425acc7d01dd1b8ffc8ad3e60b5936c42131bd3036eda2ce1 glibc-langpack-lo-2.28-225.el8_8.6.aarch64.rpm a035bc14723815bea32384be89f751058e9eb270ef7f5cbd69795b3cd88482c6 glibc-langpack-lt-2.28-225.el8_8.6.aarch64.rpm aaeb923436c9597f9ccf75e05b3d7284796d6a94d16f8793ea28fb76c4adb30a glibc-langpack-lv-2.28-225.el8_8.6.aarch64.rpm 44154dd0d9ac7dbd92794d195480b9d7fb2235825df8614663edbfd0a8597ee2 glibc-langpack-lzh-2.28-225.el8_8.6.aarch64.rpm 73fa00c96d7e96523f716376e1523c6796f6ec0a9901b220301b61f186232acc glibc-langpack-mag-2.28-225.el8_8.6.aarch64.rpm d7e07a713097c9e9c4fe794315443d87d65d75786dc8c802dec10b251f3a77e0 glibc-langpack-mai-2.28-225.el8_8.6.aarch64.rpm 230e7adfafd4cd68122dabe5c923424df09451be7feed52fef85a03a55b8d0b5 glibc-langpack-mfe-2.28-225.el8_8.6.aarch64.rpm 799bb5e6402778480793a8eb40d774f71afc2119e868c6a5fa91d7775a75fb53 glibc-langpack-mg-2.28-225.el8_8.6.aarch64.rpm 8e3b76115d68af55a06951b2f26e7c1167252f08d21e53817b2d895cfde6211f glibc-langpack-mhr-2.28-225.el8_8.6.aarch64.rpm 9b322a0ee9695c49ee27cb2e4604cd3d4a77164f3777c22861eac1e1587051d5 glibc-langpack-mi-2.28-225.el8_8.6.aarch64.rpm a5b698707c852d2f8ccd6dde43f8313dc208560b208fb9d6e21ee9edb249bccb glibc-langpack-miq-2.28-225.el8_8.6.aarch64.rpm dddcd2fe242aeefd0f14486edf6eeb7bb812878c00e1b8197d6f0f16de1a06c6 glibc-langpack-mjw-2.28-225.el8_8.6.aarch64.rpm e952eee02669c4ec0ff89d16c2f8684bd10758e23b5ebea4f2a00b1919e30207 glibc-langpack-mk-2.28-225.el8_8.6.aarch64.rpm deed382cead39f5498872db5b5c4d9971132690d612bb8408cd7b546f1397d2a glibc-langpack-ml-2.28-225.el8_8.6.aarch64.rpm cb0217748d6531938dd0e725ac0288137ed264ead75b048beb9952340e52cdc9 glibc-langpack-mn-2.28-225.el8_8.6.aarch64.rpm fe5d46ae2a5befbbd9719e2c2d0e49217ec7358c133473aef34781850bdb7d12 glibc-langpack-mni-2.28-225.el8_8.6.aarch64.rpm 0cba015bb7ff3707b57e95b0aadd78b32438c0c8c2bc76c02244c2aeb9003df6 glibc-langpack-mr-2.28-225.el8_8.6.aarch64.rpm 6212e798dbe22808198a5b4f2471b87cff6cb223b94e58b05611b086ee1117f7 glibc-langpack-ms-2.28-225.el8_8.6.aarch64.rpm 3f8b7f03eadba286c602ebf27d7580aabf5b9381fae445143aa90cf32177a557 glibc-langpack-mt-2.28-225.el8_8.6.aarch64.rpm 5985a6ec8ad89ab9ec473a9987550933759f21660915cb5906b39afe10037ba1 glibc-langpack-my-2.28-225.el8_8.6.aarch64.rpm 97c9be48ff03cc8f970651adc945a93640a94c3fdf1252a5670eda3308289a1e glibc-langpack-nan-2.28-225.el8_8.6.aarch64.rpm f5429c2a79fc13207a1d3500a8a0989aa8e39dd2b0b644091c4e18d7d1a8fe8c glibc-langpack-nb-2.28-225.el8_8.6.aarch64.rpm 517a54bcf399afc8aad5748ffce174303eda9196a6b897ae94a2807b0c386bf3 glibc-langpack-nds-2.28-225.el8_8.6.aarch64.rpm 22d61802fea0764eea1ca53cf91bf5d18eb69bca4400ffb2996da7e97508fc71 glibc-langpack-ne-2.28-225.el8_8.6.aarch64.rpm 9cf00d0136260002af45cb878381de43efca21c3e3a1333910f5bc91b24ed2e0 glibc-langpack-nhn-2.28-225.el8_8.6.aarch64.rpm 8ec90035a9e5329d901b38cd11201eccdf3df914729dbcba84a01fdfe6b7ab74 glibc-langpack-niu-2.28-225.el8_8.6.aarch64.rpm b81131bfd6449d18915bb4add27738a6869f1a0e168a99a5b8648dc801c8a6d5 glibc-langpack-nl-2.28-225.el8_8.6.aarch64.rpm f5a70d358729bb90948c93cd2cb6750a47fd028dbb48dde57f64f698440c15da glibc-langpack-nn-2.28-225.el8_8.6.aarch64.rpm 5fb5c1d41d37402be129314f0711d4d9ec498642647c2c39cd10b91716eaf0f2 glibc-langpack-nr-2.28-225.el8_8.6.aarch64.rpm 16d15591c7f31296215588c40be150a14332561e82df81d14138f7d55544f43b glibc-langpack-nso-2.28-225.el8_8.6.aarch64.rpm 49fbbfce1636890f0d1f6d3cb00c7cf49402baa72192e919430794c5b066586c glibc-langpack-oc-2.28-225.el8_8.6.aarch64.rpm 007ef3e70bb2dbcb9451ced8979f103718c4ecde4e38b9e68586a7539b10c836 glibc-langpack-om-2.28-225.el8_8.6.aarch64.rpm ab1075f8cee7372484269fa4fb449559a2b56ffa060dcb47c5c309e0fb07d523 glibc-langpack-or-2.28-225.el8_8.6.aarch64.rpm 65606a49991481b2a339e4574042ef5a1765672c3320cc5186ae88e6f566e81c glibc-langpack-os-2.28-225.el8_8.6.aarch64.rpm 0b8e4018069e9a179f4cf7bf613e6627a46fe3f9c6d40a6448cf44e23bd8fed2 glibc-langpack-pa-2.28-225.el8_8.6.aarch64.rpm e49862ab6729c4426f27c569241ee96bfa7898c2662c3afbc3f07928032df753 glibc-langpack-pap-2.28-225.el8_8.6.aarch64.rpm 17400c0a30795b503782fe18d452de5d3050e39fe5345fcaa606a37fa44fed65 glibc-langpack-pl-2.28-225.el8_8.6.aarch64.rpm 1b6b1532383faa4bd9644544682a62ef5e670d7d72f5b6c8dc13f15a322fad55 glibc-langpack-ps-2.28-225.el8_8.6.aarch64.rpm e962cb369a79f82bb49e5c1a7c9ed43c583ac624c3b8ecedb3bcd90c55d48c3b glibc-langpack-pt-2.28-225.el8_8.6.aarch64.rpm 8441267ed42ac688b4e806dd49d00cc798062f453a91010f3ff2d8cfc6882ec8 glibc-langpack-quz-2.28-225.el8_8.6.aarch64.rpm f7dabd3b0fb04c581d1adaf9de93d92e50fdfafa9562b330b6d7883fb20204d8 glibc-langpack-raj-2.28-225.el8_8.6.aarch64.rpm 4ebfb066fe2b6430a55ddd59c71e2ad5e16d1a29e1edf99f49f3de112118cf61 glibc-langpack-ro-2.28-225.el8_8.6.aarch64.rpm 7bc8c853bd2316220cce890d74e42e6df943b096cccc10cb282ac24e7765df8f glibc-langpack-ru-2.28-225.el8_8.6.aarch64.rpm 6644e15c7c6625e7a81339450457e22d3975e76d8f1f63eb49cceff633d5e5e7 glibc-langpack-rw-2.28-225.el8_8.6.aarch64.rpm d5c3d697d025780ff8f14588153649c11081affd178553996b5e17dbd5771192 glibc-langpack-sa-2.28-225.el8_8.6.aarch64.rpm 90e62b0e47fa3b553acae0ae2a3b98e58fb30228c27280449fa7d0397bcba2da glibc-langpack-sah-2.28-225.el8_8.6.aarch64.rpm 9378acee39f89a0be7e5cccf61c2514fe833a60f595e2644dd24498e3c443a76 glibc-langpack-sat-2.28-225.el8_8.6.aarch64.rpm 3d19da80184d0b47d15ede55dc0614a0310bb0a56802e9ad993035e3338779a5 glibc-langpack-sc-2.28-225.el8_8.6.aarch64.rpm db04842d2c52bdb188b68edf6837549c021bac5170baa604a1f5d5a76a333a2f glibc-langpack-sd-2.28-225.el8_8.6.aarch64.rpm dd8f033245e0cd9db10d62a87c8aae4e233afc31eefcd95fcff1308678406344 glibc-langpack-se-2.28-225.el8_8.6.aarch64.rpm 6ef9631434beb253842810f365a954a590bddb77c01d4ac34f351971182feadb glibc-langpack-sgs-2.28-225.el8_8.6.aarch64.rpm 750d6a6e52d4b9b3f501248469b5f7c8a9efa78ae9531c71117ce4f8a518a4d1 glibc-langpack-shn-2.28-225.el8_8.6.aarch64.rpm eb34260baa4f352b446740bcfa5a88662ac64aba1b08fe9d85899dd04a0f4ddf glibc-langpack-shs-2.28-225.el8_8.6.aarch64.rpm 718036decdb3496f6ca83cf3d4ad2ec49e0f47f0679fb0a6968faa706b4dc254 glibc-langpack-si-2.28-225.el8_8.6.aarch64.rpm 8c08b2cdf15e2830554fb504affdb9c57b8357305fcb3e27275fee840e4fcfed glibc-langpack-sid-2.28-225.el8_8.6.aarch64.rpm 3fc4d3f129446e78f583584a2b6bb45b2ec5c54693f252bd7d11ea7e86cbb211 glibc-langpack-sk-2.28-225.el8_8.6.aarch64.rpm 66a06210a8c1b535918322f8aaa9a5c2c02e9659299f114019ddc86451222d2b glibc-langpack-sl-2.28-225.el8_8.6.aarch64.rpm 2f58cd0f960eee594cbb53ef3679fe3972134d47c39087204a1940b22fc8e3cd glibc-langpack-sm-2.28-225.el8_8.6.aarch64.rpm 035ea0937d78c2882e35a740d05c88c8aae4d1a9edd9801673ac6f05f4fc917f glibc-langpack-so-2.28-225.el8_8.6.aarch64.rpm 7db3a20b49c8e27eeab7d6b8573b5666517a0bd95ddaeffc5d77888eca631a75 glibc-langpack-sq-2.28-225.el8_8.6.aarch64.rpm dbcff04d9930c3e09ec7c5319308aae4f8f4e6a5bc19f4a7e0279df2464982f2 glibc-langpack-sr-2.28-225.el8_8.6.aarch64.rpm 34f44543a611cb96d334ad59047ee2bf4c7a5af345af97a5f92baf6460e16f3b glibc-langpack-ss-2.28-225.el8_8.6.aarch64.rpm 366df7947a6b7d91bbe35157ecaa9ef8965be41fa9e8229646ea0006f401bfee glibc-langpack-st-2.28-225.el8_8.6.aarch64.rpm f7cd704f16ca426b64a51bbff1dbd29bbd634bd1c25203fe15b6b9bdf1fdceae glibc-langpack-sv-2.28-225.el8_8.6.aarch64.rpm 08451b232aea6e90c0fc610865ad11fb97c53c0a4acff3da0b987b206c763d87 glibc-langpack-sw-2.28-225.el8_8.6.aarch64.rpm da25cd29d9178f1a1914674c7347c192c483be60303ff2b733d3a74003496a95 glibc-langpack-szl-2.28-225.el8_8.6.aarch64.rpm 9d602b2d8e194a1e9625ac5221b89f6b238da61c3b18408f100b435786095ba9 glibc-langpack-ta-2.28-225.el8_8.6.aarch64.rpm a08371f1914f26cdb45106e2549158b6b7de05cc6c3e89ec119f064e39443143 glibc-langpack-tcy-2.28-225.el8_8.6.aarch64.rpm 07a94762da9d35cea35a411cb5d8a862e9d10c5f194f73cb4416d23c992ec5e9 glibc-langpack-te-2.28-225.el8_8.6.aarch64.rpm 2dfa763b22cef8443e52aeee849c7db7f7864ea02c7e791e951c063c2638b4da glibc-langpack-tg-2.28-225.el8_8.6.aarch64.rpm dfd89e4a6638ab152c0ccaf7e4559abace870356ef9fda76ea4608f17b737165 glibc-langpack-th-2.28-225.el8_8.6.aarch64.rpm 3aa10d2d308ddb715db26e593cf55826ff5b39effcca60dcbb58d7a367c62faf glibc-langpack-the-2.28-225.el8_8.6.aarch64.rpm 8ad6aacd20a15ad71087141fc165215462191769d49d62e0575b16ba19dd8aa3 glibc-langpack-ti-2.28-225.el8_8.6.aarch64.rpm 7bb79a2e7a0efc7f316f2bcaeb11caf77ed1f501d12c1f121d1dab4c9b394fae glibc-langpack-tig-2.28-225.el8_8.6.aarch64.rpm 66afbd26593a240084aed31f268450fd13bf489d90ef32a854e06e8f9dcd7bed glibc-langpack-tk-2.28-225.el8_8.6.aarch64.rpm 763d8a1aedfdaa43aa70f673bce1a69e6768771f2a5a0f7f10985174561631d1 glibc-langpack-tl-2.28-225.el8_8.6.aarch64.rpm 98c087f19c1c5edca828a4ce52173a35ab8bdaa408fbfb0bb7bdc828557c328b glibc-langpack-tn-2.28-225.el8_8.6.aarch64.rpm f065fe9daa21ad2864fd328559812aeeeef990309a1b2825c3062593ffcabccd glibc-langpack-to-2.28-225.el8_8.6.aarch64.rpm c37d43680465011c40d47ac56937c02cd0c067c55632176a960adabce2f57e8b glibc-langpack-tpi-2.28-225.el8_8.6.aarch64.rpm 8d7c977b33a141c813e62a3911a4cd04483d623eab22801e997fb083b0c9600c glibc-langpack-tr-2.28-225.el8_8.6.aarch64.rpm b0dea3dc2774c51a24ecb46068bcb2a20f4fbf9842e1811dafd436df0f5ea701 glibc-langpack-ts-2.28-225.el8_8.6.aarch64.rpm d48b94712d5954b17c9f9b50e2a4c66d9f522ee02d2d30ab0f4d43728de72d7e glibc-langpack-tt-2.28-225.el8_8.6.aarch64.rpm f5d6b2c0337a19136bf64903cd697d2e056b41014450c7e32f771177fa9fbf48 glibc-langpack-ug-2.28-225.el8_8.6.aarch64.rpm c3c284b5539252be365130bc03bb815bdf84b3e411fb4ae2c39e6e1ee982a9b9 glibc-langpack-uk-2.28-225.el8_8.6.aarch64.rpm c6262b947159b6ea917382035fabe3ca9ff7f72766b74cbba05fcd3031db85ac glibc-langpack-unm-2.28-225.el8_8.6.aarch64.rpm e796ec715eb3a24ce5c7319ac0368b8f7614748fc99a12f261821d0c9a919b4f glibc-langpack-ur-2.28-225.el8_8.6.aarch64.rpm b8ab3a21d7abb0f5a8d7c7613437f21e94420dea443d3efe6611fdb0eb93394b glibc-langpack-uz-2.28-225.el8_8.6.aarch64.rpm b25935163b7fd71ead1a7c3c4b5a78a399868e98d7b95ff4495d899bc7dde033 glibc-langpack-ve-2.28-225.el8_8.6.aarch64.rpm aa743186668b019016724346c846bb338def48d07577accb55fe23ecc2f81ae8 glibc-langpack-vi-2.28-225.el8_8.6.aarch64.rpm 739bc806a13ef5661529d6f238c689b85c99e6ed0c1c45bc114e7a3ebb177359 glibc-langpack-wa-2.28-225.el8_8.6.aarch64.rpm c341a0a6a58c06f42959070bb8aed364c3adc82ac1622427d35229e02b6801c8 glibc-langpack-wae-2.28-225.el8_8.6.aarch64.rpm 072f7995a8ac88098c02a18f0b0605395c35bcb4f8b7d0948010f6e06816805e glibc-langpack-wal-2.28-225.el8_8.6.aarch64.rpm 638e4f2802d3e620047632edb9e44f0b1ecf48deab3b52ef97093e865dd76d66 glibc-langpack-wo-2.28-225.el8_8.6.aarch64.rpm 51b8919347916403acdba14da0b53578cc9bcde88ed6e5d76a0dcb6284094259 glibc-langpack-xh-2.28-225.el8_8.6.aarch64.rpm 07b6f5bf9da6f426c37c6bbc2ac64aaa81bec452f37778c453fc2201294cc110 glibc-langpack-yi-2.28-225.el8_8.6.aarch64.rpm b61274988290d48169494d9e6e76b53333d08d95fe0ed0cd1c0e2d2acc66fced glibc-langpack-yo-2.28-225.el8_8.6.aarch64.rpm 8cec94b2419d6ee0f20af6fc364e87f9bdced720a9916739787f69b3f03c108b glibc-langpack-yue-2.28-225.el8_8.6.aarch64.rpm 9112d9eb7f50bfce02a6b45330c810f744b5fdcba1c692e1dddeff89b8453a5b glibc-langpack-yuw-2.28-225.el8_8.6.aarch64.rpm 73eeaaf39dbd5b283f632d951188cc93b6fa4c1e799e2990a119545f86c3158c glibc-langpack-zh-2.28-225.el8_8.6.aarch64.rpm a00a48bd4c196d1214ec12f947a5c297bd6ee65367608742d7c09280ab187c6a glibc-langpack-zu-2.28-225.el8_8.6.aarch64.rpm f5be9240842b333a67d0040332c0621fa05f83f398d00fcbdce54dd4c655e903 glibc-locale-source-2.28-225.el8_8.6.aarch64.rpm 51d2baac4785c5230ac17d4787077d4ba1ba6de6d4fc81856e1605099241aae7 glibc-minimal-langpack-2.28-225.el8_8.6.aarch64.rpm 234c6b2b13ec2d60cd37fcdf9fa9315508f397fb431e235f5c679190f9d337d1 libnsl-2.28-225.el8_8.6.aarch64.rpm 1f7f6ea47ae48af71836ff8a499d6392cc1f103d872b19dad3893d3b1c03c6ab nscd-2.28-225.el8_8.6.aarch64.rpm 8a47086994e5fea1a826d3981ad1340c47ad82dc1036efff2dd4f1dfc0442f67 nss_db-2.28-225.el8_8.6.aarch64.rpm 943ffa430cb85f43e6e946ed90f6c8174e2ecb7bb892aae00d6dfadd2eb403d6 RLSA-2023:4517 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101) * Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602) * LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375) * ice: ptp4l cpu usage spikes (BZ#2203285) * Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127) * macvlan: backports from upstream (BZ#2209686) * Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198) * Incorrect target abort handling causes iscsi deadlock (BZ#2211494) * swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513) * BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658) * Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667) * Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373) * Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451) * Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189) * ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366) * xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281) * jitter: Fix RCT/APT health test during initialization (BZ#2215079) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498) * Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101) * Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602) * LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375) * ice: ptp4l cpu usage spikes (BZ#2203285) * Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127) * macvlan: backports from upstream (BZ#2209686) * Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198) * Incorrect target abort handling causes iscsi deadlock (BZ#2211494) * swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513) * BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658) * Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667) * Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373) * Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451) * Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189) * ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366) * xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281) * jitter: Fix RCT/APT health test during initialization (BZ#2215079) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498) * Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-477.21.1.el8_8.aarch64.rpm acb94e77cdde502c5ecf7a508ffe4f5e8459066485ce3af651d18a75bf6c5d10 kernel-4.18.0-477.21.1.el8_8.aarch64.rpm 2c8ac4c94c737cd9df5c531bcdbaf2d79bda7fd92dafbbe880f78595a3341c09 kernel-abi-stablelists-4.18.0-477.21.1.el8_8.noarch.rpm 46309ee4d8b9fc44ee2081582b47047f0a93384f1caacd47500761d3d10d5989 kernel-core-4.18.0-477.21.1.el8_8.aarch64.rpm 37e22d134377df7ac8112b01adea4d9a0c08734c8b0fa9d4f75bcba2953095c3 kernel-cross-headers-4.18.0-477.21.1.el8_8.aarch64.rpm 88179566ca5a875716317866ef7d6800556e90cf4f7683e37478894f557290d7 kernel-debug-4.18.0-477.21.1.el8_8.aarch64.rpm d5283208ff8ea5593c8fa13ad582af33bf9382d544e1dae7eeadc75aa3e156d0 kernel-debug-core-4.18.0-477.21.1.el8_8.aarch64.rpm b3699e6306d16ead8f0b3ae967f66e4adceb557c8d1e2602c91661ed4b8c5a55 kernel-debug-devel-4.18.0-477.21.1.el8_8.aarch64.rpm 44f7afc0532cf2454b9012ff355c75f6c8f4c2e3168a65939754f30d794811e4 kernel-debuginfo-common-aarch64-4.18.0-477.21.1.el8_8.aarch64.rpm 281b5ea921e14367612724ca4e50d4c2a0476b5980546193d86aadc8fa021480 kernel-debug-modules-4.18.0-477.21.1.el8_8.aarch64.rpm 6175bf60b553b7b4e3c10e6fd4ac683d647254cb37fcefd09749df2e1f0db96c kernel-debug-modules-extra-4.18.0-477.21.1.el8_8.aarch64.rpm d6e06d6a71ad07eaf82417b6269d207ec15d2c886307283e1cf4d0f2a3720666 kernel-devel-4.18.0-477.21.1.el8_8.aarch64.rpm 05e8e238bfd13581a042d359a52eac9b7b40e4611cb9405b26c857a710c7f87e kernel-doc-4.18.0-477.21.1.el8_8.noarch.rpm cdabad6a0fe918b3c9e54ab73b1565b64b75531e8b0141603cf529c46ece982f kernel-headers-4.18.0-477.21.1.el8_8.aarch64.rpm 8dc2be5c4b322d44c546aa9710712473d96b3a4a78dbe8f1412511cd7b257b6a kernel-modules-4.18.0-477.21.1.el8_8.aarch64.rpm 941565d5774b19a5efcc834238bd5d27a3dfe8b90d29a5b3ff24657e38d5860c kernel-modules-extra-4.18.0-477.21.1.el8_8.aarch64.rpm dd21a6fccea8cd3b267d69056670dba62fbccb81e94caba1aba36e7aebcf73c7 kernel-tools-4.18.0-477.21.1.el8_8.aarch64.rpm 1d1b4263e4699b9e845210eac9fd2a601a7be83f5ad0bfab2461738ce00ea4a4 kernel-tools-libs-4.18.0-477.21.1.el8_8.aarch64.rpm 1d183f9a608475f5d2ad36c28959fa8b29d15b590932c238f22bef6a2da664b9 perf-4.18.0-477.21.1.el8_8.aarch64.rpm 027908e4591719a829eadf97f445f6c279915df363abd6e8f5c4d595d837f5e3 python3-perf-4.18.0-477.21.1.el8_8.aarch64.rpm 3988feaf57da631465b8f26910be5252ca3c0dd3b380220bbdbefeffda7d4f27 RLBA-2023:4518 iscsi-initiator-utils bug fix update The iscsi-initiator-utils packages provide the server daemon for the Internet Small Computer System Interface (iSCSI) protocol, as well as the utility programs used to manage it. The iSCSI protocol is a protocol for distributed disk access using SCSI commands sent over Internet Protocol (IP) networks. Bug Fix(es): * Patch3 reverts a patch merged upstream (BZ#2215111) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iscsi-initiator-utils packages provide the server daemon for the Internet Small Computer System Interface (iSCSI) protocol, as well as the utility programs used to manage it. The iSCSI protocol is a protocol for distributed disk access using SCSI commands sent over Internet Protocol (IP) networks. Bug Fix(es): * Patch3 reverts a patch merged upstream (BZ#2215111) rocky-linux-8-aarch64-baseos-rpms iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.aarch64.rpm 4cb8254bafcaa4a38fe44b1e2f2b1f19dae4d509aeb391fc98981a17e84911e8 iscsi-initiator-utils-iscsiuio-6.2.1.4-8.git095f59c.el8_8.aarch64.rpm fa9470cff6286d5215c85ec209f20927e114ebb715c0458752a653abd9914a28 python3-iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.aarch64.rpm c4e9b29c333437cf2677dd822155a5c21d1517c243f57540110d1df6eb1467e5 RLBA-2023:4521 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899) rocky-linux-8-aarch64-baseos-rpms NetworkManager-1.40.16-4.el8_8.aarch64.rpm b51d39e70d2b9b7c2d36c8e4601233bb81c855329e54bf3e82c1e326f41107f9 NetworkManager-adsl-1.40.16-4.el8_8.aarch64.rpm f896968ef8b15c9a9a07eabe7315d2b1823336e033a64c9ad92549abca55d390 NetworkManager-bluetooth-1.40.16-4.el8_8.aarch64.rpm 36bd210d42f0d7d4c0e316fa73868b96383dbefbfee2e475c0fbfeddf66f3fc2 NetworkManager-config-connectivity-redhat-1.40.16-4.el8_8.noarch.rpm 3fa816eb686a631eaf6dba0a376d071c52b04973b1a0a3fc863ece672f573c52 NetworkManager-config-server-1.40.16-4.el8_8.noarch.rpm 56e20b73c67df24520b3f71346b1151167269bb65cdceef53588df7fc8955432 NetworkManager-dispatcher-routing-rules-1.40.16-4.el8_8.noarch.rpm 861ccc3c0b0ec2b7714971e08282120aef53e31e667a3d23ac9b7013c0de1038 NetworkManager-initscripts-updown-1.40.16-4.el8_8.noarch.rpm 0cf9f96f80808ca6ce9804779d9efc64cc564c8b7cbb98afc5c5f1315e7340cd NetworkManager-libnm-1.40.16-4.el8_8.aarch64.rpm c23a433382c6515cb434882b77e44ac58cb313d8c56f4ffc6cd4c06e439dec43 NetworkManager-ovs-1.40.16-4.el8_8.aarch64.rpm 44432915c4978b1a2f4251dc53d774968cc5368e87aaf52b601351fe876830ac NetworkManager-ppp-1.40.16-4.el8_8.aarch64.rpm 3add0ec9492e34bebecf1b3c7ab0f3178f267cfc4426e03639e2d3ad0262fe12 NetworkManager-team-1.40.16-4.el8_8.aarch64.rpm a663f1af0246e9c34921b7351d02c6b8556f4dad094c44c3978f7919d0fab4ab NetworkManager-tui-1.40.16-4.el8_8.aarch64.rpm ace2fdad409dc3eb11ccd78f3e75836d6b69fa18c74f5ba76418aff462525af0 NetworkManager-wifi-1.40.16-4.el8_8.aarch64.rpm 3c988599f29fe7ac0d713be01b61b4c3de1241aca9cc9d3ef640ac31c429e07d NetworkManager-wwan-1.40.16-4.el8_8.aarch64.rpm 1bc6f707eb792aa3d81e0f3dc6c409de68c9d9bd3e02e962048af503ff2d5bf0 RLSA-2023:4523 Moderate: curl security update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: GSS delegation too eager connection re-use (CVE-2023-27536) * curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: GSS delegation too eager connection re-use (CVE-2023-27536) * curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms curl-7.61.1-30.el8_8.3.aarch64.rpm 1030612316a48f1b69f662f1ada6b2060ea245545bdb8c82044a0611467f91c2 libcurl-7.61.1-30.el8_8.3.aarch64.rpm 4d8b00bc2b3e1d0508b89d0d65b521c637e6c5aaff4bb02cc60d36a67af07950 libcurl-devel-7.61.1-30.el8_8.3.aarch64.rpm 5d1a3ed0aac8f6a00251c8c4a84b010c38843121b13647ff0b2d6b903a337d92 libcurl-minimal-7.61.1-30.el8_8.3.aarch64.rpm 00b1003d16ad44bd6b31e82ff78e1009852965e20a0dc6e812dd346f61369510 RLBA-2023:4522 grub2 bug fix update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es): * HTTP boot issue on RL300 (BZ#2221202) * Not able to activate SAP VM deployed with SAP Large Profile mh1-90x16200 (BZ#2207972) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es): * HTTP boot issue on RL300 (BZ#2221202) * Not able to activate SAP VM deployed with SAP Large Profile mh1-90x16200 (BZ#2207972) rocky-linux-8-aarch64-baseos-rpms grub2-common-2.02-148.el8_8.1.rocky.0.3.noarch.rpm a419f460ebd079f4838ee8b3f35e862106c969e5530702380e708ecba8047992 grub2-efi-aa64-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 41d830840b6bdd8a33d4cd4c7ab383a33986c5e7e8f2259e3e1dc8bc94b4e445 grub2-efi-aa64-cdboot-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 452ed7318af54b832178cd0061dc32af7dee80ca4bbe2066360c54019667c1ad grub2-efi-aa64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm f88cc3e63d47e8eb411a43fd713c961c90f355f4056cfbfb70d3145155c273c0 grub2-efi-ia32-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm 4d033cf7ef4c6deb674888486a6eeef5bc976f23e3aec92db83a759a71e430bb grub2-efi-x64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm ea5673584ba5557b92e950255c9746c4925a1ce4557a54993955e9dcbc11444e grub2-pc-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm a177c63e0f25d5da4afafc7ffacbf31c76f6a1105321cce74d755682d3811c17 grub2-tools-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 40f4d9684f7bb5c534b67d815e6ae4d3de5002c7600efaac4f8a9b25df405bf1 grub2-tools-extra-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 150447301c921c7dc5f2832ec9e96997189f6cf5eba5a37a8f84d38360de9fcc grub2-tools-minimal-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 55709dba401b96ffee14056f282ffd76887e66662fb8319874a4d0a5c935bcaa RLBA-2023:4525 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838) * SSSD enters failed state after heavy load in the system. (BZ#2219351) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838) * SSSD enters failed state after heavy load in the system. (BZ#2219351) rocky-linux-8-aarch64-baseos-rpms libipa_hbac-2.8.2-3.el8_8.aarch64.rpm cfceeab05212bf5823836dfcbb373e629dfced30451939e545bca59b9edaf795 libsss_autofs-2.8.2-3.el8_8.aarch64.rpm 5b828c3fdc4b9fbdb33aa4a939c0f62d6e52a76a102aea1fca0cb67f7ae4a897 libsss_certmap-2.8.2-3.el8_8.aarch64.rpm 16e349e9815424a42d9726a56522bf6da6c1329be9f434ca3765edb583170b53 libsss_idmap-2.8.2-3.el8_8.aarch64.rpm 71501fd799cea94c5e3b7e893ebfa442d823e7129d7c81509d77462d17e470f4 libsss_nss_idmap-2.8.2-3.el8_8.aarch64.rpm 745ec8aa5e97394e4474c38dd5751f01b96e1452937f978fbbff530822ac8801 libsss_simpleifp-2.8.2-3.el8_8.aarch64.rpm 8859dfabff07f3262dd7e36bbcf40329e7c5a080b8cedfef816088a1e5ec6c96 libsss_sudo-2.8.2-3.el8_8.aarch64.rpm 7c9eb88d097d6f7e75bbef8f212d58948d073716223381f12b3c3de346118635 python3-libipa_hbac-2.8.2-3.el8_8.aarch64.rpm 82124f21672fa06bd340deae280491d3889d411b3fbffd2c0cde15cffcfe07c0 python3-libsss_nss_idmap-2.8.2-3.el8_8.aarch64.rpm e911a03c6d95791dad65729546e0b2e3e8ac74fb8494238641bf9c1800769104 python3-sss-2.8.2-3.el8_8.aarch64.rpm 7d81f9c58b2e52efc855ad67fc925efcd7c197f7b9d4bed104c80d7332ff792c python3-sssdconfig-2.8.2-3.el8_8.noarch.rpm a5f0f60d75de585d424896b1228fcfb9d99c3514e69ac32931a7b926d77eb49d python3-sss-murmur-2.8.2-3.el8_8.aarch64.rpm 4d87b765bbf647d2e27e727f02390933aa5547d86b8eea7edae9739ff5d94a4a sssd-2.8.2-3.el8_8.aarch64.rpm fcbfce71b38e7516cd03a45a807b4b4494d350a453c546ee9c91157fab97dfc3 sssd-ad-2.8.2-3.el8_8.aarch64.rpm 282acec2afed5456ae1566a16ff00283709aa22932277824d6f547877e55222f sssd-client-2.8.2-3.el8_8.aarch64.rpm f97183b7d8f6c69957065c9498b69753aa7d9ae5f75e2972f69014e434d73b25 sssd-common-2.8.2-3.el8_8.aarch64.rpm d109dd4ea98d2067f8701b9e8ee569441c99590e49d46c5dd29aa980a69b5de0 sssd-common-pac-2.8.2-3.el8_8.aarch64.rpm 6ebf28c16b32fbbc03bb0d07d67db3fb38b9c48a9ac2410273081739a1796b7f sssd-dbus-2.8.2-3.el8_8.aarch64.rpm 029254d7cbf7b4f26182954e2c31400760b356c8c1ce934e28b403235464a764 sssd-ipa-2.8.2-3.el8_8.aarch64.rpm 73299fd3f7969e1c50b7ed2ff634b94d29ef206250d78998fe934732a63d3bd3 sssd-kcm-2.8.2-3.el8_8.aarch64.rpm 5059c23199fd2b439b92dc03c35b16741bf04f96a48754ec96642c8afeb77273 sssd-krb5-2.8.2-3.el8_8.aarch64.rpm 1010174a554a490cedaaa711ec4f69ec6bc95d10e8dff33100140fe71a7bed3e sssd-krb5-common-2.8.2-3.el8_8.aarch64.rpm e9892f463525953830a113de877e1238c227c35907b5289d7f44270b361369eb sssd-ldap-2.8.2-3.el8_8.aarch64.rpm 2b6d04f057457bab35254840ac917907d6ace72a020cc576b62ff5e8a23fe033 sssd-nfs-idmap-2.8.2-3.el8_8.aarch64.rpm 2bf09ca31202c10d817d361c6eee9557adf473d6ec5dbd2c3c862cffec443a40 sssd-polkit-rules-2.8.2-3.el8_8.aarch64.rpm ae1089369d8616f4022fafc4425c20572c8b1e9e1938d01fa69de9025873a923 sssd-proxy-2.8.2-3.el8_8.aarch64.rpm 2aad24298c585ababdf72e98c8c842c588d5c07ad9881044589e25ea0b7f6df3 sssd-tools-2.8.2-3.el8_8.aarch64.rpm 8b0a62e86ba0f22f7b2ab53b33fbd55dc0c35177cc80b795d2290f74932f18a5 sssd-winbind-idmap-2.8.2-3.el8_8.aarch64.rpm 2a299af5c1c4a18ef1c38a6eff42d9ed6801d70ded2e6986282ba6147c661b7c RLBA-2023:4526 systemd bug fix update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * systemd-logind: Assertion 'pid > 1' failed at ../src/login/logind-dbus.c:3332, function manager_start_scope() (BZ#2223602) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * systemd-logind: Assertion 'pid > 1' failed at ../src/login/logind-dbus.c:3332, function manager_start_scope() (BZ#2223602) rocky-linux-8-aarch64-baseos-rpms systemd-239-74.el8_8.3.aarch64.rpm 18a1dbefa7c0ebfa2b6c41fc81363348756b442fcae754a8be7c3e77fc6745d7 systemd-container-239-74.el8_8.3.aarch64.rpm 1f4a918288126fdbfa58091d29fa6f255c2c104be92e1df3d0873af91d7ba56b systemd-devel-239-74.el8_8.3.aarch64.rpm 17fa58c3db09b66b4f0dace2e14844d718f431ad1341960f95da5cea7e1edfb6 systemd-journal-remote-239-74.el8_8.3.aarch64.rpm 24872527fb51ae3c4cf3902831af3891c93829bf2b26acd4aa648d439bf89b5f systemd-libs-239-74.el8_8.3.aarch64.rpm c206403fb669cc88081d1a84804bb595efac8ef0a982aa15c8057eeca6cc8dc9 systemd-pam-239-74.el8_8.3.aarch64.rpm 07eb19696d94f466e343b4717705dbfab999c96995e9e783f115d83d64154a38 systemd-tests-239-74.el8_8.3.aarch64.rpm 72600ea8ab46f777fcbd43f188bd8dfdfe17ec5d265e6ec00ec9afc2d7290b68 systemd-udev-239-74.el8_8.3.aarch64.rpm 07eb618ae6fe8c244037cfe5e3485bb1d5924ca844f7efd0acda95709746fc66 RLSA-2023:4529 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484) * libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484) * libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libxml2-2.9.7-16.el8_8.1.aarch64.rpm a5c70c6a15f9aaa8a6a39e83d4f589050f1324fbd785df4cdd54591459f8ebbd python3-libxml2-2.9.7-16.el8_8.1.aarch64.rpm 786aef408ede9a0979c6bb22e1ea61a9c84f07513a519e18ff9a68f0c5c6c762 RLSA-2023:5997 Important: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-51.el8_8.2.rocky.0.aarch64.rpm 77f83c8f25a5d3222f2041b6851f6d25d8c243d01596c96fe6e93b06c834e709 python3-libs-3.6.8-51.el8_8.2.rocky.0.aarch64.rpm 9ed163d318a8b9630fdd66d2133e931e5cbcbac33a06b3d9d640b12383ebbf74 python3-test-3.6.8-51.el8_8.2.rocky.0.aarch64.rpm 9e74b382939b8589190e1c8df8389529fa408013dbbcd3a7e38d2f41dcec28c2 RLBA-2023:6797 xfsdump bug fix and enhancement update The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es) and Enhancement(s): * xfsdump/xfsrestore: Suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14493) * xfsrestore: Files from the backup go to orphanage dir because of xfsdump issue.(BZ#2245344) * xfsdump: Restoring inventory prevents non-directory files being restored from tape (BZ#2245677) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es) and Enhancement(s): * xfsdump/xfsrestore: Suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14493) * xfsrestore: Files from the backup go to orphanage dir because of xfsdump issue.(BZ#2245344) * xfsdump: Restoring inventory prevents non-directory files being restored from tape (BZ#2245677) rocky-linux-8-aarch64-baseos-rpms xfsdump-3.1.8-5.el8_8.aarch64.rpm fbbdaf9e045fd561af063ea070fdd4f22cb5e2a857b544667512ef0184d52882 RLSA-2023:6236 Moderate: binutils security update The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault (CVE-2022-4285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault (CVE-2022-4285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms binutils-2.30-119.el8_8.2.aarch64.rpm b94621db41ced6c52655b6794ab4027343b73fcc6a257f64432d845e365a5987 RLBA-2023:6293 sos bugfix update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es): * Deliver SUPDEV-148 (Microshift backports) in Rocky Linux9.2.z (Rocky Linux-12886) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-8.6.0.z] (Rocky Linux-13696) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-8.8.0.z] (Rocky Linux-13697) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.0.0.z] (Rocky Linux-13700) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.2.0.z] (Rocky Linux-13701) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.3.0] (Rocky Linux-13702) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es): * Deliver SUPDEV-148 (Microshift backports) in Rocky Linux9.2.z (Rocky Linux-12886) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-8.6.0.z] (Rocky Linux-13696) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-8.8.0.z] (Rocky Linux-13697) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.0.0.z] (Rocky Linux-13700) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.2.0.z] (Rocky Linux-13701) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.3.0] (Rocky Linux-13702) rocky-linux-8-aarch64-baseos-rpms sos-4.6.0-5.el8.noarch.rpm 8ad31b982df01b78ce994a8a97cd2f08a2c9f1dde22402d168fbc205ac220978 sos-audit-4.6.0-5.el8.noarch.rpm 9b6f6952de1df5e5fe8ae1e48970bd00321852b9a959969e9a3a964113c44226 RLBA-2023:6792 net-snmp bug fix update The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es): * snmpd reacting with "Failure in sendto" to a request to a broadcast IP [rhel8] [rhel-8.8.0.z] (Rocky Linux-10520) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es): * snmpd reacting with "Failure in sendto" to a request to a broadcast IP [rhel8] [rhel-8.8.0.z] (Rocky Linux-10520) rocky-linux-8-aarch64-baseos-rpms net-snmp-libs-5.8-27.el8_8.1.aarch64.rpm 36210cfe7d1f80b0a0f5d3d3b7333fb3b0250a730286d5cd7218c0a2c41b63b9 RLBA-2023:7080 kexec-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kexec-tools-2.0.26-8.el8.aarch64.rpm 397b7648d272c1a8994cde691af6c209d864da8e71e867125d445d27d8b69049 RLBA-2023:7185 nftables bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms nftables-1.0.4-3.el8_9.aarch64.rpm a1a5030788f79dffa02a1e27c0f0636843fe9441019b2d44ab373fab162d631c python3-nftables-1.0.4-3.el8_9.aarch64.rpm 8c072e5359e4487d2b248753cdd6cb761b36a3912b9228273241a93b89f34394 RLBA-2023:7186 util-linux bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libblkid-2.32.1-43.el8.aarch64.rpm aca8978ac24d4ea9b2a6f180b406dcbc437e6089cbc1695b6976fd00aca23978 libblkid-devel-2.32.1-43.el8.aarch64.rpm 31ac385d04ee652da2ede8de2e6c1ae88ef7f1a392173d9195d95e58e78fe20d libfdisk-2.32.1-43.el8.aarch64.rpm 86597b006fc810868bbe9bc75cd0303750bfc612feb1035a886f0ba2126ae00d libfdisk-devel-2.32.1-43.el8.aarch64.rpm 18561e8f587ee1074494e6b514578391f223ff7115c253131d2dba5087e67941 libmount-2.32.1-43.el8.aarch64.rpm 08d968cbb3a42a04acf02a5e6f1feca81a3c6a078c5b3e3780d55d6f1efc5447 libsmartcols-2.32.1-43.el8.aarch64.rpm 40c4fb20f1d49d251f10e5faf06807fad02ee77cdf4a30992438555b9a7e240e libsmartcols-devel-2.32.1-43.el8.aarch64.rpm a34032b0f7d7cb821a4c4e6575c9800acf1d26931995e00894a41e2306093a04 libuuid-2.32.1-43.el8.aarch64.rpm 9e5d473e65cb27dce9689634f1aa93434cbeaa02b7d1a9ad8561c324043b03ee libuuid-devel-2.32.1-43.el8.aarch64.rpm a74868108649b02c9301b7c9326a59bc3cebc12cbfb633f38e4a05c1adea2749 util-linux-2.32.1-43.el8.aarch64.rpm ac69b7478dd9d1bd645a55870fd9e3628c5235664308c67ef4cbc20b5b98deca util-linux-user-2.32.1-43.el8.aarch64.rpm adbbcdae1a922a49acbd659c63f52be86d403290aebf17dee05164bb29a9d626 uuidd-2.32.1-43.el8.aarch64.rpm 400d854db6da3e1214d2ad3781d7a2a3b8dc25acf023112a71effdab2681bc9c RLBA-2023:7188 dmidecode bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dmidecode-3.3-5.el8.aarch64.rpm 187bb45ce2ee39ca4b72f3f7e7d82003ffe45e4cc6c9dd924187c53b2ef9216c RLSA-2023:7187 Low: procps-ng security update The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Security Fix(es): * procps: ps buffer overflow (CVE-2023-4016) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for procps-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Security Fix(es): * procps: ps buffer overflow (CVE-2023-4016) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms procps-ng-3.3.15-14.el8.aarch64.rpm 2496f52adf4a2e10431a91593cde05aff091327ba65c27ac43bf2c8ceceb0c84 procps-ng-i18n-3.3.15-14.el8.noarch.rpm 821a3db12b38137553beaab052f93c3223d3952bf1db6458042609122e967dbd RLSA-2023:7189 Moderate: fwupd security update The fwupd packages provide a service that allows session software to update device firmware. Security Fix(es): * fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fwupd packages provide a service that allows session software to update device firmware. Security Fix(es): * fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms fwupd-1.7.8-2.el8.rocky.0.1.aarch64.rpm 46ec1113de2a289404e5f789c84c9d7a3a5a428fd9e751cec8a06dab8463d145 RLSA-2023:7190 Moderate: avahi security update Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms avahi-0.7-21.el8.aarch64.rpm acd7a1430af95383284970e23ed625ded921a0eae557454d20cee05f751d2e1c avahi-autoipd-0.7-21.el8.aarch64.rpm 3168fac01d53a6026040c6d1bded341fa2a04240d7f59e04e0aeb6ad4c6e5507 avahi-glib-0.7-21.el8.aarch64.rpm c39a88dcd9890e1066ac75089f93ba9984be9d7891cf6cf633da5547728f3aa3 avahi-gobject-0.7-21.el8.aarch64.rpm 1151caee59e5f752c423738df976ec334ebdb80e9069ab69d80dc6f4da3802a7 avahi-libs-0.7-21.el8.aarch64.rpm 65f27b055370dccb8048225bb7246a12909fd239a23c0cfff87ed4ea785b2f2e python3-avahi-0.7-21.el8.aarch64.rpm 2dfe3896b91882a1d756078e9f85a5374eaf8c3755f9f65c9c191ec74fa20748 RLBA-2023:7191 lvm2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms device-mapper-1.02.181-13.el8_9.aarch64.rpm 4c2e1c6eb129e06e2fc8fec36c3cba36b4e217c722cd43d0cf7410996f547acd device-mapper-event-1.02.181-13.el8_9.aarch64.rpm 70983857369425b821dc8fda9ceccdb2ddc83bec41e6bac601b6d2e755d1c11c device-mapper-event-libs-1.02.181-13.el8_9.aarch64.rpm a1590ddcb23932aa2b894dfaa0c238bd5a5dc57c9b8e2f9dee04e92523e10d8d device-mapper-libs-1.02.181-13.el8_9.aarch64.rpm 9cc87344235d71e7f09eee2ab9eea260cf1cb21e87acf99518f6d98c07689b83 lvm2-2.03.14-13.el8_9.aarch64.rpm f0dda30145e51c59fafeee6f9553db38d9ce6c7ca60e0f820a5ccd6089f69233 lvm2-dbusd-2.03.14-13.el8_9.noarch.rpm a8519cf7f02e592e61b33dbda1b53c5467356db8be66948b81b0ff9ec49ce711 lvm2-libs-2.03.14-13.el8_9.aarch64.rpm 1b0c6c46c52c1a77225d1b50df06b57a015d38e0bb98eaa7968b0a4c574e6045 lvm2-lockd-2.03.14-13.el8_9.aarch64.rpm 4e7f854a9adb7a664db1752685f0e05a088a4b868343f6a74a762af65273abb2 RLBA-2023:7192 numactl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms numactl-2.0.16-1.el8.aarch64.rpm 7ce9b9b6da27f56400d835c3e0971c1b8065153f9e1dc8e5b9d924b4b7b7b175 numactl-devel-2.0.16-1.el8.aarch64.rpm 600ab10649abf04c4bbf95cc3ff03a245963dfd8e508ab67ab4a47e5854b3412 numactl-libs-2.0.16-1.el8.aarch64.rpm 791d205fd33f33813fb11522c3eaf589cdb4221cc48caeb8695acbba9d9d14f2 RLSA-2023:7207 Moderate: c-ares security update The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Heap buffer over read in ares_parse_soa_reply (CVE-2020-22217) * c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Heap buffer over read in ares_parse_soa_reply (CVE-2020-22217) * c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms c-ares-1.13.0-9.el8_9.1.aarch64.rpm 0bbe927aa77184dd5d8536f3041a197ef3b305725e652bd736144ca063085f08 c-ares-devel-1.13.0-9.el8_9.1.aarch64.rpm 2f4fda4be136c0dfb5a56993029f081f9ddd60f38c4ca43f2bc1b373398407d7 RLBA-2023:7210 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414) * SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414) * SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302) rocky-linux-8-aarch64-baseos-rpms libipa_hbac-2.9.1-4.el8_9.aarch64.rpm 26de749017ffb64dcc0e5a6cd629e8fee87d8f8d6d7955b8081882c7c696a6e1 libsss_autofs-2.9.1-4.el8_9.aarch64.rpm e04628cbda1ec4978f41f85715757a848b48b27d85d4df444f091f003498eb36 libsss_certmap-2.9.1-4.el8_9.aarch64.rpm 214dac60735c2fa777903aec4f9f3ec8459928740dc9544fc338ba24dff2481b libsss_idmap-2.9.1-4.el8_9.aarch64.rpm 532b533984f25cb3f0a94b55241a98dbca2b35533cdd646b41b66fc1b504d995 libsss_nss_idmap-2.9.1-4.el8_9.aarch64.rpm 939f40e3cfb87aeaedd58726ae47e553016ac78034910bf34c55a6caabf8c6d8 libsss_simpleifp-2.9.1-4.el8_9.aarch64.rpm d3b7f80d95f7c121b03b39f368a6983213a591ccadfb963c38be10d9bf93c30c libsss_sudo-2.9.1-4.el8_9.aarch64.rpm de21674635ea819009851a086aa859a711924983bb5c77bbe5622605120411c2 python3-libipa_hbac-2.9.1-4.el8_9.aarch64.rpm 0a5913c66c86ad7fa893e963753f6e83d33186abc27433823f6007a89055e19c python3-libsss_nss_idmap-2.9.1-4.el8_9.aarch64.rpm 6167118ff9f65e2841b16ae0cb649e7a6d708458b05b1aead3e102d175901cf6 python3-sss-2.9.1-4.el8_9.aarch64.rpm d6de3a1b9101e2b2f72fd105c81a2cac09a4ee249192852afff17cce4932138f python3-sssdconfig-2.9.1-4.el8_9.noarch.rpm b148427ebe8ec952f6cafa76baaa0c3d10cea8d467e4da4c60b3907c08fdfa3a python3-sss-murmur-2.9.1-4.el8_9.aarch64.rpm 40c7dc9e2e37684c4ee97817c7bdb49ba5b513b7da4917f3f85158c3d718a220 sssd-2.9.1-4.el8_9.aarch64.rpm 535c89412a61c1c9544d92cfca0c49a97657410f64aaf5e660cf847232f7d773 sssd-ad-2.9.1-4.el8_9.aarch64.rpm cb3f1a9f02428552a3eab4f6b46e2e99ee0126005135d859e0e6166424856627 sssd-client-2.9.1-4.el8_9.aarch64.rpm 0d96b7c9b63b078a47f3137509b40e7b65e0e09a05e442bcf4b668425d2ef495 sssd-common-2.9.1-4.el8_9.aarch64.rpm e01f99d2dd90dfb23368d5b5cdc1050fd9ad511dde7983eb2d3db535459bf402 sssd-common-pac-2.9.1-4.el8_9.aarch64.rpm 496e8c967b17f7d5e9bd245dde24d97ff0df22ff15f5d8a9437c38bf0ae4cf42 sssd-dbus-2.9.1-4.el8_9.aarch64.rpm 05921e4978d0452379741400fe380ab884fc219efb99f0f0dddd590850ce1f54 sssd-ipa-2.9.1-4.el8_9.aarch64.rpm 49b476dd53ee9d69aed5e04c36aea3084a5f508c7dd5e8a7bd4de89e2ca2515c sssd-kcm-2.9.1-4.el8_9.aarch64.rpm 947c991d984526757a9db6382b3f72e16e8c470fd7b4e6339bd93785f19606f7 sssd-krb5-2.9.1-4.el8_9.aarch64.rpm 0de4624edb20c4ff0bcadcaa62112c7033f0608264abbe6a2b133de66a73a28b sssd-krb5-common-2.9.1-4.el8_9.aarch64.rpm 655f97356e6582362d9bff7a8b91611b8b43916e7c3d9bf75a0c1828f86f5989 sssd-ldap-2.9.1-4.el8_9.aarch64.rpm 8d62bb44257696f5e03afa7a3a48ceec73e20cee3406201417a9902fc9dc99d1 sssd-nfs-idmap-2.9.1-4.el8_9.aarch64.rpm b9183d4e7f6cd1e2e585a43d10c5a9dacf56e3cc2e43cb3f1cfdcdee4c6532ac sssd-polkit-rules-2.9.1-4.el8_9.aarch64.rpm 8c5de5af7560c17277aa6e35d5e4394d2e457d67255ce2f8f552a97703401be2 sssd-proxy-2.9.1-4.el8_9.aarch64.rpm 60dddce7775171d45f6e52143518032a397614e57481530c3c3abcea426bec0b sssd-tools-2.9.1-4.el8_9.aarch64.rpm c6b2321818cceffe52f329e5ed465d238b9c915e7eb3dd7a5d59ec6912eea4d1 sssd-winbind-idmap-2.9.1-4.el8_9.aarch64.rpm d1228c10585f32912ac4cbd00c62e15a5e5ef2ef873d364f8830a1eb74f8f387 RLBA-2023:7211 krb5 bug fix update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * Allow to make AD-SIGNEDPATH optional (JIRA:Rocky Linux-10514) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * Allow to make AD-SIGNEDPATH optional (JIRA:Rocky Linux-10514) rocky-linux-8-aarch64-baseos-rpms krb5-devel-1.18.2-26.el8.aarch64.rpm d7b2b4d1ac90b2494ea8c7817073c38a25eaf9cbd9f09b618785e934007712eb krb5-libs-1.18.2-26.el8.aarch64.rpm 24733dfccafe7ca20df0ff52eb983e4502e7398645c1e3a7f7d6f36b96f01e4c krb5-pkinit-1.18.2-26.el8.aarch64.rpm 1e41accaf2f3b663443ea5bce33aaf460511b32fa85332c05d83b2920beb1e30 krb5-server-1.18.2-26.el8.aarch64.rpm 36cb4609adee86177b63f7a97534402a50f1a695b80b8aa96b9668894c3e0bf8 krb5-server-ldap-1.18.2-26.el8.aarch64.rpm b4501dec3d26b78edd93803a135e775d3a62755f610ee55279e42877e82453c0 krb5-workstation-1.18.2-26.el8.aarch64.rpm 82089d45d2ce3a18ba9f7dd6b67f5f6a837fa6c77fc5a384c38505ae04298af1 libkadm5-1.18.2-26.el8.aarch64.rpm 1a5f4279c41e2fde921dbdef262cbe2b8ea999fbe002c11091a76152f584aeec RLBA-2023:7078 vdo and kmod-kvdo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo, vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kmod-kvdo-6.2.8.7-92.el8.aarch64.rpm faecc9aab568e083fdcb606873947563aaf93dc160a7a7c7e82e2668614d3f0f vdo-6.2.9.7-14.el8.aarch64.rpm fcb88678fca171f45085a4423f5d726f742d61e3a079a946ca4bc05d33fd640f vdo-support-6.2.9.7-14.el8.aarch64.rpm 64d754225778bea0b8832fa41afa3a645862914e1343d1422fb0edd95ca12bfb RLBA-2023:7097 systemd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms systemd-239-78.el8.aarch64.rpm 58256c545f6e5748183aae42af3118b1949ea10e7f1f3b533e32f34c7a2df9e3 systemd-container-239-78.el8.aarch64.rpm 1965e59929171a255361b02067ca633aac4775dfde5cce5437a0f6707bb1a7fb systemd-devel-239-78.el8.aarch64.rpm bd3384809583c564fcf35d754a3175df7c6025b691d9fc6628560972e7495a53 systemd-journal-remote-239-78.el8.aarch64.rpm 19c67985295e22a6b25ce4b7905c0eaaa67a92bee0d08edb89c64bc19e1d2b9b systemd-libs-239-78.el8.aarch64.rpm a8a49ea49683d4ab6e5ff9811c46e6bf709aa36770b226955379bf1bd643ee0c systemd-pam-239-78.el8.aarch64.rpm a2b97fcd173b7a1ce7afbab0903a2e02e84440c3f067ab1fcfa8ef5f34f3a5bc systemd-tests-239-78.el8.aarch64.rpm 091de504e069baf8adb501d97a6639692ecacfc476576c99ecdcf437a76cf58b systemd-udev-239-78.el8.aarch64.rpm 931232632eaafbf23bdba05775c30d9a0c008dd73eaf79160ff7812ff2c86614 RLBA-2023:7128 mdadm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms mdadm-4.2-8.el8.aarch64.rpm 0dd7be587897b71b03ff9aaf9c0e93f13ec3479b7850b1c000f2216827b3edf8 RLBA-2023:7133 libfabric bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libfabric-1.18.0-1.el8.aarch64.rpm 80587899f31d4970a5e09129bd35e39806e528a331fe4e68aabcd1dabd43c2d4 RLBA-2023:7135 libldb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ldb-tools-2.7.2-3.el8.aarch64.rpm 5d3701a93e3956a6c4d83cf9f471bdcf5652b7e6b67186a724c0f822d0d5d0fc libldb-2.7.2-3.el8.aarch64.rpm 000f93a0be804bbae93c1b369dc54889f91730dd7f8cfc802e00957a43c49ac3 libldb-devel-2.7.2-3.el8.aarch64.rpm e8c4ef307940e80532073cfb546d2045c935ceacbac967037af9421d504f8fcd python3-ldb-2.7.2-3.el8.aarch64.rpm 9a4a50974960548ab37fe089dae0a25bed21fac5e462ef380960ce0f7b909879 RLBA-2023:7141 grubby bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grubby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms grubby-8.40-48.el8.aarch64.rpm bd8f02d35fde51fbdc5fa511bfbb4712b76b0d1b398ab85d01c74524ffd4441a RLBA-2023:7158 curl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms curl-7.61.1-33.el8.aarch64.rpm a1f16eb711a822b7b7afffb2a26cdd6320f7edb6028c3b26a12a85cb09c538a9 libcurl-7.61.1-33.el8.aarch64.rpm 23cfa155e621dacb75a533a86ff4896d067d35160bcad41abea8cd6430862bd3 libcurl-devel-7.61.1-33.el8.aarch64.rpm 8e90d7a29bda4f6b44b5778d2e6aca8c1bc2b04b42cdde1c17a84dca81ba950d libcurl-minimal-7.61.1-33.el8.aarch64.rpm 21c13b724687b39841b13dbf4446c1c0cc4c0fc1c1422f12035c16a353357335 RLBA-2023:7297 nghttp2 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nghttp2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libnghttp2-1.33.0-5.el8_8.aarch64.rpm 90360678e8b5cd31bfc78b12db6ce4ecd1f924d0beabd75ba242b5c585d9def1 RLSA-2023:7549 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163) * kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812) * kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178) * kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884) * kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886) * kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919) * kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750) * bpf_jit_limit hit again (BZ#2243011) * HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163) * kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812) * kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178) * kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884) * kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886) * kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919) * kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750) * bpf_jit_limit hit again (BZ#2243011) * HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-513.9.1.el8_9.aarch64.rpm cc31e6ba8fdf419a23b7738eefe8aea689ed411b90c5b80d84f33f71081fe4ed kernel-4.18.0-513.9.1.el8_9.aarch64.rpm 9ccbfc1f62dfb76e59fd80127c327742cd99f88431e7224bccf4eced25ab2866 kernel-abi-stablelists-4.18.0-513.9.1.el8_9.noarch.rpm 6c0b0b7f1ca4aa2fb5a7e7f5e0e6549865a34e95afadcca0c0df0dc3d38e851e kernel-core-4.18.0-513.9.1.el8_9.aarch64.rpm 5283261bd3ec3be1f00bb5fc0f3db918d89f5745b5ae66f7408eac4f534f5598 kernel-cross-headers-4.18.0-513.9.1.el8_9.aarch64.rpm 42a0b64b7b857913ff4ac8bcaed7b3cbb608e12bb54272e768fedba993b8dee7 kernel-debug-4.18.0-513.9.1.el8_9.aarch64.rpm bb9bd4f072293d290b455ab66772b9ca85e1f3f01e6599129b47896b4e637a03 kernel-debug-core-4.18.0-513.9.1.el8_9.aarch64.rpm 9df09dc3288c2196ec8acd29ebac9fe9ae691800715f001634f84a1b3fbe0807 kernel-debug-devel-4.18.0-513.9.1.el8_9.aarch64.rpm 69396e6da04d6db0f1b6f40b0c04e2c935d0147b28ccaf5bf4f7a769acc9f802 kernel-debuginfo-common-aarch64-4.18.0-513.9.1.el8_9.aarch64.rpm 1663741b5492d1895da597e66bdeb7298eb470624d6c1ef003d60dd546a97992 kernel-debug-modules-4.18.0-513.9.1.el8_9.aarch64.rpm 5e6b024e71e9e968212b0ea0bc928ae3f4fc739a4f772ba318626b494dca3c0a kernel-debug-modules-extra-4.18.0-513.9.1.el8_9.aarch64.rpm 59e451e3a0643d12fb91cbd4974eb686e210106af02bffcd06e6fb5648f85ef9 kernel-devel-4.18.0-513.9.1.el8_9.aarch64.rpm 1b75e35963e4dbd6c437056f789391a2b0319e0a2a5913e379c06a5a385ba0c3 kernel-doc-4.18.0-513.9.1.el8_9.noarch.rpm 985b204c67a0910fde2ceffdad9dc95b4f5316c29ad5b5a3e3c4c33631f0bcf4 kernel-headers-4.18.0-513.9.1.el8_9.aarch64.rpm 8daeace9f434d23929bdeaac290797bfa31217f7401211a859a1c740befbad65 kernel-modules-4.18.0-513.9.1.el8_9.aarch64.rpm 7a4d2150ec1f01bc47a4f1b330698ac6a73989f68f24e92afb67aa12ea28bacf kernel-modules-extra-4.18.0-513.9.1.el8_9.aarch64.rpm 8fd402ecebdea675e3ca85561fcc7b60466c16df820bf94ef65a58f520615264 kernel-tools-4.18.0-513.9.1.el8_9.aarch64.rpm 756b73a04774beb97814c32293dc10daf22e3c211b8e7932314e5e77f0a2a76c kernel-tools-libs-4.18.0-513.9.1.el8_9.aarch64.rpm d5f450cdf2f4e17125051cc165239ad14a87edee2f63a8f224d1350d5746dbbd perf-4.18.0-513.9.1.el8_9.aarch64.rpm 520366e18d2e3c0a450edfa8dcd9a0f533c2a9ac11c9b25cc517fb1e54bf4cea python3-perf-4.18.0-513.9.1.el8_9.aarch64.rpm 07a08013f1441d9155d2652062d0544895b226558af1c2f7ab7ac80eb6165456 RLSA-2023:7836 Moderate: avahi security update Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket (CVE-2021-3468) * avahi: Reachable assertion in avahi_dns_packet_append_record (CVE-2023-38469) * avahi: Reachable assertion in avahi_escape_label (CVE-2023-38470) * avahi: Reachable assertion in dbus_set_host_name (CVE-2023-38471) * avahi: Reachable assertion in avahi_rdata_parse (CVE-2023-38472) * avahi: Reachable assertion in avahi_alternative_host_name (CVE-2023-38473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket (CVE-2021-3468) * avahi: Reachable assertion in avahi_dns_packet_append_record (CVE-2023-38469) * avahi: Reachable assertion in avahi_escape_label (CVE-2023-38470) * avahi: Reachable assertion in dbus_set_host_name (CVE-2023-38471) * avahi: Reachable assertion in avahi_rdata_parse (CVE-2023-38472) * avahi: Reachable assertion in avahi_alternative_host_name (CVE-2023-38473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms avahi-0.7-21.el8_9.1.aarch64.rpm 2a333e37680a72d173978a27486cff7f9679caa98d18b18eed54c937068a78a8 avahi-autoipd-0.7-21.el8_9.1.aarch64.rpm dafe46f8dcb5d92e6f2c95bb54112aa18afdbaa726657df61c3c5f97afb73015 avahi-glib-0.7-21.el8_9.1.aarch64.rpm a3f1f12aacce005adca67ece0a943bf8779a99bec5283e809a9ca660aeab1e43 avahi-gobject-0.7-21.el8_9.1.aarch64.rpm 9f85945c8c14b065cbf630b619e8b98aae473bc66a8184dd54879a0b167d65ab avahi-libs-0.7-21.el8_9.1.aarch64.rpm e0b5703340946e5a80e3afb31eecf9ce6fda80ae1250d13a44905364f61718de python3-avahi-0.7-21.el8_9.1.aarch64.rpm beb5e966a2dffae6cf83e5196afe1c17cca63a53400759a85dba968e417afc9a RLBA-2024:0111 selinux-policy bug fix update The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * Allow selinux transition from ifconfig_t to httpd_t and sshd_t [rhel-8.9.0.z] (JIRA:Rocky Linux-15427) * AVCs with samba-dcerpcd and samba_export_all_rw [rhel-8.9.0.z] (JIRA:Rocky Linux-16274) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * Allow selinux transition from ifconfig_t to httpd_t and sshd_t [rhel-8.9.0.z] (JIRA:Rocky Linux-15427) * AVCs with samba-dcerpcd and samba_export_all_rw [rhel-8.9.0.z] (JIRA:Rocky Linux-16274) rocky-linux-8-aarch64-baseos-rpms selinux-policy-3.14.3-128.el8_9.1.noarch.rpm c7433d674d6f5d9a7a8bf0ea180d467e6f68f113ad23a099be84b71ca8a56c03 selinux-policy-devel-3.14.3-128.el8_9.1.noarch.rpm 7fe0299de89fcebcf37a86be62b57736b0c5557f4d182a664a3ec58d16989d1a selinux-policy-doc-3.14.3-128.el8_9.1.noarch.rpm 9471f6adb2710ed4bfcc6695e4bd72e84b0f4c79d9717d554a585ff319b63eff selinux-policy-minimum-3.14.3-128.el8_9.1.noarch.rpm 072fc4d0e4315817acb5b0ce0f1bc930e81f9c22c604e2870c133ff77f74ef3b selinux-policy-mls-3.14.3-128.el8_9.1.noarch.rpm 0d1ad8a88f168fb39c385ab5e4da73b2c458a9b4b06dff84896f688f2ecf1c6e selinux-policy-sandbox-3.14.3-128.el8_9.1.noarch.rpm 3e3c5e2e37404331b64f013dd313d08444612b6bffa1114de993772973492762 selinux-policy-targeted-3.14.3-128.el8_9.1.noarch.rpm 7e06389eb99b9c66b0cf8e3459816672d2603a5b87094c6ba8bb7e56c95c5dd2 RLBA-2024:0117 libcap bug fix update Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Bug Fix(es): * libcap NVR in Rocky Linux-8.9.0 is lower than the package from Rocky Linux-8.8.z [rhel-8.9.0.z] (JIRA:Rocky Linux-19362) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Bug Fix(es): * libcap NVR in Rocky Linux-8.9.0 is lower than the package from Rocky Linux-8.8.z [rhel-8.9.0.z] (JIRA:Rocky Linux-19362) rocky-linux-8-aarch64-baseos-rpms libcap-2.48-6.el8_9.aarch64.rpm 72805c8a2622a89c354d7ffcd69acce11c0f45e227209bc5040a4f56e177afc9 libcap-devel-2.48-6.el8_9.aarch64.rpm ab48ff9865d5d739fc46a028af5f7bc7528d588b4d38ea4881803b86dc4e24b1 RLBA-2024:0118 xfsdump bug fix update The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es): * xfsdump/xfsrestore: suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14494) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es): * xfsdump/xfsrestore: suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14494) rocky-linux-8-aarch64-baseos-rpms xfsdump-3.1.8-7.el8_9.aarch64.rpm f1dc8f7799cb34a51e9a028d4e39b3d3bc95b7eaa753a9fc286d515495df0b38 RLSA-2024:0155 Moderate: gnutls security update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms gnutls-3.6.16-8.el8_9.aarch64.rpm 126fcfdef8cc390f13adc3bd61e378c8b146f5ed5d938f346dc0510e2bc982d9 RLSA-2024:0253 Moderate: sqlite security update SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms sqlite-3.26.0-19.el8_9.aarch64.rpm 596ec34b04092313e6b5598ad62aa1d6307c5154e092ead1fe7fbbec91abb31d sqlite-devel-3.26.0-19.el8_9.aarch64.rpm 24d1a6daadd9b122e4ac484f29fcf54cf1e257a46b39e712c2b0f84000163a80 sqlite-doc-3.26.0-19.el8_9.noarch.rpm 062df3cfd98abe04f209e6412438476e99f396b73ff1308ba4ec9c799a482e79 sqlite-libs-3.26.0-19.el8_9.aarch64.rpm f3b403272aac32feb6809be53a598e184528f0876b9ef017995be730dec16b06 RLSA-2024:0256 Moderate: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-56.el8_9.3.rocky.0.aarch64.rpm aeb7703bae5aea9a2109258c93263ca1448d0d2191b58afaf4f56756c8d730bc python3-libs-3.6.8-56.el8_9.3.rocky.0.aarch64.rpm f2b079ef084b6a27ddf24105006e9048a1fe22f898ac94d3048ce568d8268886 python3-test-3.6.8-56.el8_9.3.rocky.0.aarch64.rpm d0c3b51f01f288cee07d1410a3dd79e8024b1c723c9e0182228d3b7c73536903 RLSA-2024:0606 Moderate: openssh security update OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795) * openssh: potential command injection via shell metacharacters (CVE-2023-51385) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795) * openssh: potential command injection via shell metacharacters (CVE-2023-51385) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms openssh-8.0p1-19.el8_9.2.aarch64.rpm d95cbb9d86e6d4a2a7dc7280165263a108923fb8f88b5f141bc9a47c3da7f3b4 openssh-cavs-8.0p1-19.el8_9.2.aarch64.rpm 49abc4dea5de7b8b8f44cc9a69e11a1e79674e12c9939f05baabf11165f7bbb0 openssh-clients-8.0p1-19.el8_9.2.aarch64.rpm 1c421edc997d33141b924373a93b3d569dc0f5e32063eb9541fbfb64cf3e689c openssh-keycat-8.0p1-19.el8_9.2.aarch64.rpm eeb8461673f84751f3e2322709453d7890ddb8ed798b7e84aca238739d790725 openssh-ldap-8.0p1-19.el8_9.2.aarch64.rpm f334376afd993dea03ba0a6f1f37a06d46e3d916a2fcd977b855dbe16d232bd1 openssh-server-8.0p1-19.el8_9.2.aarch64.rpm 94125a0e0231ab3257b88748d5707aae89428c8426c62b3b48494ec1707c2ab4 pam_ssh_agent_auth-0.10.3-7.19.el8_9.2.aarch64.rpm c1586356d36e3712a67ac936f8f5c4b27b368a8a20cfe1983f623a775b263bdd RLSA-2024:0628 Moderate: libssh security update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libssh-0.9.6-13.el8_9.aarch64.rpm 4b24d4776dee7faf185fce19c577f35185ede844a4bdfec335dcd45ea9933339 libssh-config-0.9.6-13.el8_9.noarch.rpm 95f8cd739183ac321da16c9855bf7fd0007d04b4dfddbeb8f7f8368d051275b9 RLSA-2024:0627 Moderate: gnutls security update The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: incomplete fix for CVE-2023-5981 (CVE-2024-0553) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: incomplete fix for CVE-2023-5981 (CVE-2024-0553) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms gnutls-3.6.16-8.el8_9.1.aarch64.rpm 49889d8844b37dddcc54526053fe07bec3130a54f503290b7d8298302719fa12 RLSA-2024:0647 Moderate: rpm security update The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Security Fix(es): * rpm: TOCTOU race in checks for unsafe symlinks (CVE-2021-35937) * rpm: races with chown/chmod/capabilities calls during installation (CVE-2021-35938) * rpm: checks for unsafe symlinks are not performed for intermediary directories (CVE-2021-35939) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Security Fix(es): * rpm: TOCTOU race in checks for unsafe symlinks (CVE-2021-35937) * rpm: races with chown/chmod/capabilities calls during installation (CVE-2021-35938) * rpm: checks for unsafe symlinks are not performed for intermediary directories (CVE-2021-35939) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms python3-rpm-4.14.3-28.el8_9.aarch64.rpm 42b57f27c8bf47c79da5fb910772aac1bb8393910abf682bb0162c25a8a5f205 rpm-4.14.3-28.el8_9.aarch64.rpm 697a76e7759305bca11bf3f37a881a6a402dde2d92a0cc733ff9ceb34792535f rpm-apidocs-4.14.3-28.el8_9.noarch.rpm 292ab5434a558d5783d3f51a6420dc09f103c137a66cbb8f6244b4c22fff0b79 rpm-build-libs-4.14.3-28.el8_9.aarch64.rpm aa7d6f97c61338717a1b8f9fc31914cc1ac920302f4538838da5576d0b2217e0 rpm-cron-4.14.3-28.el8_9.noarch.rpm eb1ead21a24d1c943d9de5489120f1a3075cf35644adc373b05f9895095d4217 rpm-devel-4.14.3-28.el8_9.aarch64.rpm fdd25358710321b96294c10717f997cb6f601158018a9b5bb1cbd921b9539d99 rpm-libs-4.14.3-28.el8_9.aarch64.rpm 188037ed99fcdd5af12c419a7fb25ce71e172f6bc6c954576881c4b9796ef975 rpm-plugin-ima-4.14.3-28.el8_9.aarch64.rpm 8819feab3b978705897be455ad8178e691c6a120336a28e23ba637739296b217 rpm-plugin-prioreset-4.14.3-28.el8_9.aarch64.rpm 3c656f6799854dd98482da68a7c29874095251f1bee71b12f01b90cc2fd03e7c rpm-plugin-selinux-4.14.3-28.el8_9.aarch64.rpm f221450f7359af4b9a2a6e664b3482dcd5f20d97cd95aba2e7e3ce850e0f80eb rpm-plugin-syslog-4.14.3-28.el8_9.aarch64.rpm ae2ec2e7c9a8ef10c2478542ac53c4656986cd5923d196e026bb4a4386fd3660 rpm-plugin-systemd-inhibit-4.14.3-28.el8_9.aarch64.rpm 9d1d14d82dc082b66d9645a2e68588211b9072f46d90ef326df42cd21860c5b1 rpm-sign-4.14.3-28.el8_9.aarch64.rpm 545117f4555c09276d9556db535fe6b257560f52fabb22f28022eb31d9797d82 RLBA-2024:0721 sos bugfix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Rebase sos to 4.6.1 in Rocky Linux8. (JIRA:Rocky Linux-21173) * Rebase sos to 4.6.1 in Rocky Linux9. (JIRA:Rocky Linux-21174) * Use device authorization for uploading sosreports in Rocky Linux7. (JIRA:Rocky Linux-21176) * Use device authorization for uploading sosreports in Rocky Linux8. (JIRA:Rocky Linux-21177) * Use device authorization for uploading sosreports in Rocky Linux9. (JIRA:Rocky Linux-21178) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Rebase sos to 4.6.1 in Rocky Linux8. (JIRA:Rocky Linux-21173) * Rebase sos to 4.6.1 in Rocky Linux9. (JIRA:Rocky Linux-21174) * Use device authorization for uploading sosreports in Rocky Linux7. (JIRA:Rocky Linux-21176) * Use device authorization for uploading sosreports in Rocky Linux8. (JIRA:Rocky Linux-21177) * Use device authorization for uploading sosreports in Rocky Linux9. (JIRA:Rocky Linux-21178) rocky-linux-8-aarch64-baseos-rpms sos-4.6.1-1.el8.noarch.rpm 460b874a56caf9bd90d547c53cb5e36cbbd5c847436b3f7d655061d8c5673186 sos-audit-4.6.1-1.el8.noarch.rpm 23616ddfd1107a94eca0c215329438ef71226fdf77f1287f86d3d69e973de722 RLBA-2024:0898 python-cryptography bug fix update The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. Bug Fix(es): * [FTBFS] rsa_pkcs1_implicit_rejection breaks test_decrypt_invalid_decrypt (JIRA:Rocky Linux-17873) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-cryptography. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. Bug Fix(es): * [FTBFS] rsa_pkcs1_implicit_rejection breaks test_decrypt_invalid_decrypt (JIRA:Rocky Linux-17873) rocky-linux-8-aarch64-baseos-rpms python3-cryptography-3.2.1-7.el8_9.aarch64.rpm 16010a3f55cff9c96d8db5cdb87ff7f3c742b341b562efcca390c9a6d5c84076 RLBA-2024:0899 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * Excessive logging to sssd_nss and sssd_be in multi-domain AD forest (JIRA:Rocky Linux-19212) * latest sssd breaks logging in via XDMCP for LDAP/Kerberos users (JIRA:Rocky Linux-19994) * SSSD GPO lacks group resolution on hosts (JIRA:Rocky Linux-21085) * Make sure 8.9.z/9.3.z doesn't build 'passkey' code (JIRA:Rocky Linux-21164) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * Excessive logging to sssd_nss and sssd_be in multi-domain AD forest (JIRA:Rocky Linux-19212) * latest sssd breaks logging in via XDMCP for LDAP/Kerberos users (JIRA:Rocky Linux-19994) * SSSD GPO lacks group resolution on hosts (JIRA:Rocky Linux-21085) * Make sure 8.9.z/9.3.z doesn't build 'passkey' code (JIRA:Rocky Linux-21164) rocky-linux-8-aarch64-baseos-rpms libipa_hbac-2.9.1-4.el8_9.5.aarch64.rpm 0f0ae331bbceef589d4f7eaf32aeee840c3f2d09386fd1a47043fa1a1474369a libsss_autofs-2.9.1-4.el8_9.5.aarch64.rpm 92225b1345aaad1ee49759a93fb73faa2171867ea107c3756323c36ebefa91c6 libsss_certmap-2.9.1-4.el8_9.5.aarch64.rpm ffaa102f5b83759533feb18e409ad7da0c92f4c085da7370438287ec582d2132 libsss_idmap-2.9.1-4.el8_9.5.aarch64.rpm 4a9c87860617801f71f8562561e713600ebd79364673a7b88da825a9a161e765 libsss_nss_idmap-2.9.1-4.el8_9.5.aarch64.rpm 634038b24436ff605a6fd163abec20cccb11c1f9cc78992f9e99929c4cb5216d libsss_simpleifp-2.9.1-4.el8_9.5.aarch64.rpm 32d26e83de2f8200af38f8568743286a07d1cd642f931e26aae8ff5a7e57ad92 libsss_sudo-2.9.1-4.el8_9.5.aarch64.rpm 3b303a4840314710ca54cf6ee2591972c477360f9c85ec30c8e81e862bbec0f9 python3-libipa_hbac-2.9.1-4.el8_9.5.aarch64.rpm aadcef04356f02f4d291cadbcef6c687b9b53fdaa37eeb77263c48968393fba9 python3-libsss_nss_idmap-2.9.1-4.el8_9.5.aarch64.rpm e7587663d3036c022117a8ac9ff08311bfbc605a3d44d7f3accb24fc71cd7fcc python3-sss-2.9.1-4.el8_9.5.aarch64.rpm d8e0d5b85371cab6b574c23f2ba84240e1eddd2318d4e1c4817031913de1e603 python3-sssdconfig-2.9.1-4.el8_9.5.noarch.rpm 5bf15cbd155b7e584c7389abe2f3ecc5e4dc0b5e0f63a1e4ff3d64a74975926e python3-sss-murmur-2.9.1-4.el8_9.5.aarch64.rpm 9b3eb4566c0a652333d60cd5634393b172355be3daddd06a1e0f2da101e72fc4 sssd-2.9.1-4.el8_9.5.aarch64.rpm a1837a990cdcdc041489c3e5d7834262503d087ff0c51be08e5878c0c129c6e4 sssd-ad-2.9.1-4.el8_9.5.aarch64.rpm 34d125a5abd81ada487f90c1f89d021caabd749f0d6829d9eaf27d825d548c9c sssd-client-2.9.1-4.el8_9.5.aarch64.rpm d90049bb49d281782ff3c44489b525cbb69a03299b3b48ea95a9b9f1cec167aa sssd-common-2.9.1-4.el8_9.5.aarch64.rpm 0633432d9c02afd552f137bd11f1e5de4f9d760f07502ade80748a3c5adb0afd sssd-common-pac-2.9.1-4.el8_9.5.aarch64.rpm 4b5d0c0bf2ad247439bcb7191b385c2b0a1316ccb7d9ceb60b7f2a16adfbe3e0 sssd-dbus-2.9.1-4.el8_9.5.aarch64.rpm c6eab88b4ad3db6f9574f596b0c57ab67819e06cbfcf58fe8a470e11d75d57c0 sssd-ipa-2.9.1-4.el8_9.5.aarch64.rpm 7248cdeedc16d249d525b8a283182c271a4c4271140583913a342ee920e27194 sssd-kcm-2.9.1-4.el8_9.5.aarch64.rpm 3814d775a035f04edb07e18adf3bda75957640b3621739cc88348c17e587a91c sssd-krb5-2.9.1-4.el8_9.5.aarch64.rpm 069e4d4bc1088ed8dbfa75179eef120ead5c36a67425468579771f46389f8e60 sssd-krb5-common-2.9.1-4.el8_9.5.aarch64.rpm 34e7f3b6c3a81e44534831c32b7870210658d99d24b834c4510530dc9001cf25 sssd-ldap-2.9.1-4.el8_9.5.aarch64.rpm b404c8f6b6b26b76f178d223c9a1ae032e3f87252237e265ebdf4c87168808e8 sssd-nfs-idmap-2.9.1-4.el8_9.5.aarch64.rpm 3d129155a49fe34bba27e2e33cf93ba5817205c52535f27afef2a0568121174e sssd-polkit-rules-2.9.1-4.el8_9.5.aarch64.rpm 378e27d9612656d2d6b62011b27b77add69d4129c6dcc4125ce6a83b25815685 sssd-proxy-2.9.1-4.el8_9.5.aarch64.rpm 03b3a9659d0b90e97d9a4aa0e26d429f5d05e7211be4a84fd602dd61607cc113 sssd-tools-2.9.1-4.el8_9.5.aarch64.rpm 434585612f89f8fb82c256a0806cabb42d68e84cd91e16d5889c1ba4d6ed3523 sssd-winbind-idmap-2.9.1-4.el8_9.5.aarch64.rpm e9ed8c911910305c21cd99f782ac3174c89e48e63a0e900a738d5e22e1cf88b0 RLSA-2024:1601 Moderate: curl security and bug fix update The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218) * curl: more POST-after-PUT confusion (CVE-2023-28322) * curl: cookie injection with none file (CVE-2023-38546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libssh (curl sftp) not trying password auth (BZ#2240033) * libssh: cap SFTP packet size sent (Rocky Linux-5485) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218) * curl: more POST-after-PUT confusion (CVE-2023-28322) * curl: cookie injection with none file (CVE-2023-38546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libssh (curl sftp) not trying password auth (BZ#2240033) * libssh: cap SFTP packet size sent (Rocky Linux-5485) rocky-linux-8-aarch64-baseos-rpms curl-7.61.1-33.el8_9.5.aarch64.rpm 12bc0c8df84092e9d918483d5dd1741dbaac9989bfd51398330c9ab0a3c644b1 libcurl-7.61.1-33.el8_9.5.aarch64.rpm 1dd95baf9a9466e62c679d632270f0d9d0a29997e1576a0154bcd1a7e182de0d libcurl-devel-7.61.1-33.el8_9.5.aarch64.rpm 1ff9076dab9e3cd77a1daa89218578d1d76cf3a7d0490e7982680fd546424303 libcurl-minimal-7.61.1-33.el8_9.5.aarch64.rpm a3f4f9e66abafce802a165e5cddc3bf983d5f149295b06e17ec25d809b8e25a1 RLBA-2024:1604 NetworkManager bug fix update NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600) * [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600) * [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968) rocky-linux-8-aarch64-baseos-rpms NetworkManager-1.40.16-15.el8_9.aarch64.rpm 60e70b26d8c4eb9ac83158551f0d2018f385eece0318b5703d7959b48ede21a0 NetworkManager-adsl-1.40.16-15.el8_9.aarch64.rpm e17e6bbf5ef810ea87530dce899cfbb59d9ec2aa2b3bd63c6ac3002c7a07142b NetworkManager-bluetooth-1.40.16-15.el8_9.aarch64.rpm 80d7d80b62da7d985472f62c0b2bae626cc6af2beb07d341d0b755e137cd3805 NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm 7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44 NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm 705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30 NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm 6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93 NetworkManager-libnm-1.40.16-15.el8_9.aarch64.rpm 776c187874f857d3a49992f57762fb62979d261d2cfe822429ebe8c04af19813 NetworkManager-ovs-1.40.16-15.el8_9.aarch64.rpm b35cd21f424556dcf1096db197c5e1bdabe9ddabaefa1423bf8909ce1c77aea0 NetworkManager-ppp-1.40.16-15.el8_9.aarch64.rpm 6cabda9799361e0eeedc797f1f64c8f777321ee9e6c0bce990bc78f793eca20b NetworkManager-team-1.40.16-15.el8_9.aarch64.rpm 87dd75a1096b0831c3a5cffe15de668b0b9ce73ad42ef61fc7965489c5999193 NetworkManager-tui-1.40.16-15.el8_9.aarch64.rpm b742298e3ba8d04be06fe0ca650cca9d5636b2c7e9c6bbb1957d71c11789fd2f NetworkManager-wifi-1.40.16-15.el8_9.aarch64.rpm 75a3335aa89cd2eafa244d83f010fa574af5c38d1036fba1e2c2e2ac5df53206 NetworkManager-wwan-1.40.16-15.el8_9.aarch64.rpm acdd2c83ae2da3462b8ae04a3d63bbf36a2f82c6e783fbb559fc833a835a2edb RLBA-2024:1605 perl-HTTP-Tiny bug fix update HTTP::Tiny is a small and simple HTTP/1.1 client written in Perl. Bug Fix(es): * perl-HTTP-Tiny: man page not updated to reflect fix for CVE-2023-31486 [rhel-8.9.z] (JIRA:Rocky Linux-21793) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HTTP::Tiny is a small and simple HTTP/1.1 client written in Perl. Bug Fix(es): * perl-HTTP-Tiny: man page not updated to reflect fix for CVE-2023-31486 [rhel-8.9.z] (JIRA:Rocky Linux-21793) rocky-linux-8-aarch64-baseos-rpms perl-HTTP-Tiny-0.074-2.el8_9.1.noarch.rpm 2a2106eb7e08a0bfd8a6daf5770cd4616b46dc037a2e5f569fedfc8922c84596 RLBA-2024:1606 util-linux bug fix update The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es): * lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es): * lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562) rocky-linux-8-aarch64-baseos-rpms libblkid-2.32.1-44.el8_9.1.aarch64.rpm d1cabf86686e9a4255b8757b955731188f8963364efb284fdfb654e1c3b223d1 libblkid-devel-2.32.1-44.el8_9.1.aarch64.rpm c23e505f492505bd95dd52e23986b4c33e72179ceba0962181f5e50d8715fc10 libfdisk-2.32.1-44.el8_9.1.aarch64.rpm b0af879a55eb711585fdf365c4bd09ab03bf33bcee7b1dfa9b9b41be19e20cee libfdisk-devel-2.32.1-44.el8_9.1.aarch64.rpm 66bf4389a73990d6814d8872207a4d5179c5f578ae0c50a63b730df16764afaf libmount-2.32.1-44.el8_9.1.aarch64.rpm 0213fc403c033760c0ce2db34dde9fd53f253b841306dd4457aa22f2198f51b2 libsmartcols-2.32.1-44.el8_9.1.aarch64.rpm e7bff0e5af5d128d2a0cdee0d52e4498ba2ee47cc0871c370cbe57a5a318516c libsmartcols-devel-2.32.1-44.el8_9.1.aarch64.rpm 07a24d60fb4731a51bcc93a9ecec599af9db8a00bcc5ff7aa6b1a721945545e3 libuuid-2.32.1-44.el8_9.1.aarch64.rpm b9caafb1ba8b6f3a367be0641b724ff5a3d52215cc2c9a4aecb8042b10c15424 libuuid-devel-2.32.1-44.el8_9.1.aarch64.rpm 30d25b9b24ac4f04cfe76cef1914923bd1d187b1341e4fbd4aae373d9f7bb7b0 util-linux-2.32.1-44.el8_9.1.aarch64.rpm 9de5fdca5d3692652232494a644a01baec6dc3260375bc1512f87f0a256e6622 util-linux-user-2.32.1-44.el8_9.1.aarch64.rpm ad256adf7039808ccd29e9153c60856835e34471e9351fdec0a14af0a848aeab uuidd-2.32.1-44.el8_9.1.aarch64.rpm 3a403da49c32a9377150f58134baac97816e84a0a9bf6517ec0f018aebab4b22 RLSA-2024:1607 Important: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931) * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) Bug Fix(es): * OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010) * Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055) * kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766) * tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930) * rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479) * ceph: several cap and snap fixes (JIRA:Rocky Linux-20909) * [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063) * unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719) * [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101) * kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954) * backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331) * ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496) Enhancement(s): * [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931) * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) Bug Fix(es): * OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010) * Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055) * kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766) * tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930) * rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479) * ceph: several cap and snap fixes (JIRA:Rocky Linux-20909) * [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063) * unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719) * [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101) * kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954) * backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331) * ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496) Enhancement(s): * [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-513.24.1.el8_9.aarch64.rpm 74d9ed9c399aac2cfc711ba323927e278a251e78dacde4ccfe4008c276ec1af7 kernel-4.18.0-513.24.1.el8_9.aarch64.rpm 3b1b3d876159103819ca7957fca4ee385a3db532ba778d77c4983588055e563c kernel-abi-stablelists-4.18.0-513.24.1.el8_9.noarch.rpm 9dc4f48648f746ab7608ac9c020aaa0ba2c223bc5a53d56be0b1d2e25784e753 kernel-core-4.18.0-513.24.1.el8_9.aarch64.rpm efb9ab446f6ab64d74d6b22e345f2d0cc1b6b5e542e7c020ea3dd69336b416c9 kernel-cross-headers-4.18.0-513.24.1.el8_9.aarch64.rpm 3d320a6f45767c6b4f5015d19b32ecf6db727ed289d29ce7cc2b28e0bba0a734 kernel-debug-4.18.0-513.24.1.el8_9.aarch64.rpm e4f475b491c30dd2e14cabd1f5fcf726aeca76bf09d41020aa47387849f721e7 kernel-debug-core-4.18.0-513.24.1.el8_9.aarch64.rpm 472ce4fa5740bed57115097bdffd9316b3f93b4191bacd889c0a5d860657f9d3 kernel-debug-devel-4.18.0-513.24.1.el8_9.aarch64.rpm 2dc4199a7b9906d54c5cb9b4379f3a503d5c59ebbab3795c0df020706636430a kernel-debuginfo-common-aarch64-4.18.0-513.24.1.el8_9.aarch64.rpm 775c672940b4b4299b001241feb3046476f8db81d247c79e79bbac18d3eba972 kernel-debug-modules-4.18.0-513.24.1.el8_9.aarch64.rpm 6baad0d89e342c9ea44a1e4ad3498daeeefdfa044a23f72eff75688607b7af92 kernel-debug-modules-extra-4.18.0-513.24.1.el8_9.aarch64.rpm 979309c9f5b4f47553675ecc0db45e2733536340765228183e597dc9d18e76f4 kernel-devel-4.18.0-513.24.1.el8_9.aarch64.rpm f966819c4054012f00f1a2eb6af2e90b9595b3c133b493a4f0c994f0883d0f56 kernel-doc-4.18.0-513.24.1.el8_9.noarch.rpm 0def6c11404ddde26d393bca3efa0981d5813ee1745c7e4a2b15c86c98b86937 kernel-headers-4.18.0-513.24.1.el8_9.aarch64.rpm 342d3ce38ce5fc9efca741a556d7f87d15c202730af80777e2c9a611001636c3 kernel-modules-4.18.0-513.24.1.el8_9.aarch64.rpm 9e1d05c6583fe852e4fa63bdef2aa8eaa9340890766a720a31e2ca97a010bc1f kernel-modules-extra-4.18.0-513.24.1.el8_9.aarch64.rpm 4ee9ad8196413979048a1468039e0358a4303568bc1d463629aa47cbdd4373f7 kernel-tools-4.18.0-513.24.1.el8_9.aarch64.rpm 1e1b2593c89a3b0f300d5a0c9f2b7a60ca119d6fcbbeb785a90f32af4ef35a70 kernel-tools-libs-4.18.0-513.24.1.el8_9.aarch64.rpm fa6e1c515f2c2d6f3f67b6d01132df5941cacb39a751027b5892507ac9c80837 perf-4.18.0-513.24.1.el8_9.aarch64.rpm bed0d8d6ee9a1d15236e8a29cb05d4ad260bd7d68d1fab746a59d1b6d91e6136 python3-perf-4.18.0-513.24.1.el8_9.aarch64.rpm eca2daf52920fe92595d674730ab7182abf6f4ec33328cbadbc43088d3a60969 RLSA-2024:1608 Moderate: opencryptoki security update The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Security Fix(es): * opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Security Fix(es): * opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms opencryptoki-3.21.0-10.el8_9.aarch64.rpm 0caeb5e618ef2c0487a0953438a8533ea9e9a31cfc40a84e83f30afaccec79c3 opencryptoki-icsftok-3.21.0-10.el8_9.aarch64.rpm 2429318431e3d81c38dc49b29226c3908af34c41157c63a8f548a739f675bcd9 opencryptoki-libs-3.21.0-10.el8_9.aarch64.rpm b951ecb719679934e45833fdc0bb29cb48ea1dd061579960018c0ed132852e93 opencryptoki-swtok-3.21.0-10.el8_9.aarch64.rpm aed83d51510e123deaf79dcd05b59535e7a0c40ac90ec7b08f515cfd33386a0c opencryptoki-tpmtok-3.21.0-10.el8_9.aarch64.rpm 6877e5f25a7dfc0ec6d4a60223cc8c18d737151cc0d88bfdca80e435059ccf76 RLBA-2024:1609 python-pip bug fix update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * python-pip - require Python with tarfile filters [rhel-8.9.0.z] (JIRA:Rocky Linux-25449) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * python-pip - require Python with tarfile filters [rhel-8.9.0.z] (JIRA:Rocky Linux-25449) rocky-linux-8-aarch64-baseos-rpms platform-python-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm 5fc0d2372285ab4b67ce22df0e339dc53f7cf961a7d4304f870a4d03c7719a74 python3-pip-wheel-9.0.3-23.el8_9.1.rocky.0.noarch.rpm c35cfde3728fbeb84e395247089088c87a9750091950213631435e86f86ec07d RLSA-2024:1610 Moderate: less security update The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors. Security Fix(es): * less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for less. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors. Security Fix(es): * less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms less-530-2.el8_9.aarch64.rpm 376cdd6cdf78cc9858ebf30658a5d9367a295cfdcb6ec2dbb531a7b16db49e6a RLSA-2024:1615 Moderate: expat security update Expat is a C library for parsing XML documents. Security Fix(es): * expat: parsing large tokens can trigger a denial of service (CVE-2023-52425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: parsing large tokens can trigger a denial of service (CVE-2023-52425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms expat-2.2.5-11.el8_9.1.aarch64.rpm 3d12ee4be78b4fd54a6a563e850e867ce8dbb70c04075a74b0562f5e01b8bdd3 expat-devel-2.2.5-11.el8_9.1.aarch64.rpm 180eb733520b957bd5d0a77f667319836c302578be17786a5a70a935fe1dcbca RLBA-2024:1739 sos bugfix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Update reference to sphinx in upstream wiki. (JIRA:Rocky Linux-17924) * Capture information for pre-conversion in convert2rhel. (JIRA:Rocky Linux-21331) * presets test failure on sos-4.6.1-1 (JIRA:Rocky Linux-22395) * The "#wbinfo -t" and "#net ads testjoin" outputs should be available in sosreport. (JIRA:Rocky Linux-23665) * Entries "epo" and "map" in hostname_map section of default_mappings change the "sosreport" file name. (JIRA:Rocky Linux-2399) * fwupd starts to run during sosreport and it continues to run after sosreport (JIRA:Rocky Linux-24342) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Update reference to sphinx in upstream wiki. (JIRA:Rocky Linux-17924) * Capture information for pre-conversion in convert2rhel. (JIRA:Rocky Linux-21331) * presets test failure on sos-4.6.1-1 (JIRA:Rocky Linux-22395) * The "#wbinfo -t" and "#net ads testjoin" outputs should be available in sosreport. (JIRA:Rocky Linux-23665) * Entries "epo" and "map" in hostname_map section of default_mappings change the "sosreport" file name. (JIRA:Rocky Linux-2399) * fwupd starts to run during sosreport and it continues to run after sosreport (JIRA:Rocky Linux-24342) rocky-linux-8-aarch64-baseos-rpms sos-4.7.0-1.el8.noarch.rpm 021f3d73e9f1e3880d66db3b3e4d5ec3a86bf4895f050c942672c97b438dd2b4 sos-audit-4.7.0-1.el8.noarch.rpm 8e362a542e2317f6987396591278c1f33f9c987f0579b9392b0fd0c608e53796 RLSA-2024:1782 Important: bind and dhcp security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dhcp, bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bind-export-devel-9.11.36-11.el8_9.1.aarch64.rpm f8729420c557021ee1478674acfc76ea7ff68887f15614d1d690db691668768d bind-export-libs-9.11.36-11.el8_9.1.aarch64.rpm 272e38763cfb74ad14d6f3edb8ac4ba51d93c08d2a824c9cd6d4b62bd5a9cdf8 dhcp-client-4.3.6-49.el8_9.1.aarch64.rpm 44021e35cf744c90e4a38223be3b9d0a326c94e7a96249fd70858e45811cdb75 dhcp-common-4.3.6-49.el8_9.1.noarch.rpm 1172e129dc346143f495e27267dca4e708fb70a055ae13dcdbaea140db37033e dhcp-libs-4.3.6-49.el8_9.1.aarch64.rpm 6ed56d5364d65c793380ea790dd09e69cb6d2cac5b1721889d801aba407b7846 dhcp-relay-4.3.6-49.el8_9.1.aarch64.rpm cf5111a91427fe525af50c1521045740b0eb2c0892e64f46cd96bf3174029b39 dhcp-server-4.3.6-49.el8_9.1.aarch64.rpm 5ef4fcc334cf22d58287f9b49997e3479baf1b28581f48b074c34a70bfcb7dff RLSA-2024:1784 Moderate: gnutls security update The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. This package update fixes a timing side-channel in deterministic ECDSA. Security Fix(es): * gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. This package update fixes a timing side-channel in deterministic ECDSA. Security Fix(es): * gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms gnutls-3.6.16-8.el8_9.3.aarch64.rpm 0499b4573dd8e084685255d8f3a0f0bdc6d78dbd3f2ca851955d34d063ce7d6c RLSA-2024:2722 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms glibc-common-2.28-236.el8_9.13.aarch64.rpm 3e0c92a02ae6704f22546c64b3e9b19dc36c724fc17fc7a3346bcaca45e77adf glibc-langpack-ar-2.28-236.el8_9.13.aarch64.rpm ea2d6c2266be75397f9630947602eed7234b545b07f6936f924e2265248cf9ff glibc-2.28-236.el8_9.13.aarch64.rpm 553c0240b0ff5c6c0d8aedf0bd46d6bb1a9784c9fcd04af4bff1fa56f12e6c34 glibc-all-langpacks-2.28-236.el8_9.13.aarch64.rpm 33e70521847cfbdf0546ee06facf23c39741dab4e4d2c5ff75e6275999e6feef glibc-devel-2.28-236.el8_9.13.aarch64.rpm 8b38670e1c370541e4a63373b45e429f3970d9289094332b1854d899c9472570 glibc-doc-2.28-236.el8_9.13.noarch.rpm ce65550a6e53d9dfdef6627470f4adec0fee717f2339624386ebee7c95e5e5aa glibc-gconv-extra-2.28-236.el8_9.13.aarch64.rpm 59f9a7ff7eb3abea83d38efa40a38927bc40a1c6538ec41d57eedbeb2ff7d79d glibc-headers-2.28-236.el8_9.13.aarch64.rpm a55155dee5e2319b1bdf19d268cede6007c35e7c7a0c20b5e29b5aa0969b9132 glibc-langpack-aa-2.28-236.el8_9.13.aarch64.rpm a0b0d1bb20f3f9da4c8654e0d68f98de67e4eb0f2f6c81a992e93a840fad56f8 glibc-langpack-af-2.28-236.el8_9.13.aarch64.rpm 45a0530528315a2f100b018bd7a6a20e357b3cb69ac728fb92ba383f9b9fd01d glibc-langpack-agr-2.28-236.el8_9.13.aarch64.rpm c19400e0bb0730107783a35f7f6959303e2269b9f72c237ab80a0f685f153fce glibc-langpack-ak-2.28-236.el8_9.13.aarch64.rpm d596f335ba257fcc436bb4064cebfd9eb492f2e830dabedbe93ca4cb2a3ed283 glibc-langpack-am-2.28-236.el8_9.13.aarch64.rpm 33fa251149d332c343e8a4e76a18d7aa1867630666957abc72054bb1fdfcfe13 glibc-langpack-an-2.28-236.el8_9.13.aarch64.rpm b1e4672156726704287d217d72c56621cc42f83415c857549478a2ebf699d4ef glibc-langpack-anp-2.28-236.el8_9.13.aarch64.rpm 2f72302aa03c0c6479eeb893e2f59fbf32ee72ab8efeab2379b9569d4f202cf9 glibc-langpack-as-2.28-236.el8_9.13.aarch64.rpm 6d061412e32b067c49c4a425605646fc9a8218c5b9c29da87bf5e84f907dcf16 glibc-langpack-ast-2.28-236.el8_9.13.aarch64.rpm bff67ecc9e0f33c9354084501c014746cbe774a8082a91730f2fcf8f60f7c2b8 glibc-langpack-ayc-2.28-236.el8_9.13.aarch64.rpm 8239fc2b920946128f1d42517bc5caad956a2f0f8603eb0f3f4685cea4287117 glibc-langpack-az-2.28-236.el8_9.13.aarch64.rpm e66634be9cf4d1f23b38782233446a16521411119d5953b4c3c9c3ec4f1449ee glibc-langpack-be-2.28-236.el8_9.13.aarch64.rpm 0796d0197366a6c0fe62fb258b812b125f37de526222ea1388ed0b7c71f0d392 glibc-langpack-bem-2.28-236.el8_9.13.aarch64.rpm 21825876c674027a748dd1406b24b5a1b90ff08d9a86f15f24d9ab5fe85d5e06 glibc-langpack-ber-2.28-236.el8_9.13.aarch64.rpm 0465473b5211056b6759124a264a5dd80e8c21dd0ce595574c8983a4ed51c1e1 glibc-langpack-bg-2.28-236.el8_9.13.aarch64.rpm 8a45fd80e0ebb413ffdfcc17f16d55a79d5968fd9c2c87a1dffe7464d87f7fd1 glibc-langpack-bhb-2.28-236.el8_9.13.aarch64.rpm 72b16fddccea57b3832c46bdbfd106b780e025c2c20b30e75aefa5aa44e81ad6 glibc-langpack-bho-2.28-236.el8_9.13.aarch64.rpm 496ac949854b547d4d7bf9eb098268f52f07570e1e40155919452adff10e6892 glibc-langpack-bi-2.28-236.el8_9.13.aarch64.rpm 03a7e37327e333e6e6a0a62fd254e09694bc3c66ec510ab15fcc3d89fbd34ca1 glibc-langpack-bn-2.28-236.el8_9.13.aarch64.rpm ea02f9e3deadc93b079114a79f5cd97b296558c3b54246376e97194a69f99946 glibc-langpack-bo-2.28-236.el8_9.13.aarch64.rpm 1091c24c5efa57f3bf9cd87234ac30adc95dc77dd86ce1c1c2eba0b6be14cb87 glibc-langpack-br-2.28-236.el8_9.13.aarch64.rpm de43239383af41532ab5d8c7b6974fc008e70881f49e0c3fb463fc3ded9c8fa2 glibc-langpack-brx-2.28-236.el8_9.13.aarch64.rpm 378762e6d1b516951ac0fd9dded1c4fd5d022a279c4529db1777bdf90b8e4a51 glibc-langpack-bs-2.28-236.el8_9.13.aarch64.rpm d766ce13b413139c09423d483f7a048f88ca22ae2ce2e83ea275660cf4f00bf5 glibc-langpack-byn-2.28-236.el8_9.13.aarch64.rpm 8b0ef3ed905358898ed6f80d36feb79ab9adba0118c08cf04f2472797d46e104 glibc-langpack-ca-2.28-236.el8_9.13.aarch64.rpm 620af9b2e5d439206a6f663cadae21de08d831d407dd36e4cafe9ecd020ca82b glibc-langpack-ce-2.28-236.el8_9.13.aarch64.rpm 9140f30e64c5332b686bfcc8b038d55374c8c1f3b20b7ae4165c97d2e7bfa64c glibc-langpack-chr-2.28-236.el8_9.13.aarch64.rpm 829612d05140e1fd4263b90f61eb2c3f0cb91fef3464142a0c35a70e1d48418d glibc-langpack-cmn-2.28-236.el8_9.13.aarch64.rpm 715eee6fa23eccb5875ca56dac6c7852175fe328b0655c16be84ec248ade3f05 glibc-langpack-crh-2.28-236.el8_9.13.aarch64.rpm 17f7069e4adab6d663abb10c5f7c86aac475ec968279d8e38a1ef9c9a75e2a6b glibc-langpack-cs-2.28-236.el8_9.13.aarch64.rpm 18b4d82b47f0ad0c899bc9eeaabe149950d9cafc533479ffd476fe57d578360f glibc-langpack-csb-2.28-236.el8_9.13.aarch64.rpm 49462ccf61ade5fe899c113c8498faac51a4d69f1b11770db569b32ae48db628 glibc-langpack-cv-2.28-236.el8_9.13.aarch64.rpm 4a4748b8d952f683e56b6db7486660785bb42773d600354443b734508b443b4a glibc-langpack-cy-2.28-236.el8_9.13.aarch64.rpm abbcdaa5cb6ca76e438ce268031944686f7a0023713ec1e1b9da036d0dd5904b glibc-langpack-da-2.28-236.el8_9.13.aarch64.rpm 0c1caab26ca265b624fb0aea447641c0f23ab67d897b4866ceb517d8141de621 glibc-langpack-de-2.28-236.el8_9.13.aarch64.rpm ab62c1dae2f58ac66d4b506c64116b1d9375a1aaf3c94de4cb4c9bfc18169084 glibc-langpack-doi-2.28-236.el8_9.13.aarch64.rpm 5a24d135f8ebde7c7bcbe5ef3eba9018ad24416f3a864d7cac5221a0a1d79bc9 glibc-langpack-dsb-2.28-236.el8_9.13.aarch64.rpm 1def855888df189429a113d23869b6e8a155ff636322790842eebe92448622c4 glibc-langpack-dv-2.28-236.el8_9.13.aarch64.rpm b711b409edab7636cbb0d85b5ce0b411939049a6f2f7c8e2cd4eff3f8a1a2732 glibc-langpack-dz-2.28-236.el8_9.13.aarch64.rpm 4a8f08be39463183b1ffd1a88132eefa13ca6b63cc42f481d204aee4d34b3c32 glibc-langpack-el-2.28-236.el8_9.13.aarch64.rpm 2a7ae4b759843bfdda5b1baabfea0c38be8fbb165c806bdab351c5f2fc0b2b94 glibc-langpack-en-2.28-236.el8_9.13.aarch64.rpm e8f89011ed89cb140355b7a8d179f2f556649e6e9d3b4e03e947175abbe34103 glibc-langpack-eo-2.28-236.el8_9.13.aarch64.rpm 6fb24623e8f6c823642c9862314a0dfe2ed5eb28be834220d9d16dd0bb3b1e9d glibc-langpack-es-2.28-236.el8_9.13.aarch64.rpm 2bcf3cbe3ace9f14466f2ef5d3d80fa6c1da84172254d2c09acd4abb0a57c475 glibc-langpack-et-2.28-236.el8_9.13.aarch64.rpm 1454e0c9630aee0865c62a3e6f454b4112dd81b964757184c433533bb34e506b glibc-langpack-eu-2.28-236.el8_9.13.aarch64.rpm bd4a6f7e1adfeb501f7be1b6ed343e19d135539b5188864c08c744c1cea0c238 glibc-langpack-fa-2.28-236.el8_9.13.aarch64.rpm 63787d559d1495788413fc2daf9ceecafc83762e0337570af2655041a25edfa7 glibc-langpack-ff-2.28-236.el8_9.13.aarch64.rpm 17a75bf36ccd153da135a158085ab58de2e7ca35dbf9294ef646c66b15b7e7cc glibc-langpack-fi-2.28-236.el8_9.13.aarch64.rpm bceb1f23bf89185b6cf9250d697bd3456c250fb6783c1de5658b62162c49b1b1 glibc-langpack-fil-2.28-236.el8_9.13.aarch64.rpm 5d5ba3f213d2c14ba59c12602baa2b6ad6a8d0016387c59f00a55e199e8681ed glibc-langpack-fo-2.28-236.el8_9.13.aarch64.rpm 497abffaaa417e87788b25ae8113c215d1271b264b861d5d384f04008044fc52 glibc-langpack-fr-2.28-236.el8_9.13.aarch64.rpm 2d1319ce671cd6a0237b4496f8326c3c38470c612f53b86b97fd0b028396d7e2 glibc-langpack-fur-2.28-236.el8_9.13.aarch64.rpm 422e6432ea1c3acbc34d828f4e688c5c1d824c8c2b963b89b0d2bce85112948c glibc-langpack-fy-2.28-236.el8_9.13.aarch64.rpm d6cdfcdad602159a7b280e26991f6323c1062fc3ec2f9be91cf912fc1934cf1e glibc-langpack-ga-2.28-236.el8_9.13.aarch64.rpm 7f9403cc8b4a1d4e9372ef7bc5017128391b08f1440419b63e1fe96c6dd154c2 glibc-langpack-gd-2.28-236.el8_9.13.aarch64.rpm 12dbc1ada52268efc4d97998f90a07621ccd29e20bea6a395ff21d785e0e8d40 glibc-langpack-gez-2.28-236.el8_9.13.aarch64.rpm 94c4956d2111fa2fa2db32e5a4c1e3d8abca68f7850a5ea3e50c49da375c92b9 glibc-langpack-gl-2.28-236.el8_9.13.aarch64.rpm 0855d652b2ae8473809b70083b969317907f1473e4d6307be7c5f7b3c447508d glibc-langpack-gu-2.28-236.el8_9.13.aarch64.rpm 3a290f839fd46307a7aff9bc1a8d68902a23821cd82098cbfddef7521ef68471 glibc-langpack-gv-2.28-236.el8_9.13.aarch64.rpm 52746cf5e445087b351d2af31dcfdb73c9e8715e7646322cec84e74c6c49fa7f glibc-langpack-ha-2.28-236.el8_9.13.aarch64.rpm 1de350a61a7436e1aa7709cdde1e4eea11265064b0d9ee09615b60f0c68e8157 glibc-langpack-hak-2.28-236.el8_9.13.aarch64.rpm fd25935c8fadb31ea5eaaa85d2267e124218c507928b8b11eaee414ef8bd852f glibc-langpack-he-2.28-236.el8_9.13.aarch64.rpm 794a2c97bcebac8705b0413ead6c3c741f558098a5700dd59e06833be37d9cbf glibc-langpack-hi-2.28-236.el8_9.13.aarch64.rpm d9a3a85a10147e7b60bd3e4e0d60c1e4d17c963c0f0445fbc989481cc152d93c glibc-langpack-hif-2.28-236.el8_9.13.aarch64.rpm 524c7e8bc16a05feb9c0922e4d536c91b02150af0584fe05ea399d14eeda1dbb glibc-langpack-hne-2.28-236.el8_9.13.aarch64.rpm b4962f31592fc9025decedbbb82f4457ebb2b988c745181d7333ff1343fa1449 glibc-langpack-hr-2.28-236.el8_9.13.aarch64.rpm cde4c1fa4dc69525334d88fbd49012512f991101789fa32d916059ed30e3537a glibc-langpack-hsb-2.28-236.el8_9.13.aarch64.rpm 58e295b5aa7a11062e11e5ca76fa90473b2cc39b5ba85fffb7c02a6620a0b003 glibc-langpack-ht-2.28-236.el8_9.13.aarch64.rpm 51e6170f8471869fcc20073cbc618dddc395bcefb0576fd64761a4271011ca8f glibc-langpack-hu-2.28-236.el8_9.13.aarch64.rpm 5b8788508d251f377aeee620715271e00ff47ca2419bb5a11db6c4323c714323 glibc-langpack-hy-2.28-236.el8_9.13.aarch64.rpm 19a189753c965dba8e5778517fba20205a5245510aa5a1e93d735814ded839ca glibc-langpack-ia-2.28-236.el8_9.13.aarch64.rpm 35be27fceb57951e545616aec1cf3f098c902a6d31ebd0927a6dd487adfabb6d glibc-langpack-id-2.28-236.el8_9.13.aarch64.rpm 15ce11b1327f9f092aadacc3cc06e312147996c41e7c7f29614e621786b8a57a glibc-langpack-ig-2.28-236.el8_9.13.aarch64.rpm edbf8217959300dd55e6e42a33161e785ec8c79590a90ac23425bd8081c6d123 glibc-langpack-ik-2.28-236.el8_9.13.aarch64.rpm 34fbcea99216a269185e91c048628315db2141117f2263588bdc0e00630aec2b glibc-langpack-is-2.28-236.el8_9.13.aarch64.rpm b47a54c4899923947470c4d6fa6adf780990123c24bed7cbc41461fd4421b5e6 glibc-langpack-it-2.28-236.el8_9.13.aarch64.rpm 60220652e16a7cc52a60b2038b9e88d06c717771db897f188d613c0366638e4e glibc-langpack-iu-2.28-236.el8_9.13.aarch64.rpm 5df494b830c4aa6c1bcd3e46138a547d5ded28aae9e1148da2fbec11c182a7cf glibc-langpack-ja-2.28-236.el8_9.13.aarch64.rpm 15d9f07f16496e46fd30759321ac46564a14d173947881fad1c9ee8c59284621 glibc-langpack-ka-2.28-236.el8_9.13.aarch64.rpm 7bd16346490bf4bc35930c738c3a7d68e2bd67099ca43709b9224a5368d890ac glibc-langpack-kab-2.28-236.el8_9.13.aarch64.rpm b24f81fc075c8cdf39a26e2c2d61cac589df573d1a9d28856bc3cd9d6474c52c glibc-langpack-kk-2.28-236.el8_9.13.aarch64.rpm badaad958b98aaaa6ab1e87bddbf46211b731328986547864dff465e072f1b1b glibc-langpack-kl-2.28-236.el8_9.13.aarch64.rpm 15bcb3411399b6b2b038bfc8bcf00914b4ffb22fabeaa76a8b48b35b60ea134e glibc-langpack-km-2.28-236.el8_9.13.aarch64.rpm e7fb9bc4914c0ca8c21ee1ba303f1b526421aff9f3af9af9b028ad99802f9b4a glibc-langpack-kn-2.28-236.el8_9.13.aarch64.rpm 412baa58023f76a25ca464571b72df12a005595d2f11c5de3c923bd198e9945a glibc-langpack-ko-2.28-236.el8_9.13.aarch64.rpm 9343bcdeb0d44628d6c4fd0d49bd224faa41ac9e9b6ef429ecdc32348e49fae6 glibc-langpack-kok-2.28-236.el8_9.13.aarch64.rpm a233d78c96cda1d17c34840bfe3ab6c98cf52f40750043e97e06a4558cb82df9 glibc-langpack-ks-2.28-236.el8_9.13.aarch64.rpm edcf5d562bf9fad182b596c619e3af6d421e79008f23fa2d94585f4cdc52f794 glibc-langpack-ku-2.28-236.el8_9.13.aarch64.rpm 6d43b729893ba8df146f146c4044ffa1f998972b10361ef3e0d5f86cd61b332c glibc-langpack-kw-2.28-236.el8_9.13.aarch64.rpm 90e386e540ac887e53f2b6ea4e161e6e50a1ee86162a2f11b3166123e0f1ea96 glibc-langpack-ky-2.28-236.el8_9.13.aarch64.rpm 5bae5486323cdf320b743a915e5dbfc9830f7511fb1e52034edae98d822d3b80 glibc-langpack-lb-2.28-236.el8_9.13.aarch64.rpm adbc6ce49c5f5e124b04d3a6c1b83be9dd61a5f114cca44bd54395d9c5042365 glibc-langpack-lg-2.28-236.el8_9.13.aarch64.rpm e6d3cc0a490205993549efef9b8b4cf02e88c04914a6e4c77bbf4cbad8e85ff1 glibc-langpack-li-2.28-236.el8_9.13.aarch64.rpm 06798fd44903d6a1f4036e0d9c2ea85bc162bdb0f3da856e5d5a5d54d7ea4f62 glibc-langpack-lij-2.28-236.el8_9.13.aarch64.rpm 2002eca12ec8570aaf93d5be29dc100dbbbe3a0627f870940a5486aad096563b glibc-langpack-ln-2.28-236.el8_9.13.aarch64.rpm 2481cb066c08031a41033f2afea7e702cce50087acf23c8553777b845da9e379 glibc-langpack-lo-2.28-236.el8_9.13.aarch64.rpm 74f369d394700f740f69d557a26daa1edb58863a29fc2dcbf83825af5bcd2e7d glibc-langpack-lt-2.28-236.el8_9.13.aarch64.rpm af4059e88b10cb3ed7d2fd51a3ef63ac3c9ae1e2bd577bc39b3bf9b4217eeabf glibc-langpack-lv-2.28-236.el8_9.13.aarch64.rpm adc776439685acac43c0ff581872320a7152156c78163a15f6ecfde2a63ead17 glibc-langpack-lzh-2.28-236.el8_9.13.aarch64.rpm a3bf2b129ac08fe85e160918265c0b198dd97ed95f03a0922ce52a023d9c5d90 glibc-langpack-mag-2.28-236.el8_9.13.aarch64.rpm 0d61b1121ce0ed6a28c67bee1825334a6bff8fd9eb121f21fb681378f46561bd glibc-langpack-mai-2.28-236.el8_9.13.aarch64.rpm b53844c5d346e20430152d10d4ef186a0d0963b6b24cc1711f0f43ceda250897 glibc-langpack-mfe-2.28-236.el8_9.13.aarch64.rpm 8bd4db08ed8c902adb1e514d611312677000bb9447d4e5190baed271e29fce5b glibc-langpack-mg-2.28-236.el8_9.13.aarch64.rpm 0017fef006920eb82c07ac41b6144e9837c327a2689551adda388d1cf15e84f8 glibc-langpack-mhr-2.28-236.el8_9.13.aarch64.rpm bbe076cf62ae1e04f229b154f20f5a60e6580f838c22e64bd339debdaf1625b7 glibc-langpack-mi-2.28-236.el8_9.13.aarch64.rpm ab806c51a563ccd26e2dac24294be00f5fb3ae16da64c8c7c45a23d5bc840d08 glibc-langpack-miq-2.28-236.el8_9.13.aarch64.rpm 8652f9c89cd38e654dac4d216b1ed5862097c5eb14ab30f90e7cea6113b5f3c4 glibc-langpack-mjw-2.28-236.el8_9.13.aarch64.rpm 6c3661527fc1149cd33ca697d04380e46d905733a1dd0776b030dc7c9cd2e0bd glibc-langpack-mk-2.28-236.el8_9.13.aarch64.rpm cb07d1e87b8a7b7f36be71ef2bd2dad4152c640c7b7db2e93f49176f4b0290d0 glibc-langpack-ml-2.28-236.el8_9.13.aarch64.rpm d9f58610e8de9f12e9002f8d02d5f4a6629fe77300598144ad25bd69b9969e3e glibc-langpack-mn-2.28-236.el8_9.13.aarch64.rpm 2ad4c81fb15e982315f5dcdac74e3f90b92ea1c6de40ab9c65ec45299c031f1b glibc-langpack-mni-2.28-236.el8_9.13.aarch64.rpm 65fb04eec592ac46912b9fd095e6b282f1816efa47a547951280604c2e035121 glibc-langpack-mr-2.28-236.el8_9.13.aarch64.rpm ba702ab56566596421af04eb3ea2ab24b70d45a573d7212938893bd788d427bd glibc-langpack-ms-2.28-236.el8_9.13.aarch64.rpm 89102e618c9366d210389feb4b9be2cccb195b5facf30b9bd0c9003ed76048fe glibc-langpack-mt-2.28-236.el8_9.13.aarch64.rpm b0ad61be98abe12e86a310bdab04bac1857c18167e551ea9bb9ae8ebfdc4254f glibc-langpack-my-2.28-236.el8_9.13.aarch64.rpm ab3a6c9b153eaef7f389d8c84a120bbfb3f3eed1d3670ea15ada42d329d4fb32 glibc-langpack-nan-2.28-236.el8_9.13.aarch64.rpm e5ba1c60003e9148b2b0bca70b09b59890c0e8b53c985998f2665fa81d507d96 glibc-langpack-nb-2.28-236.el8_9.13.aarch64.rpm cf49a4d61217f01f098090a6be29da7e86a8051fbca0dce7e4f82ed87e2988fc glibc-langpack-nds-2.28-236.el8_9.13.aarch64.rpm b131c6962bdce826c3071e6bdec29904919acca4894c4fa80b96183e54e37632 glibc-langpack-ne-2.28-236.el8_9.13.aarch64.rpm c72479167f177f32cc713375b511750c063a8d74f635471204fd28599014c267 glibc-langpack-nhn-2.28-236.el8_9.13.aarch64.rpm 03a9114dab9ff06e24ca8d9796bc7b1c8d0a539e4e224cff839bf83e6aee180c glibc-langpack-niu-2.28-236.el8_9.13.aarch64.rpm 076c47a9c52e9cbac514338c221fcfd8b04c761f1b06d2f3275af689f41b5d2b glibc-langpack-nl-2.28-236.el8_9.13.aarch64.rpm 7c0c87fd2c1bed0d79d55e0f91808674e2c071700172da92a072befda23db384 glibc-langpack-nn-2.28-236.el8_9.13.aarch64.rpm 220efc20f761a26e8c78bed58ee03f9efe35b28f4e19addfdae6bbd68fa228f1 glibc-langpack-nr-2.28-236.el8_9.13.aarch64.rpm 4f050a3949ba2418fbad6df59edd8598ab6be4cbf90c184646109c134ccf0a09 glibc-langpack-nso-2.28-236.el8_9.13.aarch64.rpm c2723860ab034b977f8f395d786b0b669fe3bb509bbf8cca94ad2c8d740e9a1b glibc-langpack-oc-2.28-236.el8_9.13.aarch64.rpm 53351401997f9e8b5b13c2c5c8dac4e02cd2b8a32db3bcd5375cadf28bd25ae5 glibc-langpack-om-2.28-236.el8_9.13.aarch64.rpm c052127aef2c1d90afde2c9d66727114baa1241b893585125c76547820704dbf glibc-langpack-or-2.28-236.el8_9.13.aarch64.rpm 65000acbb58e29ffa6591a01455849dc6a1e7a6acfcdcb6f1737dcaf7640f3ef glibc-langpack-os-2.28-236.el8_9.13.aarch64.rpm 2b344f89cdf420b1c8bba5b99694a1d20f13498d55acd86783d968f3c8218069 glibc-langpack-pa-2.28-236.el8_9.13.aarch64.rpm 18dcd79bdad6cf99eac0b8ba93d19fe94f5f3acb724183e3495ccc6c33aa75bd glibc-langpack-pap-2.28-236.el8_9.13.aarch64.rpm 87bd4fcaf250befd3c4a18ca560fbd8b30176ecee81ac1f217264d43d011308c glibc-langpack-pl-2.28-236.el8_9.13.aarch64.rpm fa7865686a4e1f7f33b584fff222a990390ead44ff39c5412b3dd111e39a33c0 glibc-langpack-ps-2.28-236.el8_9.13.aarch64.rpm 74136b84aa378f7528121d6ba42c0a1c89de86995bac367312043d1c9a4260b5 glibc-langpack-pt-2.28-236.el8_9.13.aarch64.rpm 06205d8060b0c5f2dc8403f35df2dbca51ddc912f40af2f3fb2093943e50a80f glibc-langpack-quz-2.28-236.el8_9.13.aarch64.rpm 2adee2f27bec3e062c8e4d9be73f947fcfadb40bd4da33ebe6f06c3b5fab6342 glibc-langpack-raj-2.28-236.el8_9.13.aarch64.rpm 1f0c675dcf45e36e39d3626762b4df813407315dcbf1cfda97c54e69fc06b3a8 glibc-langpack-ro-2.28-236.el8_9.13.aarch64.rpm aac30e519b66e60076a56841ac054ee02e74283d39b67c98f66024ec7853304d glibc-langpack-ru-2.28-236.el8_9.13.aarch64.rpm 8924ec6944f1c9e1fc0123082864d4951eaabd5d3259f9393073f02a47496e1d glibc-langpack-rw-2.28-236.el8_9.13.aarch64.rpm b37c6d8c4cc1e8b5fd1b2216fc2ebc7612c37b0843b6e7d8cedd3331b5830a60 glibc-langpack-sa-2.28-236.el8_9.13.aarch64.rpm b87cbcd339a1e8c5686ae6835d03a12b93e2e55be4147d224d55379cf021e992 glibc-langpack-sah-2.28-236.el8_9.13.aarch64.rpm 961f5763d82af2c69c56d47d3bc83c6cd8edfce77cf1c3967b0ad8291dd404c7 glibc-langpack-sat-2.28-236.el8_9.13.aarch64.rpm cc9b0750beb601af5c3be45e649b211454ed718cf45b08c83b190c2273d61f4a glibc-langpack-sc-2.28-236.el8_9.13.aarch64.rpm a11b3641acba5dc75cc35e2e455a789d6e0e300f8d133ef3c0989e5993a81bb9 glibc-langpack-sd-2.28-236.el8_9.13.aarch64.rpm 592e2adf29e1d805a6cd4881cf10608775f93502f292e433e021d10e0f4f95bb glibc-langpack-se-2.28-236.el8_9.13.aarch64.rpm fe07cc7ccbb6fa631986df4eb115bff6244f7bc368f27167917df0ce691eaa2e glibc-langpack-sgs-2.28-236.el8_9.13.aarch64.rpm e7e80202ff79b39f01d112e1cbeb55f984ecfcd571f98fbd1508ea1fbe7258a1 glibc-langpack-shn-2.28-236.el8_9.13.aarch64.rpm 90b06bf78c991a307385ff4a89162ded13e44eeef6fa2e61008983df6bb1e84e glibc-langpack-shs-2.28-236.el8_9.13.aarch64.rpm 97f0345f85be487c1c071e9630dfe36472b1b3db499159f472967bf9bed940f9 glibc-langpack-si-2.28-236.el8_9.13.aarch64.rpm cb0bc6185f39346157e55d9f1821d1a23348facdc96b79374c6df7d511edf903 glibc-langpack-sid-2.28-236.el8_9.13.aarch64.rpm e27282a938fe436a36909dc983ea19c5d0e020a93b7ac30ed98a6ee90f2bcd22 glibc-langpack-sk-2.28-236.el8_9.13.aarch64.rpm 78f09cc35f4c654276c175e4d1589673ce7f619b0e88c1bc29894b099f7c5c35 glibc-langpack-sl-2.28-236.el8_9.13.aarch64.rpm d8aee0a015e88e7d21cac65da6b7fce4f57e5f58c6ba5d1ede8f721d655939ec glibc-langpack-sm-2.28-236.el8_9.13.aarch64.rpm 6e3ab6622eea1c823ae1e2cb6878b70978eff6a72d6d73fc958f27fc65a65c46 glibc-langpack-so-2.28-236.el8_9.13.aarch64.rpm 29ed6ef1d86a099eb9f22bc7320eb9e962cf4756c1b4383b1d96967309b58b39 glibc-langpack-sq-2.28-236.el8_9.13.aarch64.rpm 025d4a7d1597a1f7478e394f1c8f37955617fe316909ee5570982b04ad574382 glibc-langpack-sr-2.28-236.el8_9.13.aarch64.rpm 0c7ed48fcffb502a10cefb3815eac4b769bed2f0e75a078e86fab8ad5644a5d1 glibc-langpack-ss-2.28-236.el8_9.13.aarch64.rpm 22b5717bdbd52d698f2d80aaef61708ea5a7045a65915345991f53c4c77d848e glibc-langpack-st-2.28-236.el8_9.13.aarch64.rpm 035b3431ab46c6e4aab12f80b6b4acdbcb5ee97a302f349d0e8fbaad7cf8517d glibc-langpack-sv-2.28-236.el8_9.13.aarch64.rpm 7bf32d40c271274fd4ebc2f07e57d04d57b4b968cd81b59cf6bd9a026522d306 glibc-langpack-sw-2.28-236.el8_9.13.aarch64.rpm 33c70e257928e4570120104ad06324b8f68eb70a93ec4c117c8c7902a652cf25 glibc-langpack-szl-2.28-236.el8_9.13.aarch64.rpm c802f356e5d9be1bb0c8fb45ada236c950dd6c0082654371846a9d7c2ded6972 glibc-langpack-ta-2.28-236.el8_9.13.aarch64.rpm 9bfbb8b5be148fb9775346cec26117f5e155964c2b2e6ef7830b3245f63a5157 glibc-langpack-tcy-2.28-236.el8_9.13.aarch64.rpm d8ffbce86376a4a2ed19bab5f96813ce28c30161860b525aac775ed6299581ba glibc-langpack-te-2.28-236.el8_9.13.aarch64.rpm 98f5b1c3562aca9fb3fcb8445b6089b1d4e54c07ee554fe586d03b001eca08df glibc-langpack-tg-2.28-236.el8_9.13.aarch64.rpm bd8f75b441b2ac23d2dbab3634af58199f91059497cdc116805ff491c76274ca glibc-langpack-th-2.28-236.el8_9.13.aarch64.rpm f560d2593636759ea0be57a6e1c9b29e043221e34fb00eb832c794b63af5a73b glibc-langpack-the-2.28-236.el8_9.13.aarch64.rpm ecb08f0717575d843ff3ed3aee87384ea8b87594466c1eb53d8d824e317ce75a glibc-langpack-ti-2.28-236.el8_9.13.aarch64.rpm ecefdaf9f04513696b543c33241e231ac44a1f91358b3046d89edbbc51011ad1 glibc-langpack-tig-2.28-236.el8_9.13.aarch64.rpm 2e56a73232de47f2e5270e0550498037d52c6d34d8d79eb43d8e5329aaf39e77 glibc-langpack-tk-2.28-236.el8_9.13.aarch64.rpm f6596b1213e726d489993df6a3a3e916c9fec951bd5b8825c00b9e3fc3b1306c glibc-langpack-tl-2.28-236.el8_9.13.aarch64.rpm f181e986837c77a5d8ad53116f95261ffe9153a5474c55530e972fa9ac85fec1 glibc-langpack-tn-2.28-236.el8_9.13.aarch64.rpm 4f14743c8dd8dc386d3759403d2060db9cbccae3e9d0124a722d1a96e8318a10 glibc-langpack-to-2.28-236.el8_9.13.aarch64.rpm 0c6c256e3db4aa5c4ab72b8af454e6073da441590595e02f9703f6cb1627240c glibc-langpack-tpi-2.28-236.el8_9.13.aarch64.rpm ea363b147b4fb7c31121695ebb1ade95f1ced84e6ee11e0b92ba6237b86b2a9a glibc-langpack-tr-2.28-236.el8_9.13.aarch64.rpm 22c43045235482b4b7441076ffd9cb8720b34e56e1e22d0bc8f9a1452fa87ca0 glibc-langpack-ts-2.28-236.el8_9.13.aarch64.rpm 67f7ce10a98abb567988e3a4e3362ea21aa967dab35fef4ad3e57946514b7054 glibc-langpack-tt-2.28-236.el8_9.13.aarch64.rpm 29ec022ce85e2b6b06b2b3c9caf8bef16ae1d8464800f4076b78a7378275a25a glibc-langpack-ug-2.28-236.el8_9.13.aarch64.rpm ebc3bc3bb3d7ac519a2d282423bfa89e685286b161cedfb150302f47958f723d glibc-langpack-uk-2.28-236.el8_9.13.aarch64.rpm 1e80d1c3cc601a159b0bdd59643bcbfcf9dab91d50e710398c58d5f4b920e999 glibc-langpack-unm-2.28-236.el8_9.13.aarch64.rpm 2b9584ab78adbd5a495b6f5b803c397d88b6783bb68bdcf6f90121ed6318520d glibc-langpack-ur-2.28-236.el8_9.13.aarch64.rpm bfc9cbe0180a87b70d9dedb965812463049690e5e2dc799ac479b398048e98cf glibc-langpack-uz-2.28-236.el8_9.13.aarch64.rpm 6355e4c0d6b52965103f0af77048c688fed86f2eb62b43d2bac4bcabbe058c61 glibc-langpack-ve-2.28-236.el8_9.13.aarch64.rpm 81a937e9a45d03194ffc179d0380eefd9c302d39b364d1699e5254f234fd6f15 glibc-langpack-vi-2.28-236.el8_9.13.aarch64.rpm f3d3765d51cd105f7c23a84f47962c9e8d8247fd72fc6f23dab316962e5e2728 glibc-langpack-wa-2.28-236.el8_9.13.aarch64.rpm cf110509b7fc2331b970656ce615de4d34f9dcd751b97fb7885f9614ee7f92b0 glibc-langpack-wae-2.28-236.el8_9.13.aarch64.rpm 6b1a5f1af27830c70cee7a1243c936f47bac4bace5626ce5ed56ea9a5ee76018 glibc-langpack-wal-2.28-236.el8_9.13.aarch64.rpm 8123f355f87dae06148f5ad18f7142af110e9165855c13055685bb7be9a5aef2 glibc-langpack-wo-2.28-236.el8_9.13.aarch64.rpm 75dd06b37cd647135d47f6f59cbd3eaff93f037b92e7950f5365690123ed69a4 glibc-langpack-xh-2.28-236.el8_9.13.aarch64.rpm 93656253f13378edbcea13521f75c9db954bd1a7eb0aefc7fa8e6fea55e23f42 glibc-langpack-yi-2.28-236.el8_9.13.aarch64.rpm b516c1c61b2a6e061d136a57da152006959ee40cc699533141f0542973ffd800 glibc-langpack-yo-2.28-236.el8_9.13.aarch64.rpm 5ffd36e75ea969d72cdf23cdc7e5e996a36bffe0416d198051d7b4472c2333e7 glibc-langpack-yue-2.28-236.el8_9.13.aarch64.rpm 9fe17ad868d4c5c2389ccd00eb87ad2f105588ef8caa7d61637d11e681c51612 glibc-langpack-yuw-2.28-236.el8_9.13.aarch64.rpm e4b3599e8fa62b6903d36358bfc437d0322570e76c6b1529b1e4f5989ed36f71 glibc-langpack-zh-2.28-236.el8_9.13.aarch64.rpm 707afd5d09cf64bf796c2d77f4f10339be53bc1b7cb0910231c30fe294bf46b2 glibc-langpack-zu-2.28-236.el8_9.13.aarch64.rpm 0393c34d8acb30b11e08117042078eb569c991e0cecb7895fb803838be302f31 glibc-locale-source-2.28-236.el8_9.13.aarch64.rpm 0fe808c5b4c6806d74ee55f731832b9c0593146b947dfd03eb08f42e518b22d9 glibc-minimal-langpack-2.28-236.el8_9.13.aarch64.rpm 52f8aec71905e6dc473587d300fa302e96a2a8d7d965817236f2ff4b8ce1f1d1 libnsl-2.28-236.el8_9.13.aarch64.rpm abf86fc9c0e80a5f363a03419a3e0d2c46e2217c9095109f9435915ffa60b718 nscd-2.28-236.el8_9.13.aarch64.rpm 812ab7dc070936c26d86c228d1f371b225fc0db5724066eb9fab1490eb8038e4 nss_db-2.28-236.el8_9.13.aarch64.rpm 28877c81825b054748cadc02736e38b1ebf204afb5009db1bd8ad557922b940f RLBA-2019:3778 hwdata bug fix update Bug Fix(es): * Pull PCI/USB IDs for 8.1.0.z (BZ#1767717) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * Pull PCI/USB IDs for 8.1.0.z (BZ#1767717) rocky-linux-8-aarch64-baseos-rpms hwdata-0.314-8.22.el8.noarch.rpm 08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69 RLBA-2024:1602 nftables bug fix update nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables. Bug Fix(es): * nftables counter (JIRA:Rocky Linux-2596) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables. Bug Fix(es): * nftables counter (JIRA:Rocky Linux-2596) rocky-linux-8-aarch64-baseos-rpms nftables-1.0.4-4.el8.aarch64.rpm 3574a05165eb5bd2888dc3d4419dab6394c9c3ea753d660d3869a8f906aeb842 python3-nftables-1.0.4-4.el8.aarch64.rpm 8cbb5c45e18c51505cac71a5a99de85453fc5422a159c9d0c06f514acaaa1784 RLBA-2024:1603 iptables bug fix update The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es): * ebtables core dumped when set unsupport table (JIRA:Rocky Linux-12350) * New defects found in iptables-1.8.5-8.el8 [rhel-8.9.0.z] (JIRA:Rocky Linux-16654) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es): * ebtables core dumped when set unsupport table (JIRA:Rocky Linux-12350) * New defects found in iptables-1.8.5-8.el8 [rhel-8.9.0.z] (JIRA:Rocky Linux-16654) rocky-linux-8-aarch64-baseos-rpms iptables-1.8.5-11.el8.aarch64.rpm 96f98e1a0567fb395ca408a3fe66bc004ed5ced22c8f44beddf6dff02bf61db5 iptables-arptables-1.8.5-11.el8.aarch64.rpm ac1991925b384fad6f62e82001336ac16ba6430cf19811cd0718478d67424970 iptables-devel-1.8.5-11.el8.aarch64.rpm d9680b82f415c8acb8cf44f05de3a88deef1371630128058f1f0cfb277943460 iptables-ebtables-1.8.5-11.el8.aarch64.rpm b23289b0728ba8d9622e3c92e4e93985fb383badd3b3bafc361ad2a54101685c iptables-libs-1.8.5-11.el8.aarch64.rpm 065c24eeb7dab26c0338accc84de0d4d56db8923c057379867abb70e99019b38 iptables-services-1.8.5-11.el8.aarch64.rpm 73ee231a62777f8f11171704446a6bd85b52ce7c8d1b841f0c473bfe7b79fe24 iptables-utils-1.8.5-11.el8.aarch64.rpm a9a30d3b2670e9bf313ba6f5349a97d694494da847c1260362195d5941a79ae6 RLBA-2024:3136 libsoup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libsoup-2.62.3-5.el8.aarch64.rpm e5a3e396756b0dc182659679c863ff1a026815488a74aa23a3140dc5ba32e905 RLBA-2024:3142 numactl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms numactl-2.0.16-4.el8.aarch64.rpm 1d33b24571e6e4172d14c42e63bb8f935d7618b5f43cb5437c356822fed50112 numactl-devel-2.0.16-4.el8.aarch64.rpm b0957e0e948655d88edf81bbc45eb632353279e51d4e59f32f84c2eb3e09df3a numactl-libs-2.0.16-4.el8.aarch64.rpm c235b01708cb0a3773b1dc5ad2b63646edf8ab8668498fdc666db4d6910f246f RLBA-2024:3140 kexec-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms kexec-tools-2.0.26-14.el8.aarch64.rpm 4d3836a93353a958ba396f938b37bdc7200f8bb7f9aab259e28194b8c1ad43ee RLBA-2024:3141 c-ares bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms c-ares-1.13.0-10.el8.aarch64.rpm eeacd4b6d88680615bf3f53f732c65fd3a7409502827c04e7eccb56ca7210a92 c-ares-devel-1.13.0-10.el8.aarch64.rpm f4bec6edcd0daa007d370c5812b27afa345e3260853299b664daff4f9155640f RLBA-2024:3137 libtracefs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtracefs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtracefs-1.3.1-3.el8.aarch64.rpm d30069df9a94499210e1d9753494b67bfffa956607722607fe3ed2a546d19630 RLSA-2024:3139 Moderate: squashfs-tools security update SquashFS is a highly compressed read-only file system for Linux. These packages contain the utilities for manipulating squashfs file systems. Security Fix(es): * squashfs-tools: unvalidated filepaths allow writing outside of destination (CVE-2021-40153) * squashfs-tools: possible Directory Traversal via symbolic link (CVE-2021-41072) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squashfs-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SquashFS is a highly compressed read-only file system for Linux. These packages contain the utilities for manipulating squashfs file systems. Security Fix(es): * squashfs-tools: unvalidated filepaths allow writing outside of destination (CVE-2021-40153) * squashfs-tools: possible Directory Traversal via symbolic link (CVE-2021-41072) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms squashfs-tools-4.3-21.el8.aarch64.rpm 4cbe79a2ad134f8f24132bdd74fba667fabb1bdae593397f482e1f48c3b28c5e RLSA-2024:3138 Moderate: kernel security, bug fix, and enhancement update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-553.el8_10.aarch64.rpm 08ce4dbf16e18571cef72f924e82c51248c575aa163e6ea44c28cf76f04ed119 kernel-4.18.0-553.el8_10.aarch64.rpm a628c7af1070f15d63ac83b37998d6c579d298c4d3e409780d1d7aed4aaccaa2 kernel-abi-stablelists-4.18.0-553.el8_10.noarch.rpm 4a654bf1f356dc3c1db0c813b00868d3d3f3dc5633e85ffe6507aec53c3652a8 kernel-core-4.18.0-553.el8_10.aarch64.rpm 22417b6a6fdd2ad3d35d755272f21b22cf2dbd53f394bde9b4952082e2926c0d kernel-cross-headers-4.18.0-553.el8_10.aarch64.rpm a65a7d21dac609667ae51a160f72d4638bb3b28580bfbc4a7b673284541bdd73 kernel-debug-4.18.0-553.el8_10.aarch64.rpm f9fc7b8863151c40b2e42fc97b167e399eb1033b5098179663c7397d4b73db0b kernel-debug-core-4.18.0-553.el8_10.aarch64.rpm 7fb3016d7457f940c334b3e513dea509cad8543c1d1a8bd9822ae79aadb6e054 kernel-debug-devel-4.18.0-553.el8_10.aarch64.rpm 7295b72bdd3b30052f0d080d8a00c027964001266bc13c3e4fba5df869dd1935 kernel-debuginfo-common-aarch64-4.18.0-553.el8_10.aarch64.rpm 2cba6673ee43fa5737b638236e355e054a5af42e78117ca55dcf196cb0351487 kernel-debug-modules-4.18.0-553.el8_10.aarch64.rpm 20e870e3e01a5cc277e09fd866dee83b8620f85c4fa76c6edcea15a1fed97f09 kernel-debug-modules-extra-4.18.0-553.el8_10.aarch64.rpm fb84f98a33b28034a2701de01f61e5d2d0c2fad1c192815c5f415f2e3a184c4e kernel-devel-4.18.0-553.el8_10.aarch64.rpm d929d72d38d3804e2557f7b087c5bf29a2232b479016ce01c2c1b77c35f5f11f kernel-doc-4.18.0-553.el8_10.noarch.rpm 2b50aa89af6bc25639ebd05ec71ac66e0bc9f5b550f8173e4dbdf278084d8292 kernel-headers-4.18.0-553.el8_10.aarch64.rpm 25b02aaf4fd4095b23f6344d1766abafc462b4f261dd2f8d4adb3576d6ff011e kernel-modules-4.18.0-553.el8_10.aarch64.rpm 0ab80acaa76c894b9d21de7f42116086e05a8e80bf2e13259d2356be92404a6a kernel-modules-extra-4.18.0-553.el8_10.aarch64.rpm 26d0a921a90e14eec8f9486eb4d2db7418685d633db9079239a7d0d2210c198c kernel-tools-4.18.0-553.el8_10.aarch64.rpm e1777ffddf26b46082fcafcc9714b5d3c59a93fca9674f5dbfd6e4f44cdaf950 kernel-tools-libs-4.18.0-553.el8_10.aarch64.rpm 042d8190808daf1a97e517d12e67c2fd6cf1df5367279a9a0fd690a716623f38 perf-4.18.0-553.el8_10.aarch64.rpm c855a2f0cb7b97d4799396bab96bd44eabc03af881ccb08f778b302da401ca95 python3-perf-4.18.0-553.el8_10.aarch64.rpm 02593361543abe1a63ced89983cad12cac9ca26a777c6b2289faf804d6de4936 RLBA-2024:3152 glibc bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms glibc-2.28-251.el8_10.2.aarch64.rpm 6a413ed2317b51ff6622ca7ddee28134c71f444f36652a532f3e59ee881c136c glibc-all-langpacks-2.28-251.el8_10.2.aarch64.rpm e9d0f115b2399050db194270ededa117a363a92696cefe033dfe2507fda20d95 glibc-common-2.28-251.el8_10.2.aarch64.rpm 5b3f49e5075a456fef06cceea69e0fba3f0f29e6515e96d570dd5fed5bf50fe7 glibc-devel-2.28-251.el8_10.2.aarch64.rpm 976059c5e325c19b1be410a1838ad7f063dc12dab1a8b9ecf08cd0f2970791c4 glibc-doc-2.28-251.el8_10.2.noarch.rpm 8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53 glibc-gconv-extra-2.28-251.el8_10.2.aarch64.rpm e6aa94ae49e7ed1f2d7b1d7dd4538dc5271bbc9126888c63acdb00415fc0ad85 glibc-headers-2.28-251.el8_10.2.aarch64.rpm ea7c046ba7541c00b12185278c0c2b46735abf4ca5352a8f7480661d8843af5d glibc-langpack-aa-2.28-251.el8_10.2.aarch64.rpm 1706c598222eb1233aa3ae9afa86835cdc274593ab4b6b521d658d27e11134fa glibc-langpack-af-2.28-251.el8_10.2.aarch64.rpm 37ef5e44687cc3815672c42f0448eb9f49182274cada11846187550a3a2a840c glibc-langpack-agr-2.28-251.el8_10.2.aarch64.rpm c5bb033e2708260223ff14d6091213fa67f724699dbdd40083a132e7779e6bf7 glibc-langpack-ak-2.28-251.el8_10.2.aarch64.rpm c39e69d3b8b1bf77030518280f68f8b6f3448102b67e187de56c7bfe9fd41ff8 glibc-langpack-am-2.28-251.el8_10.2.aarch64.rpm f5d0ddf3409cdd6af2be2fe307c97e252c0fd147a73f157d241228b0ea21c03a glibc-langpack-an-2.28-251.el8_10.2.aarch64.rpm 75ed9e8a4a69497ce12ad4541c3122afc5dadfb3c2080f611a400305660cf07a glibc-langpack-anp-2.28-251.el8_10.2.aarch64.rpm 9375cee507681d707baaf384f3c21fcd8908a0aea5f134a05fb157fce325f656 glibc-langpack-ar-2.28-251.el8_10.2.aarch64.rpm 791124ef9912e208c60db56ea7279548de186ab86db78a2d05cc74ed7447b796 glibc-langpack-as-2.28-251.el8_10.2.aarch64.rpm 9a9a0255e80a90c7445ad36b71d5839fb757d537600f1f77720094172ba62402 glibc-langpack-ast-2.28-251.el8_10.2.aarch64.rpm 4d43efda3edf04a083f1c99189e319b3ac933af1dc289cc4927fedcf94b7e28f glibc-langpack-ayc-2.28-251.el8_10.2.aarch64.rpm 55df4c943f48e3573ff2d59b1fe430e4f4455335a8f8aef6237cbef5936bd3d7 glibc-langpack-az-2.28-251.el8_10.2.aarch64.rpm 15a16bc53f07498a0e2f3b322e0a055fcf641305bda4bba739b5b698b41a4ea0 glibc-langpack-be-2.28-251.el8_10.2.aarch64.rpm 83e9ecc50f85b7bfb6717c1332021d05614b0b2b2681c0bc4ab218406fd80354 glibc-langpack-bem-2.28-251.el8_10.2.aarch64.rpm ae246650a22434682f17c5d8ecddb882189300be6ef6bae080e8039a6fba03f5 glibc-langpack-ber-2.28-251.el8_10.2.aarch64.rpm a04d4382ccab07b14746580212c2a7c4df4310cc5058744e1c0ced9949136642 glibc-langpack-bg-2.28-251.el8_10.2.aarch64.rpm aa2aa33ac33edbd225815d2cd161b4a963b70e7fc803a8ea43bfcf52cb907c84 glibc-langpack-bhb-2.28-251.el8_10.2.aarch64.rpm ab6fd47bb75be4854b6a28aed54cc915c408e12d4f2def62c22db7f27221cefa glibc-langpack-bho-2.28-251.el8_10.2.aarch64.rpm 4a36f5fbde4d53f776e23500354bf8ad645b2acc1c9ed4c97d244f80b905053c glibc-langpack-bi-2.28-251.el8_10.2.aarch64.rpm dbb28681440fa67b56594ad254f794c5f69fbf466a4e54aca22e636caa120d39 glibc-langpack-bn-2.28-251.el8_10.2.aarch64.rpm d1a3f6b19da7fddbf79daad034fd962c6ff2a34e5989143182fdad809954fe9f glibc-langpack-bo-2.28-251.el8_10.2.aarch64.rpm 4a53c43bbaeeef24fcecf1680e9e7109dae9d7b00e12827549c8d868ff6ddb61 glibc-langpack-br-2.28-251.el8_10.2.aarch64.rpm 2752174aeaf65f6b290fd2925f424962a732a2f921a56fd36b0def39e9edada0 glibc-langpack-brx-2.28-251.el8_10.2.aarch64.rpm bd8c5d972dc4d7a0e758f7bdb31ff7c1aca9714c11c0826344a481c6d7b78a03 glibc-langpack-bs-2.28-251.el8_10.2.aarch64.rpm 4bffa792631572868af2da0561e552359fd5a2eadce32e8da64b277fa1c80330 glibc-langpack-byn-2.28-251.el8_10.2.aarch64.rpm fd19229a706ce256c5b621af56175d6fafc767f582653d811519f4ba6a92076d glibc-langpack-ca-2.28-251.el8_10.2.aarch64.rpm 09cf2ed3e3bb23f157676a4c97298443dc081896e1e99fd6e5e0718e957d0262 glibc-langpack-ce-2.28-251.el8_10.2.aarch64.rpm 7dfd060097b86ea6c53866e77fcf13aeb3086fead85f481d7b59d96a66675960 glibc-langpack-chr-2.28-251.el8_10.2.aarch64.rpm d5ae5bbf677bd4f4eea20db7bf5391987863134b9db20aee0ef2e512af86c79b glibc-langpack-cmn-2.28-251.el8_10.2.aarch64.rpm ccc3016a64edf024df8a2be6187bfdec1c8355f5b910075b0c18a1a301c70d12 glibc-langpack-crh-2.28-251.el8_10.2.aarch64.rpm d8785a4af7efc5e9d98f395cce20faa7430b116d320fcb831384f8b7c1641a36 glibc-langpack-cs-2.28-251.el8_10.2.aarch64.rpm 126c94816629b4a6347bf5a422001d84a2a158eb7f0908d1c83e6f8d6982e68d glibc-langpack-csb-2.28-251.el8_10.2.aarch64.rpm f73bd72c0bfb0f8b848584cf6fb2a739cf34bbf796c521c02bbbc3ab5e081af7 glibc-langpack-cv-2.28-251.el8_10.2.aarch64.rpm e1a4b008a8903068b6725180541cb559a47c98dc32d606d090852a8aa9e8a959 glibc-langpack-cy-2.28-251.el8_10.2.aarch64.rpm ed13595e4d32971b7efe160b1afb869d77cd0e3dfa25bc069afbb7df6a27ec8f glibc-langpack-da-2.28-251.el8_10.2.aarch64.rpm f9097d0013cd8119e6927080a17f3b237960c02418185fef6914aac021c2a3c7 glibc-langpack-de-2.28-251.el8_10.2.aarch64.rpm b6bc677564c01958a2599be17a5d119fdac1f5ef4858212de136046e3b1f2942 glibc-langpack-doi-2.28-251.el8_10.2.aarch64.rpm bc17357722278512adbac90440f1a35914f744d7aa533513bc32274f88f13c9f glibc-langpack-dsb-2.28-251.el8_10.2.aarch64.rpm 4a18cfe5a2ae881a6198f1867f87529a350fcbafd70039646b4c062152f823ee glibc-langpack-dv-2.28-251.el8_10.2.aarch64.rpm 39ad36209c958c4e08635273f7f24e44fe8d25be8b8331fef8c35773177bdbe2 glibc-langpack-dz-2.28-251.el8_10.2.aarch64.rpm 62e40c8223b474ee84fc3b4880b1e5c487345e93b1bd6236f0c717361b0a3780 glibc-langpack-el-2.28-251.el8_10.2.aarch64.rpm e1931445b2fb1ceea667d9331f8f19c1ab54ca569df6c65ae39f6be252626a90 glibc-langpack-en-2.28-251.el8_10.2.aarch64.rpm 38336752a555dd443e48a69b38c905743ff2967f0118b54b508a76386b9f7e9b glibc-langpack-eo-2.28-251.el8_10.2.aarch64.rpm 1a70e7add4b88aea5e03a24e56ebcb1e29cc72dbb705d2605817ac9f32596b8d glibc-langpack-es-2.28-251.el8_10.2.aarch64.rpm 8cc8a7ca9441adf6992d282157f9bda2c23e0958f892a6f8a5ceb16989b90913 glibc-langpack-et-2.28-251.el8_10.2.aarch64.rpm 18f0a25fe4fa86330ca20e1e7a10b3321be563f967600928f2342374b2a02498 glibc-langpack-eu-2.28-251.el8_10.2.aarch64.rpm aab236840afb39ffeb616129fe9d483a3875e29ff47933e534440b44822632f7 glibc-langpack-fa-2.28-251.el8_10.2.aarch64.rpm 3f33603eb11c6d4fd139766347a1e39b5cfc309d3c54335c059f4478044cf639 glibc-langpack-ff-2.28-251.el8_10.2.aarch64.rpm 0233f3bf3713a6456e5c67ea2e3eedb52b3df0119b10d3710510d4aa39dba857 glibc-langpack-fi-2.28-251.el8_10.2.aarch64.rpm ccf432959d31309a3e13d1357a739808f38c378f3c4635a3d70aeb3d6b8cb054 glibc-langpack-fil-2.28-251.el8_10.2.aarch64.rpm d5363e694b1dfe15eb29604c2e352313b48e8af5aec5fba5859c6c7123416550 glibc-langpack-fo-2.28-251.el8_10.2.aarch64.rpm e1636dfc3cd782c51866da2d815d5f46f30e6d7b5a42c8d4c68c84333cc5250c glibc-langpack-fr-2.28-251.el8_10.2.aarch64.rpm c00fc3030e0d4c716ca86a8e4a8bd4785a3d4fbed3fb2c40aed9056efe3702cb glibc-langpack-fur-2.28-251.el8_10.2.aarch64.rpm f33b144a30edae560c4ba111e8e52779975c8a3734ad965defd26b5e6b7d76df glibc-langpack-fy-2.28-251.el8_10.2.aarch64.rpm 39f444982ddf67400235980aef806e0379d5db9fe440c361f7eac827abd9f1ac glibc-langpack-ga-2.28-251.el8_10.2.aarch64.rpm 4d48f1841ce98a969c12512e0f90c0d49a954460dc5269f064d001c8040f0f08 glibc-langpack-gd-2.28-251.el8_10.2.aarch64.rpm be987b063b7353d307a3f9ca578fa854ae49fc14e1d6629ae2c4f064730c37b7 glibc-langpack-gez-2.28-251.el8_10.2.aarch64.rpm 64fafa61873d7c3d8be8eafde329efc72eba282e6c94b5cc2484a112120e60ef glibc-langpack-gl-2.28-251.el8_10.2.aarch64.rpm 9aa8635f18a1bb13af82b384615e006062a0bc6cf4c9ef21cb6eadd25b3c7b1a glibc-langpack-gu-2.28-251.el8_10.2.aarch64.rpm c9d908d5ee821cc416bd2101b28be2bfe553bb3c0b1ff7f4c4e569369e14a331 glibc-langpack-gv-2.28-251.el8_10.2.aarch64.rpm 9aa0e2b9a475b81ac33888b6c9c10fac2600f88cd058a615c31a7e2a547938ff glibc-langpack-ha-2.28-251.el8_10.2.aarch64.rpm 21fb10606d2429cf1b9e83e04261899a056d7cffc2c81f346c0c99c6f36d943b glibc-langpack-hak-2.28-251.el8_10.2.aarch64.rpm 96bfa56792b3d3d378b4ae3af83e7bad5ade6b367dee8ec7b0fe0d4df2843ab4 glibc-langpack-he-2.28-251.el8_10.2.aarch64.rpm 427398c940f6cc3482476e84b6cc569b1efa8a89542739a4673c98c56be547d5 glibc-langpack-hi-2.28-251.el8_10.2.aarch64.rpm 843c91354e62cefa06fef439189fa4c75503cabc4c3ad430b4293cefa1cbe424 glibc-langpack-hif-2.28-251.el8_10.2.aarch64.rpm e90d49c6f6c6499f01fa0c8df796796c1935dba0ecf97cc8ea3f05aede9b2649 glibc-langpack-hne-2.28-251.el8_10.2.aarch64.rpm 71e474d690a23a408c4f846de2d56c651d3e16c0de82f3a8c5a43372d9eeb59f glibc-langpack-hr-2.28-251.el8_10.2.aarch64.rpm 2ddddfd532ee8dda4af952fe1636eb135390244acdaacce0b31b7d2aa41b7330 glibc-langpack-hsb-2.28-251.el8_10.2.aarch64.rpm 90d5e9d99ca2c6dcfbb1c2e791526f306607412c07ae455c19bdabe2de5f7072 glibc-langpack-ht-2.28-251.el8_10.2.aarch64.rpm 586092a2fb1f01ae5522306269fd0ed0163eace0ca88016acb334cd8c4baac6c glibc-langpack-hu-2.28-251.el8_10.2.aarch64.rpm 21b20071fa37e61b3c0e5e4b355d0b7ff34eda5b96128df42c19909c31d8c56a glibc-langpack-hy-2.28-251.el8_10.2.aarch64.rpm 10a3638c23723d6b86a6de84befdcfa3b393120fcd41e7307cdf4b6bb48e2887 glibc-langpack-ia-2.28-251.el8_10.2.aarch64.rpm 940107dc25482b2d497ef523530842c20bf7d6c2ec6257498bf3c609cc99c84f glibc-langpack-id-2.28-251.el8_10.2.aarch64.rpm 45438439722c4cfbb582ecd6d7863d221acb9f66cf59e3aee858a8726e689acb glibc-langpack-ig-2.28-251.el8_10.2.aarch64.rpm 6e413b917b32850055ed7fcdec05540fbcc923936df9a156d95504401067a710 glibc-langpack-ik-2.28-251.el8_10.2.aarch64.rpm 28702a736efd4808f7d09227a5c2290e640a5880a637c0fb1770374c1fedc54d glibc-langpack-is-2.28-251.el8_10.2.aarch64.rpm 69fb878cb66fbf9274fb02b5bdb537ec6d0814aacaf067d5492049769f8a2e60 glibc-langpack-it-2.28-251.el8_10.2.aarch64.rpm cfa2700e6434db8dce1d6109a2d29d7d7f2d018abd393d628641c31a3a1a1583 glibc-langpack-iu-2.28-251.el8_10.2.aarch64.rpm e66c695b54d0d1b881807c0be95926767c625948dd88c1d5d752be75c8445f1d glibc-langpack-ja-2.28-251.el8_10.2.aarch64.rpm c4d5be4cf3c04386f4c9474152497202e3ec8280db03dc4be233bbfa2f922e32 glibc-langpack-ka-2.28-251.el8_10.2.aarch64.rpm a5104e625f36de73d621beb2de9d5e58d2d2a194568aedb27f8d906c109edb39 glibc-langpack-kab-2.28-251.el8_10.2.aarch64.rpm a7511df59fc93e0b95717bc62cd87003c6f36a6a6f2f4502cfe3c670ffce944d glibc-langpack-kk-2.28-251.el8_10.2.aarch64.rpm f2a507fb11570bfe7b019c12334a9f6e23bb69429625ac04814243f8868bb06f glibc-langpack-kl-2.28-251.el8_10.2.aarch64.rpm ec93226374fbe005f6fd0bb338f003b1ad87a7fa9d1c0140bf48eb6ebabecb2e glibc-langpack-km-2.28-251.el8_10.2.aarch64.rpm 9aeb3a50e36cad7aa186c345ac16905bbe8cf05827c3370f78d199dc8af59239 glibc-langpack-kn-2.28-251.el8_10.2.aarch64.rpm 29ea6d9925d4dd554619ba750c93d145562b9ecbfbc22783b03e769aa572771e glibc-langpack-ko-2.28-251.el8_10.2.aarch64.rpm 52bf5b1029f585380c570175d32590ee948bc804f647aa90be9fd4482a69a698 glibc-langpack-kok-2.28-251.el8_10.2.aarch64.rpm ceced36abc68996173b28302cc07cdc790fc34dfafa1c1ccd5925cdb71e40fd0 glibc-langpack-ks-2.28-251.el8_10.2.aarch64.rpm 95e1798bd4756626358547874c7f92b1df92963b8ee982d2bc11939b043cee45 glibc-langpack-ku-2.28-251.el8_10.2.aarch64.rpm 611a1f5951ca7c750e4a6a1a1383df78bf10c7eba0adcfa65fb4a44225988347 glibc-langpack-kw-2.28-251.el8_10.2.aarch64.rpm 56b6f53de0cc13b9f4aae2f73c0090df0d48f4b95683a4e943feccfd606af578 glibc-langpack-ky-2.28-251.el8_10.2.aarch64.rpm 8976ef39e2f8d7a944a12b9ea5d9e3c9dc89e9ec0764b3a83dbaa83eeb492e57 glibc-langpack-lb-2.28-251.el8_10.2.aarch64.rpm 2b4b291b517d3e5b7fd1c9f0f459066998dfae704796b974e2bda5149488231f glibc-langpack-lg-2.28-251.el8_10.2.aarch64.rpm 74fd503dfd2c58ae6896a8c34ccd7486eff32c3d92ee0ec0912c55cf6ffdd2d3 glibc-langpack-li-2.28-251.el8_10.2.aarch64.rpm 87f7d6ba6f80e8888af590a21fff476026c858505bb994afaf3aadc7d680f0fd glibc-langpack-lij-2.28-251.el8_10.2.aarch64.rpm 58c05b93fedc8351986a9761505c68089de27d2c808b4d49950857001f282bb7 glibc-langpack-ln-2.28-251.el8_10.2.aarch64.rpm 34d42baa6a4f80c51aac5187a862235a65661b50c9291224685d33a840fc63fd glibc-langpack-lo-2.28-251.el8_10.2.aarch64.rpm 5ae0b617df31a779f21e2c3e95bf12b643e718ef0c391cc17ec6f80aae70b302 glibc-langpack-lt-2.28-251.el8_10.2.aarch64.rpm 6ceeee51e41432ca0153fb4f6255fd6fd3b7aad6fed725c48e418715d0dc1b01 glibc-langpack-lv-2.28-251.el8_10.2.aarch64.rpm 0f7f4aaf24cf9b56cd9410a5efc12c1238f168daeff0cb705ba089dcd261a1d4 glibc-langpack-lzh-2.28-251.el8_10.2.aarch64.rpm 793d2f9b1f0693be417e6084f98a8bdcbd0db63339bb8845c0d8b9df61dca77a glibc-langpack-mag-2.28-251.el8_10.2.aarch64.rpm aab7ea570d120b295404486789be663b193986e80bf051deb1f83036a2c4626a glibc-langpack-mai-2.28-251.el8_10.2.aarch64.rpm d3e6a1fabbb321033ba64a40ef50c7cc4dba330cfd2adb561be5495901c53d9f glibc-langpack-mfe-2.28-251.el8_10.2.aarch64.rpm 7673c0d70341b12db34ff23faafa09eaf96d82077e33683725940bdff0b74fee glibc-langpack-mg-2.28-251.el8_10.2.aarch64.rpm d799a75fe732d61f52b002faac526be557e77c9e2410ccf7ac6cbecd3837c269 glibc-langpack-mhr-2.28-251.el8_10.2.aarch64.rpm 9705329ec1b2ef0c404fe4a72087a03cb8e4938ae5d5bdeddea08942286dadf7 glibc-langpack-mi-2.28-251.el8_10.2.aarch64.rpm 0d45f666ede8263f3bd0c3d7d45f26e33d69b41151dbf473a9da6f388fdb6952 glibc-langpack-miq-2.28-251.el8_10.2.aarch64.rpm e8ae170215a7fb9bbdc8131aec96bb9a97d9e100109e1d99bff0ec392f9fb466 glibc-langpack-mjw-2.28-251.el8_10.2.aarch64.rpm 7f8c88cde74f3b8ff944b3aa9b773e692ad5115326c7d2834dfb404ff81c649f glibc-langpack-mk-2.28-251.el8_10.2.aarch64.rpm 5de9a6e1cf4957e62042643d0b815ab513458adce99ed58d7a1a65d7993a76cb glibc-langpack-ml-2.28-251.el8_10.2.aarch64.rpm 5b32b28752928f06920b5b233ff762ec2b75a05c7aefb487aadab793579ac16f glibc-langpack-mn-2.28-251.el8_10.2.aarch64.rpm b1da3f3cb4c8ef61cf2fd4a70d8f3923244b94ac86548460878c86dd758ade90 glibc-langpack-mni-2.28-251.el8_10.2.aarch64.rpm 06decac67589b29b90a964846f7f8c00d0e073ef258eeb239fe2a1878629040c glibc-langpack-mr-2.28-251.el8_10.2.aarch64.rpm 8959e8566eb0132793cbb57b0c182dc192652630d172ccabcf2a4b86edd795d9 glibc-langpack-ms-2.28-251.el8_10.2.aarch64.rpm 7586b78961e4c1b2f29a91353f46a639c8fce3d47252dec281b227312e5049ea glibc-langpack-mt-2.28-251.el8_10.2.aarch64.rpm f31d4d3d5278defad45fc6cb262ce21cbae57df602a4ad95b6cbb8a71cdf9f4b glibc-langpack-my-2.28-251.el8_10.2.aarch64.rpm df05d53dda1efd8797f070411becd587fd936a163f6bde94fbcb336c446e4920 glibc-langpack-nan-2.28-251.el8_10.2.aarch64.rpm e93458e63a427e2cb8e5d91ceb68761622cce95dbf97b6a07275e6ead2ee6806 glibc-langpack-nb-2.28-251.el8_10.2.aarch64.rpm 8328be4603ccb7bc65290c6e1bbc923915463f1f2e8a78c6c98179335bf4673c glibc-langpack-nds-2.28-251.el8_10.2.aarch64.rpm b492154b73a561639bcfe8bb336ac85e7d727bcaaa0f5dc678af641c0abaee06 glibc-langpack-ne-2.28-251.el8_10.2.aarch64.rpm db8b67f409166cdc07c82164fe1adf353f21c28f77c1172eb67282607f8919a2 glibc-langpack-nhn-2.28-251.el8_10.2.aarch64.rpm d0efc9857c917298ddca9af4fac2fb016f60f6107d448abe69d92e9c19419cd6 glibc-langpack-niu-2.28-251.el8_10.2.aarch64.rpm 0c17c6314ad3e641b4e9fe4816a36e1b0a933600b7e5a07ede97f4a87e83642c glibc-langpack-nl-2.28-251.el8_10.2.aarch64.rpm 0d298cfab8c435796470b9e063dae3b2a77d7e98126a7a08544437359ab1d57c glibc-langpack-nn-2.28-251.el8_10.2.aarch64.rpm 89202f7c01d6553724b9b581071fda5e7f38e67a6fea6e4aec1bef3045054ab2 glibc-langpack-nr-2.28-251.el8_10.2.aarch64.rpm 7f15e4b7a369c998b837e782c14ae79ef6f341ef7aece7ddda8f75b57e07b2e6 glibc-langpack-nso-2.28-251.el8_10.2.aarch64.rpm 80f8e57bb9c155669762706af1e1b332e7c77b965da57f2f79931cad6c970845 glibc-langpack-oc-2.28-251.el8_10.2.aarch64.rpm 50cd2e1345c0072052d7f14053256fa9b87161fa8ffaea5aa0f41d59349e3af7 glibc-langpack-om-2.28-251.el8_10.2.aarch64.rpm 4139da0377d453f28b00bfb27835e6524915df48cd609050fa5f83c998513042 glibc-langpack-or-2.28-251.el8_10.2.aarch64.rpm 7c11dbadd1b8e9cf4934217665ecacb130addb57c901c9d9a7bb0ab57533f728 glibc-langpack-os-2.28-251.el8_10.2.aarch64.rpm 03837b9e1beec2bbfb88ef2613a5d58135063de9090154dd300ab39a558c58ee glibc-langpack-pa-2.28-251.el8_10.2.aarch64.rpm 744efc3609951d56cb4beb10fc9cfdecabab0ddd971dcc2e04e16be0a2da2b09 glibc-langpack-pap-2.28-251.el8_10.2.aarch64.rpm bc220743bc79d519a70cc6368129195c99a48906a8f393abf22f39cc295331fd glibc-langpack-pl-2.28-251.el8_10.2.aarch64.rpm 56a06cc77d3e487dae9ab88cd9bcaf66c71aade66f23edc0ffba9c055619f736 glibc-langpack-ps-2.28-251.el8_10.2.aarch64.rpm c6e55032878d3121924949602b61ba58774b163c69f514ed2ee4c21ab634b5a0 glibc-langpack-pt-2.28-251.el8_10.2.aarch64.rpm d8351cb6661f0c258d1e7080db524277633337012323d3bf710a0bb108609e5d glibc-langpack-quz-2.28-251.el8_10.2.aarch64.rpm f9b8bb4f9c974aa338060c60768b24991a93e9d47639e5e19eee8b3373cb6d63 glibc-langpack-raj-2.28-251.el8_10.2.aarch64.rpm 403d5fee68acd1a98a5f564762bba604f7d0400b3a636d6023e6859ecc8f39a4 glibc-langpack-ro-2.28-251.el8_10.2.aarch64.rpm 59d5d7cf94dfa76809b12016bdc1dd0deeaab9141f667330219068af9e485f02 glibc-langpack-ru-2.28-251.el8_10.2.aarch64.rpm 49381e5eb754a5dc117a4898c8b89bce19d0b14c4a5f6fc0ac0be6c07ff28478 glibc-langpack-rw-2.28-251.el8_10.2.aarch64.rpm b5650f27ec25537723af8d94e54117edc230316d3bf22854a126a460b5c700fd glibc-langpack-sa-2.28-251.el8_10.2.aarch64.rpm 4424b0cb6515cbaaeb17683ff7ac377d6cc645832ee2296e269793e10ee43f0a glibc-langpack-sah-2.28-251.el8_10.2.aarch64.rpm 9892a30f78a02e96179226b54cb3d286453a7432fdec7192860a8533c6a0e2a5 glibc-langpack-sat-2.28-251.el8_10.2.aarch64.rpm 9f391db596c3e9ede93e57d7bad6399b38d3cc01296a6f3a66a33baf18923e9e glibc-langpack-sc-2.28-251.el8_10.2.aarch64.rpm 77ea066ca749b2e8a1decffb0bcd56428a8929060e2a8105bec4ef806a1d4f87 glibc-langpack-sd-2.28-251.el8_10.2.aarch64.rpm 47d6d63cb1341d5a5fc37752ca4c43f6a92d77e4f75fcf7a6bebc7d78e4152a0 glibc-langpack-se-2.28-251.el8_10.2.aarch64.rpm a2e041b54772ee75017863980452df0c1e7a5aff38aa33389311ea42b6a48c1f glibc-langpack-sgs-2.28-251.el8_10.2.aarch64.rpm ac4a709b6246adff2ab243c49e8700b4357106a85c5b7c5df8423fd4c107794b glibc-langpack-shn-2.28-251.el8_10.2.aarch64.rpm 74f7c9bcc24c5803840ed2d7035c349b3facc8510ef9dd3da432fa348861a4fa glibc-langpack-shs-2.28-251.el8_10.2.aarch64.rpm 359b71a9e449730df23733f703b8bb270fe7712ce256eb3657f44b842f96f417 glibc-langpack-si-2.28-251.el8_10.2.aarch64.rpm 09ab91f1bd4369d9ee9581e20878951c84433ca29fab90f8e7efdf37ab624209 glibc-langpack-sid-2.28-251.el8_10.2.aarch64.rpm 271648e16236b0f72b6a8f121ae259404368d971cbb6c9ad6162feee40bd301a glibc-langpack-sk-2.28-251.el8_10.2.aarch64.rpm 767ac22d4bf5b1feee0a685b39143ba7223c02ff17b876ba269f9bcde463b902 glibc-langpack-sl-2.28-251.el8_10.2.aarch64.rpm 72b66b33b9be393de4bff05671af84e75bcea1702c26bf527292231fa4a86a8d glibc-langpack-sm-2.28-251.el8_10.2.aarch64.rpm aba916d49424d567ae753cab9512ea7a2411d404557d1cae69822117f7e99973 glibc-langpack-so-2.28-251.el8_10.2.aarch64.rpm 2f83e3480f3ffc7d2d470a5791dd439e8d6ee98b2512efee20f249325d7d5d3b glibc-langpack-sq-2.28-251.el8_10.2.aarch64.rpm fdca1b9118e7f9d1bd61d38c869a00fd3e08f96c2a47a385e6b342fb01f92dee glibc-langpack-sr-2.28-251.el8_10.2.aarch64.rpm cf442e697fcc3c5ac8ee8b81303f74088a8cd38f5f5eb9550f166abc313e7327 glibc-langpack-ss-2.28-251.el8_10.2.aarch64.rpm a4578743534dc3b3255570a902bc069558c5ba78d1d6c8adc7558eecc238bb29 glibc-langpack-st-2.28-251.el8_10.2.aarch64.rpm 119f57eb768493082627d476ae1753c020f20a5581bf5082e4e44c6ac24f7856 glibc-langpack-sv-2.28-251.el8_10.2.aarch64.rpm 4deae2c1d94ee86eedf24b1f83ed70d2b76d0222804615bb75b79ee8b2fb652c glibc-langpack-sw-2.28-251.el8_10.2.aarch64.rpm 98f66c0ecad1639b7efbe52b4009bfcfa0bb5a3c8049a07b2fbe33431239edf9 glibc-langpack-szl-2.28-251.el8_10.2.aarch64.rpm 38e8c98ee77fe7a55ad85cda4358f6d8f2e0a5e2d899614da2cdb4d3e89a6a29 glibc-langpack-ta-2.28-251.el8_10.2.aarch64.rpm 4ec8a9a2a418077208a34bdd0c37cc36eae45af5d91cd403bc32f5cf91a3b477 glibc-langpack-tcy-2.28-251.el8_10.2.aarch64.rpm cbde8ac97f3b47e894847b1f75bb7b65d830bb31b343d3d0a63eee39787fbeaf glibc-langpack-te-2.28-251.el8_10.2.aarch64.rpm 91ef7c62875fe3a2e60f874432b996790567fdeb985c22e84bbbabb99ca14987 glibc-langpack-tg-2.28-251.el8_10.2.aarch64.rpm 6cfcb2ba842958e6af15440909f58278d9120ab9ddc0b93accb8b35671bff5cc glibc-langpack-th-2.28-251.el8_10.2.aarch64.rpm c1fa4edfc79dd8d5c43fc8bd7c0ee7fb1817e0966ca072ddde7bf5feb68c48a2 glibc-langpack-the-2.28-251.el8_10.2.aarch64.rpm fb4ffe73c59365a263c2f5e3824e58cd154bb14007d5ff9aff95a28ae3db5556 glibc-langpack-ti-2.28-251.el8_10.2.aarch64.rpm 10bc1a584d62c739128b56408e959d68a3cd804e456bfe4f98f4578b5e66dec6 glibc-langpack-tig-2.28-251.el8_10.2.aarch64.rpm 8a8ad788e86921f441d2a5447d74db7800aabfeda390f0eddab09fcd8856ac76 glibc-langpack-tk-2.28-251.el8_10.2.aarch64.rpm 7b3f6bb36d3aa06e6af47fb3b1ef77625b19fc2ad0ff19dab5678dd4ebb6d1f0 glibc-langpack-tl-2.28-251.el8_10.2.aarch64.rpm f3c2ec06c717543db7f62737a8cf4f99495314ce963d03d7184fd9ea71aabffa glibc-langpack-tn-2.28-251.el8_10.2.aarch64.rpm faf5e5baff9e695401e8ee2147ac92d0b53a7fb449682e7c06904ee62f3dfbe5 glibc-langpack-to-2.28-251.el8_10.2.aarch64.rpm be2e6f1c52d23ed239c8df1c391ad9de14c7a10e21f2e7fe2670e80105550fb5 glibc-langpack-tpi-2.28-251.el8_10.2.aarch64.rpm 8a8391a3c1dde841182d262cf00837f0284231150d75a08253577b818e1f79fa glibc-langpack-tr-2.28-251.el8_10.2.aarch64.rpm c4ed366308dda16844442368f49af8f5a4b334b53d886e74a9e68c0019dca308 glibc-langpack-ts-2.28-251.el8_10.2.aarch64.rpm dea6bc3a1a78790d3bc4f9329fb724389ea78e69f4fee1bee9fb3ed508225a75 glibc-langpack-tt-2.28-251.el8_10.2.aarch64.rpm 72f0812706b3acbadf0d35561c184827f5db87869918d14531027013a6ad6b0a glibc-langpack-ug-2.28-251.el8_10.2.aarch64.rpm 62f7b56dfe37957bbf342ebb618ab5bf3f3c3b55a6660a2f87d515ec404b45bf glibc-langpack-uk-2.28-251.el8_10.2.aarch64.rpm 1c53e25fb54dc4ab1ab67115f04dd673759855b854dbb0bafbfe03f8d0c25ce9 glibc-langpack-unm-2.28-251.el8_10.2.aarch64.rpm 972c0bd42075b81d360f8d6d4d57e2f55f0ee832e0c8fca929105ea886664ae8 glibc-langpack-ur-2.28-251.el8_10.2.aarch64.rpm 38fe28a53ee1682e664e6331286f03940ed4df9ceaeb08a5571f6cd3eecbc79f glibc-langpack-uz-2.28-251.el8_10.2.aarch64.rpm 3b615a1e9245fde1884aa07d23470b0687eb287d1e981b7f74d60ae30d28529a glibc-langpack-ve-2.28-251.el8_10.2.aarch64.rpm 89aee77d668066fad71f178c59a7288bd2757ac4172259dbef2b412417250e1f glibc-langpack-vi-2.28-251.el8_10.2.aarch64.rpm 213b0ba03ae9acd79c79f28f407e2737f0245a41f06d3467801d94cf366b6e04 glibc-langpack-wa-2.28-251.el8_10.2.aarch64.rpm f211ecc5fb032225ea29c4eb09773f8287a6c303e8882a2a051d702195093571 glibc-langpack-wae-2.28-251.el8_10.2.aarch64.rpm 8fa29d40bb1863f88b032e7ff29b94de76d0a2e7a061564277e29ad51c39a904 glibc-langpack-wal-2.28-251.el8_10.2.aarch64.rpm 5511350e20813e2533d630a539146bc192549dff1e3e8aa2ec7cafde058f7091 glibc-langpack-wo-2.28-251.el8_10.2.aarch64.rpm d7c2dde4aa33e751432c046f9a4f64a081b7211be2e30fafbbe08e93f415fd00 glibc-langpack-xh-2.28-251.el8_10.2.aarch64.rpm d48890498a44b14e4b55cfc404e414fb67f50bc17e1b1b18de5e453f02f12188 glibc-langpack-yi-2.28-251.el8_10.2.aarch64.rpm 6adddda28c63810b4f80d049dba00ed3548c3de685e06792b1975cde1bcd367a glibc-langpack-yo-2.28-251.el8_10.2.aarch64.rpm c3a32cb1dbbffb21f8c74230b35d1361a85b927ebee6540b0abfe13b84849747 glibc-langpack-yue-2.28-251.el8_10.2.aarch64.rpm 875c99501371ddeea4a07d069d2fd67ab51de52615a8dbb8c733233cfb81269d glibc-langpack-yuw-2.28-251.el8_10.2.aarch64.rpm 41037ff0ce13adc5887db53668e458d221b425c4b9bd65ae64d5576e6b8253fe glibc-langpack-zh-2.28-251.el8_10.2.aarch64.rpm 978ce1283eac5d01ff75001472a56eb88dfc10a12ba6980d46d20c22f683a8f7 glibc-langpack-zu-2.28-251.el8_10.2.aarch64.rpm 697140a7f4d7c96ddefd6d028d8d465ba7cebc88c5ed7c21c39b7b5269f2674b glibc-locale-source-2.28-251.el8_10.2.aarch64.rpm 7d899e3728d7c379202abbdafe824d85972ef20783099f9d1e0dde2804c5439d glibc-minimal-langpack-2.28-251.el8_10.2.aarch64.rpm 5906a4b3c4166764a3fb7e9fa09449b625af11a3ecfe0f17d6b0071634f5d632 libnsl-2.28-251.el8_10.2.aarch64.rpm 69119a265e7515f95cdba06747de0448f3f73cc7a9f17c95fd80d62753f0fdcf nscd-2.28-251.el8_10.2.aarch64.rpm ef1b2a7dc6929019735d936e3b70d7492a069a580fbc999aa6eaeb1bd5e9a77f nss_db-2.28-251.el8_10.2.aarch64.rpm fd931e85e0cab317595bbd2a56f8c80ac820ef5e73d58f3750b2e45c958d046a RLBA-2024:3151 acl bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for acl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms acl-2.2.53-3.el8.aarch64.rpm 2561677938cb79ad039b79b3ca2ce4bd020a5851a7cb25801666d78a8e00d079 libacl-2.2.53-3.el8.aarch64.rpm a4d711601dbe6f5843b1489042f3b71743b26e7790cdbc654ff7e0abb7d9eb9c libacl-devel-2.2.53-3.el8.aarch64.rpm cd325a1b812f88fa254c0596f147139ef99ecc14a3ef6d91ff4a8011e675be2d RLBA-2024:3150 python-urllib3 bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-urllib3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-urllib3-1.24.2-7.el8.noarch.rpm 9b2db8ee6315e4ce5bfa1224dae9cd74ee4807b04b4911368193d3982875fd5c RLBA-2024:3149 autofs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms autofs-5.1.4-113.el8.aarch64.rpm 0f363498c49fc422b692f5430df35bb6be4e79159d95c0b282d5adab2383a260 RLBA-2024:3159 python-linux-procfs bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-linux-procfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms python3-linux-procfs-0.7.3-1.el8.noarch.rpm c726c1c16d23294bcc9d933f2a146650cf699f96d2e78da4a30b24643bbcf211 RLBA-2024:3157 cockpit bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cockpit-310.3-1.el8_10.aarch64.rpm 8b56e6f775d80b6ba614cd41471f77fff626e27ee4481f1efc052abea1cb302f cockpit-bridge-310.3-1.el8_10.aarch64.rpm 2ab0db0171f367e752cced9b43e637b1ef515788f6d599a57df1d8296178f07e cockpit-doc-310.3-1.el8_10.noarch.rpm 09d0260587da36d67475c95ae593e4eab984d050065fec136f63724601599339 cockpit-system-310.3-1.el8_10.noarch.rpm 39da3e77b24c240578a3603b653963535da509fe39873db0dc313ba300eb465d cockpit-ws-310.3-1.el8_10.aarch64.rpm a2ff7692078daf3081db41e8420647b252ee1174a29cc12f9db81001a9a8511a RLBA-2024:3165 cups bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms cups-libs-2.2.6-57.el8.aarch64.rpm d8ddc58078cdc9ef5d08420041578b34790eaaf1c5f61a8562a93fef5b569b97 RLBA-2024:3164 dnf bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dnf-4.7.0-20.el8.noarch.rpm fa9560a29d68f159a8f9db7fd874c5be638e9a19d83af1dc50c2c49c7895e425 dnf-automatic-4.7.0-20.el8.noarch.rpm 59a202af22c1d767d75fef1277304393f2bed7134666b6c69eb820579bf830c6 dnf-data-4.7.0-20.el8.noarch.rpm d2c0ba2bdb3d72d558a4467afea5923c27cdcda5b41f0c23e0d3b9a0881a1e7f python3-dnf-4.7.0-20.el8.noarch.rpm 8195a2a40afcaef2c3c0d9b288bde41ab71847cc2fe2ba24f113a4ae980ca99a yum-4.7.0-20.el8.noarch.rpm 2793583cffdb76e783f1f58fc0f6a19469ac49e7e54726240774257df95e745b RLSA-2024:3163 Moderate: pam security update Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: allowing unprivileged user to block another user namespace (CVE-2024-22365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: allowing unprivileged user to block another user namespace (CVE-2024-22365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms pam-1.3.1-33.el8.aarch64.rpm 50edaf0b25d3037427b348fa841e9fdf1f70b20f14b497b65284a3c6831d9d5b pam-devel-1.3.1-33.el8.aarch64.rpm 11575640b35fe58bdd513a0a85000991d2546ad5845ba530b485fa9b38f7f74d RLBA-2024:3167 rdma-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rdma-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ibacm-48.0-1.el8.aarch64.rpm 0f4b658acf065a181fbbf7cefed9ed8fd4ae7c3859d0f9e314efad00f21da567 infiniband-diags-48.0-1.el8.aarch64.rpm 57c36276a389721e9ff56c51c87cfe9a57dce9a9a166f03c51609601786bf731 iwpmd-48.0-1.el8.aarch64.rpm fdcbf4751059f2226c42374492be6209d061122151e8f810f1e6e168f6a1d659 libibumad-48.0-1.el8.aarch64.rpm 6cc29431ccd3267a80ea522d0ea8e3a6a8d842be68b5d3078cd4fd932ce233c0 libibverbs-48.0-1.el8.aarch64.rpm d91f8e09930544315e976b8776c9600eb29c690a2f48710798de99e619f712e3 libibverbs-utils-48.0-1.el8.aarch64.rpm f3c1094b629c7784c7e75a9bddac451cc975d4be06bdfc9b49b6398e65c86f84 librdmacm-48.0-1.el8.aarch64.rpm e0eae0b77f99975dc12d290a7a93ccf9284c9cb1cfebbe5013160aed0310525c librdmacm-utils-48.0-1.el8.aarch64.rpm 672968bbce067348c1f4bbda29ef6f29b5f8609b246334064e6de33b2e350b1b python3-pyverbs-48.0-1.el8.aarch64.rpm 08b028c72a2e895583d3c9ac572cd8b01674621d28c864f411d9e94136164238 rdma-core-48.0-1.el8.aarch64.rpm b0527830b8a37606dd08c7088556f39446c8780cd9fe3fb3198835d335e4ed1f rdma-core-devel-48.0-1.el8.aarch64.rpm 93d2f10e39f7c86c013db9c1e6401681380e7e59f2044e396c0cc55b36ecc7d3 srp_daemon-48.0-1.el8.aarch64.rpm f49565fcdcc8a364bec72d766e3199cfbbd147bd61663d46d3a261d70c8703ef RLBA-2024:3169 dnf-plugins-core bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dnf-plugins-core-4.0.21-25.el8.noarch.rpm 069c1e02fbed2d9fdee08d1b9bfb09f590d27b88da3b273f33cd9314a7f803a4 python3-dnf-plugin-post-transaction-actions-4.0.21-25.el8.noarch.rpm 8e9283d4362cea2328da7f8e203a93ca9adf6df29da1ee210c573439b4ecb399 python3-dnf-plugins-core-4.0.21-25.el8.noarch.rpm 236c8eff4747c7391433cc2a447ac03ea95c39307de117a45a4d7bba298a20a9 python3-dnf-plugin-versionlock-4.0.21-25.el8.noarch.rpm 5c5078cbf684d477d9b77e31b8bc227d14f3b2fbc6a8b591ba72a7f8681e2e77 yum-utils-4.0.21-25.el8.noarch.rpm 7ccf9325c27dcbb50eba6ebeada3bef286c402e7edc866d73933099fb50fddac RLEA-2024:3168 libkcapi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkcapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libkcapi-1.4.0-2.el8.aarch64.rpm cd9a90549e907fdfd6b8d6be0e122a47e8f60da0780fccc46ea9a365e17f985a libkcapi-hmaccalc-1.4.0-2.el8.aarch64.rpm e98a4cd5f3163b809ea2a5dee709597babe337efae0152060b697d1a4ca1a8b3 RLBA-2024:3173 audit bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for audit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms audispd-plugins-3.1.2-1.el8.aarch64.rpm 7cd59dcc357641602b7f87bd298c2de2a5ef596c054b9890329b511251e93d62 audispd-plugins-zos-3.1.2-1.el8.aarch64.rpm 4b082b6c49bfe7bf770256935ca5e0c3160b12e6374c910e7dd752b9851ab9b1 audit-3.1.2-1.el8.aarch64.rpm e127b74898f65a21dbde27b89e995fa0eb73d0249d861e5743f818975d57890d audit-libs-3.1.2-1.el8.aarch64.rpm 87c7db72be329e1c16bfec866d3390c8977093dc0f0831abcf208d2d19f5a55d audit-libs-devel-3.1.2-1.el8.aarch64.rpm 7ecb520d2ef6f5c1b8d3ab4257d631a6e16195204e78e7f30777804bf1b18ec5 python3-audit-3.1.2-1.el8.aarch64.rpm fdabba1276621ff7047b695000b7ae8676beb3bf78c822f0ff42b739ac32c2b4 RLBA-2024:3171 mdadm bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms mdadm-4.2-14.el8_10.aarch64.rpm 2698814509a04514163f0cad08d2e7de18905ed40c8fe7c5f0bdcfd92b3607ce RLBA-2024:3177 numad bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numad. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms numad-0.5-27.20150602git.el8.aarch64.rpm 5d090fd081a97140091a0b7597527b6c9fabcb3d64d97c361b9db5b9022f281e RLBA-2024:3174 findutils bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for findutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms findutils-4.6.0-22.el8.aarch64.rpm 016a49180cbde3c1d9f4139695f475f5325ef6bd92689ccf9cb7f1a4ccb8b780 RLBA-2024:3179 avahi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms avahi-0.7-27.el8.aarch64.rpm da091ceb0c63a13a40769823527960f8d9e78d218fcb27951c0734d121e82549 avahi-autoipd-0.7-27.el8.aarch64.rpm e01b38b9c1474680b81a9ecfb8180087cf9559670d883ec7497f3a5cd4f2f180 avahi-glib-0.7-27.el8.aarch64.rpm 4a64e8ceee72cf76deae2689c77d575aa359d971a74484d6474293b1c97a1710 avahi-gobject-0.7-27.el8.aarch64.rpm d0c3bd0ae4282963dd9177cf621baec7bd50e0aea1d7b5572b34c5a9940413c6 avahi-libs-0.7-27.el8.aarch64.rpm 5148867d1db21fc862765ef66b544ce688cb1ab8c014b91d5ae52cad8885117a python3-avahi-0.7-27.el8.aarch64.rpm ee8ee8459ea6952ba0f4a21c39e2d54fdcf7c9367a18d1f148f8ce5df500ec27 RLBA-2024:3182 smartmontools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smartmontools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms smartmontools-7.1-3.el8.aarch64.rpm e34767cfc80303962b1c364e2bff54a1e16fa522fc376188069af943e53531d4 RLBA-2024:3180 dracut bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dracut-049-233.git20240115.el8.aarch64.rpm 9dfc8a87138f391627cf0962caef9e3a7660608fbf2b4e6bb45d0cc1fc4cb56c dracut-caps-049-233.git20240115.el8.aarch64.rpm 8570c3804c2b544a6df875723cec034278fa0ff77afc6900c2568fb75e99cf63 dracut-config-generic-049-233.git20240115.el8.aarch64.rpm 90636b57ec9d037a51c130df707a88fdf6df0695bc14bc2497db3de23265fda4 dracut-config-rescue-049-233.git20240115.el8.aarch64.rpm cc1e6758bf8897cb40127f9c9469250cc81b830b8f2a2540422ab9bd66804bc8 dracut-live-049-233.git20240115.el8.aarch64.rpm 09cd641a25263832ca6eb606bd52c1450591434ec1068b6c523e7313bc507c6d dracut-network-049-233.git20240115.el8.aarch64.rpm 73771bcc4a0ecf872d22852c5de6bbbc26edec1c995439b60dca19f28123b974 dracut-squash-049-233.git20240115.el8.aarch64.rpm 06b437952b416ca8737c2acb63a664d8af20652e772aef33e1e32a52f25b2c46 dracut-tools-049-233.git20240115.el8.aarch64.rpm 0b7cb8d75b45d4c9e8b6134420ab959ef919c9fed51f9a72a135c064a83f2731 RLBA-2024:3181 tpm2-tss bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-tss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tpm2-tss-2.3.2-6.el8.aarch64.rpm 21d66c5f56a29c1084b85bd27745956cec66aa50e13137c036872c98dfc31d44 tpm2-tss-devel-2.3.2-6.el8.aarch64.rpm ec2b8607e46e6f057e08e58c450e4ae9584277154bb42d72615e6459ae1599d2 RLBA-2024:3186 libldb bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms ldb-tools-2.8.0-0.el8.aarch64.rpm 4e1f87cbc511a959665aca2126f99d07ca4e54409f70cc39cccaa370be48db90 libldb-2.8.0-0.el8.aarch64.rpm 36c2460f7430ce463b5db031c5f22107120fe9eb92c6d27ad97613a4100233e2 libldb-devel-2.8.0-0.el8.aarch64.rpm 5d66bb265c3b75ebe798df0513672b630fe1364f2d26b491da9987b8e8f7eaa8 python3-ldb-2.8.0-0.el8.aarch64.rpm 035e27552a4ffa7a179d255c166a59b665654708d09f9d625df742e3e94f47c1 RLSA-2024:3184 Moderate: grub2 security update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048) * grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692) * grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048) * grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692) * grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms grub2-common-2.02-156.el8.rocky.0.1.noarch.rpm 8672438a84f9c0ea80fa80d375557bd1965460bfc0e24f4ab27705f85b4f467c grub2-efi-aa64-2.02-156.el8.rocky.0.1.aarch64.rpm 6758f0c2684798ebc8616f2a86276e5f40f83fc586578ca61865d1596455d2aa grub2-efi-aa64-cdboot-2.02-156.el8.rocky.0.1.aarch64.rpm a73d3861e9af042cd8149df90efa5c3229e638de4cde70323231c2f79fd332d5 grub2-efi-aa64-modules-2.02-156.el8.rocky.0.1.noarch.rpm 21a7a7b661d4f5176b5ddb73a171660a0b90f741ba19e5a986864b5d697623b0 grub2-efi-ia32-modules-2.02-156.el8.rocky.0.1.noarch.rpm 6a055a026ac4cf272378b45157641031445cc6c7008eb177a1e9bf1e4e188003 grub2-efi-x64-modules-2.02-156.el8.rocky.0.1.noarch.rpm 27b17a886367eed378864d93b9e159725162596131c95d588196e86ad37e301d grub2-pc-modules-2.02-156.el8.rocky.0.1.noarch.rpm c376d6bd24f24eb4869a4305c6ab2ef98a59f352996d45357cac4b2a1b7e2781 grub2-tools-2.02-156.el8.rocky.0.1.aarch64.rpm f5e2a88e1780e094c7478fb4440db28587ce7d732a9ddf6c859b3d6de664d14e grub2-tools-extra-2.02-156.el8.rocky.0.1.aarch64.rpm 4e47a6e55a6db047843bf216a8948370c7e730723e5f6f3fcbae65cdd9a313e2 grub2-tools-minimal-2.02-156.el8.rocky.0.1.aarch64.rpm 6b0d6928f3bc6e44ad3a40ad0516e5b39c5642429550c0272c41d256b116cf4f RLBA-2024:3187 libtevent bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libtevent-0.16.0-0.el8.aarch64.rpm 2d24e4ae3b3ea3c106e02878bdce38800f4383371259bd2d96105937e5e9a94b libtevent-devel-0.16.0-0.el8.aarch64.rpm c7b24a4c54643e466ea485bf6e48297465680d78930b1ddcd2ea191dfe537eac python3-tevent-0.16.0-0.el8.aarch64.rpm 7725e1283eece34fc10fe379de33e1e9f3e5951f8958b13026a9cdaf40de8fa9 RLBA-2024:3190 trousers bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trousers. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms trousers-0.3.15-2.el8.aarch64.rpm ef47a940221e11746a7fe4929b1c0f14e3a947be79cf8367d91911894a61bbd6 trousers-lib-0.3.15-2.el8.aarch64.rpm 6c020786b2fbc25e0396f21c8cc8799560a02008072f7a50d175ede78a81352f RLBA-2024:3197 librepo bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms librepo-1.14.2-5.el8.aarch64.rpm 2b4029162e8b0867c767ef6477ff0cb7633d927d6d939fd56f886aa226028d38 python3-librepo-1.14.2-5.el8.aarch64.rpm 88e8b69d28545d5e300e900a0f8dcc5c3ac8bbefc4563380c70df358fb650545 RLBA-2024:3195 subscription-manager bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms dnf-plugin-subscription-manager-1.28.42-1.el8.rocky.0.2.aarch64.rpm 460d1b1c586ed06143537140dbe1d442a78767e9c412e8b3c097a80407ad32f2 python3-cloud-what-1.28.42-1.el8.rocky.0.2.aarch64.rpm 5ae8b57dfb4b0daa2efe248a0a23ead28bfda3b9972e6abd8df10606f258e1ce python3-subscription-manager-rhsm-1.28.42-1.el8.rocky.0.2.aarch64.rpm 641e7be3d8f16bb1a288877d838a3ec16818a21f30a2ad53ac1b8b9575220d79 python3-syspurpose-1.28.42-1.el8.rocky.0.2.aarch64.rpm e8bc625d6aeb80c6fa2829f09cacef7e20972223b705c10191d137f0fdfd0011 rhsm-icons-1.28.42-1.el8.rocky.0.2.noarch.rpm d65e834f65e012f7d86c832024ad0aed7f47cf0d1fa8f17cfdf08d33c986b76d subscription-manager-1.28.42-1.el8.rocky.0.2.aarch64.rpm 22b8c0b1d439c4d6390327b14ebe863c3843a8f6a82112505ce17181e354d266 subscription-manager-cockpit-1.28.42-1.el8.rocky.0.2.noarch.rpm 65db90606dffb188dec079966e58bd4d21a51a41852008b594d0f79b84e0a4a2 subscription-manager-plugin-ostree-1.28.42-1.el8.rocky.0.2.aarch64.rpm 0b5bafd9ede2f1657463b951d91d54ea0bb95cf7009a348cb3c91730073e8b8e RLBA-2024:3198 shared-mime-info bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shared-mime-info. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms shared-mime-info-1.9-4.el8.aarch64.rpm 1fc60f66edf30bdff5ca0b5c9502339843cf051e83fa5b39cb79b161f341db76 RLBA-2024:3200 smc-tools bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms smc-tools-1.8.3-1.el8.aarch64.rpm 3ba3db8ebae771c5dfb4247ab89b94439a645f2395bf91cc8777fcbcefce427c RLBA-2024:3199 opencryptoki bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms opencryptoki-3.22.0-3.el8.aarch64.rpm 5f062bbf6b372cf9a05330c8e72352b4f62a9a4b4ab9ada2773779ffe17e0705 opencryptoki-icsftok-3.22.0-3.el8.aarch64.rpm 8aa8ec31e2b7195c597bd17d4a1e4bf317d41e0eba14a5e2e755c73cb59cb3b8 opencryptoki-libs-3.22.0-3.el8.aarch64.rpm aae9a1d8008835420540389a2f9bc3277e18d81480da720656172330dff4990e opencryptoki-swtok-3.22.0-3.el8.aarch64.rpm 0ae156fe9d5e2e6fd26fffaa4ec153585e65df4b65b146c2126fe50c389d9936 opencryptoki-tpmtok-3.22.0-3.el8.aarch64.rpm 06b734ff8a8bdacbe29535a1f737ff1d18473e94384c4996016321a97ba2cc14 RLBA-2024:3205 iotop bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iotop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iotop-0.6-18.el8.noarch.rpm 6b9def672669de10601625eefd3fb0277e1f327e33a12a85bd06881129081010 RLBA-2024:3206 perl-HTTP-Tiny bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms perl-HTTP-Tiny-0.074-3.el8.noarch.rpm ce9e9ec3f33a863a4821fb6fdc872c1cef1f1fae0b63ded1bee3ea25bdd25e7f RLSA-2024:3211 Moderate: traceroute security update The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host. Security Fix(es): * traceroute: improper command line parsing (CVE-2023-46316) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for traceroute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host. Security Fix(es): * traceroute: improper command line parsing (CVE-2023-46316) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms traceroute-2.1.0-8.el8.aarch64.rpm 5c351d83662dadba8bc2f7ad29b6343467de54223d17dbe5fc35c6ba96852185 RLEA-2024:3209 tzdata bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tzdata-2024a-1.el8.noarch.rpm cce3fd2ca0fc64023c22f9a242d92bbfe3685429daa64b0ce7956de025dde066 RLBA-2024:3216 net-snmp bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms net-snmp-libs-5.8-30.el8.aarch64.rpm 846ff7923515ac9ce7022828c6fd044c6b25ec5d682c1d78e7fdc97c6beb04d6 RLBA-2024:3220 python-pip bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-pip-9.0.3-24.el8.rocky.0.noarch.rpm 48027ea5f805c0edb218fe0f241d2b0c34e9f1be8e828997516766dbfe7f96e6 python3-pip-wheel-9.0.3-24.el8.rocky.0.noarch.rpm ccc41a042fbfc423e7cac48dbf161f94d6da6196e1770d2e6bb00232bdfef2c0 RLBA-2024:3225 sgpio bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sgpio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms sgpio-1.2.0.10-23.el8.aarch64.rpm 1d38d4f237a2cae3b9e5106896fc78aa7664a7c8a76b3fa6ff059860370c4b6f RLBA-2024:3223 fuse bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms fuse-2.9.7-19.el8.aarch64.rpm 9a1c5903769a267d90638eeb820f4354008acf220428397d90f61a00faf5ee17 fuse3-3.3.0-19.el8.aarch64.rpm b3dc2aad9650cbb7142f5c2064c6e3b6afef6aaf309f49e2568805b0e75c16b0 fuse3-devel-3.3.0-19.el8.aarch64.rpm 145fda41dba97b7dd6bdaa42c512c8860b75ba2aa38caa05e8095fc430141cfa fuse3-libs-3.3.0-19.el8.aarch64.rpm 183c91382174c419103a12a4f3d877a56ff8523f36600ed71da31025ce67a990 fuse-common-3.3.0-19.el8.aarch64.rpm 1a582aff5e2210d244049841d8ae008e998e3e01efee63f5a1720194460e330c fuse-devel-2.9.7-19.el8.aarch64.rpm 4a758893334f02c4043a4fd013ea0ebfcba8aefa99af0c8fa8bf20045c5020f0 fuse-libs-2.9.7-19.el8.aarch64.rpm 16d9255bbd24b36de41f59871e27d006c1e31e64b869951ccb1288f0fc83dceb RLBA-2024:3221 tuned bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms tuned-2.22.1-4.el8_10.noarch.rpm 98d42bb16c8dd7ebc21b8b2619c6de04db2ef88b8308c6cbc61d5be4138e7785 tuned-profiles-atomic-2.22.1-4.el8_10.noarch.rpm ce9584475dd7a313f00d838b5f680bf9107b4315336d87af55f2760091a5430b tuned-profiles-compat-2.22.1-4.el8_10.noarch.rpm b0f063d48939f443ec742495e02a9b975fd37fa20245f2c2ee19441b9935508c tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.noarch.rpm 549ab06fd76f805bdcc0f610f089c47e04db2413433309be863bd25da4ffeafd tuned-profiles-mssql-2.22.1-4.el8_10.noarch.rpm 6a4de3754851d2f7503d683655933e59b541b97c01ac98de306c7959477137dc tuned-profiles-oracle-2.22.1-4.el8_10.noarch.rpm 534208b9e8f20cff79150b8a9895af71b1c3414847d02970062037baf3235459 RLBA-2024:3231 realmd bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for realmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms realmd-0.17.1-2.el8.aarch64.rpm 3e2d7c5477543fb92019af3323912a8e514287482fb8fa9e5c249edc4541e886 RLBA-2024:3230 file bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms file-5.33-26.el8.aarch64.rpm 80bd8ecd944ae5c701cd42f6815a721b2f90b848d2a3ca49a35e11424737eaa1 file-libs-5.33-26.el8.aarch64.rpm f92ff5de64a0a69347c18c1b56973f148c78b43fcd2665ec9fad75e146ca2365 python3-magic-5.33-26.el8.noarch.rpm 83c0b04c8f15ca79012c86a0915dcf0fc5026dc22bebe3de26806cf614fdfbe0 RLBA-2024:3237 bash bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms bash-4.4.20-5.el8.aarch64.rpm fb5045660e17e456eca1fc60bfefb9a972ca5fe99f1de148d07f4af3e928bdd2 bash-doc-4.4.20-5.el8.aarch64.rpm 2f9027e1b4543fb90d254d25cbfa6ceea2e28cc6cf546b22a3b9f3cbabe5c499 RLBA-2024:3236 expat bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms expat-2.2.5-13.el8_10.aarch64.rpm a17915bc98a8294d8fff0eaa9837c9a7dc168090cff42c2d2860770fde9fcf0c expat-devel-2.2.5-13.el8_10.aarch64.rpm aa08ccf885294b2c90b08fe23744eb6f3dbe1de65bd8ebd4f09386ceef3e4c4d RLSA-2024:3233 Low: libssh security update libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004) * libssh: Missing checks for return values for digests (CVE-2023-6918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004) * libssh: Missing checks for return values for digests (CVE-2023-6918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libssh-0.9.6-14.el8.aarch64.rpm f3a23c342af43593ae4b7b2e97d36801e923ddf29d90d14394ab14219d91d4db libssh-config-0.9.6-14.el8.noarch.rpm 802ffb16ca31193afc400d9f057f8bcb04224a85a3452fd878cb4a088823dfe5 RLBA-2024:3232 freeipmi bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms freeipmi-1.6.14-2.el8.aarch64.rpm 656a04207a51363cea4ce6b281cde9126616207a7873f91bf08c34804f1cf046 freeipmi-bmc-watchdog-1.6.14-2.el8.aarch64.rpm e8cc261878ec9f51217b2fb95df9ec5f651ae07cd02954beacafbaad6b3e0595 freeipmi-ipmidetectd-1.6.14-2.el8.aarch64.rpm 0d526e2d14dfdf98394fb55dec700eb4f6d5fb0ea8e3a1e4c95c0194bc3f75c1 freeipmi-ipmiseld-1.6.14-2.el8.aarch64.rpm 7b2271979c1cb27dafd69da6442072ad66531c350235c64da9baa32ad40a85b2 RLEA-2024:3235 iproute bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms iproute-6.2.0-6.el8_10.aarch64.rpm b7e26855cc564c1fd84a31e6d95b2459eabef417dde953e880c5b2cf3ca64ead iproute-tc-6.2.0-6.el8_10.aarch64.rpm 7d8c0fa06a8a9fd8a6c76b466a7cbc1956e12fb6180589fc31d6a4b9e69387d4 RLSA-2024:3268 Low: krb5 security update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458) * krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458) * krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms krb5-devel-1.18.2-27.el8_10.aarch64.rpm 78bab143d32f0c8a62f36ef4b432410dc0f6841dd3f2bc3aa122a6f9d9ac4d58 krb5-libs-1.18.2-27.el8_10.aarch64.rpm 65a921998e5fef8b788d80d897987d773adab4cee62a49a2f23cc126246c873b krb5-pkinit-1.18.2-27.el8_10.aarch64.rpm e3dab5b985439f828ed055d124bba144a5a7312a5a0706cfea694b5fc407c2eb krb5-server-1.18.2-27.el8_10.aarch64.rpm 5a763065532dc1adb64a317f98519e3a33bb60951d851e96c5cd0fd950a06684 krb5-server-ldap-1.18.2-27.el8_10.aarch64.rpm c2eadd7f7036d43fd14d0282e94cb7fb3b29cbdfbc588b375571ab41cbed3fda krb5-workstation-1.18.2-27.el8_10.aarch64.rpm de9788bf155fef5dff43286fff3d3da0f57550b002ff7d34b25a92f4f7e12d6c libkadm5-1.18.2-27.el8_10.aarch64.rpm f73a48d1f2e3219ff43a753dbaa66abb228941687475f9b0b5bc60d01a24d67e RLSA-2024:3270 Moderate: sssd security update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libipa_hbac-2.9.4-3.el8_10.aarch64.rpm e3fedd1c23060707600ea115c541592721bacaab96df6872d5af080d13fab777 libsss_autofs-2.9.4-3.el8_10.aarch64.rpm 68e881968f1ea83c823a5ce3161b102216d5dc478fe6ab45bab6156ccf83897a libsss_certmap-2.9.4-3.el8_10.aarch64.rpm eeca69d9401909b4237c61ac19478edc28cbdea7073bbe1c7069d0733666e552 libsss_idmap-2.9.4-3.el8_10.aarch64.rpm 2f70299972537c4bb04233968bac9efc3d54deeb284498fcd06f2b83f55189d7 libsss_nss_idmap-2.9.4-3.el8_10.aarch64.rpm 873f9351f5be7eff444d51a12c4f4eedbd142105bc31ced496640f9b7b679d2d libsss_simpleifp-2.9.4-3.el8_10.aarch64.rpm 951863e5c5c1d331368a07daf8b4ff641b0d0a3a756d4f31f2769218ce39ebac libsss_sudo-2.9.4-3.el8_10.aarch64.rpm b0b14ed2bcc53428a2d2c57cea8bc0d7516af639598a92fd893588305650973c python3-libipa_hbac-2.9.4-3.el8_10.aarch64.rpm 11770489e7ae842baca1fe5dc5bd3105f9d0160d6c531ee9fc5ca74d27f89c6b python3-libsss_nss_idmap-2.9.4-3.el8_10.aarch64.rpm 183dd22c7d7c374347b63c1c1dd9c91e4b0bb7710f119b7de3fd4bcf2f0e2a16 python3-sss-2.9.4-3.el8_10.aarch64.rpm aa54a93ca25e5a2ac81f0418e6a77adb21cc4bc67dea2bd76a8d7ecb43341f87 python3-sssdconfig-2.9.4-3.el8_10.noarch.rpm f298ff9bf27268b86d01be28afeafd0ebc50b830ea4f338f8c222950c7feae15 python3-sss-murmur-2.9.4-3.el8_10.aarch64.rpm 9dc02b4e3b4c1df422bb3df7955af6bb9eda3007f4713f4223a9291564b6c148 sssd-2.9.4-3.el8_10.aarch64.rpm 18c3385408bfd67af2c73508df7e13b3e13abcd0226e30d7555b6154cc594ee9 sssd-ad-2.9.4-3.el8_10.aarch64.rpm d3192f762aae0e7d793f19d9abe3e64dd996a872b7f0e80b176d7238763d16c7 sssd-client-2.9.4-3.el8_10.aarch64.rpm 85e3bcdc5dba3b3a64395d8d0cd7773a082c1c4417860023ddab195a0bee99f7 sssd-common-2.9.4-3.el8_10.aarch64.rpm 66f1172192e4c4f610fd65dc37ff7f5e3cbbd01ed43b5be2fafb5bf380ca0c69 sssd-common-pac-2.9.4-3.el8_10.aarch64.rpm 5c08bea97b0ee66b70b6d0dac307aa534db039da78355ee10528d4d0f5cfeb5e sssd-dbus-2.9.4-3.el8_10.aarch64.rpm d33f8438da1aac4467636ac3faaeaabdfdfb4fcedbdce4674b1c10ba5587d114 sssd-ipa-2.9.4-3.el8_10.aarch64.rpm 8e6eb7eaed37cb908626ad2b282fca91a155d2bca1a363701f98129a963b51d5 sssd-kcm-2.9.4-3.el8_10.aarch64.rpm 95dd27ce9eb986c5a6e14da8c42aa80c24ecf1b65051f78ebeda7159d7aac72a sssd-krb5-2.9.4-3.el8_10.aarch64.rpm af0a75d808a45f0f9487cc2cab27c8ffc2babfea539e03b1207db3dfc2ed2056 sssd-krb5-common-2.9.4-3.el8_10.aarch64.rpm bca45c229afc842ebf6b00fd2e8f24edf88ed1c4d8261822b5357c6129cead9f sssd-ldap-2.9.4-3.el8_10.aarch64.rpm cae5b371848e6c5b14db1cc6d685c9144be42efe17f9f6a9ff14ef253c4a7bf1 sssd-nfs-idmap-2.9.4-3.el8_10.aarch64.rpm e29f254797115f389730c07f4b62fe3e3e9a90199706003f391a913fe1915641 sssd-polkit-rules-2.9.4-3.el8_10.aarch64.rpm 790d53e9d8b0a3832db6ce091db081867c61469f156a5f7f1611012f57a9aee3 sssd-proxy-2.9.4-3.el8_10.aarch64.rpm 1bf53673a570d309bd19bd617228dab1402ede4d321209a1b81ea19dfd9ddd15 sssd-tools-2.9.4-3.el8_10.aarch64.rpm 715c8d54ec202b284104f93abfe5b50d2e9430973e983a3badd8a7af257c9556 sssd-winbind-idmap-2.9.4-3.el8_10.aarch64.rpm 2a593cd842d1d675bb8afd1c7d4eb5f8bf8ac96cf47330853b0216a4a56d1be9 RLSA-2024:3271 Important: bind and dhcp security update The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) Bug Fix: * dhcp rebuilt after API change of bind-export-libs For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dhcp, bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) Bug Fix: * dhcp rebuilt after API change of bind-export-libs For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bind-export-devel-9.11.36-14.el8_10.aarch64.rpm 7d87c6048aa24982cc5684d0b19e1f8e25d4d77b4dcd999cf5217939b7202c01 bind-export-libs-9.11.36-14.el8_10.aarch64.rpm d6879eba2b77ba29a341195b1b3b9a30af06d8b1179da2cbb13e01d5e6945683 dhcp-client-4.3.6-50.el8_10.aarch64.rpm 2a678a9b73ad06489bcca1b64704fa7ca67e7a3a5669e97184a672c4290068ac dhcp-common-4.3.6-50.el8_10.noarch.rpm 8c253b3afeaff236bdb93edc0a90444a1c27ad8c2bf70b950edacc1a0fdd2ed2 dhcp-libs-4.3.6-50.el8_10.aarch64.rpm 15de93baa756a305dfbd82150609941e3fdb2b94c67520e48a33155ac14a87ed dhcp-relay-4.3.6-50.el8_10.aarch64.rpm cf3c127fd0d157e5a5257cb44fb69d51b60286e30e452728880e49e3ea6a83dd dhcp-server-4.3.6-50.el8_10.aarch64.rpm 5bc36502471ad730e76dc88cae26a5b34bd36ad1bdb99c03776e7a91f9370f47 RLBA-2024:3272 gcc bug fix update The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es): * Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es): * Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426) rocky-linux-8-aarch64-baseos-rpms libasan-8.5.0-22.el8_10.aarch64.rpm 52f93f97e9184b351b92f12815b46ad29fed7b4706243a0e903fb528fd96d09f libatomic-8.5.0-22.el8_10.aarch64.rpm 63c02fe9150287435ac1d3beefd006b5f16d5cbe8c31981d60f673fa77c86840 libatomic-static-8.5.0-22.el8_10.aarch64.rpm de56193372fd59a85bff7924716f44438b99ede5074c9000a08058eff05ad17f libgcc-8.5.0-22.el8_10.aarch64.rpm 651343d3df1f682991ca734f55e1cf85e114d145b984129c525c9cd2c80500a3 libgfortran-8.5.0-22.el8_10.aarch64.rpm bd5184199a58a335e2e56738b9aba227d280e74d461f3c7e70d2124ba210a6f6 libgomp-8.5.0-22.el8_10.aarch64.rpm 651edae6bccbe78687e665de3d7834caaa826b78165dd2660036408d3ebb0a66 libitm-8.5.0-22.el8_10.aarch64.rpm 5ce1d476b564a22bef7cd5dacc7b7af0267f334d6a831ead4990df55e8290edf liblsan-8.5.0-22.el8_10.aarch64.rpm 1e9a74758219c244270c5740298271a814b9f37d649937276ebcfe736f050520 libstdc++-8.5.0-22.el8_10.aarch64.rpm 02100299337b564c449b3d5a48308c4bbb5aa88752197e70aa5f54f4a79e2ea5 libtsan-8.5.0-22.el8_10.aarch64.rpm 7cc6196cba02192634eadfba83dddf2deb55bd01e46d92739e7eb9d0012c810f libubsan-8.5.0-22.el8_10.aarch64.rpm 99b5b569e50f0a4175ed1f8cdbcecd8baa6cb3b4e3e7afc4dcaa59bf7283dda6 RLBA-2024:3274 sos update Please update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Please update rocky-linux-8-aarch64-baseos-rpms sos-4.7.1-2.el8_10.noarch.rpm abd068e760a11dfa4968b09a736df74a1a67510cb8190dde5dad95474f021197 sos-audit-4.7.1-2.el8_10.noarch.rpm bd4ed92df408c921494faacbcbe20eab0af05319266eeea393440ec623e767d7 RLSA-2024:3275 Moderate: python-dns security update The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode. Security Fix(es): * dnspython: denial of service in stub resolver (CVE-2023-29483) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-dns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode. Security Fix(es): * dnspython: denial of service in stub resolver (CVE-2023-29483) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms python3-dns-1.15.0-12.el8_10.noarch.rpm 952b915ac9bf76ace65688631e26438c6d7fde8ea327b12aa7aebdf3ca6767b8 RLSA-2024:3341 Moderate: gdk-pixbuf2 security update The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms gdk-pixbuf2-2.36.12-6.el8_10.aarch64.rpm e038ad13018f8a31c32290e5922f26c192f832e677f7c72f05e1642908cc8030 RLSA-2024:3344 Important: glibc security update The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms glibc-2.28-251.el8_10.2.aarch64.rpm 6a413ed2317b51ff6622ca7ddee28134c71f444f36652a532f3e59ee881c136c glibc-all-langpacks-2.28-251.el8_10.2.aarch64.rpm e9d0f115b2399050db194270ededa117a363a92696cefe033dfe2507fda20d95 glibc-common-2.28-251.el8_10.2.aarch64.rpm 5b3f49e5075a456fef06cceea69e0fba3f0f29e6515e96d570dd5fed5bf50fe7 glibc-devel-2.28-251.el8_10.2.aarch64.rpm 976059c5e325c19b1be410a1838ad7f063dc12dab1a8b9ecf08cd0f2970791c4 glibc-doc-2.28-251.el8_10.2.noarch.rpm 8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53 glibc-gconv-extra-2.28-251.el8_10.2.aarch64.rpm e6aa94ae49e7ed1f2d7b1d7dd4538dc5271bbc9126888c63acdb00415fc0ad85 glibc-headers-2.28-251.el8_10.2.aarch64.rpm ea7c046ba7541c00b12185278c0c2b46735abf4ca5352a8f7480661d8843af5d glibc-langpack-aa-2.28-251.el8_10.2.aarch64.rpm 1706c598222eb1233aa3ae9afa86835cdc274593ab4b6b521d658d27e11134fa glibc-langpack-af-2.28-251.el8_10.2.aarch64.rpm 37ef5e44687cc3815672c42f0448eb9f49182274cada11846187550a3a2a840c glibc-langpack-agr-2.28-251.el8_10.2.aarch64.rpm c5bb033e2708260223ff14d6091213fa67f724699dbdd40083a132e7779e6bf7 glibc-langpack-ak-2.28-251.el8_10.2.aarch64.rpm c39e69d3b8b1bf77030518280f68f8b6f3448102b67e187de56c7bfe9fd41ff8 glibc-langpack-am-2.28-251.el8_10.2.aarch64.rpm f5d0ddf3409cdd6af2be2fe307c97e252c0fd147a73f157d241228b0ea21c03a glibc-langpack-an-2.28-251.el8_10.2.aarch64.rpm 75ed9e8a4a69497ce12ad4541c3122afc5dadfb3c2080f611a400305660cf07a glibc-langpack-anp-2.28-251.el8_10.2.aarch64.rpm 9375cee507681d707baaf384f3c21fcd8908a0aea5f134a05fb157fce325f656 glibc-langpack-ar-2.28-251.el8_10.2.aarch64.rpm 791124ef9912e208c60db56ea7279548de186ab86db78a2d05cc74ed7447b796 glibc-langpack-as-2.28-251.el8_10.2.aarch64.rpm 9a9a0255e80a90c7445ad36b71d5839fb757d537600f1f77720094172ba62402 glibc-langpack-ast-2.28-251.el8_10.2.aarch64.rpm 4d43efda3edf04a083f1c99189e319b3ac933af1dc289cc4927fedcf94b7e28f glibc-langpack-ayc-2.28-251.el8_10.2.aarch64.rpm 55df4c943f48e3573ff2d59b1fe430e4f4455335a8f8aef6237cbef5936bd3d7 glibc-langpack-az-2.28-251.el8_10.2.aarch64.rpm 15a16bc53f07498a0e2f3b322e0a055fcf641305bda4bba739b5b698b41a4ea0 glibc-langpack-be-2.28-251.el8_10.2.aarch64.rpm 83e9ecc50f85b7bfb6717c1332021d05614b0b2b2681c0bc4ab218406fd80354 glibc-langpack-bem-2.28-251.el8_10.2.aarch64.rpm ae246650a22434682f17c5d8ecddb882189300be6ef6bae080e8039a6fba03f5 glibc-langpack-ber-2.28-251.el8_10.2.aarch64.rpm a04d4382ccab07b14746580212c2a7c4df4310cc5058744e1c0ced9949136642 glibc-langpack-bg-2.28-251.el8_10.2.aarch64.rpm aa2aa33ac33edbd225815d2cd161b4a963b70e7fc803a8ea43bfcf52cb907c84 glibc-langpack-bhb-2.28-251.el8_10.2.aarch64.rpm ab6fd47bb75be4854b6a28aed54cc915c408e12d4f2def62c22db7f27221cefa glibc-langpack-bho-2.28-251.el8_10.2.aarch64.rpm 4a36f5fbde4d53f776e23500354bf8ad645b2acc1c9ed4c97d244f80b905053c glibc-langpack-bi-2.28-251.el8_10.2.aarch64.rpm dbb28681440fa67b56594ad254f794c5f69fbf466a4e54aca22e636caa120d39 glibc-langpack-bn-2.28-251.el8_10.2.aarch64.rpm d1a3f6b19da7fddbf79daad034fd962c6ff2a34e5989143182fdad809954fe9f glibc-langpack-bo-2.28-251.el8_10.2.aarch64.rpm 4a53c43bbaeeef24fcecf1680e9e7109dae9d7b00e12827549c8d868ff6ddb61 glibc-langpack-br-2.28-251.el8_10.2.aarch64.rpm 2752174aeaf65f6b290fd2925f424962a732a2f921a56fd36b0def39e9edada0 glibc-langpack-brx-2.28-251.el8_10.2.aarch64.rpm bd8c5d972dc4d7a0e758f7bdb31ff7c1aca9714c11c0826344a481c6d7b78a03 glibc-langpack-bs-2.28-251.el8_10.2.aarch64.rpm 4bffa792631572868af2da0561e552359fd5a2eadce32e8da64b277fa1c80330 glibc-langpack-byn-2.28-251.el8_10.2.aarch64.rpm fd19229a706ce256c5b621af56175d6fafc767f582653d811519f4ba6a92076d glibc-langpack-ca-2.28-251.el8_10.2.aarch64.rpm 09cf2ed3e3bb23f157676a4c97298443dc081896e1e99fd6e5e0718e957d0262 glibc-langpack-ce-2.28-251.el8_10.2.aarch64.rpm 7dfd060097b86ea6c53866e77fcf13aeb3086fead85f481d7b59d96a66675960 glibc-langpack-chr-2.28-251.el8_10.2.aarch64.rpm d5ae5bbf677bd4f4eea20db7bf5391987863134b9db20aee0ef2e512af86c79b glibc-langpack-cmn-2.28-251.el8_10.2.aarch64.rpm ccc3016a64edf024df8a2be6187bfdec1c8355f5b910075b0c18a1a301c70d12 glibc-langpack-crh-2.28-251.el8_10.2.aarch64.rpm d8785a4af7efc5e9d98f395cce20faa7430b116d320fcb831384f8b7c1641a36 glibc-langpack-cs-2.28-251.el8_10.2.aarch64.rpm 126c94816629b4a6347bf5a422001d84a2a158eb7f0908d1c83e6f8d6982e68d glibc-langpack-csb-2.28-251.el8_10.2.aarch64.rpm f73bd72c0bfb0f8b848584cf6fb2a739cf34bbf796c521c02bbbc3ab5e081af7 glibc-langpack-cv-2.28-251.el8_10.2.aarch64.rpm e1a4b008a8903068b6725180541cb559a47c98dc32d606d090852a8aa9e8a959 glibc-langpack-cy-2.28-251.el8_10.2.aarch64.rpm ed13595e4d32971b7efe160b1afb869d77cd0e3dfa25bc069afbb7df6a27ec8f glibc-langpack-da-2.28-251.el8_10.2.aarch64.rpm f9097d0013cd8119e6927080a17f3b237960c02418185fef6914aac021c2a3c7 glibc-langpack-de-2.28-251.el8_10.2.aarch64.rpm b6bc677564c01958a2599be17a5d119fdac1f5ef4858212de136046e3b1f2942 glibc-langpack-doi-2.28-251.el8_10.2.aarch64.rpm bc17357722278512adbac90440f1a35914f744d7aa533513bc32274f88f13c9f glibc-langpack-dsb-2.28-251.el8_10.2.aarch64.rpm 4a18cfe5a2ae881a6198f1867f87529a350fcbafd70039646b4c062152f823ee glibc-langpack-dv-2.28-251.el8_10.2.aarch64.rpm 39ad36209c958c4e08635273f7f24e44fe8d25be8b8331fef8c35773177bdbe2 glibc-langpack-dz-2.28-251.el8_10.2.aarch64.rpm 62e40c8223b474ee84fc3b4880b1e5c487345e93b1bd6236f0c717361b0a3780 glibc-langpack-el-2.28-251.el8_10.2.aarch64.rpm e1931445b2fb1ceea667d9331f8f19c1ab54ca569df6c65ae39f6be252626a90 glibc-langpack-en-2.28-251.el8_10.2.aarch64.rpm 38336752a555dd443e48a69b38c905743ff2967f0118b54b508a76386b9f7e9b glibc-langpack-eo-2.28-251.el8_10.2.aarch64.rpm 1a70e7add4b88aea5e03a24e56ebcb1e29cc72dbb705d2605817ac9f32596b8d glibc-langpack-es-2.28-251.el8_10.2.aarch64.rpm 8cc8a7ca9441adf6992d282157f9bda2c23e0958f892a6f8a5ceb16989b90913 glibc-langpack-et-2.28-251.el8_10.2.aarch64.rpm 18f0a25fe4fa86330ca20e1e7a10b3321be563f967600928f2342374b2a02498 glibc-langpack-eu-2.28-251.el8_10.2.aarch64.rpm aab236840afb39ffeb616129fe9d483a3875e29ff47933e534440b44822632f7 glibc-langpack-fa-2.28-251.el8_10.2.aarch64.rpm 3f33603eb11c6d4fd139766347a1e39b5cfc309d3c54335c059f4478044cf639 glibc-langpack-ff-2.28-251.el8_10.2.aarch64.rpm 0233f3bf3713a6456e5c67ea2e3eedb52b3df0119b10d3710510d4aa39dba857 glibc-langpack-fi-2.28-251.el8_10.2.aarch64.rpm ccf432959d31309a3e13d1357a739808f38c378f3c4635a3d70aeb3d6b8cb054 glibc-langpack-fil-2.28-251.el8_10.2.aarch64.rpm d5363e694b1dfe15eb29604c2e352313b48e8af5aec5fba5859c6c7123416550 glibc-langpack-fo-2.28-251.el8_10.2.aarch64.rpm e1636dfc3cd782c51866da2d815d5f46f30e6d7b5a42c8d4c68c84333cc5250c glibc-langpack-fr-2.28-251.el8_10.2.aarch64.rpm c00fc3030e0d4c716ca86a8e4a8bd4785a3d4fbed3fb2c40aed9056efe3702cb glibc-langpack-fur-2.28-251.el8_10.2.aarch64.rpm f33b144a30edae560c4ba111e8e52779975c8a3734ad965defd26b5e6b7d76df glibc-langpack-fy-2.28-251.el8_10.2.aarch64.rpm 39f444982ddf67400235980aef806e0379d5db9fe440c361f7eac827abd9f1ac glibc-langpack-ga-2.28-251.el8_10.2.aarch64.rpm 4d48f1841ce98a969c12512e0f90c0d49a954460dc5269f064d001c8040f0f08 glibc-langpack-gd-2.28-251.el8_10.2.aarch64.rpm be987b063b7353d307a3f9ca578fa854ae49fc14e1d6629ae2c4f064730c37b7 glibc-langpack-gez-2.28-251.el8_10.2.aarch64.rpm 64fafa61873d7c3d8be8eafde329efc72eba282e6c94b5cc2484a112120e60ef glibc-langpack-gl-2.28-251.el8_10.2.aarch64.rpm 9aa8635f18a1bb13af82b384615e006062a0bc6cf4c9ef21cb6eadd25b3c7b1a glibc-langpack-gu-2.28-251.el8_10.2.aarch64.rpm c9d908d5ee821cc416bd2101b28be2bfe553bb3c0b1ff7f4c4e569369e14a331 glibc-langpack-gv-2.28-251.el8_10.2.aarch64.rpm 9aa0e2b9a475b81ac33888b6c9c10fac2600f88cd058a615c31a7e2a547938ff glibc-langpack-ha-2.28-251.el8_10.2.aarch64.rpm 21fb10606d2429cf1b9e83e04261899a056d7cffc2c81f346c0c99c6f36d943b glibc-langpack-hak-2.28-251.el8_10.2.aarch64.rpm 96bfa56792b3d3d378b4ae3af83e7bad5ade6b367dee8ec7b0fe0d4df2843ab4 glibc-langpack-he-2.28-251.el8_10.2.aarch64.rpm 427398c940f6cc3482476e84b6cc569b1efa8a89542739a4673c98c56be547d5 glibc-langpack-hi-2.28-251.el8_10.2.aarch64.rpm 843c91354e62cefa06fef439189fa4c75503cabc4c3ad430b4293cefa1cbe424 glibc-langpack-hif-2.28-251.el8_10.2.aarch64.rpm e90d49c6f6c6499f01fa0c8df796796c1935dba0ecf97cc8ea3f05aede9b2649 glibc-langpack-hne-2.28-251.el8_10.2.aarch64.rpm 71e474d690a23a408c4f846de2d56c651d3e16c0de82f3a8c5a43372d9eeb59f glibc-langpack-hr-2.28-251.el8_10.2.aarch64.rpm 2ddddfd532ee8dda4af952fe1636eb135390244acdaacce0b31b7d2aa41b7330 glibc-langpack-hsb-2.28-251.el8_10.2.aarch64.rpm 90d5e9d99ca2c6dcfbb1c2e791526f306607412c07ae455c19bdabe2de5f7072 glibc-langpack-ht-2.28-251.el8_10.2.aarch64.rpm 586092a2fb1f01ae5522306269fd0ed0163eace0ca88016acb334cd8c4baac6c glibc-langpack-hu-2.28-251.el8_10.2.aarch64.rpm 21b20071fa37e61b3c0e5e4b355d0b7ff34eda5b96128df42c19909c31d8c56a glibc-langpack-hy-2.28-251.el8_10.2.aarch64.rpm 10a3638c23723d6b86a6de84befdcfa3b393120fcd41e7307cdf4b6bb48e2887 glibc-langpack-ia-2.28-251.el8_10.2.aarch64.rpm 940107dc25482b2d497ef523530842c20bf7d6c2ec6257498bf3c609cc99c84f glibc-langpack-id-2.28-251.el8_10.2.aarch64.rpm 45438439722c4cfbb582ecd6d7863d221acb9f66cf59e3aee858a8726e689acb glibc-langpack-ig-2.28-251.el8_10.2.aarch64.rpm 6e413b917b32850055ed7fcdec05540fbcc923936df9a156d95504401067a710 glibc-langpack-ik-2.28-251.el8_10.2.aarch64.rpm 28702a736efd4808f7d09227a5c2290e640a5880a637c0fb1770374c1fedc54d glibc-langpack-is-2.28-251.el8_10.2.aarch64.rpm 69fb878cb66fbf9274fb02b5bdb537ec6d0814aacaf067d5492049769f8a2e60 glibc-langpack-it-2.28-251.el8_10.2.aarch64.rpm cfa2700e6434db8dce1d6109a2d29d7d7f2d018abd393d628641c31a3a1a1583 glibc-langpack-iu-2.28-251.el8_10.2.aarch64.rpm e66c695b54d0d1b881807c0be95926767c625948dd88c1d5d752be75c8445f1d glibc-langpack-ja-2.28-251.el8_10.2.aarch64.rpm c4d5be4cf3c04386f4c9474152497202e3ec8280db03dc4be233bbfa2f922e32 glibc-langpack-ka-2.28-251.el8_10.2.aarch64.rpm a5104e625f36de73d621beb2de9d5e58d2d2a194568aedb27f8d906c109edb39 glibc-langpack-kab-2.28-251.el8_10.2.aarch64.rpm a7511df59fc93e0b95717bc62cd87003c6f36a6a6f2f4502cfe3c670ffce944d glibc-langpack-kk-2.28-251.el8_10.2.aarch64.rpm f2a507fb11570bfe7b019c12334a9f6e23bb69429625ac04814243f8868bb06f glibc-langpack-kl-2.28-251.el8_10.2.aarch64.rpm ec93226374fbe005f6fd0bb338f003b1ad87a7fa9d1c0140bf48eb6ebabecb2e glibc-langpack-km-2.28-251.el8_10.2.aarch64.rpm 9aeb3a50e36cad7aa186c345ac16905bbe8cf05827c3370f78d199dc8af59239 glibc-langpack-kn-2.28-251.el8_10.2.aarch64.rpm 29ea6d9925d4dd554619ba750c93d145562b9ecbfbc22783b03e769aa572771e glibc-langpack-ko-2.28-251.el8_10.2.aarch64.rpm 52bf5b1029f585380c570175d32590ee948bc804f647aa90be9fd4482a69a698 glibc-langpack-kok-2.28-251.el8_10.2.aarch64.rpm ceced36abc68996173b28302cc07cdc790fc34dfafa1c1ccd5925cdb71e40fd0 glibc-langpack-ks-2.28-251.el8_10.2.aarch64.rpm 95e1798bd4756626358547874c7f92b1df92963b8ee982d2bc11939b043cee45 glibc-langpack-ku-2.28-251.el8_10.2.aarch64.rpm 611a1f5951ca7c750e4a6a1a1383df78bf10c7eba0adcfa65fb4a44225988347 glibc-langpack-kw-2.28-251.el8_10.2.aarch64.rpm 56b6f53de0cc13b9f4aae2f73c0090df0d48f4b95683a4e943feccfd606af578 glibc-langpack-ky-2.28-251.el8_10.2.aarch64.rpm 8976ef39e2f8d7a944a12b9ea5d9e3c9dc89e9ec0764b3a83dbaa83eeb492e57 glibc-langpack-lb-2.28-251.el8_10.2.aarch64.rpm 2b4b291b517d3e5b7fd1c9f0f459066998dfae704796b974e2bda5149488231f glibc-langpack-lg-2.28-251.el8_10.2.aarch64.rpm 74fd503dfd2c58ae6896a8c34ccd7486eff32c3d92ee0ec0912c55cf6ffdd2d3 glibc-langpack-li-2.28-251.el8_10.2.aarch64.rpm 87f7d6ba6f80e8888af590a21fff476026c858505bb994afaf3aadc7d680f0fd glibc-langpack-lij-2.28-251.el8_10.2.aarch64.rpm 58c05b93fedc8351986a9761505c68089de27d2c808b4d49950857001f282bb7 glibc-langpack-ln-2.28-251.el8_10.2.aarch64.rpm 34d42baa6a4f80c51aac5187a862235a65661b50c9291224685d33a840fc63fd glibc-langpack-lo-2.28-251.el8_10.2.aarch64.rpm 5ae0b617df31a779f21e2c3e95bf12b643e718ef0c391cc17ec6f80aae70b302 glibc-langpack-lt-2.28-251.el8_10.2.aarch64.rpm 6ceeee51e41432ca0153fb4f6255fd6fd3b7aad6fed725c48e418715d0dc1b01 glibc-langpack-lv-2.28-251.el8_10.2.aarch64.rpm 0f7f4aaf24cf9b56cd9410a5efc12c1238f168daeff0cb705ba089dcd261a1d4 glibc-langpack-lzh-2.28-251.el8_10.2.aarch64.rpm 793d2f9b1f0693be417e6084f98a8bdcbd0db63339bb8845c0d8b9df61dca77a glibc-langpack-mag-2.28-251.el8_10.2.aarch64.rpm aab7ea570d120b295404486789be663b193986e80bf051deb1f83036a2c4626a glibc-langpack-mai-2.28-251.el8_10.2.aarch64.rpm d3e6a1fabbb321033ba64a40ef50c7cc4dba330cfd2adb561be5495901c53d9f glibc-langpack-mfe-2.28-251.el8_10.2.aarch64.rpm 7673c0d70341b12db34ff23faafa09eaf96d82077e33683725940bdff0b74fee glibc-langpack-mg-2.28-251.el8_10.2.aarch64.rpm d799a75fe732d61f52b002faac526be557e77c9e2410ccf7ac6cbecd3837c269 glibc-langpack-mhr-2.28-251.el8_10.2.aarch64.rpm 9705329ec1b2ef0c404fe4a72087a03cb8e4938ae5d5bdeddea08942286dadf7 glibc-langpack-mi-2.28-251.el8_10.2.aarch64.rpm 0d45f666ede8263f3bd0c3d7d45f26e33d69b41151dbf473a9da6f388fdb6952 glibc-langpack-miq-2.28-251.el8_10.2.aarch64.rpm e8ae170215a7fb9bbdc8131aec96bb9a97d9e100109e1d99bff0ec392f9fb466 glibc-langpack-mjw-2.28-251.el8_10.2.aarch64.rpm 7f8c88cde74f3b8ff944b3aa9b773e692ad5115326c7d2834dfb404ff81c649f glibc-langpack-mk-2.28-251.el8_10.2.aarch64.rpm 5de9a6e1cf4957e62042643d0b815ab513458adce99ed58d7a1a65d7993a76cb glibc-langpack-ml-2.28-251.el8_10.2.aarch64.rpm 5b32b28752928f06920b5b233ff762ec2b75a05c7aefb487aadab793579ac16f glibc-langpack-mn-2.28-251.el8_10.2.aarch64.rpm b1da3f3cb4c8ef61cf2fd4a70d8f3923244b94ac86548460878c86dd758ade90 glibc-langpack-mni-2.28-251.el8_10.2.aarch64.rpm 06decac67589b29b90a964846f7f8c00d0e073ef258eeb239fe2a1878629040c glibc-langpack-mr-2.28-251.el8_10.2.aarch64.rpm 8959e8566eb0132793cbb57b0c182dc192652630d172ccabcf2a4b86edd795d9 glibc-langpack-ms-2.28-251.el8_10.2.aarch64.rpm 7586b78961e4c1b2f29a91353f46a639c8fce3d47252dec281b227312e5049ea glibc-langpack-mt-2.28-251.el8_10.2.aarch64.rpm f31d4d3d5278defad45fc6cb262ce21cbae57df602a4ad95b6cbb8a71cdf9f4b glibc-langpack-my-2.28-251.el8_10.2.aarch64.rpm df05d53dda1efd8797f070411becd587fd936a163f6bde94fbcb336c446e4920 glibc-langpack-nan-2.28-251.el8_10.2.aarch64.rpm e93458e63a427e2cb8e5d91ceb68761622cce95dbf97b6a07275e6ead2ee6806 glibc-langpack-nb-2.28-251.el8_10.2.aarch64.rpm 8328be4603ccb7bc65290c6e1bbc923915463f1f2e8a78c6c98179335bf4673c glibc-langpack-nds-2.28-251.el8_10.2.aarch64.rpm b492154b73a561639bcfe8bb336ac85e7d727bcaaa0f5dc678af641c0abaee06 glibc-langpack-ne-2.28-251.el8_10.2.aarch64.rpm db8b67f409166cdc07c82164fe1adf353f21c28f77c1172eb67282607f8919a2 glibc-langpack-nhn-2.28-251.el8_10.2.aarch64.rpm d0efc9857c917298ddca9af4fac2fb016f60f6107d448abe69d92e9c19419cd6 glibc-langpack-niu-2.28-251.el8_10.2.aarch64.rpm 0c17c6314ad3e641b4e9fe4816a36e1b0a933600b7e5a07ede97f4a87e83642c glibc-langpack-nl-2.28-251.el8_10.2.aarch64.rpm 0d298cfab8c435796470b9e063dae3b2a77d7e98126a7a08544437359ab1d57c glibc-langpack-nn-2.28-251.el8_10.2.aarch64.rpm 89202f7c01d6553724b9b581071fda5e7f38e67a6fea6e4aec1bef3045054ab2 glibc-langpack-nr-2.28-251.el8_10.2.aarch64.rpm 7f15e4b7a369c998b837e782c14ae79ef6f341ef7aece7ddda8f75b57e07b2e6 glibc-langpack-nso-2.28-251.el8_10.2.aarch64.rpm 80f8e57bb9c155669762706af1e1b332e7c77b965da57f2f79931cad6c970845 glibc-langpack-oc-2.28-251.el8_10.2.aarch64.rpm 50cd2e1345c0072052d7f14053256fa9b87161fa8ffaea5aa0f41d59349e3af7 glibc-langpack-om-2.28-251.el8_10.2.aarch64.rpm 4139da0377d453f28b00bfb27835e6524915df48cd609050fa5f83c998513042 glibc-langpack-or-2.28-251.el8_10.2.aarch64.rpm 7c11dbadd1b8e9cf4934217665ecacb130addb57c901c9d9a7bb0ab57533f728 glibc-langpack-os-2.28-251.el8_10.2.aarch64.rpm 03837b9e1beec2bbfb88ef2613a5d58135063de9090154dd300ab39a558c58ee glibc-langpack-pa-2.28-251.el8_10.2.aarch64.rpm 744efc3609951d56cb4beb10fc9cfdecabab0ddd971dcc2e04e16be0a2da2b09 glibc-langpack-pap-2.28-251.el8_10.2.aarch64.rpm bc220743bc79d519a70cc6368129195c99a48906a8f393abf22f39cc295331fd glibc-langpack-pl-2.28-251.el8_10.2.aarch64.rpm 56a06cc77d3e487dae9ab88cd9bcaf66c71aade66f23edc0ffba9c055619f736 glibc-langpack-ps-2.28-251.el8_10.2.aarch64.rpm c6e55032878d3121924949602b61ba58774b163c69f514ed2ee4c21ab634b5a0 glibc-langpack-pt-2.28-251.el8_10.2.aarch64.rpm d8351cb6661f0c258d1e7080db524277633337012323d3bf710a0bb108609e5d glibc-langpack-quz-2.28-251.el8_10.2.aarch64.rpm f9b8bb4f9c974aa338060c60768b24991a93e9d47639e5e19eee8b3373cb6d63 glibc-langpack-raj-2.28-251.el8_10.2.aarch64.rpm 403d5fee68acd1a98a5f564762bba604f7d0400b3a636d6023e6859ecc8f39a4 glibc-langpack-ro-2.28-251.el8_10.2.aarch64.rpm 59d5d7cf94dfa76809b12016bdc1dd0deeaab9141f667330219068af9e485f02 glibc-langpack-ru-2.28-251.el8_10.2.aarch64.rpm 49381e5eb754a5dc117a4898c8b89bce19d0b14c4a5f6fc0ac0be6c07ff28478 glibc-langpack-rw-2.28-251.el8_10.2.aarch64.rpm b5650f27ec25537723af8d94e54117edc230316d3bf22854a126a460b5c700fd glibc-langpack-sa-2.28-251.el8_10.2.aarch64.rpm 4424b0cb6515cbaaeb17683ff7ac377d6cc645832ee2296e269793e10ee43f0a glibc-langpack-sah-2.28-251.el8_10.2.aarch64.rpm 9892a30f78a02e96179226b54cb3d286453a7432fdec7192860a8533c6a0e2a5 glibc-langpack-sat-2.28-251.el8_10.2.aarch64.rpm 9f391db596c3e9ede93e57d7bad6399b38d3cc01296a6f3a66a33baf18923e9e glibc-langpack-sc-2.28-251.el8_10.2.aarch64.rpm 77ea066ca749b2e8a1decffb0bcd56428a8929060e2a8105bec4ef806a1d4f87 glibc-langpack-sd-2.28-251.el8_10.2.aarch64.rpm 47d6d63cb1341d5a5fc37752ca4c43f6a92d77e4f75fcf7a6bebc7d78e4152a0 glibc-langpack-se-2.28-251.el8_10.2.aarch64.rpm a2e041b54772ee75017863980452df0c1e7a5aff38aa33389311ea42b6a48c1f glibc-langpack-sgs-2.28-251.el8_10.2.aarch64.rpm ac4a709b6246adff2ab243c49e8700b4357106a85c5b7c5df8423fd4c107794b glibc-langpack-shn-2.28-251.el8_10.2.aarch64.rpm 74f7c9bcc24c5803840ed2d7035c349b3facc8510ef9dd3da432fa348861a4fa glibc-langpack-shs-2.28-251.el8_10.2.aarch64.rpm 359b71a9e449730df23733f703b8bb270fe7712ce256eb3657f44b842f96f417 glibc-langpack-si-2.28-251.el8_10.2.aarch64.rpm 09ab91f1bd4369d9ee9581e20878951c84433ca29fab90f8e7efdf37ab624209 glibc-langpack-sid-2.28-251.el8_10.2.aarch64.rpm 271648e16236b0f72b6a8f121ae259404368d971cbb6c9ad6162feee40bd301a glibc-langpack-sk-2.28-251.el8_10.2.aarch64.rpm 767ac22d4bf5b1feee0a685b39143ba7223c02ff17b876ba269f9bcde463b902 glibc-langpack-sl-2.28-251.el8_10.2.aarch64.rpm 72b66b33b9be393de4bff05671af84e75bcea1702c26bf527292231fa4a86a8d glibc-langpack-sm-2.28-251.el8_10.2.aarch64.rpm aba916d49424d567ae753cab9512ea7a2411d404557d1cae69822117f7e99973 glibc-langpack-so-2.28-251.el8_10.2.aarch64.rpm 2f83e3480f3ffc7d2d470a5791dd439e8d6ee98b2512efee20f249325d7d5d3b glibc-langpack-sq-2.28-251.el8_10.2.aarch64.rpm fdca1b9118e7f9d1bd61d38c869a00fd3e08f96c2a47a385e6b342fb01f92dee glibc-langpack-sr-2.28-251.el8_10.2.aarch64.rpm cf442e697fcc3c5ac8ee8b81303f74088a8cd38f5f5eb9550f166abc313e7327 glibc-langpack-ss-2.28-251.el8_10.2.aarch64.rpm a4578743534dc3b3255570a902bc069558c5ba78d1d6c8adc7558eecc238bb29 glibc-langpack-st-2.28-251.el8_10.2.aarch64.rpm 119f57eb768493082627d476ae1753c020f20a5581bf5082e4e44c6ac24f7856 glibc-langpack-sv-2.28-251.el8_10.2.aarch64.rpm 4deae2c1d94ee86eedf24b1f83ed70d2b76d0222804615bb75b79ee8b2fb652c glibc-langpack-sw-2.28-251.el8_10.2.aarch64.rpm 98f66c0ecad1639b7efbe52b4009bfcfa0bb5a3c8049a07b2fbe33431239edf9 glibc-langpack-szl-2.28-251.el8_10.2.aarch64.rpm 38e8c98ee77fe7a55ad85cda4358f6d8f2e0a5e2d899614da2cdb4d3e89a6a29 glibc-langpack-ta-2.28-251.el8_10.2.aarch64.rpm 4ec8a9a2a418077208a34bdd0c37cc36eae45af5d91cd403bc32f5cf91a3b477 glibc-langpack-tcy-2.28-251.el8_10.2.aarch64.rpm cbde8ac97f3b47e894847b1f75bb7b65d830bb31b343d3d0a63eee39787fbeaf glibc-langpack-te-2.28-251.el8_10.2.aarch64.rpm 91ef7c62875fe3a2e60f874432b996790567fdeb985c22e84bbbabb99ca14987 glibc-langpack-tg-2.28-251.el8_10.2.aarch64.rpm 6cfcb2ba842958e6af15440909f58278d9120ab9ddc0b93accb8b35671bff5cc glibc-langpack-th-2.28-251.el8_10.2.aarch64.rpm c1fa4edfc79dd8d5c43fc8bd7c0ee7fb1817e0966ca072ddde7bf5feb68c48a2 glibc-langpack-the-2.28-251.el8_10.2.aarch64.rpm fb4ffe73c59365a263c2f5e3824e58cd154bb14007d5ff9aff95a28ae3db5556 glibc-langpack-ti-2.28-251.el8_10.2.aarch64.rpm 10bc1a584d62c739128b56408e959d68a3cd804e456bfe4f98f4578b5e66dec6 glibc-langpack-tig-2.28-251.el8_10.2.aarch64.rpm 8a8ad788e86921f441d2a5447d74db7800aabfeda390f0eddab09fcd8856ac76 glibc-langpack-tk-2.28-251.el8_10.2.aarch64.rpm 7b3f6bb36d3aa06e6af47fb3b1ef77625b19fc2ad0ff19dab5678dd4ebb6d1f0 glibc-langpack-tl-2.28-251.el8_10.2.aarch64.rpm f3c2ec06c717543db7f62737a8cf4f99495314ce963d03d7184fd9ea71aabffa glibc-langpack-tn-2.28-251.el8_10.2.aarch64.rpm faf5e5baff9e695401e8ee2147ac92d0b53a7fb449682e7c06904ee62f3dfbe5 glibc-langpack-to-2.28-251.el8_10.2.aarch64.rpm be2e6f1c52d23ed239c8df1c391ad9de14c7a10e21f2e7fe2670e80105550fb5 glibc-langpack-tpi-2.28-251.el8_10.2.aarch64.rpm 8a8391a3c1dde841182d262cf00837f0284231150d75a08253577b818e1f79fa glibc-langpack-tr-2.28-251.el8_10.2.aarch64.rpm c4ed366308dda16844442368f49af8f5a4b334b53d886e74a9e68c0019dca308 glibc-langpack-ts-2.28-251.el8_10.2.aarch64.rpm dea6bc3a1a78790d3bc4f9329fb724389ea78e69f4fee1bee9fb3ed508225a75 glibc-langpack-tt-2.28-251.el8_10.2.aarch64.rpm 72f0812706b3acbadf0d35561c184827f5db87869918d14531027013a6ad6b0a glibc-langpack-ug-2.28-251.el8_10.2.aarch64.rpm 62f7b56dfe37957bbf342ebb618ab5bf3f3c3b55a6660a2f87d515ec404b45bf glibc-langpack-uk-2.28-251.el8_10.2.aarch64.rpm 1c53e25fb54dc4ab1ab67115f04dd673759855b854dbb0bafbfe03f8d0c25ce9 glibc-langpack-unm-2.28-251.el8_10.2.aarch64.rpm 972c0bd42075b81d360f8d6d4d57e2f55f0ee832e0c8fca929105ea886664ae8 glibc-langpack-ur-2.28-251.el8_10.2.aarch64.rpm 38fe28a53ee1682e664e6331286f03940ed4df9ceaeb08a5571f6cd3eecbc79f glibc-langpack-uz-2.28-251.el8_10.2.aarch64.rpm 3b615a1e9245fde1884aa07d23470b0687eb287d1e981b7f74d60ae30d28529a glibc-langpack-ve-2.28-251.el8_10.2.aarch64.rpm 89aee77d668066fad71f178c59a7288bd2757ac4172259dbef2b412417250e1f glibc-langpack-vi-2.28-251.el8_10.2.aarch64.rpm 213b0ba03ae9acd79c79f28f407e2737f0245a41f06d3467801d94cf366b6e04 glibc-langpack-wa-2.28-251.el8_10.2.aarch64.rpm f211ecc5fb032225ea29c4eb09773f8287a6c303e8882a2a051d702195093571 glibc-langpack-wae-2.28-251.el8_10.2.aarch64.rpm 8fa29d40bb1863f88b032e7ff29b94de76d0a2e7a061564277e29ad51c39a904 glibc-langpack-wal-2.28-251.el8_10.2.aarch64.rpm 5511350e20813e2533d630a539146bc192549dff1e3e8aa2ec7cafde058f7091 glibc-langpack-wo-2.28-251.el8_10.2.aarch64.rpm d7c2dde4aa33e751432c046f9a4f64a081b7211be2e30fafbbe08e93f415fd00 glibc-langpack-xh-2.28-251.el8_10.2.aarch64.rpm d48890498a44b14e4b55cfc404e414fb67f50bc17e1b1b18de5e453f02f12188 glibc-langpack-yi-2.28-251.el8_10.2.aarch64.rpm 6adddda28c63810b4f80d049dba00ed3548c3de685e06792b1975cde1bcd367a glibc-langpack-yo-2.28-251.el8_10.2.aarch64.rpm c3a32cb1dbbffb21f8c74230b35d1361a85b927ebee6540b0abfe13b84849747 glibc-langpack-yue-2.28-251.el8_10.2.aarch64.rpm 875c99501371ddeea4a07d069d2fd67ab51de52615a8dbb8c733233cfb81269d glibc-langpack-yuw-2.28-251.el8_10.2.aarch64.rpm 41037ff0ce13adc5887db53668e458d221b425c4b9bd65ae64d5576e6b8253fe glibc-langpack-zh-2.28-251.el8_10.2.aarch64.rpm 978ce1283eac5d01ff75001472a56eb88dfc10a12ba6980d46d20c22f683a8f7 glibc-langpack-zu-2.28-251.el8_10.2.aarch64.rpm 697140a7f4d7c96ddefd6d028d8d465ba7cebc88c5ed7c21c39b7b5269f2674b glibc-locale-source-2.28-251.el8_10.2.aarch64.rpm 7d899e3728d7c379202abbdafe824d85972ef20783099f9d1e0dde2804c5439d glibc-minimal-langpack-2.28-251.el8_10.2.aarch64.rpm 5906a4b3c4166764a3fb7e9fa09449b625af11a3ecfe0f17d6b0071634f5d632 libnsl-2.28-251.el8_10.2.aarch64.rpm 69119a265e7515f95cdba06747de0448f3f73cc7a9f17c95fd80d62753f0fdcf nscd-2.28-251.el8_10.2.aarch64.rpm ef1b2a7dc6929019735d936e3b70d7492a069a580fbc999aa6eaeb1bd5e9a77f nss_db-2.28-251.el8_10.2.aarch64.rpm fd931e85e0cab317595bbd2a56f8c80ac820ef5e73d58f3750b2e45c958d046a RLSA-2024:3347 Important: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-62.el8_10.rocky.0.aarch64.rpm 6e90cc1eb97818f9c555dae822a056da8173ef57889c30d8751ca2fa5d5b9802 python3-libs-3.6.8-62.el8_10.rocky.0.aarch64.rpm 55f98c59f771e1baf7d32d46d58ca2d2553558f5ddfb41c0ac1a2c2115180381 python3-test-3.6.8-62.el8_10.rocky.0.aarch64.rpm 195cd8d6a0892d94bbdb31591e06328dffb3823e40a4198fd20f259526eecb00 RLBA-2024:3358 polkit bug fix update The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Bug Fix(es): * polkit woken on every logind-session-monitor, executes pkla-compat every time [rhel-8.10.z] (JIRA:Rocky Linux-34029) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Bug Fix(es): * polkit woken on every logind-session-monitor, executes pkla-compat every time [rhel-8.10.z] (JIRA:Rocky Linux-34029) rocky-linux-8-aarch64-baseos-rpms polkit-0.115-15.el8_10.2.aarch64.rpm 832e9e46fb6fad79785c5bc2dbda20893efb70c1718564f004a3db99c9e24e32 polkit-devel-0.115-15.el8_10.2.aarch64.rpm c08ae9bb0b5118a5c54821642ee1ee41dddc5a8b1f49a023efd5cec189385a0e polkit-docs-0.115-15.el8_10.2.noarch.rpm 24198bd5b8ce86b4b06e4f7d605ff3f65ed8d00ee21643881b35af87ee6428dc polkit-libs-0.115-15.el8_10.2.aarch64.rpm c1fa4e34ca24a20bbcfe070fd76855386572f2c7743e17f13943442296068e58 RLBA-2024:3381 tuned bug fix update The tuned packages provide a service that tunes system settings according to a selected profile. Bug Fix(es): * tuned-profiles-sap needs an update for vm.max_map_count [Rocky Linux 8] (JIRA:Rocky Linux-32124) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Bug Fix(es): * tuned-profiles-sap needs an update for vm.max_map_count [Rocky Linux 8] (JIRA:Rocky Linux-32124) rocky-linux-8-aarch64-baseos-rpms tuned-2.22.1-4.el8_10.1.noarch.rpm f900b6cd20f9e14d8364dd0dd82db34a638762d469423dd02ab633d238997e13 tuned-profiles-atomic-2.22.1-4.el8_10.1.noarch.rpm 9b1b3d5f313c2af1ad180eeaa9e964444e4059a143cea35964fe88319a4b0ad5 tuned-profiles-compat-2.22.1-4.el8_10.1.noarch.rpm 66d03ce05980bd92d0890ffbcc1220685127addd1b3e24fd73535313ce362201 tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.1.noarch.rpm 0166597a16e1976563c2ee53be27ba16649091e3ab92d4b24160e1c8a841c403 tuned-profiles-mssql-2.22.1-4.el8_10.1.noarch.rpm e0e075ee3e7fd6c871837aa34482590021f94735cee4a1e8d872dec24fbdb777 tuned-profiles-oracle-2.22.1-4.el8_10.1.noarch.rpm 2e949f7758e994826f506e1889ed2caf38be6f24692aa982591be3f15c015c02 RLSA-2024:3618 Moderate: kernel update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340) * kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744) * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593) * kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445) * kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603) * kernel: use after free in i2c (CVE-2019-25162) * kernel: i2c: validate user data in compat ioctl (CVE-2021-46934) * kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() (CVE-2020-36777) * kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477) * kernel: mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055) * kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump (CVE-2024-26615) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307) * kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565) * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578) * kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528) * kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520) * kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513) * kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118) * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610) * kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643) * kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642) * kernel: i2c: i801: Don&#39;t generate an interrupt on bus reset (CVE-2021-47153) * kernel: xhci: handle isoc Babble and Buffer Overrun events properly (CVE-2024-26659) * kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664) * kernel: wifi: mac80211: fix race condition on enabling fast-xmit (CVE-2024-26779) * kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744) * kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743) * kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185) * kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901) * kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872) * kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919) * kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964) * kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934) * kernel: USB: core: Fix deadlock in port &#34;disable&#34; sysfs attribute (CVE-2024-26933) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) * kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973) * kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (CVE-2024-27059) * kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013) * kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171) * kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669) * kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439) * kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594) * kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340) * kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744) * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593) * kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445) * kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603) * kernel: use after free in i2c (CVE-2019-25162) * kernel: i2c: validate user data in compat ioctl (CVE-2021-46934) * kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() (CVE-2020-36777) * kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477) * kernel: mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055) * kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump (CVE-2024-26615) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307) * kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565) * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578) * kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528) * kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520) * kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513) * kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118) * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610) * kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643) * kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642) * kernel: i2c: i801: Don&#39;t generate an interrupt on bus reset (CVE-2021-47153) * kernel: xhci: handle isoc Babble and Buffer Overrun events properly (CVE-2024-26659) * kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664) * kernel: wifi: mac80211: fix race condition on enabling fast-xmit (CVE-2024-26779) * kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744) * kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743) * kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185) * kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901) * kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872) * kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919) * kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964) * kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934) * kernel: USB: core: Fix deadlock in port &#34;disable&#34; sysfs attribute (CVE-2024-26933) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) * kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973) * kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (CVE-2024-27059) * kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013) * kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171) * kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669) * kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439) * kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594) * kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595) rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-553.5.1.el8_10.aarch64.rpm 1046b7a54e11e2a41b469ac3487352a783b36367804b1511b6df104da4b4aa09 kernel-4.18.0-553.5.1.el8_10.aarch64.rpm 205cf94e3ebde571c66059b1eea24b46504bbe9d81cc8b7ba32f014f44efa14f kernel-abi-stablelists-4.18.0-553.5.1.el8_10.noarch.rpm 90980b327ea205a51346967228b957b96581042d62de488c25b7240cfa923a96 kernel-core-4.18.0-553.5.1.el8_10.aarch64.rpm a6e53d6d10f30eeff0b62b4fa3f980a7d4b04f76b9c5bb03c6477b5d9cb4c193 kernel-cross-headers-4.18.0-553.5.1.el8_10.aarch64.rpm efc2f030fddcad77a03c8a43d46fb9fa1e314ccb1836db87eab509662a4afd77 kernel-debug-4.18.0-553.5.1.el8_10.aarch64.rpm 437ef16a1c9fdccc53981350f922ef9de1ebe12c63c800d2a3af44eead7b4621 kernel-debug-core-4.18.0-553.5.1.el8_10.aarch64.rpm 7fe2c8bc3f691f4146fb5686228005e994b7bdd62223654da3361f62a5dfe9ee kernel-debug-devel-4.18.0-553.5.1.el8_10.aarch64.rpm b2ea4f42efe4ee822e855d2e1b463fdae8e179acb0b949b64dab82e93d666829 kernel-debuginfo-common-aarch64-4.18.0-553.5.1.el8_10.aarch64.rpm 0c0d3546474f0aefd21391a32aed4da31651ff27d92350f0598ebe1499160f25 kernel-debug-modules-4.18.0-553.5.1.el8_10.aarch64.rpm ad543c68e1475545507265a2a3a79f2479845b06f7dd8ebc55342a8b3a023007 kernel-debug-modules-extra-4.18.0-553.5.1.el8_10.aarch64.rpm 3c26672bfc70ecf700cedde90a717551f8cc7c04c2f63cec9fd029f419d1a9f0 kernel-devel-4.18.0-553.5.1.el8_10.aarch64.rpm af6ac7e85249e4ee72851128ea7d8099ed1c5cf775d0c35776d625517019117d kernel-doc-4.18.0-553.5.1.el8_10.noarch.rpm cd20284242d611eb16894f2de6b0f29b145993ccfea76de1ace9805be0a1390f kernel-headers-4.18.0-553.5.1.el8_10.aarch64.rpm b72107f3ecd2385bc2822b891c6c430124088af2df5c7c9e046d5f71f57e17c1 kernel-modules-4.18.0-553.5.1.el8_10.aarch64.rpm bf73544ae9fbf7cd8b2f57886369eeaa7e9c58469591bd907bc5163e6fa6ca06 kernel-modules-extra-4.18.0-553.5.1.el8_10.aarch64.rpm bc4370aadd8a9ac60edb70d43f82d911112253281a4d23d74eaa8b068521c06d kernel-tools-4.18.0-553.5.1.el8_10.aarch64.rpm 4096d4d01f74c6262984c20ed4c7ab9a5ef1f076434cdefbb53ff860d201682a kernel-tools-libs-4.18.0-553.5.1.el8_10.aarch64.rpm e59535b82fe5fdd5cdd5a2a2c1879a65c4600709f4571558b0762668d64fd02e perf-4.18.0-553.5.1.el8_10.aarch64.rpm f6bce0e2945e3bd01f4c8e667d829db56be2cd119689793628f80c664dec9626 python3-perf-4.18.0-553.5.1.el8_10.aarch64.rpm 1b6dd39f46f3e8f04f78d072ea41dbee406776bdeff47bd1e2983a6a87270523 RLSA-2024:3626 Moderate: libxml2 security update The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: use-after-free in XMLReader (CVE-2024-25062) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: use-after-free in XMLReader (CVE-2024-25062) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libxml2-2.9.7-18.el8_10.1.aarch64.rpm 675c79fbf20764842be0361e5a3462e7053b60f069395ad71c534f0765745e3f python3-libxml2-2.9.7-18.el8_10.1.aarch64.rpm e6ccd07f16e53b00bd36d32f2b676ffff9eec7c30e8254ec7893be7693f723ae RLSA-2024:3667 Moderate: cockpit security update Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Security Fix(es): * cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Security Fix(es): * cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms cockpit-310.4-1.el8_10.aarch64.rpm 29a84e4438d05a00b0c88f4393a45cf2b7370e3ff0dbfdafb31e3df7ec89bdba cockpit-bridge-310.4-1.el8_10.aarch64.rpm fae84310a3a769a6c25bf7a1f23361276e3b03ac54816d29ed77076bbeabd09a cockpit-doc-310.4-1.el8_10.noarch.rpm 2fc98216866ffe728743849c8bd1e9e876b32579f57c9b8e172bf2da30594393 cockpit-system-310.4-1.el8_10.noarch.rpm 342a2a051327d592f2fcd641aa4ab0426d1b1fa7bd74297208f5ee64a017fa31 cockpit-ws-310.4-1.el8_10.aarch64.rpm b7361ec5b1ae1d861bbcf61025dc8ad29a0958d99160fb959563ff7a4f0dd762 RLBA-2024:4049 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * rebase sos to 4.7.1 in Rocky Linux8.10 (Rocky Linux-32104) * rebase sos to 4.7.1 in Rocky Linux9.4 (Rocky Linux-32106) * sos clean on an existing archive fails to clean anything (Rocky Linux-35945) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * rebase sos to 4.7.1 in Rocky Linux8.10 (Rocky Linux-32104) * rebase sos to 4.7.1 in Rocky Linux9.4 (Rocky Linux-32106) * sos clean on an existing archive fails to clean anything (Rocky Linux-35945) rocky-linux-8-aarch64-baseos-rpms sos-4.7.1-3.el8_10.noarch.rpm 9f99fa4998fc4a7fd86109cbf7352835dd81177932336ce2ef4083c4b21369d4 sos-audit-4.7.1-3.el8_10.noarch.rpm caf87c9a2a6b3179bb70ed0cdc2fe7b38eafd183aa5a37624644c663cf9f1cfc RLSA-2024:4211 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001) * kernel: ovl: fix leaked entry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585) * kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845) * kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007) * kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615) * kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906) * kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head (CVE-2024-35888) * kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813) * kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783) * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361) * Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048) * [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130) * Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195) * Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001) * kernel: ovl: fix leaked entry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585) * kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845) * kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007) * kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615) * kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906) * kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head (CVE-2024-35888) * kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813) * kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783) * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361) * Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048) * [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130) * Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195) * Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-553.8.1.el8_10.aarch64.rpm b19eec2b4be76447569f444ade60100d73a635cc64abcd5407f3735d7b5da9d3 kernel-4.18.0-553.8.1.el8_10.aarch64.rpm aafd71e39ead82a449d52facf742c5fec5e43df7769b900bdb63dc72e241b4d7 kernel-abi-stablelists-4.18.0-553.8.1.el8_10.noarch.rpm ce28a833ec84dd9475cf080053603a0d7ee70408d9b343ecb7798f1d8f45c4ef kernel-core-4.18.0-553.8.1.el8_10.aarch64.rpm 4395669fcd992f3a71c427ef3ec1854b02c482ea51574225e653b3b2bbf59822 kernel-cross-headers-4.18.0-553.8.1.el8_10.aarch64.rpm f929f8103b8cd0dd1f8c71b4fb9d2c3a7b730a99f34314fc785fa3dd0346c471 kernel-debug-4.18.0-553.8.1.el8_10.aarch64.rpm d83c6e8ed6273008bed8eafbb417a484637e819ededc9874945ebd7f0a56f55f kernel-debug-core-4.18.0-553.8.1.el8_10.aarch64.rpm 9eefa107a2671bfd716f38cd884aa6fcb6d8ede941a621ebae70639a7d44551f kernel-debug-devel-4.18.0-553.8.1.el8_10.aarch64.rpm ffde5265320a11835a17930163e5124b6fb5f082a94b3c12669a7f163c19d1ab kernel-debuginfo-common-aarch64-4.18.0-553.8.1.el8_10.aarch64.rpm ab449f3ceace44574235f6384778840f3a6a577fec7ef41eae3eacfd6315469d kernel-debug-modules-4.18.0-553.8.1.el8_10.aarch64.rpm f2f63a1935bc384d3aefc3a3103324146cff08e9bdc056e09a3998beff76b4e7 kernel-debug-modules-extra-4.18.0-553.8.1.el8_10.aarch64.rpm b68ebb6b9fc9ae54634acc46b2164e3ab21c0ad4952e45457c667f8b437e6480 kernel-devel-4.18.0-553.8.1.el8_10.aarch64.rpm 411b71af70e92337e48d2b2423eb17326417d16778cab2f282ce2db2410240ad kernel-doc-4.18.0-553.8.1.el8_10.noarch.rpm a8717793a235f885bcc55160aa46c8e0b5897f0a3928d19927ceabfefd3b2fb3 kernel-headers-4.18.0-553.8.1.el8_10.aarch64.rpm fc0ca199a62a3e228e3022dfce222f4d1508b29ac7f164c5dddfe1df065274b8 kernel-modules-4.18.0-553.8.1.el8_10.aarch64.rpm 2242cde807c3819ed9cca491e159722506e17728efaa71c87943be7f03925f1c kernel-modules-extra-4.18.0-553.8.1.el8_10.aarch64.rpm 1c7776afbb1430ef5f08a801e1444e54b1c375ac2a44bc379db86cb1d71b170b kernel-tools-4.18.0-553.8.1.el8_10.aarch64.rpm 3514664e537d43ca06e401bd32dbf0d7d099bb5e3bb00d9c6577a06117dc7340 kernel-tools-libs-4.18.0-553.8.1.el8_10.aarch64.rpm c133b45df18e4759f037b880a67df8f3e3bd08570ac96ff53cd0cd92cd2e0317 perf-4.18.0-553.8.1.el8_10.aarch64.rpm c8a55819240971ce459bc627009fefd68ffee9a822d62bff8f13c1411259e2d9 python3-perf-4.18.0-553.8.1.el8_10.aarch64.rpm 7cc8058673d31bd319acdd92e211db56178b3acefeb44f6824716ee88db2b059 RLSA-2024:4620 Important: libndp security update Libndp is a library (used by NetworkManager) that provides a wrapper for the IPv6 Neighbor Discovery Protocol. It also provides a tool named ndptool for sending and receiving NDP messages. Security Fix(es): * libndp: buffer overflow in route information length field (CVE-2024-5564) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libndp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libndp is a library (used by NetworkManager) that provides a wrapper for the IPv6 Neighbor Discovery Protocol. It also provides a tool named ndptool for sending and receiving NDP messages. Security Fix(es): * libndp: buffer overflow in route information length field (CVE-2024-5564) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libndp-1.7-7.el8_10.aarch64.rpm dbbf584d6b0007fbbe8e3fa264f6e786af0184f85901629dbfce83a1df572d5e RLSA-2024:5101 Important: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451) * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939) * kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622) * kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669) * kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802) * kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843) * kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878) * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653) * kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823) * kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658) * kernel: ext4: fix corruption during on-line resize (CVE-2024-35807) * kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801) * kernel: dyndbg: fix old BUG_ON in &gt;control parser (CVE-2024-35947) * kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893) * kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876) * kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864) * kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845) * (CVE-2023-28746) * (CVE-2023-52847) * (CVE-2021-47548) * (CVE-2024-36921) * (CVE-2024-26921) * (CVE-2021-47579) * (CVE-2024-36927) * (CVE-2024-39276) * (CVE-2024-33621) * (CVE-2024-27010) * (CVE-2024-26960) * (CVE-2024-38596) * (CVE-2022-48743) * (CVE-2024-26733) * (CVE-2024-26586) * (CVE-2024-26698) * (CVE-2023-52619) Bug Fix(es): * Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678) * [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841) * [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941) * lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437) * [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074) * Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167) * blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939) * (JIRA:Rocky Linux-31798) * (JIRA:Rocky Linux-10263) * (JIRA:Rocky Linux-40901) * (JIRA:Rocky Linux-43547) * (JIRA:Rocky Linux-34876) Enhancement(s): * [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451) * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939) * kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622) * kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669) * kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802) * kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843) * kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878) * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653) * kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823) * kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658) * kernel: ext4: fix corruption during on-line resize (CVE-2024-35807) * kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801) * kernel: dyndbg: fix old BUG_ON in &gt;control parser (CVE-2024-35947) * kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893) * kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876) * kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864) * kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845) * (CVE-2023-28746) * (CVE-2023-52847) * (CVE-2021-47548) * (CVE-2024-36921) * (CVE-2024-26921) * (CVE-2021-47579) * (CVE-2024-36927) * (CVE-2024-39276) * (CVE-2024-33621) * (CVE-2024-27010) * (CVE-2024-26960) * (CVE-2024-38596) * (CVE-2022-48743) * (CVE-2024-26733) * (CVE-2024-26586) * (CVE-2024-26698) * (CVE-2023-52619) Bug Fix(es): * Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678) * [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841) * [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941) * lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437) * [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074) * Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167) * blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939) * (JIRA:Rocky Linux-31798) * (JIRA:Rocky Linux-10263) * (JIRA:Rocky Linux-40901) * (JIRA:Rocky Linux-43547) * (JIRA:Rocky Linux-34876) Enhancement(s): * [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-553.16.1.el8_10.aarch64.rpm 6b3836ba09a71ab666574f17c86c3931ccb5e303df8efe5218d2df10be919fe0 kernel-4.18.0-553.16.1.el8_10.aarch64.rpm 142a29e01123d55fec665cf04bfd6e0c684fa1f003f364398956bdc675e480eb kernel-abi-stablelists-4.18.0-553.16.1.el8_10.noarch.rpm dda1de03cb73fb30ba5e07ebf6e6545abaec396b191e59181a82393c773a5b90 kernel-core-4.18.0-553.16.1.el8_10.aarch64.rpm 5b07e242db12f43a5d49b9476153a9175cc09b49b9a53c846adafb26cc08a15e kernel-cross-headers-4.18.0-553.16.1.el8_10.aarch64.rpm 08bc6f7e81ad03de6d63e4655eaaaa9f46f8c9867349d57ff22490f87a22c9b9 kernel-debug-4.18.0-553.16.1.el8_10.aarch64.rpm 270bcfc7e68cb5519c996fd19c091e97290303157c0e9ff3b957a481ead2e20b kernel-debug-core-4.18.0-553.16.1.el8_10.aarch64.rpm 1494c0e854ba798302953d72e718f3666be54aa089c65fd2cfae6f0bddbc1a39 kernel-debug-devel-4.18.0-553.16.1.el8_10.aarch64.rpm 3d9f786253454dbd1789bfa0d2d16f8053413bebdd3e57b9f547fb67ecc3a138 kernel-debuginfo-common-aarch64-4.18.0-553.16.1.el8_10.aarch64.rpm fe0871d51685db8ba100e0e90a7b9f54ed1b56f0ef1f7f4cd939b48a86401558 kernel-debug-modules-4.18.0-553.16.1.el8_10.aarch64.rpm 10c41d5f5bae863a66646a34a08b350f828ec104fad33b4f4872595937d12a86 kernel-debug-modules-extra-4.18.0-553.16.1.el8_10.aarch64.rpm 54eec3229232000f6e56027fb159ec6b88c6fb1b4b002e5df4627e7e8afd93c9 kernel-devel-4.18.0-553.16.1.el8_10.aarch64.rpm a2ab5e49efd83282c408bc89ccce5db39db56f934c7e4d013bcf9adfc3606496 kernel-doc-4.18.0-553.16.1.el8_10.noarch.rpm 8fb650a74d20d34146b9a685185018288e5afb32478ff15368b5d1336207ce4a kernel-headers-4.18.0-553.16.1.el8_10.aarch64.rpm b2647fa9fd620e1f7866606471af8661fdfdf1ed94bd6caaaee31d8c7cd56e67 kernel-modules-4.18.0-553.16.1.el8_10.aarch64.rpm fa006f8f9ad60e9383775c5427e96e88c7695379ad09338b72a02a299637a60e kernel-modules-extra-4.18.0-553.16.1.el8_10.aarch64.rpm 2ea551c900e3468d4dc46968a286ff5266e4222ad547c99f74944b4dcf2d8318 kernel-tools-4.18.0-553.16.1.el8_10.aarch64.rpm 1ca29eb9913dd9ac8e3f8334cd4771dd323a24a2d46fe33b617523bd52deccbb kernel-tools-libs-4.18.0-553.16.1.el8_10.aarch64.rpm 6933cd0b74693d1752c7095caf01be0d7517a93f389585ba93781bf51ade9f77 perf-4.18.0-553.16.1.el8_10.aarch64.rpm 10236c8a1524ca7f037b63cae84544c90d2d4a5df3d1c0c9bfab56e782ddc5dc python3-perf-4.18.0-553.16.1.el8_10.aarch64.rpm 24c58ddf46a18ee8abe30912bd855b14ea4f11868b87ba23b10ee5954d3cbcde RLSA-2024:5530 Important: python-setuptools security update The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-setuptools-39.2.0-8.el8_10.noarch.rpm 1d939bb64adcd70c11c2dba4da66d123036ba303719fab3d2e6b0b1f742efd7e python3-setuptools-39.2.0-8.el8_10.noarch.rpm bcb685f02a8d2bfeed90454e42b001cffae87ef80c1572822cbb769fe8092bbc python3-setuptools-wheel-39.2.0-8.el8_10.noarch.rpm bac06e301b93b49d498016a0cf652ee297826f034db5ddb288df1834b48a5b9a RLBA-2024:5915 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [rebase] rebase sos to 4.7.2 in Rocky Linux8.10 (JIRA:Rocky Linux-49779) * sos report dracut module takes 100s when using rpm-ostree (JIRA:Rocky Linux-33703) * Capture the output of 'tunegfs2' for GFS2 filesystems. (JIRA:Rocky Linux-40871) * [rebase] rebase sos to 4.7.2 in Rocky Linux9.4 (JIRA:Rocky Linux-49781) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [rebase] rebase sos to 4.7.2 in Rocky Linux8.10 (JIRA:Rocky Linux-49779) * sos report dracut module takes 100s when using rpm-ostree (JIRA:Rocky Linux-33703) * Capture the output of 'tunegfs2' for GFS2 filesystems. (JIRA:Rocky Linux-40871) * [rebase] rebase sos to 4.7.2 in Rocky Linux9.4 (JIRA:Rocky Linux-49781) rocky-linux-8-aarch64-baseos-rpms sos-4.7.2-2.el8_10.noarch.rpm 0526fdfbcaf20373a0925fbe826d750203c0ea7cb6fbdc894a3e519c8f7e20ec sos-audit-4.7.2-2.el8_10.noarch.rpm 602d86eca0007b964acc1593de700af8757d63fd018fc37a405d8c5bbb95f69a RLSA-2024:6422 Important: bubblewrap and flatpak security update Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces. Security Fix(es): * flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for flatpak, bubblewrap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces. Security Fix(es): * flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bubblewrap-0.4.0-2.el8_10.aarch64.rpm 53394b2034d43bdb0419d5bfcee776c64937902bf8e1499cfdf9eadb8d2282cb RLSA-2024:6975 Moderate: python3 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-67.el8_10.rocky.0.aarch64.rpm cea4646859150876bc31f21af5e7c003428720fd7b2d13184d00518e4afa7071 python3-libs-3.6.8-67.el8_10.rocky.0.aarch64.rpm 1e8eace4ae738eb6f5e495066d0ec9ff35397b9ed3a3a21db9d0f6b4f8d5065e python3-test-3.6.8-67.el8_10.rocky.0.aarch64.rpm 28513f9be94885a7150bb024a60b8b126fc1f497556acb0073c87860a4775c2a RLBA-2024:6976 findutils bug fix update The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments. Bug Fix(es): * findutils-4.9.0-8.el10: Rocky Linux SAST Automation: address 1 High impact true positive(s) [rhel-8.10.z] (JIRA:Rocky Linux-45720) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for findutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments. Bug Fix(es): * findutils-4.9.0-8.el10: Rocky Linux SAST Automation: address 1 High impact true positive(s) [rhel-8.10.z] (JIRA:Rocky Linux-45720) rocky-linux-8-aarch64-baseos-rpms findutils-4.6.0-23.el8_10.aarch64.rpm f55e81aa1d3994e10fdfdd8c6be02cde0a6b9cf7fad4d43352b5d45647d4ab09 RLBA-2024:6977 systemd bug fix update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * [spec] do not create symlink /etc/systemd/system/syslog.service (JIRA:Rocky Linux-13179) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * [spec] do not create symlink /etc/systemd/system/syslog.service (JIRA:Rocky Linux-13179) rocky-linux-8-aarch64-baseos-rpms systemd-239-82.el8_10.2.aarch64.rpm ee4866b4947ecc34ce13cd563a7163b352014dae115e3ccb1e55731ffbc72cb2 systemd-container-239-82.el8_10.2.aarch64.rpm c5e75174250994cfc1f81afbcab7b6d84410b0bb1ceb599b9fb17b774854ae75 systemd-devel-239-82.el8_10.2.aarch64.rpm e42ea185b08b30b7895d9db0e5437da5d97dc624fe329f1f56f3c52e9f8b65c6 systemd-journal-remote-239-82.el8_10.2.aarch64.rpm 26109e665c6765443210376b5e5fc241f5e8dd08dc78d1c59a7e7ad96abcc6a8 systemd-libs-239-82.el8_10.2.aarch64.rpm fa25bf5a8358df8087a4cff54f2731be076a3282cbc8c676ccb2ac801c19ea16 systemd-pam-239-82.el8_10.2.aarch64.rpm 25c33dfe981562aa04220bb519c728bb6755011478efc6af4001db87a3121d33 systemd-tests-239-82.el8_10.2.aarch64.rpm fc605eeacd1cdfa3d7b8157619ab9c2b1e62edb4dc19d20ce0d6bb5b9eb391df systemd-udev-239-82.el8_10.2.aarch64.rpm b3c83fbc1b9752821d3d18294ad601c17d77dbbbffb4f03ed1dd533c5caa5693 RLBA-2024:6980 kexec-tools bug fix update The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * The dracut-module-setup.sh interface renaming regex is not accurate (JIRA:Rocky Linux-47130) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * The dracut-module-setup.sh interface renaming regex is not accurate (JIRA:Rocky Linux-47130) rocky-linux-8-aarch64-baseos-rpms kexec-tools-2.0.26-14.el8_10.2.aarch64.rpm 4f8fb1b5459e78eb4dcdfd234a161e8ae5925826fa719def58c16f268d200834 RLBA-2024:6981 libldb bug fix update The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. Bug Fix(es): * libldb performance regression with indexes [rhel-8] (JIRA:Rocky Linux-12109) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. Bug Fix(es): * libldb performance regression with indexes [rhel-8] (JIRA:Rocky Linux-12109) rocky-linux-8-aarch64-baseos-rpms ldb-tools-2.8.0-1.el8_10.aarch64.rpm fe396245e08d5bf4cded8141f05551e7b00cfa4b3e16c715327caf38a9d27d83 libldb-2.8.0-1.el8_10.aarch64.rpm adf179bd6fc6f78c8c911d305b48885701f99382bb42ee31ec22fa8dffa73f41 libldb-devel-2.8.0-1.el8_10.aarch64.rpm c7898402c02e6dda32f8c8eeb84b1013bffdc843f56c51e235d9b015197bdda9 python3-ldb-2.8.0-1.el8_10.aarch64.rpm 4a47274f5a45ee2078829aa670c64e5bcab7e9a1421f7e8800fada6b7d5836a8 RLBA-2024:6982 blktrace bug fix update The blktrace packages contain a number of utilities to record the I/O trace information for the kernel to user space, and utilities to analyze and view the trace information. Bug Fix(es): * Rocky Linux 8.9 - blktrace is still running after duration time exceeded (JIRA:Rocky Linux-17500) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for blktrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The blktrace packages contain a number of utilities to record the I/O trace information for the kernel to user space, and utilities to analyze and view the trace information. Bug Fix(es): * Rocky Linux 8.9 - blktrace is still running after duration time exceeded (JIRA:Rocky Linux-17500) rocky-linux-8-aarch64-baseos-rpms blktrace-1.2.0-11.el8_10.aarch64.rpm 5495844d8f01ef918d0a5970317cb874975038370c50ba6df8e56ea42475fa42 RLBA-2024:6983 libuser bug fix and enhancement update The libuser library implements a standardized interface for manipulating and administering user and group accounts. The library uses pluggable back-ends to interface to its data sources. Sample applications modeled after those included with the shadow password suite are included. Bug Fix(es) and Enhancement(s): * [libuser] Rocky Linux 8.9 Tier 0 Localization (JIRA:Rocky Linux-12111) * libuser: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-35578) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libuser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libuser library implements a standardized interface for manipulating and administering user and group accounts. The library uses pluggable back-ends to interface to its data sources. Sample applications modeled after those included with the shadow password suite are included. Bug Fix(es) and Enhancement(s): * [libuser] Rocky Linux 8.9 Tier 0 Localization (JIRA:Rocky Linux-12111) * libuser: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-35578) rocky-linux-8-aarch64-baseos-rpms libuser-0.62-26.el8_10.aarch64.rpm aa346e71adb57bde427acde785dae8baa06a8b477f17111cdb33fd9af35106e4 python3-libuser-0.62-26.el8_10.aarch64.rpm 913394a1665623f0901048c8132159c9d1acbf0b8eea63650981d27a7b8ac627 RLSA-2024:6986 Low: nano security update GNU nano is a small and friendly text editor. Security Fix(es): * nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file (CVE-2024-5742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for nano. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU nano is a small and friendly text editor. Security Fix(es): * nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file (CVE-2024-5742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms nano-2.9.8-3.el8_10.aarch64.rpm bb8259e4b53d3df1bcf44d3ef5081251ba9375e43d3133de8153615ba273dffe RLSA-2024:6989 Moderate: expat security update Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490) * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) * libexpat: integer overflow (CVE-2024-45492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490) * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) * libexpat: integer overflow (CVE-2024-45492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms expat-2.2.5-15.el8_10.aarch64.rpm e727002516741d5650ed8fedb3ae55569d4fd09da8647d51f3e37958c43a41a6 expat-devel-2.2.5-15.el8_10.aarch64.rpm a090e871cdba8831c33d042806e5a1eebea2d49c629ced896f08bca8ccfe5a85 RLSA-2024:7848 Low: openssl security update OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms openssl-1.1.1k-14.el8_10.aarch64.rpm 53eccaf2222240eed709f8390330e0fda0681f4f9a3aafda0bbc8208a6d4f635 openssl-devel-1.1.1k-14.el8_10.aarch64.rpm 860556f9963a6f5ee7275253a285363800c9a934f72c5f026b58f19302db653f openssl-libs-1.1.1k-14.el8_10.aarch64.rpm fe53b5c40868924c56555654c8fef65e3c71006717a75bcba5ddd99c0310bd94 openssl-perl-1.1.1k-14.el8_10.aarch64.rpm 862bbf6c032e482ea639cd7133698d03ab1a984585388b1fca8ba693015bbde3 RLBA-2024:8805 tzdata bug fix and enhancement update The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2024b, which addresses recent changes. Notably: * This is an optional update. This update does not contain any urgent time zone changes. * Several changes to improve historical data and conformance. * A variety of changes documented in detail in the NEWS file. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2024b, which addresses recent changes. Notably: * This is an optional update. This update does not contain any urgent time zone changes. * Several changes to improve historical data and conformance. * A variety of changes documented in detail in the NEWS file. rocky-linux-8-aarch64-baseos-rpms tzdata-2024b-4.el8.noarch.rpm f414a56c04ba79814455084acd08fdb629ec60f262b38536458f70538d870767 RLEA-2024:8852 libproxy bug fix and enhancement update The libproxy packages provide a library that handles all the details of proxy configuration. The libproxy library provides a stable external API, dynamic adjustment to changing network topology, and small core footprint. It does not use external dependencies within the libproxy core, however libproxy plug-ins may have dependencies. Bug Fix(es) and Enhancement(s): * libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [rhel-8.10.0] (JIRA:Rocky Linux-30660) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libproxy packages provide a library that handles all the details of proxy configuration. The libproxy library provides a stable external API, dynamic adjustment to changing network topology, and small core footprint. It does not use external dependencies within the libproxy core, however libproxy plug-ins may have dependencies. Bug Fix(es) and Enhancement(s): * libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [rhel-8.10.0] (JIRA:Rocky Linux-30660) rocky-linux-8-aarch64-baseos-rpms libproxy-0.4.15-5.5.el8_10.aarch64.rpm 98abb8856c9d5473ed9d6026b1b88b87e73deafff1aadf27c6237a5a1ab639a8 python3-libproxy-0.4.15-5.5.el8_10.noarch.rpm 8cef7931b27c0f17dff2d75c16d7234fab2334523d64c49271939e4c1f77a7f7 RLBA-2024:8854 grub2 bug fix update The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es): * BLS snippets in /boot/loader/entries are improperly labeled with "module_object_t" SELinux context (JIRA:Rocky Linux-4395) * [Rocky Linux8.10/Grub/SCAP/Bug] conflicting requirements of permissions on grub2-pc grub.cfg (JIRA:Rocky Linux-58835) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es): * BLS snippets in /boot/loader/entries are improperly labeled with "module_object_t" SELinux context (JIRA:Rocky Linux-4395) * [Rocky Linux8.10/Grub/SCAP/Bug] conflicting requirements of permissions on grub2-pc grub.cfg (JIRA:Rocky Linux-58835) rocky-linux-8-aarch64-baseos-rpms grub2-common-2.02-158.el8_10.rocky.0.1.noarch.rpm 7ac05d14c767cf0b47b36e9db8242fbae280a60e47ed42b10940d6b376db1031 grub2-efi-aa64-2.02-158.el8_10.rocky.0.1.aarch64.rpm 153d0cd12f1ccd16039b434c319de2153aa52d48963b299dc031227b1c25bf58 grub2-efi-aa64-cdboot-2.02-158.el8_10.rocky.0.1.aarch64.rpm 82714dda4769d21e5154b6183cb7c52ff24aebbc0f7cf4f541ddcc29f26a53c1 grub2-efi-aa64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 5814cbf5ac6d266f94d1c08f39d4d02fb96cdd3b103709b30cee8dc5796ee555 grub2-efi-ia32-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 90a64a141a8111b7f4f7f219ff54530a0d5687992f563f77f0125701b265e835 grub2-efi-x64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 8c01f46d0353c0234a2458f0430e723a1b66ea6c69b047088ceec25e120b11f5 grub2-pc-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 21193ab9db8e8a345171e3737ee71a65e7d506423fbf9062865bca245d3fc8f8 grub2-tools-2.02-158.el8_10.rocky.0.1.aarch64.rpm df4c149e44c58f51eeba3bb8714c39f5f85965acaea17dd16b25e36b36e9f1d7 grub2-tools-extra-2.02-158.el8_10.rocky.0.1.aarch64.rpm d1497b60b6e35edccc10d3b2f1d818416dbde275f2c94eb4e991f5f8ea781b50 grub2-tools-minimal-2.02-158.el8_10.rocky.0.1.aarch64.rpm c602e4394c6f0e23d408f6ce2126a7817a32fa4ca4cc0abd405ea4b7169cd59d RLBA-2024:8855 chrony bug fix update The chrony suite, chronyd and chronyc, is an advanced implementation of the Network Time Protocol (NTP), specially designed to support systems with intermittent connections. It can synchronize the system clock with NTP servers, hardware reference clocks, and manual input. It can also operate as an NTPv4 (RFC 5905) server or peer to provide a time service to other computers in the network. Bug Fix(es): * Enable support for AES-CMAC into chrony 4.5.z with Rocky Linux 8.10 (JIRA:Rocky Linux-59032) * chronyd crashing [rhel-8.10.z] (JIRA:Rocky Linux-59112) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chrony. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The chrony suite, chronyd and chronyc, is an advanced implementation of the Network Time Protocol (NTP), specially designed to support systems with intermittent connections. It can synchronize the system clock with NTP servers, hardware reference clocks, and manual input. It can also operate as an NTPv4 (RFC 5905) server or peer to provide a time service to other computers in the network. Bug Fix(es): * Enable support for AES-CMAC into chrony 4.5.z with Rocky Linux 8.10 (JIRA:Rocky Linux-59032) * chronyd crashing [rhel-8.10.z] (JIRA:Rocky Linux-59112) rocky-linux-8-aarch64-baseos-rpms chrony-4.5-2.el8_10.aarch64.rpm 8710913617e08928bdac910ce22baa0e2bb044795c4980773eb7c50cc2eebd25 RLSA-2024:8856 Moderate: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857) * kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492) * kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851) * kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) * kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017) * kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976) * kernel: nouveau: lock the client object tree. (CVE-2024-27062) * kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839) * kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898) * kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939) * kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: of: module: add buffer overflow check in of_modalias() (CVE-2024-38541) * kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540) * kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503) * kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924) * kernel: ipv6: prevent possible NULL deref in fib6_nh_init() (CVE-2024-40961) * kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983) * kernel: ACPICA: Revert &#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&#34; (CVE-2024-40984) * kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773) * kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009) * kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042) * kernel: ibmvnic: Add tx check to prevent skb leak (CVE-2024-41066) * kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092) * kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093) * kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: USB: serial: mos7840: fix crash on resume (CVE-2024-42244) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880) * kernel: gso: do not skip outer ip header in case of ipip and net_failover (CVE-2022-48936) * kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889) * kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892) * kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935) * kernel: bonding: fix xfrm real_dev null pointer dereference (CVE-2024-44989) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (CVE-2024-47668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857) * kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492) * kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851) * kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) * kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017) * kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976) * kernel: nouveau: lock the client object tree. (CVE-2024-27062) * kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839) * kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898) * kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939) * kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: of: module: add buffer overflow check in of_modalias() (CVE-2024-38541) * kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540) * kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503) * kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924) * kernel: ipv6: prevent possible NULL deref in fib6_nh_init() (CVE-2024-40961) * kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983) * kernel: ACPICA: Revert &#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&#34; (CVE-2024-40984) * kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773) * kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009) * kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042) * kernel: ibmvnic: Add tx check to prevent skb leak (CVE-2024-41066) * kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092) * kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093) * kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: USB: serial: mos7840: fix crash on resume (CVE-2024-42244) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880) * kernel: gso: do not skip outer ip header in case of ipip and net_failover (CVE-2022-48936) * kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889) * kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892) * kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935) * kernel: bonding: fix xfrm real_dev null pointer dereference (CVE-2024-44989) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (CVE-2024-47668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-553.27.1.el8_10.aarch64.rpm 3f842623c9fea418af49edb245b173c199a6538ccb9b1336b4f723bc0e5ff14e kernel-4.18.0-553.27.1.el8_10.aarch64.rpm 833314cfcfee2fe32383a96e39324363c37813792c6f4b26443909b4a7c76611 kernel-abi-stablelists-4.18.0-553.27.1.el8_10.noarch.rpm d72ee6a6ae36b2d434a126ed68f3d248f2faeaaa0ea8a00b8d86de1b19952d18 kernel-core-4.18.0-553.27.1.el8_10.aarch64.rpm b4727bd88ebc4ce72a1b814428b81299dbcf69787d8a08162eee689c1ff8f8a8 kernel-cross-headers-4.18.0-553.27.1.el8_10.aarch64.rpm 434eeb8c3e4bbb9225319e5a2525095865c5e270817d3c3397e4852fa41c9184 kernel-debug-4.18.0-553.27.1.el8_10.aarch64.rpm 2b06392b7887b9386b2713313631297a768a2502910836468290c28243ac0aa7 kernel-debug-core-4.18.0-553.27.1.el8_10.aarch64.rpm 3b0bd99de9bae2aa5965eb80bab50473fe98ead7a6d7155f68bdf648865fc795 kernel-debug-devel-4.18.0-553.27.1.el8_10.aarch64.rpm b442cbd9e83716479537a47dd002fa184fae890620a06babc195529751a073df kernel-debuginfo-common-aarch64-4.18.0-553.27.1.el8_10.aarch64.rpm bb2062584d4ad25fb1fceffbb12de4dba064f27f73df5d79638e10114a196843 kernel-debug-modules-4.18.0-553.27.1.el8_10.aarch64.rpm 7d7e5f55d53627460a04d2692c1309244d2b2924ec77310f2d5222a58b4c37a9 kernel-debug-modules-extra-4.18.0-553.27.1.el8_10.aarch64.rpm 875b9e0f2c4d239ad885739328817ab928e1f9b9ea5ac98bd5e6fc9dc6c2b545 kernel-devel-4.18.0-553.27.1.el8_10.aarch64.rpm 54c7d6cac3941643796c9772d40788d502ad8d947747a8e1dfb65a9e590f5129 kernel-doc-4.18.0-553.27.1.el8_10.noarch.rpm 5bfcdf6525369d32ddae9a4d73e97f9ede62fd6355513cc0fcae450c3e34d1f0 kernel-headers-4.18.0-553.27.1.el8_10.aarch64.rpm 81ed01919a1c1d183fda8b0b74ede845ab8a0fcce0982e8646ad9b1518fe63e0 kernel-modules-4.18.0-553.27.1.el8_10.aarch64.rpm e6e3763940e0d698d0cf86814651bc2df5e5f7d2b60e9d41ac88a5245595bb27 kernel-modules-extra-4.18.0-553.27.1.el8_10.aarch64.rpm 3291eaa17265bae844efa80ddb362ea361e8d5efbd14e71d04c0893e378e3fae kernel-tools-4.18.0-553.27.1.el8_10.aarch64.rpm 0498a7e4757d72e668cde778caa1accb4e16c11c75d8c9fb8c33560c4c9e34ac kernel-tools-libs-4.18.0-553.27.1.el8_10.aarch64.rpm 779be7f0e775e8aeb402a30a249c7026c090fcff3cb31e62fb9fc8ac05a55bf0 perf-4.18.0-553.27.1.el8_10.aarch64.rpm 287d3e6aa6176355192e816ea0700c2138e2a8f616d5024834eed7b1f85bf3f3 python3-perf-4.18.0-553.27.1.el8_10.aarch64.rpm 88ebc56fe4e68658b31a132b2637cd2808adff9d8ccd9fb755e9cd202ba20694 RLBA-2024:8858 linux-firmware bug fix update The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es): * Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-62359) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es): * Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-62359) rocky-linux-8-aarch64-baseos-rpms iwl1000-firmware-39.31.5.1-125.el8_10.1.noarch.rpm a66528012cc956ae20d41308e6611bb9f129f51c517cd8b4ef5e34fb276a932f iwl100-firmware-39.31.5.1-125.el8_10.1.noarch.rpm fba5e32e3ae6034543159d5ab4b05d5344f6e8345184bfe925a7f3f3ccdaabba iwl105-firmware-18.168.6.1-125.el8_10.1.noarch.rpm accc10162f0f3697868a1a77055d1f35d380db5613e1b4ae0ffc398fcf7db594 iwl135-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 442ecd6f7e593bca75cb8af3902d0c56eac5821798ef22746a6a3d823d23607d iwl2000-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 9d3dc1710d002797c9373aee7202977f893c5a9947465a7c6357b10ab63eed74 iwl2030-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 133c2cae6c4bdda644980bff538282a18163103f61d20ebf5669e1cbfb5595aa iwl3160-firmware-25.30.13.0-125.el8_10.1.noarch.rpm f8d85082d45d3eb5c54033027965d10f4850210a1665dc5fe032cdbfd67e506a iwl3945-firmware-15.32.2.9-125.el8_10.1.noarch.rpm 2f3da47cda51d118bf88b40085bdd05f11c1d30341e9247c8f1d25bde87c1c33 iwl4965-firmware-228.61.2.24-125.el8_10.1.noarch.rpm 65688a2a8c2957ca69df1141ba779e89ee91ce22a682245f97a4c133162f6eb5 iwl5000-firmware-8.83.5.1_1-125.el8_10.1.noarch.rpm 09b18ab9dcdbf2a718f15297ede7c88b4f280f364aae58c33e03154f9a6997e7 iwl5150-firmware-8.24.2.2-125.el8_10.1.noarch.rpm b39d6682ed74ae05d9fc3e8a82bc894feb6df7c541c9171426b293072afbf091 iwl6000-firmware-9.221.4.1-125.el8_10.1.noarch.rpm a9718054c9d79f701661b8bfbc610a51f2d05e43ed33676f6d0250399e8e0884 iwl6000g2a-firmware-18.168.6.1-125.el8_10.1.noarch.rpm d01b1866e8d7b478593ee1767c0354bba6e29a5b2fe7527e4d13a35d747af0b0 iwl6000g2b-firmware-18.168.6.1-125.el8_10.1.noarch.rpm e566a80fdf6b48d80a14f01c0695600cc4ea074c298faeec311606a11d76fcaa iwl6050-firmware-41.28.5.1-125.el8_10.1.noarch.rpm ad395b814f8c1c21d68ec905e209539214110860e9318f83cca673e07a2b51e1 iwl7260-firmware-25.30.13.0-125.el8_10.1.noarch.rpm a0af61194dc88b4d645867c9bf346ae4b69c05df70030d33e03aacb75fe89745 libertas-sd8686-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm daa97b1a030ef6c4bcab8cf8a2097d53134eccc133a723d417631bca1f301b4c libertas-sd8787-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm a71b4f019ddcadd243b08550a7fb764678b534ea334f5fc6b9dd7afd42aa664a libertas-usb8388-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm 4bab692d7831674103e18bd960b4f5dd2c72cf617b38a0b42d7a82ff49ef4b9f libertas-usb8388-olpc-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm fa3203a938e9560ed0be442a6395e1057ea9990bb1d8cc5afd65ab06197a9dd2 linux-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm 9a7fadb3f747503109a5c263b3762a490f1193c31a9fb7da944c82078df2f4bc RLSA-2024:8859 Moderate: xmlrpc-c security update XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms xmlrpc-c-1.51.0-10.el8_10.aarch64.rpm ca650c8eeca7e82e97be4ca929b21c020c1b9b29d5b1dcddaa65785f448603e5 xmlrpc-c-client-1.51.0-10.el8_10.aarch64.rpm b0a9eeeb80953e78b1ba4214f175556ee042b2d7552b8c134148f16293686fc7 RLSA-2024:8860 Important: krb5 security update Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms krb5-devel-1.18.2-30.el8_10.aarch64.rpm 4a3a0265344daff4e39d0da574ac69279d4f83a6ef2ab9eaf43d379474702812 krb5-libs-1.18.2-30.el8_10.aarch64.rpm 041f6a925b1f15fd3dd0903fd39af5736d42b9341cf7c1b966b9c25796d5890b krb5-pkinit-1.18.2-30.el8_10.aarch64.rpm 13a405f28c66f18ccc1688ec5053ab9b3720d9f8dba29a35f01c32002e84a137 krb5-server-1.18.2-30.el8_10.aarch64.rpm 99864bb422f7d1fb8b6a91b3e8912be709c729741709f916d3ba8144db1be75d krb5-server-ldap-1.18.2-30.el8_10.aarch64.rpm 086fed49990edb5afcee87b5f5c51752e98856b4f43cf27922986f785af00c9e krb5-workstation-1.18.2-30.el8_10.aarch64.rpm a1dee3c361c224428d0edda742b15df7faf59903e893104dad3f953003575465 libkadm5-1.18.2-30.el8_10.aarch64.rpm b5d961f9a5b1e78bc5f6265f7f2ac6af5a98822d5b87b5f863bd24508b4e66d9 RLBA-2024:8861 openldap bug fix update OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Bug Fix(es): * LDAPChannel binding enforced on AD with AD cert using EDCSA-SHA384 ( NOT RSA)- sssd kerberos SASL fails with STARTTLS enabled on AD LDAP Port while it works with AD cert using RSA (JIRA:Rocky Linux-35538) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Bug Fix(es): * LDAPChannel binding enforced on AD with AD cert using EDCSA-SHA384 ( NOT RSA)- sssd kerberos SASL fails with STARTTLS enabled on AD LDAP Port while it works with AD cert using RSA (JIRA:Rocky Linux-35538) rocky-linux-8-aarch64-baseos-rpms openldap-2.4.46-20.el8_10.aarch64.rpm 9d82100cbd460b7c4e232f2d9c8f1c33b4229bd438bc85e73e619f7ea5c59832 openldap-clients-2.4.46-20.el8_10.aarch64.rpm fddee2c439cbd2194a46c508073d088d61043ba65fb0eb22d7e87fd54f13f3f3 openldap-devel-2.4.46-20.el8_10.aarch64.rpm b1663ba02441b7bcb4fd1c3b149d1fdde4a67dfaf5a9dc6c7ba28878a53db7b8 RLBA-2024:8866 glib2 bug fix update GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es): * Trashing on system internal mounts is not supported (JIRA:Rocky Linux-46828) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es): * Trashing on system internal mounts is not supported (JIRA:Rocky Linux-46828) rocky-linux-8-aarch64-baseos-rpms glib2-2.56.4-165.el8_10.aarch64.rpm e96934904e5f85fe02ee986a7f71fa36694da71e8089932db9aa2e20f4f33246 glib2-devel-2.56.4-165.el8_10.aarch64.rpm ee63a34148d36634a3504684447b8cf3ff5333ebf08872b01afc90032e551d7e glib2-fam-2.56.4-165.el8_10.aarch64.rpm 4f7604610757904b36c8eba37dadfc7c9a0e52bd55eb52abc66776779b2253b1 glib2-tests-2.56.4-165.el8_10.aarch64.rpm 67e1dc6fc2009d86f11acfcac2f72f6ef5680ab965bbddd50677fa56095d2db3 RLSA-2024:8922 Low: bzip2 security update The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. Security Fix(es): * bzip2: out-of-bounds write in function BZ2_decompress (CVE-2019-12900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for bzip2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. Security Fix(es): * bzip2: out-of-bounds write in function BZ2_decompress (CVE-2019-12900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bzip2-1.0.6-27.el8_10.aarch64.rpm 397fce5500333eaaa87766633b3d080148c9fbcd6304bb0784d91ff032da8f04 bzip2-devel-1.0.6-27.el8_10.aarch64.rpm 47f96bdbbaaeacdeb306a8fd294ed0eeb3d619dbd100e9c28ce48675d40a91c1 bzip2-libs-1.0.6-27.el8_10.aarch64.rpm 8fbd668ba51186e5a354fc8bcc202137df47f3adac55e90dae8705135e0c8e58 RLSA-2024:9502 Moderate: expat security update Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: DoS via XML_ResumeParser (CVE-2024-50602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: DoS via XML_ResumeParser (CVE-2024-50602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms expat-2.2.5-16.el8_10.aarch64.rpm 7037c7a56176475a86b60c53f3e869b4986e90be8c1d1e768085979d139e57ec expat-devel-2.2.5-16.el8_10.aarch64.rpm cf24481a4922fdd361475c9386c2ff6808b59a6933ee090b083dca700eb7d033 RLSA-2024:9573 Important: libsoup security update The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: infinite loop while reading websocket data (CVE-2024-52532) * libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: infinite loop while reading websocket data (CVE-2024-52532) * libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms libsoup-2.62.3-6.el8_10.aarch64.rpm 2a1fe301ff01bb3d8624a56a099a3e43f2b604013f9440dde82a537bef16556d RLSA-2024:9689 Low: binutils security update The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms binutils-2.30-125.el8_10.aarch64.rpm 3043495e89562c2c01a8e8071d49f7fc08ab02b59a69bb6a73c6df7646d6e038 RLBA-2019:3534 libsemanage bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. rocky-linux-8-aarch64-baseos-rpms libsemanage-2.9-10.el8_10.aarch64.rpm ca028198679e8579f0038396b037c4dbec2cfe28ad3d1b68b86fa8ddfe088878 python3-libsemanage-2.9-10.el8_10.aarch64.rpm e741232e67fcf5ac4f38ece49edccf8e217593cbaf46dd3ebe2ba7f01ef7c7e8 RLSA-2024:10281 Moderate: kernel:4.18.0 security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: edia: dvbdev: fix a use-after-free (CVE-2024-27043) * kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399) * kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CVE-2024-38564) * kernel: mptcp: pm: Fix uaf in __timer_delete_sync (CVE-2024-46858) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: edia: dvbdev: fix a use-after-free (CVE-2024-27043) * kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399) * kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CVE-2024-38564) * kernel: mptcp: pm: Fix uaf in __timer_delete_sync (CVE-2024-46858) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-553.30.1.el8_10.aarch64.rpm fecc2f5e501a41a3a305f71aa1adc43ecb6874e588069b1bbae2e57f3d747484 kernel-4.18.0-553.30.1.el8_10.aarch64.rpm 2247c4f03ddeccfdc88e4285938571f297a755c724560489092139e568dfbc4b kernel-abi-stablelists-4.18.0-553.30.1.el8_10.noarch.rpm 987a44cd1a13de87d1bab74d90dae7cb192b773b48a381312fd96c937cd7be52 kernel-core-4.18.0-553.30.1.el8_10.aarch64.rpm 4153c4d0754c6804d7a64649c7aa0bfba06ad17ec99e73490a3507fcf0300c01 kernel-cross-headers-4.18.0-553.30.1.el8_10.aarch64.rpm 8fa3e0b7c1da91231a6ec6de701ea8bb571f58155b69ee1eba13143bf500850b kernel-debug-4.18.0-553.30.1.el8_10.aarch64.rpm 5d3bbc09a9a282711086b8d4738bc75b8be372d1d63d73260bb97435fd90760c kernel-debug-core-4.18.0-553.30.1.el8_10.aarch64.rpm d340f4bbd2e2e3ce1ad97c23382f7a900f27734ed4c1e5a668f37fb04f0e6159 kernel-debug-devel-4.18.0-553.30.1.el8_10.aarch64.rpm 93e2908df490e9d7b3bfc49e3539013c48f40e5e3c5dbc4632fcbc3374eb568a kernel-debuginfo-common-aarch64-4.18.0-553.30.1.el8_10.aarch64.rpm 70ae250108fb56b7b198fc1884a1b2842f3e705315241eace36735685a0093d8 kernel-debug-modules-4.18.0-553.30.1.el8_10.aarch64.rpm 17914bf79e3ed39e44299c542559a44d9597ecde1a587bab92c512bc279a69bf kernel-debug-modules-extra-4.18.0-553.30.1.el8_10.aarch64.rpm 8d52f2a3b3c09b9722ae9e599ad440b1a34bf8cc7fb8a55f2a0be62b33f4d581 kernel-devel-4.18.0-553.30.1.el8_10.aarch64.rpm b2be8194c670084430868b4b7a3c5499c7ecc816d9076a407cae7c390bb574a3 kernel-doc-4.18.0-553.30.1.el8_10.noarch.rpm f86c40b31ee92244aa0ac6c4b4d815bb0649440a2df89a12610ea5b6ace3d8bb kernel-headers-4.18.0-553.30.1.el8_10.aarch64.rpm d0d137a1da14df1aeef7085acb7afc92cada0c619576332b34fa22767e9a1de0 kernel-modules-4.18.0-553.30.1.el8_10.aarch64.rpm eb10159647f0aea63120111281a637231054cfaef8131f455e4fcff74139c20d kernel-modules-extra-4.18.0-553.30.1.el8_10.aarch64.rpm 38eb33cfa2390fad4e2830a795e6dbb1ebf16b781b819b071275b63e8476429c kernel-tools-4.18.0-553.30.1.el8_10.aarch64.rpm f02f12f3ac5b6ec0ef8bacf8136e4136562764fd6d0d3c69e9edbde681c2b1e0 kernel-tools-libs-4.18.0-553.30.1.el8_10.aarch64.rpm 717f484ba8db278959087f1df71384c12df233a06f140100cd00d0e3da8a3039 perf-4.18.0-553.30.1.el8_10.aarch64.rpm 8688437b0a8f31c1175b9e1db48acf125ce6ebc3de04d933e53856d938aa5bf3 python3-perf-4.18.0-553.30.1.el8_10.aarch64.rpm 78bd0269e7c3640e832b52efdaa07396f3b327ee2b0ff215e6949ae0fd59459c RLSA-2024:10379 Important: pam security update Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: libpam: Libpam vulnerable to read hashed password (CVE-2024-10041) * pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: libpam: Libpam vulnerable to read hashed password (CVE-2024-10041) * pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms pam-1.3.1-36.el8_10.aarch64.rpm 7f94167ade58c2d8ff1a19169442cab4870db20b5f2a48e81f7da24aca395a25 pam-devel-1.3.1-36.el8_10.aarch64.rpm 1f0350f0e382346e0d6088881c9566c3cf1b2bdcdf6e8ac58acc19aa9ed8eb8c RLBA-2024:10663 sos bug fix and enhancement update The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Prepare new plugin for kea dhcp server (JIRA:Rocky Linux-40285) * [RFE] Sudo plugin is not capturing certain logs. (JIRA:Rocky Linux-56747) * Create bootc plugin (JIRA:Rocky Linux-58177) * [rebase] rebase sos to 4.8.1 into Rocky Linux9 (JIRA:Rocky Linux-64159) * [rebase] rebase sos to 4.8.1 into Rocky Linux8 (JIRA:Rocky Linux-64160) * sos upload does not deal with 1GB limit (JIRA:Rocky Linux-22732) * Requesting sosreport be updated to collect information related to rhc-worker-playbook (JIRA:Rocky Linux-27555) * Include /sys/kernel/debug/sched/debug in sosreport (JIRA:Rocky Linux-44353) * [Hyper-V][Rocky Linux-9][RFE] Capture the Hyper-V balloon debugfs file located at /sys/kernel/debug/hv-balloon in sos report (JIRA:Rocky Linux-45980) * [REF] Capture authselect.conf (JIRA:Rocky Linux-48608) * RFE: lru_gen is required to be included in sos (JIRA:Rocky Linux-50917) * Unexpected formating changes in plugin and presets listing (JIRA:Rocky Linux-57675) * sos upload does not deal with 1GB limit (JIRA:Rocky Linux-58947) * sos report collects credentials in HTTP(S)_PROXY environment (JIRA:Rocky Linux-60130) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Prepare new plugin for kea dhcp server (JIRA:Rocky Linux-40285) * [RFE] Sudo plugin is not capturing certain logs. (JIRA:Rocky Linux-56747) * Create bootc plugin (JIRA:Rocky Linux-58177) * [rebase] rebase sos to 4.8.1 into Rocky Linux9 (JIRA:Rocky Linux-64159) * [rebase] rebase sos to 4.8.1 into Rocky Linux8 (JIRA:Rocky Linux-64160) * sos upload does not deal with 1GB limit (JIRA:Rocky Linux-22732) * Requesting sosreport be updated to collect information related to rhc-worker-playbook (JIRA:Rocky Linux-27555) * Include /sys/kernel/debug/sched/debug in sosreport (JIRA:Rocky Linux-44353) * [Hyper-V][Rocky Linux-9][RFE] Capture the Hyper-V balloon debugfs file located at /sys/kernel/debug/hv-balloon in sos report (JIRA:Rocky Linux-45980) * [REF] Capture authselect.conf (JIRA:Rocky Linux-48608) * RFE: lru_gen is required to be included in sos (JIRA:Rocky Linux-50917) * Unexpected formating changes in plugin and presets listing (JIRA:Rocky Linux-57675) * sos upload does not deal with 1GB limit (JIRA:Rocky Linux-58947) * sos report collects credentials in HTTP(S)_PROXY environment (JIRA:Rocky Linux-60130) rocky-linux-8-aarch64-baseos-rpms sos-4.8.1-1.el8_10.noarch.rpm 798f84da4d24032635a4088de2570411bf1ef5c2a039d7ae23c2a2b822a01161 sos-audit-4.8.1-1.el8_10.noarch.rpm 1ec3f7ba0687d21e7f1818a2610cbdec6c71b77e0052f295c79b111f5480b70f RLBA-2024:10735 autofs bug fix update The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * Sporadic mount failures with amd program maps on Rocky Linux8 (JIRA:Rocky Linux-52402) * sporadic autofs daemon segfaults (JIRA:Rocky Linux-61670) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * Sporadic mount failures with amd program maps on Rocky Linux8 (JIRA:Rocky Linux-52402) * sporadic autofs daemon segfaults (JIRA:Rocky Linux-61670) rocky-linux-8-aarch64-baseos-rpms autofs-5.1.4-114.el8_10.1.aarch64.rpm 650321cf6f80121fffe5e05aa68c067abca82c45d2aea81a5cdf6803454487d3 RLSA-2024:10779 Moderate: python3:3.6.8 security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms platform-python-3.6.8-69.el8_10.rocky.0.aarch64.rpm 46a75dfa860f0c1a085c6cf0182dfd570a52432d6ddf9c3c234cee2545098b89 python3-libs-3.6.8-69.el8_10.rocky.0.aarch64.rpm 6ab04b2b588980c3cc1215845410757c3dcbe0afe36e2bb877804ff83d7da777 python3-test-3.6.8-69.el8_10.rocky.0.aarch64.rpm 77f57cc1198dfae71a188463e66c94993c9f6481ee852473c74e27d66d15d066 RLSA-2024:10943 Moderate: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695) * kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (CVE-2024-49949) * kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (CVE-2024-50082) * kernel: arm64: probes: Remove broken LDR (literal) uprobe support (CVE-2024-50099) * kernel: xfrm: fix one more kernel-infoleak in algo dumping (CVE-2024-50110) * kernel: xfrm: validate new SA&#39;s prefixlen using SA family when sel.family is unset (CVE-2024-50142) * kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (CVE-2024-50192) * kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (CVE-2024-50256) * kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (CVE-2024-50264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695) * kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (CVE-2024-49949) * kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (CVE-2024-50082) * kernel: arm64: probes: Remove broken LDR (literal) uprobe support (CVE-2024-50099) * kernel: xfrm: fix one more kernel-infoleak in algo dumping (CVE-2024-50110) * kernel: xfrm: validate new SA&#39;s prefixlen using SA family when sel.family is unset (CVE-2024-50142) * kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (CVE-2024-50192) * kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (CVE-2024-50256) * kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (CVE-2024-50264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms bpftool-4.18.0-553.32.1.el8_10.aarch64.rpm bdb68dd7b23dee10fc6bad28e5a468e5d1a8bee3edaf5644d7535dd16134e8c7 kernel-4.18.0-553.32.1.el8_10.aarch64.rpm f194bef08371ad21c5d853dddf388056abef01b8362d72b111e54bd213d8afd8 kernel-abi-stablelists-4.18.0-553.32.1.el8_10.noarch.rpm ee3466f0292e8790260c9bc452911cc81836a95b096a75066525db2c31f2219b kernel-core-4.18.0-553.32.1.el8_10.aarch64.rpm 8ed45f046efa186effc18e3cc75f77da9740d20e0c3076237881f095d6e27356 kernel-cross-headers-4.18.0-553.32.1.el8_10.aarch64.rpm be6ad8cb463b3dc7b18e3daa4aed94abbf5913d989c1dc61f77c84585845236a kernel-debug-4.18.0-553.32.1.el8_10.aarch64.rpm 7aa1f9fa7570ba5a7b17887579171248ec08e163b7015dc1a7f341cba4acd14c kernel-debug-core-4.18.0-553.32.1.el8_10.aarch64.rpm 8ed4a5334fef4315d2ad7705512db695ba5fcfd92a0673eca160b49dd94e275e kernel-debug-devel-4.18.0-553.32.1.el8_10.aarch64.rpm 57eb6c6583cdc95cc347211416b117d308fdec575d1d33556d494e4064a151f1 kernel-debuginfo-common-aarch64-4.18.0-553.32.1.el8_10.aarch64.rpm 9ecd7483fdc39db50c6d3a652ae3372e7ad13f97efb06718d8c719f66628fce2 kernel-debug-modules-4.18.0-553.32.1.el8_10.aarch64.rpm 7424116e6d1ed9c4dad75916e1fe6d51783cb861e2e34e68729bcff8951432f2 kernel-debug-modules-extra-4.18.0-553.32.1.el8_10.aarch64.rpm d4f69cf2b1dfb5e9a7f5bfe85f51607e137f582b9681eb9b300b192a94d40772 kernel-devel-4.18.0-553.32.1.el8_10.aarch64.rpm 2afdbaa459f978b4a9262d0f37b7281cb160e4a9377c763979bf6d439e102173 kernel-doc-4.18.0-553.32.1.el8_10.noarch.rpm b5b18a468c2208f1c3ba868ed85b20a953ec09437e07c3ef7ec727eaf4bb8ca4 kernel-headers-4.18.0-553.32.1.el8_10.aarch64.rpm 0ceff30b718b1f7f4de765d4e21414deaf541ab02606a1846bf6af6f7cdc6f39 kernel-modules-4.18.0-553.32.1.el8_10.aarch64.rpm 70d1be0a5e5addac281f883550fe00e45242bc5cc50a3da1bb93dd16242b8fb0 kernel-modules-extra-4.18.0-553.32.1.el8_10.aarch64.rpm 3d5bb03c488fc41a52134da718ed883852c3a3aaa04ddcb7fe67eea64a0bee3c kernel-tools-4.18.0-553.32.1.el8_10.aarch64.rpm 9910661e00dde2159080dc71acec43ae1d81c897c93bb51989781b3a994e1542 kernel-tools-libs-4.18.0-553.32.1.el8_10.aarch64.rpm d399ce63a1c969b350579502db4e4ccfbb4ce5b9a4b644cb86cb8ab4416826cc perf-4.18.0-553.32.1.el8_10.aarch64.rpm 713a755c4aece4068794ae226b1dbf443062c2dda654fd760253e75ff3f7b776 python3-perf-4.18.0-553.32.1.el8_10.aarch64.rpm d5da93259d1139c27d07a1d18d50dd253aef41225a993fcd8ddfbd1cf3166569 RLBA-2024:11151 sssd bug fix update The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [RfE] SSSD Failover Enhancements [rhel-8.10.z] (JIRA:Rocky Linux-39085) * SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-8.10.z] (JIRA:Rocky Linux-66267) * sssd is skipping GPO evaluation with auto_private_groups [rhel-8.10.z] (JIRA:Rocky Linux-66272) * possible regression of rhbz#2196521 [rhel-8.10.z] (JIRA:Rocky Linux-66277) * Excessive "Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest [rhel-8.10.z] (JIRA:Rocky Linux-67128) * Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-8.10.z] (JIRA:Rocky Linux-67671) * sssd backend process segfaults when krb5.conf is invalid [rhel-8.10.z] (JIRA:Rocky Linux-68507) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [RfE] SSSD Failover Enhancements [rhel-8.10.z] (JIRA:Rocky Linux-39085) * SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-8.10.z] (JIRA:Rocky Linux-66267) * sssd is skipping GPO evaluation with auto_private_groups [rhel-8.10.z] (JIRA:Rocky Linux-66272) * possible regression of rhbz#2196521 [rhel-8.10.z] (JIRA:Rocky Linux-66277) * Excessive "Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest [rhel-8.10.z] (JIRA:Rocky Linux-67128) * Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-8.10.z] (JIRA:Rocky Linux-67671) * sssd backend process segfaults when krb5.conf is invalid [rhel-8.10.z] (JIRA:Rocky Linux-68507) rocky-linux-8-aarch64-baseos-rpms libipa_hbac-2.9.4-5.el8_10.1.aarch64.rpm f82f210be0a12fbb62adfcfe5cd39b29e9e93daf494a0d5b61cc56187c6e61fd libsss_autofs-2.9.4-5.el8_10.1.aarch64.rpm 2952ddbc412ea95062c0930de2722c6988ec10ce5ab91ab46e94c8963c9ec7f5 libsss_certmap-2.9.4-5.el8_10.1.aarch64.rpm 8a3c0d0ea315a3dfc0b10b0b7f4da57890040518649fbc907c850e626c1f0a9f libsss_idmap-2.9.4-5.el8_10.1.aarch64.rpm a7c9f933d4a4763ec4f0b930f2c805737336c7eee9dde291b3403a8eb5ffa91f libsss_nss_idmap-2.9.4-5.el8_10.1.aarch64.rpm b7e02943638258490a2ce1a4fe71e5e613929237daa85511a3221a18ca0c3148 libsss_simpleifp-2.9.4-5.el8_10.1.aarch64.rpm 9509197ff86b2c3f5fedd1593edb1e255dc4a211be25ecb3f8028ddb9ed638d6 libsss_sudo-2.9.4-5.el8_10.1.aarch64.rpm b6f3c6cb75f2f4e3ea19cce9189ffb4626f8a08a5a33edb2e7ac6b0428b3ccc0 python3-libipa_hbac-2.9.4-5.el8_10.1.aarch64.rpm 4b1b8b61792b18ee69f3e8e34f7d90547f6f451dc7978ceafdce635c3b51c540 python3-libsss_nss_idmap-2.9.4-5.el8_10.1.aarch64.rpm 394c2800c8973374c47b2b07986d6e05ddef47af101fc5f5c7cc8cc839dc20f0 python3-sss-2.9.4-5.el8_10.1.aarch64.rpm e7486d6be29a61a49159e47c6434c0775169575cc46870095e6347b88112b54e python3-sssdconfig-2.9.4-5.el8_10.1.noarch.rpm e3a6b585dd61eaa2c7b007ad3e6ea3e25388ba82e0a158e8de6d669eb9359411 python3-sss-murmur-2.9.4-5.el8_10.1.aarch64.rpm 1337c8e5a9e56593878a1979dd152f58845601a4628e6e2a9cb9013119c2530e sssd-2.9.4-5.el8_10.1.aarch64.rpm 7018e7de52fc9e67e2e49e3b3f05a62c1d43c0d60e150a551de865bf4749931d sssd-ad-2.9.4-5.el8_10.1.aarch64.rpm cc868dc0db3b399c292306d3bb6df5aeb9476e2343644055489646173ccf0778 sssd-client-2.9.4-5.el8_10.1.aarch64.rpm ca03e91ff00ff4d2fd05595ef83d55c269677eb37a9bd05d48d15cc465b550bb sssd-common-2.9.4-5.el8_10.1.aarch64.rpm da781c4c035c7b1261e36ed1bcca8a599be9180379336229d09488af11434991 sssd-common-pac-2.9.4-5.el8_10.1.aarch64.rpm 69f2b6bfb4ca824f2c0f5984b202760691e257f334eb3fe98ce9629b41df3222 sssd-dbus-2.9.4-5.el8_10.1.aarch64.rpm 41ba1b69de02f6f8ac9560a69b5149428390d302b1cb301fa483a690ffaf1bb9 sssd-ipa-2.9.4-5.el8_10.1.aarch64.rpm 1e8807770fb1c0365bb14b3cdbd8cb44ded2b7484ad456525ce30413ebbf321b sssd-kcm-2.9.4-5.el8_10.1.aarch64.rpm 047818fc70ff651d5e71c1037e9ba1b59ff0b0d42b4e9752ab302cce57415f73 sssd-krb5-2.9.4-5.el8_10.1.aarch64.rpm 2a5b4105c313974ebdbb4503277486922400042e585d98dd9dcaac8262bd33d8 sssd-krb5-common-2.9.4-5.el8_10.1.aarch64.rpm 3b92e8c724d5479f293817501c23f4a427040dfc9601dee39d7e7b6f6673a33f sssd-ldap-2.9.4-5.el8_10.1.aarch64.rpm c2704c4756beb440f22ce8bcb1fe8e3eb354a990a2473182fcdef5a1dfdeee9f sssd-nfs-idmap-2.9.4-5.el8_10.1.aarch64.rpm 965f785a4716ed38b75af18365f5af62d81908ec08ff20fab9b1ca27e404574b sssd-polkit-rules-2.9.4-5.el8_10.1.aarch64.rpm 95188a3d42afd17c885f0a8b31bf24d15b9661afac23f2813a2603c784096ae3 sssd-proxy-2.9.4-5.el8_10.1.aarch64.rpm cafd6c291319bc2846af22eb2c1952a209325a26f26ca67010533112bf0aa5e4 sssd-tools-2.9.4-5.el8_10.1.aarch64.rpm 2c399e1bf8a708136effd261401f303d9fbfd10629832693677121b1f3176d9a sssd-winbind-idmap-2.9.4-5.el8_10.1.aarch64.rpm f4bfdde8cef7a8099faee652e883d6da840af6fabf0bf59f192e5e532a4960d0 RLBA-2024:11152 samba bug fix update Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-8.10.z] (JIRA:Rocky Linux-63770) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-8.10.z] (JIRA:Rocky Linux-63770) rocky-linux-8-aarch64-baseos-rpms ctdb-4.19.4-6.el8_10.aarch64.rpm 4356d8baad6aa989a649919d06e6a45379736e5077d86f0936a452886879c59f libnetapi-4.19.4-6.el8_10.aarch64.rpm bfb48993fe78db43b13e951d6b0ead365c70a678407d4670c99ee07a19cf87e5 libsmbclient-4.19.4-6.el8_10.aarch64.rpm 81151013f0f57a2cd3c5a8806abab624af6ee626f7b44d23e2a3bf724bd4f0a8 libwbclient-4.19.4-6.el8_10.aarch64.rpm 4016ebaa8dd6bdaf707623b25a06a78e807bf7843197516ea9b7de4c5f566ac5 python3-samba-4.19.4-6.el8_10.aarch64.rpm ec63985035dda461b8b40a6c29b79edee29a28659dc3736c4919456193abbc59 python3-samba-dc-4.19.4-6.el8_10.aarch64.rpm da1bf5c34f652a09042d1bcaa3a2029b927fe648625f92108998b1b1d64aa562 python3-samba-test-4.19.4-6.el8_10.aarch64.rpm a51e31c4c8c7bd0a0ab0030c81bde75466599db825f6c0560d2680c86dddfd5c samba-4.19.4-6.el8_10.aarch64.rpm e326b3f85c784b47e717cb632a8271fce36c8b00f660773c8b25ebb5ca0298ef samba-client-4.19.4-6.el8_10.aarch64.rpm c7100d1f92122ba7805d1bc7fd301acee227fc7139d86787cc86615198f04615 samba-client-libs-4.19.4-6.el8_10.aarch64.rpm 7bbd308f6c1af15dec79cb106ed6e414ede1dd2209054971f2e43c0266e15e65 samba-common-4.19.4-6.el8_10.noarch.rpm 9a4b9dc986484607e4c649c2418155d41c967a7aec8c811b8ad287bafabeec36 samba-common-libs-4.19.4-6.el8_10.aarch64.rpm 2158b09ed5cee9ba8d43f22b22869335588808a322fa1fc4eab13278f95b7aa6 samba-common-tools-4.19.4-6.el8_10.aarch64.rpm 524d2226a5b56e3635b2355c8e35249ad528b2fff4a3abca56f286abea47f5c9 samba-dcerpc-4.19.4-6.el8_10.aarch64.rpm de480b19d95d7f5f259e8f748abfbe87d988f46d34790f6926d3beaed52668dd samba-dc-libs-4.19.4-6.el8_10.aarch64.rpm 0ab861630ffaca1e453c97029a6b121c653a28bddbab779945f45c957e910965 samba-krb5-printing-4.19.4-6.el8_10.aarch64.rpm 60cf5057c33ca5389697f81791c5ae1f8863b84a5897a92a61c75dfd4d9efa0d samba-ldb-ldap-modules-4.19.4-6.el8_10.aarch64.rpm 6022183e8911fc7854501b6eb8e35f545f03f32079a323a4b3f625f51fa3509b samba-libs-4.19.4-6.el8_10.aarch64.rpm 93eb35ba2d94599116238206f97d8250eb27f83687459733d45300c244d123f5 samba-pidl-4.19.4-6.el8_10.noarch.rpm 2950ff4fd00e1e3ec495f8f484f8f7bfd16c1efbbeea2fa120a03b69b44fa3e5 samba-test-4.19.4-6.el8_10.aarch64.rpm 4fc83f8369b02e0298ef5acf01c2071daf9436ab4764fc17c50a3738fd47f1d3 samba-test-libs-4.19.4-6.el8_10.aarch64.rpm 5e5f1185c77e9d3de4323792e9a3557100fa127b7cd8d3c52267decce0a4a5d9 samba-tools-4.19.4-6.el8_10.aarch64.rpm 8f5c303c192f0e622af5d194837ccbf257811a857f4ef7d9787bc7e1399f4702 samba-usershares-4.19.4-6.el8_10.aarch64.rpm d1b5f3af14c0dfbd945fe484acc976fdece4a031d3aa2e3b4bf097319c069846 samba-winbind-4.19.4-6.el8_10.aarch64.rpm 88d1f0f34f7fc3e10d277552bc378475c125721361e9d3024ab4b03b704cbaf8 samba-winbind-clients-4.19.4-6.el8_10.aarch64.rpm 78639d9ebdc05a123348830c0ba305b42d609ee36a224bed4eaabca56d4c773d samba-winbind-krb5-locator-4.19.4-6.el8_10.aarch64.rpm 35af858cc3f9c328b885a2449bfc2f5c6945220cecf3e7bc54545e6155b28723 samba-winbind-modules-4.19.4-6.el8_10.aarch64.rpm f639feb2ea2a63cfe7737045c886800a70bf3ecf85bcacbf7e03743dbfd78df4 RLBA-2024:11153 mdadm bug fix update The mdadm packages contain a utility for creating, managing, and monitoring Linux multiple disk (MD) devices. Bug Fix(es): * [INTEL Rocky Linux8.10.z BUG][VROC] Fix update_subarray on active volume - missing patch (JIRA:Rocky Linux-20833) * [Rhel8.10.z] mdadm: After adding entry to /etc/mdadm.conf getting messages "localhost.localdomain:101" cannot be set as name. Reason: Not POSIX compatible. Value ignored" (JIRA:Rocky Linux-45608) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mdadm packages contain a utility for creating, managing, and monitoring Linux multiple disk (MD) devices. Bug Fix(es): * [INTEL Rocky Linux8.10.z BUG][VROC] Fix update_subarray on active volume - missing patch (JIRA:Rocky Linux-20833) * [Rhel8.10.z] mdadm: After adding entry to /etc/mdadm.conf getting messages "localhost.localdomain:101" cannot be set as name. Reason: Not POSIX compatible. Value ignored" (JIRA:Rocky Linux-45608) rocky-linux-8-aarch64-baseos-rpms mdadm-4.2-16.el8_10.aarch64.rpm b93eaeac81fa40b5843e739e27deb56cdf6c78614472bf99427920709def32d4 RLBA-2024:11157 unzip bug fix update The unzip utility is used to list, test, and extract files from zip archives. Bug Fix(es): * Unzip Fails on Large Zip Files (1TB) - End-of-centdir-64 Signature Error [rhel-8.10.z] (JIRA:Rocky Linux-45997) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unzip utility is used to list, test, and extract files from zip archives. Bug Fix(es): * Unzip Fails on Large Zip Files (1TB) - End-of-centdir-64 Signature Error [rhel-8.10.z] (JIRA:Rocky Linux-45997) rocky-linux-8-aarch64-baseos-rpms unzip-6.0-47.el8_10.aarch64.rpm d6cb2267217b2740846db6a6d1b49baed06148e4e68fd4c90347e2c5724cd519 RLBA-2024:11158 systemd bug fix update The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * Idle session setting kills the GDM process (JIRA:Rocky Linux-19215) * User logins are super slow when system has tons of disks attached (JIRA:Rocky Linux-5877) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * Idle session setting kills the GDM process (JIRA:Rocky Linux-19215) * User logins are super slow when system has tons of disks attached (JIRA:Rocky Linux-5877) rocky-linux-8-aarch64-baseos-rpms systemd-239-82.el8_10.3.aarch64.rpm 1fe92e1572f31d479cb7b71e93006127ffed578842c4c9436780735113f96c27 systemd-container-239-82.el8_10.3.aarch64.rpm 6ab1872bb4f2e4c7a7ca094c5176c0d0864d5d34303614230b5f0fe7539cb88f systemd-devel-239-82.el8_10.3.aarch64.rpm 5d13cf11f1d92ec8d3fac9cfba257ac1251dd0ec4a6a6f4fcf18a6437d69e9c9 systemd-journal-remote-239-82.el8_10.3.aarch64.rpm 18d21557535a23f06c6c5b77cdb41c70710949cf240fcd972f9d26be5cae3c6a systemd-libs-239-82.el8_10.3.aarch64.rpm ca42d2eb554a03724cc6c419ab645883e830188c0f8681529baada1317a3ab8d systemd-pam-239-82.el8_10.3.aarch64.rpm 8051b4e49eecde3715a0e6f661fe6d9c61a60caf4a173ea7b8bc201de4b20385 systemd-tests-239-82.el8_10.3.aarch64.rpm 1354cf4e6683f0c1d1973aea4f23d824e1219ea9f8c741baac3e88f6ddf7505a systemd-udev-239-82.el8_10.3.aarch64.rpm 3a04c8051fb57e6bc2786a9c416ecb4c46874df7f5b3d001aca040a553dacff5 RLBA-2024:11162 vdo bug fix update The vdo packages provide Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage. Bug Fix(es): * Rocky Linux In-Place Upgrade engagement using LEAPP and am seeing the /usr/libexec/vdoprepareforlvm --check fail on a read-only disk. (JIRA:Rocky Linux-65721) Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The vdo packages provide Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage. Bug Fix(es): * Rocky Linux In-Place Upgrade engagement using LEAPP and am seeing the /usr/libexec/vdoprepareforlvm --check fail on a read-only disk. (JIRA:Rocky Linux-65721) rocky-linux-8-aarch64-baseos-rpms vdo-6.2.11.5-14.el8_10.aarch64.rpm d292acdaf9d13dd7ba7d0683f8de67872f98a97cd8a28e4341a10efa687d6596 vdo-support-6.2.11.5-14.el8_10.aarch64.rpm 3cab49c7a53988d55675f1145ca056f910991c7c10cb8d97b2bff4d3b178e273 RLSA-2025:0012 Moderate: python-requests security update Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: subsequent requests to the same host ignore cert verification (CVE-2024-35195) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: subsequent requests to the same host ignore cert verification (CVE-2024-35195) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-8-aarch64-baseos-rpms python3-requests-2.20.0-5.el8_10.noarch.rpm a2aa9a996f107bf060404602ea15831f10aa12417dc027cde6dca0d200cde385