RLBA-2019:3337
perl:5.24 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2019:3511
libvarlink bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libvarlink.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libvarlink-18-3.el8.x86_64.rpm
8e37e2e47c7124cf126c5a8c50ecb56bea0431c3682b3fa3220662bc4bb2ace2
libvarlink-18-3.el8.x86_64.rpm
8e37e2e47c7124cf126c5a8c50ecb56bea0431c3682b3fa3220662bc4bb2ace2
libvarlink-18-3.el8.x86_64.rpm
8e37e2e47c7124cf126c5a8c50ecb56bea0431c3682b3fa3220662bc4bb2ace2
libvarlink-18-3.el8.x86_64.rpm
8e37e2e47c7124cf126c5a8c50ecb56bea0431c3682b3fa3220662bc4bb2ace2
libvarlink-18-3.el8.i686.rpm
5dbc65462c07552de7eeb3eecda7c747543d16142e7d4aeebf2e70b56965d35b
libvarlink-18-3.el8.i686.rpm
5dbc65462c07552de7eeb3eecda7c747543d16142e7d4aeebf2e70b56965d35b
libvarlink-18-3.el8.i686.rpm
5dbc65462c07552de7eeb3eecda7c747543d16142e7d4aeebf2e70b56965d35b
libvarlink-18-3.el8.i686.rpm
5dbc65462c07552de7eeb3eecda7c747543d16142e7d4aeebf2e70b56965d35b
libvarlink-util-18-3.el8.x86_64.rpm
38a78ef47048039886a3a5de0e74f28b61eee097b1bf4fd61430369fceb9cb5a
libvarlink-util-18-3.el8.x86_64.rpm
38a78ef47048039886a3a5de0e74f28b61eee097b1bf4fd61430369fceb9cb5a
libvarlink-util-18-3.el8.x86_64.rpm
38a78ef47048039886a3a5de0e74f28b61eee097b1bf4fd61430369fceb9cb5a
libvarlink-util-18-3.el8.x86_64.rpm
38a78ef47048039886a3a5de0e74f28b61eee097b1bf4fd61430369fceb9cb5a
RLBA-2019:3522
perl-DBD-SQLite bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-SQLite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLBA-2019:3529
perl-Math-BigInt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Math-BigInt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm
82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac
RLBA-2019:3537
checkpolicy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for checkpolicy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
checkpolicy-2.9-1.el8.x86_64.rpm
99298960b34764108eca6376d69cc572d1db3ef6a1720de07dfe388820d46318
checkpolicy-2.9-1.el8.x86_64.rpm
99298960b34764108eca6376d69cc572d1db3ef6a1720de07dfe388820d46318
checkpolicy-2.9-1.el8.x86_64.rpm
99298960b34764108eca6376d69cc572d1db3ef6a1720de07dfe388820d46318
checkpolicy-2.9-1.el8.x86_64.rpm
99298960b34764108eca6376d69cc572d1db3ef6a1720de07dfe388820d46318
RLBA-2019:3542
python-dmidecode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
python3-dmidecode-3.12.2-15.el8.x86_64.rpm
85254cde2ec450fb6f2dd9f57f1ecc56fc16a3bea2f6976b62cb69980acfb6cf
python3-dmidecode-3.12.2-15.el8.x86_64.rpm
85254cde2ec450fb6f2dd9f57f1ecc56fc16a3bea2f6976b62cb69980acfb6cf
python3-dmidecode-3.12.2-15.el8.x86_64.rpm
85254cde2ec450fb6f2dd9f57f1ecc56fc16a3bea2f6976b62cb69980acfb6cf
python3-dmidecode-3.12.2-15.el8.x86_64.rpm
85254cde2ec450fb6f2dd9f57f1ecc56fc16a3bea2f6976b62cb69980acfb6cf
RLBA-2019:3546
perl-Socket bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Socket.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
perl-Socket-2.027-3.el8.x86_64.rpm
210f9c20fc35f0db23cc285fe01d48337951f38610e954cefd1bb75bb01a10b2
perl-Socket-2.027-3.el8.x86_64.rpm
210f9c20fc35f0db23cc285fe01d48337951f38610e954cefd1bb75bb01a10b2
perl-Socket-2.027-3.el8.x86_64.rpm
210f9c20fc35f0db23cc285fe01d48337951f38610e954cefd1bb75bb01a10b2
perl-Socket-2.027-3.el8.x86_64.rpm
210f9c20fc35f0db23cc285fe01d48337951f38610e954cefd1bb75bb01a10b2
RLSA-2019:3553
Low: GNOME security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
* gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
gdk-pixbuf2-2.36.12-5.el8.i686.rpm
60203ed62f0607b9e3f4bf78dc14ea757fa7ea0ea7d89d7a626c644603d942ec
gdk-pixbuf2-2.36.12-5.el8.i686.rpm
60203ed62f0607b9e3f4bf78dc14ea757fa7ea0ea7d89d7a626c644603d942ec
gdk-pixbuf2-2.36.12-5.el8.i686.rpm
60203ed62f0607b9e3f4bf78dc14ea757fa7ea0ea7d89d7a626c644603d942ec
gdk-pixbuf2-2.36.12-5.el8.i686.rpm
60203ed62f0607b9e3f4bf78dc14ea757fa7ea0ea7d89d7a626c644603d942ec
gdk-pixbuf2-2.36.12-5.el8.x86_64.rpm
b9329e5de8573a782d04cdd35bf6c540349259fd71b05fc097baa6d52fba1cd6
gdk-pixbuf2-2.36.12-5.el8.x86_64.rpm
b9329e5de8573a782d04cdd35bf6c540349259fd71b05fc097baa6d52fba1cd6
gdk-pixbuf2-2.36.12-5.el8.x86_64.rpm
b9329e5de8573a782d04cdd35bf6c540349259fd71b05fc097baa6d52fba1cd6
gdk-pixbuf2-2.36.12-5.el8.x86_64.rpm
b9329e5de8573a782d04cdd35bf6c540349259fd71b05fc097baa6d52fba1cd6
RLBA-2019:3558
libzfcphbaapi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libhbaapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libhbaapi-2.2.9-13.el8.i686.rpm
5c4a9f8de426ff962092455cf4a6c7232b45bd29f5ab2c5fa08e155643b79f3e
libhbaapi-2.2.9-13.el8.i686.rpm
5c4a9f8de426ff962092455cf4a6c7232b45bd29f5ab2c5fa08e155643b79f3e
libhbaapi-2.2.9-13.el8.i686.rpm
5c4a9f8de426ff962092455cf4a6c7232b45bd29f5ab2c5fa08e155643b79f3e
libhbaapi-2.2.9-13.el8.i686.rpm
5c4a9f8de426ff962092455cf4a6c7232b45bd29f5ab2c5fa08e155643b79f3e
libhbaapi-2.2.9-13.el8.x86_64.rpm
5b30454dec6b8cfb4cff21b86b2b2f5ac24bfd8b1670893c6126ddf640a3f249
libhbaapi-2.2.9-13.el8.x86_64.rpm
5b30454dec6b8cfb4cff21b86b2b2f5ac24bfd8b1670893c6126ddf640a3f249
libhbaapi-2.2.9-13.el8.x86_64.rpm
5b30454dec6b8cfb4cff21b86b2b2f5ac24bfd8b1670893c6126ddf640a3f249
libhbaapi-2.2.9-13.el8.x86_64.rpm
5b30454dec6b8cfb4cff21b86b2b2f5ac24bfd8b1670893c6126ddf640a3f249
RLBA-2019:3593
ipset bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipset.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
ipset-7.1-1.el8.x86_64.rpm
22501332b1b75b42a98aa341a80edcc098ec54aa78621e2b3fd4e16bac76ffa0
ipset-7.1-1.el8.x86_64.rpm
22501332b1b75b42a98aa341a80edcc098ec54aa78621e2b3fd4e16bac76ffa0
ipset-7.1-1.el8.x86_64.rpm
22501332b1b75b42a98aa341a80edcc098ec54aa78621e2b3fd4e16bac76ffa0
ipset-7.1-1.el8.x86_64.rpm
22501332b1b75b42a98aa341a80edcc098ec54aa78621e2b3fd4e16bac76ffa0
ipset-libs-7.1-1.el8.i686.rpm
19f5a70125c95940ab3246e16c75fa7711d79b298ff83e9420e4ff2af7443a62
ipset-libs-7.1-1.el8.i686.rpm
19f5a70125c95940ab3246e16c75fa7711d79b298ff83e9420e4ff2af7443a62
ipset-libs-7.1-1.el8.i686.rpm
19f5a70125c95940ab3246e16c75fa7711d79b298ff83e9420e4ff2af7443a62
ipset-libs-7.1-1.el8.i686.rpm
19f5a70125c95940ab3246e16c75fa7711d79b298ff83e9420e4ff2af7443a62
ipset-libs-7.1-1.el8.x86_64.rpm
03f4ddae9fd27fca79b7c20f90405f304d6143d2985d50b3d322626a61bdcaee
ipset-libs-7.1-1.el8.x86_64.rpm
03f4ddae9fd27fca79b7c20f90405f304d6143d2985d50b3d322626a61bdcaee
ipset-libs-7.1-1.el8.x86_64.rpm
03f4ddae9fd27fca79b7c20f90405f304d6143d2985d50b3d322626a61bdcaee
ipset-libs-7.1-1.el8.x86_64.rpm
03f4ddae9fd27fca79b7c20f90405f304d6143d2985d50b3d322626a61bdcaee
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
ipset-service-7.1-1.el8.noarch.rpm
c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193
RLEA-2019:3608
libaio bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libaio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libaio-0.3.112-1.el8.i686.rpm
fb7398a7bf33b4a4bcfea2d444bc499790d8e059184762b0c86e9398a50c904d
libaio-0.3.112-1.el8.i686.rpm
fb7398a7bf33b4a4bcfea2d444bc499790d8e059184762b0c86e9398a50c904d
libaio-0.3.112-1.el8.i686.rpm
fb7398a7bf33b4a4bcfea2d444bc499790d8e059184762b0c86e9398a50c904d
libaio-0.3.112-1.el8.i686.rpm
fb7398a7bf33b4a4bcfea2d444bc499790d8e059184762b0c86e9398a50c904d
libaio-0.3.112-1.el8.x86_64.rpm
c63cf16302ac4d02c13bed0eb384cf131be341a9dbcb413743c897d253b8d5a5
libaio-0.3.112-1.el8.x86_64.rpm
c63cf16302ac4d02c13bed0eb384cf131be341a9dbcb413743c897d253b8d5a5
libaio-0.3.112-1.el8.x86_64.rpm
c63cf16302ac4d02c13bed0eb384cf131be341a9dbcb413743c897d253b8d5a5
libaio-0.3.112-1.el8.x86_64.rpm
c63cf16302ac4d02c13bed0eb384cf131be341a9dbcb413743c897d253b8d5a5
libaio-devel-0.3.112-1.el8.i686.rpm
157172e03bb2bb4335de8d96a98124bc7d027027bdb4f07a84df50466009cd97
libaio-devel-0.3.112-1.el8.i686.rpm
157172e03bb2bb4335de8d96a98124bc7d027027bdb4f07a84df50466009cd97
libaio-devel-0.3.112-1.el8.i686.rpm
157172e03bb2bb4335de8d96a98124bc7d027027bdb4f07a84df50466009cd97
libaio-devel-0.3.112-1.el8.i686.rpm
157172e03bb2bb4335de8d96a98124bc7d027027bdb4f07a84df50466009cd97
libaio-devel-0.3.112-1.el8.x86_64.rpm
0c255ef4b3da4b21a290923d8a1081444cb52d1b04a49398d23fcba7f4f9fd4c
libaio-devel-0.3.112-1.el8.x86_64.rpm
0c255ef4b3da4b21a290923d8a1081444cb52d1b04a49398d23fcba7f4f9fd4c
libaio-devel-0.3.112-1.el8.x86_64.rpm
0c255ef4b3da4b21a290923d8a1081444cb52d1b04a49398d23fcba7f4f9fd4c
libaio-devel-0.3.112-1.el8.x86_64.rpm
0c255ef4b3da4b21a290923d8a1081444cb52d1b04a49398d23fcba7f4f9fd4c
RLBA-2019:3614
dbus-python bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus-python.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
python3-dbus-1.2.4-15.el8.x86_64.rpm
178e9fcb7cade5c6078c6992e1e101721f947e6355aa96046910e9c1d2d14a04
python3-dbus-1.2.4-15.el8.x86_64.rpm
178e9fcb7cade5c6078c6992e1e101721f947e6355aa96046910e9c1d2d14a04
python3-dbus-1.2.4-15.el8.x86_64.rpm
178e9fcb7cade5c6078c6992e1e101721f947e6355aa96046910e9c1d2d14a04
python3-dbus-1.2.4-15.el8.x86_64.rpm
178e9fcb7cade5c6078c6992e1e101721f947e6355aa96046910e9c1d2d14a04
RLBA-2019:3616
system-storage-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for system-storage-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
system-storage-manager-1.4-1.el8.noarch.rpm
6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f
RLBA-2019:3621
libidn2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libidn2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libidn2-2.2.0-1.el8.i686.rpm
b421f69aabaf9d60f4220790ce11d186edc6ac9849620b6ba803429237affb14
libidn2-2.2.0-1.el8.i686.rpm
b421f69aabaf9d60f4220790ce11d186edc6ac9849620b6ba803429237affb14
libidn2-2.2.0-1.el8.i686.rpm
b421f69aabaf9d60f4220790ce11d186edc6ac9849620b6ba803429237affb14
libidn2-2.2.0-1.el8.i686.rpm
b421f69aabaf9d60f4220790ce11d186edc6ac9849620b6ba803429237affb14
libidn2-2.2.0-1.el8.x86_64.rpm
ea3af5771feed5c6e8372db9ab809acb23b7851dfb4936cf9b0ac1cddd9eb6c2
libidn2-2.2.0-1.el8.x86_64.rpm
ea3af5771feed5c6e8372db9ab809acb23b7851dfb4936cf9b0ac1cddd9eb6c2
libidn2-2.2.0-1.el8.x86_64.rpm
ea3af5771feed5c6e8372db9ab809acb23b7851dfb4936cf9b0ac1cddd9eb6c2
libidn2-2.2.0-1.el8.x86_64.rpm
ea3af5771feed5c6e8372db9ab809acb23b7851dfb4936cf9b0ac1cddd9eb6c2
RLBA-2019:3627
python-schedutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-schedutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
python3-schedutils-0.6-6.el8.x86_64.rpm
d1ea85fc24ecd71a567b71b61480b777eefe7d35dc242ee20389ff8063255265
python3-schedutils-0.6-6.el8.x86_64.rpm
d1ea85fc24ecd71a567b71b61480b777eefe7d35dc242ee20389ff8063255265
python3-schedutils-0.6-6.el8.x86_64.rpm
d1ea85fc24ecd71a567b71b61480b777eefe7d35dc242ee20389ff8063255265
python3-schedutils-0.6-6.el8.x86_64.rpm
d1ea85fc24ecd71a567b71b61480b777eefe7d35dc242ee20389ff8063255265
RLBA-2019:3634
blktrace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for blktrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
blktrace-1.2.0-10.el8.x86_64.rpm
0079f550f6567e1ddf706546acafa77580996e5db37342ae5ca4547a7cb12b6e
blktrace-1.2.0-10.el8.x86_64.rpm
0079f550f6567e1ddf706546acafa77580996e5db37342ae5ca4547a7cb12b6e
blktrace-1.2.0-10.el8.x86_64.rpm
0079f550f6567e1ddf706546acafa77580996e5db37342ae5ca4547a7cb12b6e
blktrace-1.2.0-10.el8.x86_64.rpm
0079f550f6567e1ddf706546acafa77580996e5db37342ae5ca4547a7cb12b6e
RLSA-2019:3643
Low: gettext security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for gettext.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs.
Security Fix(es):
* gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
gettext-0.19.8.1-17.el8.x86_64.rpm
a797ddfcee732000b4e68ecffd7c50ef7cefe51af92246c01e248ab98c3ae3a7
gettext-0.19.8.1-17.el8.x86_64.rpm
a797ddfcee732000b4e68ecffd7c50ef7cefe51af92246c01e248ab98c3ae3a7
gettext-0.19.8.1-17.el8.x86_64.rpm
a797ddfcee732000b4e68ecffd7c50ef7cefe51af92246c01e248ab98c3ae3a7
gettext-0.19.8.1-17.el8.x86_64.rpm
a797ddfcee732000b4e68ecffd7c50ef7cefe51af92246c01e248ab98c3ae3a7
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-devel-0.19.8.1-17.el8.i686.rpm
13ec63c8e88055ba6a0c284d2ccd40231f32a1b2a53217947fa3060955e8c85c
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-common-devel-0.19.8.1-17.el8.noarch.rpm
00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522
gettext-devel-0.19.8.1-17.el8.i686.rpm
13ec63c8e88055ba6a0c284d2ccd40231f32a1b2a53217947fa3060955e8c85c
gettext-devel-0.19.8.1-17.el8.i686.rpm
13ec63c8e88055ba6a0c284d2ccd40231f32a1b2a53217947fa3060955e8c85c
gettext-devel-0.19.8.1-17.el8.i686.rpm
13ec63c8e88055ba6a0c284d2ccd40231f32a1b2a53217947fa3060955e8c85c
gettext-devel-0.19.8.1-17.el8.x86_64.rpm
8383d229584bbc38d2b2d335060b9431c46870e86a99762ef1d0b9aba0109fdd
gettext-devel-0.19.8.1-17.el8.x86_64.rpm
8383d229584bbc38d2b2d335060b9431c46870e86a99762ef1d0b9aba0109fdd
gettext-devel-0.19.8.1-17.el8.x86_64.rpm
8383d229584bbc38d2b2d335060b9431c46870e86a99762ef1d0b9aba0109fdd
gettext-devel-0.19.8.1-17.el8.x86_64.rpm
8383d229584bbc38d2b2d335060b9431c46870e86a99762ef1d0b9aba0109fdd
gettext-libs-0.19.8.1-17.el8.i686.rpm
ba25e3a7a699df469c74e4439a02b3111c31cda6383c392c54957e8225941c5a
gettext-libs-0.19.8.1-17.el8.i686.rpm
ba25e3a7a699df469c74e4439a02b3111c31cda6383c392c54957e8225941c5a
gettext-libs-0.19.8.1-17.el8.i686.rpm
ba25e3a7a699df469c74e4439a02b3111c31cda6383c392c54957e8225941c5a
gettext-libs-0.19.8.1-17.el8.i686.rpm
ba25e3a7a699df469c74e4439a02b3111c31cda6383c392c54957e8225941c5a
gettext-libs-0.19.8.1-17.el8.x86_64.rpm
558bb32c2c9116a5aa14a745462972f0b8769118a6524aca2ab72bbde863b479
gettext-libs-0.19.8.1-17.el8.x86_64.rpm
558bb32c2c9116a5aa14a745462972f0b8769118a6524aca2ab72bbde863b479
gettext-libs-0.19.8.1-17.el8.x86_64.rpm
558bb32c2c9116a5aa14a745462972f0b8769118a6524aca2ab72bbde863b479
gettext-libs-0.19.8.1-17.el8.x86_64.rpm
558bb32c2c9116a5aa14a745462972f0b8769118a6524aca2ab72bbde863b479
RLBA-2019:3645
gmp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
gmp-6.1.2-10.el8.i686.rpm
d695167ed65764b00ee199441a3683b12715d26b111ad97ae5e2d1806e93980a
gmp-6.1.2-10.el8.i686.rpm
d695167ed65764b00ee199441a3683b12715d26b111ad97ae5e2d1806e93980a
gmp-6.1.2-10.el8.i686.rpm
d695167ed65764b00ee199441a3683b12715d26b111ad97ae5e2d1806e93980a
gmp-6.1.2-10.el8.i686.rpm
d695167ed65764b00ee199441a3683b12715d26b111ad97ae5e2d1806e93980a
gmp-6.1.2-10.el8.x86_64.rpm
9d85101052864ffa596fe1bd1f2d6fe1349f28a912d4bbe2fe9333d39144734d
gmp-6.1.2-10.el8.x86_64.rpm
9d85101052864ffa596fe1bd1f2d6fe1349f28a912d4bbe2fe9333d39144734d
gmp-6.1.2-10.el8.x86_64.rpm
9d85101052864ffa596fe1bd1f2d6fe1349f28a912d4bbe2fe9333d39144734d
gmp-6.1.2-10.el8.x86_64.rpm
9d85101052864ffa596fe1bd1f2d6fe1349f28a912d4bbe2fe9333d39144734d
gmp-c++-6.1.2-10.el8.i686.rpm
9075beed6971a544075b856e51ee4299e7d36cdcaa34a523eb5c3ae1939be536
gmp-c++-6.1.2-10.el8.i686.rpm
9075beed6971a544075b856e51ee4299e7d36cdcaa34a523eb5c3ae1939be536
gmp-c++-6.1.2-10.el8.i686.rpm
9075beed6971a544075b856e51ee4299e7d36cdcaa34a523eb5c3ae1939be536
gmp-c++-6.1.2-10.el8.i686.rpm
9075beed6971a544075b856e51ee4299e7d36cdcaa34a523eb5c3ae1939be536
gmp-c++-6.1.2-10.el8.x86_64.rpm
dbe706499295b80a71198206294cc230b7ae19724309a58b333563246caa0603
gmp-c++-6.1.2-10.el8.x86_64.rpm
dbe706499295b80a71198206294cc230b7ae19724309a58b333563246caa0603
gmp-c++-6.1.2-10.el8.x86_64.rpm
dbe706499295b80a71198206294cc230b7ae19724309a58b333563246caa0603
gmp-c++-6.1.2-10.el8.x86_64.rpm
dbe706499295b80a71198206294cc230b7ae19724309a58b333563246caa0603
gmp-devel-6.1.2-10.el8.i686.rpm
1504770eac2d3b71d50ec1e5a84e79c52aab63e3e79a79ec57a7ceafab4712ba
gmp-devel-6.1.2-10.el8.i686.rpm
1504770eac2d3b71d50ec1e5a84e79c52aab63e3e79a79ec57a7ceafab4712ba
gmp-devel-6.1.2-10.el8.i686.rpm
1504770eac2d3b71d50ec1e5a84e79c52aab63e3e79a79ec57a7ceafab4712ba
gmp-devel-6.1.2-10.el8.i686.rpm
1504770eac2d3b71d50ec1e5a84e79c52aab63e3e79a79ec57a7ceafab4712ba
gmp-devel-6.1.2-10.el8.x86_64.rpm
194387ca389070ef23f10cad5b08a7087ccc7ad23f72918de8a66d7f4b15e97e
gmp-devel-6.1.2-10.el8.x86_64.rpm
194387ca389070ef23f10cad5b08a7087ccc7ad23f72918de8a66d7f4b15e97e
gmp-devel-6.1.2-10.el8.x86_64.rpm
194387ca389070ef23f10cad5b08a7087ccc7ad23f72918de8a66d7f4b15e97e
gmp-devel-6.1.2-10.el8.x86_64.rpm
194387ca389070ef23f10cad5b08a7087ccc7ad23f72918de8a66d7f4b15e97e
RLBA-2019:3664
nfs4-acl-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs4-acl-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
nfs4-acl-tools-0.3.5-3.el8.x86_64.rpm
2d5f8433daaef591d5ac4e837dc273b12fd79aee1185982b6e696a33a5ce5dcf
nfs4-acl-tools-0.3.5-3.el8.x86_64.rpm
2d5f8433daaef591d5ac4e837dc273b12fd79aee1185982b6e696a33a5ce5dcf
nfs4-acl-tools-0.3.5-3.el8.x86_64.rpm
2d5f8433daaef591d5ac4e837dc273b12fd79aee1185982b6e696a33a5ce5dcf
nfs4-acl-tools-0.3.5-3.el8.x86_64.rpm
2d5f8433daaef591d5ac4e837dc273b12fd79aee1185982b6e696a33a5ce5dcf
RLBA-2019:3667
mtr bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mtr.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
mtr-0.92-3.el8.x86_64.rpm
2438e443ba3d25741e0f4b22b08fb41ab6029d6492f96a4d8a09d695b86ec720
mtr-0.92-3.el8.x86_64.rpm
2438e443ba3d25741e0f4b22b08fb41ab6029d6492f96a4d8a09d695b86ec720
mtr-0.92-3.el8.x86_64.rpm
2438e443ba3d25741e0f4b22b08fb41ab6029d6492f96a4d8a09d695b86ec720
mtr-0.92-3.el8.x86_64.rpm
2438e443ba3d25741e0f4b22b08fb41ab6029d6492f96a4d8a09d695b86ec720
RLEA-2019:3677
isns-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for isns-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
isns-utils-0.99-1.el8.x86_64.rpm
5be8b3fbcf614d5e6aa2baa445a2b4ad8d23c50f2eececb1b2c504442bd418b6
isns-utils-0.99-1.el8.x86_64.rpm
5be8b3fbcf614d5e6aa2baa445a2b4ad8d23c50f2eececb1b2c504442bd418b6
isns-utils-0.99-1.el8.x86_64.rpm
5be8b3fbcf614d5e6aa2baa445a2b4ad8d23c50f2eececb1b2c504442bd418b6
isns-utils-0.99-1.el8.x86_64.rpm
5be8b3fbcf614d5e6aa2baa445a2b4ad8d23c50f2eececb1b2c504442bd418b6
isns-utils-devel-0.99-1.el8.i686.rpm
66b9cecaacff0fa27fbf11d74d2d06b6278715012e9376807c64564168daceea
isns-utils-devel-0.99-1.el8.i686.rpm
66b9cecaacff0fa27fbf11d74d2d06b6278715012e9376807c64564168daceea
isns-utils-devel-0.99-1.el8.i686.rpm
66b9cecaacff0fa27fbf11d74d2d06b6278715012e9376807c64564168daceea
isns-utils-devel-0.99-1.el8.i686.rpm
66b9cecaacff0fa27fbf11d74d2d06b6278715012e9376807c64564168daceea
isns-utils-devel-0.99-1.el8.x86_64.rpm
cbcc8ce7cf8fb61f618855c2c683fba8f106a1cc7015e11df3ae795857001ae0
isns-utils-devel-0.99-1.el8.x86_64.rpm
cbcc8ce7cf8fb61f618855c2c683fba8f106a1cc7015e11df3ae795857001ae0
isns-utils-devel-0.99-1.el8.x86_64.rpm
cbcc8ce7cf8fb61f618855c2c683fba8f106a1cc7015e11df3ae795857001ae0
isns-utils-devel-0.99-1.el8.x86_64.rpm
cbcc8ce7cf8fb61f618855c2c683fba8f106a1cc7015e11df3ae795857001ae0
isns-utils-libs-0.99-1.el8.i686.rpm
33436b3e584eb0e3a169d08fe0b02c163d2ad992263d72a62ef82d81d6fa359b
isns-utils-libs-0.99-1.el8.i686.rpm
33436b3e584eb0e3a169d08fe0b02c163d2ad992263d72a62ef82d81d6fa359b
isns-utils-libs-0.99-1.el8.i686.rpm
33436b3e584eb0e3a169d08fe0b02c163d2ad992263d72a62ef82d81d6fa359b
isns-utils-libs-0.99-1.el8.i686.rpm
33436b3e584eb0e3a169d08fe0b02c163d2ad992263d72a62ef82d81d6fa359b
isns-utils-libs-0.99-1.el8.x86_64.rpm
e6ee7e4950e05234991b0852a37eadd2ca38656d6e6fb96f1fdd87f29e6d3cde
isns-utils-libs-0.99-1.el8.x86_64.rpm
e6ee7e4950e05234991b0852a37eadd2ca38656d6e6fb96f1fdd87f29e6d3cde
isns-utils-libs-0.99-1.el8.x86_64.rpm
e6ee7e4950e05234991b0852a37eadd2ca38656d6e6fb96f1fdd87f29e6d3cde
isns-utils-libs-0.99-1.el8.x86_64.rpm
e6ee7e4950e05234991b0852a37eadd2ca38656d6e6fb96f1fdd87f29e6d3cde
RLBA-2019:3693
python-requests bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-requests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-requests package contains a library designed to make HTTP requests easy for developers.
Bug fix:
* The fix CVE-2018-18074 leads to a regression (BZ#1758261)
none-baseos-rpms
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
python3-requests-2.20.0-2.1.el8_1.noarch.rpm
434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40
RLSA-2020:0633
Important: ppp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for ppp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line.
Security Fix(es):
* ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
RLSA-2020:0902
Important: icu security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for icu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
icu-60.3-2.el8_1.x86_64.rpm
f1b4645d5eef72c2e6fb9349b2c324b713964758e8066270718f555fb05ebfcd
icu-60.3-2.el8_1.x86_64.rpm
f1b4645d5eef72c2e6fb9349b2c324b713964758e8066270718f555fb05ebfcd
icu-60.3-2.el8_1.x86_64.rpm
f1b4645d5eef72c2e6fb9349b2c324b713964758e8066270718f555fb05ebfcd
icu-60.3-2.el8_1.x86_64.rpm
f1b4645d5eef72c2e6fb9349b2c324b713964758e8066270718f555fb05ebfcd
libicu-60.3-2.el8_1.i686.rpm
56d6a419d7736f7ab627e3285a80d8711dcb79146a12354e53c989c7da2d5319
libicu-60.3-2.el8_1.i686.rpm
56d6a419d7736f7ab627e3285a80d8711dcb79146a12354e53c989c7da2d5319
libicu-60.3-2.el8_1.i686.rpm
56d6a419d7736f7ab627e3285a80d8711dcb79146a12354e53c989c7da2d5319
libicu-60.3-2.el8_1.i686.rpm
56d6a419d7736f7ab627e3285a80d8711dcb79146a12354e53c989c7da2d5319
libicu-60.3-2.el8_1.x86_64.rpm
5d6b3bcd416ba36bd1107aa5a70db598b52acdf7bd6a8d6f021e591438a3a2bf
libicu-60.3-2.el8_1.x86_64.rpm
5d6b3bcd416ba36bd1107aa5a70db598b52acdf7bd6a8d6f021e591438a3a2bf
libicu-60.3-2.el8_1.x86_64.rpm
5d6b3bcd416ba36bd1107aa5a70db598b52acdf7bd6a8d6f021e591438a3a2bf
libicu-60.3-2.el8_1.x86_64.rpm
5d6b3bcd416ba36bd1107aa5a70db598b52acdf7bd6a8d6f021e591438a3a2bf
libicu-devel-60.3-2.el8_1.i686.rpm
681cdaebbba88d62ac8ea34b17dbe2632076c9054c2a14c4f16b193f978ae094
libicu-devel-60.3-2.el8_1.i686.rpm
681cdaebbba88d62ac8ea34b17dbe2632076c9054c2a14c4f16b193f978ae094
libicu-devel-60.3-2.el8_1.i686.rpm
681cdaebbba88d62ac8ea34b17dbe2632076c9054c2a14c4f16b193f978ae094
libicu-devel-60.3-2.el8_1.i686.rpm
681cdaebbba88d62ac8ea34b17dbe2632076c9054c2a14c4f16b193f978ae094
libicu-devel-60.3-2.el8_1.x86_64.rpm
6ee3edad33895d25c96dc0b27afb23ee8abd496317283e47bd57cc7ec21b6591
libicu-devel-60.3-2.el8_1.x86_64.rpm
6ee3edad33895d25c96dc0b27afb23ee8abd496317283e47bd57cc7ec21b6591
libicu-devel-60.3-2.el8_1.x86_64.rpm
6ee3edad33895d25c96dc0b27afb23ee8abd496317283e47bd57cc7ec21b6591
libicu-devel-60.3-2.el8_1.x86_64.rpm
6ee3edad33895d25c96dc0b27afb23ee8abd496317283e47bd57cc7ec21b6591
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
libicu-doc-60.3-2.el8_1.noarch.rpm
908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995
RLBA-2020:1759
newt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for newt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
newt-0.52.20-11.el8.i686.rpm
165f4d92d5e513438f24545629fbece7612ed43e3da664fa6a0f01209a5b897e
newt-0.52.20-11.el8.i686.rpm
165f4d92d5e513438f24545629fbece7612ed43e3da664fa6a0f01209a5b897e
newt-0.52.20-11.el8.i686.rpm
165f4d92d5e513438f24545629fbece7612ed43e3da664fa6a0f01209a5b897e
newt-0.52.20-11.el8.i686.rpm
165f4d92d5e513438f24545629fbece7612ed43e3da664fa6a0f01209a5b897e
newt-0.52.20-11.el8.x86_64.rpm
f61d82c9f375c4a73cae95f3b3eb41218ce894c906d0c3e32d792f0aec24b939
newt-0.52.20-11.el8.x86_64.rpm
f61d82c9f375c4a73cae95f3b3eb41218ce894c906d0c3e32d792f0aec24b939
newt-0.52.20-11.el8.x86_64.rpm
f61d82c9f375c4a73cae95f3b3eb41218ce894c906d0c3e32d792f0aec24b939
newt-0.52.20-11.el8.x86_64.rpm
f61d82c9f375c4a73cae95f3b3eb41218ce894c906d0c3e32d792f0aec24b939
RLSA-2020:1766
Moderate: GNOME security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
* LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
* gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
* gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
* gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
* gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
mozjs52-52.9.0-2.el8.i686.rpm
c0a0dc0a030638c2ad3858d8656be3acd9f484f9f43b4c8ea965b95dec01645c
mozjs52-52.9.0-2.el8.i686.rpm
c0a0dc0a030638c2ad3858d8656be3acd9f484f9f43b4c8ea965b95dec01645c
mozjs52-52.9.0-2.el8.i686.rpm
c0a0dc0a030638c2ad3858d8656be3acd9f484f9f43b4c8ea965b95dec01645c
mozjs52-52.9.0-2.el8.i686.rpm
c0a0dc0a030638c2ad3858d8656be3acd9f484f9f43b4c8ea965b95dec01645c
mozjs52-52.9.0-2.el8.x86_64.rpm
303edb185d9c0ff3b990b76cc1fb526acc4a617c943959b19ca961f2fa65801b
mozjs52-52.9.0-2.el8.x86_64.rpm
303edb185d9c0ff3b990b76cc1fb526acc4a617c943959b19ca961f2fa65801b
mozjs52-52.9.0-2.el8.x86_64.rpm
303edb185d9c0ff3b990b76cc1fb526acc4a617c943959b19ca961f2fa65801b
mozjs52-52.9.0-2.el8.x86_64.rpm
303edb185d9c0ff3b990b76cc1fb526acc4a617c943959b19ca961f2fa65801b
mozjs60-60.9.0-4.el8.i686.rpm
2ba422c443081be75d35f113f5f28b6505a2c1078a1501eb437bb3a260dcd244
mozjs60-60.9.0-4.el8.i686.rpm
2ba422c443081be75d35f113f5f28b6505a2c1078a1501eb437bb3a260dcd244
mozjs60-60.9.0-4.el8.i686.rpm
2ba422c443081be75d35f113f5f28b6505a2c1078a1501eb437bb3a260dcd244
mozjs60-60.9.0-4.el8.i686.rpm
2ba422c443081be75d35f113f5f28b6505a2c1078a1501eb437bb3a260dcd244
mozjs60-60.9.0-4.el8.x86_64.rpm
39168874c4eb1ee6a23c3ee625e5a0d83e7b15cc3172171e8c3783ba69db5383
mozjs60-60.9.0-4.el8.x86_64.rpm
39168874c4eb1ee6a23c3ee625e5a0d83e7b15cc3172171e8c3783ba69db5383
mozjs60-60.9.0-4.el8.x86_64.rpm
39168874c4eb1ee6a23c3ee625e5a0d83e7b15cc3172171e8c3783ba69db5383
mozjs60-60.9.0-4.el8.x86_64.rpm
39168874c4eb1ee6a23c3ee625e5a0d83e7b15cc3172171e8c3783ba69db5383
RLEA-2020:1767
flatpak bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bubblewrap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
bubblewrap-0.4.0-1.el8.x86_64.rpm
caa9312ef14df68d33a27cce5e22d472eac068efda16021394c4d16c2d2e6a04
bubblewrap-0.4.0-1.el8.x86_64.rpm
caa9312ef14df68d33a27cce5e22d472eac068efda16021394c4d16c2d2e6a04
bubblewrap-0.4.0-1.el8.x86_64.rpm
caa9312ef14df68d33a27cce5e22d472eac068efda16021394c4d16c2d2e6a04
bubblewrap-0.4.0-1.el8.x86_64.rpm
caa9312ef14df68d33a27cce5e22d472eac068efda16021394c4d16c2d2e6a04
RLBA-2020:1768
ipcalc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ipcalc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
ipcalc-0.2.4-4.el8.x86_64.rpm
850ee6e1ed955a3ada21629c5c27f44dddec37d75eea1024d0779a0e08ce30bd
ipcalc-0.2.4-4.el8.x86_64.rpm
850ee6e1ed955a3ada21629c5c27f44dddec37d75eea1024d0779a0e08ce30bd
ipcalc-0.2.4-4.el8.x86_64.rpm
850ee6e1ed955a3ada21629c5c27f44dddec37d75eea1024d0779a0e08ce30bd
ipcalc-0.2.4-4.el8.x86_64.rpm
850ee6e1ed955a3ada21629c5c27f44dddec37d75eea1024d0779a0e08ce30bd
RLBA-2020:1781
ModemManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ModemManager, usb_modeswitch-data, mobile-broadband-provider-info, libmbim, libqmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise
Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
libmbim-1.20.2-1.el8.i686.rpm
33af6984af49470a5c0df6e31525c55c1ef1fff98038e0bf4adb643946693933
libmbim-1.20.2-1.el8.i686.rpm
33af6984af49470a5c0df6e31525c55c1ef1fff98038e0bf4adb643946693933
libmbim-1.20.2-1.el8.x86_64.rpm
51f8673b92c632f81a99b71ca47f429e2bd3bff109792110f2406742cb9f98bc
libmbim-1.20.2-1.el8.x86_64.rpm
51f8673b92c632f81a99b71ca47f429e2bd3bff109792110f2406742cb9f98bc
libmbim-utils-1.20.2-1.el8.x86_64.rpm
13a9c11358da6916ee90abc9f42145e7ed0b78bd528118161e33775d9b1d75e7
libmbim-utils-1.20.2-1.el8.x86_64.rpm
13a9c11358da6916ee90abc9f42145e7ed0b78bd528118161e33775d9b1d75e7
libqmi-1.24.0-1.el8.i686.rpm
9dd0b24198f6576b81ead986fcbdaa1cb46d6fefe58f6b940fbc7a1e3cd8e129
libqmi-1.24.0-1.el8.x86_64.rpm
8f4d82b5d4d2092c94e1fa8d3688e2b25b7ca3d8487d4989260a6f0db47fb1c4
libqmi-utils-1.24.0-1.el8.x86_64.rpm
68c7f7a9cf1b52a08a36a4f4609b08367fdbba400d313b0a57386755e7f8ca1b
mobile-broadband-provider-info-20190618-2.el8.noarch.rpm
f9a7bdd4d99946e18049d0f4c904843e8cce9e071f508edcab04e589aa93a88e
mobile-broadband-provider-info-20190618-2.el8.noarch.rpm
f9a7bdd4d99946e18049d0f4c904843e8cce9e071f508edcab04e589aa93a88e
ModemManager-1.10.8-2.el8.x86_64.rpm
e09b4f3b2050d9a34d8ac618bee9d1506254ae64b0fb2b36cec79c84e472d49a
ModemManager-glib-1.10.8-2.el8.i686.rpm
c49adcc2da4cf41ea595fbae9b3133a81a336d1d09038fa406825e0282f2699e
ModemManager-glib-1.10.8-2.el8.x86_64.rpm
f08e75d3a267a87c3ec4b60ea6c7e52990667b9f120bfbdc69134d43c1bd8ad5
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
usb_modeswitch-data-20191128-1.el8.noarch.rpm
e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd
RLBA-2020:1791
libnetfilter_cthelper bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnetfilter_cthelper.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
libnetfilter_cthelper-1.0.0-15.el8.i686.rpm
cc2540dffa63defe24662f121824b4661a2dd96c09581139db02e81d75050fdc
libnetfilter_cthelper-1.0.0-15.el8.i686.rpm
cc2540dffa63defe24662f121824b4661a2dd96c09581139db02e81d75050fdc
libnetfilter_cthelper-1.0.0-15.el8.i686.rpm
cc2540dffa63defe24662f121824b4661a2dd96c09581139db02e81d75050fdc
libnetfilter_cthelper-1.0.0-15.el8.i686.rpm
cc2540dffa63defe24662f121824b4661a2dd96c09581139db02e81d75050fdc
libnetfilter_cthelper-1.0.0-15.el8.x86_64.rpm
55d6fea4f31b1767a42b926d7a3c352cc1dd05f5ff3d5d34536cc24aa549f9f8
libnetfilter_cthelper-1.0.0-15.el8.x86_64.rpm
55d6fea4f31b1767a42b926d7a3c352cc1dd05f5ff3d5d34536cc24aa549f9f8
libnetfilter_cthelper-1.0.0-15.el8.x86_64.rpm
55d6fea4f31b1767a42b926d7a3c352cc1dd05f5ff3d5d34536cc24aa549f9f8
libnetfilter_cthelper-1.0.0-15.el8.x86_64.rpm
55d6fea4f31b1767a42b926d7a3c352cc1dd05f5ff3d5d34536cc24aa549f9f8
RLBA-2020:1839
mcstrans bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcstrans.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
mcstrans-2.9-2.el8.x86_64.rpm
c16a97680ef086ecf9ba0c086a3d71d21f7cd5056a2fec2c86cfce66d3583c35
mcstrans-2.9-2.el8.x86_64.rpm
c16a97680ef086ecf9ba0c086a3d71d21f7cd5056a2fec2c86cfce66d3583c35
mcstrans-2.9-2.el8.x86_64.rpm
c16a97680ef086ecf9ba0c086a3d71d21f7cd5056a2fec2c86cfce66d3583c35
mcstrans-2.9-2.el8.x86_64.rpm
c16a97680ef086ecf9ba0c086a3d71d21f7cd5056a2fec2c86cfce66d3583c35
RLBA-2020:1822
pywbem bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pywbem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
python3-pywbem-0.11.0-8.el8.noarch.rpm
55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7
RLBA-2020:1846
conntrack-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for conntrack-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
conntrack-tools-1.4.4-10.el8.x86_64.rpm
2fb578da41af4312f8395570c02f7d3969a101915df202bb7ab2c2bcff5d62a1
conntrack-tools-1.4.4-10.el8.x86_64.rpm
2fb578da41af4312f8395570c02f7d3969a101915df202bb7ab2c2bcff5d62a1
conntrack-tools-1.4.4-10.el8.x86_64.rpm
2fb578da41af4312f8395570c02f7d3969a101915df202bb7ab2c2bcff5d62a1
conntrack-tools-1.4.4-10.el8.x86_64.rpm
2fb578da41af4312f8395570c02f7d3969a101915df202bb7ab2c2bcff5d62a1
RLBA-2020:1850
pigz bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pigz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
pigz-2.4-4.el8.x86_64.rpm
2de6c9c49c29bb2bb0b0851e1e05c3607576c7708cbbc607ddcb8aa4636c4aa4
pigz-2.4-4.el8.x86_64.rpm
2de6c9c49c29bb2bb0b0851e1e05c3607576c7708cbbc607ddcb8aa4636c4aa4
pigz-2.4-4.el8.x86_64.rpm
2de6c9c49c29bb2bb0b0851e1e05c3607576c7708cbbc607ddcb8aa4636c4aa4
pigz-2.4-4.el8.x86_64.rpm
2de6c9c49c29bb2bb0b0851e1e05c3607576c7708cbbc607ddcb8aa4636c4aa4
RLSA-2020:1852
Moderate: patch security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for patch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file).
Security Fix(es):
* patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
patch-2.7.6-11.el8.x86_64.rpm
2a9c37c04fdb645c14de1a32eb344cdc53f29c2da8c75267264f4b632630163b
patch-2.7.6-11.el8.x86_64.rpm
2a9c37c04fdb645c14de1a32eb344cdc53f29c2da8c75267264f4b632630163b
patch-2.7.6-11.el8.x86_64.rpm
2a9c37c04fdb645c14de1a32eb344cdc53f29c2da8c75267264f4b632630163b
patch-2.7.6-11.el8.x86_64.rpm
2a9c37c04fdb645c14de1a32eb344cdc53f29c2da8c75267264f4b632630163b
RLBA-2020:1853
diffutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for diffutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
diffutils-3.6-6.el8.x86_64.rpm
a1b4592d6a8f9c88ed8cc427f053779177a16439b93535179b569031adc87788
diffutils-3.6-6.el8.x86_64.rpm
a1b4592d6a8f9c88ed8cc427f053779177a16439b93535179b569031adc87788
diffutils-3.6-6.el8.x86_64.rpm
a1b4592d6a8f9c88ed8cc427f053779177a16439b93535179b569031adc87788
diffutils-3.6-6.el8.x86_64.rpm
a1b4592d6a8f9c88ed8cc427f053779177a16439b93535179b569031adc87788
RLBA-2020:1871
openssl-pkcs11 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssl-pkcs11.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
openssl-pkcs11-0.4.10-2.el8.i686.rpm
48ea79f1b14bee76b7a1a3045ceaa1f18bc716f9f656a18e14f7dc84423687bc
openssl-pkcs11-0.4.10-2.el8.i686.rpm
48ea79f1b14bee76b7a1a3045ceaa1f18bc716f9f656a18e14f7dc84423687bc
openssl-pkcs11-0.4.10-2.el8.i686.rpm
48ea79f1b14bee76b7a1a3045ceaa1f18bc716f9f656a18e14f7dc84423687bc
openssl-pkcs11-0.4.10-2.el8.i686.rpm
48ea79f1b14bee76b7a1a3045ceaa1f18bc716f9f656a18e14f7dc84423687bc
openssl-pkcs11-0.4.10-2.el8.x86_64.rpm
22c10f2160b0de3f3e14bcc113a2a213168c7aa33941c8c40aed08856eb104c5
openssl-pkcs11-0.4.10-2.el8.x86_64.rpm
22c10f2160b0de3f3e14bcc113a2a213168c7aa33941c8c40aed08856eb104c5
openssl-pkcs11-0.4.10-2.el8.x86_64.rpm
22c10f2160b0de3f3e14bcc113a2a213168c7aa33941c8c40aed08856eb104c5
openssl-pkcs11-0.4.10-2.el8.x86_64.rpm
22c10f2160b0de3f3e14bcc113a2a213168c7aa33941c8c40aed08856eb104c5
RLBA-2020:1891
arpwatch bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for arpwatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
arpwatch-2.1a15-44.el8.x86_64.rpm
4aba514a9ecd56d2107585b268a7e4a967afb0806c18a2f3711d2636464f2efa
arpwatch-2.1a15-44.el8.x86_64.rpm
4aba514a9ecd56d2107585b268a7e4a967afb0806c18a2f3711d2636464f2efa
arpwatch-2.1a15-44.el8.x86_64.rpm
4aba514a9ecd56d2107585b268a7e4a967afb0806c18a2f3711d2636464f2efa
arpwatch-2.1a15-44.el8.x86_64.rpm
4aba514a9ecd56d2107585b268a7e4a967afb0806c18a2f3711d2636464f2efa
RLBA-2020:1902
liberation-fonts bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liberation-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-2.00.3-7.el8.noarch.rpm
0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-fonts-common-2.00.3-7.el8.noarch.rpm
125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-mono-fonts-2.00.3-7.el8.noarch.rpm
5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-sans-fonts-2.00.3-7.el8.noarch.rpm
3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
liberation-serif-fonts-2.00.3-7.el8.noarch.rpm
41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff
RLBA-2020:1910
cifs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cifs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
cifs-utils-6.8-3.el8.x86_64.rpm
287a82f37e037b668afdef6add67ff15f36f21f07355e04626130777e7866c66
cifs-utils-6.8-3.el8.x86_64.rpm
287a82f37e037b668afdef6add67ff15f36f21f07355e04626130777e7866c66
cifs-utils-6.8-3.el8.x86_64.rpm
287a82f37e037b668afdef6add67ff15f36f21f07355e04626130777e7866c66
cifs-utils-6.8-3.el8.x86_64.rpm
287a82f37e037b668afdef6add67ff15f36f21f07355e04626130777e7866c66
pam_cifscreds-6.8-3.el8.x86_64.rpm
f9681d292cefcf13793c8d4e8b5e3c20c2fd0613f0160502a4f320a3ecc76745
pam_cifscreds-6.8-3.el8.x86_64.rpm
f9681d292cefcf13793c8d4e8b5e3c20c2fd0613f0160502a4f320a3ecc76745
pam_cifscreds-6.8-3.el8.x86_64.rpm
f9681d292cefcf13793c8d4e8b5e3c20c2fd0613f0160502a4f320a3ecc76745
pam_cifscreds-6.8-3.el8.x86_64.rpm
f9681d292cefcf13793c8d4e8b5e3c20c2fd0613f0160502a4f320a3ecc76745
RLBA-2020:1919
ppp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ppp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
ppp-2.4.7-26.el8_1.x86_64.rpm
d6d03a071c272e3a0ad3df995e8e132c47ec281d4efed49ef2e91d2e765f62bb
RLSA-2020:2231
Important: Rocky Enterprise Software Foundation Ceph Storage 4.1 security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for smartmontools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
Security Fix(es):
* ceph-ansible: hard coded credential in ceph-ansible playbook (CVE-2020-1716)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information refer to the CVE page(s) listed in the References section.
Bug Fix(es) and Enhancement(s):
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Ceph Storage 4.1 Release Notes available at:
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.1/html/release_notes/index
none-baseos-rpms
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
RLSA-2020:2755
Important: nghttp2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nghttp2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libnghttp2-1.33.0-3.el8_3.1.i686.rpm
a5f79679f70cb455633f255065266ec05a336a4e97ff712d07b2b14ae54ab86c
libnghttp2-1.33.0-3.el8_3.1.i686.rpm
a5f79679f70cb455633f255065266ec05a336a4e97ff712d07b2b14ae54ab86c
libnghttp2-1.33.0-3.el8_3.1.i686.rpm
a5f79679f70cb455633f255065266ec05a336a4e97ff712d07b2b14ae54ab86c
libnghttp2-1.33.0-3.el8_3.1.i686.rpm
a5f79679f70cb455633f255065266ec05a336a4e97ff712d07b2b14ae54ab86c
libnghttp2-1.33.0-3.el8_3.1.x86_64.rpm
4a890e3f3c76faec98ac34935a4bd5c79de22ddda79b4d4884729a999f507557
libnghttp2-1.33.0-3.el8_3.1.x86_64.rpm
4a890e3f3c76faec98ac34935a4bd5c79de22ddda79b4d4884729a999f507557
libnghttp2-1.33.0-3.el8_3.1.x86_64.rpm
4a890e3f3c76faec98ac34935a4bd5c79de22ddda79b4d4884729a999f507557
libnghttp2-1.33.0-3.el8_3.1.x86_64.rpm
4a890e3f3c76faec98ac34935a4bd5c79de22ddda79b4d4884729a999f507557
RLSA-2020:3654
Moderate: libcroco security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libcroco.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library.
Security Fix(es):
* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libcroco-0.6.12-4.el8_2.1.i686.rpm
20c1c91930018f4d5e617393ede2d69465d0c8bd0f0b56f89c8efa7bfe642b8a
libcroco-0.6.12-4.el8_2.1.i686.rpm
20c1c91930018f4d5e617393ede2d69465d0c8bd0f0b56f89c8efa7bfe642b8a
libcroco-0.6.12-4.el8_2.1.i686.rpm
20c1c91930018f4d5e617393ede2d69465d0c8bd0f0b56f89c8efa7bfe642b8a
libcroco-0.6.12-4.el8_2.1.i686.rpm
20c1c91930018f4d5e617393ede2d69465d0c8bd0f0b56f89c8efa7bfe642b8a
libcroco-0.6.12-4.el8_2.1.x86_64.rpm
2278152c40bd3053c1dbc8dbd00dd59883cd839dcc8c11738bbe26cc520d246f
libcroco-0.6.12-4.el8_2.1.x86_64.rpm
2278152c40bd3053c1dbc8dbd00dd59883cd839dcc8c11738bbe26cc520d246f
libcroco-0.6.12-4.el8_2.1.x86_64.rpm
2278152c40bd3053c1dbc8dbd00dd59883cd839dcc8c11738bbe26cc520d246f
libcroco-0.6.12-4.el8_2.1.x86_64.rpm
2278152c40bd3053c1dbc8dbd00dd59883cd839dcc8c11738bbe26cc520d246f
RLBA-2020:4434
net-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
net-tools-2.0-0.52.20160912git.el8.x86_64.rpm
39265a074e5b4fb1e67e4c6531dc96d5a39fe1d2799a45267a137abde80dc795
net-tools-2.0-0.52.20160912git.el8.x86_64.rpm
39265a074e5b4fb1e67e4c6531dc96d5a39fe1d2799a45267a137abde80dc795
net-tools-2.0-0.52.20160912git.el8.x86_64.rpm
39265a074e5b4fb1e67e4c6531dc96d5a39fe1d2799a45267a137abde80dc795
net-tools-2.0-0.52.20160912git.el8.x86_64.rpm
39265a074e5b4fb1e67e4c6531dc96d5a39fe1d2799a45267a137abde80dc795
RLSA-2020:4436
Low: gnome-software and fwupd security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for appstream-data, libxmlb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop.
The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers.
The fwupd packages provide a service that allows session software to update device firmware.
The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2).
Security Fix(es):
* fwupd: Possible bypass in signature verification (CVE-2020-10759)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libxmlb-0.1.15-1.el8.i686.rpm
e5598a8633e1d7ab40ab7c6875ef748e2846eb77f7869eb0a3721d28feccfed2
libxmlb-0.1.15-1.el8.i686.rpm
e5598a8633e1d7ab40ab7c6875ef748e2846eb77f7869eb0a3721d28feccfed2
libxmlb-0.1.15-1.el8.i686.rpm
e5598a8633e1d7ab40ab7c6875ef748e2846eb77f7869eb0a3721d28feccfed2
libxmlb-0.1.15-1.el8.i686.rpm
e5598a8633e1d7ab40ab7c6875ef748e2846eb77f7869eb0a3721d28feccfed2
libxmlb-0.1.15-1.el8.x86_64.rpm
b10eb2df2f927d4f350fc7eda0210589a952bf6ed4aba81a9276bee26b605b1e
libxmlb-0.1.15-1.el8.x86_64.rpm
b10eb2df2f927d4f350fc7eda0210589a952bf6ed4aba81a9276bee26b605b1e
libxmlb-0.1.15-1.el8.x86_64.rpm
b10eb2df2f927d4f350fc7eda0210589a952bf6ed4aba81a9276bee26b605b1e
libxmlb-0.1.15-1.el8.x86_64.rpm
b10eb2df2f927d4f350fc7eda0210589a952bf6ed4aba81a9276bee26b605b1e
RLBA-2020:4437
python-setuptools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-setuptools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
platform-python-setuptools-39.2.0-6.el8.noarch.rpm
4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-39.2.0-6.el8.noarch.rpm
5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm
acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1
RLSA-2020:4451
Moderate: GNOME security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406)
Security Fix(es):
* webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793)
* gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391)
* LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
gsettings-desktop-schemas-3.32.0-5.el8.x86_64.rpm
dacdae336d159e8e6f40e7999c8c58b5daab28d351b3b3c1dcdff6e296d42f52
libsoup-2.62.3-2.el8.i686.rpm
3e6f21ced5a58b67460a6e5e1796388ea4600742b96e0155dd8d60580b9c191f
libsoup-2.62.3-2.el8.i686.rpm
3e6f21ced5a58b67460a6e5e1796388ea4600742b96e0155dd8d60580b9c191f
libsoup-2.62.3-2.el8.i686.rpm
3e6f21ced5a58b67460a6e5e1796388ea4600742b96e0155dd8d60580b9c191f
libsoup-2.62.3-2.el8.i686.rpm
3e6f21ced5a58b67460a6e5e1796388ea4600742b96e0155dd8d60580b9c191f
libsoup-2.62.3-2.el8.x86_64.rpm
016ca0305984238d33fea53cf9c1b3d7c80d104d941d2b0ba564e82877c7fe7d
libsoup-2.62.3-2.el8.x86_64.rpm
016ca0305984238d33fea53cf9c1b3d7c80d104d941d2b0ba564e82877c7fe7d
libsoup-2.62.3-2.el8.x86_64.rpm
016ca0305984238d33fea53cf9c1b3d7c80d104d941d2b0ba564e82877c7fe7d
libsoup-2.62.3-2.el8.x86_64.rpm
016ca0305984238d33fea53cf9c1b3d7c80d104d941d2b0ba564e82877c7fe7d
python3-gobject-base-3.28.3-2.el8.x86_64.rpm
054d5e126a9616b4597b76efb2866d407c07aa583f35f59d1a641536166e419d
python3-gobject-base-3.28.3-2.el8.x86_64.rpm
054d5e126a9616b4597b76efb2866d407c07aa583f35f59d1a641536166e419d
python3-gobject-base-3.28.3-2.el8.x86_64.rpm
054d5e126a9616b4597b76efb2866d407c07aa583f35f59d1a641536166e419d
python3-gobject-base-3.28.3-2.el8.x86_64.rpm
054d5e126a9616b4597b76efb2866d407c07aa583f35f59d1a641536166e419d
RLEA-2020:4468
lsof bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lsof.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
lsof-4.93.2-1.el8.x86_64.rpm
b4d2f4694b9c55482198c5d525c358186ce46efd96557731044c72e7aede1c1a
lsof-4.93.2-1.el8.x86_64.rpm
b4d2f4694b9c55482198c5d525c358186ce46efd96557731044c72e7aede1c1a
lsof-4.93.2-1.el8.x86_64.rpm
b4d2f4694b9c55482198c5d525c358186ce46efd96557731044c72e7aede1c1a
lsof-4.93.2-1.el8.x86_64.rpm
b4d2f4694b9c55482198c5d525c358186ce46efd96557731044c72e7aede1c1a
RLBA-2020:4452
libhugetlbfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libhugetlbfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libhugetlbfs-2.21-17.el8.x86_64.rpm
611454dbdaee76de3866dae2441a1f2b4f48cb2b83b281969f5fdb3a5bf87395
libhugetlbfs-2.21-17.el8.x86_64.rpm
611454dbdaee76de3866dae2441a1f2b4f48cb2b83b281969f5fdb3a5bf87395
libhugetlbfs-2.21-17.el8.x86_64.rpm
611454dbdaee76de3866dae2441a1f2b4f48cb2b83b281969f5fdb3a5bf87395
libhugetlbfs-2.21-17.el8.x86_64.rpm
611454dbdaee76de3866dae2441a1f2b4f48cb2b83b281969f5fdb3a5bf87395
libhugetlbfs-devel-2.21-17.el8.i686.rpm
db66ac036e36c6cae274d2e79f074d7cca7f2ee954e167c9082f7a9d6adbfb88
libhugetlbfs-devel-2.21-17.el8.i686.rpm
db66ac036e36c6cae274d2e79f074d7cca7f2ee954e167c9082f7a9d6adbfb88
libhugetlbfs-devel-2.21-17.el8.i686.rpm
db66ac036e36c6cae274d2e79f074d7cca7f2ee954e167c9082f7a9d6adbfb88
libhugetlbfs-devel-2.21-17.el8.i686.rpm
db66ac036e36c6cae274d2e79f074d7cca7f2ee954e167c9082f7a9d6adbfb88
libhugetlbfs-devel-2.21-17.el8.x86_64.rpm
d4a09e04231a2a731f6ec0bd22fe3748b1dd58c133bf41787ed418af16f4ebc3
libhugetlbfs-devel-2.21-17.el8.x86_64.rpm
d4a09e04231a2a731f6ec0bd22fe3748b1dd58c133bf41787ed418af16f4ebc3
libhugetlbfs-devel-2.21-17.el8.x86_64.rpm
d4a09e04231a2a731f6ec0bd22fe3748b1dd58c133bf41787ed418af16f4ebc3
libhugetlbfs-devel-2.21-17.el8.x86_64.rpm
d4a09e04231a2a731f6ec0bd22fe3748b1dd58c133bf41787ed418af16f4ebc3
libhugetlbfs-utils-2.21-17.el8.x86_64.rpm
363c463d261b44cd8f2aa186664a1c2013818d9f4763244f246710c8c2405c55
libhugetlbfs-utils-2.21-17.el8.x86_64.rpm
363c463d261b44cd8f2aa186664a1c2013818d9f4763244f246710c8c2405c55
libhugetlbfs-utils-2.21-17.el8.x86_64.rpm
363c463d261b44cd8f2aa186664a1c2013818d9f4763244f246710c8c2405c55
libhugetlbfs-utils-2.21-17.el8.x86_64.rpm
363c463d261b44cd8f2aa186664a1c2013818d9f4763244f246710c8c2405c55
RLEA-2020:4487
smartmontools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smartmontools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
smartmontools-7.1-1.el8.x86_64.rpm
020b8bc5f3e209ade9de71d23c2c589ac052e90037337d448208d558e26f0e23
RLBA-2020:4488
libkcapi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libkcapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libkcapi-1.2.0-2.el8.i686.rpm
bf43fe69e4a79479d459db1e4150022cd5462a9d84f32882ace38e3ec4e2448f
libkcapi-1.2.0-2.el8.i686.rpm
bf43fe69e4a79479d459db1e4150022cd5462a9d84f32882ace38e3ec4e2448f
libkcapi-1.2.0-2.el8.i686.rpm
bf43fe69e4a79479d459db1e4150022cd5462a9d84f32882ace38e3ec4e2448f
libkcapi-1.2.0-2.el8.i686.rpm
bf43fe69e4a79479d459db1e4150022cd5462a9d84f32882ace38e3ec4e2448f
libkcapi-1.2.0-2.el8.x86_64.rpm
4132f4295574f5e253182356ca865f319830192f02463230b88eea53ca01e863
libkcapi-1.2.0-2.el8.x86_64.rpm
4132f4295574f5e253182356ca865f319830192f02463230b88eea53ca01e863
libkcapi-1.2.0-2.el8.x86_64.rpm
4132f4295574f5e253182356ca865f319830192f02463230b88eea53ca01e863
libkcapi-1.2.0-2.el8.x86_64.rpm
4132f4295574f5e253182356ca865f319830192f02463230b88eea53ca01e863
libkcapi-hmaccalc-1.2.0-2.el8.x86_64.rpm
d3b39fc9d0daf55a3db203b4cfba9794b6e280db190a30de4760fef86b827e74
libkcapi-hmaccalc-1.2.0-2.el8.x86_64.rpm
d3b39fc9d0daf55a3db203b4cfba9794b6e280db190a30de4760fef86b827e74
libkcapi-hmaccalc-1.2.0-2.el8.x86_64.rpm
d3b39fc9d0daf55a3db203b4cfba9794b6e280db190a30de4760fef86b827e74
libkcapi-hmaccalc-1.2.0-2.el8.x86_64.rpm
d3b39fc9d0daf55a3db203b4cfba9794b6e280db190a30de4760fef86b827e74
RLBA-2020:4501
iprutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iprutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
iprutils-2.4.19-1.el8.x86_64.rpm
675b4d270e6f975c69e3d058cc1264c5c69fd2af1ae21302ee8ee46014bf559c
iprutils-2.4.19-1.el8.x86_64.rpm
675b4d270e6f975c69e3d058cc1264c5c69fd2af1ae21302ee8ee46014bf559c
iprutils-2.4.19-1.el8.x86_64.rpm
675b4d270e6f975c69e3d058cc1264c5c69fd2af1ae21302ee8ee46014bf559c
iprutils-2.4.19-1.el8.x86_64.rpm
675b4d270e6f975c69e3d058cc1264c5c69fd2af1ae21302ee8ee46014bf559c
RLEA-2020:4506
python-configshell bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-configshell.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
python3-configshell-1.1.28-1.el8.noarch.rpm
7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff
RLBA-2020:4512
libteam bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libteam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libteam-1.31-2.el8.i686.rpm
7ad3cfebb9398f3413165323192d37e702eb15e4f501b49540e56c8ae3fd5241
libteam-1.31-2.el8.i686.rpm
7ad3cfebb9398f3413165323192d37e702eb15e4f501b49540e56c8ae3fd5241
libteam-1.31-2.el8.i686.rpm
7ad3cfebb9398f3413165323192d37e702eb15e4f501b49540e56c8ae3fd5241
libteam-1.31-2.el8.i686.rpm
7ad3cfebb9398f3413165323192d37e702eb15e4f501b49540e56c8ae3fd5241
libteam-1.31-2.el8.x86_64.rpm
152bf33845fd06b584d2998be9c4f4bfd6e3bed869890881c83d7465113c017e
libteam-1.31-2.el8.x86_64.rpm
152bf33845fd06b584d2998be9c4f4bfd6e3bed869890881c83d7465113c017e
libteam-1.31-2.el8.x86_64.rpm
152bf33845fd06b584d2998be9c4f4bfd6e3bed869890881c83d7465113c017e
libteam-1.31-2.el8.x86_64.rpm
152bf33845fd06b584d2998be9c4f4bfd6e3bed869890881c83d7465113c017e
libteam-doc-1.31-2.el8.x86_64.rpm
6a9e9a225d53f8ae97e6821e283f62a2d9b5234ba01567aafb8c8fb147bb7952
libteam-doc-1.31-2.el8.x86_64.rpm
6a9e9a225d53f8ae97e6821e283f62a2d9b5234ba01567aafb8c8fb147bb7952
libteam-doc-1.31-2.el8.x86_64.rpm
6a9e9a225d53f8ae97e6821e283f62a2d9b5234ba01567aafb8c8fb147bb7952
libteam-doc-1.31-2.el8.x86_64.rpm
6a9e9a225d53f8ae97e6821e283f62a2d9b5234ba01567aafb8c8fb147bb7952
network-scripts-team-1.31-2.el8.x86_64.rpm
8ce10c87c100dc14c61f84d527d4aab03a5c4ced3dc9fedf33e7a42047ecd623
network-scripts-team-1.31-2.el8.x86_64.rpm
8ce10c87c100dc14c61f84d527d4aab03a5c4ced3dc9fedf33e7a42047ecd623
network-scripts-team-1.31-2.el8.x86_64.rpm
8ce10c87c100dc14c61f84d527d4aab03a5c4ced3dc9fedf33e7a42047ecd623
network-scripts-team-1.31-2.el8.x86_64.rpm
8ce10c87c100dc14c61f84d527d4aab03a5c4ced3dc9fedf33e7a42047ecd623
teamd-1.31-2.el8.i686.rpm
f9500feae013fcccbe7941ce6fea0ab9162c0b75ac0d2701bcfc838a0bdc16d3
teamd-1.31-2.el8.i686.rpm
f9500feae013fcccbe7941ce6fea0ab9162c0b75ac0d2701bcfc838a0bdc16d3
teamd-1.31-2.el8.i686.rpm
f9500feae013fcccbe7941ce6fea0ab9162c0b75ac0d2701bcfc838a0bdc16d3
teamd-1.31-2.el8.i686.rpm
f9500feae013fcccbe7941ce6fea0ab9162c0b75ac0d2701bcfc838a0bdc16d3
teamd-1.31-2.el8.x86_64.rpm
cb0ee7ee6223e6a77792f23611cecd151c84018f4d060a6767572b705a29ed95
teamd-1.31-2.el8.x86_64.rpm
cb0ee7ee6223e6a77792f23611cecd151c84018f4d060a6767572b705a29ed95
teamd-1.31-2.el8.x86_64.rpm
cb0ee7ee6223e6a77792f23611cecd151c84018f4d060a6767572b705a29ed95
teamd-1.31-2.el8.x86_64.rpm
cb0ee7ee6223e6a77792f23611cecd151c84018f4d060a6767572b705a29ed95
RLBA-2020:4522
libqb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libqb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libqb-1.0.3-12.el8.i686.rpm
677df5c1429e46f4693ef7bfd3e1dd27bd483569673c212b84ce328ee3f5eeac
libqb-1.0.3-12.el8.i686.rpm
677df5c1429e46f4693ef7bfd3e1dd27bd483569673c212b84ce328ee3f5eeac
libqb-1.0.3-12.el8.i686.rpm
677df5c1429e46f4693ef7bfd3e1dd27bd483569673c212b84ce328ee3f5eeac
libqb-1.0.3-12.el8.i686.rpm
677df5c1429e46f4693ef7bfd3e1dd27bd483569673c212b84ce328ee3f5eeac
libqb-1.0.3-12.el8.x86_64.rpm
c71e8a2594210d6db2747e8db26b37b87c3a198b41bc8d908cc87d8b9df4dc9f
libqb-1.0.3-12.el8.x86_64.rpm
c71e8a2594210d6db2747e8db26b37b87c3a198b41bc8d908cc87d8b9df4dc9f
libqb-1.0.3-12.el8.x86_64.rpm
c71e8a2594210d6db2747e8db26b37b87c3a198b41bc8d908cc87d8b9df4dc9f
libqb-1.0.3-12.el8.x86_64.rpm
c71e8a2594210d6db2747e8db26b37b87c3a198b41bc8d908cc87d8b9df4dc9f
libqb-devel-1.0.3-12.el8.i686.rpm
37fd377b75175a440410a9acb69bac210add58a11a9050a81a7e3e69cabd87b4
libqb-devel-1.0.3-12.el8.i686.rpm
37fd377b75175a440410a9acb69bac210add58a11a9050a81a7e3e69cabd87b4
libqb-devel-1.0.3-12.el8.i686.rpm
37fd377b75175a440410a9acb69bac210add58a11a9050a81a7e3e69cabd87b4
libqb-devel-1.0.3-12.el8.i686.rpm
37fd377b75175a440410a9acb69bac210add58a11a9050a81a7e3e69cabd87b4
libqb-devel-1.0.3-12.el8.x86_64.rpm
be742d786bdbf7a50d32ee3ea1a0e38241e4a7591b9dbb9230dea307cc0d9159
libqb-devel-1.0.3-12.el8.x86_64.rpm
be742d786bdbf7a50d32ee3ea1a0e38241e4a7591b9dbb9230dea307cc0d9159
libqb-devel-1.0.3-12.el8.x86_64.rpm
be742d786bdbf7a50d32ee3ea1a0e38241e4a7591b9dbb9230dea307cc0d9159
libqb-devel-1.0.3-12.el8.x86_64.rpm
be742d786bdbf7a50d32ee3ea1a0e38241e4a7591b9dbb9230dea307cc0d9159
RLBA-2020:4538
logrotate bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for logrotate.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
logrotate-3.14.0-4.el8.x86_64.rpm
73460643270dd618329b637a9bc9e2e96b7b70c346ed008e6b763b505eb48fc5
logrotate-3.14.0-4.el8.x86_64.rpm
73460643270dd618329b637a9bc9e2e96b7b70c346ed008e6b763b505eb48fc5
logrotate-3.14.0-4.el8.x86_64.rpm
73460643270dd618329b637a9bc9e2e96b7b70c346ed008e6b763b505eb48fc5
logrotate-3.14.0-4.el8.x86_64.rpm
73460643270dd618329b637a9bc9e2e96b7b70c346ed008e6b763b505eb48fc5
RLEA-2020:4555
libpsl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpsl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libpsl-0.20.2-6.el8.i686.rpm
1b0ae114bb3de26ddb95e0c40b625b4fdcca7432d32fbc912c0d2e981240ec31
libpsl-0.20.2-6.el8.i686.rpm
1b0ae114bb3de26ddb95e0c40b625b4fdcca7432d32fbc912c0d2e981240ec31
libpsl-0.20.2-6.el8.i686.rpm
1b0ae114bb3de26ddb95e0c40b625b4fdcca7432d32fbc912c0d2e981240ec31
libpsl-0.20.2-6.el8.i686.rpm
1b0ae114bb3de26ddb95e0c40b625b4fdcca7432d32fbc912c0d2e981240ec31
libpsl-0.20.2-6.el8.x86_64.rpm
959ed630f56f3d83a87a857e9d3e6f5b835bbed6081bf304a8a5929ca4f7c34d
libpsl-0.20.2-6.el8.x86_64.rpm
959ed630f56f3d83a87a857e9d3e6f5b835bbed6081bf304a8a5929ca4f7c34d
libpsl-0.20.2-6.el8.x86_64.rpm
959ed630f56f3d83a87a857e9d3e6f5b835bbed6081bf304a8a5929ca4f7c34d
libpsl-0.20.2-6.el8.x86_64.rpm
959ed630f56f3d83a87a857e9d3e6f5b835bbed6081bf304a8a5929ca4f7c34d
RLEA-2020:4556
libnetfilter_queue bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnetfilter_queue.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libnetfilter_queue-1.0.4-3.el8.i686.rpm
b17fa7e3579f0e3e72d9c3580681a96dc4509353b3830c7d167c19335a2e52c4
libnetfilter_queue-1.0.4-3.el8.i686.rpm
b17fa7e3579f0e3e72d9c3580681a96dc4509353b3830c7d167c19335a2e52c4
libnetfilter_queue-1.0.4-3.el8.i686.rpm
b17fa7e3579f0e3e72d9c3580681a96dc4509353b3830c7d167c19335a2e52c4
libnetfilter_queue-1.0.4-3.el8.i686.rpm
b17fa7e3579f0e3e72d9c3580681a96dc4509353b3830c7d167c19335a2e52c4
libnetfilter_queue-1.0.4-3.el8.x86_64.rpm
9526e529709b247f3beb1bff8b02e37b8ef6dd47d1f63cc4df81d398ee342734
libnetfilter_queue-1.0.4-3.el8.x86_64.rpm
9526e529709b247f3beb1bff8b02e37b8ef6dd47d1f63cc4df81d398ee342734
libnetfilter_queue-1.0.4-3.el8.x86_64.rpm
9526e529709b247f3beb1bff8b02e37b8ef6dd47d1f63cc4df81d398ee342734
libnetfilter_queue-1.0.4-3.el8.x86_64.rpm
9526e529709b247f3beb1bff8b02e37b8ef6dd47d1f63cc4df81d398ee342734
RLBA-2020:4557
zstd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zstd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libzstd-1.4.4-1.el8.i686.rpm
940a9a459c211e1e10cc1e81a2d1b2f78c656f9e8b54881229e623cc8d3a8948
libzstd-1.4.4-1.el8.i686.rpm
940a9a459c211e1e10cc1e81a2d1b2f78c656f9e8b54881229e623cc8d3a8948
libzstd-1.4.4-1.el8.i686.rpm
940a9a459c211e1e10cc1e81a2d1b2f78c656f9e8b54881229e623cc8d3a8948
libzstd-1.4.4-1.el8.i686.rpm
940a9a459c211e1e10cc1e81a2d1b2f78c656f9e8b54881229e623cc8d3a8948
libzstd-1.4.4-1.el8.x86_64.rpm
c3e950878a53d2e6743af8338cf5f0b1afb053034c9eee5ea6797e352d72eca0
libzstd-1.4.4-1.el8.x86_64.rpm
c3e950878a53d2e6743af8338cf5f0b1afb053034c9eee5ea6797e352d72eca0
libzstd-1.4.4-1.el8.x86_64.rpm
c3e950878a53d2e6743af8338cf5f0b1afb053034c9eee5ea6797e352d72eca0
libzstd-1.4.4-1.el8.x86_64.rpm
c3e950878a53d2e6743af8338cf5f0b1afb053034c9eee5ea6797e352d72eca0
libzstd-devel-1.4.4-1.el8.i686.rpm
9b86b61d2b6a78c2550e2033fe7cd862ade4d8a80349375263588412b44fae46
libzstd-devel-1.4.4-1.el8.i686.rpm
9b86b61d2b6a78c2550e2033fe7cd862ade4d8a80349375263588412b44fae46
libzstd-devel-1.4.4-1.el8.i686.rpm
9b86b61d2b6a78c2550e2033fe7cd862ade4d8a80349375263588412b44fae46
libzstd-devel-1.4.4-1.el8.i686.rpm
9b86b61d2b6a78c2550e2033fe7cd862ade4d8a80349375263588412b44fae46
libzstd-devel-1.4.4-1.el8.x86_64.rpm
331809e24bcf0caad686f00dfcad0cd3d75b7bd623402194d31e3eb2d2b5f5f9
libzstd-devel-1.4.4-1.el8.x86_64.rpm
331809e24bcf0caad686f00dfcad0cd3d75b7bd623402194d31e3eb2d2b5f5f9
libzstd-devel-1.4.4-1.el8.x86_64.rpm
331809e24bcf0caad686f00dfcad0cd3d75b7bd623402194d31e3eb2d2b5f5f9
libzstd-devel-1.4.4-1.el8.x86_64.rpm
331809e24bcf0caad686f00dfcad0cd3d75b7bd623402194d31e3eb2d2b5f5f9
RLBA-2020:4564
kabi-dw bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kabi-dw.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
kabi-dw-0-0.10.20200515gitb52ac13.el8.x86_64.rpm
1396a3dfcfc4628e0a611e1a24be8f05e1c61a0e7c49f5cbb4573eed87867ee6
kabi-dw-0-0.10.20200515gitb52ac13.el8.x86_64.rpm
1396a3dfcfc4628e0a611e1a24be8f05e1c61a0e7c49f5cbb4573eed87867ee6
kabi-dw-0-0.10.20200515gitb52ac13.el8.x86_64.rpm
1396a3dfcfc4628e0a611e1a24be8f05e1c61a0e7c49f5cbb4573eed87867ee6
kabi-dw-0-0.10.20200515gitb52ac13.el8.x86_64.rpm
1396a3dfcfc4628e0a611e1a24be8f05e1c61a0e7c49f5cbb4573eed87867ee6
RLBA-2020:4580
kbd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kbd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
kbd-2.0.4-10.el8.x86_64.rpm
b977c7a619b0b6169de05a40808a1b08155cca9978fbb6b413489d564444f42b
kbd-2.0.4-10.el8.x86_64.rpm
b977c7a619b0b6169de05a40808a1b08155cca9978fbb6b413489d564444f42b
kbd-2.0.4-10.el8.x86_64.rpm
b977c7a619b0b6169de05a40808a1b08155cca9978fbb6b413489d564444f42b
kbd-2.0.4-10.el8.x86_64.rpm
b977c7a619b0b6169de05a40808a1b08155cca9978fbb6b413489d564444f42b
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-legacy-2.0.4-10.el8.noarch.rpm
8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
kbd-misc-2.0.4-10.el8.noarch.rpm
86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c
RLEA-2020:4587
libusbx bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libusbx.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libusbx-1.0.23-4.el8.i686.rpm
c9cd873e86af72541c545ec0ef4da3a8fb4c5a910eb7f63a268c36828ca5e0cc
libusbx-1.0.23-4.el8.i686.rpm
c9cd873e86af72541c545ec0ef4da3a8fb4c5a910eb7f63a268c36828ca5e0cc
libusbx-1.0.23-4.el8.i686.rpm
c9cd873e86af72541c545ec0ef4da3a8fb4c5a910eb7f63a268c36828ca5e0cc
libusbx-1.0.23-4.el8.i686.rpm
c9cd873e86af72541c545ec0ef4da3a8fb4c5a910eb7f63a268c36828ca5e0cc
libusbx-1.0.23-4.el8.x86_64.rpm
86732e3f404203f7874186f7593dbef63fba7f57ad82cce2a1de415e2759e7ed
libusbx-1.0.23-4.el8.x86_64.rpm
86732e3f404203f7874186f7593dbef63fba7f57ad82cce2a1de415e2759e7ed
libusbx-1.0.23-4.el8.x86_64.rpm
86732e3f404203f7874186f7593dbef63fba7f57ad82cce2a1de415e2759e7ed
libusbx-1.0.23-4.el8.x86_64.rpm
86732e3f404203f7874186f7593dbef63fba7f57ad82cce2a1de415e2759e7ed
libusbx-devel-1.0.23-4.el8.i686.rpm
f8fb7554158afda661ceefdd7c8ac63056aa050c71a3a4ca7f3d0bf7486badd3
libusbx-devel-1.0.23-4.el8.i686.rpm
f8fb7554158afda661ceefdd7c8ac63056aa050c71a3a4ca7f3d0bf7486badd3
libusbx-devel-1.0.23-4.el8.i686.rpm
f8fb7554158afda661ceefdd7c8ac63056aa050c71a3a4ca7f3d0bf7486badd3
libusbx-devel-1.0.23-4.el8.i686.rpm
f8fb7554158afda661ceefdd7c8ac63056aa050c71a3a4ca7f3d0bf7486badd3
libusbx-devel-1.0.23-4.el8.x86_64.rpm
678fa879f4c07f3ae2e365d1e84799baa844822284d83f203867edb7d49e8055
libusbx-devel-1.0.23-4.el8.x86_64.rpm
678fa879f4c07f3ae2e365d1e84799baa844822284d83f203867edb7d49e8055
libusbx-devel-1.0.23-4.el8.x86_64.rpm
678fa879f4c07f3ae2e365d1e84799baa844822284d83f203867edb7d49e8055
libusbx-devel-1.0.23-4.el8.x86_64.rpm
678fa879f4c07f3ae2e365d1e84799baa844822284d83f203867edb7d49e8055
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
libusbx-devel-doc-1.0.23-4.el8.noarch.rpm
71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6
RLEA-2020:4596
efivar bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for efivar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
efivar-37-4.el8.x86_64.rpm
8904e32e3d0204410a7eb6ec2f0ee99a7ed6fcaa43c2c92a5cc5b34c61b5bb83
efivar-37-4.el8.x86_64.rpm
8904e32e3d0204410a7eb6ec2f0ee99a7ed6fcaa43c2c92a5cc5b34c61b5bb83
efivar-37-4.el8.x86_64.rpm
8904e32e3d0204410a7eb6ec2f0ee99a7ed6fcaa43c2c92a5cc5b34c61b5bb83
efivar-37-4.el8.x86_64.rpm
8904e32e3d0204410a7eb6ec2f0ee99a7ed6fcaa43c2c92a5cc5b34c61b5bb83
efivar-libs-37-4.el8.i686.rpm
21742c38857f1582f6db045fc630a0a864fec7938ed91f3b0de01933f2a442ff
efivar-libs-37-4.el8.i686.rpm
21742c38857f1582f6db045fc630a0a864fec7938ed91f3b0de01933f2a442ff
efivar-libs-37-4.el8.i686.rpm
21742c38857f1582f6db045fc630a0a864fec7938ed91f3b0de01933f2a442ff
efivar-libs-37-4.el8.i686.rpm
21742c38857f1582f6db045fc630a0a864fec7938ed91f3b0de01933f2a442ff
efivar-libs-37-4.el8.x86_64.rpm
b8284762feb00345dfbb8d8e5257e6ae09e8e135907d2e57ee1df79d5b166a8f
efivar-libs-37-4.el8.x86_64.rpm
b8284762feb00345dfbb8d8e5257e6ae09e8e135907d2e57ee1df79d5b166a8f
efivar-libs-37-4.el8.x86_64.rpm
b8284762feb00345dfbb8d8e5257e6ae09e8e135907d2e57ee1df79d5b166a8f
efivar-libs-37-4.el8.x86_64.rpm
b8284762feb00345dfbb8d8e5257e6ae09e8e135907d2e57ee1df79d5b166a8f
RLBA-2020:4592
psmisc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for psmisc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
psmisc-23.1-5.el8.x86_64.rpm
a69d8873b2131a2322457e26850d9b9a33daf98f2143f648cd418e7fe1aec9ce
psmisc-23.1-5.el8.x86_64.rpm
a69d8873b2131a2322457e26850d9b9a33daf98f2143f648cd418e7fe1aec9ce
psmisc-23.1-5.el8.x86_64.rpm
a69d8873b2131a2322457e26850d9b9a33daf98f2143f648cd418e7fe1aec9ce
psmisc-23.1-5.el8.x86_64.rpm
a69d8873b2131a2322457e26850d9b9a33daf98f2143f648cd418e7fe1aec9ce
RLBA-2020:4600
snappy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for snappy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
snappy-1.1.8-3.el8.i686.rpm
953fe16231457e0387c09322fc1fb5f425b9eae2741b48db29ec553546edc720
snappy-1.1.8-3.el8.i686.rpm
953fe16231457e0387c09322fc1fb5f425b9eae2741b48db29ec553546edc720
snappy-1.1.8-3.el8.i686.rpm
953fe16231457e0387c09322fc1fb5f425b9eae2741b48db29ec553546edc720
snappy-1.1.8-3.el8.i686.rpm
953fe16231457e0387c09322fc1fb5f425b9eae2741b48db29ec553546edc720
snappy-1.1.8-3.el8.x86_64.rpm
2acdbf72851dbba66011a9f66397eeab45a9b48385e9462cee327bc3996deee6
snappy-1.1.8-3.el8.x86_64.rpm
2acdbf72851dbba66011a9f66397eeab45a9b48385e9462cee327bc3996deee6
snappy-1.1.8-3.el8.x86_64.rpm
2acdbf72851dbba66011a9f66397eeab45a9b48385e9462cee327bc3996deee6
snappy-1.1.8-3.el8.x86_64.rpm
2acdbf72851dbba66011a9f66397eeab45a9b48385e9462cee327bc3996deee6
RLEA-2020:4680
lmdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lmdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
lmdb-libs-0.9.24-1.el8.i686.rpm
6deb9da4d0251335006492e2b1e89ac11ff620fb45655e900dfc06a6553c0ed4
lmdb-libs-0.9.24-1.el8.i686.rpm
6deb9da4d0251335006492e2b1e89ac11ff620fb45655e900dfc06a6553c0ed4
lmdb-libs-0.9.24-1.el8.i686.rpm
6deb9da4d0251335006492e2b1e89ac11ff620fb45655e900dfc06a6553c0ed4
lmdb-libs-0.9.24-1.el8.i686.rpm
6deb9da4d0251335006492e2b1e89ac11ff620fb45655e900dfc06a6553c0ed4
lmdb-libs-0.9.24-1.el8.x86_64.rpm
79d1d3d6adae5cbea37a12157bf7b625b4868d61ba01abd4cd6134f973dfa350
lmdb-libs-0.9.24-1.el8.x86_64.rpm
79d1d3d6adae5cbea37a12157bf7b625b4868d61ba01abd4cd6134f973dfa350
lmdb-libs-0.9.24-1.el8.x86_64.rpm
79d1d3d6adae5cbea37a12157bf7b625b4868d61ba01abd4cd6134f973dfa350
lmdb-libs-0.9.24-1.el8.x86_64.rpm
79d1d3d6adae5cbea37a12157bf7b625b4868d61ba01abd4cd6134f973dfa350
RLEA-2020:4727
new module: perl:5.30
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592)
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2020:4802
perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLBA-2020:4841
liburing bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liburing.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
liburing-1.0.7-3.el8.x86_64.rpm
42cc626f78d9460239168948760b8ad1992cd7050a53c889c1e50ab654c83953
liburing-1.0.7-3.el8.x86_64.rpm
42cc626f78d9460239168948760b8ad1992cd7050a53c889c1e50ab654c83953
liburing-1.0.7-3.el8.i686.rpm
416feaa3ee699a850a3a2afa8fdccf8c096004e254414564ecb3f68b358a51d8
liburing-1.0.7-3.el8.i686.rpm
416feaa3ee699a850a3a2afa8fdccf8c096004e254414564ecb3f68b358a51d8
RLBA-2021:0564
dbxtool bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbxtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dbxtool packages provide a command line utility and a one-shot systemd
service for applying UEFI Secure Boot DBX updates.
Bug Fix(es) and Enhancement(s):
* [Dell Rocky Linux 8.2 BUG] dbxtool: fails to list with 'EFI Signature List is
malformed' (BZ#1912474)
none-baseos-rpms
dbxtool-8-5.el8_3.2.x86_64.rpm
db6f49de47d206b32aeaec6ca21494df84ba9cd832fa3c8214c71acf9155732d
dbxtool-8-5.el8_3.2.x86_64.rpm
db6f49de47d206b32aeaec6ca21494df84ba9cd832fa3c8214c71acf9155732d
dbxtool-8-5.el8_3.2.x86_64.rpm
db6f49de47d206b32aeaec6ca21494df84ba9cd832fa3c8214c71acf9155732d
dbxtool-8-5.el8_3.2.x86_64.rpm
db6f49de47d206b32aeaec6ca21494df84ba9cd832fa3c8214c71acf9155732d
RLSA-2021:0618
Important: stunnel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for stunnel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption.
Security Fix(es):
* stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
stunnel-5.56-5.el8_3.x86_64.rpm
007b91d221867f26728ec23985fdc988ae188615edab218683cc910e03135e57
stunnel-5.56-5.el8_3.x86_64.rpm
007b91d221867f26728ec23985fdc988ae188615edab218683cc910e03135e57
stunnel-5.56-5.el8_3.x86_64.rpm
007b91d221867f26728ec23985fdc988ae188615edab218683cc910e03135e57
stunnel-5.56-5.el8_3.x86_64.rpm
007b91d221867f26728ec23985fdc988ae188615edab218683cc910e03135e57
RLEA-2020:4767
perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLSA-2021:1586
Moderate: GNOME security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)
Security Fix(es):
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* glib2: insecure permissions for files and directories (CVE-2019-13012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
gamin-0.1.10-32.el8.i686.rpm
19d411c7e6066ff8e8f31300da4b2d98cd08fdb190929a05995d82e66695eb84
gamin-0.1.10-32.el8.i686.rpm
19d411c7e6066ff8e8f31300da4b2d98cd08fdb190929a05995d82e66695eb84
gamin-0.1.10-32.el8.i686.rpm
19d411c7e6066ff8e8f31300da4b2d98cd08fdb190929a05995d82e66695eb84
gamin-0.1.10-32.el8.i686.rpm
19d411c7e6066ff8e8f31300da4b2d98cd08fdb190929a05995d82e66695eb84
gamin-0.1.10-32.el8.x86_64.rpm
e2bb04623867c9df4b216726746d35e807471d4a2c2d2762c62be19b5ceb24c3
gamin-0.1.10-32.el8.x86_64.rpm
e2bb04623867c9df4b216726746d35e807471d4a2c2d2762c62be19b5ceb24c3
gamin-0.1.10-32.el8.x86_64.rpm
e2bb04623867c9df4b216726746d35e807471d4a2c2d2762c62be19b5ceb24c3
gamin-0.1.10-32.el8.x86_64.rpm
e2bb04623867c9df4b216726746d35e807471d4a2c2d2762c62be19b5ceb24c3
RLBA-2021:1587
librabbitmq bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librabbitmq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
librabbitmq-0.9.0-3.el8.i686.rpm
9bb0691140e0565d95d5aa9bb2e9497cafde648b75604f81e6341693d3762926
librabbitmq-0.9.0-3.el8.i686.rpm
9bb0691140e0565d95d5aa9bb2e9497cafde648b75604f81e6341693d3762926
librabbitmq-0.9.0-3.el8.i686.rpm
9bb0691140e0565d95d5aa9bb2e9497cafde648b75604f81e6341693d3762926
librabbitmq-0.9.0-3.el8.i686.rpm
9bb0691140e0565d95d5aa9bb2e9497cafde648b75604f81e6341693d3762926
librabbitmq-0.9.0-3.el8.x86_64.rpm
394dee37cc31d56e94a4b11529f302a8035d46bbcaa525dbb2970ad28e5449b0
librabbitmq-0.9.0-3.el8.x86_64.rpm
394dee37cc31d56e94a4b11529f302a8035d46bbcaa525dbb2970ad28e5449b0
librabbitmq-0.9.0-3.el8.x86_64.rpm
394dee37cc31d56e94a4b11529f302a8035d46bbcaa525dbb2970ad28e5449b0
librabbitmq-0.9.0-3.el8.x86_64.rpm
394dee37cc31d56e94a4b11529f302a8035d46bbcaa525dbb2970ad28e5449b0
RLBA-2021:1591
libxslt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libxslt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libxslt-1.1.32-6.el8.i686.rpm
2ab0efe5f1160e46943ce7da7efc3473b15c8e6cc9dcdf63eb9da5fbc77e6a39
libxslt-1.1.32-6.el8.i686.rpm
2ab0efe5f1160e46943ce7da7efc3473b15c8e6cc9dcdf63eb9da5fbc77e6a39
libxslt-1.1.32-6.el8.i686.rpm
2ab0efe5f1160e46943ce7da7efc3473b15c8e6cc9dcdf63eb9da5fbc77e6a39
libxslt-1.1.32-6.el8.i686.rpm
2ab0efe5f1160e46943ce7da7efc3473b15c8e6cc9dcdf63eb9da5fbc77e6a39
libxslt-1.1.32-6.el8.x86_64.rpm
9835b367c819ac0145a2981f5a4c8706d27c01086db8bd37b9ca3a2000d2a912
libxslt-1.1.32-6.el8.x86_64.rpm
9835b367c819ac0145a2981f5a4c8706d27c01086db8bd37b9ca3a2000d2a912
libxslt-1.1.32-6.el8.x86_64.rpm
9835b367c819ac0145a2981f5a4c8706d27c01086db8bd37b9ca3a2000d2a912
libxslt-1.1.32-6.el8.x86_64.rpm
9835b367c819ac0145a2981f5a4c8706d27c01086db8bd37b9ca3a2000d2a912
RLBA-2021:1599
memtest86+ bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memtest86+.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
memtest86+-5.01-20.el8.x86_64.rpm
731ecc28e5fcfb659cc3cccc10d4f991ccafbb487ea38875b54a10f70e0b7d3f
memtest86+-5.01-20.el8.x86_64.rpm
731ecc28e5fcfb659cc3cccc10d4f991ccafbb487ea38875b54a10f70e0b7d3f
memtest86+-5.01-20.el8.x86_64.rpm
731ecc28e5fcfb659cc3cccc10d4f991ccafbb487ea38875b54a10f70e0b7d3f
memtest86+-5.01-20.el8.x86_64.rpm
731ecc28e5fcfb659cc3cccc10d4f991ccafbb487ea38875b54a10f70e0b7d3f
RLSA-2021:1600
Moderate: opensc security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for opensc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures.
Security Fix(es):
* opensc: heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570)
* opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571)
* opensc: stack-based buffer overflow in tcos_decipher (CVE-2020-26572)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
opensc-0.20.0-4.el8.i686.rpm
76df1ce1367c1e9b4fa2546d19a19f0bee7183b9d35b58bb1d13f2405bc75e80
opensc-0.20.0-4.el8.i686.rpm
76df1ce1367c1e9b4fa2546d19a19f0bee7183b9d35b58bb1d13f2405bc75e80
opensc-0.20.0-4.el8.i686.rpm
76df1ce1367c1e9b4fa2546d19a19f0bee7183b9d35b58bb1d13f2405bc75e80
opensc-0.20.0-4.el8.i686.rpm
76df1ce1367c1e9b4fa2546d19a19f0bee7183b9d35b58bb1d13f2405bc75e80
opensc-0.20.0-4.el8.x86_64.rpm
90025cea2f96b0c026abfb8070d3fce48f42d7e1471ec16ac15fd8ae5914010d
opensc-0.20.0-4.el8.x86_64.rpm
90025cea2f96b0c026abfb8070d3fce48f42d7e1471ec16ac15fd8ae5914010d
opensc-0.20.0-4.el8.x86_64.rpm
90025cea2f96b0c026abfb8070d3fce48f42d7e1471ec16ac15fd8ae5914010d
opensc-0.20.0-4.el8.x86_64.rpm
90025cea2f96b0c026abfb8070d3fce48f42d7e1471ec16ac15fd8ae5914010d
RLSA-2021:1609
Moderate: p11-kit security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for p11-kit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files.
The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853)
Security Fix(es):
* p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361)
* p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362)
* p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
p11-kit-0.23.22-1.el8.i686.rpm
aa18123c2233c66af6226aea3712d348884dc61ebc341cefa3c379629484c946
p11-kit-0.23.22-1.el8.i686.rpm
aa18123c2233c66af6226aea3712d348884dc61ebc341cefa3c379629484c946
p11-kit-0.23.22-1.el8.i686.rpm
aa18123c2233c66af6226aea3712d348884dc61ebc341cefa3c379629484c946
p11-kit-0.23.22-1.el8.i686.rpm
aa18123c2233c66af6226aea3712d348884dc61ebc341cefa3c379629484c946
p11-kit-0.23.22-1.el8.x86_64.rpm
9f5dc45c3d292f4de8d942344546c66a5cca10d5a87676855d0cd12c11f1f72d
p11-kit-0.23.22-1.el8.x86_64.rpm
9f5dc45c3d292f4de8d942344546c66a5cca10d5a87676855d0cd12c11f1f72d
p11-kit-0.23.22-1.el8.x86_64.rpm
9f5dc45c3d292f4de8d942344546c66a5cca10d5a87676855d0cd12c11f1f72d
p11-kit-0.23.22-1.el8.x86_64.rpm
9f5dc45c3d292f4de8d942344546c66a5cca10d5a87676855d0cd12c11f1f72d
p11-kit-devel-0.23.22-1.el8.i686.rpm
90a046a346c8c6f0de3e812cdd5a329b118cfe8e9db571500914b186f098ffaa
p11-kit-devel-0.23.22-1.el8.i686.rpm
90a046a346c8c6f0de3e812cdd5a329b118cfe8e9db571500914b186f098ffaa
p11-kit-devel-0.23.22-1.el8.i686.rpm
90a046a346c8c6f0de3e812cdd5a329b118cfe8e9db571500914b186f098ffaa
p11-kit-devel-0.23.22-1.el8.i686.rpm
90a046a346c8c6f0de3e812cdd5a329b118cfe8e9db571500914b186f098ffaa
p11-kit-devel-0.23.22-1.el8.x86_64.rpm
4e6994a41a394d1a9d1741ba2c8347a9d018f69db5581e17555c9b803c005d4f
p11-kit-devel-0.23.22-1.el8.x86_64.rpm
4e6994a41a394d1a9d1741ba2c8347a9d018f69db5581e17555c9b803c005d4f
p11-kit-devel-0.23.22-1.el8.x86_64.rpm
4e6994a41a394d1a9d1741ba2c8347a9d018f69db5581e17555c9b803c005d4f
p11-kit-devel-0.23.22-1.el8.x86_64.rpm
4e6994a41a394d1a9d1741ba2c8347a9d018f69db5581e17555c9b803c005d4f
p11-kit-server-0.23.22-1.el8.x86_64.rpm
987cdbf6d866c5645723dd066c6fde16b9a684c0457f4600f90e04e0717e75d7
p11-kit-server-0.23.22-1.el8.x86_64.rpm
987cdbf6d866c5645723dd066c6fde16b9a684c0457f4600f90e04e0717e75d7
p11-kit-server-0.23.22-1.el8.x86_64.rpm
987cdbf6d866c5645723dd066c6fde16b9a684c0457f4600f90e04e0717e75d7
p11-kit-server-0.23.22-1.el8.x86_64.rpm
987cdbf6d866c5645723dd066c6fde16b9a684c0457f4600f90e04e0717e75d7
p11-kit-trust-0.23.22-1.el8.i686.rpm
56aa24440a809842da5f363101621054d08c0f6814108990f19cf8f4f5f2b7e0
p11-kit-trust-0.23.22-1.el8.i686.rpm
56aa24440a809842da5f363101621054d08c0f6814108990f19cf8f4f5f2b7e0
p11-kit-trust-0.23.22-1.el8.i686.rpm
56aa24440a809842da5f363101621054d08c0f6814108990f19cf8f4f5f2b7e0
p11-kit-trust-0.23.22-1.el8.i686.rpm
56aa24440a809842da5f363101621054d08c0f6814108990f19cf8f4f5f2b7e0
p11-kit-trust-0.23.22-1.el8.x86_64.rpm
050416bf341c01cacc9b6f5e815261ca96ea2fefdb8463238779665bb55a5704
p11-kit-trust-0.23.22-1.el8.x86_64.rpm
050416bf341c01cacc9b6f5e815261ca96ea2fefdb8463238779665bb55a5704
p11-kit-trust-0.23.22-1.el8.x86_64.rpm
050416bf341c01cacc9b6f5e815261ca96ea2fefdb8463238779665bb55a5704
p11-kit-trust-0.23.22-1.el8.x86_64.rpm
050416bf341c01cacc9b6f5e815261ca96ea2fefdb8463238779665bb55a5704
RLBA-2021:1612
avahi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
avahi-0.7-20.el8.i686.rpm
9a291a8319a43c4a9eaa9f41a582d1852687385513a4ddfea5a633b96b906bba
avahi-0.7-20.el8.i686.rpm
9a291a8319a43c4a9eaa9f41a582d1852687385513a4ddfea5a633b96b906bba
avahi-0.7-20.el8.i686.rpm
9a291a8319a43c4a9eaa9f41a582d1852687385513a4ddfea5a633b96b906bba
avahi-0.7-20.el8.i686.rpm
9a291a8319a43c4a9eaa9f41a582d1852687385513a4ddfea5a633b96b906bba
avahi-0.7-20.el8.x86_64.rpm
30ae1a91bfb06b039d06c46116973863d9d456167444d9bf38d958db678e4c9d
avahi-0.7-20.el8.x86_64.rpm
30ae1a91bfb06b039d06c46116973863d9d456167444d9bf38d958db678e4c9d
avahi-0.7-20.el8.x86_64.rpm
30ae1a91bfb06b039d06c46116973863d9d456167444d9bf38d958db678e4c9d
avahi-0.7-20.el8.x86_64.rpm
30ae1a91bfb06b039d06c46116973863d9d456167444d9bf38d958db678e4c9d
avahi-autoipd-0.7-20.el8.x86_64.rpm
b9a86831b5c1a2bdc66cf9eb87bc1b90addb654c193fc6afc8cc6337a08b254d
avahi-autoipd-0.7-20.el8.x86_64.rpm
b9a86831b5c1a2bdc66cf9eb87bc1b90addb654c193fc6afc8cc6337a08b254d
avahi-autoipd-0.7-20.el8.x86_64.rpm
b9a86831b5c1a2bdc66cf9eb87bc1b90addb654c193fc6afc8cc6337a08b254d
avahi-autoipd-0.7-20.el8.x86_64.rpm
b9a86831b5c1a2bdc66cf9eb87bc1b90addb654c193fc6afc8cc6337a08b254d
avahi-glib-0.7-20.el8.i686.rpm
fd75b44a0b0b0ec167eb03240f90948b5a6797fec57522195381d9b059a97e7f
avahi-glib-0.7-20.el8.i686.rpm
fd75b44a0b0b0ec167eb03240f90948b5a6797fec57522195381d9b059a97e7f
avahi-glib-0.7-20.el8.i686.rpm
fd75b44a0b0b0ec167eb03240f90948b5a6797fec57522195381d9b059a97e7f
avahi-glib-0.7-20.el8.i686.rpm
fd75b44a0b0b0ec167eb03240f90948b5a6797fec57522195381d9b059a97e7f
avahi-glib-0.7-20.el8.x86_64.rpm
0224bd59eef3020c7c236f708b218468de8620a0a911607e41dd31083c67b2e5
avahi-glib-0.7-20.el8.x86_64.rpm
0224bd59eef3020c7c236f708b218468de8620a0a911607e41dd31083c67b2e5
avahi-glib-0.7-20.el8.x86_64.rpm
0224bd59eef3020c7c236f708b218468de8620a0a911607e41dd31083c67b2e5
avahi-glib-0.7-20.el8.x86_64.rpm
0224bd59eef3020c7c236f708b218468de8620a0a911607e41dd31083c67b2e5
avahi-gobject-0.7-20.el8.i686.rpm
858f9d9bacef206cad2980ee284c78164acaab71577660b1abe939159c45c140
avahi-gobject-0.7-20.el8.i686.rpm
858f9d9bacef206cad2980ee284c78164acaab71577660b1abe939159c45c140
avahi-gobject-0.7-20.el8.i686.rpm
858f9d9bacef206cad2980ee284c78164acaab71577660b1abe939159c45c140
avahi-gobject-0.7-20.el8.i686.rpm
858f9d9bacef206cad2980ee284c78164acaab71577660b1abe939159c45c140
avahi-gobject-0.7-20.el8.x86_64.rpm
deff9ad93a1c8146f0176e3b12c4486b8936978750fe704329f041c6163bebaf
avahi-gobject-0.7-20.el8.x86_64.rpm
deff9ad93a1c8146f0176e3b12c4486b8936978750fe704329f041c6163bebaf
avahi-gobject-0.7-20.el8.x86_64.rpm
deff9ad93a1c8146f0176e3b12c4486b8936978750fe704329f041c6163bebaf
avahi-gobject-0.7-20.el8.x86_64.rpm
deff9ad93a1c8146f0176e3b12c4486b8936978750fe704329f041c6163bebaf
avahi-libs-0.7-20.el8.i686.rpm
55d779e043b863f85e8505fde05d5142aee090dea825ddd464bf7308357414ec
avahi-libs-0.7-20.el8.i686.rpm
55d779e043b863f85e8505fde05d5142aee090dea825ddd464bf7308357414ec
avahi-libs-0.7-20.el8.i686.rpm
55d779e043b863f85e8505fde05d5142aee090dea825ddd464bf7308357414ec
avahi-libs-0.7-20.el8.i686.rpm
55d779e043b863f85e8505fde05d5142aee090dea825ddd464bf7308357414ec
avahi-libs-0.7-20.el8.x86_64.rpm
4025ada765b99bd04a94850b628b480d30d997674671bd78d2f73ed3acf37a55
avahi-libs-0.7-20.el8.x86_64.rpm
4025ada765b99bd04a94850b628b480d30d997674671bd78d2f73ed3acf37a55
avahi-libs-0.7-20.el8.x86_64.rpm
4025ada765b99bd04a94850b628b480d30d997674671bd78d2f73ed3acf37a55
avahi-libs-0.7-20.el8.x86_64.rpm
4025ada765b99bd04a94850b628b480d30d997674671bd78d2f73ed3acf37a55
python3-avahi-0.7-20.el8.x86_64.rpm
894452b2d8041877e03ce500b4cb5002ac5a9031ae95cf88b41100e0b90aee09
python3-avahi-0.7-20.el8.x86_64.rpm
894452b2d8041877e03ce500b4cb5002ac5a9031ae95cf88b41100e0b90aee09
python3-avahi-0.7-20.el8.x86_64.rpm
894452b2d8041877e03ce500b4cb5002ac5a9031ae95cf88b41100e0b90aee09
python3-avahi-0.7-20.el8.x86_64.rpm
894452b2d8041877e03ce500b4cb5002ac5a9031ae95cf88b41100e0b90aee09
RLBA-2021:1619
efi-rpm-macros bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for efi-rpm-macros.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
efi-filesystem-3-3.el8.noarch.rpm
2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91
RLSA-2021:1627
Moderate: trousers security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for trousers.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware.
The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782)
Security Fix(es):
* trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331)
* trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332)
* trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
trousers-0.3.15-1.el8.x86_64.rpm
8f1492620ac321ff0378faa79995d7f354700cf33519301a3125e70a590f2c35
trousers-0.3.15-1.el8.x86_64.rpm
8f1492620ac321ff0378faa79995d7f354700cf33519301a3125e70a590f2c35
trousers-0.3.15-1.el8.x86_64.rpm
8f1492620ac321ff0378faa79995d7f354700cf33519301a3125e70a590f2c35
trousers-0.3.15-1.el8.x86_64.rpm
8f1492620ac321ff0378faa79995d7f354700cf33519301a3125e70a590f2c35
trousers-lib-0.3.15-1.el8.i686.rpm
f92fc4ec749df54cad50d22b7173711a97503d4133e2e47895abab4af14a5be3
trousers-lib-0.3.15-1.el8.i686.rpm
f92fc4ec749df54cad50d22b7173711a97503d4133e2e47895abab4af14a5be3
trousers-lib-0.3.15-1.el8.i686.rpm
f92fc4ec749df54cad50d22b7173711a97503d4133e2e47895abab4af14a5be3
trousers-lib-0.3.15-1.el8.i686.rpm
f92fc4ec749df54cad50d22b7173711a97503d4133e2e47895abab4af14a5be3
trousers-lib-0.3.15-1.el8.x86_64.rpm
c50f3d36f6be357210617fd2069888b74eb518e3f0e142056b40c3ba7ce5f3b8
trousers-lib-0.3.15-1.el8.x86_64.rpm
c50f3d36f6be357210617fd2069888b74eb518e3f0e142056b40c3ba7ce5f3b8
trousers-lib-0.3.15-1.el8.x86_64.rpm
c50f3d36f6be357210617fd2069888b74eb518e3f0e142056b40c3ba7ce5f3b8
trousers-lib-0.3.15-1.el8.x86_64.rpm
c50f3d36f6be357210617fd2069888b74eb518e3f0e142056b40c3ba7ce5f3b8
RLBA-2021:1628
tpm-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
tpm-tools-1.3.9.2-1.el8.i686.rpm
a2717b864f595b82c7fd18bba2ce73d34822ef81901c739329f8f25e60a13e80
tpm-tools-1.3.9.2-1.el8.i686.rpm
a2717b864f595b82c7fd18bba2ce73d34822ef81901c739329f8f25e60a13e80
tpm-tools-1.3.9.2-1.el8.i686.rpm
a2717b864f595b82c7fd18bba2ce73d34822ef81901c739329f8f25e60a13e80
tpm-tools-1.3.9.2-1.el8.i686.rpm
a2717b864f595b82c7fd18bba2ce73d34822ef81901c739329f8f25e60a13e80
tpm-tools-1.3.9.2-1.el8.x86_64.rpm
aed34d6a2d00ab7d34ef7c4ca9e94bf7dd68eaa181f39e06eb8c07090ccf478f
tpm-tools-1.3.9.2-1.el8.x86_64.rpm
aed34d6a2d00ab7d34ef7c4ca9e94bf7dd68eaa181f39e06eb8c07090ccf478f
tpm-tools-1.3.9.2-1.el8.x86_64.rpm
aed34d6a2d00ab7d34ef7c4ca9e94bf7dd68eaa181f39e06eb8c07090ccf478f
tpm-tools-1.3.9.2-1.el8.x86_64.rpm
aed34d6a2d00ab7d34ef7c4ca9e94bf7dd68eaa181f39e06eb8c07090ccf478f
tpm-tools-pkcs11-1.3.9.2-1.el8.x86_64.rpm
6510710eb7e3864b257fe5e634e95347b84edb6aa6c6bdb90a53efbdc6348b82
tpm-tools-pkcs11-1.3.9.2-1.el8.x86_64.rpm
6510710eb7e3864b257fe5e634e95347b84edb6aa6c6bdb90a53efbdc6348b82
tpm-tools-pkcs11-1.3.9.2-1.el8.x86_64.rpm
6510710eb7e3864b257fe5e634e95347b84edb6aa6c6bdb90a53efbdc6348b82
tpm-tools-pkcs11-1.3.9.2-1.el8.x86_64.rpm
6510710eb7e3864b257fe5e634e95347b84edb6aa6c6bdb90a53efbdc6348b82
RLSA-2021:1631
Moderate: python-urllib3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-urllib3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
python3-urllib3-1.24.2-5.el8.noarch.rpm
8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08
RLEA-2021:1658
pciutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pciutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
pciutils-3.7.0-1.el8.x86_64.rpm
97afa829cd42b70ed06b0a497db799eb06525945416f1fda6ff91863ca1e316e
pciutils-3.7.0-1.el8.x86_64.rpm
97afa829cd42b70ed06b0a497db799eb06525945416f1fda6ff91863ca1e316e
pciutils-3.7.0-1.el8.x86_64.rpm
97afa829cd42b70ed06b0a497db799eb06525945416f1fda6ff91863ca1e316e
pciutils-3.7.0-1.el8.x86_64.rpm
97afa829cd42b70ed06b0a497db799eb06525945416f1fda6ff91863ca1e316e
pciutils-devel-3.7.0-1.el8.i686.rpm
ba2a4c3e85cf027c786458e399366388ccdff707c27c9e03b808361c3f1a764b
pciutils-devel-3.7.0-1.el8.i686.rpm
ba2a4c3e85cf027c786458e399366388ccdff707c27c9e03b808361c3f1a764b
pciutils-devel-3.7.0-1.el8.i686.rpm
ba2a4c3e85cf027c786458e399366388ccdff707c27c9e03b808361c3f1a764b
pciutils-devel-3.7.0-1.el8.i686.rpm
ba2a4c3e85cf027c786458e399366388ccdff707c27c9e03b808361c3f1a764b
pciutils-devel-3.7.0-1.el8.x86_64.rpm
c02c7068a22d27095c55832156e3d3accb08b4299ffa259c784d1136b5180a48
pciutils-devel-3.7.0-1.el8.x86_64.rpm
c02c7068a22d27095c55832156e3d3accb08b4299ffa259c784d1136b5180a48
pciutils-devel-3.7.0-1.el8.x86_64.rpm
c02c7068a22d27095c55832156e3d3accb08b4299ffa259c784d1136b5180a48
pciutils-devel-3.7.0-1.el8.x86_64.rpm
c02c7068a22d27095c55832156e3d3accb08b4299ffa259c784d1136b5180a48
pciutils-libs-3.7.0-1.el8.i686.rpm
9ada00453f4d9e9a1d40cc46f4c80fa2ed0947aec42ff564c8207c5260690d8d
pciutils-libs-3.7.0-1.el8.i686.rpm
9ada00453f4d9e9a1d40cc46f4c80fa2ed0947aec42ff564c8207c5260690d8d
pciutils-libs-3.7.0-1.el8.i686.rpm
9ada00453f4d9e9a1d40cc46f4c80fa2ed0947aec42ff564c8207c5260690d8d
pciutils-libs-3.7.0-1.el8.i686.rpm
9ada00453f4d9e9a1d40cc46f4c80fa2ed0947aec42ff564c8207c5260690d8d
pciutils-libs-3.7.0-1.el8.x86_64.rpm
d97cbac7e974dab3d1aa88db24194c102e759d909f35ba2807cfd17deb8d3b2f
pciutils-libs-3.7.0-1.el8.x86_64.rpm
d97cbac7e974dab3d1aa88db24194c102e759d909f35ba2807cfd17deb8d3b2f
pciutils-libs-3.7.0-1.el8.x86_64.rpm
d97cbac7e974dab3d1aa88db24194c102e759d909f35ba2807cfd17deb8d3b2f
pciutils-libs-3.7.0-1.el8.x86_64.rpm
d97cbac7e974dab3d1aa88db24194c102e759d909f35ba2807cfd17deb8d3b2f
RLBA-2021:1660
tpm2-abrmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-abrmd, tpm2-abrmd-selinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
tpm2-abrmd-2.3.3-2.el8.i686.rpm
474d47d272a5d80418060d3158f28e89295dca9d5dc4f61a06a0702abe172ae1
tpm2-abrmd-2.3.3-2.el8.i686.rpm
474d47d272a5d80418060d3158f28e89295dca9d5dc4f61a06a0702abe172ae1
tpm2-abrmd-2.3.3-2.el8.i686.rpm
474d47d272a5d80418060d3158f28e89295dca9d5dc4f61a06a0702abe172ae1
tpm2-abrmd-2.3.3-2.el8.x86_64.rpm
46bcb3618274df5afe1e0098c8edd8ba9ac3d7a6ab57bb4d7ea48b7acd4a61fe
tpm2-abrmd-2.3.3-2.el8.x86_64.rpm
46bcb3618274df5afe1e0098c8edd8ba9ac3d7a6ab57bb4d7ea48b7acd4a61fe
tpm2-abrmd-2.3.3-2.el8.x86_64.rpm
46bcb3618274df5afe1e0098c8edd8ba9ac3d7a6ab57bb4d7ea48b7acd4a61fe
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm
bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b
RLEA-2021:1673
crda bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crda.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
crda-3.18_2020.04.29-1.el8.noarch.rpm
64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b
RLBA-2021:1681
vhostmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vhostmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
vm-dump-metrics-1.1-5.el8.i686.rpm
5144a3f7c8731ec8412235fc29b580351a713248d870c613cd365eb456bee24f
vm-dump-metrics-1.1-5.el8.i686.rpm
5144a3f7c8731ec8412235fc29b580351a713248d870c613cd365eb456bee24f
vm-dump-metrics-1.1-5.el8.i686.rpm
5144a3f7c8731ec8412235fc29b580351a713248d870c613cd365eb456bee24f
vm-dump-metrics-1.1-5.el8.i686.rpm
5144a3f7c8731ec8412235fc29b580351a713248d870c613cd365eb456bee24f
vm-dump-metrics-1.1-5.el8.x86_64.rpm
d5a7b53ed53d2503d818049c5fb561377cd5f1ace739beba335ce48dd1d1ab98
vm-dump-metrics-1.1-5.el8.x86_64.rpm
d5a7b53ed53d2503d818049c5fb561377cd5f1ace739beba335ce48dd1d1ab98
vm-dump-metrics-1.1-5.el8.x86_64.rpm
d5a7b53ed53d2503d818049c5fb561377cd5f1ace739beba335ce48dd1d1ab98
vm-dump-metrics-1.1-5.el8.x86_64.rpm
d5a7b53ed53d2503d818049c5fb561377cd5f1ace739beba335ce48dd1d1ab98
vm-dump-metrics-devel-1.1-5.el8.i686.rpm
a8625c7287b1b481f1e12f02be019b2aad855ad8978f3b2e98c77d5bc6666020
vm-dump-metrics-devel-1.1-5.el8.i686.rpm
a8625c7287b1b481f1e12f02be019b2aad855ad8978f3b2e98c77d5bc6666020
vm-dump-metrics-devel-1.1-5.el8.i686.rpm
a8625c7287b1b481f1e12f02be019b2aad855ad8978f3b2e98c77d5bc6666020
vm-dump-metrics-devel-1.1-5.el8.i686.rpm
a8625c7287b1b481f1e12f02be019b2aad855ad8978f3b2e98c77d5bc6666020
vm-dump-metrics-devel-1.1-5.el8.x86_64.rpm
a5b11669af8695899b18d1e6afb7b6611bbd4e48daab04f17f56de6f94cef8dd
vm-dump-metrics-devel-1.1-5.el8.x86_64.rpm
a5b11669af8695899b18d1e6afb7b6611bbd4e48daab04f17f56de6f94cef8dd
vm-dump-metrics-devel-1.1-5.el8.x86_64.rpm
a5b11669af8695899b18d1e6afb7b6611bbd4e48daab04f17f56de6f94cef8dd
vm-dump-metrics-devel-1.1-5.el8.x86_64.rpm
a5b11669af8695899b18d1e6afb7b6611bbd4e48daab04f17f56de6f94cef8dd
RLBA-2021:1687
dejavu-fonts bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dejavu-fonts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-fonts-common-2.35-7.el8.noarch.rpm
6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-fonts-2.35-7.el8.noarch.rpm
e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm
7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
dejavu-serif-fonts-2.35-7.el8.noarch.rpm
8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800
RLBA-2021:1689
librepo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo, librhsm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
librepo-1.12.0-3.el8.i686.rpm
bc4200bb760f430d06896ec77590b2081b39a5f82a0f04090fe2abd79611c72f
librepo-1.12.0-3.el8.x86_64.rpm
9c2651ae16697e566f05390b627a56f6c78e5757dd546598372b4ebb2fa8924f
librhsm-0.0.3-4.el8.i686.rpm
e6be314281d316df217852439de6772a2305c299107244108f1061d3da56dd8b
librhsm-0.0.3-4.el8.i686.rpm
e6be314281d316df217852439de6772a2305c299107244108f1061d3da56dd8b
librhsm-0.0.3-4.el8.i686.rpm
e6be314281d316df217852439de6772a2305c299107244108f1061d3da56dd8b
librhsm-0.0.3-4.el8.i686.rpm
e6be314281d316df217852439de6772a2305c299107244108f1061d3da56dd8b
librhsm-0.0.3-4.el8.x86_64.rpm
e4f0012ac340a8aed1beec50849c7bc34371b3d24ce309fa7aee53ed9174a9e4
librhsm-0.0.3-4.el8.x86_64.rpm
e4f0012ac340a8aed1beec50849c7bc34371b3d24ce309fa7aee53ed9174a9e4
librhsm-0.0.3-4.el8.x86_64.rpm
e4f0012ac340a8aed1beec50849c7bc34371b3d24ce309fa7aee53ed9174a9e4
librhsm-0.0.3-4.el8.x86_64.rpm
e4f0012ac340a8aed1beec50849c7bc34371b3d24ce309fa7aee53ed9174a9e4
python3-librepo-1.12.0-3.el8.x86_64.rpm
10fabf2b033069ee265890f46c99baaeaddc7d8fc21af82625ec9c6fe4824a0e
RLBA-2021:1691
iptraf-ng bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptraf-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
iptraf-ng-1.2.1-2.el8.x86_64.rpm
f9cde3158fcb23d84e78d04b3a5096aac4cd663ec575abbd9f8193c5c96b0cc9
iptraf-ng-1.2.1-2.el8.x86_64.rpm
f9cde3158fcb23d84e78d04b3a5096aac4cd663ec575abbd9f8193c5c96b0cc9
iptraf-ng-1.2.1-2.el8.x86_64.rpm
f9cde3158fcb23d84e78d04b3a5096aac4cd663ec575abbd9f8193c5c96b0cc9
iptraf-ng-1.2.1-2.el8.x86_64.rpm
f9cde3158fcb23d84e78d04b3a5096aac4cd663ec575abbd9f8193c5c96b0cc9
RLBA-2021:1696
intel-cmt-cat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for intel-cmt-cat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
intel-cmt-cat-4.0.0-0.el8.i686.rpm
70c18f6c63927f0bf6eaa6169345162487e840a0816dc0bcc14f5f08195e42c4
intel-cmt-cat-4.0.0-0.el8.i686.rpm
70c18f6c63927f0bf6eaa6169345162487e840a0816dc0bcc14f5f08195e42c4
intel-cmt-cat-4.0.0-0.el8.i686.rpm
70c18f6c63927f0bf6eaa6169345162487e840a0816dc0bcc14f5f08195e42c4
intel-cmt-cat-4.0.0-0.el8.i686.rpm
70c18f6c63927f0bf6eaa6169345162487e840a0816dc0bcc14f5f08195e42c4
intel-cmt-cat-4.0.0-0.el8.x86_64.rpm
05fbb612d67a4d61e6d901f5d8b3e8f3c3361db07e0f52f8cc210546d7f7fe81
intel-cmt-cat-4.0.0-0.el8.x86_64.rpm
05fbb612d67a4d61e6d901f5d8b3e8f3c3361db07e0f52f8cc210546d7f7fe81
intel-cmt-cat-4.0.0-0.el8.x86_64.rpm
05fbb612d67a4d61e6d901f5d8b3e8f3c3361db07e0f52f8cc210546d7f7fe81
intel-cmt-cat-4.0.0-0.el8.x86_64.rpm
05fbb612d67a4d61e6d901f5d8b3e8f3c3361db07e0f52f8cc210546d7f7fe81
RLBA-2021:1698
python-ply bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-ply.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
python3-ply-3.9-9.el8.noarch.rpm
b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87
RLBA-2021:1699
crontabs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crontabs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
crontabs-1.11-17.20190603git.el8.noarch.rpm
0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5
RLSA-2021:1702
Moderate: brotli security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for brotli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression.
Security Fix(es):
* brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
brotli-1.0.6-3.el8.i686.rpm
939efc1243f9c37d10483324e334e1fc6d0ed8f41d3fb06a43116e2fc889caca
brotli-1.0.6-3.el8.i686.rpm
939efc1243f9c37d10483324e334e1fc6d0ed8f41d3fb06a43116e2fc889caca
brotli-1.0.6-3.el8.i686.rpm
939efc1243f9c37d10483324e334e1fc6d0ed8f41d3fb06a43116e2fc889caca
brotli-1.0.6-3.el8.i686.rpm
939efc1243f9c37d10483324e334e1fc6d0ed8f41d3fb06a43116e2fc889caca
brotli-1.0.6-3.el8.x86_64.rpm
f846cb5edaec93436789fe3316a715d5a756aa49c8b40b2fb8f681e7aecbaa75
brotli-1.0.6-3.el8.x86_64.rpm
f846cb5edaec93436789fe3316a715d5a756aa49c8b40b2fb8f681e7aecbaa75
brotli-1.0.6-3.el8.x86_64.rpm
f846cb5edaec93436789fe3316a715d5a756aa49c8b40b2fb8f681e7aecbaa75
brotli-1.0.6-3.el8.x86_64.rpm
f846cb5edaec93436789fe3316a715d5a756aa49c8b40b2fb8f681e7aecbaa75
RLEA-2021:1707
bolt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bolt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
bolt-0.9.1-1.el8.x86_64.rpm
82534e4daf0aa98f655c94d4a17647c6a7b60d5c38b85e0489dcb068cbbaa687
bolt-0.9.1-1.el8.x86_64.rpm
82534e4daf0aa98f655c94d4a17647c6a7b60d5c38b85e0489dcb068cbbaa687
bolt-0.9.1-1.el8.x86_64.rpm
82534e4daf0aa98f655c94d4a17647c6a7b60d5c38b85e0489dcb068cbbaa687
bolt-0.9.1-1.el8.x86_64.rpm
82534e4daf0aa98f655c94d4a17647c6a7b60d5c38b85e0489dcb068cbbaa687
RLBA-2021:1709
popt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for popt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
popt-1.18-1.el8.i686.rpm
b8243291d68d7715f7afbbe19b0ef91b69021e9efe57c2987de52f3de3554d0c
popt-1.18-1.el8.i686.rpm
b8243291d68d7715f7afbbe19b0ef91b69021e9efe57c2987de52f3de3554d0c
popt-1.18-1.el8.i686.rpm
b8243291d68d7715f7afbbe19b0ef91b69021e9efe57c2987de52f3de3554d0c
popt-1.18-1.el8.i686.rpm
b8243291d68d7715f7afbbe19b0ef91b69021e9efe57c2987de52f3de3554d0c
popt-1.18-1.el8.x86_64.rpm
5d98fd70ff26cbe70d7aad9284c670b45eba929720af926195951259d7f32484
popt-1.18-1.el8.x86_64.rpm
5d98fd70ff26cbe70d7aad9284c670b45eba929720af926195951259d7f32484
popt-1.18-1.el8.x86_64.rpm
5d98fd70ff26cbe70d7aad9284c670b45eba929720af926195951259d7f32484
popt-1.18-1.el8.x86_64.rpm
5d98fd70ff26cbe70d7aad9284c670b45eba929720af926195951259d7f32484
popt-devel-1.18-1.el8.i686.rpm
99b2fcd0b15d00a96f91812a0bbe7ec8da2135b62bd9bdf5ec3dbea572e2c544
popt-devel-1.18-1.el8.i686.rpm
99b2fcd0b15d00a96f91812a0bbe7ec8da2135b62bd9bdf5ec3dbea572e2c544
popt-devel-1.18-1.el8.i686.rpm
99b2fcd0b15d00a96f91812a0bbe7ec8da2135b62bd9bdf5ec3dbea572e2c544
popt-devel-1.18-1.el8.i686.rpm
99b2fcd0b15d00a96f91812a0bbe7ec8da2135b62bd9bdf5ec3dbea572e2c544
popt-devel-1.18-1.el8.x86_64.rpm
bde242a3b19bdb49aee62adc4476c50fe96f25d353f51b116de6c5540bb6ccc7
popt-devel-1.18-1.el8.x86_64.rpm
bde242a3b19bdb49aee62adc4476c50fe96f25d353f51b116de6c5540bb6ccc7
popt-devel-1.18-1.el8.x86_64.rpm
bde242a3b19bdb49aee62adc4476c50fe96f25d353f51b116de6c5540bb6ccc7
popt-devel-1.18-1.el8.x86_64.rpm
bde242a3b19bdb49aee62adc4476c50fe96f25d353f51b116de6c5540bb6ccc7
RLBA-2021:1710
dlm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dlm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
dlm-lib-4.1.0-1.el8.i686.rpm
a4d130c3f92c95ac30a82d316e8a4a7dfd6e59fc89b2f8c75b414b259871d866
dlm-lib-4.1.0-1.el8.i686.rpm
a4d130c3f92c95ac30a82d316e8a4a7dfd6e59fc89b2f8c75b414b259871d866
dlm-lib-4.1.0-1.el8.i686.rpm
a4d130c3f92c95ac30a82d316e8a4a7dfd6e59fc89b2f8c75b414b259871d866
dlm-lib-4.1.0-1.el8.i686.rpm
a4d130c3f92c95ac30a82d316e8a4a7dfd6e59fc89b2f8c75b414b259871d866
dlm-lib-4.1.0-1.el8.x86_64.rpm
40c70647d26d0c291fca3f735ff9547274bdba2770d5b50fbcb61d6b2c10d6bf
dlm-lib-4.1.0-1.el8.x86_64.rpm
40c70647d26d0c291fca3f735ff9547274bdba2770d5b50fbcb61d6b2c10d6bf
dlm-lib-4.1.0-1.el8.x86_64.rpm
40c70647d26d0c291fca3f735ff9547274bdba2770d5b50fbcb61d6b2c10d6bf
dlm-lib-4.1.0-1.el8.x86_64.rpm
40c70647d26d0c291fca3f735ff9547274bdba2770d5b50fbcb61d6b2c10d6bf
RLEA-2021:1712
libpcap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libpcap-1.9.1-5.el8.i686.rpm
f4237ccee1c8570a49fc97c2e086109982f7028934075d06af3578b4a8bb7e14
libpcap-1.9.1-5.el8.i686.rpm
f4237ccee1c8570a49fc97c2e086109982f7028934075d06af3578b4a8bb7e14
libpcap-1.9.1-5.el8.i686.rpm
f4237ccee1c8570a49fc97c2e086109982f7028934075d06af3578b4a8bb7e14
libpcap-1.9.1-5.el8.i686.rpm
f4237ccee1c8570a49fc97c2e086109982f7028934075d06af3578b4a8bb7e14
libpcap-1.9.1-5.el8.x86_64.rpm
5dc7df40d3f6df0f4e3917763e27e9d7c4e5e8be23e05ac19c592e0357a3c6cb
libpcap-1.9.1-5.el8.x86_64.rpm
5dc7df40d3f6df0f4e3917763e27e9d7c4e5e8be23e05ac19c592e0357a3c6cb
libpcap-1.9.1-5.el8.x86_64.rpm
5dc7df40d3f6df0f4e3917763e27e9d7c4e5e8be23e05ac19c592e0357a3c6cb
libpcap-1.9.1-5.el8.x86_64.rpm
5dc7df40d3f6df0f4e3917763e27e9d7c4e5e8be23e05ac19c592e0357a3c6cb
RLEA-2021:1720
ima-evm-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ima-evm-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
ima-evm-utils0-1.3.2-12.el8.i686.rpm
31b93890cdc50f3320fb2e118bc626880cdde4b2272ab90d3ed19de6d7e67029
ima-evm-utils0-1.3.2-12.el8.i686.rpm
31b93890cdc50f3320fb2e118bc626880cdde4b2272ab90d3ed19de6d7e67029
ima-evm-utils0-1.3.2-12.el8.i686.rpm
31b93890cdc50f3320fb2e118bc626880cdde4b2272ab90d3ed19de6d7e67029
ima-evm-utils0-1.3.2-12.el8.i686.rpm
31b93890cdc50f3320fb2e118bc626880cdde4b2272ab90d3ed19de6d7e67029
ima-evm-utils0-1.3.2-12.el8.x86_64.rpm
3351a219037ab601a2d699d120fe2217c788e6335facd6c38a6f18c2dab9aedf
ima-evm-utils0-1.3.2-12.el8.x86_64.rpm
3351a219037ab601a2d699d120fe2217c788e6335facd6c38a6f18c2dab9aedf
ima-evm-utils0-1.3.2-12.el8.x86_64.rpm
3351a219037ab601a2d699d120fe2217c788e6335facd6c38a6f18c2dab9aedf
ima-evm-utils0-1.3.2-12.el8.x86_64.rpm
3351a219037ab601a2d699d120fe2217c788e6335facd6c38a6f18c2dab9aedf
ima-evm-utils-1.3.2-12.el8.i686.rpm
195918ea990bf38ac98503c53b86d059280b1f08a0928790cc3a6f8bf5c12c6b
ima-evm-utils-1.3.2-12.el8.i686.rpm
195918ea990bf38ac98503c53b86d059280b1f08a0928790cc3a6f8bf5c12c6b
ima-evm-utils-1.3.2-12.el8.i686.rpm
195918ea990bf38ac98503c53b86d059280b1f08a0928790cc3a6f8bf5c12c6b
ima-evm-utils-1.3.2-12.el8.i686.rpm
195918ea990bf38ac98503c53b86d059280b1f08a0928790cc3a6f8bf5c12c6b
ima-evm-utils-1.3.2-12.el8.x86_64.rpm
3eb4c27783d75c704fdf237704de6be746bda7cd987f8234ccf77dbe2ff8b0e9
ima-evm-utils-1.3.2-12.el8.x86_64.rpm
3eb4c27783d75c704fdf237704de6be746bda7cd987f8234ccf77dbe2ff8b0e9
ima-evm-utils-1.3.2-12.el8.x86_64.rpm
3eb4c27783d75c704fdf237704de6be746bda7cd987f8234ccf77dbe2ff8b0e9
ima-evm-utils-1.3.2-12.el8.x86_64.rpm
3eb4c27783d75c704fdf237704de6be746bda7cd987f8234ccf77dbe2ff8b0e9
RLBA-2021:1731
userspace-rcu bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for userspace-rcu.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
userspace-rcu-0.10.1-4.el8.i686.rpm
8016a43d55fb6b7437ff842d560a66989f85cb596940516bae6fbd5c4699359b
userspace-rcu-0.10.1-4.el8.i686.rpm
8016a43d55fb6b7437ff842d560a66989f85cb596940516bae6fbd5c4699359b
userspace-rcu-0.10.1-4.el8.i686.rpm
8016a43d55fb6b7437ff842d560a66989f85cb596940516bae6fbd5c4699359b
userspace-rcu-0.10.1-4.el8.i686.rpm
8016a43d55fb6b7437ff842d560a66989f85cb596940516bae6fbd5c4699359b
userspace-rcu-0.10.1-4.el8.x86_64.rpm
d7b32acc512ce9cceb8fbc21762930cd836b128d718ca4755a3e2e2c06a620d4
userspace-rcu-0.10.1-4.el8.x86_64.rpm
d7b32acc512ce9cceb8fbc21762930cd836b128d718ca4755a3e2e2c06a620d4
userspace-rcu-0.10.1-4.el8.x86_64.rpm
d7b32acc512ce9cceb8fbc21762930cd836b128d718ca4755a3e2e2c06a620d4
userspace-rcu-0.10.1-4.el8.x86_64.rpm
d7b32acc512ce9cceb8fbc21762930cd836b128d718ca4755a3e2e2c06a620d4
RLBA-2021:1732
squashfs-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for squashfs-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
squashfs-tools-4.3-20.el8.x86_64.rpm
722139c23a9e1471495be553a92e712663cd62cedc5f5f1e6aae0f1cc862046e
squashfs-tools-4.3-20.el8.x86_64.rpm
722139c23a9e1471495be553a92e712663cd62cedc5f5f1e6aae0f1cc862046e
squashfs-tools-4.3-20.el8.x86_64.rpm
722139c23a9e1471495be553a92e712663cd62cedc5f5f1e6aae0f1cc862046e
squashfs-tools-4.3-20.el8.x86_64.rpm
722139c23a9e1471495be553a92e712663cd62cedc5f5f1e6aae0f1cc862046e
RLSA-2021:2575
Moderate: lz4 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for lz4.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems.
Security Fix(es):
* lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
lz4-1.8.3-3.el8_4.x86_64.rpm
e74ca5fb78b28ff0c60bfdee2afdc2f3a23aac1da30dbf52c28f92e576542278
lz4-1.8.3-3.el8_4.x86_64.rpm
e74ca5fb78b28ff0c60bfdee2afdc2f3a23aac1da30dbf52c28f92e576542278
lz4-1.8.3-3.el8_4.x86_64.rpm
e74ca5fb78b28ff0c60bfdee2afdc2f3a23aac1da30dbf52c28f92e576542278
lz4-1.8.3-3.el8_4.x86_64.rpm
e74ca5fb78b28ff0c60bfdee2afdc2f3a23aac1da30dbf52c28f92e576542278
lz4-devel-1.8.3-3.el8_4.i686.rpm
2fe40661f80759c875e8fbc171d58f64b6b068157d9c447d3adaa21eb65e9fde
lz4-devel-1.8.3-3.el8_4.i686.rpm
2fe40661f80759c875e8fbc171d58f64b6b068157d9c447d3adaa21eb65e9fde
lz4-devel-1.8.3-3.el8_4.i686.rpm
2fe40661f80759c875e8fbc171d58f64b6b068157d9c447d3adaa21eb65e9fde
lz4-devel-1.8.3-3.el8_4.i686.rpm
2fe40661f80759c875e8fbc171d58f64b6b068157d9c447d3adaa21eb65e9fde
lz4-devel-1.8.3-3.el8_4.x86_64.rpm
15e64b28e17640ad880eae7dcac02406ffb01ef9691d8f8de44f232717bc94e7
lz4-devel-1.8.3-3.el8_4.x86_64.rpm
15e64b28e17640ad880eae7dcac02406ffb01ef9691d8f8de44f232717bc94e7
lz4-devel-1.8.3-3.el8_4.x86_64.rpm
15e64b28e17640ad880eae7dcac02406ffb01ef9691d8f8de44f232717bc94e7
lz4-devel-1.8.3-3.el8_4.x86_64.rpm
15e64b28e17640ad880eae7dcac02406ffb01ef9691d8f8de44f232717bc94e7
lz4-libs-1.8.3-3.el8_4.i686.rpm
08d9574547cf3b7e8c097033eed070118a61658d2b6611bb07c3e5c23e3417a5
lz4-libs-1.8.3-3.el8_4.i686.rpm
08d9574547cf3b7e8c097033eed070118a61658d2b6611bb07c3e5c23e3417a5
lz4-libs-1.8.3-3.el8_4.i686.rpm
08d9574547cf3b7e8c097033eed070118a61658d2b6611bb07c3e5c23e3417a5
lz4-libs-1.8.3-3.el8_4.i686.rpm
08d9574547cf3b7e8c097033eed070118a61658d2b6611bb07c3e5c23e3417a5
lz4-libs-1.8.3-3.el8_4.x86_64.rpm
cf76cb56e26c49ceed4d164973aaf69406111ecb9f93e15c4ee700522a0a9757
lz4-libs-1.8.3-3.el8_4.x86_64.rpm
cf76cb56e26c49ceed4d164973aaf69406111ecb9f93e15c4ee700522a0a9757
lz4-libs-1.8.3-3.el8_4.x86_64.rpm
cf76cb56e26c49ceed4d164973aaf69406111ecb9f93e15c4ee700522a0a9757
lz4-libs-1.8.3-3.el8_4.x86_64.rpm
cf76cb56e26c49ceed4d164973aaf69406111ecb9f93e15c4ee700522a0a9757
RLBA-2021:3049
pcsc-lite bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcsc-lite-ccid, pcsc-lite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PC/SC Lite provides a Windows SCard compatible interface for communicating
with smart cards, smart card readers, and other security tokens.
Bug Fixes:
* Increase global reader array size to 48 to address issue with RHCS secure
channel creation (BZ#1972569)
* Increase global reader array size to 48 to address issue with RHCS secure
channel creation (pcsc-lite-ccid) (BZ#1973405)
none-baseos-rpms
pcsc-lite-1.8.23-4.1.el8_4.x86_64.rpm
4958358801b804cd26c58be773b2c7c7c3f2eeeb31ba5a05d749a28b3dc9761a
pcsc-lite-1.8.23-4.1.el8_4.x86_64.rpm
4958358801b804cd26c58be773b2c7c7c3f2eeeb31ba5a05d749a28b3dc9761a
pcsc-lite-ccid-1.4.29-5.1.el8_4.x86_64.rpm
aba4eda22537cf9f3182593fc6ef43d3ac218cc095949016a0eb998dce853828
pcsc-lite-ccid-1.4.29-5.1.el8_4.x86_64.rpm
aba4eda22537cf9f3182593fc6ef43d3ac218cc095949016a0eb998dce853828
pcsc-lite-ccid-1.4.29-5.1.el8_4.x86_64.rpm
aba4eda22537cf9f3182593fc6ef43d3ac218cc095949016a0eb998dce853828
pcsc-lite-ccid-1.4.29-5.1.el8_4.x86_64.rpm
aba4eda22537cf9f3182593fc6ef43d3ac218cc095949016a0eb998dce853828
pcsc-lite-doc-1.8.23-4.1.el8_4.noarch.rpm
b10402549b29b228feff2935a7cb3e4a946479e9e12829b7dd7b6e44730409dc
pcsc-lite-doc-1.8.23-4.1.el8_4.noarch.rpm
b10402549b29b228feff2935a7cb3e4a946479e9e12829b7dd7b6e44730409dc
pcsc-lite-doc-1.8.23-4.1.el8_4.noarch.rpm
b10402549b29b228feff2935a7cb3e4a946479e9e12829b7dd7b6e44730409dc
pcsc-lite-doc-1.8.23-4.1.el8_4.noarch.rpm
b10402549b29b228feff2935a7cb3e4a946479e9e12829b7dd7b6e44730409dc
pcsc-lite-libs-1.8.23-4.1.el8_4.i686.rpm
15f36d64fb9edc9d55c0d2488334853147a40b4d7df4a290e86adc6f303d2920
pcsc-lite-libs-1.8.23-4.1.el8_4.i686.rpm
15f36d64fb9edc9d55c0d2488334853147a40b4d7df4a290e86adc6f303d2920
pcsc-lite-libs-1.8.23-4.1.el8_4.x86_64.rpm
f5f5a9bfba84b2def4bca3954d89f5952db8230ef1034feb48e1dc195ce56722
pcsc-lite-libs-1.8.23-4.1.el8_4.x86_64.rpm
f5f5a9bfba84b2def4bca3954d89f5952db8230ef1034feb48e1dc195ce56722
RLBA-2021:3594
libdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libdb packages provide the Berkeley Database, an embedded database
supporting both traditional and client/server applications.
Bug Fix(es) and Enhancement(s):
* [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100%
(BZ#2001972)
none-baseos-rpms
libdb-5.3.28-42.el8_4.i686.rpm
614aa67408a859bf24991f4d29d9b75aafc24c2c6a46674f505dfcaba92a0c40
libdb-5.3.28-42.el8_4.i686.rpm
614aa67408a859bf24991f4d29d9b75aafc24c2c6a46674f505dfcaba92a0c40
libdb-5.3.28-42.el8_4.i686.rpm
614aa67408a859bf24991f4d29d9b75aafc24c2c6a46674f505dfcaba92a0c40
libdb-5.3.28-42.el8_4.i686.rpm
614aa67408a859bf24991f4d29d9b75aafc24c2c6a46674f505dfcaba92a0c40
libdb-5.3.28-42.el8_4.x86_64.rpm
e120f803a572ad17c97a147a445b277ab4da0c8dc3055d8177e2e4a5d5c21443
libdb-5.3.28-42.el8_4.x86_64.rpm
e120f803a572ad17c97a147a445b277ab4da0c8dc3055d8177e2e4a5d5c21443
libdb-5.3.28-42.el8_4.x86_64.rpm
e120f803a572ad17c97a147a445b277ab4da0c8dc3055d8177e2e4a5d5c21443
libdb-5.3.28-42.el8_4.x86_64.rpm
e120f803a572ad17c97a147a445b277ab4da0c8dc3055d8177e2e4a5d5c21443
libdb-utils-5.3.28-42.el8_4.x86_64.rpm
8dd3d399f5155f38d32d28f267aadcbb6cf82de9f3f31748bb0bb046e8535b74
libdb-utils-5.3.28-42.el8_4.x86_64.rpm
8dd3d399f5155f38d32d28f267aadcbb6cf82de9f3f31748bb0bb046e8535b74
libdb-utils-5.3.28-42.el8_4.x86_64.rpm
8dd3d399f5155f38d32d28f267aadcbb6cf82de9f3f31748bb0bb046e8535b74
libdb-utils-5.3.28-42.el8_4.x86_64.rpm
8dd3d399f5155f38d32d28f267aadcbb6cf82de9f3f31748bb0bb046e8535b74
RLBA-2021:4353
lm_sensors bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lm_sensors.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
lm_sensors-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
5fbf858b3602ccbcac70ce6100533fccd03f2a90e3490ac178771db0ff09a7fc
lm_sensors-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
5fbf858b3602ccbcac70ce6100533fccd03f2a90e3490ac178771db0ff09a7fc
lm_sensors-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
5fbf858b3602ccbcac70ce6100533fccd03f2a90e3490ac178771db0ff09a7fc
lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.i686.rpm
2b2d1264841b4e819f243a887f292934bed812a266a43f9cc9d6d6c7e22bc703
lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.i686.rpm
2b2d1264841b4e819f243a887f292934bed812a266a43f9cc9d6d6c7e22bc703
lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.i686.rpm
2b2d1264841b4e819f243a887f292934bed812a266a43f9cc9d6d6c7e22bc703
lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
44311bbcaa8d84aaa563892234bb315039e9bd3f6b48362c7bb670005d2b540e
lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
44311bbcaa8d84aaa563892234bb315039e9bd3f6b48362c7bb670005d2b540e
lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
44311bbcaa8d84aaa563892234bb315039e9bd3f6b48362c7bb670005d2b540e
lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.i686.rpm
da8015ac42f6b540772fc099a03561453d68731d1a8fe039f5ea6a4778f101b8
lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.i686.rpm
da8015ac42f6b540772fc099a03561453d68731d1a8fe039f5ea6a4778f101b8
lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.i686.rpm
da8015ac42f6b540772fc099a03561453d68731d1a8fe039f5ea6a4778f101b8
lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
5fa5a3bef7d33ed5016011ba6d56f79f67f28b7975edbae2d85dc7f38c9b0fdd
lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
5fa5a3bef7d33ed5016011ba6d56f79f67f28b7975edbae2d85dc7f38c9b0fdd
lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.x86_64.rpm
5fa5a3bef7d33ed5016011ba6d56f79f67f28b7975edbae2d85dc7f38c9b0fdd
RLBA-2021:4354
libndp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libndp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libndp-1.7-6.el8.i686.rpm
a45899d196e0fd1a32338c1321ab35d2dd4d28e64f84b86ca2ea0f1bf402a617
libndp-1.7-6.el8.i686.rpm
a45899d196e0fd1a32338c1321ab35d2dd4d28e64f84b86ca2ea0f1bf402a617
libndp-1.7-6.el8.i686.rpm
a45899d196e0fd1a32338c1321ab35d2dd4d28e64f84b86ca2ea0f1bf402a617
libndp-1.7-6.el8.x86_64.rpm
c5f6db3d2900eff8aee15514e5519f34c07950b9b1b0989eb0a43a9f1a7ec52b
libndp-1.7-6.el8.x86_64.rpm
c5f6db3d2900eff8aee15514e5519f34c07950b9b1b0989eb0a43a9f1a7ec52b
libndp-1.7-6.el8.x86_64.rpm
c5f6db3d2900eff8aee15514e5519f34c07950b9b1b0989eb0a43a9f1a7ec52b
RLBA-2021:4363
gfs2-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gfs2-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
gfs2-utils-3.2.0-11.el8.x86_64.rpm
3941e1e57372dc8d506a46f1dd5b7fed57ed21a207957cd5ed9c34203533027a
gfs2-utils-3.2.0-11.el8.x86_64.rpm
3941e1e57372dc8d506a46f1dd5b7fed57ed21a207957cd5ed9c34203533027a
gfs2-utils-3.2.0-11.el8.x86_64.rpm
3941e1e57372dc8d506a46f1dd5b7fed57ed21a207957cd5ed9c34203533027a
RLBA-2021:4371
libxcrypt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libxcrypt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libxcrypt-4.1.1-6.el8.i686.rpm
df57632ae8d32ce68b75f0ec4bfd1382a12ae17d7140a223a200f0e7469b183b
libxcrypt-4.1.1-6.el8.i686.rpm
df57632ae8d32ce68b75f0ec4bfd1382a12ae17d7140a223a200f0e7469b183b
libxcrypt-4.1.1-6.el8.i686.rpm
df57632ae8d32ce68b75f0ec4bfd1382a12ae17d7140a223a200f0e7469b183b
libxcrypt-4.1.1-6.el8.x86_64.rpm
da47347fe8c12a83da4b3dc141396172f82cde14530b7746b2c0882651f1a468
libxcrypt-4.1.1-6.el8.x86_64.rpm
da47347fe8c12a83da4b3dc141396172f82cde14530b7746b2c0882651f1a468
libxcrypt-4.1.1-6.el8.x86_64.rpm
da47347fe8c12a83da4b3dc141396172f82cde14530b7746b2c0882651f1a468
libxcrypt-devel-4.1.1-6.el8.i686.rpm
9e5108d73008b6b92eaf2fa3c22e4f2ed88b891d2da32093334996bbc5851eda
libxcrypt-devel-4.1.1-6.el8.i686.rpm
9e5108d73008b6b92eaf2fa3c22e4f2ed88b891d2da32093334996bbc5851eda
libxcrypt-devel-4.1.1-6.el8.i686.rpm
9e5108d73008b6b92eaf2fa3c22e4f2ed88b891d2da32093334996bbc5851eda
libxcrypt-devel-4.1.1-6.el8.x86_64.rpm
71242b7ce34cbadc0eb117e4608887ddd64236e7e808fb593f9b3d7cccdcbc40
libxcrypt-devel-4.1.1-6.el8.x86_64.rpm
71242b7ce34cbadc0eb117e4608887ddd64236e7e808fb593f9b3d7cccdcbc40
libxcrypt-devel-4.1.1-6.el8.x86_64.rpm
71242b7ce34cbadc0eb117e4608887ddd64236e7e808fb593f9b3d7cccdcbc40
RLSA-2021:4373
Low: pcre security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for pcre.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PCRE is a Perl-compatible regular expression library.
Security Fix(es):
* pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838)
* pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
pcre-8.42-6.el8.i686.rpm
a951d80e74ccc8c19b17e09f98fe7a8b8e8f3fea10d51c252550c2c881f96c43
pcre-8.42-6.el8.i686.rpm
a951d80e74ccc8c19b17e09f98fe7a8b8e8f3fea10d51c252550c2c881f96c43
pcre-8.42-6.el8.i686.rpm
a951d80e74ccc8c19b17e09f98fe7a8b8e8f3fea10d51c252550c2c881f96c43
pcre-8.42-6.el8.x86_64.rpm
0c64dc4099b1af3af95760d573660c792e6df7a68eb5f45f7fdd5b1f5d2879fa
pcre-8.42-6.el8.x86_64.rpm
0c64dc4099b1af3af95760d573660c792e6df7a68eb5f45f7fdd5b1f5d2879fa
pcre-8.42-6.el8.x86_64.rpm
0c64dc4099b1af3af95760d573660c792e6df7a68eb5f45f7fdd5b1f5d2879fa
pcre-cpp-8.42-6.el8.i686.rpm
1459ed1ab8de2ef2197ba2c15d5a327778775ea1b539e0d615673f3046277526
pcre-cpp-8.42-6.el8.i686.rpm
1459ed1ab8de2ef2197ba2c15d5a327778775ea1b539e0d615673f3046277526
pcre-cpp-8.42-6.el8.i686.rpm
1459ed1ab8de2ef2197ba2c15d5a327778775ea1b539e0d615673f3046277526
pcre-cpp-8.42-6.el8.x86_64.rpm
e23bf040432a3b44b439d5901152bf64e04fca000f521f6b77ef76d7162b7485
pcre-cpp-8.42-6.el8.x86_64.rpm
e23bf040432a3b44b439d5901152bf64e04fca000f521f6b77ef76d7162b7485
pcre-cpp-8.42-6.el8.x86_64.rpm
e23bf040432a3b44b439d5901152bf64e04fca000f521f6b77ef76d7162b7485
pcre-devel-8.42-6.el8.i686.rpm
38740b17e3eeea89ce1e17469800dfa553cd81d1b7ac075e3ba7ea5b8a2c70aa
pcre-devel-8.42-6.el8.i686.rpm
38740b17e3eeea89ce1e17469800dfa553cd81d1b7ac075e3ba7ea5b8a2c70aa
pcre-devel-8.42-6.el8.i686.rpm
38740b17e3eeea89ce1e17469800dfa553cd81d1b7ac075e3ba7ea5b8a2c70aa
pcre-devel-8.42-6.el8.x86_64.rpm
ac5874c0838cee6599d1b8945bee116857f3ebb445ea0c9453bb0aefe386f1c6
pcre-devel-8.42-6.el8.x86_64.rpm
ac5874c0838cee6599d1b8945bee116857f3ebb445ea0c9453bb0aefe386f1c6
pcre-devel-8.42-6.el8.x86_64.rpm
ac5874c0838cee6599d1b8945bee116857f3ebb445ea0c9453bb0aefe386f1c6
pcre-utf16-8.42-6.el8.i686.rpm
096bcee908fe6729387d59575f0fcb4965edcdb579dde09ede2ae3a9f0196765
pcre-utf16-8.42-6.el8.i686.rpm
096bcee908fe6729387d59575f0fcb4965edcdb579dde09ede2ae3a9f0196765
pcre-utf16-8.42-6.el8.i686.rpm
096bcee908fe6729387d59575f0fcb4965edcdb579dde09ede2ae3a9f0196765
pcre-utf16-8.42-6.el8.x86_64.rpm
42f4dfe51d519b6eaaf0626a562dd2f2403fe13e0d3eaee4d6c1e5d4da26dd89
pcre-utf16-8.42-6.el8.x86_64.rpm
42f4dfe51d519b6eaaf0626a562dd2f2403fe13e0d3eaee4d6c1e5d4da26dd89
pcre-utf16-8.42-6.el8.x86_64.rpm
42f4dfe51d519b6eaaf0626a562dd2f2403fe13e0d3eaee4d6c1e5d4da26dd89
pcre-utf32-8.42-6.el8.i686.rpm
a11e9094b5e12144c83ec13ffaab126e9570ae576afcf1aae301ea65d535aad2
pcre-utf32-8.42-6.el8.i686.rpm
a11e9094b5e12144c83ec13ffaab126e9570ae576afcf1aae301ea65d535aad2
pcre-utf32-8.42-6.el8.i686.rpm
a11e9094b5e12144c83ec13ffaab126e9570ae576afcf1aae301ea65d535aad2
pcre-utf32-8.42-6.el8.x86_64.rpm
ea60d759ffef7c5a8556fe94a745db713769b813ca31ac9995e171ad3dc84563
pcre-utf32-8.42-6.el8.x86_64.rpm
ea60d759ffef7c5a8556fe94a745db713769b813ca31ac9995e171ad3dc84563
pcre-utf32-8.42-6.el8.x86_64.rpm
ea60d759ffef7c5a8556fe94a745db713769b813ca31ac9995e171ad3dc84563
RLBA-2021:4377
quota bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for quota.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
quota-4.04-14.el8.x86_64.rpm
42cfc13ec40dff5cc57d8dfde98c9b4a9715a3ded7a66997857d960cb6ab0b36
quota-4.04-14.el8.x86_64.rpm
42cfc13ec40dff5cc57d8dfde98c9b4a9715a3ded7a66997857d960cb6ab0b36
quota-4.04-14.el8.x86_64.rpm
42cfc13ec40dff5cc57d8dfde98c9b4a9715a3ded7a66997857d960cb6ab0b36
quota-doc-4.04-14.el8.noarch.rpm
7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6
quota-doc-4.04-14.el8.noarch.rpm
7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6
quota-doc-4.04-14.el8.noarch.rpm
7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6
quota-doc-4.04-14.el8.noarch.rpm
7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6
quota-doc-4.04-14.el8.noarch.rpm
7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6
quota-doc-4.04-14.el8.noarch.rpm
7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6
quota-nld-4.04-14.el8.x86_64.rpm
781fa685aed427ecd46644f9dcb9de1f0001bc38e4c54d77094ffd236904e46e
quota-nld-4.04-14.el8.x86_64.rpm
781fa685aed427ecd46644f9dcb9de1f0001bc38e4c54d77094ffd236904e46e
quota-nld-4.04-14.el8.x86_64.rpm
781fa685aed427ecd46644f9dcb9de1f0001bc38e4c54d77094ffd236904e46e
quota-nls-4.04-14.el8.noarch.rpm
e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a
quota-nls-4.04-14.el8.noarch.rpm
e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a
quota-nls-4.04-14.el8.noarch.rpm
e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a
quota-nls-4.04-14.el8.noarch.rpm
e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a
quota-nls-4.04-14.el8.noarch.rpm
e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a
quota-nls-4.04-14.el8.noarch.rpm
e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a
quota-rpc-4.04-14.el8.x86_64.rpm
19bffbeadf9050e05d918ee518fb991f31ad4cfa5f86ea8974200b7f8f53d0be
quota-rpc-4.04-14.el8.x86_64.rpm
19bffbeadf9050e05d918ee518fb991f31ad4cfa5f86ea8974200b7f8f53d0be
quota-rpc-4.04-14.el8.x86_64.rpm
19bffbeadf9050e05d918ee518fb991f31ad4cfa5f86ea8974200b7f8f53d0be
quota-warnquota-4.04-14.el8.x86_64.rpm
657bd785cf526d0b1b9d5da8d0f64da4cc39ce00698702b01885c0dd80240ffd
quota-warnquota-4.04-14.el8.x86_64.rpm
657bd785cf526d0b1b9d5da8d0f64da4cc39ce00698702b01885c0dd80240ffd
quota-warnquota-4.04-14.el8.x86_64.rpm
657bd785cf526d0b1b9d5da8d0f64da4cc39ce00698702b01885c0dd80240ffd
RLBA-2021:4379
watchdog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for watchdog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
watchdog-5.15-2.el8.x86_64.rpm
612e8baade6a563487c128316ed541ba2f99459d8f40ecb3c10c439c63ceb142
watchdog-5.15-2.el8.x86_64.rpm
612e8baade6a563487c128316ed541ba2f99459d8f40ecb3c10c439c63ceb142
watchdog-5.15-2.el8.x86_64.rpm
612e8baade6a563487c128316ed541ba2f99459d8f40ecb3c10c439c63ceb142
RLSA-2021:4381
Moderate: GNOME security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300)
Security Fix(es):
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241)
* gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
gsettings-desktop-schemas-3.32.0-6.el8.x86_64.rpm
ef0bee544ec9f62c9d8746d753fdbef129a1d5a1d94c19cc503d69396239c57a
gsettings-desktop-schemas-3.32.0-6.el8.x86_64.rpm
ef0bee544ec9f62c9d8746d753fdbef129a1d5a1d94c19cc503d69396239c57a
gsettings-desktop-schemas-3.32.0-6.el8.x86_64.rpm
ef0bee544ec9f62c9d8746d753fdbef129a1d5a1d94c19cc503d69396239c57a
RLBA-2021:4383
nvmetcli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nvmetcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
nvmetcli-0.7-3.el8.noarch.rpm
4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743
nvmetcli-0.7-3.el8.noarch.rpm
4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743
nvmetcli-0.7-3.el8.noarch.rpm
4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743
nvmetcli-0.7-3.el8.noarch.rpm
4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743
nvmetcli-0.7-3.el8.noarch.rpm
4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743
nvmetcli-0.7-3.el8.noarch.rpm
4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743
RLBA-2021:4397
logwatch bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for logwatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
logwatch-7.4.3-11.el8.noarch.rpm
f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764
logwatch-7.4.3-11.el8.noarch.rpm
f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764
logwatch-7.4.3-11.el8.noarch.rpm
f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764
logwatch-7.4.3-11.el8.noarch.rpm
f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764
logwatch-7.4.3-11.el8.noarch.rpm
f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764
logwatch-7.4.3-11.el8.noarch.rpm
f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764
RLEA-2021:4405
libmodulemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmodulemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libmodulemd1-1.8.16-0.2.13.0.1.i686.rpm
1f1984a16fc988338cefbb8905286c12d7ad3a65f2b5d1f61a91c5cd7b989aba
libmodulemd1-1.8.16-0.2.13.0.1.i686.rpm
1f1984a16fc988338cefbb8905286c12d7ad3a65f2b5d1f61a91c5cd7b989aba
libmodulemd1-1.8.16-0.2.13.0.1.i686.rpm
1f1984a16fc988338cefbb8905286c12d7ad3a65f2b5d1f61a91c5cd7b989aba
libmodulemd1-1.8.16-0.2.13.0.1.x86_64.rpm
791de2a73652210cf934938ed23743fe9c57039be70ebc9c11cdd5d47288050b
libmodulemd1-1.8.16-0.2.13.0.1.x86_64.rpm
791de2a73652210cf934938ed23743fe9c57039be70ebc9c11cdd5d47288050b
libmodulemd1-1.8.16-0.2.13.0.1.x86_64.rpm
791de2a73652210cf934938ed23743fe9c57039be70ebc9c11cdd5d47288050b
libmodulemd-2.13.0-1.el8.i686.rpm
25930981660144bddf7170dbfe06bd37dc22061d7cc2953d853cd8220005e68e
libmodulemd-2.13.0-1.el8.i686.rpm
25930981660144bddf7170dbfe06bd37dc22061d7cc2953d853cd8220005e68e
libmodulemd-2.13.0-1.el8.i686.rpm
25930981660144bddf7170dbfe06bd37dc22061d7cc2953d853cd8220005e68e
libmodulemd-2.13.0-1.el8.x86_64.rpm
0298da65634ed07cd6641dc0b56a63e437597cc5632a71645a00b8cec036a7de
libmodulemd-2.13.0-1.el8.x86_64.rpm
0298da65634ed07cd6641dc0b56a63e437597cc5632a71645a00b8cec036a7de
libmodulemd-2.13.0-1.el8.x86_64.rpm
0298da65634ed07cd6641dc0b56a63e437597cc5632a71645a00b8cec036a7de
RLBA-2021:4406
numactl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numactl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
numactl-2.0.12-13.el8.x86_64.rpm
f35d143255025717a8c38c8eb94a74cc198a6d38be89b3cf542ef5c17b4f017c
numactl-2.0.12-13.el8.x86_64.rpm
f35d143255025717a8c38c8eb94a74cc198a6d38be89b3cf542ef5c17b4f017c
numactl-2.0.12-13.el8.x86_64.rpm
f35d143255025717a8c38c8eb94a74cc198a6d38be89b3cf542ef5c17b4f017c
numactl-devel-2.0.12-13.el8.i686.rpm
ddb710d6144f5c5bf626e9426446ba530d13fb6ce96614189c425db0b5123fff
numactl-devel-2.0.12-13.el8.i686.rpm
ddb710d6144f5c5bf626e9426446ba530d13fb6ce96614189c425db0b5123fff
numactl-devel-2.0.12-13.el8.i686.rpm
ddb710d6144f5c5bf626e9426446ba530d13fb6ce96614189c425db0b5123fff
numactl-devel-2.0.12-13.el8.x86_64.rpm
7cd411111dc352df3e571b12ca0c462e4fb149280bf3ff6f0c7d06d68c7c57d8
numactl-devel-2.0.12-13.el8.x86_64.rpm
7cd411111dc352df3e571b12ca0c462e4fb149280bf3ff6f0c7d06d68c7c57d8
numactl-devel-2.0.12-13.el8.x86_64.rpm
7cd411111dc352df3e571b12ca0c462e4fb149280bf3ff6f0c7d06d68c7c57d8
numactl-libs-2.0.12-13.el8.i686.rpm
db1281e4d5a365c2c17548aeb309f5ef2cab2ad5281c271a45d20ab78acefc70
numactl-libs-2.0.12-13.el8.i686.rpm
db1281e4d5a365c2c17548aeb309f5ef2cab2ad5281c271a45d20ab78acefc70
numactl-libs-2.0.12-13.el8.i686.rpm
db1281e4d5a365c2c17548aeb309f5ef2cab2ad5281c271a45d20ab78acefc70
numactl-libs-2.0.12-13.el8.x86_64.rpm
47219636d1d240e8ab5a55ac2f52160dc79a3c36347c7331870d79e3fbb11069
numactl-libs-2.0.12-13.el8.x86_64.rpm
47219636d1d240e8ab5a55ac2f52160dc79a3c36347c7331870d79e3fbb11069
numactl-libs-2.0.12-13.el8.x86_64.rpm
47219636d1d240e8ab5a55ac2f52160dc79a3c36347c7331870d79e3fbb11069
RLBA-2021:4411
tpm2-tss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-tss.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
tpm2-tss-2.3.2-4.el8.i686.rpm
2f7dfe35043eb46289de0f8197e98e2fc225073fb98ea15f231804f0446d8fe3
tpm2-tss-2.3.2-4.el8.i686.rpm
2f7dfe35043eb46289de0f8197e98e2fc225073fb98ea15f231804f0446d8fe3
tpm2-tss-2.3.2-4.el8.i686.rpm
2f7dfe35043eb46289de0f8197e98e2fc225073fb98ea15f231804f0446d8fe3
tpm2-tss-2.3.2-4.el8.x86_64.rpm
d8a2682594c9cf11b6d0561ad3cd77e3c10bcca1c845e08b552ef689e300e11b
tpm2-tss-2.3.2-4.el8.x86_64.rpm
d8a2682594c9cf11b6d0561ad3cd77e3c10bcca1c845e08b552ef689e300e11b
tpm2-tss-2.3.2-4.el8.x86_64.rpm
d8a2682594c9cf11b6d0561ad3cd77e3c10bcca1c845e08b552ef689e300e11b
tpm2-tss-devel-2.3.2-4.el8.i686.rpm
4e67d3da31a0d71e5199bb4210b5b84a0c75f7d310862978ca1dccabdd47a286
tpm2-tss-devel-2.3.2-4.el8.i686.rpm
4e67d3da31a0d71e5199bb4210b5b84a0c75f7d310862978ca1dccabdd47a286
tpm2-tss-devel-2.3.2-4.el8.i686.rpm
4e67d3da31a0d71e5199bb4210b5b84a0c75f7d310862978ca1dccabdd47a286
tpm2-tss-devel-2.3.2-4.el8.x86_64.rpm
40ee98fb00e7230eb141e2f19b37cbf1932598c6e158f2b7665b863f4c7a3cc1
tpm2-tss-devel-2.3.2-4.el8.x86_64.rpm
40ee98fb00e7230eb141e2f19b37cbf1932598c6e158f2b7665b863f4c7a3cc1
tpm2-tss-devel-2.3.2-4.el8.x86_64.rpm
40ee98fb00e7230eb141e2f19b37cbf1932598c6e158f2b7665b863f4c7a3cc1
RLBA-2021:4412
RDMA stack bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
ibacm-35.0-1.el8.i686.rpm
e079332ed1921dffc34377ce339e5f5e6809028053060d8488394b343a4ad028
ibacm-35.0-1.el8.x86_64.rpm
df1d1e0f96f42158b8df0c0e50bae4c9b3e5cae0349ee7b77c45247885261750
infiniband-diags-35.0-1.el8.i686.rpm
b98e82de0bd9059e78ea8cbe95803eb0d46b87cd4a9683590c9567d6797219f1
infiniband-diags-35.0-1.el8.x86_64.rpm
d396e845ba27ed05182d92c200c242aa542d112bf0eb2eb9c7aaa57030c4c413
iwpmd-35.0-1.el8.x86_64.rpm
da75d5991b2de9ca8355dfded268d6e257ead5a2e46a2cb6a72ab45d24fbd88e
libfabric-1.12.1-1.el8.i686.rpm
4c1b285c44ae6ac514d2897bb5fa75d5b4506703354a0971217b0934a8383ba6
libfabric-1.12.1-1.el8.x86_64.rpm
04a50d25ad897a64ef4393818c42a1f81856450c5243baec301d6d1c422bb372
libibumad-35.0-1.el8.i686.rpm
cc5c4f5855818f58c6ad7af88f5c97a6e873daaa567e4fd94912cc77668c0f04
libibumad-35.0-1.el8.x86_64.rpm
0bf38f8d6af359063fa78c599594d6b0e358766e9b0bd85ed14f55f7095a4f7d
libibverbs-35.0-1.el8.i686.rpm
db4f5e5a2f06d646adb5221a1e59c04734de77b8a66e278be9ae077b4f99322c
libibverbs-35.0-1.el8.x86_64.rpm
69efacd289807c2ca5c3261217785cace2597dce22cc3a8e87a732ab929b52c8
libibverbs-utils-35.0-1.el8.x86_64.rpm
5afcbdaa1847d8991bb0f42a5a8a89e9889df85859841be6aee5196b0bbbfcec
librdmacm-35.0-1.el8.i686.rpm
cc98b1e9fdbe958802ff533f0bc3aede361ebeaeb3bbca6a313e7216eed6e724
librdmacm-35.0-1.el8.x86_64.rpm
e86be6a2667237b81248f9c2d8a8b19c0077ae4ddc6c6821ad33a225c80d83f1
librdmacm-utils-35.0-1.el8.x86_64.rpm
29b2772bd96e3b717b33a2f27e35493f5ac3960fe3345159f46734636ea5097b
opensm-3.3.24-1.el8.x86_64.rpm
6d8802477c76749b1a39e38cdf98d861e093d275d32e48f44919509c531cb44b
opensm-3.3.24-1.el8.x86_64.rpm
6d8802477c76749b1a39e38cdf98d861e093d275d32e48f44919509c531cb44b
opensm-3.3.24-1.el8.x86_64.rpm
6d8802477c76749b1a39e38cdf98d861e093d275d32e48f44919509c531cb44b
opensm-libs-3.3.24-1.el8.i686.rpm
39d52bcaf16b0ef6663a126560fb3b3de854f8a38d9e2d5cc3853a9cbe6caa2c
opensm-libs-3.3.24-1.el8.i686.rpm
39d52bcaf16b0ef6663a126560fb3b3de854f8a38d9e2d5cc3853a9cbe6caa2c
opensm-libs-3.3.24-1.el8.i686.rpm
39d52bcaf16b0ef6663a126560fb3b3de854f8a38d9e2d5cc3853a9cbe6caa2c
opensm-libs-3.3.24-1.el8.x86_64.rpm
76ae7bf9dc394388d177fe4b319e3d35e99926b0e3acbb9b2ac6313140de7231
opensm-libs-3.3.24-1.el8.x86_64.rpm
76ae7bf9dc394388d177fe4b319e3d35e99926b0e3acbb9b2ac6313140de7231
opensm-libs-3.3.24-1.el8.x86_64.rpm
76ae7bf9dc394388d177fe4b319e3d35e99926b0e3acbb9b2ac6313140de7231
perftest-4.5-1.el8.x86_64.rpm
f9db15c129388a8eafe475f0eacdfbf23da1dad105bef6548afbd9ec3f5fd506
python3-pyverbs-35.0-1.el8.x86_64.rpm
535fec751a2c845ac8db7053c4e4054b65452e91fadb2089f7508f9df20cabef
rdma-core-35.0-1.el8.i686.rpm
fdb15465193fdbeaac284796b3bd0617c8d8a20472cfad32997f113282dfac83
rdma-core-35.0-1.el8.x86_64.rpm
0432550c94d00ab32282bd79d43f1cc36789590fb2c6a596759f6ddd143df6cd
rdma-core-devel-35.0-1.el8.i686.rpm
69c638a9568e7916e965b0e224ec51d52a37e08076478b2e655d03e9932f0a18
rdma-core-devel-35.0-1.el8.x86_64.rpm
87b674be07110c02f8d894020e8c5c5e17582428c8e71204648ce532cd3ae361
srp_daemon-35.0-1.el8.x86_64.rpm
13596eda039cf8d6c4d398cb504c78c0823e926ad2e99f7a5b06db42e23ef63b
opa-fm-10.11.0.2.1-1.el8.rocky.x86_64.rpm
e750e63c2625f670d507b56dffb5c064fd8c909f4bc2b78cfcc896c52a76f8d0
perftest-4.5-12.el8.x86_64.rpm
9ed6fb66f98e8716a208a58fc6a7c48cc26acf962319aae6f68e336cd1f4e258
RLSA-2021:4413
Moderate: tpm2-tools security and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for tpm2-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space.
Security Fix(es):
* tpm2-tools: fixed AES wrapping key in tpm2_import (CVE-2021-3565)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
tpm2-tools-4.1.1-5.el8.x86_64.rpm
56641449ac2b9486586450eb5edd7ba1e80c42e2b4e327cf92d3225541264148
tpm2-tools-4.1.1-5.el8.x86_64.rpm
56641449ac2b9486586450eb5edd7ba1e80c42e2b4e327cf92d3225541264148
tpm2-tools-4.1.1-5.el8.x86_64.rpm
56641449ac2b9486586450eb5edd7ba1e80c42e2b4e327cf92d3225541264148
RLBA-2021:4421
hdparm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hdparm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
hdparm-9.54-4.el8.x86_64.rpm
b697f45bdac88f22ec4926f770a10e09e7283a5c4adfda0c82e083c4ddda2fea
hdparm-9.54-4.el8.x86_64.rpm
b697f45bdac88f22ec4926f770a10e09e7283a5c4adfda0c82e083c4ddda2fea
hdparm-9.54-4.el8.x86_64.rpm
b697f45bdac88f22ec4926f770a10e09e7283a5c4adfda0c82e083c4ddda2fea
RLSA-2021:4426
Moderate: ncurses security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for ncurses.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.
Security Fix(es):
* ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594)
* ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
ncurses-6.1-9.20180224.el8.x86_64.rpm
01e479a8932454ca746744cbf6dcf006e48ff702773014a690ee9e56f9a6cf5f
ncurses-6.1-9.20180224.el8.x86_64.rpm
01e479a8932454ca746744cbf6dcf006e48ff702773014a690ee9e56f9a6cf5f
ncurses-6.1-9.20180224.el8.x86_64.rpm
01e479a8932454ca746744cbf6dcf006e48ff702773014a690ee9e56f9a6cf5f
ncurses-base-6.1-9.20180224.el8.noarch.rpm
0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1
ncurses-base-6.1-9.20180224.el8.noarch.rpm
0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1
ncurses-base-6.1-9.20180224.el8.noarch.rpm
0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1
ncurses-base-6.1-9.20180224.el8.noarch.rpm
0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1
ncurses-base-6.1-9.20180224.el8.noarch.rpm
0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1
ncurses-base-6.1-9.20180224.el8.noarch.rpm
0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1
ncurses-c++-libs-6.1-9.20180224.el8.i686.rpm
89ed8a8f09f64c1f563e07c0e1413fb787536c727cc0b2084b12e9cc4f75bff9
ncurses-c++-libs-6.1-9.20180224.el8.i686.rpm
89ed8a8f09f64c1f563e07c0e1413fb787536c727cc0b2084b12e9cc4f75bff9
ncurses-c++-libs-6.1-9.20180224.el8.i686.rpm
89ed8a8f09f64c1f563e07c0e1413fb787536c727cc0b2084b12e9cc4f75bff9
ncurses-c++-libs-6.1-9.20180224.el8.x86_64.rpm
6ab0bd138fe730716f2d4c790d1e9249239499b6ec32f2a695f55da3c6430548
ncurses-c++-libs-6.1-9.20180224.el8.x86_64.rpm
6ab0bd138fe730716f2d4c790d1e9249239499b6ec32f2a695f55da3c6430548
ncurses-c++-libs-6.1-9.20180224.el8.x86_64.rpm
6ab0bd138fe730716f2d4c790d1e9249239499b6ec32f2a695f55da3c6430548
ncurses-compat-libs-6.1-9.20180224.el8.i686.rpm
fca5328e746e14ed6d0d7646a73b7eded2c09657966c5fb179b4a6b6b311dc9b
ncurses-compat-libs-6.1-9.20180224.el8.i686.rpm
fca5328e746e14ed6d0d7646a73b7eded2c09657966c5fb179b4a6b6b311dc9b
ncurses-compat-libs-6.1-9.20180224.el8.i686.rpm
fca5328e746e14ed6d0d7646a73b7eded2c09657966c5fb179b4a6b6b311dc9b
ncurses-compat-libs-6.1-9.20180224.el8.x86_64.rpm
66cf17688b5930da19e3a435d23dee553644f0830ed0df61fa26562d5f4b866c
ncurses-compat-libs-6.1-9.20180224.el8.x86_64.rpm
66cf17688b5930da19e3a435d23dee553644f0830ed0df61fa26562d5f4b866c
ncurses-compat-libs-6.1-9.20180224.el8.x86_64.rpm
66cf17688b5930da19e3a435d23dee553644f0830ed0df61fa26562d5f4b866c
ncurses-devel-6.1-9.20180224.el8.i686.rpm
339b12ba0b7903a4c677c975fa9de63e640ec363142b5d95483b904ec7d8d4e5
ncurses-devel-6.1-9.20180224.el8.i686.rpm
339b12ba0b7903a4c677c975fa9de63e640ec363142b5d95483b904ec7d8d4e5
ncurses-devel-6.1-9.20180224.el8.i686.rpm
339b12ba0b7903a4c677c975fa9de63e640ec363142b5d95483b904ec7d8d4e5
ncurses-devel-6.1-9.20180224.el8.x86_64.rpm
96cd5a3383ee4bec20ec57897de0034734df9356852b8c7c118c10bcdf3f20b1
ncurses-devel-6.1-9.20180224.el8.x86_64.rpm
96cd5a3383ee4bec20ec57897de0034734df9356852b8c7c118c10bcdf3f20b1
ncurses-devel-6.1-9.20180224.el8.x86_64.rpm
96cd5a3383ee4bec20ec57897de0034734df9356852b8c7c118c10bcdf3f20b1
ncurses-libs-6.1-9.20180224.el8.i686.rpm
c060706fd92c960d9a8e7ed5120aa540a1ba24ae776f306f50d3fa41d2b6ad78
ncurses-libs-6.1-9.20180224.el8.i686.rpm
c060706fd92c960d9a8e7ed5120aa540a1ba24ae776f306f50d3fa41d2b6ad78
ncurses-libs-6.1-9.20180224.el8.i686.rpm
c060706fd92c960d9a8e7ed5120aa540a1ba24ae776f306f50d3fa41d2b6ad78
ncurses-libs-6.1-9.20180224.el8.x86_64.rpm
f127eaa596a0e10a031502ffbe4fec8c80c649c645dca6dbb73109f1e4989df8
ncurses-libs-6.1-9.20180224.el8.x86_64.rpm
f127eaa596a0e10a031502ffbe4fec8c80c649c645dca6dbb73109f1e4989df8
ncurses-libs-6.1-9.20180224.el8.x86_64.rpm
f127eaa596a0e10a031502ffbe4fec8c80c649c645dca6dbb73109f1e4989df8
ncurses-term-6.1-9.20180224.el8.noarch.rpm
165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066
ncurses-term-6.1-9.20180224.el8.noarch.rpm
165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066
ncurses-term-6.1-9.20180224.el8.noarch.rpm
165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066
ncurses-term-6.1-9.20180224.el8.noarch.rpm
165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066
ncurses-term-6.1-9.20180224.el8.noarch.rpm
165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066
ncurses-term-6.1-9.20180224.el8.noarch.rpm
165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066
RLEA-2021:4434
libcap-ng bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libcap-ng-0.7.11-1.el8.i686.rpm
42515a623a33d3e4dcba6c316aa63c3a7b2c0ea709420b0f6354b5a05976bb85
libcap-ng-0.7.11-1.el8.i686.rpm
42515a623a33d3e4dcba6c316aa63c3a7b2c0ea709420b0f6354b5a05976bb85
libcap-ng-0.7.11-1.el8.i686.rpm
42515a623a33d3e4dcba6c316aa63c3a7b2c0ea709420b0f6354b5a05976bb85
libcap-ng-0.7.11-1.el8.x86_64.rpm
761a00cbdad22fc3d308ce6e49aa3b3909cd2a8b93794da53ea74344a280cde5
libcap-ng-0.7.11-1.el8.x86_64.rpm
761a00cbdad22fc3d308ce6e49aa3b3909cd2a8b93794da53ea74344a280cde5
libcap-ng-0.7.11-1.el8.x86_64.rpm
761a00cbdad22fc3d308ce6e49aa3b3909cd2a8b93794da53ea74344a280cde5
libcap-ng-devel-0.7.11-1.el8.i686.rpm
32be13b55a1e8f7493c2d4b00b260f8bc0a7f037a012970f85ef248e4f4c0468
libcap-ng-devel-0.7.11-1.el8.i686.rpm
32be13b55a1e8f7493c2d4b00b260f8bc0a7f037a012970f85ef248e4f4c0468
libcap-ng-devel-0.7.11-1.el8.i686.rpm
32be13b55a1e8f7493c2d4b00b260f8bc0a7f037a012970f85ef248e4f4c0468
libcap-ng-devel-0.7.11-1.el8.x86_64.rpm
9351a96d4320814185fb5336a2fe41bfd676f655acdf3aa070c964dd8e74acd0
libcap-ng-devel-0.7.11-1.el8.x86_64.rpm
9351a96d4320814185fb5336a2fe41bfd676f655acdf3aa070c964dd8e74acd0
libcap-ng-devel-0.7.11-1.el8.x86_64.rpm
9351a96d4320814185fb5336a2fe41bfd676f655acdf3aa070c964dd8e74acd0
libcap-ng-python3-0.7.11-1.el8.x86_64.rpm
f6c28c27eb7a3eb39189fe66a67a9ce21fa41c120debd14c887f5226e6546211
libcap-ng-python3-0.7.11-1.el8.x86_64.rpm
f6c28c27eb7a3eb39189fe66a67a9ce21fa41c120debd14c887f5226e6546211
libcap-ng-python3-0.7.11-1.el8.x86_64.rpm
f6c28c27eb7a3eb39189fe66a67a9ce21fa41c120debd14c887f5226e6546211
libcap-ng-utils-0.7.11-1.el8.x86_64.rpm
e9967d25b3802010113e075ee0b603205fc87d40a2bd6b69faf151adcabe06c4
libcap-ng-utils-0.7.11-1.el8.x86_64.rpm
e9967d25b3802010113e075ee0b603205fc87d40a2bd6b69faf151adcabe06c4
libcap-ng-utils-0.7.11-1.el8.x86_64.rpm
e9967d25b3802010113e075ee0b603205fc87d40a2bd6b69faf151adcabe06c4
RLBA-2021:4441
microdnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
microdnf-3.8.0-2.el8.x86_64.rpm
288566726f311e55eb6b8c7a39d17aed661013737d721c45f7e30f5bc96cf7c3
microdnf-3.8.0-2.el8.x86_64.rpm
288566726f311e55eb6b8c7a39d17aed661013737d721c45f7e30f5bc96cf7c3
microdnf-3.8.0-2.el8.x86_64.rpm
288566726f311e55eb6b8c7a39d17aed661013737d721c45f7e30f5bc96cf7c3
RLBA-2021:4442
lshw bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lshw.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
lshw-B.02.19.2-6.el8.x86_64.rpm
836ee14696e219b86ab54380c32fcbb7cdc82922ebbd9b59a731feb39fe4d4a0
lshw-B.02.19.2-6.el8.x86_64.rpm
836ee14696e219b86ab54380c32fcbb7cdc82922ebbd9b59a731feb39fe4d4a0
lshw-B.02.19.2-6.el8.x86_64.rpm
836ee14696e219b86ab54380c32fcbb7cdc82922ebbd9b59a731feb39fe4d4a0
RLBA-2021:4443
python-cryptography bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-cryptography.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
python3-cryptography-3.2.1-5.el8.x86_64.rpm
fb7a8e1faf38e78cb0f94d07498fa5e7523a97665194d7a10b3ef52cd744ec23
python3-cryptography-3.2.1-5.el8.x86_64.rpm
fb7a8e1faf38e78cb0f94d07498fa5e7523a97665194d7a10b3ef52cd744ec23
python3-cryptography-3.2.1-5.el8.x86_64.rpm
fb7a8e1faf38e78cb0f94d07498fa5e7523a97665194d7a10b3ef52cd744ec23
RLBA-2021:4445
fcoe-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fcoe-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
fcoe-utils-1.0.33-4.git848bcc6.el8.x86_64.rpm
a9e9b5a53f45e07d1b13a6e387413acb5cb973aa2cb716377f7966c234a178e3
fcoe-utils-1.0.33-4.git848bcc6.el8.x86_64.rpm
a9e9b5a53f45e07d1b13a6e387413acb5cb973aa2cb716377f7966c234a178e3
fcoe-utils-1.0.33-4.git848bcc6.el8.x86_64.rpm
a9e9b5a53f45e07d1b13a6e387413acb5cb973aa2cb716377f7966c234a178e3
RLBA-2021:4446
iscsi-initiator-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.i686.rpm
a8c67cd974e51cc6e53964ac1ca258b4f5c7f9a004344107b344ee14c642a623
iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.i686.rpm
a8c67cd974e51cc6e53964ac1ca258b4f5c7f9a004344107b344ee14c642a623
iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.i686.rpm
a8c67cd974e51cc6e53964ac1ca258b4f5c7f9a004344107b344ee14c642a623
iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm
8f57c01418ad5e5c667a5c631e78cbcb6ef8f6333b725bce6fd4c3925577d5ba
iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm
8f57c01418ad5e5c667a5c631e78cbcb6ef8f6333b725bce6fd4c3925577d5ba
iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm
8f57c01418ad5e5c667a5c631e78cbcb6ef8f6333b725bce6fd4c3925577d5ba
iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.x86_64.rpm
424ff81a306bf519932fd557edc599a1fff9924068918e26aa3d1a440754874e
iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.x86_64.rpm
424ff81a306bf519932fd557edc599a1fff9924068918e26aa3d1a440754874e
iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.x86_64.rpm
424ff81a306bf519932fd557edc599a1fff9924068918e26aa3d1a440754874e
python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm
cfca39fb448a475d7fd860860691a4ed8974509754f25ffb6bfdca8828230aad
python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm
cfca39fb448a475d7fd860860691a4ed8974509754f25ffb6bfdca8828230aad
python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.x86_64.rpm
cfca39fb448a475d7fd860860691a4ed8974509754f25ffb6bfdca8828230aad
RLBA-2021:4449
openldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
openldap-2.4.46-18.el8.i686.rpm
5c0c79251a0c51a85ee6e778a25a1c653d9f45047f30d1762399cccbc954b21a
openldap-2.4.46-18.el8.i686.rpm
5c0c79251a0c51a85ee6e778a25a1c653d9f45047f30d1762399cccbc954b21a
openldap-2.4.46-18.el8.i686.rpm
5c0c79251a0c51a85ee6e778a25a1c653d9f45047f30d1762399cccbc954b21a
openldap-2.4.46-18.el8.x86_64.rpm
4ddf1d24486b18daa6b9e2afff10966dc033fba8a08df7714d41d0db5a1f4981
openldap-2.4.46-18.el8.x86_64.rpm
4ddf1d24486b18daa6b9e2afff10966dc033fba8a08df7714d41d0db5a1f4981
openldap-2.4.46-18.el8.x86_64.rpm
4ddf1d24486b18daa6b9e2afff10966dc033fba8a08df7714d41d0db5a1f4981
openldap-clients-2.4.46-18.el8.x86_64.rpm
0c3f582752ac772216a51855cfcbd2a18511a2fe5bb69b44c5f2428daf1f26e5
openldap-clients-2.4.46-18.el8.x86_64.rpm
0c3f582752ac772216a51855cfcbd2a18511a2fe5bb69b44c5f2428daf1f26e5
openldap-clients-2.4.46-18.el8.x86_64.rpm
0c3f582752ac772216a51855cfcbd2a18511a2fe5bb69b44c5f2428daf1f26e5
openldap-devel-2.4.46-18.el8.i686.rpm
0a5435b5ba0cb485d6ed0776f336681b524ba0e7a3863f43b6c74c88977098e1
openldap-devel-2.4.46-18.el8.i686.rpm
0a5435b5ba0cb485d6ed0776f336681b524ba0e7a3863f43b6c74c88977098e1
openldap-devel-2.4.46-18.el8.i686.rpm
0a5435b5ba0cb485d6ed0776f336681b524ba0e7a3863f43b6c74c88977098e1
openldap-devel-2.4.46-18.el8.x86_64.rpm
6444c3ce8decbf6e902c02ad8d83c191b6118a4be5f2e7dae6fdbccb384d7654
openldap-devel-2.4.46-18.el8.x86_64.rpm
6444c3ce8decbf6e902c02ad8d83c191b6118a4be5f2e7dae6fdbccb384d7654
openldap-devel-2.4.46-18.el8.x86_64.rpm
6444c3ce8decbf6e902c02ad8d83c191b6118a4be5f2e7dae6fdbccb384d7654
RLEA-2021:4450
tss2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tss2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
tss2-1.6.0-1.el8.i686.rpm
8d31a434dc68d5db3f138854015391683ddded789d02c6bc2fd17f114dc41681
tss2-1.6.0-1.el8.i686.rpm
8d31a434dc68d5db3f138854015391683ddded789d02c6bc2fd17f114dc41681
tss2-1.6.0-1.el8.i686.rpm
8d31a434dc68d5db3f138854015391683ddded789d02c6bc2fd17f114dc41681
tss2-1.6.0-1.el8.x86_64.rpm
c9fc268ee1facd5163bf0daa7a4c7a5ce47d13b073b7a837d301acaa084fcc78
tss2-1.6.0-1.el8.x86_64.rpm
c9fc268ee1facd5163bf0daa7a4c7a5ce47d13b073b7a837d301acaa084fcc78
tss2-1.6.0-1.el8.x86_64.rpm
c9fc268ee1facd5163bf0daa7a4c7a5ce47d13b073b7a837d301acaa084fcc78
RLSA-2021:4451
Moderate: gnutls and nettle security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nettle, gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783)
Security Fix(es):
* nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580)
* gnutls: Use after free in client key_share extension (CVE-2021-20231)
* gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
gnutls-3.6.16-4.el8.i686.rpm
85c5e084ddd83fb7f45ae2739d6b9cb5dd501bd39966e0a17bb73b6350c0166f
gnutls-3.6.16-4.el8.i686.rpm
85c5e084ddd83fb7f45ae2739d6b9cb5dd501bd39966e0a17bb73b6350c0166f
gnutls-3.6.16-4.el8.x86_64.rpm
1519db18e00905e0020dc7182d715a2ed430253c425493df0aea9baed6b09674
gnutls-3.6.16-4.el8.x86_64.rpm
1519db18e00905e0020dc7182d715a2ed430253c425493df0aea9baed6b09674
nettle-3.4.1-7.el8.i686.rpm
a1c87fc2d883b1cc2aa60e2849b17bfe55b7c0af1f3c11b0790f752a46d4f757
nettle-3.4.1-7.el8.i686.rpm
a1c87fc2d883b1cc2aa60e2849b17bfe55b7c0af1f3c11b0790f752a46d4f757
nettle-3.4.1-7.el8.i686.rpm
a1c87fc2d883b1cc2aa60e2849b17bfe55b7c0af1f3c11b0790f752a46d4f757
nettle-3.4.1-7.el8.x86_64.rpm
1c462fc46745eb337edf14bc05b508d7cc5cf109c15d8ec0981ba29b3fba779e
nettle-3.4.1-7.el8.x86_64.rpm
1c462fc46745eb337edf14bc05b508d7cc5cf109c15d8ec0981ba29b3fba779e
nettle-3.4.1-7.el8.x86_64.rpm
1c462fc46745eb337edf14bc05b508d7cc5cf109c15d8ec0981ba29b3fba779e
RLBA-2021:4453
adcli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
adcli-0.8.2-12.el8.x86_64.rpm
da4f2cb54f668f1f4cb3683f627574c788a12ab68ab8163abfa719ebe840829b
adcli-0.8.2-12.el8.x86_64.rpm
da4f2cb54f668f1f4cb3683f627574c788a12ab68ab8163abfa719ebe840829b
adcli-0.8.2-12.el8.x86_64.rpm
da4f2cb54f668f1f4cb3683f627574c788a12ab68ab8163abfa719ebe840829b
adcli-doc-0.8.2-12.el8.noarch.rpm
8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39
adcli-doc-0.8.2-12.el8.noarch.rpm
8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39
adcli-doc-0.8.2-12.el8.noarch.rpm
8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39
adcli-doc-0.8.2-12.el8.noarch.rpm
8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39
adcli-doc-0.8.2-12.el8.noarch.rpm
8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39
adcli-doc-0.8.2-12.el8.noarch.rpm
8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39
RLBA-2021:4454
keyutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for keyutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
keyutils-1.5.10-9.el8.x86_64.rpm
28a9cdd2360e30d389fa72f66f073029fd9475b7af4363d8fd0f0e664702ff15
keyutils-1.5.10-9.el8.x86_64.rpm
28a9cdd2360e30d389fa72f66f073029fd9475b7af4363d8fd0f0e664702ff15
keyutils-1.5.10-9.el8.x86_64.rpm
28a9cdd2360e30d389fa72f66f073029fd9475b7af4363d8fd0f0e664702ff15
keyutils-libs-1.5.10-9.el8.i686.rpm
32ef033ee6f998622f91a127d71e8a4308d2f992d55000487c3a624ee843a921
keyutils-libs-1.5.10-9.el8.i686.rpm
32ef033ee6f998622f91a127d71e8a4308d2f992d55000487c3a624ee843a921
keyutils-libs-1.5.10-9.el8.i686.rpm
32ef033ee6f998622f91a127d71e8a4308d2f992d55000487c3a624ee843a921
keyutils-libs-1.5.10-9.el8.x86_64.rpm
f44103f68ed2718427d03edb4a0ebdf187ca12bcb13024b9b88a7e7f802ba95c
keyutils-libs-1.5.10-9.el8.x86_64.rpm
f44103f68ed2718427d03edb4a0ebdf187ca12bcb13024b9b88a7e7f802ba95c
keyutils-libs-1.5.10-9.el8.x86_64.rpm
f44103f68ed2718427d03edb4a0ebdf187ca12bcb13024b9b88a7e7f802ba95c
keyutils-libs-devel-1.5.10-9.el8.i686.rpm
aacfa92431273f4c6f04fd1dd754f5d79ae234e90ebb0f2b97772c21c012d278
keyutils-libs-devel-1.5.10-9.el8.i686.rpm
aacfa92431273f4c6f04fd1dd754f5d79ae234e90ebb0f2b97772c21c012d278
keyutils-libs-devel-1.5.10-9.el8.i686.rpm
aacfa92431273f4c6f04fd1dd754f5d79ae234e90ebb0f2b97772c21c012d278
keyutils-libs-devel-1.5.10-9.el8.x86_64.rpm
fb29a6347fefd64bd276f37a7fd7e6bbea545648f6f07ad15f0acd94e8988b99
keyutils-libs-devel-1.5.10-9.el8.x86_64.rpm
fb29a6347fefd64bd276f37a7fd7e6bbea545648f6f07ad15f0acd94e8988b99
keyutils-libs-devel-1.5.10-9.el8.x86_64.rpm
fb29a6347fefd64bd276f37a7fd7e6bbea545648f6f07ad15f0acd94e8988b99
RLBA-2021:4456
boom-boot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for boom-boot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
boom-boot-1.3-2.el8.noarch.rpm
e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06
boom-boot-1.3-2.el8.noarch.rpm
e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06
boom-boot-1.3-2.el8.noarch.rpm
e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06
boom-boot-1.3-2.el8.noarch.rpm
e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06
boom-boot-1.3-2.el8.noarch.rpm
e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06
boom-boot-1.3-2.el8.noarch.rpm
e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06
boom-boot-conf-1.3-2.el8.noarch.rpm
c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b
boom-boot-conf-1.3-2.el8.noarch.rpm
c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b
boom-boot-conf-1.3-2.el8.noarch.rpm
c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b
boom-boot-conf-1.3-2.el8.noarch.rpm
c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b
boom-boot-conf-1.3-2.el8.noarch.rpm
c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b
boom-boot-conf-1.3-2.el8.noarch.rpm
c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b
boom-boot-grub2-1.3-2.el8.noarch.rpm
65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461
boom-boot-grub2-1.3-2.el8.noarch.rpm
65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461
boom-boot-grub2-1.3-2.el8.noarch.rpm
65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461
boom-boot-grub2-1.3-2.el8.noarch.rpm
65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461
boom-boot-grub2-1.3-2.el8.noarch.rpm
65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461
boom-boot-grub2-1.3-2.el8.noarch.rpm
65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461
python3-boom-1.3-2.el8.noarch.rpm
a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978
python3-boom-1.3-2.el8.noarch.rpm
a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978
python3-boom-1.3-2.el8.noarch.rpm
a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978
python3-boom-1.3-2.el8.noarch.rpm
a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978
python3-boom-1.3-2.el8.noarch.rpm
a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978
python3-boom-1.3-2.el8.noarch.rpm
a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978
RLBA-2021:4461
filesystem bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for filesystem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
filesystem-3.8-6.el8.x86_64.rpm
a620c8dc9acec25088fa83a1061bbda6d391dd1aab36b9eed75144d5d4caf8d7
filesystem-3.8-6.el8.x86_64.rpm
a620c8dc9acec25088fa83a1061bbda6d391dd1aab36b9eed75144d5d4caf8d7
filesystem-3.8-6.el8.x86_64.rpm
a620c8dc9acec25088fa83a1061bbda6d391dd1aab36b9eed75144d5d4caf8d7
RLBA-2021:4470
man-db bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for man-db.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
man-db-2.7.6.1-18.el8.x86_64.rpm
8037a0a1e22a3558f4d1ed8d1fff0daba12f79bfb3935885957624e53def1c96
man-db-2.7.6.1-18.el8.x86_64.rpm
8037a0a1e22a3558f4d1ed8d1fff0daba12f79bfb3935885957624e53def1c96
man-db-2.7.6.1-18.el8.x86_64.rpm
8037a0a1e22a3558f4d1ed8d1fff0daba12f79bfb3935885957624e53def1c96
man-db-cron-2.7.6.1-18.el8.noarch.rpm
4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6
man-db-cron-2.7.6.1-18.el8.noarch.rpm
4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6
man-db-cron-2.7.6.1-18.el8.noarch.rpm
4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6
man-db-cron-2.7.6.1-18.el8.noarch.rpm
4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6
man-db-cron-2.7.6.1-18.el8.noarch.rpm
4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6
man-db-cron-2.7.6.1-18.el8.noarch.rpm
4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6
RLBA-2021:4475
freeipmi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freeipmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
freeipmi-1.6.8-1.el8.i686.rpm
6c8432dc5902218c1fe74ae40d8898520507361cb9ec5d5f5651b90b1b893c54
freeipmi-1.6.8-1.el8.i686.rpm
6c8432dc5902218c1fe74ae40d8898520507361cb9ec5d5f5651b90b1b893c54
freeipmi-1.6.8-1.el8.i686.rpm
6c8432dc5902218c1fe74ae40d8898520507361cb9ec5d5f5651b90b1b893c54
freeipmi-1.6.8-1.el8.x86_64.rpm
b462ee869a627f2e094660fa1acfbc15a2d7de108b72703ba2333163eb01d44a
freeipmi-1.6.8-1.el8.x86_64.rpm
b462ee869a627f2e094660fa1acfbc15a2d7de108b72703ba2333163eb01d44a
freeipmi-1.6.8-1.el8.x86_64.rpm
b462ee869a627f2e094660fa1acfbc15a2d7de108b72703ba2333163eb01d44a
freeipmi-bmc-watchdog-1.6.8-1.el8.x86_64.rpm
0cd6c7fc163ba44d532f203e63deadfed53b0bd5c36a624c48e12ea000cb7b79
freeipmi-bmc-watchdog-1.6.8-1.el8.x86_64.rpm
0cd6c7fc163ba44d532f203e63deadfed53b0bd5c36a624c48e12ea000cb7b79
freeipmi-bmc-watchdog-1.6.8-1.el8.x86_64.rpm
0cd6c7fc163ba44d532f203e63deadfed53b0bd5c36a624c48e12ea000cb7b79
freeipmi-ipmidetectd-1.6.8-1.el8.x86_64.rpm
ea77762191a5170a7626ceaf6bebef127cc350068cfe466784fa54f9da2781fc
freeipmi-ipmidetectd-1.6.8-1.el8.x86_64.rpm
ea77762191a5170a7626ceaf6bebef127cc350068cfe466784fa54f9da2781fc
freeipmi-ipmidetectd-1.6.8-1.el8.x86_64.rpm
ea77762191a5170a7626ceaf6bebef127cc350068cfe466784fa54f9da2781fc
freeipmi-ipmiseld-1.6.8-1.el8.x86_64.rpm
5b10807bf9e626ff8edb33bb18942986187ae61fb182d977986f38cdd62bca46
freeipmi-ipmiseld-1.6.8-1.el8.x86_64.rpm
5b10807bf9e626ff8edb33bb18942986187ae61fb182d977986f38cdd62bca46
freeipmi-ipmiseld-1.6.8-1.el8.x86_64.rpm
5b10807bf9e626ff8edb33bb18942986187ae61fb182d977986f38cdd62bca46
RLBA-2021:4477
parted bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for parted.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
parted-3.2-39.el8.i686.rpm
31c2df37ec199339db696baab77874478bc64975b7e69bb51815c7a1dea756b2
parted-3.2-39.el8.i686.rpm
31c2df37ec199339db696baab77874478bc64975b7e69bb51815c7a1dea756b2
parted-3.2-39.el8.i686.rpm
31c2df37ec199339db696baab77874478bc64975b7e69bb51815c7a1dea756b2
parted-3.2-39.el8.x86_64.rpm
439db5265bdff61a577ba4cb29f729d6abe868cf3b9a77818e38bcf77f1e7bbb
parted-3.2-39.el8.x86_64.rpm
439db5265bdff61a577ba4cb29f729d6abe868cf3b9a77818e38bcf77f1e7bbb
parted-3.2-39.el8.x86_64.rpm
439db5265bdff61a577ba4cb29f729d6abe868cf3b9a77818e38bcf77f1e7bbb
RLBA-2021:4483
OpenIPMI bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for OpenIPMI.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
OpenIPMI-2.0.31-3.el8.i686.rpm
1a87d9ffac5b2e8253d5115bb6e5827e98196138fd9d726824cc6dc81c9b68bb
OpenIPMI-2.0.31-3.el8.i686.rpm
1a87d9ffac5b2e8253d5115bb6e5827e98196138fd9d726824cc6dc81c9b68bb
OpenIPMI-2.0.31-3.el8.i686.rpm
1a87d9ffac5b2e8253d5115bb6e5827e98196138fd9d726824cc6dc81c9b68bb
OpenIPMI-2.0.31-3.el8.x86_64.rpm
905a03c8cbe871b46f09ec36eefa39c8e5ed578379150019b91cc5769f7dd1b8
OpenIPMI-2.0.31-3.el8.x86_64.rpm
905a03c8cbe871b46f09ec36eefa39c8e5ed578379150019b91cc5769f7dd1b8
OpenIPMI-2.0.31-3.el8.x86_64.rpm
905a03c8cbe871b46f09ec36eefa39c8e5ed578379150019b91cc5769f7dd1b8
OpenIPMI-lanserv-2.0.31-3.el8.i686.rpm
d0da9de08c7439d21e9b06789fbe8d065942a1dd6603c6cea81c70b214773cf6
OpenIPMI-lanserv-2.0.31-3.el8.i686.rpm
d0da9de08c7439d21e9b06789fbe8d065942a1dd6603c6cea81c70b214773cf6
OpenIPMI-lanserv-2.0.31-3.el8.i686.rpm
d0da9de08c7439d21e9b06789fbe8d065942a1dd6603c6cea81c70b214773cf6
OpenIPMI-lanserv-2.0.31-3.el8.x86_64.rpm
857b502b8c297df355b755b6cb377f7f67606c9da0cb41efa8f05f8cd739b8dd
OpenIPMI-lanserv-2.0.31-3.el8.x86_64.rpm
857b502b8c297df355b755b6cb377f7f67606c9da0cb41efa8f05f8cd739b8dd
OpenIPMI-lanserv-2.0.31-3.el8.x86_64.rpm
857b502b8c297df355b755b6cb377f7f67606c9da0cb41efa8f05f8cd739b8dd
OpenIPMI-libs-2.0.31-3.el8.i686.rpm
ca59e7cae9192773a0870bd7dae00c9760c2fc75d8f76eeb558606aa108e0a14
OpenIPMI-libs-2.0.31-3.el8.i686.rpm
ca59e7cae9192773a0870bd7dae00c9760c2fc75d8f76eeb558606aa108e0a14
OpenIPMI-libs-2.0.31-3.el8.i686.rpm
ca59e7cae9192773a0870bd7dae00c9760c2fc75d8f76eeb558606aa108e0a14
OpenIPMI-libs-2.0.31-3.el8.x86_64.rpm
298e426b4ea7ff819988bc6b92f5a3ae4b22b519cdd709e2f6fb3eeec6c6708e
OpenIPMI-libs-2.0.31-3.el8.x86_64.rpm
298e426b4ea7ff819988bc6b92f5a3ae4b22b519cdd709e2f6fb3eeec6c6708e
OpenIPMI-libs-2.0.31-3.el8.x86_64.rpm
298e426b4ea7ff819988bc6b92f5a3ae4b22b519cdd709e2f6fb3eeec6c6708e
OpenIPMI-perl-2.0.31-3.el8.x86_64.rpm
6bd9f4ae7d4b653181f031438ece41b47e01179470e157f0938b66ee0f10122b
OpenIPMI-perl-2.0.31-3.el8.x86_64.rpm
6bd9f4ae7d4b653181f031438ece41b47e01179470e157f0938b66ee0f10122b
OpenIPMI-perl-2.0.31-3.el8.x86_64.rpm
6bd9f4ae7d4b653181f031438ece41b47e01179470e157f0938b66ee0f10122b
python3-openipmi-2.0.31-3.el8.x86_64.rpm
4bfaa5bcfd1d2071aa57763018f53f4b22a81cb4f1333251ee7d6d34b8ae68ec
python3-openipmi-2.0.31-3.el8.x86_64.rpm
4bfaa5bcfd1d2071aa57763018f53f4b22a81cb4f1333251ee7d6d34b8ae68ec
python3-openipmi-2.0.31-3.el8.x86_64.rpm
4bfaa5bcfd1d2071aa57763018f53f4b22a81cb4f1333251ee7d6d34b8ae68ec
RLEA-2021:4488
hwloc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
compat-hwloc1-2.2.0-3.el8.i686.rpm
b1f6963a31388e4704733b8151905d29efa053d5db07b6c740520ddfc7455385
compat-hwloc1-2.2.0-3.el8.i686.rpm
b1f6963a31388e4704733b8151905d29efa053d5db07b6c740520ddfc7455385
compat-hwloc1-2.2.0-3.el8.i686.rpm
b1f6963a31388e4704733b8151905d29efa053d5db07b6c740520ddfc7455385
compat-hwloc1-2.2.0-3.el8.x86_64.rpm
4db3b7ecc22503683fbb9c536676c01698c909429d55a05d82db0790066f8964
compat-hwloc1-2.2.0-3.el8.x86_64.rpm
4db3b7ecc22503683fbb9c536676c01698c909429d55a05d82db0790066f8964
compat-hwloc1-2.2.0-3.el8.x86_64.rpm
4db3b7ecc22503683fbb9c536676c01698c909429d55a05d82db0790066f8964
hwloc-2.2.0-3.el8.x86_64.rpm
47ae43c5691e6c25f41be31d3728ba91b7542fbfa10cf727d583797453b8609a
hwloc-2.2.0-3.el8.x86_64.rpm
47ae43c5691e6c25f41be31d3728ba91b7542fbfa10cf727d583797453b8609a
hwloc-2.2.0-3.el8.x86_64.rpm
47ae43c5691e6c25f41be31d3728ba91b7542fbfa10cf727d583797453b8609a
hwloc-libs-2.2.0-3.el8.i686.rpm
c44af07228fd79725611ba5107fe844297d4fbc085b251502b291867796adbea
hwloc-libs-2.2.0-3.el8.i686.rpm
c44af07228fd79725611ba5107fe844297d4fbc085b251502b291867796adbea
hwloc-libs-2.2.0-3.el8.i686.rpm
c44af07228fd79725611ba5107fe844297d4fbc085b251502b291867796adbea
hwloc-libs-2.2.0-3.el8.x86_64.rpm
5f77d199898d6588e5de9de8330435897cfbeb4bf6d49dcdfc42a5d60f0370f4
hwloc-libs-2.2.0-3.el8.x86_64.rpm
5f77d199898d6588e5de9de8330435897cfbeb4bf6d49dcdfc42a5d60f0370f4
hwloc-libs-2.2.0-3.el8.x86_64.rpm
5f77d199898d6588e5de9de8330435897cfbeb4bf6d49dcdfc42a5d60f0370f4
RLBA-2021:4496
chkconfig bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chkconfig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
chkconfig-1.19.1-1.el8.x86_64.rpm
effd7e19baa0b24202b93ffa280ebd988f85b6d4defe02dc65741cf796fe2ef9
chkconfig-1.19.1-1.el8.x86_64.rpm
effd7e19baa0b24202b93ffa280ebd988f85b6d4defe02dc65741cf796fe2ef9
chkconfig-1.19.1-1.el8.x86_64.rpm
effd7e19baa0b24202b93ffa280ebd988f85b6d4defe02dc65741cf796fe2ef9
ntsysv-1.19.1-1.el8.x86_64.rpm
87f06924896c64dd178b8b58614cf539d4c9c07a772adaadc829f0fc55c39a63
ntsysv-1.19.1-1.el8.x86_64.rpm
87f06924896c64dd178b8b58614cf539d4c9c07a772adaadc829f0fc55c39a63
ntsysv-1.19.1-1.el8.x86_64.rpm
87f06924896c64dd178b8b58614cf539d4c9c07a772adaadc829f0fc55c39a63
RLBA-2021:4501
emacs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
emacs-filesystem-26.1-7.el8.noarch.rpm
0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97
emacs-filesystem-26.1-7.el8.noarch.rpm
0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97
emacs-filesystem-26.1-7.el8.noarch.rpm
0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97
emacs-filesystem-26.1-7.el8.noarch.rpm
0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97
emacs-filesystem-26.1-7.el8.noarch.rpm
0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97
emacs-filesystem-26.1-7.el8.noarch.rpm
0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97
RLBA-2021:4505
mobile-broadband-provider-info bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mobile-broadband-provider-info.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
mobile-broadband-provider-info-20210805-1.el8.noarch.rpm
b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87
mobile-broadband-provider-info-20210805-1.el8.noarch.rpm
b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87
mobile-broadband-provider-info-20210805-1.el8.noarch.rpm
b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87
mobile-broadband-provider-info-20210805-1.el8.noarch.rpm
b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87
mobile-broadband-provider-info-20210805-1.el8.noarch.rpm
b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87
mobile-broadband-provider-info-20210805-1.el8.noarch.rpm
b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87
RLBA-2021:4507
fontconfig bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fontconfig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
fontconfig-2.13.1-4.el8.i686.rpm
84be9308dd8e8e228e052a85083f4c024a4cabb4d850c7a326a73123d25dab81
fontconfig-2.13.1-4.el8.i686.rpm
84be9308dd8e8e228e052a85083f4c024a4cabb4d850c7a326a73123d25dab81
fontconfig-2.13.1-4.el8.i686.rpm
84be9308dd8e8e228e052a85083f4c024a4cabb4d850c7a326a73123d25dab81
fontconfig-2.13.1-4.el8.x86_64.rpm
6f8bbe7f9c22003405031deeb18ef38815d8dd4935b8766f711ac8abff276601
fontconfig-2.13.1-4.el8.x86_64.rpm
6f8bbe7f9c22003405031deeb18ef38815d8dd4935b8766f711ac8abff276601
fontconfig-2.13.1-4.el8.x86_64.rpm
6f8bbe7f9c22003405031deeb18ef38815d8dd4935b8766f711ac8abff276601
fontconfig-devel-2.13.1-4.el8.i686.rpm
679540dc628c0e6d683379b002945a83d83bef5497ad2ab30c5eb3cd401fca4c
fontconfig-devel-2.13.1-4.el8.i686.rpm
679540dc628c0e6d683379b002945a83d83bef5497ad2ab30c5eb3cd401fca4c
fontconfig-devel-2.13.1-4.el8.i686.rpm
679540dc628c0e6d683379b002945a83d83bef5497ad2ab30c5eb3cd401fca4c
fontconfig-devel-2.13.1-4.el8.x86_64.rpm
9f929477ca4e71bc79eada7ad1582ae756583bc93a71f45530b3bb6c9323b35a
fontconfig-devel-2.13.1-4.el8.x86_64.rpm
9f929477ca4e71bc79eada7ad1582ae756583bc93a71f45530b3bb6c9323b35a
fontconfig-devel-2.13.1-4.el8.x86_64.rpm
9f929477ca4e71bc79eada7ad1582ae756583bc93a71f45530b3bb6c9323b35a
RLBA-2021:4508
lsscsi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lsscsi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
lsscsi-0.32-3.el8.x86_64.rpm
f7e207e75cbba89966d772221f9556d3be6be0c88f9bf0af14454dd882f03c83
lsscsi-0.32-3.el8.x86_64.rpm
f7e207e75cbba89966d772221f9556d3be6be0c88f9bf0af14454dd882f03c83
lsscsi-0.32-3.el8.x86_64.rpm
f7e207e75cbba89966d772221f9556d3be6be0c88f9bf0af14454dd882f03c83
RLSA-2021:4510
Low: lua security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for lua.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
lua-libs-5.3.4-12.el8.i686.rpm
f36d90e8aab2e7f45dc06dc18cf16b3d25d44df578c007edd5490a97828d045c
lua-libs-5.3.4-12.el8.i686.rpm
f36d90e8aab2e7f45dc06dc18cf16b3d25d44df578c007edd5490a97828d045c
lua-libs-5.3.4-12.el8.i686.rpm
f36d90e8aab2e7f45dc06dc18cf16b3d25d44df578c007edd5490a97828d045c
lua-libs-5.3.4-12.el8.x86_64.rpm
62661a4dd553c29e9200d6319490be62d969c4f4620b9f2134a26652c394fcf7
lua-libs-5.3.4-12.el8.x86_64.rpm
62661a4dd553c29e9200d6319490be62d969c4f4620b9f2134a26652c394fcf7
lua-libs-5.3.4-12.el8.x86_64.rpm
62661a4dd553c29e9200d6319490be62d969c4f4620b9f2134a26652c394fcf7
RLBA-2021:4512
os-prober bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for os-prober.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
os-prober-1.74-9.el8.x86_64.rpm
6fbe666c544e2e3abd3fa5e4e77c8e5e486d7e60f7df881f20c3aeb47114f820
os-prober-1.74-9.el8.x86_64.rpm
6fbe666c544e2e3abd3fa5e4e77c8e5e486d7e60f7df881f20c3aeb47114f820
os-prober-1.74-9.el8.x86_64.rpm
6fbe666c544e2e3abd3fa5e4e77c8e5e486d7e60f7df881f20c3aeb47114f820
RLSA-2021:4513
Moderate: libsepol security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libsepol.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings).
Security Fix(es):
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084)
* libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085)
* libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086)
* libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libsepol-2.9-3.el8.i686.rpm
355e16eebdb17a4dc660d046144379f1d92ca5031f457e5ca44212671634961a
libsepol-2.9-3.el8.i686.rpm
355e16eebdb17a4dc660d046144379f1d92ca5031f457e5ca44212671634961a
libsepol-2.9-3.el8.i686.rpm
355e16eebdb17a4dc660d046144379f1d92ca5031f457e5ca44212671634961a
libsepol-2.9-3.el8.x86_64.rpm
cc017c27e60d9f6d83db9d6828cad89b804d9f50476d88b23e0cd7a69b58f107
libsepol-2.9-3.el8.x86_64.rpm
cc017c27e60d9f6d83db9d6828cad89b804d9f50476d88b23e0cd7a69b58f107
libsepol-2.9-3.el8.x86_64.rpm
cc017c27e60d9f6d83db9d6828cad89b804d9f50476d88b23e0cd7a69b58f107
libsepol-devel-2.9-3.el8.i686.rpm
62354d04d5161f78ba5a80e10e50edab9ddbdfd74bbf9a9e3db15d26a3890adf
libsepol-devel-2.9-3.el8.i686.rpm
62354d04d5161f78ba5a80e10e50edab9ddbdfd74bbf9a9e3db15d26a3890adf
libsepol-devel-2.9-3.el8.i686.rpm
62354d04d5161f78ba5a80e10e50edab9ddbdfd74bbf9a9e3db15d26a3890adf
libsepol-devel-2.9-3.el8.x86_64.rpm
400722a407b15af596c530a7d7f83c429e2577337e56ca93c711ad94ca6155e6
libsepol-devel-2.9-3.el8.x86_64.rpm
400722a407b15af596c530a7d7f83c429e2577337e56ca93c711ad94ca6155e6
libsepol-devel-2.9-3.el8.x86_64.rpm
400722a407b15af596c530a7d7f83c429e2577337e56ca93c711ad94ca6155e6
RLBA-2021:4516
usermode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for usermode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
usermode-1.113-2.el8.x86_64.rpm
29b88838a20e0f5fadb80ce7009a9257d3350713139ca34b9d214dc725ae3816
usermode-1.113-2.el8.x86_64.rpm
29b88838a20e0f5fadb80ce7009a9257d3350713139ca34b9d214dc725ae3816
usermode-1.113-2.el8.x86_64.rpm
29b88838a20e0f5fadb80ce7009a9257d3350713139ca34b9d214dc725ae3816
RLSA-2022:0658
Important: cyrus-sasl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for cyrus-sasl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.
Security Fix(es):
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
cyrus-sasl-2.1.27-6.el8_5.i686.rpm
1670e4ef9c4b4f8667932db2ee6d6204a6cfbb60731fb3c53e57d5779abb8194
cyrus-sasl-2.1.27-6.el8_5.i686.rpm
1670e4ef9c4b4f8667932db2ee6d6204a6cfbb60731fb3c53e57d5779abb8194
cyrus-sasl-2.1.27-6.el8_5.i686.rpm
1670e4ef9c4b4f8667932db2ee6d6204a6cfbb60731fb3c53e57d5779abb8194
cyrus-sasl-2.1.27-6.el8_5.x86_64.rpm
1824f614aabcebda0254792e6c680f2a333c96393b85d761cf36b5f73cfbd925
cyrus-sasl-2.1.27-6.el8_5.x86_64.rpm
1824f614aabcebda0254792e6c680f2a333c96393b85d761cf36b5f73cfbd925
cyrus-sasl-2.1.27-6.el8_5.x86_64.rpm
1824f614aabcebda0254792e6c680f2a333c96393b85d761cf36b5f73cfbd925
cyrus-sasl-devel-2.1.27-6.el8_5.i686.rpm
27f61be9504018027eb69a539395ed2d064e88bc27761349daf71a40aa8c1d41
cyrus-sasl-devel-2.1.27-6.el8_5.i686.rpm
27f61be9504018027eb69a539395ed2d064e88bc27761349daf71a40aa8c1d41
cyrus-sasl-devel-2.1.27-6.el8_5.i686.rpm
27f61be9504018027eb69a539395ed2d064e88bc27761349daf71a40aa8c1d41
cyrus-sasl-devel-2.1.27-6.el8_5.x86_64.rpm
12774e67b410fd7bbc122de9178359e4fed83cc2d8e6c81c0e8e6898e045ee07
cyrus-sasl-devel-2.1.27-6.el8_5.x86_64.rpm
12774e67b410fd7bbc122de9178359e4fed83cc2d8e6c81c0e8e6898e045ee07
cyrus-sasl-devel-2.1.27-6.el8_5.x86_64.rpm
12774e67b410fd7bbc122de9178359e4fed83cc2d8e6c81c0e8e6898e045ee07
cyrus-sasl-gs2-2.1.27-6.el8_5.i686.rpm
9fe8ccb7879209ea3019b893e2fc1a4e95e7b108c328cc95034135b73b53baa2
cyrus-sasl-gs2-2.1.27-6.el8_5.i686.rpm
9fe8ccb7879209ea3019b893e2fc1a4e95e7b108c328cc95034135b73b53baa2
cyrus-sasl-gs2-2.1.27-6.el8_5.i686.rpm
9fe8ccb7879209ea3019b893e2fc1a4e95e7b108c328cc95034135b73b53baa2
cyrus-sasl-gs2-2.1.27-6.el8_5.x86_64.rpm
a9572e38d0da5779a76a655b8dce56eb1d09febdef5568c60ae78f0de939f61c
cyrus-sasl-gs2-2.1.27-6.el8_5.x86_64.rpm
a9572e38d0da5779a76a655b8dce56eb1d09febdef5568c60ae78f0de939f61c
cyrus-sasl-gs2-2.1.27-6.el8_5.x86_64.rpm
a9572e38d0da5779a76a655b8dce56eb1d09febdef5568c60ae78f0de939f61c
cyrus-sasl-gssapi-2.1.27-6.el8_5.i686.rpm
9ab8e27888cc59b64a4f69848c517d778aace9c3a0e948130efdb8b3ac8c1926
cyrus-sasl-gssapi-2.1.27-6.el8_5.i686.rpm
9ab8e27888cc59b64a4f69848c517d778aace9c3a0e948130efdb8b3ac8c1926
cyrus-sasl-gssapi-2.1.27-6.el8_5.i686.rpm
9ab8e27888cc59b64a4f69848c517d778aace9c3a0e948130efdb8b3ac8c1926
cyrus-sasl-gssapi-2.1.27-6.el8_5.x86_64.rpm
f1ca7ec9c34e2947a5b8f1a49003e80beed83f009a7171faf3f1ee18dea1ec20
cyrus-sasl-gssapi-2.1.27-6.el8_5.x86_64.rpm
f1ca7ec9c34e2947a5b8f1a49003e80beed83f009a7171faf3f1ee18dea1ec20
cyrus-sasl-gssapi-2.1.27-6.el8_5.x86_64.rpm
f1ca7ec9c34e2947a5b8f1a49003e80beed83f009a7171faf3f1ee18dea1ec20
cyrus-sasl-ldap-2.1.27-6.el8_5.i686.rpm
a14c18cb97f9b67a6c712e17c848f0021429ebef58cdfbf5c01bf6fc29fc55aa
cyrus-sasl-ldap-2.1.27-6.el8_5.i686.rpm
a14c18cb97f9b67a6c712e17c848f0021429ebef58cdfbf5c01bf6fc29fc55aa
cyrus-sasl-ldap-2.1.27-6.el8_5.i686.rpm
a14c18cb97f9b67a6c712e17c848f0021429ebef58cdfbf5c01bf6fc29fc55aa
cyrus-sasl-ldap-2.1.27-6.el8_5.x86_64.rpm
cc9470e5fe74e796847de97dc2cbfb3cbc4ef4cc98aacbbaacc47329b9192de8
cyrus-sasl-ldap-2.1.27-6.el8_5.x86_64.rpm
cc9470e5fe74e796847de97dc2cbfb3cbc4ef4cc98aacbbaacc47329b9192de8
cyrus-sasl-ldap-2.1.27-6.el8_5.x86_64.rpm
cc9470e5fe74e796847de97dc2cbfb3cbc4ef4cc98aacbbaacc47329b9192de8
cyrus-sasl-lib-2.1.27-6.el8_5.i686.rpm
e5f2a0718cd0690247f4879321bf157386ab8170647605d35d80783107aa3566
cyrus-sasl-lib-2.1.27-6.el8_5.i686.rpm
e5f2a0718cd0690247f4879321bf157386ab8170647605d35d80783107aa3566
cyrus-sasl-lib-2.1.27-6.el8_5.i686.rpm
e5f2a0718cd0690247f4879321bf157386ab8170647605d35d80783107aa3566
cyrus-sasl-lib-2.1.27-6.el8_5.x86_64.rpm
b1a98c3128e57243d2ce7212ced1d8676d4196feac16079e6335413a0b57ca41
cyrus-sasl-lib-2.1.27-6.el8_5.x86_64.rpm
b1a98c3128e57243d2ce7212ced1d8676d4196feac16079e6335413a0b57ca41
cyrus-sasl-lib-2.1.27-6.el8_5.x86_64.rpm
b1a98c3128e57243d2ce7212ced1d8676d4196feac16079e6335413a0b57ca41
cyrus-sasl-md5-2.1.27-6.el8_5.i686.rpm
5b40bcad48b83637d27d45c86b26eddacde118fa028fa17b6ad9cd5904a286aa
cyrus-sasl-md5-2.1.27-6.el8_5.i686.rpm
5b40bcad48b83637d27d45c86b26eddacde118fa028fa17b6ad9cd5904a286aa
cyrus-sasl-md5-2.1.27-6.el8_5.i686.rpm
5b40bcad48b83637d27d45c86b26eddacde118fa028fa17b6ad9cd5904a286aa
cyrus-sasl-md5-2.1.27-6.el8_5.x86_64.rpm
8ba490ac54ffd96a57f7bda6801e0920a8ba037d8f031561716a9e27b97e0d58
cyrus-sasl-md5-2.1.27-6.el8_5.x86_64.rpm
8ba490ac54ffd96a57f7bda6801e0920a8ba037d8f031561716a9e27b97e0d58
cyrus-sasl-md5-2.1.27-6.el8_5.x86_64.rpm
8ba490ac54ffd96a57f7bda6801e0920a8ba037d8f031561716a9e27b97e0d58
cyrus-sasl-ntlm-2.1.27-6.el8_5.i686.rpm
f5307114f26138ed5d4d046c5e23db1b6d4599e21ebca34814c8da0a72a3057a
cyrus-sasl-ntlm-2.1.27-6.el8_5.i686.rpm
f5307114f26138ed5d4d046c5e23db1b6d4599e21ebca34814c8da0a72a3057a
cyrus-sasl-ntlm-2.1.27-6.el8_5.i686.rpm
f5307114f26138ed5d4d046c5e23db1b6d4599e21ebca34814c8da0a72a3057a
cyrus-sasl-ntlm-2.1.27-6.el8_5.x86_64.rpm
f0b7feee34ff86b9bf14eeab92bb67eac1a6d46e556b128d024b532ec2cb9a63
cyrus-sasl-ntlm-2.1.27-6.el8_5.x86_64.rpm
f0b7feee34ff86b9bf14eeab92bb67eac1a6d46e556b128d024b532ec2cb9a63
cyrus-sasl-ntlm-2.1.27-6.el8_5.x86_64.rpm
f0b7feee34ff86b9bf14eeab92bb67eac1a6d46e556b128d024b532ec2cb9a63
cyrus-sasl-plain-2.1.27-6.el8_5.i686.rpm
66cb424dba76d11f4d20a4d05383be55341557ff2572c63e9719b0a2139971d5
cyrus-sasl-plain-2.1.27-6.el8_5.i686.rpm
66cb424dba76d11f4d20a4d05383be55341557ff2572c63e9719b0a2139971d5
cyrus-sasl-plain-2.1.27-6.el8_5.i686.rpm
66cb424dba76d11f4d20a4d05383be55341557ff2572c63e9719b0a2139971d5
cyrus-sasl-plain-2.1.27-6.el8_5.x86_64.rpm
b9e078abe6846f0952cdcfa56d8ca59777c5eedcfb9de265976fca5641917314
cyrus-sasl-plain-2.1.27-6.el8_5.x86_64.rpm
b9e078abe6846f0952cdcfa56d8ca59777c5eedcfb9de265976fca5641917314
cyrus-sasl-plain-2.1.27-6.el8_5.x86_64.rpm
b9e078abe6846f0952cdcfa56d8ca59777c5eedcfb9de265976fca5641917314
cyrus-sasl-scram-2.1.27-6.el8_5.i686.rpm
62ed1f3b7ed2aa143b4a63426b8ad06e7c7b05c2959756297174265c600431da
cyrus-sasl-scram-2.1.27-6.el8_5.i686.rpm
62ed1f3b7ed2aa143b4a63426b8ad06e7c7b05c2959756297174265c600431da
cyrus-sasl-scram-2.1.27-6.el8_5.i686.rpm
62ed1f3b7ed2aa143b4a63426b8ad06e7c7b05c2959756297174265c600431da
cyrus-sasl-scram-2.1.27-6.el8_5.x86_64.rpm
4de03983aa0fa20aa19198fa463e79df8d6e20f5a83468dc4eaeeede24317bf9
cyrus-sasl-scram-2.1.27-6.el8_5.x86_64.rpm
4de03983aa0fa20aa19198fa463e79df8d6e20f5a83468dc4eaeeede24317bf9
cyrus-sasl-scram-2.1.27-6.el8_5.x86_64.rpm
4de03983aa0fa20aa19198fa463e79df8d6e20f5a83468dc4eaeeede24317bf9
RLSA-2022:1537
Important: gzip security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for gzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gzip packages contain the gzip (GNU zip) data compression utility. gzip is used to compress regular files. It replaces them with files containing the .gz extension, while retaining ownership modes, access, and modification times.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gzip-1.9-13.el8_5.x86_64.rpm
722d8e039199d9e37b996c2734a0e0d0f2032a6247616a2f94e8316eec824c53
gzip-1.9-13.el8_5.x86_64.rpm
722d8e039199d9e37b996c2734a0e0d0f2032a6247616a2f94e8316eec824c53
gzip-1.9-13.el8_5.x86_64.rpm
722d8e039199d9e37b996c2734a0e0d0f2032a6247616a2f94e8316eec824c53
RLSA-2022:1546
Moderate: polkit security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for polkit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.
Security Fix(es):
* polkit: file descriptor leak allows an unprivileged user to cause a crash (CVE-2021-4115)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
polkit-0.115-13.el8_5.2.x86_64.rpm
abcb39e61f976ae105945d9c4c3a49e47a770f376166b99a4ab62b865b78fd0a
polkit-0.115-13.el8_5.2.x86_64.rpm
abcb39e61f976ae105945d9c4c3a49e47a770f376166b99a4ab62b865b78fd0a
polkit-0.115-13.el8_5.2.x86_64.rpm
abcb39e61f976ae105945d9c4c3a49e47a770f376166b99a4ab62b865b78fd0a
polkit-devel-0.115-13.el8_5.2.i686.rpm
0f2dfd92f0e2e63782adcc925e7de84dc041f0667d0677a025b7c967cf21aa9e
polkit-devel-0.115-13.el8_5.2.i686.rpm
0f2dfd92f0e2e63782adcc925e7de84dc041f0667d0677a025b7c967cf21aa9e
polkit-devel-0.115-13.el8_5.2.i686.rpm
0f2dfd92f0e2e63782adcc925e7de84dc041f0667d0677a025b7c967cf21aa9e
polkit-devel-0.115-13.el8_5.2.x86_64.rpm
95b52462567c23a6fb021dd1270897720fdb969e424003968639e7d3effb22ff
polkit-devel-0.115-13.el8_5.2.x86_64.rpm
95b52462567c23a6fb021dd1270897720fdb969e424003968639e7d3effb22ff
polkit-devel-0.115-13.el8_5.2.x86_64.rpm
95b52462567c23a6fb021dd1270897720fdb969e424003968639e7d3effb22ff
polkit-docs-0.115-13.el8_5.2.noarch.rpm
07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653
polkit-docs-0.115-13.el8_5.2.noarch.rpm
07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653
polkit-docs-0.115-13.el8_5.2.noarch.rpm
07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653
polkit-docs-0.115-13.el8_5.2.noarch.rpm
07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653
polkit-docs-0.115-13.el8_5.2.noarch.rpm
07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653
polkit-docs-0.115-13.el8_5.2.noarch.rpm
07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653
polkit-libs-0.115-13.el8_5.2.i686.rpm
9fa8ede9492e1809d544f0874bf9740c95dc69e42b210da0866a2c9f1f575aed
polkit-libs-0.115-13.el8_5.2.i686.rpm
9fa8ede9492e1809d544f0874bf9740c95dc69e42b210da0866a2c9f1f575aed
polkit-libs-0.115-13.el8_5.2.i686.rpm
9fa8ede9492e1809d544f0874bf9740c95dc69e42b210da0866a2c9f1f575aed
polkit-libs-0.115-13.el8_5.2.x86_64.rpm
c05c27b9fe820d2fd9d0f9ebc047255ff79f825af58416538d0fec5e05862377
polkit-libs-0.115-13.el8_5.2.x86_64.rpm
c05c27b9fe820d2fd9d0f9ebc047255ff79f825af58416538d0fec5e05862377
polkit-libs-0.115-13.el8_5.2.x86_64.rpm
c05c27b9fe820d2fd9d0f9ebc047255ff79f825af58416538d0fec5e05862377
RLEA-2022:1954
perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLEA-2022:2014
RDMA stack bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
ibacm-37.2-1.el8.i686.rpm
564d0b63e24a66c0995fdb95374987a85dd4a18997cf2b9a3016cd367bf8c916
ibacm-37.2-1.el8.x86_64.rpm
79a02b0e034b8e64322c896a538b02aacf2d47ff234003ec338160ec5b146647
infiniband-diags-37.2-1.el8.i686.rpm
acb4b713c84352cb219122c4463882a0e9564047eb6e189a21a2b187810d85cc
infiniband-diags-37.2-1.el8.x86_64.rpm
5839f31a7103046644d801d5c6dac537a22a935e87b6ba7d7ab287608346af5c
iwpmd-37.2-1.el8.x86_64.rpm
0d8539a4920af9c7783a0765fd736d110fc32c3671bb47adfab4ff420f4e0f48
libfabric-1.14.0-1.el8.i686.rpm
ba2dcc92a7befbb8f84446fe0e1781f868a6ea46ca1c414397a8e232cd50e931
libfabric-1.14.0-1.el8.x86_64.rpm
50c9ca79bf551d669e31f3b6790cfe760efabaf20cad231bf3cc289ec7926fbb
libibumad-37.2-1.el8.i686.rpm
2f817a4f4a0b1af1ca36699604a0ee6618f9f40e4a8cc372e679d5e5df2e89be
libibumad-37.2-1.el8.x86_64.rpm
3a572ab5c5bf01eee7deec25467433a409ccfd49453a62cb4a491ea74d01ab3d
libibverbs-37.2-1.el8.i686.rpm
65a7da967ab4555372455db8f7251015185842447d2c829c22d7a063ff022b84
libibverbs-37.2-1.el8.x86_64.rpm
b03a8592692540c9e3e0711c47ae8dca2c9c3801c7be71a0cac356dd1bf69aa1
libibverbs-utils-37.2-1.el8.x86_64.rpm
16b5af856521510efde897c838719c77e5d1fa4722285a8f21d04366cb4423bf
libpsm2-11.2.206-1.el8.x86_64.rpm
fd41dd241b6df797440851404cae412b154222804103fcf7d4e0988429ce28a9
libpsm2-11.2.206-1.el8.x86_64.rpm
fd41dd241b6df797440851404cae412b154222804103fcf7d4e0988429ce28a9
libpsm2-compat-11.2.206-1.el8.x86_64.rpm
2b9771d3cc67724a4480c8bed54be247c0dd72440e7d68ad85752518bf504416
libpsm2-compat-11.2.206-1.el8.x86_64.rpm
2b9771d3cc67724a4480c8bed54be247c0dd72440e7d68ad85752518bf504416
librdmacm-37.2-1.el8.i686.rpm
14b2949cd14bc7fee45cbd1b7d41027e76db87334f7105d7dc3f199888f4bcfd
librdmacm-37.2-1.el8.x86_64.rpm
2e1203b136d9303c3aba287bf39523876d90c2770747d82a79bccae16dff6eb2
librdmacm-utils-37.2-1.el8.x86_64.rpm
b70d835182d9266518559d41617be4390199beea5415945be4b7711ab5318e24
perftest-4.5-12.el8.x86_64.rpm
9ed6fb66f98e8716a208a58fc6a7c48cc26acf962319aae6f68e336cd1f4e258
perftest-4.5-12.el8.x86_64.rpm
9ed6fb66f98e8716a208a58fc6a7c48cc26acf962319aae6f68e336cd1f4e258
python3-pyverbs-37.2-1.el8.x86_64.rpm
70c933cd14c0700ad50738b211cb0255bffb5c9b5c449708f75991f32a060600
rdma-core-37.2-1.el8.i686.rpm
8f0cf397b66fd3142504e6f9c3e56880e7e5e76d251ae747abf9a992c01fe7ef
rdma-core-37.2-1.el8.x86_64.rpm
c794e1fb9587f22b77fd245ddf52e5752cdaa71aea7d830f885e9ea7e62989f3
rdma-core-devel-37.2-1.el8.i686.rpm
5076a260bf983a7edcee6dd6cd5389944e90a9db413f9a4b67fec6144ab1312d
rdma-core-devel-37.2-1.el8.x86_64.rpm
ba877d9a6a575943a256fb22e6a62d41fe06616695c80294064d57f8863e3cd2
srp_daemon-37.2-1.el8.x86_64.rpm
d0f87306ac19b64c39810e6e653203892f54f36ddbebb4e6cdfbe88c7bef5bef
opa-address-resolution-10.11.0.2-1.el8.rocky.x86_64.rpm
6ad3c5b67707090e4c67a945e9fdddffb1e969587d0a9e8ab82fe20703ca43e9
opa-basic-tools-10.11.0.2-1.el8.rocky.x86_64.rpm
596755140a07d757e3eee7a08fc19c314d595621aee00f504bfcf2bfda34aab4
opa-fastfabric-10.11.0.2-1.el8.rocky.x86_64.rpm
9f15a49bc53dfc5fbb77e88c81e7d7791bc49a7d5fbf1484b798f0d292ec1033
opa-libopamgt-10.11.0.2-1.el8.rocky.x86_64.rpm
4385856c1532a15511aa806df87b7af10de2b5a1c852fef51d00d686c5a58f6c
RLEA-2022:1956
perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLSA-2022:1991
Moderate: cpio security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cpio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another.
Security Fix(es):
* cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file (CVE-2021-38185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
cpio-2.12-11.el8.x86_64.rpm
af69fa87dc89d44217a405f35f576fc71f60f932ce0b0f99710b743ab5a06e19
cpio-2.12-11.el8.x86_64.rpm
af69fa87dc89d44217a405f35f576fc71f60f932ce0b0f99710b743ab5a06e19
RLBA-2022:2023
net-snmp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
net-snmp-libs-5.8-25.el8.i686.rpm
aa2c7f4ae4e67fe8cdfa15dae34094371b1b7d6efcc575502f97268836158f41
net-snmp-libs-5.8-25.el8.i686.rpm
aa2c7f4ae4e67fe8cdfa15dae34094371b1b7d6efcc575502f97268836158f41
net-snmp-libs-5.8-25.el8.x86_64.rpm
4bfdd28a7b64e67372563781342f9858af6bb96e29a90102d1b6ef855fef7e59
net-snmp-libs-5.8-25.el8.x86_64.rpm
4bfdd28a7b64e67372563781342f9858af6bb96e29a90102d1b6ef855fef7e59
RLBA-2022:2027
json-c bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for json-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
json-c-0.13.1-3.el8.i686.rpm
31c4cf446bf10c3c6f57fecb9e4c0935a02b7b4d86dba37baaf66a49e0d81bdd
json-c-0.13.1-3.el8.i686.rpm
31c4cf446bf10c3c6f57fecb9e4c0935a02b7b4d86dba37baaf66a49e0d81bdd
json-c-0.13.1-3.el8.x86_64.rpm
2315a2997fb8083935184ff0ad4bcec36554629d48eacf65f255493227d5d78a
json-c-0.13.1-3.el8.x86_64.rpm
2315a2997fb8083935184ff0ad4bcec36554629d48eacf65f255493227d5d78a
RLEA-2022:2029
libseccomp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libseccomp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libseccomp-2.5.2-1.el8.i686.rpm
ef703036acabf85d6a27860386fabf71e182735392464bde84c03628400e4000
libseccomp-2.5.2-1.el8.i686.rpm
ef703036acabf85d6a27860386fabf71e182735392464bde84c03628400e4000
libseccomp-2.5.2-1.el8.x86_64.rpm
59a9e248457a1cb695706b17d59bcf7d9bf4e1d84b010c9f309aca2ad9b520a7
libseccomp-2.5.2-1.el8.x86_64.rpm
59a9e248457a1cb695706b17d59bcf7d9bf4e1d84b010c9f309aca2ad9b520a7
RLBA-2022:2041
openhpi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openhpi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
openhpi-3.8.0-10.el8.x86_64.rpm
92bce82eff0c437be15590550995aaaac6dbbcf2d927a743b708231ed7e39bf2
openhpi-3.8.0-10.el8.x86_64.rpm
92bce82eff0c437be15590550995aaaac6dbbcf2d927a743b708231ed7e39bf2
openhpi-libs-3.8.0-10.el8.i686.rpm
d79524f9a68fe789b91c39be14099c6f21df492dce355e690022152a63f4c0ab
openhpi-libs-3.8.0-10.el8.i686.rpm
d79524f9a68fe789b91c39be14099c6f21df492dce355e690022152a63f4c0ab
openhpi-libs-3.8.0-10.el8.x86_64.rpm
013d425e3f0a724df07ffa4108518f3e848c71ffd001fea56c1d1a9c3c68752e
openhpi-libs-3.8.0-10.el8.x86_64.rpm
013d425e3f0a724df07ffa4108518f3e848c71ffd001fea56c1d1a9c3c68752e
RLBA-2022:2044
crypto-policies bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crypto-policies.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm
83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9
crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm
83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9
crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm
83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9
crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm
83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9
crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm
aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183
crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm
aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183
crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm
aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183
crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm
aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183
RLBA-2022:2054
libffi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libffi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libffi-3.1-23.el8.i686.rpm
589661fa93049f729dc292988bfa112b4da645ec45ec74d76662a8940d4f739d
libffi-3.1-23.el8.i686.rpm
589661fa93049f729dc292988bfa112b4da645ec45ec74d76662a8940d4f739d
libffi-3.1-23.el8.x86_64.rpm
cb6a8d322dc6ffe55e467e38a3d44e36b90a46202cdce0ff5c3b43b571a0435d
libffi-3.1-23.el8.x86_64.rpm
cb6a8d322dc6ffe55e467e38a3d44e36b90a46202cdce0ff5c3b43b571a0435d
libffi-devel-3.1-23.el8.i686.rpm
7d63527394cdd2e7820d10e92568a38d50cc6e2fc068e45c913f0594fa1b01a4
libffi-devel-3.1-23.el8.i686.rpm
7d63527394cdd2e7820d10e92568a38d50cc6e2fc068e45c913f0594fa1b01a4
libffi-devel-3.1-23.el8.x86_64.rpm
3dc050043ce500c8e2c88c62b114680804074becf8b6762dfa6c740f45ba86db
libffi-devel-3.1-23.el8.x86_64.rpm
3dc050043ce500c8e2c88c62b114680804074becf8b6762dfa6c740f45ba86db
RLBA-2022:2060
kmod bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
kmod-25-19.el8.x86_64.rpm
993d53503b870d0520f04183c8642ba2435fbd78d0dd44fbae4b1d3c05416ef1
kmod-25-19.el8.x86_64.rpm
993d53503b870d0520f04183c8642ba2435fbd78d0dd44fbae4b1d3c05416ef1
kmod-libs-25-19.el8.i686.rpm
bc9d57005023432133f802befa78e3194ebd19bfed9eb515f5b9240f8b5fd27d
kmod-libs-25-19.el8.i686.rpm
bc9d57005023432133f802befa78e3194ebd19bfed9eb515f5b9240f8b5fd27d
kmod-libs-25-19.el8.x86_64.rpm
b89b400448003842e40d7252320ed56d1750d52ae846ac04090169e38fb0f654
kmod-libs-25-19.el8.x86_64.rpm
b89b400448003842e40d7252320ed56d1750d52ae846ac04090169e38fb0f654
RLBA-2022:2062
wpa_supplicant bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for wpa_supplicant.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
wpa_supplicant-2.10-1.el8.x86_64.rpm
b977eeb1c8f154074885ef1b0619e78e1c983297a8e4b54f5c9a43c065235cd8
wpa_supplicant-2.10-1.el8.x86_64.rpm
b977eeb1c8f154074885ef1b0619e78e1c983297a8e4b54f5c9a43c065235cd8
RLBA-2022:2080
sudo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sudo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
sudo-1.8.29-8.el8.x86_64.rpm
f1522f7aa2ff37703c155ad8d9294e852c26b3b7850826c5b425a19005ce003f
sudo-1.8.29-8.el8.x86_64.rpm
f1522f7aa2ff37703c155ad8d9294e852c26b3b7850826c5b425a19005ce003f
RLBA-2022:2098
unzip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
unzip-6.0-46.el8.x86_64.rpm
78baf2fdbfeb4c02602777e90332b30bfb48e5d0ec9909f32636f112e3b387a8
unzip-6.0-46.el8.x86_64.rpm
78baf2fdbfeb4c02602777e90332b30bfb48e5d0ec9909f32636f112e3b387a8
RLBA-2022:2111
ksc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ksc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
ksc-1.9-2.el8.noarch.rpm
62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96
ksc-1.9-2.el8.noarch.rpm
62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96
ksc-1.9-2.el8.noarch.rpm
62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96
ksc-1.9-2.el8.noarch.rpm
62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96
RLEA-2022:1869
new module: perl:5.32
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471)
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLBA-2022:1994
libqmi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libqmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libqmi-utils-1.30.2-1.el8.x86_64.rpm
eecd04407c5d1586949310e632fd73d087314f69bc51647feb8e98632456e6f3
libqmi-utils-1.30.2-1.el8.x86_64.rpm
eecd04407c5d1586949310e632fd73d087314f69bc51647feb8e98632456e6f3
libqmi-1.30.2-1.el8.i686.rpm
38bc21af822e3ad6529fed0c33c6928a7cd338b0df91ee2f8603c7e812dfe503
libqmi-1.30.2-1.el8.i686.rpm
38bc21af822e3ad6529fed0c33c6928a7cd338b0df91ee2f8603c7e812dfe503
libqmi-1.30.2-1.el8.x86_64.rpm
08e634c829db38d7046203c675cbb312cf10d415c307fb25cdb368cfa575a524
libqmi-1.30.2-1.el8.x86_64.rpm
08e634c829db38d7046203c675cbb312cf10d415c307fb25cdb368cfa575a524
RLBA-2022:2073
numatop bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numatop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
numatop-2.2-1.el8.x86_64.rpm
27551e647791ad0d2489198c889fbcaf0ac7647cf912e6a9f102f3aa68fedd5e
numatop-2.2-1.el8.x86_64.rpm
27551e647791ad0d2489198c889fbcaf0ac7647cf912e6a9f102f3aa68fedd5e
RLBA-2022:2099
sysfsutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sysfsutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libsysfs-2.1.0-25.el8.x86_64.rpm
60f8b824cc526cb9467e6ff2ac668fc69699f47fb864299746ca598c28f6bcc1
libsysfs-2.1.0-25.el8.x86_64.rpm
60f8b824cc526cb9467e6ff2ac668fc69699f47fb864299746ca598c28f6bcc1
libsysfs-2.1.0-25.el8.i686.rpm
4329dde4c5481ef5df36408a09e7d0da3dc2a68fad25011ed7a65300058c5ba1
libsysfs-2.1.0-25.el8.i686.rpm
4329dde4c5481ef5df36408a09e7d0da3dc2a68fad25011ed7a65300058c5ba1
RLBA-2022:2009
ModemManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ModemManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
ModemManager-1.18.2-1.el8.x86_64.rpm
2c0e215653ed6a1a318702d5db010edaa432bdd3dc844979482f54d0422f0252
ModemManager-1.18.2-1.el8.x86_64.rpm
2c0e215653ed6a1a318702d5db010edaa432bdd3dc844979482f54d0422f0252
ModemManager-glib-1.18.2-1.el8.i686.rpm
c730d6b7e6c43e4f4d473b2d77eef2c251626ce80858bb59241c7cd4b38a1552
ModemManager-glib-1.18.2-1.el8.i686.rpm
c730d6b7e6c43e4f4d473b2d77eef2c251626ce80858bb59241c7cd4b38a1552
ModemManager-glib-1.18.2-1.el8.x86_64.rpm
27d9fc6e5ebfb8375f67449526d5079da7e1d147f87c16cf2bc283cac45d75cc
ModemManager-glib-1.18.2-1.el8.x86_64.rpm
27d9fc6e5ebfb8375f67449526d5079da7e1d147f87c16cf2bc283cac45d75cc
RLEA-2022:1955
perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4)
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
perl-DBD-SQLite-1.58-2.el8.x86_64.rpm
bf965a0b1b62ed5a065e7c42902ec7b08ef657045d60299cb7b2f0a6ba3f70ef
RLBA-2022:2018
perl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
perl-IO-Zlib-1.10-421.el8.noarch.rpm
087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25
perl-IO-Zlib-1.10-421.el8.noarch.rpm
087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25
perl-Errno-1.28-421.el8.x86_64.rpm
cc31824dcec356f8675324cad83e2f265a265c1e2be885cab73159ca09875efe
perl-Errno-1.28-421.el8.x86_64.rpm
cc31824dcec356f8675324cad83e2f265a265c1e2be885cab73159ca09875efe
perl-interpreter-5.26.3-421.el8.x86_64.rpm
bec31df2f08af18c21be0bd60119711e92ad116daa251d14d4945c19649c1a50
perl-interpreter-5.26.3-421.el8.x86_64.rpm
bec31df2f08af18c21be0bd60119711e92ad116daa251d14d4945c19649c1a50
perl-IO-1.38-421.el8.x86_64.rpm
bdd888c432876372ed76a6fb19bd6e65585a0be386e6ff3bc39de62b028224e2
perl-IO-1.38-421.el8.x86_64.rpm
bdd888c432876372ed76a6fb19bd6e65585a0be386e6ff3bc39de62b028224e2
perl-IO-Zlib-1.10-421.el8.noarch.rpm
087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25
perl-IO-Zlib-1.10-421.el8.noarch.rpm
087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25
perl-libs-5.26.3-421.el8.i686.rpm
a3760b863efe54f3d209ae13a290047101cf63c92a05623bb1210e319cd96dcd
perl-libs-5.26.3-421.el8.i686.rpm
a3760b863efe54f3d209ae13a290047101cf63c92a05623bb1210e319cd96dcd
perl-libs-5.26.3-421.el8.x86_64.rpm
4fe3aa630aa6c83402982a90c8f7373249d1c7566042bd52839855a138c90d1d
perl-libs-5.26.3-421.el8.x86_64.rpm
4fe3aa630aa6c83402982a90c8f7373249d1c7566042bd52839855a138c90d1d
perl-macros-5.26.3-421.el8.x86_64.rpm
eafebd6e2eeb0cf52b78a258740686d284a545385477a65decfee06280fdf6c4
perl-macros-5.26.3-421.el8.x86_64.rpm
eafebd6e2eeb0cf52b78a258740686d284a545385477a65decfee06280fdf6c4
perl-Math-Complex-1.59-421.el8.noarch.rpm
8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a
perl-Math-Complex-1.59-421.el8.noarch.rpm
8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a
perl-Math-Complex-1.59-421.el8.noarch.rpm
8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a
perl-Math-Complex-1.59-421.el8.noarch.rpm
8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a
RLSA-2022:2043
Moderate: c-ares security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
c-ares-1.13.0-6.el8.i686.rpm
f2462c40ff2d749c72557802c6760ef8674261e2654d09c955025f816cd0f108
c-ares-1.13.0-6.el8.i686.rpm
f2462c40ff2d749c72557802c6760ef8674261e2654d09c955025f816cd0f108
c-ares-1.13.0-6.el8.x86_64.rpm
b20639806dc6c4f8e1dfe4a820dc5e23fd7c5dc5219fa081084495a52b7a0be5
c-ares-1.13.0-6.el8.x86_64.rpm
b20639806dc6c4f8e1dfe4a820dc5e23fd7c5dc5219fa081084495a52b7a0be5
c-ares-devel-1.13.0-6.el8.i686.rpm
28bb9421204802cf09ada9ceadb7cf1ef64100b5f5a519e56e31afd5667819dd
c-ares-devel-1.13.0-6.el8.i686.rpm
28bb9421204802cf09ada9ceadb7cf1ef64100b5f5a519e56e31afd5667819dd
c-ares-devel-1.13.0-6.el8.x86_64.rpm
1aa23786260a27810c9036cafaa63db30daf1a6173224e7c62c7187887fe7b87
c-ares-devel-1.13.0-6.el8.x86_64.rpm
1aa23786260a27810c9036cafaa63db30daf1a6173224e7c62c7187887fe7b87
RLEA-2022:1990
rasdaemon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
rasdaemon-0.6.1-12.el8.x86_64.rpm
12138e320f634bf5e6e484d88efe399b480d86910cd2afb932d63c4d901a9053
rasdaemon-0.6.1-12.el8.x86_64.rpm
12138e320f634bf5e6e484d88efe399b480d86910cd2afb932d63c4d901a9053
RLBA-2022:1996
sed bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sed.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
sed-4.5-5.el8.x86_64.rpm
c2cb6b22bd39a3579cfb66473246c707e3a8e390c76da085ac10102cd4b8d2dc
sed-4.5-5.el8.x86_64.rpm
c2cb6b22bd39a3579cfb66473246c707e3a8e390c76da085ac10102cd4b8d2dc
RLBA-2022:1997
libmbim bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmbim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libmbim-1.26.0-2.el8.i686.rpm
5b82274ffcaaf4207a0dca9744f5eeaf1d916d4312c7af68220516c04b3718f5
libmbim-1.26.0-2.el8.i686.rpm
5b82274ffcaaf4207a0dca9744f5eeaf1d916d4312c7af68220516c04b3718f5
libmbim-1.26.0-2.el8.x86_64.rpm
f92083fa1b48fe3753fbef2b280efe6446507abf8135d02adef403a53db54b30
libmbim-1.26.0-2.el8.x86_64.rpm
f92083fa1b48fe3753fbef2b280efe6446507abf8135d02adef403a53db54b30
libmbim-utils-1.26.0-2.el8.x86_64.rpm
1fb547ae3076fbafb6570f1e86d575da61e2fb6132665ac5e63e6b9989bbb9e9
libmbim-utils-1.26.0-2.el8.x86_64.rpm
1fb547ae3076fbafb6570f1e86d575da61e2fb6132665ac5e63e6b9989bbb9e9
RLBA-2022:1999
trace-cmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for trace-cmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
trace-cmd-2.7-10.el8.x86_64.rpm
faf2e0428b492c12598c0f6528bd1072645dbb9f6f80b42b8ec48c8b8c3b11e7
trace-cmd-2.7-10.el8.x86_64.rpm
faf2e0428b492c12598c0f6528bd1072645dbb9f6f80b42b8ec48c8b8c3b11e7
RLBA-2022:2015
make bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
make-4.2.1-11.el8.x86_64.rpm
4395686eb6662d9ce01e699cb55f34911f41fe6168437d47dc2c6f7738facb82
make-4.2.1-11.el8.x86_64.rpm
4395686eb6662d9ce01e699cb55f34911f41fe6168437d47dc2c6f7738facb82
make-devel-4.2.1-11.el8.i686.rpm
a21ff7185593b54804356f1b9a8528a5459853f979cfe240a4630a448c1db012
make-devel-4.2.1-11.el8.i686.rpm
a21ff7185593b54804356f1b9a8528a5459853f979cfe240a4630a448c1db012
make-devel-4.2.1-11.el8.x86_64.rpm
4f67f87f7511d41bbd19656c77a42dc82f3c983194cb29cc230d10a394e83dfb
make-devel-4.2.1-11.el8.x86_64.rpm
4f67f87f7511d41bbd19656c77a42dc82f3c983194cb29cc230d10a394e83dfb
RLBA-2022:2024
ps_mem bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ps_mem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
ps_mem-3.6-9.el8.noarch.rpm
056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d
ps_mem-3.6-9.el8.noarch.rpm
056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d
ps_mem-3.6-9.el8.noarch.rpm
056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d
ps_mem-3.6-9.el8.noarch.rpm
056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d
RLSA-2022:2031
Low: libssh security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651)
Security Fix(es):
* libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libssh-0.9.6-3.el8.i686.rpm
6abfed31ca14f08e2806d4e8a089e284275d541df845fbd6ad2c286fc2e53df6
libssh-0.9.6-3.el8.i686.rpm
6abfed31ca14f08e2806d4e8a089e284275d541df845fbd6ad2c286fc2e53df6
libssh-0.9.6-3.el8.x86_64.rpm
edb9aa143d9ce74fde8721bb52d1070cb15624d5dc37d8c4fcb1b3ae79f90cf9
libssh-0.9.6-3.el8.x86_64.rpm
edb9aa143d9ce74fde8721bb52d1070cb15624d5dc37d8c4fcb1b3ae79f90cf9
libssh-config-0.9.6-3.el8.noarch.rpm
24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549
libssh-config-0.9.6-3.el8.noarch.rpm
24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549
libssh-config-0.9.6-3.el8.noarch.rpm
24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549
libssh-config-0.9.6-3.el8.noarch.rpm
24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549
RLBA-2022:2034
dmidecode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
dmidecode-3.3-4.el8.x86_64.rpm
869937572d5563035b81c2b8f066a9d95d87c75ef86ccfa0c3c760f517497730
dmidecode-3.3-4.el8.x86_64.rpm
869937572d5563035b81c2b8f066a9d95d87c75ef86ccfa0c3c760f517497730
RLBA-2022:2035
libstoragemgmt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libstoragemgmt-1.9.1-3.el8.i686.rpm
670ead7531197f822cff223d409923c3a2081d758fb349672e31280a7d739406
libstoragemgmt-1.9.1-3.el8.i686.rpm
670ead7531197f822cff223d409923c3a2081d758fb349672e31280a7d739406
libstoragemgmt-1.9.1-3.el8.x86_64.rpm
6e116afef1c670aac97eea6f6e23f462f8fc46a1aeb7ea7e38e881686a9f7cc0
libstoragemgmt-1.9.1-3.el8.x86_64.rpm
6e116afef1c670aac97eea6f6e23f462f8fc46a1aeb7ea7e38e881686a9f7cc0
libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm
4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf
libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm
4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf
libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm
4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf
libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm
4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf
libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm
3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559
libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm
3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559
libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm
3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559
libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm
3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559
libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm
d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23
libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm
d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23
libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm
d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23
libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm
d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23
libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm
59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2
libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm
59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2
libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm
59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2
libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm
59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2
libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm
9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb
libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm
9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb
libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm
9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb
libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm
9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb
libstoragemgmt-udev-1.9.1-3.el8.x86_64.rpm
e42d6a4c33400b418ba52191ac5bc83b32f84df1453f0d2d7d8d67c4cdccc42d
libstoragemgmt-udev-1.9.1-3.el8.x86_64.rpm
e42d6a4c33400b418ba52191ac5bc83b32f84df1453f0d2d7d8d67c4cdccc42d
python3-libstoragemgmt-1.9.1-3.el8.i686.rpm
5e822e0beb1afb4bdaa25b59f8bb5e643ca94d2883bcc75ebbdd95120e7eb21d
python3-libstoragemgmt-1.9.1-3.el8.i686.rpm
5e822e0beb1afb4bdaa25b59f8bb5e643ca94d2883bcc75ebbdd95120e7eb21d
python3-libstoragemgmt-1.9.1-3.el8.x86_64.rpm
597dac643cc3f9a8e2bc1ee0abf20d2f51c855be4be37239879428a62b6a981d
python3-libstoragemgmt-1.9.1-3.el8.x86_64.rpm
597dac643cc3f9a8e2bc1ee0abf20d2f51c855be4be37239879428a62b6a981d
RLBA-2022:2040
libuser bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libuser.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libuser-0.62-24.el8.i686.rpm
d32ef741ba14b9e57ebc240cd5269016cb9d68ed699795ad72622a77f7ec7e95
libuser-0.62-24.el8.i686.rpm
d32ef741ba14b9e57ebc240cd5269016cb9d68ed699795ad72622a77f7ec7e95
libuser-0.62-24.el8.x86_64.rpm
0b823bb3ef2134dd65c637f59f19a4450493608944d6a134134d300ca3091518
libuser-0.62-24.el8.x86_64.rpm
0b823bb3ef2134dd65c637f59f19a4450493608944d6a134134d300ca3091518
python3-libuser-0.62-24.el8.x86_64.rpm
6da85d54ab4e8585e00ee6c75aac5c76e11102e1ef661ac2ebcbf91a13c349b0
python3-libuser-0.62-24.el8.x86_64.rpm
6da85d54ab4e8585e00ee6c75aac5c76e11102e1ef661ac2ebcbf91a13c349b0
RLBA-2022:2046
libcomps bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcomps.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libcomps-0.1.18-1.el8.i686.rpm
5cf5d38bd22a62c5c0213bdad1dc134656d99eb838890151b80143df400fdf9c
libcomps-0.1.18-1.el8.i686.rpm
5cf5d38bd22a62c5c0213bdad1dc134656d99eb838890151b80143df400fdf9c
libcomps-0.1.18-1.el8.x86_64.rpm
1f30b68b60b65cad2a49710f181f736cf3b430ea77737c7f44bd3a6f871a012c
libcomps-0.1.18-1.el8.x86_64.rpm
1f30b68b60b65cad2a49710f181f736cf3b430ea77737c7f44bd3a6f871a012c
python3-libcomps-0.1.18-1.el8.x86_64.rpm
370c4134cbb63e2f60d8f893e6f5b432d165efff8d142eaef11d0dfed6410259
python3-libcomps-0.1.18-1.el8.x86_64.rpm
370c4134cbb63e2f60d8f893e6f5b432d165efff8d142eaef11d0dfed6410259
RLBA-2022:2061
jansson bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for jansson.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
jansson-2.14-1.el8.i686.rpm
41a21f0a0134cd730d016c13f88da7ca084e9db19f577a7b5d0f327e97218b0a
jansson-2.14-1.el8.i686.rpm
41a21f0a0134cd730d016c13f88da7ca084e9db19f577a7b5d0f327e97218b0a
jansson-2.14-1.el8.x86_64.rpm
ec4abca99b96acd29c05cb39c5eb15c7e01827c5e8aeda51f24bc8f93869cd20
jansson-2.14-1.el8.x86_64.rpm
ec4abca99b96acd29c05cb39c5eb15c7e01827c5e8aeda51f24bc8f93869cd20
RLBA-2022:2064
python-linux-procfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-linux-procfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
python3-linux-procfs-0.7.0-1.el8.noarch.rpm
4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4
python3-linux-procfs-0.7.0-1.el8.noarch.rpm
4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4
python3-linux-procfs-0.7.0-1.el8.noarch.rpm
4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4
python3-linux-procfs-0.7.0-1.el8.noarch.rpm
4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4
RLBA-2022:2063
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
firewalld-0.9.3-13.el8.noarch.rpm
94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8
firewalld-0.9.3-13.el8.noarch.rpm
94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8
firewalld-0.9.3-13.el8.noarch.rpm
94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8
firewalld-0.9.3-13.el8.noarch.rpm
94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8
firewalld-filesystem-0.9.3-13.el8.noarch.rpm
9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0
firewalld-filesystem-0.9.3-13.el8.noarch.rpm
9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0
firewalld-filesystem-0.9.3-13.el8.noarch.rpm
9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0
firewalld-filesystem-0.9.3-13.el8.noarch.rpm
9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0
python3-firewall-0.9.3-13.el8.noarch.rpm
c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5
python3-firewall-0.9.3-13.el8.noarch.rpm
c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5
python3-firewall-0.9.3-13.el8.noarch.rpm
c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5
python3-firewall-0.9.3-13.el8.noarch.rpm
c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5
RLBA-2022:2078
xfsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
xfsprogs-5.0.0-10.el8.i686.rpm
5c1bb425fcdb7da47bbe80ae44283c7c117fb09c2e9f03588a82980e1513df03
xfsprogs-5.0.0-10.el8.i686.rpm
5c1bb425fcdb7da47bbe80ae44283c7c117fb09c2e9f03588a82980e1513df03
xfsprogs-5.0.0-10.el8.x86_64.rpm
7388b2eeaff6394491d86ee0437dee3d5bafba18a1c8a16746fe0fbedfa044a7
xfsprogs-5.0.0-10.el8.x86_64.rpm
7388b2eeaff6394491d86ee0437dee3d5bafba18a1c8a16746fe0fbedfa044a7
xfsprogs-devel-5.0.0-10.el8.i686.rpm
c56e186eae1ef51decf70f4463a71daf83652d3d4d49444ec18388ac96c4e5f5
xfsprogs-devel-5.0.0-10.el8.i686.rpm
c56e186eae1ef51decf70f4463a71daf83652d3d4d49444ec18388ac96c4e5f5
xfsprogs-devel-5.0.0-10.el8.x86_64.rpm
cbdba1a641ea361706fd28907e65cf4b332ab79c9e42ebae3f4b3a1e1b29deb0
xfsprogs-devel-5.0.0-10.el8.x86_64.rpm
cbdba1a641ea361706fd28907e65cf4b332ab79c9e42ebae3f4b3a1e1b29deb0
RLBA-2022:2079
setools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
python3-setools-4.3.0-3.el8.x86_64.rpm
e84dc85b119f8efec0b501e1896cc60034d3bd42cd0ef338e91fc171098d791b
python3-setools-4.3.0-3.el8.x86_64.rpm
e84dc85b119f8efec0b501e1896cc60034d3bd42cd0ef338e91fc171098d791b
setools-console-4.3.0-3.el8.x86_64.rpm
b7718d0a442b5723a67b843658617260d0aa2e006d025b9b64599384be6c9a12
setools-console-4.3.0-3.el8.x86_64.rpm
b7718d0a442b5723a67b843658617260d0aa2e006d025b9b64599384be6c9a12
RLBA-2022:2088
realmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for realmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
realmd-0.16.3-25.el8.x86_64.rpm
be9e94b0434768dbde4ad1b515ac3372f1ad61dba6d72daf933e24608c849f17
realmd-0.16.3-25.el8.x86_64.rpm
be9e94b0434768dbde4ad1b515ac3372f1ad61dba6d72daf933e24608c849f17
RLBA-2022:2089
pcsc-lite bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcsc-lite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
pcsc-lite-1.9.5-1.el8.x86_64.rpm
974a99a1f82e704f3bd74acc31597aab59b4baf577ac26a303809397b0e9d650
pcsc-lite-1.9.5-1.el8.x86_64.rpm
974a99a1f82e704f3bd74acc31597aab59b4baf577ac26a303809397b0e9d650
pcsc-lite-doc-1.9.5-1.el8.noarch.rpm
45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1
pcsc-lite-doc-1.9.5-1.el8.noarch.rpm
45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1
pcsc-lite-doc-1.9.5-1.el8.noarch.rpm
45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1
pcsc-lite-doc-1.9.5-1.el8.noarch.rpm
45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1
pcsc-lite-libs-1.9.5-1.el8.i686.rpm
3296cfbbfb60243f163d3d101bcaa9778c37a8fe829bf32b21b98505a9223297
pcsc-lite-libs-1.9.5-1.el8.i686.rpm
3296cfbbfb60243f163d3d101bcaa9778c37a8fe829bf32b21b98505a9223297
pcsc-lite-libs-1.9.5-1.el8.x86_64.rpm
4aca2f42fc7a5b25551773fd7980a84532f266d78fe51e7d4cf21d679efa7c9c
pcsc-lite-libs-1.9.5-1.el8.x86_64.rpm
4aca2f42fc7a5b25551773fd7980a84532f266d78fe51e7d4cf21d679efa7c9c
RLBA-2022:2091
postfix bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postfix.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
postfix-3.5.8-4.el8.x86_64.rpm
f3b882060764a7a390827c851321d15870b7bc5c1e43724c4b88fb821c3e6896
postfix-3.5.8-4.el8.x86_64.rpm
f3b882060764a7a390827c851321d15870b7bc5c1e43724c4b88fb821c3e6896
RLBA-2022:2095
python-ethtool bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-ethtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
python3-ethtool-0.14-5.el8.x86_64.rpm
e5ee50deedd5f4b6732eb3c6dc748d53bbc75884113c1d6068a3d64466baf116
python3-ethtool-0.14-5.el8.x86_64.rpm
e5ee50deedd5f4b6732eb3c6dc748d53bbc75884113c1d6068a3d64466baf116
RLBA-2022:2097
cryptsetup bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cryptsetup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
cryptsetup-2.3.7-2.el8.x86_64.rpm
b3909ed466ac218d9c4e80570cb4e900d61840f90f9fd6874a3fa0a532064bb0
cryptsetup-2.3.7-2.el8.x86_64.rpm
b3909ed466ac218d9c4e80570cb4e900d61840f90f9fd6874a3fa0a532064bb0
cryptsetup-libs-2.3.7-2.el8.i686.rpm
abecb45d1f48e4973abe92fb52016ace772289e11ff71cb5cc70c0d9ecf32cc5
cryptsetup-libs-2.3.7-2.el8.i686.rpm
abecb45d1f48e4973abe92fb52016ace772289e11ff71cb5cc70c0d9ecf32cc5
cryptsetup-libs-2.3.7-2.el8.x86_64.rpm
f461ebe920b723756e580229360ed3f5eef77da45f6c5b817fbd6ef30ab87f35
cryptsetup-libs-2.3.7-2.el8.x86_64.rpm
f461ebe920b723756e580229360ed3f5eef77da45f6c5b817fbd6ef30ab87f35
cryptsetup-reencrypt-2.3.7-2.el8.x86_64.rpm
0ecf9e197e1984baca628627ffcfb00703b5ba704619a1afa38830d6fd375c3d
cryptsetup-reencrypt-2.3.7-2.el8.x86_64.rpm
0ecf9e197e1984baca628627ffcfb00703b5ba704619a1afa38830d6fd375c3d
integritysetup-2.3.7-2.el8.x86_64.rpm
a574990faacfb486ca4e122658fe5f1fbb1a0707bf9cf09b384d8acc6455a289
integritysetup-2.3.7-2.el8.x86_64.rpm
a574990faacfb486ca4e122658fe5f1fbb1a0707bf9cf09b384d8acc6455a289
veritysetup-2.3.7-2.el8.x86_64.rpm
8dd7bd38f9300f6a8c70df10f87094881f64e89b61513106bcb43b7c2cc81577
veritysetup-2.3.7-2.el8.x86_64.rpm
8dd7bd38f9300f6a8c70df10f87094881f64e89b61513106bcb43b7c2cc81577
RLBA-2022:2101
libnftnl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnftnl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libnftnl-1.1.5-5.el8.i686.rpm
42c41e629fdbcf001a1e8b5643d039bca321d265b7a8a0861259eb91d0fdd224
libnftnl-1.1.5-5.el8.i686.rpm
42c41e629fdbcf001a1e8b5643d039bca321d265b7a8a0861259eb91d0fdd224
libnftnl-1.1.5-5.el8.x86_64.rpm
6fb0df4498141297072db544857dc8e2602602ddc22bcfd70d4cc7b024954e1e
libnftnl-1.1.5-5.el8.x86_64.rpm
6fb0df4498141297072db544857dc8e2602602ddc22bcfd70d4cc7b024954e1e
RLBA-2022:2108
man-pages bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for man-pages.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
man-pages-4.15-7.el8.x86_64.rpm
a35a10d59443e40f372c23080debd9bcba27a121aa0c451269ef90c20ce7c919
man-pages-4.15-7.el8.x86_64.rpm
a35a10d59443e40f372c23080debd9bcba27a121aa0c451269ef90c20ce7c919
RLBA-2022:2114
passwd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for passwd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
passwd-0.80-4.el8.x86_64.rpm
3a1cc71df31d247a8b30cdb8d67fac9662872a18bd2fc35b5e47c19c4d247b6c
passwd-0.80-4.el8.x86_64.rpm
3a1cc71df31d247a8b30cdb8d67fac9662872a18bd2fc35b5e47c19c4d247b6c
RLBA-2022:2115
xfsdump bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
xfsdump-3.1.8-4.el8.x86_64.rpm
9623db8bb5775351203aad158feae2e5d782ae3334b3def7e05aeee0bcd31376
xfsdump-3.1.8-4.el8.x86_64.rpm
9623db8bb5775351203aad158feae2e5d782ae3334b3def7e05aeee0bcd31376
RLBA-2022:2116
iotop bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iotop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
iotop-0.6-17.el8.noarch.rpm
d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c
iotop-0.6-17.el8.noarch.rpm
d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c
iotop-0.6-17.el8.noarch.rpm
d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c
iotop-0.6-17.el8.noarch.rpm
d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c
RLBA-2022:2117
gpgme bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpgme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
gpgme-1.13.1-11.el8.i686.rpm
efc465975520238bfce116e1420c9f1e940f8a7c1a1bebd09855581e56b71701
gpgme-1.13.1-11.el8.i686.rpm
efc465975520238bfce116e1420c9f1e940f8a7c1a1bebd09855581e56b71701
gpgme-1.13.1-11.el8.x86_64.rpm
11fdb5b8e04134f2210b500f145045a539cc5ad41c0723d4db6fb4c9c680abcb
gpgme-1.13.1-11.el8.x86_64.rpm
11fdb5b8e04134f2210b500f145045a539cc5ad41c0723d4db6fb4c9c680abcb
gpgmepp-1.13.1-11.el8.i686.rpm
c00d9fb3a9751ea0b14710250f27a8a49b1400b346baa45dadf262329c90f6bb
gpgmepp-1.13.1-11.el8.i686.rpm
c00d9fb3a9751ea0b14710250f27a8a49b1400b346baa45dadf262329c90f6bb
gpgmepp-1.13.1-11.el8.x86_64.rpm
d91a46e5c7334733b8f14167f7cdd1ff8134a0fd3fa0714422b0cd3f853eb822
gpgmepp-1.13.1-11.el8.x86_64.rpm
d91a46e5c7334733b8f14167f7cdd1ff8134a0fd3fa0714422b0cd3f853eb822
python3-gpg-1.13.1-11.el8.x86_64.rpm
73263b50db0e92731cbde2df8d2f25133768e83cab55ddd3dad553a956f16c14
python3-gpg-1.13.1-11.el8.x86_64.rpm
73263b50db0e92731cbde2df8d2f25133768e83cab55ddd3dad553a956f16c14
RLBA-2022:2118
texinfo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for texinfo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
info-6.5-7.el8.x86_64.rpm
c265d03dabac183ae107c4b597a36776ae2a551a55d8a0db360b82e671f415f9
info-6.5-7.el8.x86_64.rpm
c265d03dabac183ae107c4b597a36776ae2a551a55d8a0db360b82e671f415f9
RLBA-2022:2122
gawk bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gawk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
gawk-4.2.1-4.el8.x86_64.rpm
d5bccd4f32a6d4f636edbebd6f1b6ca1db6e1f39f64daa86b2420f7d4cfde3db
gawk-4.2.1-4.el8.x86_64.rpm
d5bccd4f32a6d4f636edbebd6f1b6ca1db6e1f39f64daa86b2420f7d4cfde3db
RLSA-2022:4991
Important: xz security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for xz.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
xz-5.2.4-4.el8_6.x86_64.rpm
d9d31369563ebeb477fe0d66ebd23afee0699de3e75e36fb818627602bc0aec4
xz-5.2.4-4.el8_6.x86_64.rpm
d9d31369563ebeb477fe0d66ebd23afee0699de3e75e36fb818627602bc0aec4
xz-devel-5.2.4-4.el8_6.i686.rpm
34732ae3f245befd38cfe8d97487feb318c665708c18071d4c17975a852581ac
xz-devel-5.2.4-4.el8_6.i686.rpm
34732ae3f245befd38cfe8d97487feb318c665708c18071d4c17975a852581ac
xz-devel-5.2.4-4.el8_6.x86_64.rpm
036eb5ff9a127bec82b64e921acf7652568a9c844280ac383355fef6a9757e39
xz-devel-5.2.4-4.el8_6.x86_64.rpm
036eb5ff9a127bec82b64e921acf7652568a9c844280ac383355fef6a9757e39
xz-libs-5.2.4-4.el8_6.i686.rpm
9188d1878a514b8992a24fec086a8092a5c67475bbd3d6e6aa7b2ba22448ae24
xz-libs-5.2.4-4.el8_6.i686.rpm
9188d1878a514b8992a24fec086a8092a5c67475bbd3d6e6aa7b2ba22448ae24
xz-libs-5.2.4-4.el8_6.x86_64.rpm
283e7ac93ffee0cb93f33a991a9ab9f06a272caf88a6c56d17696ab1b2e83499
xz-libs-5.2.4-4.el8_6.x86_64.rpm
283e7ac93ffee0cb93f33a991a9ab9f06a272caf88a6c56d17696ab1b2e83499
RLSA-2022:5095
Important: grub2, mokutil, shim, and shim-unsigned-x64 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for grub2, shim, shim-unsigned-x64, mokutil.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733)
* grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695)
* grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696)
* grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697)
* grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734)
* grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735)
* grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736)
* shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
grub2-common-2.02-123.el8_6.8.noarch.rpm
0c03130165f4b81b788581992de733ebd6a27bdda777a81a240e6adbeb748b00
grub2-common-2.02-123.el8_6.8.noarch.rpm
0c03130165f4b81b788581992de733ebd6a27bdda777a81a240e6adbeb748b00
grub2-efi-aa64-modules-2.02-123.el8_6.8.noarch.rpm
97bd050b6df2b3b1376b5f9c393bcb6279fbe75455f1d0afa65e281a229cd820
grub2-efi-aa64-modules-2.02-123.el8_6.8.noarch.rpm
97bd050b6df2b3b1376b5f9c393bcb6279fbe75455f1d0afa65e281a229cd820
grub2-efi-ia32-2.02-123.el8_6.8.x86_64.rpm
2583bd08499cc66be587d835a3b280f6e6f0d6c404a53482e9c16d24c3f629b1
grub2-efi-ia32-cdboot-2.02-123.el8_6.8.x86_64.rpm
bac45243eea731f836aa237dffa7086f8ec3995b0f28f90291252ed0c2ea0c90
grub2-efi-ia32-modules-2.02-123.el8_6.8.noarch.rpm
4b9cc1c9be65a8ed472f2f9832ab93ee16406a5b6e1cb238731b6a8f38aadf61
grub2-efi-ia32-modules-2.02-123.el8_6.8.noarch.rpm
4b9cc1c9be65a8ed472f2f9832ab93ee16406a5b6e1cb238731b6a8f38aadf61
grub2-efi-x64-2.02-123.el8_6.8.x86_64.rpm
826e9d66e31709b1dab04fb46f23f569359d9ab505e0ed1a32536c047152153b
grub2-efi-x64-cdboot-2.02-123.el8_6.8.x86_64.rpm
8b0cbfa7e168cbdbcd4347efa4ba0f10bad1180438ddbe4228aea33b56fa63d7
grub2-efi-x64-modules-2.02-123.el8_6.8.noarch.rpm
7a7aac189164563a15cece09511659e5da1e4035a9ddc4422b13b907b4072182
grub2-efi-x64-modules-2.02-123.el8_6.8.noarch.rpm
7a7aac189164563a15cece09511659e5da1e4035a9ddc4422b13b907b4072182
grub2-pc-2.02-123.el8_6.8.x86_64.rpm
e06dc18c6c87acb9a46f3b2fd7d237bc5668c87c177fb8b1e149b992f2150f9b
grub2-pc-modules-2.02-123.el8_6.8.noarch.rpm
e4c961eed1f4284a500bbda6430787def542af99e84dd64150746316053786e1
grub2-pc-modules-2.02-123.el8_6.8.noarch.rpm
e4c961eed1f4284a500bbda6430787def542af99e84dd64150746316053786e1
grub2-tools-2.02-123.el8_6.8.x86_64.rpm
ba6624595797ae0773e6fb144ed5b9659ff801e3ce0953a4ab94b4aebdc438ea
grub2-tools-efi-2.02-123.el8_6.8.x86_64.rpm
9b8e7bad7f688342faf70962f170fb25de65099bf05677ff65eae876cec84ea4
grub2-tools-extra-2.02-123.el8_6.8.x86_64.rpm
d81a9a5f05057e02ed01b423e9367f3c27e74ce4907a8ee44fc3b0c8e94752ab
grub2-tools-minimal-2.02-123.el8_6.8.x86_64.rpm
2b9a5c81837e75a6fb92979f10d6d0c14835f0c2d57056ae3f7f97ef2700db4a
mokutil-0.3.0-11.el8_6.1.x86_64.rpm
130b94229c17c6fb0303d49c3e2c2f0b437cc1c211f46ce278d02183f090a049
shim-ia32-15.6-1.el8.x86_64.rpm
d463aa1e1b24fab05ebe6babdd2cc572fecece224b0c535f8eae3ba4a3ada45a
shim-ia32-15.6-1.el8.x86_64.rpm
d463aa1e1b24fab05ebe6babdd2cc572fecece224b0c535f8eae3ba4a3ada45a
shim-x64-15.6-1.el8.x86_64.rpm
618ee485a8b845bd9675f29f82889c67de2ed94a000c83a8bbfc32b7ca614fca
shim-x64-15.6-1.el8.x86_64.rpm
618ee485a8b845bd9675f29f82889c67de2ed94a000c83a8bbfc32b7ca614fca
RLSA-2022:5311
Moderate: libgcrypt security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libgcrypt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
Security Fix(es):
* libgcrypt: ElGamal implementation allows plaintext recovery (CVE-2021-40528)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libgcrypt-1.8.5-7.el8_6.i686.rpm
40cfa6075249d20a936053eeefe1b9ef5a142276c1f49c9757a6f60462f9fb4f
libgcrypt-1.8.5-7.el8_6.i686.rpm
40cfa6075249d20a936053eeefe1b9ef5a142276c1f49c9757a6f60462f9fb4f
libgcrypt-1.8.5-7.el8_6.x86_64.rpm
6b782e29090507e3f1fd79353603d52744fc853c3bf73be705ba63172fad0731
libgcrypt-1.8.5-7.el8_6.x86_64.rpm
6b782e29090507e3f1fd79353603d52744fc853c3bf73be705ba63172fad0731
libgcrypt-devel-1.8.5-7.el8_6.i686.rpm
af62c827e97b8b865a78d35cae19ab58c7158f18c4fcf6bf85bf974d950c9d77
libgcrypt-devel-1.8.5-7.el8_6.i686.rpm
af62c827e97b8b865a78d35cae19ab58c7158f18c4fcf6bf85bf974d950c9d77
libgcrypt-devel-1.8.5-7.el8_6.x86_64.rpm
bb9ae61c1c94686a1b9c2d4d418807366f5ef338294517d9dd5e06576f120a30
libgcrypt-devel-1.8.5-7.el8_6.x86_64.rpm
bb9ae61c1c94686a1b9c2d4d418807366f5ef338294517d9dd5e06576f120a30
RLBA-2022:5322
mtools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mtools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mtools is a collection of utilities for files created in the MS-DOS operating system. Mtools allow you to read, write, and move MS-DOS file system files (normally on MS-DOS floppy disks). Mtools supports Windows95 style long file names, IBM extended density format (OS/2 XDF) disks, and disks formatted in the 2M program. Install Mtools if your scenario requires using MS-DOS disks.
Bug Fix(es) and Enhancement(s):
* mtools missing glibc-gconv-extra dependency (BZ#2080999)
none-baseos-rpms
mtools-4.0.18-15.el8_6.x86_64.rpm
bf5055629fdf5b719b73a142d97ec837af4e244df5f6c3fec9df9bf1a72907cd
mtools-4.0.18-15.el8_6.x86_64.rpm
bf5055629fdf5b719b73a142d97ec837af4e244df5f6c3fec9df9bf1a72907cd
RLSA-2022:5809
Moderate: pcre2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pcre2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
* pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
pcre2-10.32-3.el8_6.i686.rpm
b5e581fb5ad69901dfa0950334ca1307b152f75076a53ba95cdfb6c6bc71e033
pcre2-10.32-3.el8_6.i686.rpm
b5e581fb5ad69901dfa0950334ca1307b152f75076a53ba95cdfb6c6bc71e033
pcre2-10.32-3.el8_6.x86_64.rpm
e01ba987cd81213935bca06b96ec8642a6ee178c178a5df8201c8e13f3b1d87b
pcre2-10.32-3.el8_6.x86_64.rpm
e01ba987cd81213935bca06b96ec8642a6ee178c178a5df8201c8e13f3b1d87b
pcre2-devel-10.32-3.el8_6.i686.rpm
0c7fb5f47de2ce426cfae8f54137c2b666d7a89c311933476c7b4890727ba3e1
pcre2-devel-10.32-3.el8_6.i686.rpm
0c7fb5f47de2ce426cfae8f54137c2b666d7a89c311933476c7b4890727ba3e1
pcre2-devel-10.32-3.el8_6.x86_64.rpm
d58c0c401b375e10407d9fcbebe8679e80b2516b7f908d6449918b7cb5438a8b
pcre2-devel-10.32-3.el8_6.x86_64.rpm
d58c0c401b375e10407d9fcbebe8679e80b2516b7f908d6449918b7cb5438a8b
pcre2-utf16-10.32-3.el8_6.i686.rpm
bc3d71612041401fc6b557444b7b2fa6b391119398339506db6098c1921ab579
pcre2-utf16-10.32-3.el8_6.i686.rpm
bc3d71612041401fc6b557444b7b2fa6b391119398339506db6098c1921ab579
pcre2-utf16-10.32-3.el8_6.x86_64.rpm
c511a9117b37286f7ebd254274183db7767b0236aec16dffbd3f804817e6530e
pcre2-utf16-10.32-3.el8_6.x86_64.rpm
c511a9117b37286f7ebd254274183db7767b0236aec16dffbd3f804817e6530e
pcre2-utf32-10.32-3.el8_6.i686.rpm
ee864dc133ee4eb4998f49dcc5b8fab4dc712015c571b983aa55ed25f2c3cb1b
pcre2-utf32-10.32-3.el8_6.i686.rpm
ee864dc133ee4eb4998f49dcc5b8fab4dc712015c571b983aa55ed25f2c3cb1b
pcre2-utf32-10.32-3.el8_6.x86_64.rpm
1719080d13216247dae9316172cc19084bc72d380b2200a9ade012c10eb53ab1
pcre2-utf32-10.32-3.el8_6.x86_64.rpm
1719080d13216247dae9316172cc19084bc72d380b2200a9ade012c10eb53ab1
RLSA-2022:5813
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Out-of-bounds Write (CVE-2022-1785)
* vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
* vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
vim-minimal-8.0.1763-19.el8_6.4.x86_64.rpm
cbb2c73d14f8a9ead6a438911d5475ae09ad25bcb99a24bee8f33d457b6ab4e8
vim-minimal-8.0.1763-19.el8_6.4.x86_64.rpm
cbb2c73d14f8a9ead6a438911d5475ae09ad25bcb99a24bee8f33d457b6ab4e8
RLBA-2022:5815
bash bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux.
Bug Fix(es) and Enhancement(s):
* Segfault in 'buffered_getchar()' function in bash (BZ#2097659)
none-baseos-rpms
bash-4.4.20-4.el8_6.x86_64.rpm
75b11d7fde3783e41ec311542b43761cb996fb5f313f9b65c1172623ab66266d
bash-4.4.20-4.el8_6.x86_64.rpm
75b11d7fde3783e41ec311542b43761cb996fb5f313f9b65c1172623ab66266d
bash-doc-4.4.20-4.el8_6.x86_64.rpm
6833e28d4917f0fe330b2690f14be656d147f359098690d39d00a337430a934d
bash-doc-4.4.20-4.el8_6.x86_64.rpm
6833e28d4917f0fe330b2690f14be656d147f359098690d39d00a337430a934d
RLSA-2022:5818
Moderate: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: c_rehash script allows command injection (CVE-2022-1292)
* openssl: the c_rehash script allows command injection (CVE-2022-2068)
* openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-1.1.1k-7.el8_6.x86_64.rpm
117d554d34f3312043180819b4b940fc7b2a4586d550f651877f9c5ff707a567
openssl-1.1.1k-7.el8_6.x86_64.rpm
117d554d34f3312043180819b4b940fc7b2a4586d550f651877f9c5ff707a567
openssl-devel-1.1.1k-7.el8_6.i686.rpm
5c85bc83f38d0297aa690910ef05383792e13a5132ec204a33a88e92a766658e
openssl-devel-1.1.1k-7.el8_6.i686.rpm
5c85bc83f38d0297aa690910ef05383792e13a5132ec204a33a88e92a766658e
openssl-devel-1.1.1k-7.el8_6.x86_64.rpm
aacf809def9c0c3c3a6124150db9922568480b8b569653ed69573de7a3a6d362
openssl-devel-1.1.1k-7.el8_6.x86_64.rpm
aacf809def9c0c3c3a6124150db9922568480b8b569653ed69573de7a3a6d362
openssl-libs-1.1.1k-7.el8_6.i686.rpm
cda7081b9bf90c3c94cad77649b4cfe2383d6d58546b97e0b7dd8ea8a987960a
openssl-libs-1.1.1k-7.el8_6.i686.rpm
cda7081b9bf90c3c94cad77649b4cfe2383d6d58546b97e0b7dd8ea8a987960a
openssl-libs-1.1.1k-7.el8_6.x86_64.rpm
656d9fbf8647a3114dd94fca70bd29c0ae6b0115ee2536a6240910792ce731f4
openssl-libs-1.1.1k-7.el8_6.x86_64.rpm
656d9fbf8647a3114dd94fca70bd29c0ae6b0115ee2536a6240910792ce731f4
openssl-perl-1.1.1k-7.el8_6.x86_64.rpm
01d37726fd1a705f88b69c8d146afedcb644eeffce8b88494d0a0e6d500e2230
openssl-perl-1.1.1k-7.el8_6.x86_64.rpm
01d37726fd1a705f88b69c8d146afedcb644eeffce8b88494d0a0e6d500e2230
RLSA-2022:7089
Important: libksba security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libksba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow may lead to remote code execution (CVE-2022-3515)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libksba-1.3.5-8.el8_6.i686.rpm
580315f7e2551526b4918083c6883b796c9d1f396124d64b68d7e7ecbcdf7f94
libksba-1.3.5-8.el8_6.i686.rpm
580315f7e2551526b4918083c6883b796c9d1f396124d64b68d7e7ecbcdf7f94
libksba-1.3.5-8.el8_6.x86_64.rpm
2bd4934389b7e05c708630addefad4016826807e3008dc6398095c54cd7d78e7
libksba-1.3.5-8.el8_6.x86_64.rpm
2bd4934389b7e05c708630addefad4016826807e3008dc6398095c54cd7d78e7
RLBA-2022:6459
ca-certificates bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ca-certificates.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI).
Bug Fix(es) and Enhancement(s):
* Update ca-certificates package in Rocky Linux-8.6.0.Z.MAIN+EUS to CA trust list version (2022) 2.54 from Firefox 102 (bug 2100189)
* QuoVadis Root Certification Authority certificate is expired in March. (BZ#2118462)
* Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 (BZ#2118463)
* ca-certificates need to add support for signing certs for .NET (BZ#2121485)
none-baseos-rpms
ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm
096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1
ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm
096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1
ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm
096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1
ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm
096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1
RLSA-2022:6463
Moderate: gnupg2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnupg2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.
Security Fix(es):
* gpg: Signature spoofing via status line injection (CVE-2022-34903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gnupg2-2.2.20-3.el8_6.x86_64.rpm
bcc8e48b2526be938285cf48185490822078c65153ada4d81633c83b4d4f9dc2
gnupg2-2.2.20-3.el8_6.x86_64.rpm
bcc8e48b2526be938285cf48185490822078c65153ada4d81633c83b4d4f9dc2
gnupg2-smime-2.2.20-3.el8_6.x86_64.rpm
48ec6bfa5de6c78331faf4ec66a1beff0141db2415a18fa74260f84d17b73f33
gnupg2-smime-2.2.20-3.el8_6.x86_64.rpm
48ec6bfa5de6c78331faf4ec66a1beff0141db2415a18fa74260f84d17b73f33
RLSA-2022:7105
Moderate: gnutls security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gnutls-3.6.16-5.el8_6.i686.rpm
44a2a5f5b953b2c8dc4dc02774cac6b505975bf66a94898fe955dbec82ae029d
gnutls-3.6.16-5.el8_6.i686.rpm
44a2a5f5b953b2c8dc4dc02774cac6b505975bf66a94898fe955dbec82ae029d
gnutls-3.6.16-5.el8_6.x86_64.rpm
fef93f4e79e09dba85e23adf9e2103d8dbee735d0d02bf723d414ff94c5c2a85
gnutls-3.6.16-5.el8_6.x86_64.rpm
fef93f4e79e09dba85e23adf9e2103d8dbee735d0d02bf723d414ff94c5c2a85
RLBA-2022:7107
glib2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Bug Fix(es) and Enhancement(s):
* Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615)
none-baseos-rpms
glib2-2.56.4-158.el8_6.1.i686.rpm
bef700c133f585e0fa2ce357faba9c56004d45c4cf568a1b40ff1f3baa94bf27
glib2-2.56.4-158.el8_6.1.i686.rpm
bef700c133f585e0fa2ce357faba9c56004d45c4cf568a1b40ff1f3baa94bf27
glib2-2.56.4-158.el8_6.1.x86_64.rpm
61a796c05095a0c89ead008de79a522c0d50eff0d5870e7465fced706cf5d10b
glib2-2.56.4-158.el8_6.1.x86_64.rpm
61a796c05095a0c89ead008de79a522c0d50eff0d5870e7465fced706cf5d10b
glib2-devel-2.56.4-158.el8_6.1.i686.rpm
04fccbb85df9dc1a1bfdbd3c55856e87f8cd2e3fce9d9ebc38c2d057ef24d38e
glib2-devel-2.56.4-158.el8_6.1.i686.rpm
04fccbb85df9dc1a1bfdbd3c55856e87f8cd2e3fce9d9ebc38c2d057ef24d38e
glib2-devel-2.56.4-158.el8_6.1.x86_64.rpm
69c0db06fbc8f2d68cd970a4e245dd7a541cdfdd4cf44e68b13b833e207e685c
glib2-devel-2.56.4-158.el8_6.1.x86_64.rpm
69c0db06fbc8f2d68cd970a4e245dd7a541cdfdd4cf44e68b13b833e207e685c
glib2-fam-2.56.4-158.el8_6.1.x86_64.rpm
4677c25392b7e27e30b0f125f412f6aac4266d9c5abe2ea35c276cd129389ebb
glib2-fam-2.56.4-158.el8_6.1.x86_64.rpm
4677c25392b7e27e30b0f125f412f6aac4266d9c5abe2ea35c276cd129389ebb
glib2-tests-2.56.4-158.el8_6.1.x86_64.rpm
688e3e378b0c12adbd0b4d5771e65fc15090ca07f6f5a4807e08728d9dea06fa
glib2-tests-2.56.4-158.el8_6.1.x86_64.rpm
688e3e378b0c12adbd0b4d5771e65fc15090ca07f6f5a4807e08728d9dea06fa
RLSA-2022:7108
Moderate: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Out of bounds access during table rename (CVE-2020-35527)
* sqlite: Null pointer derreference in src/select.c (CVE-2020-35525)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sqlite-3.26.0-16.el8_6.i686.rpm
3b165e4f94b4bfb8107908c1d92e97ea65c3cbc2bc0330ddf5f7b6d735f6168b
sqlite-3.26.0-16.el8_6.i686.rpm
3b165e4f94b4bfb8107908c1d92e97ea65c3cbc2bc0330ddf5f7b6d735f6168b
sqlite-3.26.0-16.el8_6.x86_64.rpm
d78914d48cdbbd003d8034e9859beaf3d4a3e12039c98eb3e80ed62ae5533e9e
sqlite-3.26.0-16.el8_6.x86_64.rpm
d78914d48cdbbd003d8034e9859beaf3d4a3e12039c98eb3e80ed62ae5533e9e
sqlite-devel-3.26.0-16.el8_6.i686.rpm
91ec0a065addc2f5c26038c18d0f5581c6bcd57e8cfaa407711063a1acaf5064
sqlite-devel-3.26.0-16.el8_6.i686.rpm
91ec0a065addc2f5c26038c18d0f5581c6bcd57e8cfaa407711063a1acaf5064
sqlite-devel-3.26.0-16.el8_6.x86_64.rpm
4320f53099ad9c1df90735bd288e271970e41aeaed143e5ebea0d3303c97fed4
sqlite-devel-3.26.0-16.el8_6.x86_64.rpm
4320f53099ad9c1df90735bd288e271970e41aeaed143e5ebea0d3303c97fed4
sqlite-doc-3.26.0-16.el8_6.noarch.rpm
c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d
sqlite-doc-3.26.0-16.el8_6.noarch.rpm
c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d
sqlite-doc-3.26.0-16.el8_6.noarch.rpm
c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d
sqlite-doc-3.26.0-16.el8_6.noarch.rpm
c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d
sqlite-libs-3.26.0-16.el8_6.i686.rpm
1d712596058fa81f2f39d9014c96a9c17ba4f42bf05b5ff827ae8bb4df048114
sqlite-libs-3.26.0-16.el8_6.i686.rpm
1d712596058fa81f2f39d9014c96a9c17ba4f42bf05b5ff827ae8bb4df048114
sqlite-libs-3.26.0-16.el8_6.x86_64.rpm
3183e68d7b7aac6cd39c3418b628b0d3905f0e25dd61b2637a60d24f16101f6e
sqlite-libs-3.26.0-16.el8_6.x86_64.rpm
3183e68d7b7aac6cd39c3418b628b0d3905f0e25dd61b2637a60d24f16101f6e
RLBA-2022:7115
rpm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es) and Enhancement(s):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523)
none-baseos-rpms
python3-rpm-4.14.3-24.el8_7.x86_64.rpm
e1c16b79fce78de0cd225edb18baf4912ae103a4d1e4427ba48545f1e1442b7b
python3-rpm-4.14.3-24.el8_6.x86_64.rpm
00555ceb0f5c9d689de35b36f8dfe7cbaf1c5ff54166b51cb4c3a38447ed3d2c
rpm-4.14.3-24.el8_7.x86_64.rpm
52ddb09b53c7fe658f11a5353fc090dace91285ec842e39a64d6e08627b2b278
rpm-4.14.3-24.el8_6.x86_64.rpm
0027d54b01712e88285b8893e1a906f8107b691896044d9d1c35c63d453709d4
rpm-apidocs-4.14.3-24.el8_7.noarch.rpm
a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b
rpm-apidocs-4.14.3-24.el8_7.noarch.rpm
a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b
rpm-apidocs-4.14.3-24.el8_6.noarch.rpm
16f3a10967ffede3d3a1fc01be6011bb7937e0d054d94d9b2f97b63077b43787
rpm-apidocs-4.14.3-24.el8_6.noarch.rpm
16f3a10967ffede3d3a1fc01be6011bb7937e0d054d94d9b2f97b63077b43787
rpm-build-libs-4.14.3-24.el8_7.i686.rpm
26e3f1289e91bbd69ddfa1bcafe5189a4bcde0ed2b7fc88e57333c83e5207bb5
rpm-build-libs-4.14.3-24.el8_6.i686.rpm
b9848d9db7b9ba8faded764c015ebddcb86adeaddf106b44a9114868a1d5e818
rpm-build-libs-4.14.3-24.el8_7.x86_64.rpm
145ebac4456a0cd149537054ea74e323fd9eca548f38a40bd1725ac4eb9fb288
rpm-build-libs-4.14.3-24.el8_6.x86_64.rpm
a057e350278df66a366e16206fda86b8898bfb40720d412ee559f35cc441fef7
rpm-cron-4.14.3-24.el8_7.noarch.rpm
b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f
rpm-cron-4.14.3-24.el8_7.noarch.rpm
b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f
rpm-cron-4.14.3-24.el8_6.noarch.rpm
4b41d55e13beec8d3fe23a23192684e5ebc06194a57ced180b0cf5b0e051fe8a
rpm-cron-4.14.3-24.el8_6.noarch.rpm
4b41d55e13beec8d3fe23a23192684e5ebc06194a57ced180b0cf5b0e051fe8a
rpm-devel-4.14.3-24.el8_7.i686.rpm
0ddf479b304fab8a8f92c9dec230c275b30db6192423802985552da70ef2b716
rpm-devel-4.14.3-24.el8_6.i686.rpm
cd118585125b3716937d81aff3f3f3d002dea167354a8c4d1849dbd3d3e71a11
rpm-devel-4.14.3-24.el8_7.x86_64.rpm
8be76765b51d8681a9f76b209d07847c27b338fe25af2b0a149502ce5b5424b8
rpm-devel-4.14.3-24.el8_6.x86_64.rpm
0b87b0ef3e725312e5e5bff614480224abc257dc2f6a813bf66741012ee9377a
rpm-libs-4.14.3-24.el8_7.i686.rpm
0f1f8d377219efb286bf9bc9c0a6c19a4ede0948bd6b1ac5318d5ee9dda9bd22
rpm-libs-4.14.3-24.el8_6.i686.rpm
c9ae4b9ff2b94a8e8a796b2a48983cac6726f566ab16344f3f9f3aef9247b7a6
rpm-libs-4.14.3-24.el8_7.x86_64.rpm
fc4263ea61b68b93eda32fcde2612fea4537286f1e7e56fdd94db8eaae7faf8d
rpm-libs-4.14.3-24.el8_6.x86_64.rpm
c549c2c0257b70c9f2fd0cff3e5128b78d719e0e19eda94c0912871c2e7f5788
rpm-plugin-ima-4.14.3-24.el8_7.x86_64.rpm
e51a248c3608b07034f31451235312ce267e10c465585cbe633f900ddee1b0c8
rpm-plugin-ima-4.14.3-24.el8_6.x86_64.rpm
99534820bef92a371ca87e59c291df38059811a41446c19b4ae02aecb0c04926
rpm-plugin-prioreset-4.14.3-24.el8_7.x86_64.rpm
7eef6d9114e98909f304c2283325fc84afa6a3e22c794537eada9d1d164b53ae
rpm-plugin-prioreset-4.14.3-24.el8_6.x86_64.rpm
3f2e3144ca70c900fc7eae68dfbdf94249fa64ba7b1505d893a107aeac9108ea
rpm-plugin-selinux-4.14.3-24.el8_7.x86_64.rpm
0d071d4c4a26203c48961cbeb02d2b9c5b050e29d31c36cc9e11769c50c9cf85
rpm-plugin-selinux-4.14.3-24.el8_6.x86_64.rpm
bb763625af4c0e8d6c9f7025c08b51e0fb3922933ec280d8580c4685ad9803d9
rpm-plugin-syslog-4.14.3-24.el8_7.x86_64.rpm
2d4cb5df2e4c19d3a4d59100777475e0e94bc1e7ddf0daf1b7c1503765621eb8
rpm-plugin-syslog-4.14.3-24.el8_6.x86_64.rpm
e240087fa3342a8cffe9db42206e886ead610eb0e5d11f26b03e93e41c803bb0
rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.x86_64.rpm
ce1d5a7d9e8896e209eafb6142f22feaa70a2745e789a0b303e0dc8741fae778
rpm-plugin-systemd-inhibit-4.14.3-24.el8_6.x86_64.rpm
37230d76e255114b313d04bc8752c2292e5647c52afa5b1cc7c4a0050861cd79
rpm-sign-4.14.3-24.el8_7.x86_64.rpm
110d95fb5f5bf027f409ebe3ea455c1b3e387cde00645d970f5e716e92861e66
rpm-sign-4.14.3-24.el8_6.x86_64.rpm
cbf2246ea3b5bbc6eb0dbba9dfce26c88a4728f754ee90b1e197d989506c2113
RLBA-2022:7116
libsemanage bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.
Bug Fix(es) and Enhancement(s):
* libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139)
none-baseos-rpms
libsemanage-2.9-9.el8.i686.rpm
62c1478c21117a921be6a68ac8fd3e77b27760df570adfd2f97561d018eee221
libsemanage-2.9-9.el8_6.i686.rpm
79fae46e7619a46b1728fa1d94032e9ee920b2e6fe7227ec0248353a134f7c6e
libsemanage-2.9-9.el8.x86_64.rpm
d08e18048af1c5ad125356edc17d805cdac32f33a1db756339d292ae3bc93428
libsemanage-2.9-9.el8_6.x86_64.rpm
b867c4eecfc9beff91c81417abe4b473212e6837d6991a4231e87e8f7c346500
python3-libsemanage-2.9-9.el8.x86_64.rpm
7f7c7f0b08535b082dd4a877324453f56f4f5d977982751e1c0843b41be90af3
python3-libsemanage-2.9-9.el8_6.x86_64.rpm
84261fe316de650e3c6f7fd00d0d4cbf544d9c1de68dd71bc71b501441ec2f51
RLBA-2022:7404
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
none-baseos-rpms
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
tzdata-2022f-1.el9_0.noarch.rpm
da66be8719af463ead916afb64b8c8dd807838e626560a11bc3c18690ff29f19
tzdata-2022f-1.el9_0.noarch.rpm
da66be8719af463ead916afb64b8c8dd807838e626560a11bc3c18690ff29f19
tzdata-2022f-1.el9_0.noarch.rpm
da66be8719af463ead916afb64b8c8dd807838e626560a11bc3c18690ff29f19
tzdata-2022f-1.el9_0.noarch.rpm
da66be8719af463ead916afb64b8c8dd807838e626560a11bc3c18690ff29f19
RLBA-2022:7678
kmod-redhat-oracleasm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-redhat-oracleasm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
kmod-redhat-oracleasm-2.0.8-15.el8.x86_64.rpm
44ac298ff3dec860dfc4aec171bcc9773a2e7ccbd205eb52988df8242d048bda
RLBA-2022:7679
mcelog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
mcelog-180-0.el8.x86_64.rpm
f327c50b3113ea5afe315a8a2457bbc3693dd30a3637dc2a49b47f267fbfa479
RLBA-2022:7681
audit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for audit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
audispd-plugins-3.0.7-4.el8.x86_64.rpm
4a01420e794d95d78d1681ee3cc731244d59d05d69bf47c0a00daa885b3703f4
audispd-plugins-zos-3.0.7-4.el8.x86_64.rpm
a2394edcbf95d2127f1719cbaad685f9d60dc61703081bc7678b1afac11ed4cf
audit-3.0.7-4.el8.x86_64.rpm
243ee8b827cde194a4c28936f3cd41ee8f448362a628d72a9265629baf90e80f
audit-libs-3.0.7-4.el8.i686.rpm
b2c140bb9ac9eae92524a2a8b70c79f1a25df764d82fbd9f5749d7cff41d48e1
audit-libs-3.0.7-4.el8.x86_64.rpm
e804d60f2d5a31e4b10ae0a9a217ea66b7d2bf9e79249085d395d027e502e45e
audit-libs-devel-3.0.7-4.el8.i686.rpm
85456513dff24617b2a5a0b166c64ca1ca0654ffab9aa0f519913e257c155e07
audit-libs-devel-3.0.7-4.el8.x86_64.rpm
c43ffcb79cf5922fd4c6726c10a2943d16d736e590f27a3337acc933f815cbde
python3-audit-3.0.7-4.el8.x86_64.rpm
53abac1b0e86b1a61dbce1e01aab3e25161e61682f2bcf0361834594b3da6009
RLBA-2022:7682
babeltrace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for babeltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libbabeltrace-1.5.4-4.el8.i686.rpm
d98834735ef04dd748ee1677257c3e723faba0154b651ee9c9b6ea226bf759a2
libbabeltrace-1.5.4-4.el8.x86_64.rpm
9e6e4064fb82bb163daeb5f230c4fd92917ba94d6e93fc366e769e7a7844e7ac
RLSA-2022:7683
Moderate: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516)
* race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558)
* use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640)
* memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002)
* smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168)
* NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617)
* swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854)
* uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016)
* race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048)
* use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055)
* use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184)
* NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852)
* buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)
* nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586)
* openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639)
* use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938)
* net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368)
* possible to use the debugger to write zero into a location of choice (CVE-2022-21499)
* Spectre-BHB (CVE-2022-23960)
* Post-barrier Return Stack Buffer Predictions (CVE-2022-26373)
* memory leak in drivers/hid/hid-elo.c (CVE-2022-27950)
* double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390)
* use after free in SUNRPC subsystem (CVE-2022-28893)
* use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581)
* DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946)
* nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
bpftool-4.18.0-425.3.1.el8.x86_64.rpm
916f29290aa962dcb1cc0b509124b99e65808b6be88686ccbb3f42d082a953e9
kernel-4.18.0-425.3.1.el8.x86_64.rpm
2d1a07f77e08aa7ddcaf1244679c247666ba718cdb7dc5c612334b7868270d73
kernel-abi-stablelists-4.18.0-425.3.1.el8.noarch.rpm
7502d39b6c6a1298db08b7e84273413b6cbe84299fd31cb2266e8d6711947bd9
kernel-abi-stablelists-4.18.0-425.3.1.el8.noarch.rpm
7502d39b6c6a1298db08b7e84273413b6cbe84299fd31cb2266e8d6711947bd9
kernel-core-4.18.0-425.3.1.el8.x86_64.rpm
4dad88a5fe11b6047eaf9df8654e981009add3a37ce5856c05fbaabb35ca2c6c
kernel-cross-headers-4.18.0-425.3.1.el8.x86_64.rpm
c7815511a07781124bdc76d483637d89fb66718b08fc66e0f861e4344c7c9de9
kernel-debug-4.18.0-425.3.1.el8.x86_64.rpm
d466f697683b314f994d629ee2b45a9247d4591fca2429e599a8d78a9446d739
kernel-debug-core-4.18.0-425.3.1.el8.x86_64.rpm
422c13c018c3bfa6a871dbda188318e5fce776c1e4e081cd206393759474f7ca
kernel-debug-devel-4.18.0-425.3.1.el8.x86_64.rpm
b52028e57ae4b54af1cae536e844abc901f8ff7f4d96d4bde97798029e429bc4
kernel-debuginfo-common-x86_64-4.18.0-425.3.1.el8.x86_64.rpm
308630b40996f4d9e7341c06eb1290af50ec0140ddfea07faf33a9ceebb81c8e
kernel-debug-modules-4.18.0-425.3.1.el8.x86_64.rpm
13be95f8208e7b59876913fb9d3dcb622edb58d0b31fc873961499f0c7cd9c33
kernel-debug-modules-extra-4.18.0-425.3.1.el8.x86_64.rpm
fa5bc1ba0c1901232f912de3daf90213218251403024dee91fd7a353c987d2fe
kernel-devel-4.18.0-425.3.1.el8.x86_64.rpm
942c23ac86e1284d69eb39639fb308a64859f479b6dac2df5ef48dc572bb2dd4
kernel-doc-4.18.0-425.3.1.el8.noarch.rpm
dfd007ce8dc51176e8566453017d2319a2430dfea645a11ecddbfbf2d299aea0
kernel-doc-4.18.0-425.3.1.el8.noarch.rpm
dfd007ce8dc51176e8566453017d2319a2430dfea645a11ecddbfbf2d299aea0
kernel-headers-4.18.0-425.3.1.el8.x86_64.rpm
dd41b9c3e90de98dd8775acceb96a13fcec98bfd00e9df9b67cf423d65ad8f0a
kernel-modules-4.18.0-425.3.1.el8.x86_64.rpm
2776fb3ef33a3ca2976e27dfddc221f5c2ceb8b60dbb4cfb9569b5647e66fe80
kernel-modules-extra-4.18.0-425.3.1.el8.x86_64.rpm
d77c58049f6fef4a25e139e81f7eb12d8c1c076c592a7190d74e8a0f2f25d6bc
kernel-tools-4.18.0-425.3.1.el8.x86_64.rpm
1b37dae1170690f617d0d8472d85d65ef1295b7f9b43a564e218a86de1475fba
kernel-tools-libs-4.18.0-425.3.1.el8.x86_64.rpm
721a901d11711151aa87386b2f5fed06216b633e7dfd81782771b2608421309c
perf-4.18.0-425.3.1.el8.x86_64.rpm
55cffef3484b3007e968bb294b6ca624c317c285fbd91d3d926ea094c136ecf2
python3-perf-4.18.0-425.3.1.el8.x86_64.rpm
3239cbb0136bf0cfc6d5b76ceae67864185eb63ac81a8ee924694348d7115b70
RLBA-2022:7684
glibc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
glibc-2.28-211.el8.i686.rpm
ed9f9065f5ad53cc1c7e85a30ced3e317680f83201a7c31f3cc1c0692c72e15f
glibc-2.28-211.el8.x86_64.rpm
eaf25c824ccbf483d8e4c490eabd5036e7bcf578282071be8b03326291bd69e0
glibc-all-langpacks-2.28-211.el8.x86_64.rpm
137b9be34b103ac1b1a700dccb465e8662cddd6a4462264bae479b6beb0f7216
glibc-common-2.28-211.el8.x86_64.rpm
6825067b69302b5fe97e70fb65e049a24633790e5e02bb995a8825b06fa65904
glibc-devel-2.28-211.el8.i686.rpm
53572ef92265b28e7cbc96a84ee14e5f18a2bb760117a914607a7a5b2569f5de
glibc-devel-2.28-211.el8.x86_64.rpm
cfd4273bccbdc53553c2d235e665034334a33c6e140c17f307f1ff2a721fdc50
glibc-doc-2.28-211.el8.noarch.rpm
651c1bcdd3292c68b98e3f102ea239fa39a639f17539d011589a2ca80621ddbf
glibc-doc-2.28-211.el8.noarch.rpm
651c1bcdd3292c68b98e3f102ea239fa39a639f17539d011589a2ca80621ddbf
glibc-gconv-extra-2.28-211.el8.i686.rpm
62e5b3bc6ed90365f6b52af8a7405f90569358ad60890832b0130f86cfc6c626
glibc-gconv-extra-2.28-211.el8.x86_64.rpm
644e6172587c73c2f7c4ecb2b28cf13035b5c3fb209938d6cc8d1a451813a85b
glibc-headers-2.28-211.el8.i686.rpm
f05afb61291bd48548f1edfced7b95aead19c960e43587dbeb80000596c53466
glibc-headers-2.28-211.el8.x86_64.rpm
f5c8a809fae56c8cb5c5e8cadc8c1bbd41cc89c85d8e6725688443a61929a0d6
glibc-langpack-aa-2.28-211.el8.x86_64.rpm
8ab1745b0c2762a7b4d12345c35509c4ef8411276c6a78e1ed6225859d235eb4
glibc-langpack-af-2.28-211.el8.x86_64.rpm
41d63a4083a3a886ee284de05e4d50a1db09bc70ceca4de21686ead011de7aa6
glibc-langpack-agr-2.28-211.el8.x86_64.rpm
f81ef5f6249cb748cfed19b63db6a952d4dfec7119ae7625558ded475a776359
glibc-langpack-ak-2.28-211.el8.x86_64.rpm
0850181093442cb5821feca12aae344067ad69318ba4f07cae5121bec22e17a0
glibc-langpack-am-2.28-211.el8.x86_64.rpm
e49036676b20fe4e1370025144c1a1e7bb6fc58bffd8e1f23c6744191b04c59a
glibc-langpack-an-2.28-211.el8.x86_64.rpm
1b29b1b7ffe007dbf548f973e2fba5ca9a03e7ebc8756f92e09eca95d49f857d
glibc-langpack-anp-2.28-211.el8.x86_64.rpm
4f973788cfd6da0309cbdb44a0000b18f50bfe65161d8a352de9cce118715765
glibc-langpack-ar-2.28-211.el8.x86_64.rpm
1420e819195fb7f542f9302752d8c6142ec1a2aa99574fbfdfd016914d0fc9fe
glibc-langpack-as-2.28-211.el8.x86_64.rpm
1ea8969e7dd29ba5960e68296fb816fae2480c5b7f6a4cff1815e17ff0d380cf
glibc-langpack-ast-2.28-211.el8.x86_64.rpm
c7b85acfc9349d1afbb0249847997197899cbd70e1b55ab790556030a694c7f7
glibc-langpack-ayc-2.28-211.el8.x86_64.rpm
143efe8e2217a8de2fed884baa95a5ddadc60406cb98ef17094f4e38b5860546
glibc-langpack-az-2.28-211.el8.x86_64.rpm
b82545b11c2525da4ad815765ac0bbac3bf3c68c98d6f0d1069cd2464c5039a0
glibc-langpack-be-2.28-211.el8.x86_64.rpm
bdd7e7ddb5c41a4b78c3882565b67a62b407c21dd18039c4bd58109f1facbb27
glibc-langpack-bem-2.28-211.el8.x86_64.rpm
97fd21bd5aa8fba4d7580b22c55f85dfb20acca7bf410ff280630da940215165
glibc-langpack-ber-2.28-211.el8.x86_64.rpm
4f359a758fba84b5bddf069f2a4c71124c8160c8ae7110f1d4525b4e934a4bb1
glibc-langpack-bg-2.28-211.el8.x86_64.rpm
b76b3a54160736d2389cb62d2b8ab8cc06e7cd6ab90fa048e31d666e840294b5
glibc-langpack-bhb-2.28-211.el8.x86_64.rpm
931466a47fa50267652f19679102a4be4b1a4822d311dfadd31425a416fce07e
glibc-langpack-bho-2.28-211.el8.x86_64.rpm
72338c9dc1abbb9d4d61f383e3754fbcc2a5b1a47425899fc15b72661cf4a0f4
glibc-langpack-bi-2.28-211.el8.x86_64.rpm
3e997dcdb6aae046c5ca5839f0316de421113312e067098a2b1ccf8cbfeef33a
glibc-langpack-bn-2.28-211.el8.x86_64.rpm
670a2747b6aa8d29110deb029898ba5381b73302290efd1fa55685b984d031f2
glibc-langpack-bo-2.28-211.el8.x86_64.rpm
0485d5cc16a84df1fe80c34bef474377e78c5bbc1e6dfd0982133cd61f5ff89f
glibc-langpack-br-2.28-211.el8.x86_64.rpm
32f5b8d849c07c49b889ddd71368d222cc2b581903d8b4db19e1f030a888bb52
glibc-langpack-brx-2.28-211.el8.x86_64.rpm
0308fa50f63d264a48d60b6d84313d0a67c38bc9ecf0360b48a93fe31e55db98
glibc-langpack-bs-2.28-211.el8.x86_64.rpm
0b931f490c7cb0575b0d21ec569c780322594e7c99f6fba5846a8b84977a608d
glibc-langpack-byn-2.28-211.el8.x86_64.rpm
da93fe0abeec6720f4c25a56ed9281908c56a0495a540a1df1b00538aa243370
glibc-langpack-ca-2.28-211.el8.x86_64.rpm
f4566fb3524661d98ac360a7a4e52f180c5d4a0c9d0c7f613bcc21583d621bd8
glibc-langpack-ce-2.28-211.el8.x86_64.rpm
469ad495db0ff3e8b557f33f6ba5bf5a0f98cd4f0f5fa48afa9b6a2a0dde135d
glibc-langpack-chr-2.28-211.el8.x86_64.rpm
4e5ff4cd1a6e99dd6abe56bbcfb157c7a89e9f312bb3804f12063b7b9dc0959e
glibc-langpack-cmn-2.28-211.el8.x86_64.rpm
a2801823d4bd2b4abe9c8b450e375aa9fe2426e52fde0d8e6fce53c88f2b8fdf
glibc-langpack-crh-2.28-211.el8.x86_64.rpm
d13e79283ec1201a6d0406a3f8483643f388f3948f2cfd4b7329119b7e1b7a97
glibc-langpack-cs-2.28-211.el8.x86_64.rpm
b7822706b092858468762d88ecb84b83d91ee9e86d6da0090966bb5a06d680af
glibc-langpack-csb-2.28-211.el8.x86_64.rpm
7768a796132318f5b4a1b869902870e01456e4ef2631b5687e300de656610c68
glibc-langpack-cv-2.28-211.el8.x86_64.rpm
7fba9954d28f5385cc38f6f0a1be3231cd55e6a553399ac1df1701791cd40707
glibc-langpack-cy-2.28-211.el8.x86_64.rpm
384bc757e55b803d8fc5fb784a87e6faa8435a00e6182c45184c4b38ba76e1ba
glibc-langpack-da-2.28-211.el8.x86_64.rpm
d89bde235199610fd23a9abbf2f59315de6c0f3a58fee9e9ec14bd80922afcb8
glibc-langpack-de-2.28-211.el8.x86_64.rpm
67ea4a7d17e3abc4b38a70edc9229c710c4c33443d82eeba7d87f8997ce215fe
glibc-langpack-doi-2.28-211.el8.x86_64.rpm
2009df86b46b62139784c4633359811991cf5e29aab9325399d909b59d5516e8
glibc-langpack-dsb-2.28-211.el8.x86_64.rpm
1271f1a00bcd0363dda350d5c967f7c29a0483b144f154ea104b6bc3f0905e85
glibc-langpack-dv-2.28-211.el8.x86_64.rpm
a4d165798cf42daf8a57663e757bb799f5cccc26c6b62621c5dba75eae446e2d
glibc-langpack-dz-2.28-211.el8.x86_64.rpm
2c5dcb7ca78a91fe2f624277bcd203ddb0c24a0d01127e5037d72c0df7eda062
glibc-langpack-el-2.28-211.el8.x86_64.rpm
7d6fdb12f5c0d6d0a15184a9ba7ddac3ed9e5ff94e70b315267022a58ce00169
glibc-langpack-en-2.28-211.el8.x86_64.rpm
2ff8de02028dc59495a8fd5c5b5349ebc333cbd48878a79d73f9dcf4ccb56802
glibc-langpack-eo-2.28-211.el8.x86_64.rpm
2b35097ebf19ddb3559b2b93b896b5c93d43b64dcb479520be3d341a13d32e1b
glibc-langpack-es-2.28-211.el8.x86_64.rpm
bbfdc1be0c4c0dcb6c1562c2862af564b626f60c9f4a76ee5ec382a35bb7acbf
glibc-langpack-et-2.28-211.el8.x86_64.rpm
7b7a337111227bb86292e419718b5f928a2ef330c91aa5f1770fe38e35d3687b
glibc-langpack-eu-2.28-211.el8.x86_64.rpm
1808a8cea053b3ebfbd5ccbb8f6534ec0af13f875c27438be0aa097bfce9820b
glibc-langpack-fa-2.28-211.el8.x86_64.rpm
4da60699f2db283a22d7bf6037763d6c936ad01a7593704bd0a70256ee0edd98
glibc-langpack-ff-2.28-211.el8.x86_64.rpm
798f8bcea6e3cbe87d86ea4459d8aa784718ff834810dc2ee6eda593b2190076
glibc-langpack-fi-2.28-211.el8.x86_64.rpm
cf88a82019ea2ccfd18f1629f1537b690e6f5bf62e8e688f5f194e48df24828e
glibc-langpack-fil-2.28-211.el8.x86_64.rpm
b6e395886fea8d3e13c6a6a247bfd5f31f96edebf5a51da17ff0073e52ae1d78
glibc-langpack-fo-2.28-211.el8.x86_64.rpm
df1f04db471a21757febd14ebb84902af1b84a292c06c1b346b2cff93bda87d4
glibc-langpack-fr-2.28-211.el8.x86_64.rpm
01b5519982ecf17ec6f3fdd7c226cf144dc349522f199ab9781b347bbf8fd3af
glibc-langpack-fur-2.28-211.el8.x86_64.rpm
435a9be7bb57f55fe8e6a5750053f5bcd75f5df7b538c1406578b4cd9788a17e
glibc-langpack-fy-2.28-211.el8.x86_64.rpm
6cd3adae8c308f2592bc0efff34c505090cedc3202e99bbe6ef5c5b5459b9555
glibc-langpack-ga-2.28-211.el8.x86_64.rpm
7442b1fa932383dbc1ca5e3795dc507b3c59c1fbefac4e10bb80535f6ea73167
glibc-langpack-gd-2.28-211.el8.x86_64.rpm
cb09b26abbe240f6293a7f3ec9b3dcb88595991048cc5bfd1a8a6e8435b45ea4
glibc-langpack-gez-2.28-211.el8.x86_64.rpm
994273240ba0d9c4602f30990e86394d3776ff102efb23d2bd7c1fa094fd7f95
glibc-langpack-gl-2.28-211.el8.x86_64.rpm
e9dab212d0e5fdefa73b29406167cfd715c2b85805949086f455ac7345cc586d
glibc-langpack-gu-2.28-211.el8.x86_64.rpm
c49ec2b0361bdf485a8d5367fbca83d1258ae8ab31c312bc0ccb1de298b248a4
glibc-langpack-gv-2.28-211.el8.x86_64.rpm
61336102ad654478038dbb637a29912cff8b7254aaa35aeb314a0c9db8447607
glibc-langpack-ha-2.28-211.el8.x86_64.rpm
326660083fc1b39786fd003cc3dd77bd406c9493aa2ed356188068b59e1d2acf
glibc-langpack-hak-2.28-211.el8.x86_64.rpm
677d4e9e60d7728d1e84a459d914cd2ef89da40455e44a1fba4f408866a38095
glibc-langpack-he-2.28-211.el8.x86_64.rpm
387a9717422d05019bc0b5129ad07c145a9274042acd9263ccfb112bf9d00919
glibc-langpack-hi-2.28-211.el8.x86_64.rpm
76ffb9e3085e4a1ef4b663ccf6728da056c261c71974f5da765ee2c50a2d633b
glibc-langpack-hif-2.28-211.el8.x86_64.rpm
4cfd1a5f5c168d2c9ba3f3cb51819e226d38d4214fe5306bb9bea0b215e92d40
glibc-langpack-hne-2.28-211.el8.x86_64.rpm
1f13cc96641c68129dec43a58fd3adc68d9d9dd7fa1ad2e733fcc29450f1af1f
glibc-langpack-hr-2.28-211.el8.x86_64.rpm
8e09bf597d9bc0881d981597cad7ebe08ce7e2d789068947eb713040493e4290
glibc-langpack-hsb-2.28-211.el8.x86_64.rpm
7861f83b38eb49bbe9f62780d821a757cd2e568c483b546ff393bdafdb79c6d5
glibc-langpack-ht-2.28-211.el8.x86_64.rpm
88ba5b03f3e1d0aeaef8f515767e78561f004ac8a2031f984c3fae4695997d8f
glibc-langpack-hu-2.28-211.el8.x86_64.rpm
2724e22897129d5ea299ee815833e9095440be5c316b7ab9c60c38753c21d509
glibc-langpack-hy-2.28-211.el8.x86_64.rpm
23179bca9dac9496d9e77d6355358d3ffbb3fead402a8ee719d71058b184e3ca
glibc-langpack-ia-2.28-211.el8.x86_64.rpm
800b928dd4d8a3555a014849eb7dac68a648702e0d04805ef240358b0b0edb73
glibc-langpack-id-2.28-211.el8.x86_64.rpm
49b56dde6f267e7b7b665bf9cf66593ae2dca1a8d863a50ae215f5c20ce13ad1
glibc-langpack-ig-2.28-211.el8.x86_64.rpm
606be40dd87cc52b8ccd21d846dc00eab87ecca0e16bd3e3b5b4758949398e63
glibc-langpack-ik-2.28-211.el8.x86_64.rpm
396899da94cd03fc4bd8602fd043b3e6f6c79663125abbd853c2c90bc8235600
glibc-langpack-is-2.28-211.el8.x86_64.rpm
a1df07a7034c4f8d821496b05c8deb75a766cb1a9dfc8256e3add6993ede11ac
glibc-langpack-it-2.28-211.el8.x86_64.rpm
8d2ad64b6e5350546ed8dd36c857f59d229d84074e4101862a79c9093b194ca9
glibc-langpack-iu-2.28-211.el8.x86_64.rpm
9bb0a00f80e0494ed6e7445fe9ed56802171c1477e79e5acf32ba9d7c6a3cca4
glibc-langpack-ja-2.28-211.el8.x86_64.rpm
55e30ee8ba17f71606179566606509398c8b91fc56118b2de4cc12a5dc9c3f9f
glibc-langpack-ka-2.28-211.el8.x86_64.rpm
13c202242a745399afda180072003d85dee394e265fe7530067b38a9d3f6ada6
glibc-langpack-kab-2.28-211.el8.x86_64.rpm
2760580710e016416f6d348116b71a6e8161c5c0aa7b96235232ef2964381688
glibc-langpack-kk-2.28-211.el8.x86_64.rpm
457bd3328502f9e5027b9707f8a812ca017ce1a17c2183504f6f9af1641ebafc
glibc-langpack-kl-2.28-211.el8.x86_64.rpm
123cea29f35230b0c08e24995e96a7b2b56a6db84282c09d54d0dc63e16b01db
glibc-langpack-km-2.28-211.el8.x86_64.rpm
139a960587ea478f958d6b5b98a04e4a278e06628fb0f15339ba645d754cf0f8
glibc-langpack-kn-2.28-211.el8.x86_64.rpm
3fc816cde5f0e228e06161e35072c4514195c71130000d16c991ab6c848d65ac
glibc-langpack-ko-2.28-211.el8.x86_64.rpm
8485d4c74a242d25fcce0c3caacbc1246e47feb73af2845ca2181d47cff1639d
glibc-langpack-kok-2.28-211.el8.x86_64.rpm
3d65bfc8a51546cca7a012b6a775caf8840e7c103ac8f14ba8dd441fe55af230
glibc-langpack-ks-2.28-211.el8.x86_64.rpm
4c9f5459ccf9514ff1f8cf01b4d1306234593bf08ae6eabb884a898fdcdecb0b
glibc-langpack-ku-2.28-211.el8.x86_64.rpm
271a7f2ab0418a528ac59daf3006a9c54b2d4ba1f69c28a3c1bd8b88fc7a5981
glibc-langpack-kw-2.28-211.el8.x86_64.rpm
2e036a8ef9156d0e80905589bf32aacb13fbf431a8bc2f12acf0cbeb006ff5ae
glibc-langpack-ky-2.28-211.el8.x86_64.rpm
f921cd1c29ea1fba674af84c8da94d45226725c208460171619cd6c8676d0ae7
glibc-langpack-lb-2.28-211.el8.x86_64.rpm
013224c8ffc9f8e72b97dd70f1d899b191d2394e31d12e153094bff9b8e77c9c
glibc-langpack-lg-2.28-211.el8.x86_64.rpm
6538df78b8b0287b364a6c90ea6ea8d2f2ead13ee28028990428b52c79feef48
glibc-langpack-li-2.28-211.el8.x86_64.rpm
680f0372bae3869ca4803d421a7d13fc77d95dba4f540db8f078622575248d97
glibc-langpack-lij-2.28-211.el8.x86_64.rpm
c323cebfca86323dc25c7030f006b5210f208b6dff04e7f805fd0ea043f1169b
glibc-langpack-ln-2.28-211.el8.x86_64.rpm
00b43444d9534ab752203f57450e8f1654b4f0807aae8d9a825d506848d11ff6
glibc-langpack-lo-2.28-211.el8.x86_64.rpm
758b385a6a2dda07a7635b25c5c7da907cfdceacc124e86e5aa126b6fb57ee20
glibc-langpack-lt-2.28-211.el8.x86_64.rpm
cd85c448d4225fc9db8b679af51a641b5744ecea2ee75d40ba9ec6e9c03426db
glibc-langpack-lv-2.28-211.el8.x86_64.rpm
0351a63dc04ae6aed1f2998a289eef917f6b82ff10c59de17bfa3c9ac1e6e34a
glibc-langpack-lzh-2.28-211.el8.x86_64.rpm
189494caab9142abbe97852905b3878d7832d402c85cd9f3604bf40ebe2d762c
glibc-langpack-mag-2.28-211.el8.x86_64.rpm
ceb853972fdfe2b537a3bd6384d252a65349dbcb16e72461cbc9c0ffb91ac659
glibc-langpack-mai-2.28-211.el8.x86_64.rpm
0f7df04d99410b50d68d916c956b74649bcd215fb1f7a487c2262ca321d5efa9
glibc-langpack-mfe-2.28-211.el8.x86_64.rpm
c01e18c8805d9ecc2996f2cf4391ff3f357eda6d85c44b282492d8e5119e764f
glibc-langpack-mg-2.28-211.el8.x86_64.rpm
82dd8389732e1d4f501759f8c87f63ee2afc428f8865cfbd0d79f4aa58370a66
glibc-langpack-mhr-2.28-211.el8.x86_64.rpm
743daf561935fe23a89b706e44816ee49190289ffd26ede64e6a4e40ee2a2a32
glibc-langpack-mi-2.28-211.el8.x86_64.rpm
25f57807ae2e6cdda342b46cdd29542d639e020ea44e1259b4d9d54a0abf484c
glibc-langpack-miq-2.28-211.el8.x86_64.rpm
b96b112dd67c3c24b31e28bdae3eefcc8b62a80c11160eaadd1223de6b44a98a
glibc-langpack-mjw-2.28-211.el8.x86_64.rpm
78b9aed5672b09b2ae6d346ec790a2b54054be0d35fba229da65ebaef5c1c2b2
glibc-langpack-mk-2.28-211.el8.x86_64.rpm
41d389876ac6c627fdafd4b7ce654170248e6615d20de6bd9433ba50b788ea8e
glibc-langpack-ml-2.28-211.el8.x86_64.rpm
a153adeb6aa15344e9196d8824c94d208095716df617b8ae889e97248e19d699
glibc-langpack-mn-2.28-211.el8.x86_64.rpm
5a821c9b241a91c9b7508513d4c90518620086965d79ed9cd4d3aba707bfdc1a
glibc-langpack-mni-2.28-211.el8.x86_64.rpm
9b92cc461fa01b0e9d29073cfa3de3b54600aeb521846be05c0f4cfae3c97a4f
glibc-langpack-mr-2.28-211.el8.x86_64.rpm
411c4ab9ccbfb76c8342b2c2ebc6de6eb1f897fa65a140332496483c641ddb4c
glibc-langpack-ms-2.28-211.el8.x86_64.rpm
34374e7939288fdc197b1d363c77894b8547ae824a425619e6e0d9a065999235
glibc-langpack-mt-2.28-211.el8.x86_64.rpm
0980e1a2fa042a8e6b244d463570658d615bd6be87c2f6f9a8f2c5f780a14a21
glibc-langpack-my-2.28-211.el8.x86_64.rpm
b52dad4c0746e0018af5e20160b7463ae487f7b8e9fdbe98cd9a209549a3ca5b
glibc-langpack-nan-2.28-211.el8.x86_64.rpm
a43fda466eedce6e326f2e6698916997690467b0198c3ce6de37e0fb1bf0686c
glibc-langpack-nb-2.28-211.el8.x86_64.rpm
be44930889608f24aa716423dcba128041305dd16a74d5f58d09420d8c26e57e
glibc-langpack-nds-2.28-211.el8.x86_64.rpm
20e88af4d21b4345bfe88f6e7e854f69af92852f2113090b58e30e1e08f73dff
glibc-langpack-ne-2.28-211.el8.x86_64.rpm
360015bca371087c8fe71133a837c7fd9a30254c3c0613ba2e4173ba0245b944
glibc-langpack-nhn-2.28-211.el8.x86_64.rpm
cbc943ae41621a39f72604e4cc698ad20e19c80cfc2a37a5a68459f349dfbbd0
glibc-langpack-niu-2.28-211.el8.x86_64.rpm
912db2618c9b2ede004293087307ae8a515457dea0cd4ecd0f10525efd2505c9
glibc-langpack-nl-2.28-211.el8.x86_64.rpm
e49ffeee574c41336ed4bc227fbb3281ee0c613584520cdfee99ffe0dbcd3c92
glibc-langpack-nn-2.28-211.el8.x86_64.rpm
38cc820d8d84794333b96b804606459c615fe77ad945b4e355b3cd4e00bd67db
glibc-langpack-nr-2.28-211.el8.x86_64.rpm
2b9500454ea68fad039dd16251174c6d402adac8bb174f227870d2e8e23095cb
glibc-langpack-nso-2.28-211.el8.x86_64.rpm
6f74f92eedb92bef6d7a6c814b103c14ae701c68674c21d8a9519e5b5cd3d984
glibc-langpack-oc-2.28-211.el8.x86_64.rpm
540d27004972bc328fc2e06e95d6a862048eedd3de6b9d3516a50fb104ead2e7
glibc-langpack-om-2.28-211.el8.x86_64.rpm
e27ee5282111d2b88c916320c04d16b91a75246af83545b2964762f0881b6e22
glibc-langpack-or-2.28-211.el8.x86_64.rpm
8b739ae556e1385151ce80dd49fb46da31a6ac07475a3bb27ffcdf1df2833976
glibc-langpack-os-2.28-211.el8.x86_64.rpm
6c262e93f8e30c1e4708b69f30160b4371828d075d59a3579464660044a9543c
glibc-langpack-pa-2.28-211.el8.x86_64.rpm
3703353a6ffad9cf46ebb169a1c279b241198b04b94c3ecebf20d03d77a4fb47
glibc-langpack-pap-2.28-211.el8.x86_64.rpm
c5241ee5bec2f0939d89e97e1235da830872c5f65335d9331fbd5e70bf2dc36f
glibc-langpack-pl-2.28-211.el8.x86_64.rpm
947b668d61656552e8e453b9a0d5d3fe6fff2c4bd55ceb088d4f1d3b1332c265
glibc-langpack-ps-2.28-211.el8.x86_64.rpm
c28a24d68dfbd9e6b7ce832d9ada4a27a830c164af7753a546e244b2300a2571
glibc-langpack-pt-2.28-211.el8.x86_64.rpm
fb76f05550ed367221e194aa080e694de437a41b051c0efd717afbcfb7cb77b6
glibc-langpack-quz-2.28-211.el8.x86_64.rpm
f661e2effe803c7b961f3f9dde1d540f0d43324707eae76c76a79bb8cb142c22
glibc-langpack-raj-2.28-211.el8.x86_64.rpm
21a6087a63e4fafdbea986e918729a1e18f0470dc42bd93ec7f9c1c5eca010c3
glibc-langpack-ro-2.28-211.el8.x86_64.rpm
d73e9cc46fd0b568c30579e7b2b5814f8ce59a868d9d29416d5a656646231965
glibc-langpack-ru-2.28-211.el8.x86_64.rpm
5cee3b18ed551ae56b514bea815e09e01e9ff46c2ec595f8b1adc7ffac4869fb
glibc-langpack-rw-2.28-211.el8.x86_64.rpm
32b494030d7c97861c648a10e44573cdc63ee75c03b889e295930590650b633c
glibc-langpack-sa-2.28-211.el8.x86_64.rpm
371f7ff96c32a6241704f85e4e29820140654ea2887f4b6fc083b4b9bdbb9a1e
glibc-langpack-sah-2.28-211.el8.x86_64.rpm
d6f10a6efc208262e99903af229306d47101a2503cf1addc3f7aab0871023980
glibc-langpack-sat-2.28-211.el8.x86_64.rpm
d0f06bde0c9ef3388d006d953f567b146e22256eaa196e6accc4701545b8eb31
glibc-langpack-sc-2.28-211.el8.x86_64.rpm
bc02360eabef233d3858b9cc8cd15978a7df5940eed638a1a5bee0200d6c01c3
glibc-langpack-sd-2.28-211.el8.x86_64.rpm
6a042b20ca73d21e4fc37ea33087d0849699de7e81f37ad6b9566332c113277a
glibc-langpack-se-2.28-211.el8.x86_64.rpm
2c5f3a9075b9e4c8317d67218affae817ca0d07eb7863b26862d9632bb71cb17
glibc-langpack-sgs-2.28-211.el8.x86_64.rpm
338be78ffb73523c6ed2d29ec1e0c4403dabb80e4062be593ff46205c49f5be5
glibc-langpack-shn-2.28-211.el8.x86_64.rpm
06f416eefaf81a2a43d6264057482b3de8ae1667431ef5eaa73995a6b91417ca
glibc-langpack-shs-2.28-211.el8.x86_64.rpm
65880c4d86486e3c4e4cd3a8c648b239bf08d5c766f7949460e5a7a6048eea3f
glibc-langpack-si-2.28-211.el8.x86_64.rpm
cab63a618533c0dc012966ac8386bf8b612269904e36023d8dfd75169fc553ed
glibc-langpack-sid-2.28-211.el8.x86_64.rpm
368aa35c7a1afdb1af851544e6c7e527c713dd01331de1c2b003577cf712c8e4
glibc-langpack-sk-2.28-211.el8.x86_64.rpm
b78ae9a9961f5cd593edce5b2f8ccf6602cde7d8f9a65685ce51b94320a04b03
glibc-langpack-sl-2.28-211.el8.x86_64.rpm
1a29dc1c26a304d5e5100e511b8a4cf6f362c6478acbd426afdc993759200a3d
glibc-langpack-sm-2.28-211.el8.x86_64.rpm
5ad6aed336a39f4f9d430e12fb1194a888f33b19c7e2a0738ee390f7bcd1220a
glibc-langpack-so-2.28-211.el8.x86_64.rpm
e98f301170dfa5c214df1166f91b1e2aa0ef5928a26f9aed124b64bab507a1ef
glibc-langpack-sq-2.28-211.el8.x86_64.rpm
d1f141377c37bfb4691faf97a959ffdf37f9c64b63aa974b4fb0283d2905997c
glibc-langpack-sr-2.28-211.el8.x86_64.rpm
e77e3dbdb504daa7161a8e881fea43900bb93f84a5ab6c9663f40f6eade80033
glibc-langpack-ss-2.28-211.el8.x86_64.rpm
9db7489c5272ecda026233a1b42c34a47ab62e519373bbd3e548e05967796bd7
glibc-langpack-st-2.28-211.el8.x86_64.rpm
35eb7eea9399df9e8aa0c1a17ca5819eac57f237721cf921eeb35f7bf7b7e857
glibc-langpack-sv-2.28-211.el8.x86_64.rpm
c8199e33c5ef77aff0a3510cc7940904c8a3aa0e875a10b863e3824408150988
glibc-langpack-sw-2.28-211.el8.x86_64.rpm
d4b151cd2bbba3db7ab6462da2eaadb97be452ea81e60d2a356bce557e6047ed
glibc-langpack-szl-2.28-211.el8.x86_64.rpm
744c2a96f0b490477c57457329d9d8891247bd01030747bb95708a18268ce109
glibc-langpack-ta-2.28-211.el8.x86_64.rpm
37b795be6ea1a9d317896c4efbdad7708106f971cd974d62f4d2247c471c2930
glibc-langpack-tcy-2.28-211.el8.x86_64.rpm
eb7308a2063ddb7e71eea9ad81c5a6d220dc614a50d3087c309a359d0680349e
glibc-langpack-te-2.28-211.el8.x86_64.rpm
ea559641b6bd68551ee49729ffd9bbe2aa095f3efc394cdb848ec4c346cc5a11
glibc-langpack-tg-2.28-211.el8.x86_64.rpm
3b10265ba7c183a2ab02170398156695aff2da9d090b2f258ffc863f7777f00a
glibc-langpack-th-2.28-211.el8.x86_64.rpm
fe01360cb946f3a6045d6d47c700539508378c30f42e61272a61377fd08fc6b1
glibc-langpack-the-2.28-211.el8.x86_64.rpm
32f00d91c33f313550beff90b6758b70b062b4e3760b730391e52cd66bf1f03d
glibc-langpack-ti-2.28-211.el8.x86_64.rpm
4e540192ae438bce2699e4faabb491f62b2e81a06272ab981cc8d11cdc2452d7
glibc-langpack-tig-2.28-211.el8.x86_64.rpm
03465a52509dda32f1f9eedf84890034877876f456172d388ae69aefcd5ef6fc
glibc-langpack-tk-2.28-211.el8.x86_64.rpm
d664ef530b1d8f97318bb4d51fab38e4b07e2884f60995a23f13b86e1d9fb730
glibc-langpack-tl-2.28-211.el8.x86_64.rpm
d7ee87491daa6d1960b8a308ccdfd3458136fa0b54d020d909f338c52165250f
glibc-langpack-tn-2.28-211.el8.x86_64.rpm
ae11fba30a7055126f39f9500315a2a27959c764c4c94a7620f70ff115fa29b2
glibc-langpack-to-2.28-211.el8.x86_64.rpm
0e92344e660323537a4d9e9e7217cf586eb3f7d12c2ae4afaf5aec3589929457
glibc-langpack-tpi-2.28-211.el8.x86_64.rpm
8314de17011d2e9e8eaa83ac808c7e06b7a3863622448f2f3c452880ae4d3840
glibc-langpack-tr-2.28-211.el8.x86_64.rpm
63313c9815a9bcb48b4a8eb56219170eb6bb32fa67ad50f045325b8057b3cc51
glibc-langpack-ts-2.28-211.el8.x86_64.rpm
1cefcce0296b0faa9b1c7a4e30373f4b9f52cb6b239cf54ef60e5ba75f90350d
glibc-langpack-tt-2.28-211.el8.x86_64.rpm
0a27f3693b203b6f6cc2effe219267336ed4826787608f2c5c494be2adf0f9d1
glibc-langpack-ug-2.28-211.el8.x86_64.rpm
0e9c7296bd63e0267b92278bffd1d48724eaeac6f752cb04804c0087f5680305
glibc-langpack-uk-2.28-211.el8.x86_64.rpm
f85249d70dc081198c63924512439e94ba491a2fff719cf2dd2ebd440144e9df
glibc-langpack-unm-2.28-211.el8.x86_64.rpm
1c0162c0f200c837c808bde800120961100d8b8d0803581469b37f8fb8c3493c
glibc-langpack-ur-2.28-211.el8.x86_64.rpm
fd8c9e0749d3439e218c1c82d334b0a3d59545e39df613a13ce98651edbd2b8f
glibc-langpack-uz-2.28-211.el8.x86_64.rpm
c60c2086c6964f788f40a3630fe9aaeba86456d0d02fa201eced2c6affd56ced
glibc-langpack-ve-2.28-211.el8.x86_64.rpm
75ea8bffddfaf832d5b49594b62359fd33a4a6072752f44b4199abae74f5b237
glibc-langpack-vi-2.28-211.el8.x86_64.rpm
6b540ca86b0881c9fbc1d84e45b2643b729d18c9c670de82cde1162e5eb6f33f
glibc-langpack-wa-2.28-211.el8.x86_64.rpm
356024e400ed63651ed21132676fa51d8e97cfa4596683184a53c93ca9831efa
glibc-langpack-wae-2.28-211.el8.x86_64.rpm
481fd4d0b9429e7fdbf846f4e4bc699ef7bfd3fa1632ef12d2d58e36e3a3c5d7
glibc-langpack-wal-2.28-211.el8.x86_64.rpm
efcf0312bd52f3db6ef951030722e1f6c14f562cabc4c6f244faa342ab8d4e63
glibc-langpack-wo-2.28-211.el8.x86_64.rpm
5fb80d43cc1c1786e22866527c4eca340fc08a4ac353546a5d494bcb3309ed46
glibc-langpack-xh-2.28-211.el8.x86_64.rpm
6f9f16d9ff7e58b5b734f0ed7730ee883547b33beeb2ec356dab365007bfb3ce
glibc-langpack-yi-2.28-211.el8.x86_64.rpm
708ff469b57540b28347756634f3689d940398cdff0b679b3b0c8d3dc9cdeb02
glibc-langpack-yo-2.28-211.el8.x86_64.rpm
bb592d6ae42597f720fcad5e1635044bba94383a3096d3ecf22c4f6333efd982
glibc-langpack-yue-2.28-211.el8.x86_64.rpm
001b8dddd4d34038a3a03e59c76eb2ede3df24f475cba1eacc2b7619dbde4408
glibc-langpack-yuw-2.28-211.el8.x86_64.rpm
e1dfcf0d9913099f1a0294ec0233c5c8ad859222bb77c39a28016814ca9aa8e9
glibc-langpack-zh-2.28-211.el8.x86_64.rpm
4d74ee2e160e5fffceaa826dbba80426d9bb6530bc8bc8c99d64ec28e851c96d
glibc-langpack-zu-2.28-211.el8.x86_64.rpm
fa647ec8ab449cfdee8413ef938f07a19b2ca8ea8c89c791c142e35bda86823c
glibc-locale-source-2.28-211.el8.x86_64.rpm
c83175208f97e929d04ea595ea0df7e93cddc571c62546f4a8707df52d16b300
glibc-minimal-langpack-2.28-211.el8.x86_64.rpm
802ae4e74ce02c9fc87142959e11751c95edd15ea3a2289291cd645662674198
libnsl-2.28-211.el8.i686.rpm
3527560fda4386d3eebbe13b436d70ef72b08b2015ba0010dbf55ce6cfdfcc34
libnsl-2.28-211.el8.x86_64.rpm
7d38cb78423ef1a3c425de81a53d90ffe7874bf84ef4887a6459730f78c642d7
nscd-2.28-211.el8.x86_64.rpm
9c39a3a126fdd6de7b9c29683ba26f53606310fb1e9e7b91658f5838e27b139b
nss_db-2.28-211.el8.i686.rpm
1e4bea2edfc9854cee22bdf11258efd8cedc552e2347250313c357b0395db98b
nss_db-2.28-211.el8.x86_64.rpm
13ab2754dc35a893efcc5316ea052b751eb9391beb23bf08e81c3159230a17dc
RLBA-2022:7686
iputils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iputils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
iputils-20180629-10.el8.x86_64.rpm
3b12faafd3aaa7ad0bdb4a2b9e2a46ffe7c2f6fe17560e329ced2fdb023bf30c
iputils-ninfod-20180629-10.el8.x86_64.rpm
ab939a77cbe6a8842bf16c271119cc41038e6317d051fba258927d0bcf9ef4e8
RLBA-2022:7687
procps-ng bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for procps-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
procps-ng-3.3.15-9.el8.i686.rpm
28e8a84995a7d4813078edad46c068891d58b1425822d11ad312db6b431dc642
procps-ng-3.3.15-9.el8.x86_64.rpm
68cd2593fc4e6587e6d217ad7f031edb276d56c9084ebd4607a0a59a05f90c98
procps-ng-i18n-3.3.15-9.el8.noarch.rpm
df5d21d0a9941e6b283de24c4daefe6ec93e8ceab3e7acce43f3aa91546f6c0f
procps-ng-i18n-3.3.15-9.el8.noarch.rpm
df5d21d0a9941e6b283de24c4daefe6ec93e8ceab3e7acce43f3aa91546f6c0f
RLBA-2022:7688
gcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libasan-8.5.0-15.el8.i686.rpm
794a38d7350f9e6414d48512dfd8b526dedb3e3ee29b476757e57584782cac3f
libasan-8.5.0-15.el8.x86_64.rpm
9af822bd0227e1b4d0aa2f9b266ff8698e4380586985e7cd6063d767e786b42c
libatomic-8.5.0-15.el8.i686.rpm
823677ea219a4c0efe41244bc37da4174a7fb750d667a7c4f8df31a95ede0089
libatomic-8.5.0-15.el8.x86_64.rpm
6f97772b72d85c8700210e680224d94c2b625391de7d6344ee9c5fee66a55a51
libatomic-static-8.5.0-15.el8.i686.rpm
7c38fce98ce6f82e1f228e09f2b123fbd98e194471e2dbdffe8f1421c527edae
libatomic-static-8.5.0-15.el8.x86_64.rpm
76eb6015f89d5be0f6c40202c9b18fab5a4811fbebdc09aad8e81963c5c7ffa2
libgcc-8.5.0-15.el8.i686.rpm
47332a2d467d3b6a66fa13dcac2b5d7059440128757f7bacbac3b2c6704b46b4
libgcc-8.5.0-15.el8.x86_64.rpm
8c66cad2900e8c92f32b30a5f2472cf32e30ee88098bec39ad868c1c8cddc469
libgfortran-8.5.0-15.el8.i686.rpm
e2529d52334932fe1eb7008ffb5ae56150a92d32674fa362d27f3f9bd1497908
libgfortran-8.5.0-15.el8.x86_64.rpm
d47ccb0468adb8ddf31f246eb890b076e24dfdace96bc4b06d046ecc605be3ee
libgomp-8.5.0-15.el8.i686.rpm
4a2e079b1b6ebc70531c6074f1fb79829e313d4753edb2d2bd327878d5926588
libgomp-8.5.0-15.el8.x86_64.rpm
d45a6c6a41508044d351bec3cfb1dc14222ed64cef75d7e2f7051a45f33a885c
libgomp-offload-nvptx-8.5.0-15.el8.x86_64.rpm
ac734747de3a67074bb41287a03aba5721eefdd603f515e8edf6d007ecbe022c
libitm-8.5.0-15.el8.i686.rpm
eac90577c3aae13d77ba4495b5153b0edd51292197230490d74efcded233639a
libitm-8.5.0-15.el8.x86_64.rpm
ccc35b6712684197b4d21057419b5529fa6fd7dfebc7be7ab943fe59a0fb2682
liblsan-8.5.0-15.el8.x86_64.rpm
8d26a050c587169ce68b66e00985598116d8337120f2a9f1c5f1eac6575223a5
libquadmath-8.5.0-15.el8.i686.rpm
2375a3d08efdb3249bbad5215bbf00730398bc4189c970d3dccab805dfa60eb9
libquadmath-8.5.0-15.el8.x86_64.rpm
5287451bb6c6e7749b03b831efae7d5139d4487b74bff4e77a71778b36736572
libstdc++-8.5.0-15.el8.i686.rpm
cab0f6543f2010c1aaac949daf2e4b4898c32bf474c34fbbd1df3484b185ff36
libstdc++-8.5.0-15.el8.x86_64.rpm
4a62b7a7caba2dda46b77bbe00fbfa8cc9e52cc2332c59bcc84dad07666e536b
libtsan-8.5.0-15.el8.x86_64.rpm
742a0839c8c705bdf1459cf4677a56a85c676e34052a85ca9aba620dd98d5043
libubsan-8.5.0-15.el8.i686.rpm
8bdc347821c07627a935cc22fdca1d8de6aed115e58d50cf0f12db259226564e
libubsan-8.5.0-15.el8.x86_64.rpm
aee698d8f7416f71c959e9b169f7e3f59f24c6e522321bdf690ddb05c25a06e1
RLBA-2022:7689
accel-config bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accel-config.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
accel-config-3.4.6.3-1.el8.i686.rpm
25dca1e7b62e95cc42b24fc577fa3b0e74c12b3cb718d014cd261897fc99cbcc
accel-config-3.4.6.3-1.el8.x86_64.rpm
c4a1dce24e77efea0a75de123be3d0352887bdcd9fd883978a4790b9a63d1b4f
accel-config-libs-3.4.6.3-1.el8.i686.rpm
e217932f00996f25c08c9fe4e7d56533396856af4f6c8cf0c7c66253f9ea48ca
accel-config-libs-3.4.6.3-1.el8.x86_64.rpm
05003da79eeb4f7f6dbe6a9e7ee8f9c8bd86a908c493b2eb05c51a5bc0c9d76c
RLBA-2022:7691
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
selinux-policy-3.14.3-108.el8.noarch.rpm
c8034fbd86e19f9162ab575001f2ad66d5dbc900e97fa9a95ae3e70aec8e7dde
selinux-policy-3.14.3-108.el8.noarch.rpm
c8034fbd86e19f9162ab575001f2ad66d5dbc900e97fa9a95ae3e70aec8e7dde
selinux-policy-devel-3.14.3-108.el8.noarch.rpm
cd4a2d1bdf0dd76ab84f0b5d2e5fc51361e2aaa25817bf04f96d968324a47465
selinux-policy-devel-3.14.3-108.el8.noarch.rpm
cd4a2d1bdf0dd76ab84f0b5d2e5fc51361e2aaa25817bf04f96d968324a47465
selinux-policy-doc-3.14.3-108.el8.noarch.rpm
df6debc6a1a0e39d5907151d541899d4fbf35a6ae6689f94404767cd67daa65a
selinux-policy-doc-3.14.3-108.el8.noarch.rpm
df6debc6a1a0e39d5907151d541899d4fbf35a6ae6689f94404767cd67daa65a
selinux-policy-minimum-3.14.3-108.el8.noarch.rpm
09f25bf811f906c626041136acfb157ccad7234b66553a191616bfd087c32eb1
selinux-policy-minimum-3.14.3-108.el8.noarch.rpm
09f25bf811f906c626041136acfb157ccad7234b66553a191616bfd087c32eb1
selinux-policy-mls-3.14.3-108.el8.noarch.rpm
5f9f7e496c7efeb6bd3507ded0921c4187f3a954d1afc8f649f46d293abafd5e
selinux-policy-mls-3.14.3-108.el8.noarch.rpm
5f9f7e496c7efeb6bd3507ded0921c4187f3a954d1afc8f649f46d293abafd5e
selinux-policy-sandbox-3.14.3-108.el8.noarch.rpm
d3b78e4cd13f6102348a39898910ca247f6963937e114f21d5041ee96e8bac55
selinux-policy-sandbox-3.14.3-108.el8.noarch.rpm
d3b78e4cd13f6102348a39898910ca247f6963937e114f21d5041ee96e8bac55
selinux-policy-targeted-3.14.3-108.el8.noarch.rpm
f7d7192718b7ac1997ef75f6d3b4fbc0e4e931ede22df6b538ca0719dcf7e5ab
selinux-policy-targeted-3.14.3-108.el8.noarch.rpm
f7d7192718b7ac1997ef75f6d3b4fbc0e4e931ede22df6b538ca0719dcf7e5ab
RLSA-2022:7692
Moderate: xmlrpc-c security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
* expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
xmlrpc-c-1.51.0-8.el8.i686.rpm
9fa74c02c385e52a6ac9ffabe739bdbced556985b6071f3b77584eccbf353445
xmlrpc-c-1.51.0-8.el8.x86_64.rpm
a479c10be9c0632b5541f0bc879f2bf963461abcd93de0a5b026545c8d140ca3
xmlrpc-c-client-1.51.0-8.el8.i686.rpm
5845b84c7608f14fdf13a38533b53b6c294f0a35e7efb05b99ed0cd4e57fcd77
xmlrpc-c-client-1.51.0-8.el8.x86_64.rpm
447577c58bdde8c8b2d7adddd6de73a68c3de2b47f051d3d30f010992348a762
RLBA-2022:7693
binutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
binutils-2.30-117.el8.x86_64.rpm
34f7602fbd564a454544d50e57deb70341f0e0be42216083f56d837f42eba37e
RLBA-2022:7695
virt-what bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-what.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
virt-what-1.25-1.el8.x86_64.rpm
fabac9bd1b7d15e26a33078807e9a0f4a14cfe3551c6c1a7af0313c2b1fdec55
RLBA-2022:7694
tuna bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
tuna-0.18-1.el8.noarch.rpm
58812fb015dcd75c62973e25433bd7333239d1239cabab22e2d022d60e268623
tuna-0.18-1.el8.noarch.rpm
58812fb015dcd75c62973e25433bd7333239d1239cabab22e2d022d60e268623
RLBA-2022:7696
krb5 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
krb5-devel-1.18.2-21.el8.i686.rpm
5abaab3691e9e5c809526b90aa3d5ea7d1fd73f7325cc03f13bcd7328e0777cd
krb5-devel-1.18.2-21.el8.x86_64.rpm
5ce59851d62de2e31c383e2512b090abe15dbd7c3ba0454e3cfc2c0c3b8adac8
krb5-libs-1.18.2-21.el8.i686.rpm
0b3b4b10c558e2e2289cb5a8330ab5fb3c673b72d7cb092a6fa642b02b8a6ed1
krb5-libs-1.18.2-21.el8.x86_64.rpm
796cbed78d747711d64dc2b8b60c0ca62728062c6258cba9e84e42acd3a6588a
krb5-pkinit-1.18.2-21.el8.i686.rpm
c1418e176ce6005c61418dbf6e2307931cee7131b5e50feb2c2a332ba34470f8
krb5-pkinit-1.18.2-21.el8.x86_64.rpm
29e160152243b5c08f0dd057aec98b9e7937cededbb918429b6918c516907a45
krb5-server-1.18.2-21.el8.i686.rpm
5335a891d4e8977727b2208cd9cf347554adeac378309f13463369eb3b28b2bf
krb5-server-1.18.2-21.el8.x86_64.rpm
aa0bede22958f981c67cc7b023d67bff3ca033d0908d1c72adac0f1701b622c8
krb5-server-ldap-1.18.2-21.el8.i686.rpm
889419149702a7de5a562e6a6f88835164f8465d11e421699c10710faa4928b5
krb5-server-ldap-1.18.2-21.el8.x86_64.rpm
fd9c947f542df096119fc9839dd47bd561f747d56260682c4754a0fe513845cc
krb5-workstation-1.18.2-21.el8.x86_64.rpm
a39e550359f319aa3195adab4634d7d26c853847f9918849f654c7307dd1c3c7
libkadm5-1.18.2-21.el8.i686.rpm
7a3fd0f0b6cb73a78513bf0cba97a2c73814dc42c5b81eb3bc2568690aa3fd36
libkadm5-1.18.2-21.el8.x86_64.rpm
46ff23ed4b7d93deb37e2815773e2c2e22b255afd05b79cb514deef905df44ec
RLBA-2022:7697
python-dns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
python3-dns-1.15.0-11.el8.noarch.rpm
edf964bdcc51d9bed6d9652a1e3f86add29616c7d5ae6e5be2667f7bdb82145e
python3-dns-1.15.0-11.el8.noarch.rpm
edf964bdcc51d9bed6d9652a1e3f86add29616c7d5ae6e5be2667f7bdb82145e
RLBA-2022:7698
samba bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
ctdb-4.16.4-2.el8.x86_64.rpm
0e38640b4ec7e2b978e56acd18714c095400ad751b0968c41a9a05b8f9b0e1d8
libsmbclient-4.16.4-2.el8.i686.rpm
96677390c27d45226df63531a4251761fc54bc978c38d8604dbb028d67e1f7d3
libsmbclient-4.16.4-2.el8.x86_64.rpm
0dd0bb391302d55239191bca072be53b02b3752837b1d77bbe176f8236e24427
libwbclient-4.16.4-2.el8.i686.rpm
0715f9729d460340dd086acf578f59c4cf0ef96186778caffb3e2fdd8aea63d2
libwbclient-4.16.4-2.el8.x86_64.rpm
605b793089abfbf4f92f98e527dd7463dfd40d2387d8c0f317f9707235a291ba
python3-samba-4.16.4-2.el8.i686.rpm
ae97bbfe493c0b4c0027c4601bddaf81fa63e3b0fa2a83633cfcf0f4ca52000a
python3-samba-4.16.4-2.el8.x86_64.rpm
303a580980adeb8ab55d440f8b56fd318e9a104c8d309a1331ae795f84cdb650
python3-samba-test-4.16.4-2.el8.x86_64.rpm
b809fa56fa6fdde3658b15b0656a4a6e8cb410427024fc1003fb916b714ee8c2
samba-4.16.4-2.el8.x86_64.rpm
9cb7f8889b28c4f1ea4e24e38acbaa7759da4c16bb3f5cf8d724407cdb7423b6
samba-client-4.16.4-2.el8.x86_64.rpm
3c1667e71e3c3e196842e00d86bbb17ac92c97fa161f0d5da65579755a0834e5
samba-client-libs-4.16.4-2.el8.i686.rpm
04927bedd964d4d2f8259b02d43b8280da9f236c11fa38a7f02a3c2c54eddfed
samba-client-libs-4.16.4-2.el8.x86_64.rpm
79397bc1743c61409d33178e96ba8bf46c9df89b28b8ba84d90f8b5e28ace651
samba-common-4.16.4-2.el8.noarch.rpm
64ca28af1e9830cd10c7b6f5e971fbed4f5b32f49e10a5a6b35c49b39149566f
samba-common-4.16.4-2.el8.noarch.rpm
64ca28af1e9830cd10c7b6f5e971fbed4f5b32f49e10a5a6b35c49b39149566f
samba-common-libs-4.16.4-2.el8.i686.rpm
e025682b82e5de8f8e9ac5a0656c590314d73606715de686ff5ec608855fd3b8
samba-common-libs-4.16.4-2.el8.x86_64.rpm
2f2abfe87a737b2c8c5b82c3adc66ae80fd57230051e8a384e56ccf00293180d
samba-common-tools-4.16.4-2.el8.x86_64.rpm
b0b8ad30851aef77c97e91aea58105e653135c5ba454bca2beb9ddeff7c2c4e8
samba-krb5-printing-4.16.4-2.el8.x86_64.rpm
d717b197d5142a075413705f5c32bdeff4d7141701206ecd004b4b5ff1d5ab1b
samba-libs-4.16.4-2.el8.i686.rpm
f816b1b248aed264f3e410053e33cf769f1b3e3ce4aa8cfb5de63f4f9e77c93f
samba-libs-4.16.4-2.el8.x86_64.rpm
95cea17d30c85a8eaf60c01f7ef7ae3ba71537e71e5bcfef0de9d13f5fb7ad23
samba-pidl-4.16.4-2.el8.noarch.rpm
4cc8b11a0da7253d955db6718ecb3a2e135c35ee7252f097fa2086390514eeee
samba-pidl-4.16.4-2.el8.noarch.rpm
4cc8b11a0da7253d955db6718ecb3a2e135c35ee7252f097fa2086390514eeee
samba-test-4.16.4-2.el8.x86_64.rpm
82b0fafbfbc000ef9af39979d34eb8cebb3bb3a167d08d5b48e570be5cf5d6ad
samba-test-libs-4.16.4-2.el8.x86_64.rpm
2050207a79247f730a87e4b8a216144c1ccaaccc08c3a00fef7b14db8eff782d
samba-winbind-4.16.4-2.el8.x86_64.rpm
490135536def3c41862706c296f7367cd78c48ed204f4dc434b09f196a46b3a7
samba-winbind-clients-4.16.4-2.el8.x86_64.rpm
02038668ff44e44a719d737e6c626182b206fe163ff56ad208227f0d5e024e8d
samba-winbind-krb5-locator-4.16.4-2.el8.x86_64.rpm
2dc4473eea1bf2dad7aed315b52bee836c73b60e6f7f01994081cb518fb322cb
samba-winbind-modules-4.16.4-2.el8.i686.rpm
615736e6eed27635d8369b5175c5b1fa6efc5aef6fc303bb45e045a34982619c
samba-winbind-modules-4.16.4-2.el8.x86_64.rpm
b94884675f1961552976e7e81d1831dc9b9f805d982fb4e3bbe5e87280c36431
samba-winexe-4.16.4-2.el8.x86_64.rpm
f3043b4ed152a6269f5011d7ebcfd9c41cac7bc5456203d582772a8aebe39769
RLSA-2022:7700
Moderate: gdisk security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gdisk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdisk packages provide the gdisk partitioning utility for GUID Partition Table (GPT) disks. The utility features a command-line interface similar to fdisk, direct manipulation of partition table structures, recovery tools to deal with corrupt partition tables, and the ability to convert Master Boot Record (MBR) disks to the GPT format.
Security Fix(es):
* gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc (CVE-2020-0256)
* gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc (CVE-2021-0308)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
gdisk-1.0.3-11.el8.x86_64.rpm
66ec9a7958e276d05cecf94279a216e66c8664f0b63aac5c53eeb0d34c246190
RLBA-2022:7701
at bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for at.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
at-3.1.20-12.el8.x86_64.rpm
7dad5b93c2f318e53bcba41d9b7dd073961c151779ba5bf41ccfbfd6db4b6f8d
RLBA-2022:7702
mokutil bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mokutil.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
mokutil-0.3.0-12.el8.x86_64.rpm
765e690a5c254620bb629ad9471fe881f91ea5d088986b18237af8e27a1bd466
RLBA-2022:7703
python-slip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-slip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
python3-slip-0.6.4-13.el8.noarch.rpm
969e55a97a50fc39da7bfdd3ef25fe8f31c8485db610e2cbf15586f8e956517c
python3-slip-0.6.4-13.el8.noarch.rpm
969e55a97a50fc39da7bfdd3ef25fe8f31c8485db610e2cbf15586f8e956517c
python3-slip-dbus-0.6.4-13.el8.noarch.rpm
42102433519b624f384a59b9eb824ac7e37d917ee08dda1c3f4c454be89e06d6
python3-slip-dbus-0.6.4-13.el8.noarch.rpm
42102433519b624f384a59b9eb824ac7e37d917ee08dda1c3f4c454be89e06d6
RLBA-2022:7705
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
kexec-tools-2.0.24-6.el8.x86_64.rpm
1fe05da1e61f5df5088315bfd79228ec13ef66cf05249ca78e4ea0ca055a86f6
RLBA-2022:7706
which bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for which.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
which-2.21-18.el8.x86_64.rpm
452c98861a00ebe8903c9ceea28d3cc425e5f35fd5dcc54e21ca7cff331f598d
RLBA-2022:7708
expat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
expat-2.2.5-10.el8.i686.rpm
14da503b589e174e000f72fed6ed217855237422fabe36eba19c573fe65264da
expat-2.2.5-10.el8.x86_64.rpm
cc3b62a23e3dfa72fabd4f06a3d67f261877ae569a68b4119f8fb6980f08c5a4
expat-devel-2.2.5-10.el8.i686.rpm
1e1a8ca5df5d8de797637512b45433375f3db1951ffd0effd47540852c9815ed
expat-devel-2.2.5-10.el8.x86_64.rpm
6d946c3ee2ccfd83c09412e7829bcaf478584f34528cc86ecaa7991be9cb5310
RLBA-2022:7707
nftables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
nftables-0.9.3-26.el8.i686.rpm
1badc4e3078b102614e4b3faf36b6d624c04c95c2054942a98c50dcbf8ea70cf
nftables-0.9.3-26.el8.x86_64.rpm
4eeea5699f800844a942a92a51c16dd7b11caa238c9a3bb0a5d8f10650e9b723
python3-nftables-0.9.3-26.el8.x86_64.rpm
842ffb02c17eb98e7d0ed5e2222e999f77bf720a42b81a01dddf602f74778964
RLBA-2022:7710
rng-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rng-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
rng-tools-6.15-1.el8.x86_64.rpm
2998dd57d15c67862f9f2958611c266982654b665acabd253db464aded8285e8
RLBA-2022:7711
libdnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libdnf-0.63.0-11.1.el8.i686.rpm
24ed0b8c66b23445fe5478e927769d4f93652ae064f0dc0659513155657c540d
libdnf-0.63.0-11.1.el8.x86_64.rpm
5fcc8c4c2a56aaf9023659fd1cecfa7d3ff8b5bac1ba13a55b05ede73ed19ef9
python3-hawkey-0.63.0-11.1.el8.x86_64.rpm
1f8a0ee73be22b830ba2074cedffda92bb189c3d5675c943113824fd0c20ac81
python3-libdnf-0.63.0-11.1.el8.x86_64.rpm
355f01e59ade60cd732a49596bff65584278536cc5184bfb6b91abce805decfd
RLBA-2022:7712
dnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
dnf-4.7.0-11.el8.noarch.rpm
948fff4b3cea109242e6d308e3256bbdcd26f214a044898075f7b8f77a0b80a8
dnf-4.7.0-11.el8.noarch.rpm
948fff4b3cea109242e6d308e3256bbdcd26f214a044898075f7b8f77a0b80a8
dnf-automatic-4.7.0-11.el8.noarch.rpm
2ff731967901546be305af1b8d7452e53e3bb8660c6d00cbf939060977415603
dnf-automatic-4.7.0-11.el8.noarch.rpm
2ff731967901546be305af1b8d7452e53e3bb8660c6d00cbf939060977415603
dnf-data-4.7.0-11.el8.noarch.rpm
48782a17c1a4f7c89035d7eea46f681fce219210e17e727a0f816c0913fe32c2
dnf-data-4.7.0-11.el8.noarch.rpm
48782a17c1a4f7c89035d7eea46f681fce219210e17e727a0f816c0913fe32c2
python3-dnf-4.7.0-11.el8.noarch.rpm
075e1145f2523acd593dc9133ad5d094efa3bf7d76816756b2966a77ee4203a6
python3-dnf-4.7.0-11.el8.noarch.rpm
075e1145f2523acd593dc9133ad5d094efa3bf7d76816756b2966a77ee4203a6
yum-4.7.0-11.el8.noarch.rpm
58f20b0790242c6216c79ee52c72e4edbe869b66aa14e2d8364c41b22aa2b50f
yum-4.7.0-11.el8.noarch.rpm
58f20b0790242c6216c79ee52c72e4edbe869b66aa14e2d8364c41b22aa2b50f
RLBA-2022:7713
libsolv bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libsolv-0.7.20-3.el8.i686.rpm
b20ef1c072f710478d98d52a774a72a9cc5262fed519918f3c51945b4f911111
libsolv-0.7.20-3.el8.x86_64.rpm
fe43d02c561ff2698dbbaaff45de2e833dd87627ae7ff396d6982510aac43f0b
python3-solv-0.7.20-3.el8.x86_64.rpm
1463a99a36051f38291d6a6fc03e23f9d09481026eeeddc30562a2ce67972a01
RLBA-2022:7714
device-mapper-multipath bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-multipath-0.8.4-28.el8.x86_64.rpm
1a3cbcf38fbf179e4de359a446012fae850eca48a2a952514a7cc8bdee2a01e7
device-mapper-multipath-libs-0.8.4-28.el8.i686.rpm
1ca4c24567f107425792367dd86b204dbe27811f87ba97709ff5c63a2fa91303
device-mapper-multipath-libs-0.8.4-28.el8.x86_64.rpm
c516814bc813cff77ffc44c7eb73b7356935ce1bc9017915ed8f5913dbccc567
kpartx-0.8.4-28.el8.x86_64.rpm
9ee0a475618169cb5287ac50497e4fe5fc64659e086f8e87954d8e345aee149e
libdmmp-0.8.4-28.el8.i686.rpm
5ccd01ada869740a5fa71fc18bcb1bdb95f9e032d9a058ddc68f1c96f49a06eb
libdmmp-0.8.4-28.el8.x86_64.rpm
7e853093f40fdbb5d32d6c7275662aecb720696ca436749b778f843cd1a6ceb1
RLSA-2022:7715
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libxml2-2.9.7-15.el8.i686.rpm
20b4039e7fabd2216296eee2940c4476e976a9e985fc998c6c521daa559fcdfc
libxml2-2.9.7-15.el8.x86_64.rpm
ec91cfbefc82671eedca3fe6c54930f37dd83bd55bc4a2780c8a12b1cc74879a
python3-libxml2-2.9.7-15.el8.x86_64.rpm
ceb24cfc2a7d6652d36311e77ffe4865c1e957d605feff42ea6c3a9a6a4270d3
RLBA-2022:7716
cups bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
cups-libs-2.2.6-50.el8.i686.rpm
2fd6a137a7e3b4922ff18201231b35aa0f63b68e792568317ae620ebf17a3b16
cups-libs-2.2.6-50.el8.x86_64.rpm
265a56f7893b17918e27ccb7023bb44b2bd104173146e55992e0bb3188b4e312
RLBA-2022:7717
elfutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
elfutils-0.187-4.el8.x86_64.rpm
7473bda0fa5ae598fa49f84afa0c974a3360ae6a837ae9c25ba4fcf694e4b14b
elfutils-debuginfod-0.187-4.el8.x86_64.rpm
b40e7276d51c80562f8f7a096446efaa0084fd2e533ea5308c7ed916fe834f12
elfutils-debuginfod-client-0.187-4.el8.i686.rpm
8096f309f9dd771ccbeaf1b425f3e58b33169ee9a87990f31c7311adbe7cf3af
elfutils-debuginfod-client-0.187-4.el8.x86_64.rpm
ebf366d9e220aa1a877a1697905844ec8db5a79d88f35e3eccd558b83eb5e8f9
elfutils-debuginfod-client-devel-0.187-4.el8.i686.rpm
4aa6366c39cbf7743ba36dbd66e531c44fa99eb5eac3bd55495247af01f56703
elfutils-debuginfod-client-devel-0.187-4.el8.x86_64.rpm
80de62b9e71da2a6ac9dc910231cbf763ecb3e803c61810f57ff26a302a93b39
elfutils-default-yama-scope-0.187-4.el8.noarch.rpm
b01511cf066f23b46d7e0dbf923e653635f3265b7619d30414a5f1ca25ad6e73
elfutils-default-yama-scope-0.187-4.el8.noarch.rpm
b01511cf066f23b46d7e0dbf923e653635f3265b7619d30414a5f1ca25ad6e73
elfutils-devel-0.187-4.el8.i686.rpm
2a487eb1fbca83182c0db08bf03a77d026fca20984c75f061f2c505a47e6809f
elfutils-devel-0.187-4.el8.x86_64.rpm
9601a685e489a7b4e270dc9bc28bcc8ee0270bdebf564d09cae2fa4a1a7f9ad5
elfutils-libelf-0.187-4.el8.i686.rpm
dfb2e68efcd3577340a9b8d552df2a668ea5c1b17c5f46f513754dbc2c31ec9b
elfutils-libelf-0.187-4.el8.x86_64.rpm
7f55b5cf8ef85d3d21bbe1fab9753b3b6f2c7ac407f26c9de4fb40fa2e00a587
elfutils-libelf-devel-0.187-4.el8.i686.rpm
5332393b378545abfe6082e77155828a1dffa799d59d5b8e56c9ba2749aee506
elfutils-libelf-devel-0.187-4.el8.x86_64.rpm
b5080e0da7d1904c3228bb56b5d471380726106b9423d5d781912c61b6485573
elfutils-libs-0.187-4.el8.i686.rpm
f9e094d0a3f8300d9349c1a4b095212a9b4380b636d539588381f00b7f938fd6
elfutils-libs-0.187-4.el8.x86_64.rpm
bc1f8ef873477bbfd6b1c86ca70251958ef936df068abbe107caea92555e4904
RLBA-2022:7718
cockpit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
cockpit-276.1-1.el8.x86_64.rpm
d226e5f0e7b7bab482f8edc8d28be33cdba4a2380c3f612c187743018ffacfda
cockpit-bridge-276.1-1.el8.x86_64.rpm
6739e52d18742bc329be5b7d5f7ec23e5b65976520e08bf95273229145ec9386
cockpit-doc-276.1-1.el8.noarch.rpm
891dcb760e2e7df7ff43831e2874fb96dcb15aaa16d03baafe7a2f18d06c9787
cockpit-doc-276.1-1.el8.noarch.rpm
891dcb760e2e7df7ff43831e2874fb96dcb15aaa16d03baafe7a2f18d06c9787
cockpit-system-276.1-1.el8.noarch.rpm
e1ecbc2e62b5aca745ed0929da469ae80504d3baecee1fb61a5150cad1ce4537
cockpit-system-276.1-1.el8.noarch.rpm
e1ecbc2e62b5aca745ed0929da469ae80504d3baecee1fb61a5150cad1ce4537
cockpit-ws-276.1-1.el8.x86_64.rpm
26b8e53b96d11a89ebd8c1a5ff17256d9dd79b84fec8cb78b7af8a28fe262341
RLEA-2022:7719
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.32-1.el8.x86_64.rpm
2a4bf35ad6bc63aa96167270eb92be3c5c2f36f53ed8082f8bfbef091bfa1214
python3-cloud-what-1.28.32-1.el8.x86_64.rpm
a2e98a225767c1a148bf43e3652d4d3071a1388456bb1e3b1fddeb731eb3c88c
python3-subscription-manager-rhsm-1.28.32-1.el8.x86_64.rpm
543b45655ca92135d0dfc78815fc1927f4a603ecab8f903f2f72ef056412288b
python3-syspurpose-1.28.32-1.el8.x86_64.rpm
b27ebc6837ff0879903ff0532c80cdfb0e2a9b1f6bfb63791b7bf31ccb348b0d
rhsm-icons-1.28.32-1.el8.noarch.rpm
f644f44033ecb86e842fd031abc77e9749f3fe82ec978af9b936003fa63b8d3a
rhsm-icons-1.28.32-1.el8.noarch.rpm
f644f44033ecb86e842fd031abc77e9749f3fe82ec978af9b936003fa63b8d3a
subscription-manager-1.28.32-1.el8.x86_64.rpm
639b2b58d29124cf8b71d9ca8efd18cd2bd08ef0832426d7866522d3d6ebce5a
subscription-manager-cockpit-1.28.32-1.el8.noarch.rpm
0d02c1271b223de8b704ff7dd8015a0f69d2be13709a4c3033ac7a6ec1b8ba63
subscription-manager-cockpit-1.28.32-1.el8.noarch.rpm
0d02c1271b223de8b704ff7dd8015a0f69d2be13709a4c3033ac7a6ec1b8ba63
subscription-manager-plugin-ostree-1.28.32-1.el8.x86_64.rpm
947094fc36f4fe7412fd35a259f3fe4cecabcf3a17242cfab4821bfce363d242
subscription-manager-rhsm-certificates-1.28.32-1.el8.x86_64.rpm
9e173673bd5d1f608f090d49ff7ac5de1256ce0d1a599228fc20e2576e5bcd79
RLBA-2022:7721
cronie bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cronie.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
cronie-1.5.2-8.el8.x86_64.rpm
b9776e48474af4047000b71d4ef61ffe8f749696836d3a027aa74411811349a6
cronie-anacron-1.5.2-8.el8.x86_64.rpm
d559fcb4fd80e9693ffae611888d0645a38cff787fab6ff0e2a5c01fae2186cc
cronie-noanacron-1.5.2-8.el8.x86_64.rpm
5b63f1de1b158eb8d4e95741e5678ca711acf23cf4c8cf85257a768c47ffbd02
RLSA-2022:7720
Moderate: e2fsprogs security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for e2fsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems.
Security Fix(es):
* e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
e2fsprogs-1.45.6-5.el8.x86_64.rpm
6878cc0c37fce2415f4c330afc1eec5c5e72af50c5b4842183c82ee36c72ae78
e2fsprogs-devel-1.45.6-5.el8.i686.rpm
8e17e2b029075f1d886822e5269cfa6e7a41c995300aef066566cff0918fef9f
e2fsprogs-devel-1.45.6-5.el8.x86_64.rpm
802c56a40eddb2ff95f4db334989bf8341752e7561222dc214ffdcd9a354b710
e2fsprogs-libs-1.45.6-5.el8.i686.rpm
2336a3842e0c82730900f5dd5398c34f2e13534f224d27d375ebb165fcb6cd1c
e2fsprogs-libs-1.45.6-5.el8.x86_64.rpm
f2764b8398e95071999bb2593ab1a01524d1ce88df2a7930c99bf70e7ec6b34c
libcom_err-1.45.6-5.el8.i686.rpm
aca1cf748ad8b024cc0d41e85c1b07518996665d292d68a8acbf3b864cf3df7c
libcom_err-1.45.6-5.el8.x86_64.rpm
7c8a761d037c4aca0f7279f61b7b10762121221442506a6f561834cc60e2bc19
libcom_err-devel-1.45.6-5.el8.i686.rpm
92c80956f9af458c8cd3ef35e8b5868e6b1a62cef72a035524f6671a3c3bdf88
libcom_err-devel-1.45.6-5.el8.x86_64.rpm
1341faa07bc64c3ea21b4e93e204a50e4b5d88daa5a9b169cc5e80bf244f9eec
libss-1.45.6-5.el8.i686.rpm
a9b945dc20f680e2503b5bb6abe545868693a99f09812a679439f8dd6dbbff72
libss-1.45.6-5.el8.x86_64.rpm
bcf9353cbae4b107cde09f7a432e373d3af7c6ad9e2e527e1c8795317f237010
RLBA-2022:7722
libcap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libcap-2.48-4.el8.i686.rpm
8e088341221e1d73eca735a0b07867e2da7e58d269a0e60772bdfd0b570d45e3
libcap-2.48-4.el8.x86_64.rpm
6ae8aa1457bf79b15f68536beceacd24e982067065db2042da7e3a02c7ceb8f5
libcap-devel-2.48-4.el8.i686.rpm
19730f30ef9a226c14da0a2e99fd32e5f78f658c10765ea710de835b802160a7
libcap-devel-2.48-4.el8.x86_64.rpm
0dc5f61bff8797b2ab38229f566b52a0094c56b105205119c21894f8a24509f9
RLBA-2022:7723
pam bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
pam-1.3.1-22.el8.i686.rpm
0f28b06bafe77800475ff9c7164fa267a654349bfc99c2167ef706f1a0488184
pam-1.3.1-22.el8.x86_64.rpm
8f7b51a0ba4cbecf64e8afc85adb217d82138e8a4d8beef8429a14b867522e29
pam-devel-1.3.1-22.el8.i686.rpm
2efabcd0d58814ef5e0220a08b898d024ed7a4983becab900ac11aa647effff6
pam-devel-1.3.1-22.el8.x86_64.rpm
80cd78fdf9ad5c6c1bf5a51cf9e2fadffdcac91be56fa407708f7b633fd564a7
RLBA-2022:7724
zlib bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
zlib-1.2.11-20.el8.i686.rpm
5f66e16baa312f269a0741cf650b809ad52e161ad4dbc884fe69cbe865201fa0
zlib-1.2.11-20.el8.x86_64.rpm
f13232d2485bfdc3eb03d62f53bdfd05e003886ff68f5bd609da49b32b7a44e2
zlib-devel-1.2.11-20.el8.i686.rpm
11a07c4d59d3b8c4b9d4aacf0e518f930beb3642b4b8ad5c26715e3e3bc2f4c4
zlib-devel-1.2.11-20.el8.x86_64.rpm
5aa63ca09326893c34ece592fc1b097c58ac1a95dc5b18524c6946ea5ae05451
RLBA-2022:7725
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
dracut-049-209.git20220815.el8.x86_64.rpm
c26ccaa038491a1eead7b5c00f18661d2aa1a6210af252ea0f76b8a1b6cc39d6
dracut-caps-049-209.git20220815.el8.x86_64.rpm
c45c066989a4cf572f2226e21d19a6567690a71b6ed565dd4f89d256b2704ea7
dracut-config-generic-049-209.git20220815.el8.x86_64.rpm
c9acf987033e75b4b06a8c47221cd8de519b2f0d4f7f73e83b9e5c9165c921bc
dracut-config-rescue-049-209.git20220815.el8.x86_64.rpm
189ac13df7997885485f2d85d45b7639170fd89f4ed042319d9dd9959edda31f
dracut-live-049-209.git20220815.el8.x86_64.rpm
4d8a8fe3d0bdfe356038d05b6022dc29172ec9f9a67e3f5313cd6918352e245c
dracut-network-049-209.git20220815.el8.x86_64.rpm
494b6cd946340982f52e962dac1178497a9dde4861ad5cff12e6d83771b07688
dracut-squash-049-209.git20220815.el8.x86_64.rpm
a9626b589ca1d4e31913372897db6698ed079b485fbc38bf0f194bc0af1e8b4b
dracut-tools-049-209.git20220815.el8.x86_64.rpm
3f1772ef424fdddf170defa2b0a55667f43f3ae813034ea255b18d2f20ff8d3a
RLBA-2022:7727
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
systemd-239-68.el8.i686.rpm
c8f2402530dc268c2ff1284201e5062af3c289410531033bc07b6ca4c1e817eb
systemd-239-68.el8.x86_64.rpm
d50bbfa4cfdb3812d4019b97acb0ea08b6dbd73e3495181b66f98006b71e9e9f
systemd-container-239-68.el8.i686.rpm
62fe9fbbd66db836a640db898067ec8f1a68a3466663d2fe40b9f741acbd408a
systemd-container-239-68.el8.x86_64.rpm
5e3dd27c3a1df2ec935675360f6f6ad1778ee47afe8507fb92335413be879b9e
systemd-devel-239-68.el8.i686.rpm
089bd2eba84a3e31f69478a88db82ff0d948780fd301d1657c3e6e4ae9447cff
systemd-devel-239-68.el8.x86_64.rpm
12dbbe12fefc8f3801c5506db6c2ea8b2d86476c47a3852625a9d816a61d084d
systemd-journal-remote-239-68.el8.x86_64.rpm
0b66a69cb7ee42d01a686707198f276f44cacaee503f13cefa4a942058da59d7
systemd-libs-239-68.el8.i686.rpm
1057f8b8f6c4847c7994d3cd5145a244f0df9622919b21bf9fdab6d66633d49a
systemd-libs-239-68.el8.x86_64.rpm
b7a18c5106b5a4e7c64433480e16dc1e43ad1d03aa729684c79064a1f75cad24
systemd-pam-239-68.el8.x86_64.rpm
bb7f24cfefcb244b76e9ce9e3b3d9246239928034cedb4ff562e4d29c3787e4f
systemd-tests-239-68.el8.x86_64.rpm
cb3f58923f5bb2f8049b798301a9764f16a78c822563be1b4f460f1f9fd68d40
systemd-udev-239-68.el8.x86_64.rpm
acd46f31d4e9ae58f61dd68fd4fee3ebefb166dea1123f1e1bb192de1afcfd6d
RLBA-2022:7728
libtevent bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libtevent-0.12.0-0.el8.i686.rpm
7647cac53e2d36ef6b7785c8638e6af55f3a2175e86291acf548efaf96c41f0a
libtevent-0.12.0-0.el8.x86_64.rpm
7c9572eb5dbb8320b1f0285f696f09f36e95054a1e2837a49a0f89f9ab4558d9
libtevent-devel-0.12.0-0.el8.i686.rpm
0cb719ea90362c921bd6637f186e2afd0e3bb6b898fca2e4aba6723fa021045b
libtevent-devel-0.12.0-0.el8.x86_64.rpm
b4542af7df99638c6f352b42984c32721ca2207fc8871a96baf8afd726f7facd
python3-tevent-0.12.0-0.el8.x86_64.rpm
f5576e09f7206cfe12db8b0115dc7fbe229292bb7707069b23c393a5083dd0e4
RLBA-2022:7729
libtdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libtdb-1.4.6-1.el8.i686.rpm
84f84b5d0763ac4c44ecba4365fe490168b4760c1c05945586d64a5a1207d36b
libtdb-1.4.6-1.el8.x86_64.rpm
896d8869d37997f2f2c9ec749646a6ffffe6ac2e3214abe8b87538a6d0bad112
libtdb-devel-1.4.6-1.el8.i686.rpm
7e35055b29bff26f9f75f6de632070de25a0e8953cd96bab27e94e288bf8a870
libtdb-devel-1.4.6-1.el8.x86_64.rpm
debe9ec4ee8919fd49decd99cfc2830432b32f2afc1dd6b1d03328e49c99b71b
python3-tdb-1.4.6-1.el8.i686.rpm
84633784721381f13711e469de01874c180a8982e43cd5191164640d2575f36a
python3-tdb-1.4.6-1.el8.x86_64.rpm
634ffd38f06ad95f6a0c4d39f7a9f05cc1d232706a4cbff7db342d53705677b8
tdb-tools-1.4.6-1.el8.x86_64.rpm
010c470b6aece7ba5078bd25d678767a3e14537df8b0195a3ca7b9805dd7a359
RLBA-2022:7731
ding-libs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ding-libs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libbasicobjects-0.1.1-40.el8.i686.rpm
df7e6603aebd71eb973bb47ef8f5ca0f1a7349223b6c3946cdf6b30dad4f474e
libbasicobjects-0.1.1-40.el8.x86_64.rpm
bb8c59145267245b9fbe4015f903ffb0e6e7cf67d813a13109aaaa4af95b15a1
libcollection-0.7.0-40.el8.i686.rpm
be08a70fb52e3067529428d492c87e7b2f321fc287ebc0d137cf84200b0cc74e
libcollection-0.7.0-40.el8.x86_64.rpm
3084594020e071c6c0fb640ecb5ec23048987cbc9a46b49d91da9cd086dcbe59
libdhash-0.5.0-40.el8.i686.rpm
7ab4a5939f26477ce98f2ddb69dfd364b8c92e7e31850f9503a5ce69871ee590
libdhash-0.5.0-40.el8.x86_64.rpm
bf2b194833eeb149187efab628e9a99e532ff94a9dac11888aae43c3673458ee
libini_config-1.3.1-40.el8.i686.rpm
4b9898dfc08c85f2bfe58893b444a1990f4d3de360a321755298a59c3734ff64
libini_config-1.3.1-40.el8.x86_64.rpm
1cb5a54f97b62ee8759de04722540d60d3a21e9938e63f3e0f729821cd4109f6
libpath_utils-0.2.1-40.el8.i686.rpm
d0cedb0e95852e113bf555a97516c2518c2368dc8188e3b8b59c86d3fdc432ae
libpath_utils-0.2.1-40.el8.x86_64.rpm
8835e841ec98445af29550ee9b3a5c4b3f844dd71859f29448b8a124f007b762
libref_array-0.1.5-40.el8.i686.rpm
87588ea2b6720ec0871d0ff78eb2b50f5f6e5a8b003cd875f7ca1516a65423ef
libref_array-0.1.5-40.el8.x86_64.rpm
c8ca02aaf38b445e377ead5fbf1f4ca93da2b82ab19ef449c1d59f583f5a2561
RLSA-2022:7730
Moderate: libldb security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.
The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484)
Security Fix(es):
* samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
ldb-tools-2.5.2-2.el8.x86_64.rpm
8491b20ca4c0a1fc70e90a73ad037eda2675e81db9ede946317e5b6d0ed9ac88
libldb-2.5.2-2.el8.i686.rpm
4838dcc13dce2229c6bab0d573e86f6ffe4c6f3d2abd5883a785aee7ec3c7013
libldb-2.5.2-2.el8.x86_64.rpm
ce2b5b6302968060f62d5804d5e4d27e1a230b1fccb78fccf5ef6b33f7e382f1
libldb-devel-2.5.2-2.el8.i686.rpm
f6b55dd59dc61685f0ee37dbfca2cff3dd9103b7efbab2960ad1865677ec264a
libldb-devel-2.5.2-2.el8.x86_64.rpm
ebfc75d131cee929f9b532d4a62967d0b09ef039b98aa5d2a8325f98162a13ad
python3-ldb-2.5.2-2.el8.i686.rpm
a1cc4098a67ab47dabb4c2dd5309b9511992cb83c73e404233b3831c61ce9c2b
python3-ldb-2.5.2-2.el8.x86_64.rpm
b93a9b330665a5586c7188845c74f445672d8ba8df1afb5eff80b76551eb0c92
RLBA-2022:7732
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
sos-4.3-5.el8.noarch.rpm
ee738963148db3a0e089207c8d3eae0476334897414147f59928f771b427fd4b
sos-4.3-5.el8.noarch.rpm
ee738963148db3a0e089207c8d3eae0476334897414147f59928f771b427fd4b
sos-audit-4.3-5.el8.noarch.rpm
11f63711cbf952f7e5f0eaf592db922d8f08a7b93d42604859ac6e2f66c4a4d3
sos-audit-4.3-5.el8.noarch.rpm
11f63711cbf952f7e5f0eaf592db922d8f08a7b93d42604859ac6e2f66c4a4d3
RLBA-2022:7733
alsa-sof-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
alsa-sof-firmware-2.1.1-1.el8.noarch.rpm
a43ba6cd50f9ec68ea27a934bc4a193f2e61d5c25a00ccece3ef94e798e8eb6e
alsa-sof-firmware-debug-2.1.1-1.el8.noarch.rpm
da2f7a90e1d042e3919263f83b90c47b969662446a365394e5503dc127b194f2
RLBA-2022:7734
rpcbind bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpcbind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
rpcbind-1.2.5-10.el8.x86_64.rpm
b36da1043f7f45fd4baaae87a80f66215803bd0f2a9a69c5d03ec9c0df60a4ab
RLBA-2022:7735
bluez bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
bluez-5.63-1.el8.x86_64.rpm
5f7b23929721e93dd87d4f0b2aecebdea31e6508ef16f12d7e69341eeb66d83d
bluez-hid2hci-5.63-1.el8.x86_64.rpm
49bb95c3e4ae87a078866bbf714c358dfa75c32974bb3a63194793344c0dc304
bluez-libs-5.63-1.el8.i686.rpm
5eb53ece7edd5495d30e2ba98edf4d595248ff1f16da1ac4d963b454947c9368
bluez-libs-5.63-1.el8.x86_64.rpm
cf0c60f452cdd6f0e32b44d9bc89d2c8b8c320c64c677272f711713cda6c4db2
bluez-obexd-5.63-1.el8.x86_64.rpm
905ea2875c3e655ceaa0ada6e02c25d4bde91a67b2176ec1d5cb3d334ddd59d2
RLBA-2022:7737
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
opencryptoki-3.18.0-3.el8.x86_64.rpm
f3019ca847472876279dabe05f54f0999888f9ba38671a8ba35080c540e47180
opencryptoki-icsftok-3.18.0-3.el8.x86_64.rpm
04b792172b5105a591733f20edef5ad08672f3d6a09ad3ad614626eca9f5a420
opencryptoki-libs-3.18.0-3.el8.i686.rpm
ba5d8c9997048beb8a3992ac441ced32c33045995f17ed643a7e423b912ebbba
opencryptoki-libs-3.18.0-3.el8.x86_64.rpm
193c3c2fdc2d5f64b2f182e546adcc71f80de8a7a0c144f0678f207988b3a719
opencryptoki-swtok-3.18.0-3.el8.x86_64.rpm
039d4cbd979c052b4ce5be040014175429fb058c8a38008e15d405a29ec1f58d
opencryptoki-tpmtok-3.18.0-3.el8.x86_64.rpm
361cc1915f6611d33e691d832d0faef83154e0e51ea35a8e2a3b5afa121218dd
RLBA-2022:7738
authselect bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
authselect-1.2.5-1.el8.x86_64.rpm
f5885226e8757114cf656b82ad04160e04aef0a9aab87c0e719ef53144cb2a2b
authselect-libs-1.2.5-1.el8.i686.rpm
03fa28f36b3ef8c64d92299f76e860802c14df2735e97ec138d29e1cb3478291
authselect-libs-1.2.5-1.el8.x86_64.rpm
8776c1a2e62ba1f864e7227d6a2cc3d390fb4dcd50bd1649ca95fb79c46b5a28
RLBA-2022:7741
mdadm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
mdadm-4.2-5.el8.x86_64.rpm
ff7f517a8c40e9526dae90f51ad353706ce9c5ad28b6554ae452a1ba4033c844
RLBA-2022:7740
libtirpc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtirpc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libtirpc-1.1.4-8.el8.i686.rpm
ecb32d89a39b95c8e14bd66caaea7605a7c7e10d3cc8f82cb11ac2a117c9337a
libtirpc-1.1.4-8.el8.x86_64.rpm
d8d8f58573146fe53cf97fe46859ea02bd2d9f150a67e174a97d82311ad371b5
libtirpc-devel-1.1.4-8.el8.i686.rpm
43c849d91f4389a1f49dd30c993d7f7d27ab2f5250d532bf648f8141e32d6531
libtirpc-devel-1.1.4-8.el8.x86_64.rpm
3808f6fafd018a080b30c5b862a133824dbff26881902ab1a80307d8a7a5cbd5
RLBA-2022:7742
linux-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
iwl1000-firmware-39.31.5.1-110.el8.1.noarch.rpm
b392e895d3afbd5ed826372f3604d908bab2709f69c6d60d13750e8dc81e3dfe
iwl1000-firmware-39.31.5.1-110.el8.1.noarch.rpm
b392e895d3afbd5ed826372f3604d908bab2709f69c6d60d13750e8dc81e3dfe
iwl100-firmware-39.31.5.1-110.el8.1.noarch.rpm
337a8fea74f082be29c60bee17d47093ef647a922bd506619bbeee0eb55a4da6
iwl100-firmware-39.31.5.1-110.el8.1.noarch.rpm
337a8fea74f082be29c60bee17d47093ef647a922bd506619bbeee0eb55a4da6
iwl105-firmware-18.168.6.1-110.el8.1.noarch.rpm
288ed43283f51c59b7e50a0dc593df6628870840f58321eae575a5b5380fdb5a
iwl105-firmware-18.168.6.1-110.el8.1.noarch.rpm
288ed43283f51c59b7e50a0dc593df6628870840f58321eae575a5b5380fdb5a
iwl135-firmware-18.168.6.1-110.el8.1.noarch.rpm
9450cd2506434c5aec720a8e08bc33338266d96585599046ee05f63459de5ca2
iwl135-firmware-18.168.6.1-110.el8.1.noarch.rpm
9450cd2506434c5aec720a8e08bc33338266d96585599046ee05f63459de5ca2
iwl2000-firmware-18.168.6.1-110.el8.1.noarch.rpm
29f026eb5e715fcb37bbab8ea3c9d27cae17e540ac1c5b573f6aa32625c791f1
iwl2000-firmware-18.168.6.1-110.el8.1.noarch.rpm
29f026eb5e715fcb37bbab8ea3c9d27cae17e540ac1c5b573f6aa32625c791f1
iwl2030-firmware-18.168.6.1-110.el8.1.noarch.rpm
62e23f22cda37774d7119e98c9b10705e1ecf6e0e32ba7c0967e9fa328dce004
iwl2030-firmware-18.168.6.1-110.el8.1.noarch.rpm
62e23f22cda37774d7119e98c9b10705e1ecf6e0e32ba7c0967e9fa328dce004
iwl3160-firmware-25.30.13.0-110.el8.1.noarch.rpm
de4b78e335e5932ba208394cc12aeffc7feed7acb2f18f394f3fb5cc568aba8b
iwl3160-firmware-25.30.13.0-110.el8.1.noarch.rpm
de4b78e335e5932ba208394cc12aeffc7feed7acb2f18f394f3fb5cc568aba8b
iwl3945-firmware-15.32.2.9-110.el8.1.noarch.rpm
2d4181863240f991d144bfdb7647f47cd1fda63b8a3e785bc7ec4111a261dd4d
iwl3945-firmware-15.32.2.9-110.el8.1.noarch.rpm
2d4181863240f991d144bfdb7647f47cd1fda63b8a3e785bc7ec4111a261dd4d
iwl4965-firmware-228.61.2.24-110.el8.1.noarch.rpm
f130043513b361d6ec69c1ad373406524f4d4d80edd8b055f5f0549c4753e609
iwl4965-firmware-228.61.2.24-110.el8.1.noarch.rpm
f130043513b361d6ec69c1ad373406524f4d4d80edd8b055f5f0549c4753e609
iwl5000-firmware-8.83.5.1_1-110.el8.1.noarch.rpm
ceb43de383fa1e590c05ef040b769940f779212ecc27b3c719bd7c1305b43e2d
iwl5000-firmware-8.83.5.1_1-110.el8.1.noarch.rpm
ceb43de383fa1e590c05ef040b769940f779212ecc27b3c719bd7c1305b43e2d
iwl5150-firmware-8.24.2.2-110.el8.1.noarch.rpm
ec9a2076dc4160925ab3972b816ad7a1b6f10297f66f8ad23aaaa5a340550724
iwl5150-firmware-8.24.2.2-110.el8.1.noarch.rpm
ec9a2076dc4160925ab3972b816ad7a1b6f10297f66f8ad23aaaa5a340550724
iwl6000-firmware-9.221.4.1-110.el8.1.noarch.rpm
721c1b80f635aec0e4e243c20f4dd464bf5b1705b369e0a27cee734931d2c743
iwl6000-firmware-9.221.4.1-110.el8.1.noarch.rpm
721c1b80f635aec0e4e243c20f4dd464bf5b1705b369e0a27cee734931d2c743
iwl6000g2a-firmware-18.168.6.1-110.el8.1.noarch.rpm
726669bdca669cf5abe6933d294f1248737844f315371c32716e13501842dd07
iwl6000g2a-firmware-18.168.6.1-110.el8.1.noarch.rpm
726669bdca669cf5abe6933d294f1248737844f315371c32716e13501842dd07
iwl6000g2b-firmware-18.168.6.1-110.el8.1.noarch.rpm
b9cdf0312038d745cd0591bbe410fffec4d0ced7d58b844090da267e7da15348
iwl6000g2b-firmware-18.168.6.1-110.el8.1.noarch.rpm
b9cdf0312038d745cd0591bbe410fffec4d0ced7d58b844090da267e7da15348
iwl6050-firmware-41.28.5.1-110.el8.1.noarch.rpm
1174de416e10dfac15f61ea201d8f54c2da2d71725d8bedcc0cd8daca3a41bb0
iwl6050-firmware-41.28.5.1-110.el8.1.noarch.rpm
1174de416e10dfac15f61ea201d8f54c2da2d71725d8bedcc0cd8daca3a41bb0
iwl7260-firmware-25.30.13.0-110.el8.1.noarch.rpm
2986a3d51b14030af76e3fbe72208d266a3c6ae6afee4af5b4a94eb448b3b043
iwl7260-firmware-25.30.13.0-110.el8.1.noarch.rpm
2986a3d51b14030af76e3fbe72208d266a3c6ae6afee4af5b4a94eb448b3b043
libertas-sd8686-firmware-20220726-110.git150864a4.el8.noarch.rpm
23ad7de4d4084fecd2719465ac68dd0fc87a09e6a02dd989e63dc8246a127752
libertas-sd8686-firmware-20220726-110.git150864a4.el8.noarch.rpm
23ad7de4d4084fecd2719465ac68dd0fc87a09e6a02dd989e63dc8246a127752
libertas-sd8787-firmware-20220726-110.git150864a4.el8.noarch.rpm
8044c8712188cc19e15f04d2d8ffa9829cd3df1f267c8da9ffb4004ab0132b0c
libertas-sd8787-firmware-20220726-110.git150864a4.el8.noarch.rpm
8044c8712188cc19e15f04d2d8ffa9829cd3df1f267c8da9ffb4004ab0132b0c
libertas-usb8388-firmware-20220726-110.git150864a4.el8.noarch.rpm
3de6570a0cbd700a823a5f1a9a2b495e8a26e451517ddb97f5bdbdeb57f0a6c2
libertas-usb8388-firmware-20220726-110.git150864a4.el8.noarch.rpm
3de6570a0cbd700a823a5f1a9a2b495e8a26e451517ddb97f5bdbdeb57f0a6c2
libertas-usb8388-olpc-firmware-20220726-110.git150864a4.el8.noarch.rpm
32493d237acfe25379667ad067edc6306413783fee195ead85258ff95beec859
libertas-usb8388-olpc-firmware-20220726-110.git150864a4.el8.noarch.rpm
32493d237acfe25379667ad067edc6306413783fee195ead85258ff95beec859
linux-firmware-20220726-110.git150864a4.el8.noarch.rpm
a7e4b2efa8026d94832457e29367e854b7aa7e98c4a6adaf1402dd0be61ae2c5
linux-firmware-20220726-110.git150864a4.el8.noarch.rpm
a7e4b2efa8026d94832457e29367e854b7aa7e98c4a6adaf1402dd0be61ae2c5
RLBA-2022:7743
autofs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
autofs-5.1.4-83.el8.x86_64.rpm
f464f194cba239cec02c8af19f2b8c1e61efd86fc5a00915366cc305c40f3767
RLBA-2022:7744
tboot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tboot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
tboot-1.10.5-1.el8.x86_64.rpm
fa9d5d70ba14a39aff185d879f2a76c3253de6bb141803093f972cdcb3fc9b64
RLSA-2022:7745
Moderate: freetype security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for freetype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
* FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404)
* FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405)
* Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
freetype-2.9.1-9.el8.i686.rpm
9dce9e348ff96160fb9f3fe8a1bc1d25888ebabd5b41979dd4e0ce8f232caa91
freetype-2.9.1-9.el8.x86_64.rpm
1f82bd400e0ebd592f64347968c0ae85970230f51bbc8a2e49cf10a08f88526f
freetype-devel-2.9.1-9.el8.i686.rpm
ea527fdb1fce152439d7cc679fe02e5023916e1cd5a3d868e61ceab083d7dcdb
freetype-devel-2.9.1-9.el8.x86_64.rpm
f299047e3abcbd68a1c1503343adad11e59bd4e7d0e0bb0edee3e2b78f0f5ab8
RLBA-2022:7746
zsh bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zsh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
zsh-5.5.1-10.el8.x86_64.rpm
84cf7d7e905e02bcbd6ecebdf426c8d93f065ea402e181a4457bb62d02279374
RLBA-2022:7747
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
tuned-2.19.0-1.el8.noarch.rpm
8e8428e5485fd6f6db1417c72f7dce9ad3115424e79e6df675b4b3f5f9846679
tuned-2.19.0-1.el8.noarch.rpm
8e8428e5485fd6f6db1417c72f7dce9ad3115424e79e6df675b4b3f5f9846679
tuned-profiles-atomic-2.19.0-1.el8.noarch.rpm
a88e4f30555962ab6e526a8e9e1910c7fdb07d208f162f40163134c03adb7cc5
tuned-profiles-atomic-2.19.0-1.el8.noarch.rpm
a88e4f30555962ab6e526a8e9e1910c7fdb07d208f162f40163134c03adb7cc5
tuned-profiles-compat-2.19.0-1.el8.noarch.rpm
2fa950728ee6e10b81ce23f9a11702388d0f78137e31644908e94a84f422b4dd
tuned-profiles-compat-2.19.0-1.el8.noarch.rpm
2fa950728ee6e10b81ce23f9a11702388d0f78137e31644908e94a84f422b4dd
tuned-profiles-cpu-partitioning-2.19.0-1.el8.noarch.rpm
38d1470f454154f2fa1258fd042ab28abf7120b3bf2cbd6c9f147395b6add489
tuned-profiles-cpu-partitioning-2.19.0-1.el8.noarch.rpm
38d1470f454154f2fa1258fd042ab28abf7120b3bf2cbd6c9f147395b6add489
tuned-profiles-mssql-2.19.0-1.el8.noarch.rpm
9165bb6a4d2368005ec46773703e928dff9c64669370e8cad67214a626a6caf8
tuned-profiles-mssql-2.19.0-1.el8.noarch.rpm
9165bb6a4d2368005ec46773703e928dff9c64669370e8cad67214a626a6caf8
tuned-profiles-oracle-2.19.0-1.el8.noarch.rpm
1d51c3da8674233ff884f936846f25d795f3d2345a81459853634a5752b2d9e0
tuned-profiles-oracle-2.19.0-1.el8.noarch.rpm
1d51c3da8674233ff884f936846f25d795f3d2345a81459853634a5752b2d9e0
RLBA-2022:7753
ledmon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ledmon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
ledmon-0.96-2.el8.x86_64.rpm
440d04929f122cdceb5a78df0f295423a85350ba8c41e3b8cf339aa2e14feaf7
RLBA-2022:7752
iproute bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
iproute-5.18.0-1.el8.x86_64.rpm
16d15715ea84fca1abb50b1fd8b9aa31947f394a8e5ae6a0c0e609fa832ddf05
iproute-tc-5.18.0-1.el8.x86_64.rpm
52e2c0a8aac52bbc2d47c767509a749b900e4114a73b67485824c79a61349c7d
RLBA-2022:7754
environment-modules bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for environment-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
environment-modules-4.5.2-2.el8.x86_64.rpm
e29e1480f2d38fdbac6d3862e4ee3e4ccd4370965ea4a43c8eb3067659a98149
RLBA-2022:7755
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
microcode_ctl-20220809-1.el8.x86_64.rpm
c85e7a453ac15e05f9f3c4b5ae8508f8c7f8e940259d160d3874c431f9a5335f
RLEA-2022:7756
python-rtslib bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-rtslib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
python3-rtslib-2.1.75-4.el8.noarch.rpm
d60cd075dbaf1d38752921078ed51980f4f8e1514fcd858de9f30d2dccffe397
python3-rtslib-2.1.75-4.el8.noarch.rpm
d60cd075dbaf1d38752921078ed51980f4f8e1514fcd858de9f30d2dccffe397
target-restore-2.1.75-4.el8.noarch.rpm
fd3ee14675eb7b215e5ec44ed958fbe2647eaf9615fc348ece11375ebaa99b85
target-restore-2.1.75-4.el8.noarch.rpm
fd3ee14675eb7b215e5ec44ed958fbe2647eaf9615fc348ece11375ebaa99b85
RLBA-2022:7757
sg3_utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sg3_utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
sg3_utils-1.44-6.el8.x86_64.rpm
d1fe4e43ef3940d25003839ab92c509c3f2870af90e3581e3c3987d7ff3651d3
sg3_utils-libs-1.44-6.el8.i686.rpm
df2d3ad56bc9e26bc965f7e9725a5e67478c152e178654fc121fa68afd0fb45d
sg3_utils-libs-1.44-6.el8.x86_64.rpm
d5323bca03b3995dc94df82603cea33abc86f88074b7d6af8c9b052327711c98
RLBA-2022:7758
coreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for coreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
coreutils-8.30-13.el8.x86_64.rpm
85c43e908f5262db2ea4f1ee1076cb0afd54b68386626ab0f2f57292859b07ad
coreutils-common-8.30-13.el8.x86_64.rpm
c1b73d361d50078615825ab34bd793e1c69729b7be8151ddd88923a7be42ba75
coreutils-single-8.30-13.el8.x86_64.rpm
10b075817dbc618fcdaf76c4d10b73af4b9bc780442680bd53fc707a7bf63862
RLBA-2022:7759
dnf-plugins-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm
f289b75df81b2d9ad9933b59b05c546239d3def15d0ee3182b9e9bdfda0ca34f
dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm
f289b75df81b2d9ad9933b59b05c546239d3def15d0ee3182b9e9bdfda0ca34f
python3-dnf-plugin-post-transaction-actions-4.0.21-14.1.el8.noarch.rpm
32c2dfc400c7c6e21792d9409b37aca81ab3577e611873017df164f505d1c8e9
python3-dnf-plugin-post-transaction-actions-4.0.21-14.1.el8.noarch.rpm
32c2dfc400c7c6e21792d9409b37aca81ab3577e611873017df164f505d1c8e9
python3-dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm
3ea9ee75f9402e4d86a5b21828a0a49e933508de2b60ae2803eb7bfbd7d31b21
python3-dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm
3ea9ee75f9402e4d86a5b21828a0a49e933508de2b60ae2803eb7bfbd7d31b21
python3-dnf-plugin-versionlock-4.0.21-14.1.el8.noarch.rpm
e3b7dd311d9d0cc78f7aa964edf8e0a8cbe482dd58c82279b55486daf009d973
python3-dnf-plugin-versionlock-4.0.21-14.1.el8.noarch.rpm
e3b7dd311d9d0cc78f7aa964edf8e0a8cbe482dd58c82279b55486daf009d973
yum-utils-4.0.21-14.1.el8.noarch.rpm
8250e9f58056269892bcad80f19fa592c670e47a047082892e452f9b5ea91169
yum-utils-4.0.21-14.1.el8.noarch.rpm
8250e9f58056269892bcad80f19fa592c670e47a047082892e452f9b5ea91169
RLBA-2022:7760
ndctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ndctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
daxctl-71.1-4.el8.x86_64.rpm
2db009dea46521fec1f0577eda6d5bdc455ba5f0c0b046ef96ea91148e38dd42
daxctl-libs-71.1-4.el8.i686.rpm
29b2c8dbe5d2effeb7940ccad0eb8f2f266d4824737cd4fe46687206b7883b5e
daxctl-libs-71.1-4.el8.x86_64.rpm
5329ad794133c3dec1d26aa770f71753f92f9bdd2887366537158cfa4f30add5
ndctl-71.1-4.el8.x86_64.rpm
e908cb04d30da21e4fa19e57b7a71c34fcb774227592513ea0f59a73b87506a8
ndctl-libs-71.1-4.el8.i686.rpm
687fcf24171ea3f371ad1a83c61e4c0b0f468a824f81817736f4ae7c73882569
ndctl-libs-71.1-4.el8.x86_64.rpm
fef989ff9e52a591cf223a073bbfdc478784be0537f442a1702cbeea7297cb5c
RLBA-2022:7761
fuse bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
fuse-2.9.7-16.el8.x86_64.rpm
1dd36ef3a8ac86ff704d22a239ded8375bec1bc91dc5b85bef89b5c795830ef7
fuse3-3.3.0-16.el8.x86_64.rpm
65463d967fd88bbb6be60071c6ca269acc1b4c9cebbfc0d27fa4cdd9672f09ec
fuse3-devel-3.3.0-16.el8.i686.rpm
8c6fcaff38cae406a8207e3b7046d90d3594c6d5c75755f79acafaa13d6a674b
fuse3-devel-3.3.0-16.el8.x86_64.rpm
21437e23958cdc9fdbef7cd71e45b76e9403a8139ea391cdb37328cdcbdf7819
fuse3-libs-3.3.0-16.el8.i686.rpm
4fa79cb8a4084caca342059af92a54b92ef288709d46f82726e89a27a1daae60
fuse3-libs-3.3.0-16.el8.x86_64.rpm
9246992726f5febcb356dc31578003625fc5f950870c0945a97c010b63654b26
fuse-common-3.3.0-16.el8.x86_64.rpm
14178b8cadbc6444e9d2c91b73e54dbccce3e09091580e090ff0e93cb660f097
fuse-devel-2.9.7-16.el8.i686.rpm
dcd66a7adc1abe4933f6379733e5892ddc98321fd00365eefce474efaf5a4966
fuse-devel-2.9.7-16.el8.x86_64.rpm
af93907c9020c31aa6ef34c9909b174abb833a74549ee136295d0d2b2a0f99f4
fuse-libs-2.9.7-16.el8.i686.rpm
73c559172b856ef2f369287a7e5f3bbf2f4c2be5ecbfc90063b4ba01a09b4aca
fuse-libs-2.9.7-16.el8.x86_64.rpm
e75da9286b4da0a4a98e3703d3f9fc0e7d6bf743d00fba521fc0c0fe8f2cde28
RLBA-2022:7762
hwdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
hwdata-0.314-8.14.el8.noarch.rpm
f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343
hwdata-0.314-8.14.el8.noarch.rpm
f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343
RLBA-2022:7763
openssh bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
openssh-8.0p1-16.el8.x86_64.rpm
d7e4c2fb9945d5b508fd1ee38af8d49cde049aa8715272e8ccf9354073ade17d
openssh-cavs-8.0p1-16.el8.x86_64.rpm
0523fa2cf4171bfb8428ce395a8f7b86153afae590795c512ef341bebd387b9a
openssh-clients-8.0p1-16.el8.x86_64.rpm
8911d46d560ae4f55a48415d21b5940f0149a0182a1d69a35281048a6ca7c982
openssh-keycat-8.0p1-16.el8.x86_64.rpm
8e9a3a157cd39709e59f7a9fe6665fca89a020a6880615d7ce2c2543de5b9ab4
openssh-ldap-8.0p1-16.el8.x86_64.rpm
e67e85c3d0a6258e8c686d0719c15e8ffbdd3cea0b64e2818d20596219f3a3e1
openssh-server-8.0p1-16.el8.x86_64.rpm
e64ec8be2351169746bc1fbcc7071bef420d7f46c85f4c43fd6de43ca63ef76a
pam_ssh_agent_auth-0.10.3-7.16.el8.x86_64.rpm
3b72e9cee581fcf2872cf76c018182f6ba8494bc2ee7e9daa8ebd617dfb234e8
RLBA-2022:7764
kpatch bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kpatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
kpatch-0.9.4-3.el8.noarch.rpm
f015d9416b817158f4ebec7c421dfa4c3966e1226934aa621291ae5e6ba14f3b
kpatch-0.9.4-3.el8.noarch.rpm
f015d9416b817158f4ebec7c421dfa4c3966e1226934aa621291ae5e6ba14f3b
kpatch-dnf-0.4-3.el8.noarch.rpm
37135ce718031624a4e063a1279bcd8961fe8672f9aa31d735400e1e96f747bf
kpatch-dnf-0.4-3.el8.noarch.rpm
37135ce718031624a4e063a1279bcd8961fe8672f9aa31d735400e1e96f747bf
RLBA-2022:7765
ethtool bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ethtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
ethtool-5.13-2.el8.x86_64.rpm
dfd42cba11f7a7a68d45bf7e992dc9d8df69acb699d7738a9bf8d0e37c48d0aa
RLBA-2022:7767
libbpf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libbpf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libbpf-0.5.0-1.el8.i686.rpm
6712314790d299a7391107bd9d2f9f9849dfa54f5d3ced677f2b4def0cae0cff
libbpf-0.5.0-1.el8.x86_64.rpm
6804db28d9db3b20c42e00dd248b7853c599850755b02898a60ba7d5e0fb40a1
RLBA-2022:7768
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libnfsidmap-2.3.3-57.el8.i686.rpm
d205e1c36d560634c8183a131774d59e13936cc82ba8a7cafc1c700e92814cec
libnfsidmap-2.3.3-57.el8.x86_64.rpm
e89a1e7f45e931d6c5f9e50ff8bd15b5e211bf118ca1582cfde176ab3f45a609
nfs-utils-2.3.3-57.el8.x86_64.rpm
1cd56d017048cd5cf25dadddcbe2df1d553628f5eeaeb3322c1a4d18e8ec3210
RLBA-2022:7769
dbus bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
dbus-1.12.8-23.el8.x86_64.rpm
ab9ee1bc5bd4c2840f088dc61e995eca2c1eec444cf5df7c10fa5ac722e62068
dbus-common-1.12.8-23.el8.noarch.rpm
58d1cd7b3c07140cc19a76f6d548bbdd99ff5917de84efd15693bca0561e8cb5
dbus-common-1.12.8-23.el8.noarch.rpm
58d1cd7b3c07140cc19a76f6d548bbdd99ff5917de84efd15693bca0561e8cb5
dbus-daemon-1.12.8-23.el8.x86_64.rpm
4c1b129a8eaeb98a754b5317f4cb9ca17c82f655a1024b9230c87564c13e4683
dbus-libs-1.12.8-23.el8.i686.rpm
042289a5816f570dbc5123a915189feec41d3f92cd3f6acc32d87f91f6c7fc66
dbus-libs-1.12.8-23.el8.x86_64.rpm
abeeaa5229c12c1612929559f003ce6d1417517ec2c864a82a3ddaa11d89a207
dbus-tools-1.12.8-23.el8.x86_64.rpm
36feaaf227c012cfbfc2ce439d05a222a4a34b082c24c7d8698fbc9453d24fc8
RLBA-2022:7770
tar bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
tar-1.30-6.el8.x86_64.rpm
efab98a8bb9651748a93b495425c0d17dc6c1da850b0d30872d4729a0ec34bf1
RLBA-2022:7771
device-mapper-persistent-data bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-persistent-data.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-persistent-data-0.9.0-7.el8.x86_64.rpm
044f1aaba91ba9d2c90f8531789d2fbd60799f01526c1a5217dcb3640830b785
RLBA-2022:7772
smc-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smc-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
smc-tools-1.8.1-1.gitbbf7e8c.el8.i686.rpm
eaa450a93cd9024021154185730f5f685667c98a94c937c405555866db79e6e9
smc-tools-1.8.1-1.gitbbf7e8c.el8.x86_64.rpm
7241ee64d7d1b6889a6ae5166ef3c0e5214ec78bbf99e28fe7b9e88068e01c34
RLBA-2022:7773
setup bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
setup-2.12.2-7.el8.noarch.rpm
e470141a5e3db486e3c26d6d071677489888b09e703093d3f59e22e30b92e155
setup-2.12.2-7.el8.noarch.rpm
e470141a5e3db486e3c26d6d071677489888b09e703093d3f59e22e30b92e155
RLBA-2022:7774
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
sanlock-lib-3.8.4-4.el8.i686.rpm
3f29cd0fc7355939a43f9e8f493c742d93d7fa4b0876e51ce6fe73eaea902466
sanlock-lib-3.8.4-4.el8.x86_64.rpm
e1724861f92a7541935abd89c970f8061e71dadb0039012c2b09d012315792b8
RLBA-2022:7775
libnl3 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnl3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libnl3-3.7.0-1.el8.i686.rpm
a97aa930657f138f74d615459864b7509f661fe25ae806e432d004d2926d9d31
libnl3-3.7.0-1.el8.x86_64.rpm
d00c37fd814a045c8c326c5b0536bab368ec26968df7e9e78be20d69036ce822
libnl3-cli-3.7.0-1.el8.i686.rpm
c3d01a1349475e3bf9114d32a08f626c992289406040d9a4d0ea1c363e8aac76
libnl3-cli-3.7.0-1.el8.x86_64.rpm
34182d7931963bb255228c6848dc424f1e625c9ed14856845e2f89941d41b95a
libnl3-devel-3.7.0-1.el8.i686.rpm
b049d614b2e0ba3f6f3a28ff93551fabc83cf947077eff6414e610ce04f6c18e
libnl3-devel-3.7.0-1.el8.x86_64.rpm
5ae6118352b477eb58fd56b912285d2570e1b229e7452c15ffa0c576c26e23dd
libnl3-doc-3.7.0-1.el8.x86_64.rpm
3bef795f0918019528d4afd733a5c35a52d7fb853eb17b1a5d5ffe44c8786be2
python3-libnl3-3.7.0-1.el8.x86_64.rpm
19371d7a59cd21f139d69c82d8629d86435c804933a150475b1cc7c2c43db0c0
RLBA-2022:7776
libverto bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libverto.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libverto-0.3.2-2.el8.i686.rpm
6680eeb2dac04fab86f176fdaa529a5e851e20bae4441e5d1bc05b56f3a6929f
libverto-0.3.2-2.el8.x86_64.rpm
710a6b9deeb18e8e2972bc6738cd1ac9403c60bc5c2a83c6229be69075aa0a4e
libverto-devel-0.3.2-2.el8.i686.rpm
4b6a6142785325894d219fd6cf278fc070bdb9716b0d2d0c504f311681b704b1
libverto-devel-0.3.2-2.el8.x86_64.rpm
85586f38601b774aecc92dd4120d3ea30a3ebd76a6230d9d837b9a5568f8f683
libverto-libevent-0.3.2-2.el8.i686.rpm
2eaf4ac2fe5475a7162e970c98186ecfc2578af10b4fb8fabd3079c102684b52
libverto-libevent-0.3.2-2.el8.x86_64.rpm
13f0a8a52f183415653de09d4d477ca5f9d6c56607907a2a700e68755a503030
RLBA-2022:7778
kmod-kvdo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo, vdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
kmod-kvdo-6.2.7.17-87.el8.x86_64.rpm
2ee09279c8ea781c9de5b302b306faf283f5c9f4624764300f97950b8ca444d2
vdo-6.2.7.17-14.el8.x86_64.rpm
2e0cb47cf000e908c58b4c2d00ee7bb85423d221a01aadc1d0a71ddfc0cbd229
vdo-support-6.2.7.17-14.el8.x86_64.rpm
104483d8f3a77961955600b48e11ac27982f3f8c7bcad2e73cb42239892afa0d
RLBA-2022:7779
curl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
curl-7.61.1-25.el8.x86_64.rpm
325023f3237487450b5c5e99b372de6c03bf1bdb7edeef0c5285f6623c0c042d
libcurl-7.61.1-25.el8.i686.rpm
b087da492343f97fd88528f36e4619745db9d2129c8f5da92c86782dd2b12ec3
libcurl-7.61.1-25.el8.x86_64.rpm
89d300df2a78b12e95873a29e498cc09915845c7ff81c9014517596b33adbd0a
libcurl-devel-7.61.1-25.el8.i686.rpm
14884c1bd516e586db669da3dd8744ae9f43ddc1531b1f1480a4121c14064d94
libcurl-devel-7.61.1-25.el8.x86_64.rpm
e08ee177b14f2354e560f60c6e4b6fe937083561734f440ee25acfcb62c3a7fd
libcurl-minimal-7.61.1-25.el8.i686.rpm
4836f6f55058345e13d53384b41ea76e742a9daca6a90eb0cb2671ff90f9d6e6
libcurl-minimal-7.61.1-25.el8.x86_64.rpm
e6df6651340a2b6bddcf150b1128c42aea45ba0cde44878e3b7b8644381a2047
RLBA-2022:7780
librepo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
librepo-1.14.2-3.el8.i686.rpm
be0195a91bf5a95f66c951f9adbfa541b7fbd109d6d0d06f987fbf74a30058ae
librepo-1.14.2-3.el8.x86_64.rpm
156746e163f17cd7d79818e9cc14e2ed0c9065dc150d7815bdb2f705d54ce7ff
python3-librepo-1.14.2-3.el8.x86_64.rpm
924fd2e18a17401a53349b42708d0e54f261eb125e9bceba86733ce569da0353
RLBA-2022:7781
gdbm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gdbm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
gdbm-1.18-2.el8.i686.rpm
e05306d406c87c995be1d2db87b5a82afbf8ccbbd5b6fb38fd0d0cecafd8542c
gdbm-1.18-2.el8.x86_64.rpm
0101595236571d8dd468551c0f95777ec232bcc84c2fe197b4f251d85c90346a
gdbm-devel-1.18-2.el8.i686.rpm
df167e1c22bc73c33aa29e5d3b69774d52d3672ae1c304a8471fc32c57456498
gdbm-devel-1.18-2.el8.x86_64.rpm
d75c1167d87edfc167b8072d2afea4317338b725b7bc04ebab7808b25cbefd0a
gdbm-libs-1.18-2.el8.i686.rpm
a9479d38496e471bae6ad6c2d8a13e7332a43fc1105346fab630b8c435df1643
gdbm-libs-1.18-2.el8.x86_64.rpm
dd0f839da095f72e05136e59de39e42be7034358f352b8fef632678c5d7416be
RLEA-2022:7782
strace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
strace-5.18-2.el8.x86_64.rpm
1e631e0f63c4e6fd898d0ab6c416f10002ee49bce280ccaa79cd74ec7e9b15be
RLBA-2022:7783
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libblkid-2.32.1-38.el8.i686.rpm
41ea6a497b5cf0c39b28f85d0ce94201f362df01fb258cef627df69b49693f89
libblkid-2.32.1-38.el8.x86_64.rpm
b66111077572921fcad790fda05e0861e04cc7588d45ef2ee1769056c55f49a1
libblkid-devel-2.32.1-38.el8.i686.rpm
5cf5161d95460eed9865d0bb0c4cf0ccaf1b6fd2483c6cd727f0823137afb89a
libblkid-devel-2.32.1-38.el8.x86_64.rpm
f2139bd977427d66938bfa43f46f9d8c2ebd00ef55df3c0d92910c40c0ec760b
libfdisk-2.32.1-38.el8.i686.rpm
5bd5405f56aa6c1440a7d7f5ea1e82a97895961ed16c8f77bfa4c9c0e295b5d2
libfdisk-2.32.1-38.el8.x86_64.rpm
b7dc8609548bb5b36a5baa6d7cb7d853bd83440e9f0b08dd53f24d735f42043b
libfdisk-devel-2.32.1-38.el8.i686.rpm
43e0c97e32de8fb15ec1af6152679003f9be58c6674b4bac2ee544eb8f51ded3
libfdisk-devel-2.32.1-38.el8.x86_64.rpm
0ff823161e4e0697cb03e6a4f1139cc2ca1b377b0cdccdc3e636da37d358262f
libmount-2.32.1-38.el8.i686.rpm
61c1005a375e4bbff97ea064d6b2291e2aa318b70a04cafef86400bb8952ac5a
libmount-2.32.1-38.el8.x86_64.rpm
05edca78074a0ac2ab06c76a2bff252594783d2d91049e0702077a1b83a8dfa6
libsmartcols-2.32.1-38.el8.i686.rpm
164e993ec46a6fb3c73a7571bb7b01ddd8dd50cc35e9c3f0c6f973d1f014504d
libsmartcols-2.32.1-38.el8.x86_64.rpm
a3b1b7735ab0ded07cc2764478e9a0c473c1dba79dc6899676ea4fd054b8999f
libsmartcols-devel-2.32.1-38.el8.i686.rpm
d0e95aa6d035096a390052c11c11d3f8a32ad863e8f831bf55199071471b8a1b
libsmartcols-devel-2.32.1-38.el8.x86_64.rpm
259c78dc4de17753bdba24d694746a3fef12e50ca48ab7e95b6cbc13502a5464
libuuid-2.32.1-38.el8.i686.rpm
418241b17e8e5517d4431b016bbc1f403386775cc73b80cd58f6c73806193be9
libuuid-2.32.1-38.el8.x86_64.rpm
031688455169a37c3dba3e95b3aaf3bfce49582f7606ea234b5aea9ad50fe4d9
libuuid-devel-2.32.1-38.el8.i686.rpm
ab9b3c200c8be3befdb57dbbe6b0eed13d543a72426882b74ddb38601573c6df
libuuid-devel-2.32.1-38.el8.x86_64.rpm
c8d68ff48762cfcf73bb888e13f54a9fedf4151c85ff426ae09d494d4425a1ad
util-linux-2.32.1-38.el8.x86_64.rpm
96e990f0a0dc107325b5584ba06ea201db8fba2b7bf9f23ffe2ad0b6a41d9b43
util-linux-user-2.32.1-38.el8.x86_64.rpm
1628cba8e3975a9bd17b9a50ccff51ae1d922aa4b350e22d150bc537a4a9bf0d
uuidd-2.32.1-38.el8.x86_64.rpm
995450a2fee330947120b0ef2a23d4d2a5627d1e58c403c3288914c3dddeae85
RLBA-2022:7785
nvme-cli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nvme-cli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
nvme-cli-1.16-5.el8.x86_64.rpm
641f73e6bb125148b6f5912ddb15a0b9959c8819e67333fa51d401a0e39fa41d
RLBA-2022:7786
libselinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libselinux-2.9-6.el8.i686.rpm
9f0694cdfd4caf22134ec447194e1cc9f30485d608d2e61ac447163e773968b7
libselinux-2.9-6.el8.x86_64.rpm
423470c18dd1ad6a879cde958e49eef317fa355518fc6429c89e575470a2a032
libselinux-devel-2.9-6.el8.i686.rpm
ae512605064d3316067e93826a46c2ca5cf473f6738b1870ec282b5e25a0d5d5
libselinux-devel-2.9-6.el8.x86_64.rpm
608c9f979b4902a2b459c04cce7116ee66bc47ba4d2fd350b3bfb421b2569a67
libselinux-utils-2.9-6.el8.x86_64.rpm
0302c3f0ef5abbec721ed4190df66398201bdec081b7174d8a3fbb08af2a38de
python3-libselinux-2.9-6.el8.x86_64.rpm
2d901998c4c6d5e349e3ec24ce937a8afa70ea7a19a1c4e8021965d2c7f69b03
RLBA-2022:7787
irqbalance bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for irqbalance.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
irqbalance-1.9.0-3.el8.x86_64.rpm
48e013d3431e850695e3c2119a5b2990938b05433024c680adf145893b8a6af1
RLBA-2022:7788
libarchive bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libarchive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
bsdtar-3.3.3-4.el8.x86_64.rpm
60dc3f9c516d80b1833501d71cf7699076f677678edcdcaab7af11170f93553c
libarchive-3.3.3-4.el8.i686.rpm
93b2e2e1fcc631fab89da18aa808a754880df0c49672a82f7e8f65f8bc1bf353
libarchive-3.3.3-4.el8.x86_64.rpm
0253d5d22ad86d07bbcc9d7f58eecfa107aaf82b51f55fa479443504d8d67c14
RLBA-2022:7789
dhcp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dhcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
dhcp-client-4.3.6-48.el8.x86_64.rpm
fe55adbc8c0cfc4a2f34f6154677191356a4c1b7782ccbf0d7ce7d4403e189c1
dhcp-common-4.3.6-48.el8.noarch.rpm
e13712a0dfd2a88079f47a1507913848a61e238fc82e60d20c863c7a1594124f
dhcp-common-4.3.6-48.el8.noarch.rpm
e13712a0dfd2a88079f47a1507913848a61e238fc82e60d20c863c7a1594124f
dhcp-libs-4.3.6-48.el8.i686.rpm
f84ab270b9e281a7c14c3dd557fe667108786862347f786cbe47a1ef3f9acf39
dhcp-libs-4.3.6-48.el8.x86_64.rpm
f3e8f4377a036846400a0e154b909a5e386572f8cded19aa1224605c76589da0
dhcp-relay-4.3.6-48.el8.x86_64.rpm
0da139aab0f7af5130c0740522718c4f481cd8dbffa44113c58cbc4c8192a0e0
dhcp-server-4.3.6-48.el8.x86_64.rpm
ba6ef796723829517985e83629c2b7fdceaaf3f499d377de48a2851d2a3c4bae
RLBA-2022:7792
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-1.02.181-6.el8.x86_64.rpm
cdb9e1ea18556615608aabd0438080ba1e8fa1570d648995a5e0b8e59f67de58
device-mapper-event-1.02.181-6.el8.x86_64.rpm
68cca29505970555116252762305b5f9b731b07f3ffb6d227a6496a68fed6a7b
device-mapper-event-libs-1.02.181-6.el8.i686.rpm
6ed231ce83ebaba08434e900e2c42ec6904d449b8d892949b1bb61ecb9434e4e
device-mapper-event-libs-1.02.181-6.el8.x86_64.rpm
05bb1f60bc250e7ea7e136c6a3dc8303480f192c45c9503921a0431d7cd6a692
device-mapper-libs-1.02.181-6.el8.i686.rpm
ac8a738b464a8ef2307604d2c385bbfba5505000d99080e339ae66a708376ed8
device-mapper-libs-1.02.181-6.el8.x86_64.rpm
4a00d9b4ef66d7fdc814014c171b55f0acd4cb9c1f6382d209404dd27155fbb6
lvm2-2.03.14-6.el8.x86_64.rpm
95acc19f606a237a4938deb6ddbb7cf1aaccf05038d9877dcb684fd4c6ef881d
lvm2-dbusd-2.03.14-6.el8.noarch.rpm
2c066ef7fb9501e667b432d9a0d6dd02d4f161695de7bbd3e66530a654621db5
lvm2-dbusd-2.03.14-6.el8.noarch.rpm
2c066ef7fb9501e667b432d9a0d6dd02d4f161695de7bbd3e66530a654621db5
lvm2-libs-2.03.14-6.el8.i686.rpm
d590d5cb607d4707bd81a65a49b7a9467dcd52fe94fb2f09fe93a142c5954db7
lvm2-libs-2.03.14-6.el8.x86_64.rpm
038e02edeb320c8d7eb32e8e3bbc430cfa9e108366e857ea752af8aebfdb52fc
lvm2-lockd-2.03.14-6.el8.x86_64.rpm
1e9e147a17515d42774f73f03029df0dff4be7c69d8b73315dc057141fd9b7b0
RLSA-2022:7793
Moderate: rsync security and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
rsync-3.1.3-19.el8.x86_64.rpm
485d93c8b35fa83c50acc71fb4b8f6313f4241b1c940a94d3b2ed7d55ac52c82
rsync-daemon-3.1.3-19.el8.noarch.rpm
3c1e198412a68878c3ce5e1c516ba4b700a0eda6ee00e63eaace2e467b5b0edb
rsync-daemon-3.1.3-19.el8.noarch.rpm
3c1e198412a68878c3ce5e1c516ba4b700a0eda6ee00e63eaace2e467b5b0edb
RLBA-2022:7794
shadow-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shadow-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
shadow-utils-4.6-17.el8.x86_64.rpm
8e9343148d8c00c2b88bf3a5140ff5a6864cbfdc5d84a043aa0bcaa5057f9912
shadow-utils-subid-4.6-17.el8.i686.rpm
743d1edd2d65a4f9fd3a73f8cf6453fedf0204729bd4d4165b772d38eb62cec5
shadow-utils-subid-4.6-17.el8.x86_64.rpm
7d89b766c6e153e62d95d73836d908f0a3350cf6332f679f6da006fd06915d1a
RLBA-2022:7795
gssproxy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gssproxy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
gssproxy-0.8.0-21.el8.x86_64.rpm
c26e6967b01c674a95f25d9f4a17ee45e2a44787bfff580ee7e7d3dd80cfe767
RLBA-2022:7796
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
iptables-1.8.4-23.el8.i686.rpm
30094d62a7adb75b4c0725b99416a015e2696ef595bae4d5a2a722a4bfc5a5d1
iptables-1.8.4-23.el8.x86_64.rpm
90be5c35287cb2a091ee668de356b878e0fc05296b8bafc946bfebb2beca90c0
iptables-arptables-1.8.4-23.el8.x86_64.rpm
8dbac2dfa89da6102a3a089ff10a68d4481378a0540a3a7f8988959e046338ad
iptables-devel-1.8.4-23.el8.i686.rpm
1037fb6e4082942c0e546359ba80c7bbaea086348822b4eae528e1a7594ff462
iptables-devel-1.8.4-23.el8.x86_64.rpm
6b2476d8e16da9a51627ef25038853f2cfdf4b71d0f1c4de1988d562020a5a62
iptables-ebtables-1.8.4-23.el8.x86_64.rpm
ae9928b04d3114a4dd309a0a3f83297f9fe48cce260cd659ab1c6723366be635
iptables-libs-1.8.4-23.el8.i686.rpm
b3aa2e12ddea071f3421985f5a8a17d3b0c8ea07cf91e7308b22edd29c725c33
iptables-libs-1.8.4-23.el8.x86_64.rpm
8183dbd14af2f4d4c0565a7a35fbd7aee8f0ec7fbc8ea9f771f1e35b59d48f44
iptables-services-1.8.4-23.el8.x86_64.rpm
bed714e31076aec37fe5051bbe40ba22865eb14d60bbbc860e438caf697ef3aa
iptables-utils-1.8.4-23.el8.x86_64.rpm
c7e79600566d67c1be9482bad8279a802d1ff9c7f7db3be4b5024a0d99ccb301
RLEA-2022:7797
RDMA stack bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
ibacm-41.0-1.el8.i686.rpm
ba89afcf9eb64798534fc656ad5c2cbbbeb52941d0dfd9cf2d41d2ba7912b090
ibacm-41.0-1.el8.x86_64.rpm
ea98632e58d4a819264c1f65caec0579fbfed0a4e8422e7d59d0471dee4ebbf4
infiniband-diags-41.0-1.el8.i686.rpm
22dc8b3be55c9acf31cfa2fbdcc2687165730e30da9005348b59802cad33f022
infiniband-diags-41.0-1.el8.x86_64.rpm
c0ca319daac1ba7258b15b8c1100755d024628b263c2be05128c9d3fcd60a64e
iwpmd-41.0-1.el8.x86_64.rpm
251d14b43d463fea2c2b0762e34010511fdcbd422f7af59aaa845ecbff8560a7
libfabric-1.15.1-1.el8.i686.rpm
83b9fe009e02ae6158d2bb327447b64d62893dad9e5759c15738b60b56e6665e
libfabric-1.15.1-1.el8.x86_64.rpm
642ca45a7f9d2bcd71ba9259ffaeafec7dd295cab28b525f6025f8d127935092
libibumad-41.0-1.el8.i686.rpm
13ac8b1281aab95daef146d775ee9367cc33ccf85c04da2228ce91855709c87d
libibumad-41.0-1.el8.x86_64.rpm
9f7ecc14fc7c5dfb5f209f47f044e39eac739c18b7ad1e58d471eef0972710c4
libibverbs-41.0-1.el8.i686.rpm
1e7a51a371ceef4781b28c60f3a3040440a9bfaa7e7cce97d8ec651cf6b471c2
libibverbs-41.0-1.el8.x86_64.rpm
3475dfb56a09b2fa163582d734333c4b159f0aa20b0e035caea2d1be575b9d9e
libibverbs-utils-41.0-1.el8.x86_64.rpm
1218c5ba6414f18fbc91465604a6d4cb9d3b1fdbe1dac8b2a8718d52730fad85
librdmacm-41.0-1.el8.i686.rpm
e8165d622fd68a64a74a157597db0f1faa0f4cae2307c0b0e480ac01e9ae7406
librdmacm-41.0-1.el8.x86_64.rpm
97d3734c519bdda0317beb19432d97d69cdd939471ac3432331414d6db5e929a
librdmacm-utils-41.0-1.el8.x86_64.rpm
ed69cb24de0d5433bbb0288a5e37e31363323e5e7d367883ea4d12ab3f79b233
python3-pyverbs-41.0-1.el8.x86_64.rpm
f28e000b6f672c560cbd4186a2231d7e67b3de5e4f034ae8435d3a2491b1f5dd
rdma-core-41.0-1.el8.i686.rpm
e4f982d3222311e9e3f906218a3c7cad8a7942a5c77cc1e336114d129d2ecbe8
rdma-core-41.0-1.el8.x86_64.rpm
aebdd77340d5319f8a53cfc00bdccf61170ead519381a1abe1515071093c9052
rdma-core-devel-41.0-1.el8.i686.rpm
fc7fc96ad8d32adfc0a7ed07ff78d82fc5ace4573c56987220b0a0ccf8754796
rdma-core-devel-41.0-1.el8.x86_64.rpm
cf756155e85ced149f6e83cfa3f6842b0af926f65221a935aa335fcc69f85134
srp_daemon-41.0-1.el8.x86_64.rpm
431b1a1d10739bd561d639afffdebf680bf0fa59b0328df2f14543ceb1741dd5
RLBA-2022:7798
initscripts bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for initscripts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
initscripts-10.00.18-1.el8.x86_64.rpm
6c0475cb1f7e0d3c7b6658f969e0a01d5935798888bc31da2b42e36acbcf4f2f
netconsole-service-10.00.18-1.el8.noarch.rpm
01a0b14c2c9286a8dddb8b86d432c0319feccbfbfd26c9e5a11aac1513d7aa6d
netconsole-service-10.00.18-1.el8.noarch.rpm
01a0b14c2c9286a8dddb8b86d432c0319feccbfbfd26c9e5a11aac1513d7aa6d
network-scripts-10.00.18-1.el8.x86_64.rpm
533302779b9f3be8acf89b05f4894406bc5452e87b50e424000467be92345f2f
readonly-root-10.00.18-1.el8.noarch.rpm
cdc79cf85b3769685f257187953ec57a5aa8bbd06dde1e28b832acbb5a5a2f22
readonly-root-10.00.18-1.el8.noarch.rpm
cdc79cf85b3769685f257187953ec57a5aa8bbd06dde1e28b832acbb5a5a2f22
RLBA-2022:7799
grubby bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grubby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
grubby-8.40-47.el8.x86_64.rpm
d9bcc2da7a8dd7f29bb15b413ad4ff9e3ab0ddf5b1c11fee90f1e188f10d4167
RLBA-2022:7800
tpm2-abrmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-abrmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
tpm2-abrmd-2.3.3-3.el8.i686.rpm
655bd05a8d2cad691fc56f70531ddc3c399400de037a9acd8d3cea50961353f5
tpm2-abrmd-2.3.3-3.el8.x86_64.rpm
52bf5ce4765fe3967f39695aae1e0b8d05501685d6248c494818cade9ea05f06
RLBA-2022:7801
memstrack bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memstrack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
memstrack-0.2.4-2.el8.x86_64.rpm
56e9e38fe7b34215f6b68f6729a14011a248ec43ed116413b8d1d70750294681
RLBA-2022:7802
liblockfile bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for liblockfile.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
liblockfile-1.14-2.el8.i686.rpm
bc32a71cee2ceb8d0faf1b4ad207a715b4234d119afe69628e87a03aa49e3cdb
liblockfile-1.14-2.el8.x86_64.rpm
61157f747e39923f3a6ca2d1cbaa42b5c9ae3b6cb9786f76c997fd823f446fdd
RLBA-2022:7803
libtalloc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libtalloc-2.3.3-2.el8.i686.rpm
c97e197c7f2e4d0aae61b729e6577162a68a930735caaabad2078561d8618899
libtalloc-2.3.3-2.el8.x86_64.rpm
98ed813ca966e3024fa0fef669b88f583196bb4b135d59b6411587bf2fb1866b
libtalloc-devel-2.3.3-2.el8.i686.rpm
c7ebbb4800149a07e0fdfbc4213eb55cd4d81f01e2a1c31d6288760fe834de7a
libtalloc-devel-2.3.3-2.el8.x86_64.rpm
b94c9d0027f462c4e9a7c1c004e1606e0254694a30311b2ad2ad4537e9b9c9dd
python3-talloc-2.3.3-2.el8.i686.rpm
c06ee8eac955af4f65f38da798dbcd84970f3763808fb983b5a8c72bf1b848a3
python3-talloc-2.3.3-2.el8.x86_64.rpm
43ce0cae3c6db844d067bef17335961f2af11ae05e31290652c5ecd31f2fa5c2
RLBA-2022:7804
libsemanage bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libsemanage-2.9-9.el8.i686.rpm
62c1478c21117a921be6a68ac8fd3e77b27760df570adfd2f97561d018eee221
libsemanage-2.9-9.el8_6.i686.rpm
79fae46e7619a46b1728fa1d94032e9ee920b2e6fe7227ec0248353a134f7c6e
libsemanage-2.9-9.el8.x86_64.rpm
d08e18048af1c5ad125356edc17d805cdac32f33a1db756339d292ae3bc93428
libsemanage-2.9-9.el8_6.x86_64.rpm
b867c4eecfc9beff91c81417abe4b473212e6837d6991a4231e87e8f7c346500
python3-libsemanage-2.9-9.el8.x86_64.rpm
7f7c7f0b08535b082dd4a877324453f56f4f5d977982751e1c0843b41be90af3
python3-libsemanage-2.9-9.el8_6.x86_64.rpm
84261fe316de650e3c6f7fd00d0d4cbf544d9c1de68dd71bc71b501441ec2f51
RLBA-2022:7805
policycoreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
policycoreutils-2.9-20.el8.x86_64.rpm
e10c35ecc2d40a18165cc5e2352497e100982e16b141de1d4dc5b253f64846f6
policycoreutils-dbus-2.9-20.el8.noarch.rpm
7469bfbae4fe7597b05e5bf0af996be891c0603a2d20b2efa793b47bd850ca98
policycoreutils-dbus-2.9-20.el8.noarch.rpm
7469bfbae4fe7597b05e5bf0af996be891c0603a2d20b2efa793b47bd850ca98
policycoreutils-devel-2.9-20.el8.i686.rpm
127ce0eeceddf93c5a45e5f08b3e2b8cfc04bb025cda6354bf6a8fa585c7b25d
policycoreutils-devel-2.9-20.el8.x86_64.rpm
bbfe3f9ebeb2ff96a5aa29e98f8aeafcac8b25e6bb43a76612a9dd2a22de48d9
policycoreutils-newrole-2.9-20.el8.x86_64.rpm
b1a262d251cd9e8c7a54ea605d3e3afa9161928dd224e7443c352a66845b2e17
policycoreutils-python-utils-2.9-20.el8.noarch.rpm
4f48c6d787965dec6db81f43a20279aa0aa246002c02afa4ec719155890a0423
policycoreutils-python-utils-2.9-20.el8.noarch.rpm
4f48c6d787965dec6db81f43a20279aa0aa246002c02afa4ec719155890a0423
policycoreutils-restorecond-2.9-20.el8.x86_64.rpm
709a0e0e0abad38cfc8ce4960a2b9b56e32b0df312a170ea0d8c5d85dd20db62
python3-policycoreutils-2.9-20.el8.noarch.rpm
601dd458e26f2a412f2c7d0a9feffbc5f0bdbb2835186ba5880a6640d731868b
python3-policycoreutils-2.9-20.el8.noarch.rpm
601dd458e26f2a412f2c7d0a9feffbc5f0bdbb2835186ba5880a6640d731868b
RLBA-2022:7806
syslinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for syslinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
syslinux-6.04-6.el8.x86_64.rpm
004e1c6ccab4c1691baa99e0ef4a2fe70adf6a499766b6851525a57c614079df
syslinux-extlinux-6.04-6.el8.x86_64.rpm
58ef4e36ab3ff0b45f879498e3661bb4bd897dc9780d87604d7f1a4497a70ecc
syslinux-extlinux-nonlinux-6.04-6.el8.noarch.rpm
65380c1d03fbd9affa8c311635d895d8663e0d059f71c171363dcaa6a70a62af
syslinux-nonlinux-6.04-6.el8.noarch.rpm
aaaa5a716fc708737112a9e1946d0d09c6202ad407c93f56f769f97d13ed16c8
syslinux-tftpboot-6.04-6.el8.noarch.rpm
25ec61fb83f952c8d40fc9309126a9f37ad7acfe4f49ea4cce93757dd1288cc6
syslinux-tftpboot-6.04-6.el8.noarch.rpm
25ec61fb83f952c8d40fc9309126a9f37ad7acfe4f49ea4cce93757dd1288cc6
RLBA-2022:7807
lldpad bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lldpad.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
lldpad-1.0.1-19.git036e314.el8.i686.rpm
b001e25f27396160304639fe38ba5a5db4e1ba8e1e5c7af46a39c19fb40124c3
lldpad-1.0.1-19.git036e314.el8.x86_64.rpm
d57c3a25898358a3ad96d7c02fb9ef78dc669b3d4697a0fbfe3fee0cc6f46658
RLBA-2022:7808
file bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
file-5.33-21.el8.x86_64.rpm
b58d8ff9bd863b2eb2858c25755aecfec73f048b8257a832a33a43d3a584bf8d
file-libs-5.33-21.el8.i686.rpm
e49028996ba339742eb0834425803a06e33b1975527b1836c760ce2e7e746cce
file-libs-5.33-21.el8.x86_64.rpm
45678eb6e41623d2dee99e536fe20f23994460aa53fa05bb9d277dc721abe24d
python3-magic-5.33-21.el8.noarch.rpm
f2d3628e48e4c8a3e869939665ad34a0174deddd88e2544f1a203f19e0132d6a
python3-magic-5.33-21.el8.noarch.rpm
f2d3628e48e4c8a3e869939665ad34a0174deddd88e2544f1a203f19e0132d6a
RLBA-2022:7809
libpwquality bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpwquality.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libpwquality-1.4.4-5.el8.i686.rpm
44cd7f8bd2c46eddbeee4ecaeb73b8c3a9b3757239fdee0c7c37561d3835e7f0
libpwquality-1.4.4-5.el8.x86_64.rpm
11d928808fb7b434912fdb9320671f86f64364a9f6b4883a45bbfde9b9802f1b
python3-pwquality-1.4.4-5.el8.x86_64.rpm
76c71c2d7e731b33d879d6fdb701892c81b71d74e8cd20077a8157c11e6072ad
RLBA-2022:7819
rpm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es):
* rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522)
none-baseos-rpms
python3-rpm-4.14.3-24.el8_7.x86_64.rpm
e1c16b79fce78de0cd225edb18baf4912ae103a4d1e4427ba48545f1e1442b7b
python3-rpm-4.14.3-24.el8_6.x86_64.rpm
00555ceb0f5c9d689de35b36f8dfe7cbaf1c5ff54166b51cb4c3a38447ed3d2c
rpm-4.14.3-24.el8_7.x86_64.rpm
52ddb09b53c7fe658f11a5353fc090dace91285ec842e39a64d6e08627b2b278
rpm-4.14.3-24.el8_6.x86_64.rpm
0027d54b01712e88285b8893e1a906f8107b691896044d9d1c35c63d453709d4
rpm-apidocs-4.14.3-24.el8_7.noarch.rpm
a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b
rpm-apidocs-4.14.3-24.el8_7.noarch.rpm
a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b
rpm-apidocs-4.14.3-24.el8_6.noarch.rpm
16f3a10967ffede3d3a1fc01be6011bb7937e0d054d94d9b2f97b63077b43787
rpm-apidocs-4.14.3-24.el8_6.noarch.rpm
16f3a10967ffede3d3a1fc01be6011bb7937e0d054d94d9b2f97b63077b43787
rpm-build-libs-4.14.3-24.el8_7.i686.rpm
26e3f1289e91bbd69ddfa1bcafe5189a4bcde0ed2b7fc88e57333c83e5207bb5
rpm-build-libs-4.14.3-24.el8_6.i686.rpm
b9848d9db7b9ba8faded764c015ebddcb86adeaddf106b44a9114868a1d5e818
rpm-build-libs-4.14.3-24.el8_7.x86_64.rpm
145ebac4456a0cd149537054ea74e323fd9eca548f38a40bd1725ac4eb9fb288
rpm-build-libs-4.14.3-24.el8_6.x86_64.rpm
a057e350278df66a366e16206fda86b8898bfb40720d412ee559f35cc441fef7
rpm-cron-4.14.3-24.el8_7.noarch.rpm
b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f
rpm-cron-4.14.3-24.el8_7.noarch.rpm
b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f
rpm-cron-4.14.3-24.el8_6.noarch.rpm
4b41d55e13beec8d3fe23a23192684e5ebc06194a57ced180b0cf5b0e051fe8a
rpm-cron-4.14.3-24.el8_6.noarch.rpm
4b41d55e13beec8d3fe23a23192684e5ebc06194a57ced180b0cf5b0e051fe8a
rpm-devel-4.14.3-24.el8_7.i686.rpm
0ddf479b304fab8a8f92c9dec230c275b30db6192423802985552da70ef2b716
rpm-devel-4.14.3-24.el8_6.i686.rpm
cd118585125b3716937d81aff3f3f3d002dea167354a8c4d1849dbd3d3e71a11
rpm-devel-4.14.3-24.el8_7.x86_64.rpm
8be76765b51d8681a9f76b209d07847c27b338fe25af2b0a149502ce5b5424b8
rpm-devel-4.14.3-24.el8_6.x86_64.rpm
0b87b0ef3e725312e5e5bff614480224abc257dc2f6a813bf66741012ee9377a
rpm-libs-4.14.3-24.el8_7.i686.rpm
0f1f8d377219efb286bf9bc9c0a6c19a4ede0948bd6b1ac5318d5ee9dda9bd22
rpm-libs-4.14.3-24.el8_6.i686.rpm
c9ae4b9ff2b94a8e8a796b2a48983cac6726f566ab16344f3f9f3aef9247b7a6
rpm-libs-4.14.3-24.el8_7.x86_64.rpm
fc4263ea61b68b93eda32fcde2612fea4537286f1e7e56fdd94db8eaae7faf8d
rpm-libs-4.14.3-24.el8_6.x86_64.rpm
c549c2c0257b70c9f2fd0cff3e5128b78d719e0e19eda94c0912871c2e7f5788
rpm-plugin-ima-4.14.3-24.el8_7.x86_64.rpm
e51a248c3608b07034f31451235312ce267e10c465585cbe633f900ddee1b0c8
rpm-plugin-ima-4.14.3-24.el8_6.x86_64.rpm
99534820bef92a371ca87e59c291df38059811a41446c19b4ae02aecb0c04926
rpm-plugin-prioreset-4.14.3-24.el8_7.x86_64.rpm
7eef6d9114e98909f304c2283325fc84afa6a3e22c794537eada9d1d164b53ae
rpm-plugin-prioreset-4.14.3-24.el8_6.x86_64.rpm
3f2e3144ca70c900fc7eae68dfbdf94249fa64ba7b1505d893a107aeac9108ea
rpm-plugin-selinux-4.14.3-24.el8_7.x86_64.rpm
0d071d4c4a26203c48961cbeb02d2b9c5b050e29d31c36cc9e11769c50c9cf85
rpm-plugin-selinux-4.14.3-24.el8_6.x86_64.rpm
bb763625af4c0e8d6c9f7025c08b51e0fb3922933ec280d8580c4685ad9803d9
rpm-plugin-syslog-4.14.3-24.el8_7.x86_64.rpm
2d4cb5df2e4c19d3a4d59100777475e0e94bc1e7ddf0daf1b7c1503765621eb8
rpm-plugin-syslog-4.14.3-24.el8_6.x86_64.rpm
e240087fa3342a8cffe9db42206e886ead610eb0e5d11f26b03e93e41c803bb0
rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.x86_64.rpm
ce1d5a7d9e8896e209eafb6142f22feaa70a2745e789a0b303e0dc8741fae778
rpm-plugin-systemd-inhibit-4.14.3-24.el8_6.x86_64.rpm
37230d76e255114b313d04bc8752c2292e5647c52afa5b1cc7c4a0050861cd79
rpm-sign-4.14.3-24.el8_7.x86_64.rpm
110d95fb5f5bf027f409ebe3ea455c1b3e387cde00645d970f5e716e92861e66
rpm-sign-4.14.3-24.el8_6.x86_64.rpm
cbf2246ea3b5bbc6eb0dbba9dfce26c88a4728f754ee90b1e197d989506c2113
RLBA-2022:7825
bind bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library
(routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bug Fix(es) and Enhancement(s):
* named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272)
none-baseos-rpms
bind-export-devel-9.11.36-5.el8_7.2.i686.rpm
098df3bd3e982251717e78395d7eedf407ce5d93c81056e00f6520462625d963
bind-export-devel-9.11.36-5.el8_7.2.x86_64.rpm
9e7f239d97615ce9f2a312f081ef94b3e9ba9c9e4f987d22e298491506c0061c
bind-export-libs-9.11.36-5.el8_7.2.i686.rpm
e1f5a24c71de3711cb934478f7ee46e611311b86d214737249afc5a9be744cd2
bind-export-libs-9.11.36-5.el8_7.2.x86_64.rpm
35e6cd12f9d803bb60cfd7bf8a44ba73b8d0117432801d097d5851011ecd822a
RLBA-2022:7828
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Host ip changed when start vm (BZ#2132285)
none-baseos-rpms
NetworkManager-1.40.0-2.el8_7.x86_64.rpm
2b70f077f0a14156c1fd2b39f9bfe7d8aa4f8824c531d0cec847948b9a309650
NetworkManager-adsl-1.40.0-2.el8_7.x86_64.rpm
37533da4a637e50dc0f2b007c0f8307e118a7b8859516725a5260c978a02943a
NetworkManager-bluetooth-1.40.0-2.el8_7.x86_64.rpm
1e4939176676a6d37e3298fd1eb8f2efa9bd475a5548ff4f41d979da06e1444c
NetworkManager-config-connectivity-redhat-1.40.0-2.el8_7.noarch.rpm
be319eb37936b7a8d6e4d5b5bd42e0fe336b107ce90c36bdd4d42cfaea003e7a
NetworkManager-config-connectivity-redhat-1.40.0-2.el8_7.noarch.rpm
be319eb37936b7a8d6e4d5b5bd42e0fe336b107ce90c36bdd4d42cfaea003e7a
NetworkManager-config-server-1.40.0-2.el8_7.noarch.rpm
6e046436cc56ab9f86369ac70d9450227b31eecb9c9f8bd913b64b8987dcf1f0
NetworkManager-config-server-1.40.0-2.el8_7.noarch.rpm
6e046436cc56ab9f86369ac70d9450227b31eecb9c9f8bd913b64b8987dcf1f0
NetworkManager-dispatcher-routing-rules-1.40.0-2.el8_7.noarch.rpm
195a4a4a8ddcd55676d48c91959b6341c437d274cc3aaf0a0555add408df8dcd
NetworkManager-dispatcher-routing-rules-1.40.0-2.el8_7.noarch.rpm
195a4a4a8ddcd55676d48c91959b6341c437d274cc3aaf0a0555add408df8dcd
NetworkManager-initscripts-updown-1.40.0-2.el8_7.noarch.rpm
cda38500bd87db0d35acbce54b4272d1510cd0bfa02c646c83fcdcb48f0fa2e7
NetworkManager-initscripts-updown-1.40.0-2.el8_7.noarch.rpm
cda38500bd87db0d35acbce54b4272d1510cd0bfa02c646c83fcdcb48f0fa2e7
NetworkManager-libnm-1.40.0-2.el8_7.i686.rpm
f1ea3d90adb649ae5f7bcf58f944240978b967fef1ce42b32c097497669428ea
NetworkManager-libnm-1.40.0-2.el8_7.x86_64.rpm
c91c9ea40b1d7f9bf486ca3dff93d248e75b5e16728a22355a4d669bf44a0b0c
NetworkManager-ovs-1.40.0-2.el8_7.x86_64.rpm
f1f21c942b4bd73982bc674516fe7b0d66ba9466225b7b9d3f042c4fe532b91b
NetworkManager-ppp-1.40.0-2.el8_7.x86_64.rpm
87cce67b58bf84368cbe0d7646ebefc7e08b471e497adde50b6328711a3791e9
NetworkManager-team-1.40.0-2.el8_7.x86_64.rpm
79ee020f3613c5db71ddba0e8aeda4d348aeb4f31892944839a5c97e0ab87a31
NetworkManager-tui-1.40.0-2.el8_7.x86_64.rpm
c2fd558daf2c12f3850eff9c200e9a984d56457fce9c2c3ad2199b260484b5c8
NetworkManager-wifi-1.40.0-2.el8_7.x86_64.rpm
e1961b7dc96b48d5a236d00e1bf1cf6e18f2a6b0b3c98ae4329c63ef8b5b2f0e
NetworkManager-wwan-1.40.0-2.el8_7.x86_64.rpm
e1475eb16a6939449a3217c06097d13c834b797caf795a8aa8ec74f04377a411
RLBA-2022:7829
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544)
none-baseos-rpms
libipa_hbac-2.7.3-4.el8_7.1.i686.rpm
c49457eeaf2f024f73c50caceccf5b6d0142150439233fc0674d283ed3188a53
libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm
2b0a25c49789fba2c51fd9ec52452072f2e540dd9d7e108d85926da97fe53a68
libsss_autofs-2.7.3-4.el8_7.1.x86_64.rpm
9315acfb31602e68f3108bbcf3ae1ce2284754d71999f0ccce2f030da526cfaf
libsss_certmap-2.7.3-4.el8_7.1.i686.rpm
a774330de9fdae77fa86ddf3f43a8691cdc99b46442b63ff48c354f2a3406dd8
libsss_certmap-2.7.3-4.el8_7.1.x86_64.rpm
ef2188a436ca5e742b9c7ff1bb048ed51970131b1b1dd15ba66a8a6ddb50ee6d
libsss_idmap-2.7.3-4.el8_7.1.i686.rpm
28b8b855fe34bca01d7d4d26009343df7ee7e31f6ca1913f9a05971071ed69fd
libsss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
2a5b2632a44438e860792c637b000391aa266103fce05495b7b415845565c8a0
libsss_nss_idmap-2.7.3-4.el8_7.1.i686.rpm
ce71a66eb390dcf52630e60fd152db59a64e538f1062faf7b5ce6127eda12538
libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
d56c119593e8255294782593a8752917121626d8f451d239a41ccd79238e01da
libsss_simpleifp-2.7.3-4.el8_7.1.i686.rpm
81b0d7687b7d35c9c568ffc901884ec82d7428a58e16e690d92559e48885cb3b
libsss_simpleifp-2.7.3-4.el8_7.1.x86_64.rpm
1c961919f1a87b3314da8e29abbf24be253b6209946abd4570ff308f891f6ae0
libsss_sudo-2.7.3-4.el8_7.1.x86_64.rpm
8002f4af2b3014313e0e8b0be0e367a5870d8ff2662a86d55644c1cefbf18c45
python3-libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm
662f05c80a436c05eb93c64af5ec17a4cb40c5170887068289b4cac306d7b7fb
python3-libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
41b7414c44d384931919f598d0dccc3ebd3f354719f3394079255a88adc3561d
python3-sss-2.7.3-4.el8_7.1.x86_64.rpm
42f321023b133a14290644eeb23c93ecab5d51b3e59570d8b8162607b04ab085
python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm
6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c
python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm
6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c
python3-sss-murmur-2.7.3-4.el8_7.1.x86_64.rpm
01c7c36729533d921205ff7f39245aff781db0b5475fb4e672785819b9328bc2
sssd-2.7.3-4.el8_7.1.x86_64.rpm
5051d53ac5df96df4062b8004780b3134a770263c4add8e41a6361eaa7324e02
sssd-ad-2.7.3-4.el8_7.1.x86_64.rpm
d82edf19f57c16e16acb145dc7d29e65dd96d4921d7972903ae96bb5ce83f956
sssd-client-2.7.3-4.el8_7.1.i686.rpm
f81d34ec79b26872290694ddb65b6b1927f8f1957f9c9c40d0b857d5f8b464bc
sssd-client-2.7.3-4.el8_7.1.x86_64.rpm
ab6de7cd139f88513de8ca2f01db4017c8428fa663cc899f7252de8348206c8d
sssd-common-2.7.3-4.el8_7.1.x86_64.rpm
079034e36153d700d1373ad5c6d5936fe07c89cca587d2c2e04401bc7ad5954a
sssd-common-pac-2.7.3-4.el8_7.1.x86_64.rpm
70d338dfcf7642581fe77829964f801ace4dcb18559f3f714f01f61b313a000f
sssd-dbus-2.7.3-4.el8_7.1.x86_64.rpm
b4ca2da01eed9e540352acec3c3e8303ed6b8f90585935bc7205cf1612e8d733
sssd-ipa-2.7.3-4.el8_7.1.x86_64.rpm
a35fb89b88eabb04e165a074adffcc6114aec1c7ae9d85841ef31be1f0c9df83
sssd-kcm-2.7.3-4.el8_7.1.x86_64.rpm
2c2087677022939f952339173ec3f8f231ee56703df47518ccbaf46fd9f3baa7
sssd-krb5-2.7.3-4.el8_7.1.x86_64.rpm
cee94b872835bab3b869702f8e33ea8021415d5f85a4fdc04dd707f84341cbfe
sssd-krb5-common-2.7.3-4.el8_7.1.x86_64.rpm
71440d5c7e8f05e82c5c7fd3ee1bcf18d62670d9512d1b427fc2f10ef02d1e68
sssd-ldap-2.7.3-4.el8_7.1.x86_64.rpm
5112e64c8840bdaa795497a68b734439e12872ec5dbf16e0f0ab905268e1f6f6
sssd-nfs-idmap-2.7.3-4.el8_7.1.x86_64.rpm
ae8eb40f7de0b69aa91ae2b3d2e5168d426cbfbbd9ca97809ffc4c02b9ddd862
sssd-polkit-rules-2.7.3-4.el8_7.1.x86_64.rpm
8ead8ea9bf4c7f89adf140b89a890ee59744b626e06e58a9b5c9a27fb1ec88e1
sssd-proxy-2.7.3-4.el8_7.1.x86_64.rpm
80bf29198a06a20202a7b2cde28f75f0057fdb5825e552e7db07a52e6ececf17
sssd-tools-2.7.3-4.el8_7.1.x86_64.rpm
ea27ca6015d9115cd01c78560d6b36db6daf4338aeaf74879d704c5a93da1bae
sssd-winbind-idmap-2.7.3-4.el8_7.1.x86_64.rpm
885103316f6ef9796189d9b294a9db757c6a52dde27ba7fecb7d249ea889453b
RLBA-2022:7884
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent
time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border
with the United Stated of America.
* Chihuahua moved to the time offset of -06:00 from the coordinated universal
time (UTC) permanently starting on October 30 2022.
* Fiji no longer observes daylight saving time (DST).
none-baseos-rpms
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
tzdata-2022f-1.el8.noarch.rpm
b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06
RLSA-2022:7928
Important: device-mapper-multipath security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.
Security Fix(es):
* device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
device-mapper-multipath-0.8.4-28.el8_7.1.x86_64.rpm
750b85258e090af0345c48b148d575417c734c3831fbfdfb287d72f060d0109a
device-mapper-multipath-libs-0.8.4-28.el8_7.1.i686.rpm
8a9f28ba6dc27a0ce9dbc8b778cc12517a737f1ab1c835f4213613d304d5128a
device-mapper-multipath-libs-0.8.4-28.el8_7.1.x86_64.rpm
426393f34ffa65b105d0bcd82b50b3b325dac2997f9aa5d82c2cd5cc6ec858d9
kpartx-0.8.4-28.el8_7.1.x86_64.rpm
9bb96ba65f577aa1e9f6dc33dacdeb59f656368e2279615300dc00a877751cc0
libdmmp-0.8.4-28.el8_7.1.i686.rpm
ed347a7a0e996826d164df81a0cff7496b9b2f6762d70350ff6b35e834651435
libdmmp-0.8.4-28.el8_7.1.x86_64.rpm
21cdea71f7a13c24348d823ad2a906afd19a3e684dc02f45b27ff4a70dcf49fd
RLSA-2022:8638
Important: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
krb5-devel-1.18.2-22.el8_7.i686.rpm
f0afc7e967707d6fb732cf321f053a43746688aceb1be42f82f75ae17c9b6033
krb5-devel-1.18.2-22.el8_7.x86_64.rpm
0ec00ab66e767e8e963efc06ef45c6de5829b6a2be1c155bb37a65566434f04f
krb5-libs-1.18.2-22.el8_7.i686.rpm
73dc0f029eb2212f6839f54532cffd9d3a27dfcf177724eaaab9647855518dfa
krb5-libs-1.18.2-22.el8_7.x86_64.rpm
d37db3d2284ba491b51cdc51b33de8a66c77d065a20a6c1c1c2cf3a9090ac692
krb5-pkinit-1.18.2-22.el8_7.i686.rpm
f606b325d4eb3358ac83b1c2f309622e7d4f3016bc96345eeb32225eb511114c
krb5-pkinit-1.18.2-22.el8_7.x86_64.rpm
3e35a025f79cabb5ef48aecc1a2b27cd2fd4bbab8bb0954461e7e5cf2109b709
krb5-server-1.18.2-22.el8_7.i686.rpm
44810a49752b249f004b59292df3d5433abc304b94424436a255ee0adae75636
krb5-server-1.18.2-22.el8_7.x86_64.rpm
1670bb4a3d45a20f68faabf0eeae2ff04b5f30924276e8d375b785a727e279cf
krb5-server-ldap-1.18.2-22.el8_7.i686.rpm
e21783cadbcbb7abfaa96e4a261a46dbc4ce5ca62cd4d8ca5c84cdf8079b0d0e
krb5-server-ldap-1.18.2-22.el8_7.x86_64.rpm
08efd58b22a8f2ccc3adcf766ff7d88d57ebbb59b660f2a13f5b8bfca6c46645
krb5-workstation-1.18.2-22.el8_7.x86_64.rpm
2e43158f317bc4c691b4b75f441a549359c196366a15d105f2c32be86e5fbbd6
libkadm5-1.18.2-22.el8_7.i686.rpm
f0b7a3d14eb507a21f018a75d4fa4aeaf89d792c7b29521a80635a5eee177d75
libkadm5-1.18.2-22.el8_7.x86_64.rpm
36cf1eabea81f5aa51d19cd5700ce90fba57a8ca7f0ebc8ed5a9de06ccffac6c
RLBA-2022:8785
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent
time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations.
* A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
none-baseos-rpms
tzdata-2022g-1.el8.noarch.rpm
808522f695bbe1b624724328f2ab6ff9a615a4220bb9611549fe67ccddcb383a
tzdata-2022g-1.el8.noarch.rpm
808522f695bbe1b624724328f2ab6ff9a615a4220bb9611549fe67ccddcb383a
tzdata-2022g-1.el9_1.noarch.rpm
9745a3812425b1e823c379a76a51bcc74f8b4a7cd51b54f141cc514dda54cf68
tzdata-2022g-1.el9_1.noarch.rpm
9745a3812425b1e823c379a76a51bcc74f8b4a7cd51b54f141cc514dda54cf68
tzdata-2022g-1.el9_1.noarch.rpm
9745a3812425b1e823c379a76a51bcc74f8b4a7cd51b54f141cc514dda54cf68
tzdata-2022g-1.el9_1.noarch.rpm
9745a3812425b1e823c379a76a51bcc74f8b4a7cd51b54f141cc514dda54cf68
RLBA-2022:9028
libsolv bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm.
Bug Fix(es) and Enhancement(s):
* Transaction picks old build to satisfy dependencies (BZ#2151895)
none-baseos-rpms
libsolv-0.7.20-4.el8_7.i686.rpm
64f956712d35287208ffa4b00aa42f20d271355599bf109eed1ac59cffb155da
libsolv-0.7.20-4.el8_7.x86_64.rpm
f4bd3dd4a66488a33d2afee06700f0ce2edafd69815c802b81838032b9e79f52
python3-solv-0.7.20-4.el8_7.x86_64.rpm
bd33cc1f45bd8c1729958de030c24d5e34f4d91b5dfd4a014d19f8f967f8b638
RLBA-2023:0085
net-snmp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es) and Enhancement(s):
* backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764)
none-baseos-rpms
net-snmp-libs-5.8-25.el8_7.1.i686.rpm
4d530c4e1eed182a216c16f9fe2fa10af3c36b232c175da3f657f6e1f3d51462
net-snmp-libs-5.8-25.el8_7.1.x86_64.rpm
70d627282616e376dca8fb04c521ebe212534c15eaad0b85d2c4aaa4f8c623cf
RLBA-2023:0086
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059)
none-baseos-rpms
opencryptoki-3.18.0-5.el8_7.x86_64.rpm
81ed0241a7c7e8fcaa130ddc14217713b665f5dcc80ff661fa09c45f6e641915
opencryptoki-icsftok-3.18.0-5.el8_7.x86_64.rpm
c4c0a41d4fd4e846b086039d97b14681890e22509430b4c8215463ab6456a3c2
opencryptoki-libs-3.18.0-5.el8_7.i686.rpm
428a3a2f95bc4e9dc286a3ba531fbcbebbdfe474eaebd6925a9da2d5c7a98cdd
opencryptoki-libs-3.18.0-5.el8_7.x86_64.rpm
8a5c295d821738c6f685732e9e1901728688835a90fd5de5df57f18e811ad148
opencryptoki-swtok-3.18.0-5.el8_7.x86_64.rpm
8f64d5ba1a4b728e58bfc68d250f93ec73c34223dc15f3df80668aeb794b9902
opencryptoki-tpmtok-3.18.0-5.el8_7.x86_64.rpm
60147a15e8fcaef749eb8a444df7da3e1a6b200baceeff2f361d515d58d3f38b
RLBA-2023:0090
zlib bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336)
none-baseos-rpms
zlib-1.2.11-21.el8_7.i686.rpm
7aa8b88d6f0460d7d02f4afb7fb6f1dd3d7dc6c1857f18b332412adff6f639a7
zlib-1.2.11-21.el8_7.x86_64.rpm
62fbf01029bb98f969d7c991f56f942533bb9262731ae6ec468f39eb25b30046
zlib-devel-1.2.11-21.el8_7.i686.rpm
c500a84565208e4f1f89d431eba955e5eb4b441cd35bee8e16f8fbeb214d010d
zlib-devel-1.2.11-21.el8_7.x86_64.rpm
ead04467e2ea0e435ca8356236bd273cfd74436fac21610e24e1ae65a688d868
RLBA-2023:0094
rsync bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Bug Fix(es) and Enhancement(s):
* rsync-daemon fail on 3.1.3 (BZ#2139118)
none-baseos-rpms
rsync-3.1.3-19.el8_7.1.x86_64.rpm
b99a4736d732f9ff54b352fffeffb4a30efb86855a166b6aaaed6ccd0fab3c4d
rsync-daemon-3.1.3-19.el8_7.1.noarch.rpm
fb059776c3978eaa94acb4e4b0f7944756f454824eab3a3178764226c1d50fbe
rsync-daemon-3.1.3-19.el8_7.1.noarch.rpm
fb059776c3978eaa94acb4e4b0f7944756f454824eab3a3178764226c1d50fbe
RLSA-2023:0096
Moderate: dbus security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010)
* dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011)
* dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
dbus-1.12.8-23.el8_7.1.x86_64.rpm
c17880e007d8902d0513617e500be78658e6ac6faef85926926b1354e61dd3a8
dbus-common-1.12.8-23.el8_7.1.noarch.rpm
d0e4859f6054c5ea4e81571f6569cad02b9700981fb122d7e2f104bce4214d32
dbus-common-1.12.8-23.el8_7.1.noarch.rpm
d0e4859f6054c5ea4e81571f6569cad02b9700981fb122d7e2f104bce4214d32
dbus-daemon-1.12.8-23.el8_7.1.x86_64.rpm
1f9531ea623c5fa9f09bca6fbd12dde50336be5dfe51555149f140714cf86697
dbus-libs-1.12.8-23.el8_7.1.i686.rpm
66dcf534af6095954cb52c3bfa6ca4bcf8f3d94e94fe6019aa091874f58903dd
dbus-libs-1.12.8-23.el8_7.1.x86_64.rpm
d86078baadce0e5ce0bc8ec52e446d2d1edb079e233e6488409ff190adb9ebb6
dbus-tools-1.12.8-23.el8_7.1.x86_64.rpm
3aa8722ad8a8f76baaefe8157f15059d37afa0a82a20f7624311b1758ac1442c
RLBA-2023:0097
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* 2136762 - [Rocky Linux8/Insights/Bug] SELinux violations insights client with Satellite 6.11 (BZ#2136762)
none-baseos-rpms
selinux-policy-3.14.3-108.el8_7.1.noarch.rpm
321ec9f773d2082212881711c4346ccd77ef92167a46cae8418da5d93cfe1452
selinux-policy-3.14.3-108.el8_7.1.noarch.rpm
321ec9f773d2082212881711c4346ccd77ef92167a46cae8418da5d93cfe1452
selinux-policy-devel-3.14.3-108.el8_7.1.noarch.rpm
6f11096869a4305c31ef274c3bd2dfc1e89be4c3ce21ae09aaae8081480a6204
selinux-policy-devel-3.14.3-108.el8_7.1.noarch.rpm
6f11096869a4305c31ef274c3bd2dfc1e89be4c3ce21ae09aaae8081480a6204
selinux-policy-doc-3.14.3-108.el8_7.1.noarch.rpm
d9d0cf27ff71a508cb6dda32bb99f2f51772b4f681002b327e5710d7d2c53ef3
selinux-policy-doc-3.14.3-108.el8_7.1.noarch.rpm
d9d0cf27ff71a508cb6dda32bb99f2f51772b4f681002b327e5710d7d2c53ef3
selinux-policy-minimum-3.14.3-108.el8_7.1.noarch.rpm
2dde92278499e82d3ed0bf620410e6f398bfd921838cc53716abfaa292102ebd
selinux-policy-minimum-3.14.3-108.el8_7.1.noarch.rpm
2dde92278499e82d3ed0bf620410e6f398bfd921838cc53716abfaa292102ebd
selinux-policy-mls-3.14.3-108.el8_7.1.noarch.rpm
550c511de341ff9c24ea63e8ae9e8ac53b91b0e517ff3f417dbe6d7113794d7b
selinux-policy-mls-3.14.3-108.el8_7.1.noarch.rpm
550c511de341ff9c24ea63e8ae9e8ac53b91b0e517ff3f417dbe6d7113794d7b
selinux-policy-sandbox-3.14.3-108.el8_7.1.noarch.rpm
1119c34c00aaeafcf37bea9cd8d2013bf26286ab651a6b069d53f2ff7410eeb8
selinux-policy-sandbox-3.14.3-108.el8_7.1.noarch.rpm
1119c34c00aaeafcf37bea9cd8d2013bf26286ab651a6b069d53f2ff7410eeb8
selinux-policy-targeted-3.14.3-108.el8_7.1.noarch.rpm
72864ab192aedd31c706b240d261b637f2b9fdae98c0e7ac638579ea7402c42b
selinux-policy-targeted-3.14.3-108.el8_7.1.noarch.rpm
72864ab192aedd31c706b240d261b637f2b9fdae98c0e7ac638579ea7402c42b
RLBA-2023:0098
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* crio occasionally fails to start during deployment (BZ#2132281)
* DNS servers are not sorted according to priority in resolv.conf (BZ#2135733)
* Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891)
* NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429)
none-baseos-rpms
NetworkManager-1.40.0-5.el8_7.x86_64.rpm
eec411750eca7cbf573724b65f37c146f2c913170b42568dd8974d2fb1cc1656
NetworkManager-adsl-1.40.0-5.el8_7.x86_64.rpm
1c156600595f9905b29944de6c4f111d4b17d60625eee81611cd0deac84bebe4
NetworkManager-bluetooth-1.40.0-5.el8_7.x86_64.rpm
1ff89568ddbb3c7fef529d2f4fc75aac12fbad32b7f4ff16017054e08669238f
NetworkManager-config-connectivity-redhat-1.40.0-5.el8_7.noarch.rpm
cd5378c72e78016a45d76be43a70202b6ede6826006fe1efe7762a3c00eb48f3
NetworkManager-config-connectivity-redhat-1.40.0-5.el8_7.noarch.rpm
cd5378c72e78016a45d76be43a70202b6ede6826006fe1efe7762a3c00eb48f3
NetworkManager-config-server-1.40.0-5.el8_7.noarch.rpm
4d7c618d1898b37ae728a3fd4cf989463ca9fdf77041e567b60cbbac70cac043
NetworkManager-config-server-1.40.0-5.el8_7.noarch.rpm
4d7c618d1898b37ae728a3fd4cf989463ca9fdf77041e567b60cbbac70cac043
NetworkManager-dispatcher-routing-rules-1.40.0-5.el8_7.noarch.rpm
9c4b87f46150a5d9751a10dbcb06a581d3acfacbe1075648ffbd2075f71ebc4d
NetworkManager-dispatcher-routing-rules-1.40.0-5.el8_7.noarch.rpm
9c4b87f46150a5d9751a10dbcb06a581d3acfacbe1075648ffbd2075f71ebc4d
NetworkManager-initscripts-updown-1.40.0-5.el8_7.noarch.rpm
c5c0347bd11f92b5a5cb4c618e04e1e631e69363c2ed4ff23cf4bd87c08d8847
NetworkManager-initscripts-updown-1.40.0-5.el8_7.noarch.rpm
c5c0347bd11f92b5a5cb4c618e04e1e631e69363c2ed4ff23cf4bd87c08d8847
NetworkManager-libnm-1.40.0-5.el8_7.i686.rpm
21fc3e6ba27d1dfc1146f38d07fea649230eba6caba9696d4d2fd9eba2871711
NetworkManager-libnm-1.40.0-5.el8_7.x86_64.rpm
b4a7ecb20baa043deca6b5fbe151621b331518852a50c658e6f9f8f849932afa
NetworkManager-ovs-1.40.0-5.el8_7.x86_64.rpm
ddde2b40770cb2ef74e0c71bf05c9044eb1f8972d51990e0d6ddb37d90d1e899
NetworkManager-ppp-1.40.0-5.el8_7.x86_64.rpm
14cfc6d4d732ebd999803b49a069455f6257fdd84e2bd2fc1a2ba6dd47053c1f
NetworkManager-team-1.40.0-5.el8_7.x86_64.rpm
e74f6e43eb52a8e1de059b657ed924da4273f26ff41455a58d2f94503ad9a5e5
NetworkManager-tui-1.40.0-5.el8_7.x86_64.rpm
c0238998f5e4c5d9fe46e08e01c0236b829b612888552fcd2fa66a2f04f459ab
NetworkManager-wifi-1.40.0-5.el8_7.x86_64.rpm
8c6fdb3c20a01ffef120e0d538910b09c6bbb17524c2d3e223a5c97f42a2be8d
NetworkManager-wwan-1.40.0-5.el8_7.x86_64.rpm
17fa6f662e6e03a51a99d5a94c0b0d0ff67d92bc8ba1a3f6fc631aa76bdb7ee3
RLSA-2023:0101
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849)
* vfio zero page mappings fail after 2M instances (BZ#2128515)
* ice: Driver Update up to 5.19 (BZ#2130992)
* atlantic: missing hybernate/resume fixes (BZ#2131935)
* Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084)
* Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813)
* ice: Intel E810 PTP clock glitching (BZ#2136036)
* ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216)
* ice: dump additional CSRs for Tx hang debugging (BZ#2136513)
* ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270)
* After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157)
* i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205)
* WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953)
* DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216)
* Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152)
* Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878)
* mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957)
* net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017)
* Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583)
* AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218)
* Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374)
* net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130)
* iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081)
* Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742)
* Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912)
* Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206)
none-baseos-rpms
bpftool-4.18.0-425.10.1.el8_7.x86_64.rpm
870fe31369cee11ebea7bbbc1ded6f1f0ce94bbcbc08db360ecff02471590ad9
kernel-4.18.0-425.10.1.el8_7.x86_64.rpm
733ab5ce64e4e5a1c2485406abb3b7eee7b3b1d28cdcce124c22fd2c9e1f2387
kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm
5f88073317993ccc745d08d87c5ac76fe6cef8acc5d26a3b7349dd6b0d8f0669
kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm
5f88073317993ccc745d08d87c5ac76fe6cef8acc5d26a3b7349dd6b0d8f0669
kernel-core-4.18.0-425.10.1.el8_7.x86_64.rpm
0559592ef8f4de8cd61356b26deb24eeaa66b39e2db804610a508d6576627fcf
kernel-cross-headers-4.18.0-425.10.1.el8_7.x86_64.rpm
f91324f8849c5464d6b180856b01f7d92fb08303e4fd27b8eb4267f9b18ee46d
kernel-debug-4.18.0-425.10.1.el8_7.x86_64.rpm
fa7750c222eab7019e3cb84ffb92f276b7794091227a74e1dfe58717eb30cbce
kernel-debug-core-4.18.0-425.10.1.el8_7.x86_64.rpm
b998aaf08072c83b033c9fdfc007ec86536c64629fdbb6b654cb5a032e116b76
kernel-debug-devel-4.18.0-425.10.1.el8_7.x86_64.rpm
95b0b6e900b845fcc325d1881eb6bb4fd6aa1934f6b613c5d380b630af9bc468
kernel-debuginfo-common-x86_64-4.18.0-425.10.1.el8_7.x86_64.rpm
05a093e7b0d8f2974b36a2ca504e6c865d407d0e07a63334cd8a44b447cbece0
kernel-debug-modules-4.18.0-425.10.1.el8_7.x86_64.rpm
97a7a2d1fa37f333e3d662184b31dc61f7b13fc77f5c9c6ca5056bdaa49dd34a
kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.x86_64.rpm
a509585b03297af32782eef003ce694dfd1184407a2baf06451112625a8d3eba
kernel-devel-4.18.0-425.10.1.el8_7.x86_64.rpm
f9d45da5eb768c0e5c89cc353337c62cadf3af528e9e7c186b15dd5dabb60aaf
kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm
a5841e7bb9d35f714ceaf835b19d2d07b9171354addf2353c43a3600bd0f1b3e
kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm
a5841e7bb9d35f714ceaf835b19d2d07b9171354addf2353c43a3600bd0f1b3e
kernel-headers-4.18.0-425.10.1.el8_7.x86_64.rpm
1aaf20a790605e08336801ebe0639090e44e3c00c80873fe5e9b31dafd662d2d
kernel-modules-4.18.0-425.10.1.el8_7.x86_64.rpm
1c13477a8b745658af35fa366992b009744b0762fb978ba180eb806ef5967032
kernel-modules-extra-4.18.0-425.10.1.el8_7.x86_64.rpm
66c10b1522c58c60077fa8e90e7b228b421f9cc7131c6c917595d80866c0e465
kernel-tools-4.18.0-425.10.1.el8_7.x86_64.rpm
04f9b25c9f30cc89485c38c8eb964d7a27e53ee83eb0a15eac26f8a6b05c2b20
kernel-tools-libs-4.18.0-425.10.1.el8_7.x86_64.rpm
2832e48280c73b77ccf99f28be2e036495fa393d6130dc0fcd24694d006e9ee1
perf-4.18.0-425.10.1.el8_7.x86_64.rpm
4464a8fde2e3c51b15ed5888e6b8bb2521c3617815b9d7f6bb1a4abc7aeb85f2
python3-perf-4.18.0-425.10.1.el8_7.x86_64.rpm
01dfecb23f710e29e31048ee306c8c79e0d63a6490be2e72ea15d97e98d6f713
RLBA-2023:0104
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition.
Bug Fix(es) and Enhancement(s):
* booting over iscsi can enter a loop forever in dracut-initqueue if one netroot path is lost. (BZ#2132045)
none-baseos-rpms
dracut-049-218.git20221019.el8_7.x86_64.rpm
0d6987278adf8b37c2e2bb877d1bfbd9ad44074d3da20e5dde56d8bc19cb6707
dracut-caps-049-218.git20221019.el8_7.x86_64.rpm
f83f69a3dca9eaef1bee942c64c808899e40a74494d2eee3261ef581a5aee512
dracut-config-generic-049-218.git20221019.el8_7.x86_64.rpm
6db3a35458cce7bb2f170d4cdea9699d454b5c2eaeca4a3c8f923126060d83fd
dracut-config-rescue-049-218.git20221019.el8_7.x86_64.rpm
9e391599c846cae54d0ba11e42b081d1ea959ac0dca02ef3bcdbb990e7c06b29
dracut-live-049-218.git20221019.el8_7.x86_64.rpm
e216a054bdb694092012c2c0be40e469989174f2c783ff4bcd0327302f3bfd0c
dracut-network-049-218.git20221019.el8_7.x86_64.rpm
5303aa725437754296e8dbac8a0efbf47f1bd72784ded3fe366eb407eafae816
dracut-squash-049-218.git20221019.el8_7.x86_64.rpm
f18f02e40a70525f0b6cf73df191bb5e8b4a1f755c48dad9941e971ec37a1ece
dracut-tools-049-218.git20221019.el8_7.x86_64.rpm
2c4d582cc864a1ecbdf5b876df0518d9078f95fde95089e6f08e2251808bbd2d
RLSA-2023:0103
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: use-after free caused by overeager destruction of a shared DTD in
XML_ExternalEntityParserCreate (CVE-2022-43680)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
none-baseos-rpms
expat-2.2.5-10.el8_7.1.i686.rpm
690d404e9632e151a9383ca417421e495bc5c21f15231b6a78ee25e7b6e95c76
expat-2.2.5-10.el8_7.1.x86_64.rpm
9056a431ff2a53f8686e46007eea7f7247163d3e51bf0ac27af38b89c1102095
expat-devel-2.2.5-10.el8_7.1.i686.rpm
ccaae4b27c02cc73402e383dc9ab15fbf88a1510ded02473d703176d564a8a2c
expat-devel-2.2.5-10.el8_7.1.x86_64.rpm
5ba825ef27e4e9ace75c9ebbff8754f76392d2e661f7f2d66b0cd7bc2474774f
RLBA-2023:0105
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252)
none-baseos-rpms
libblkid-2.32.1-39.el8_7.i686.rpm
fef2c776aebc09cd5d57043aa84c6b97b294ab83e56b7df0d951e0a535af3b73
libblkid-2.32.1-39.el8_7.x86_64.rpm
5dc2f6a4284d32818de3cc95f19e0845141b905ae07c7b2cc19ba6d96c6d9a74
libblkid-devel-2.32.1-39.el8_7.i686.rpm
23465d8451f92a6671960ed9be8f4fd78e9c7143ef2c3a1f32c130a53fcc779c
libblkid-devel-2.32.1-39.el8_7.x86_64.rpm
3cab9c0e6bb556eae07bbd13a24c0774d854a5b73be0cd017f82f8c484be1338
libfdisk-2.32.1-39.el8_7.i686.rpm
dc21c8b2e7d1a5e3e699a1556143dad5e3d858a3ffd9d10878d42f0ae8bd852e
libfdisk-2.32.1-39.el8_7.x86_64.rpm
933eab8a44284ab93d40a88996a7e9a8a1f75039466ddd2ff6c1092907100fb9
libfdisk-devel-2.32.1-39.el8_7.i686.rpm
f687e0bf838316543f290d8c050287574a386f9828f07f947914c858f7d9b0b7
libfdisk-devel-2.32.1-39.el8_7.x86_64.rpm
d1bfc8f16e1b5a8ef7c033ad2ce84ebe4f8cc3e7367dd2398fb52bf0a7739cd1
libmount-2.32.1-39.el8_7.i686.rpm
ea46a4432d7546cd42b7a669609acedbdf22f4c97422b7a77038312ab2cb55ee
libmount-2.32.1-39.el8_7.x86_64.rpm
db6225656d9d772838caaf6614b621f3aba4acf4401568aa0f0fbb26f53ff34c
libsmartcols-2.32.1-39.el8_7.i686.rpm
702c8a4587d1cd2f9040baf974f6ef868ee8c8c9ec8718be823ca3f8eb4e69f3
libsmartcols-2.32.1-39.el8_7.x86_64.rpm
4e44ca814cca48b12bd7a23f875c26d0c9d10b30e7dc5d65b34a9d2be3039695
libsmartcols-devel-2.32.1-39.el8_7.i686.rpm
a00eaab1737f4e16865c8e407ce30f62d1b253849160b465b444e2c4f6d875d5
libsmartcols-devel-2.32.1-39.el8_7.x86_64.rpm
c8661ef0dee4c219f624b690a601d631dec8488e744348fe49cfaecacfab3108
libuuid-2.32.1-39.el8_7.i686.rpm
3c19632f1013e111898f81003fd9a47fe99f0d929663384283211bb498262938
libuuid-2.32.1-39.el8_7.x86_64.rpm
2eb19b756eebdef3e9a9f7f82e46e3689e9015f604c54d0bac0a70d58a967d67
libuuid-devel-2.32.1-39.el8_7.i686.rpm
ebba0075f1d39a61711897945f407219c41803dde6b0178f1ed840f38a675cac
libuuid-devel-2.32.1-39.el8_7.x86_64.rpm
468d08ad5f52e347473566e625002e3511c3b94da07dca536daf6ab40bc69e4e
util-linux-2.32.1-39.el8_7.x86_64.rpm
b0e4e9d1eb9d0c1b75b58e3d126c428009e0f43de0dcb4b4ccc30915721ba5ea
util-linux-user-2.32.1-39.el8_7.x86_64.rpm
aa1c3c0e6688c7362932387554577abb5308022e458a216812eeedde67dad0d7
uuidd-2.32.1-39.el8_7.x86_64.rpm
516bdce9592573866ad5c930f838322b93af315727388a38b442d14f2d81eeaa
RLBA-2023:0106
gcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075)
none-baseos-rpms
libasan-8.5.0-16.el8_7.i686.rpm
a1e6226b205f908f0e2b87f37d8596272c053f8e1264d5fee939d0e62071b870
libasan-8.5.0-16.el8_7.x86_64.rpm
01e7735778965987fd0d4baf7a738649f7a0700a7c9e5fe5e275ae22523ea9fa
libatomic-8.5.0-16.el8_7.i686.rpm
71991149283f45d04769fba32d35ac1e6d1f6a07c4227182e976fa7ebda68d22
libatomic-8.5.0-16.el8_7.x86_64.rpm
5de43e8039814083a1646492368e53fc262cec8f6a2026fced371b8e79d5f258
libatomic-static-8.5.0-16.el8_7.i686.rpm
a557070eb406c9fcd7fd40e96bbcde0b981c979bbd44d7d63297cf03026ac4ce
libatomic-static-8.5.0-16.el8_7.x86_64.rpm
e6118b15b39adff77ab74996f6894964b02b0946efb0d626496a52ea847b83d9
libgcc-8.5.0-16.el8_7.i686.rpm
a892e9a89754ffa81430ec48a7197a06ad8832ac201fc5ba5c111e99f5139a84
libgcc-8.5.0-16.el8_7.x86_64.rpm
223e66ce39231d96a83e219ca02b96eef3c25804a4f0f6de7e9ed5062816f029
libgfortran-8.5.0-16.el8_7.i686.rpm
d6cb24f1694f1505dfd2bb94a04a41fa5275cd2c09fa839eaf351ce93421122c
libgfortran-8.5.0-16.el8_7.x86_64.rpm
776aef1c63d9a5e444f66bee2238465937167cdd39edc7f5aeb98b54944fee64
libgomp-8.5.0-16.el8_7.i686.rpm
491c4fe32a3ba197a444c2da56155fea67e937faf9ccf85bceacb7d3b07d895a
libgomp-8.5.0-16.el8_7.x86_64.rpm
b35a0924a06d8bdc38fb0ac9233bed6fc28b1a6705dafbcb2e58353a4d285134
libgomp-offload-nvptx-8.5.0-16.el8_7.x86_64.rpm
84a3986c81659eb0bed37fb6cfa5cacb19e16079f1cb8f13e0c755fa7c1f6a2c
libitm-8.5.0-16.el8_7.i686.rpm
91417711e883e6ac4badeaa577ad53b281dcbcb0062fe23517d66eb146a4daf4
libitm-8.5.0-16.el8_7.x86_64.rpm
c9e4f8399ddbd0c3d34e2f11b14df72e8ef8eead715ecbf292829675fbbce3bf
liblsan-8.5.0-16.el8_7.x86_64.rpm
55515aaf8eb97dfbe9cd297113034b0f333d182b9a24a5cadb1ba0fd894a21b9
libquadmath-8.5.0-16.el8_7.i686.rpm
feecbb91fb1e23387a9f726e10ab3c11054c41a7840d7e83fada4d475a52a3a3
libquadmath-8.5.0-16.el8_7.x86_64.rpm
37356951646f3bd77a49fb8a0ff5b206c8c6354c4482ef56b040c8cbd22df50a
libstdc++-8.5.0-16.el8_7.i686.rpm
4eaf1097e04a48a3420a7ea3a08d8208b6fc5c8fc562964752f98c1ebc92a57d
libstdc++-8.5.0-16.el8_7.x86_64.rpm
7a0f66da5d376c677914da8abe4700fd5abc496ac0769014ed32b3db8363425f
libtsan-8.5.0-16.el8_7.x86_64.rpm
6f9e715af8a477782ca552f7162028d11e8ad442867ada58aa35b093a36fc649
libubsan-8.5.0-16.el8_7.i686.rpm
9e41e74b0a252e82256750094a3646b5d552011952f7717db5ac73c5569651ba
libubsan-8.5.0-16.el8_7.x86_64.rpm
ae7ec2db40c566b9b2eb278245bdd3309cb99dfbea8a5e13f2f170a3616e350f
RLBA-2023:0107
dhcp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dhcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Bug Fix(es) and Enhancement(s):
* dhcp: does not send dhcp6.vendor-opts back to clients (BZ#2142025)
none-baseos-rpms
dhcp-client-4.3.6-48.el8_7.1.x86_64.rpm
1ad76df6dfd776e954d0fab9914ec40419d2d3830d3d296821c48cd0be19a58b
dhcp-common-4.3.6-48.el8_7.1.noarch.rpm
f934465c675e5be123b5d7f7aae7c0e894b5cd6c6cd2e73c752655f8d295bfd8
dhcp-common-4.3.6-48.el8_7.1.noarch.rpm
f934465c675e5be123b5d7f7aae7c0e894b5cd6c6cd2e73c752655f8d295bfd8
dhcp-libs-4.3.6-48.el8_7.1.i686.rpm
a886f62ea7d62615040fff1ec36bbd55f889e5cabec4841ea7929931d58169eb
dhcp-libs-4.3.6-48.el8_7.1.x86_64.rpm
a1a36c7c48f672b28f442f8b75fb7fe46bf1bb8ebfad86bf5f25b72d1960e107
dhcp-relay-4.3.6-48.el8_7.1.x86_64.rpm
edab0cab469cd725369b99dd91631bafc9e9c4d21928ce9e00ac42b0be8b393f
dhcp-server-4.3.6-48.el8_7.1.x86_64.rpm
7ec85283e999fc0eb1855650eeff30c3bf0fcefcc52d8588881c1f4790d13f7a
RLBA-2023:0109
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* Ordering cycles at shutdown time causing delay in the shutdown (BZ#2143100)
none-baseos-rpms
systemd-239-68.el8_7.2.i686.rpm
efc9004cbe7ae0a4d5aee53406f0dda3767f0f7569f19ffb8c41ada6208a10fb
systemd-239-68.el8_7.2.x86_64.rpm
2f9899eef3af510585836dcdf06eee68b8a0842697463dc214155b27f6137cda
systemd-container-239-68.el8_7.2.i686.rpm
90f76a2278d1d06cb778d9dec4b9be72622d463654babff7d165171d8ebbb109
systemd-container-239-68.el8_7.2.x86_64.rpm
7076302fd4aab59b9be0486635813640b7969421d17f9123b9954235b3ec18ca
systemd-devel-239-68.el8_7.2.i686.rpm
73e17dafe478555a1887d03d0814579c24a1ebc528f8ef9eb1f63af4d3dc0c44
systemd-devel-239-68.el8_7.2.x86_64.rpm
10606b2ae5a41f7e822f7c9df68018e5b710262ba7426840092c9eb6e4e1a27e
systemd-journal-remote-239-68.el8_7.2.x86_64.rpm
d433b03c864a1647aaaa30180df3de20856e0666f793356c67392dd2c8e313df
systemd-libs-239-68.el8_7.2.i686.rpm
113717c2c27c4ff7508c3d4e4453c3fb671181acb35e5b7269aee9a5dbae9f28
systemd-libs-239-68.el8_7.2.x86_64.rpm
866449a00878ceee913f5fe86156557a6a358888ef0f6ad63a933adbc8d31031
systemd-pam-239-68.el8_7.2.x86_64.rpm
518f0455435e5b800bb42362a2412440e86ebca16d1c6d6450e608d520acde1d
systemd-tests-239-68.el8_7.2.x86_64.rpm
c15ab85b1a9df37e129ccf3c9bfb31350178262852f1a26dbcdcdf92759d3981
systemd-udev-239-68.el8_7.2.x86_64.rpm
25a85109d922cfa15fc8761287eebf991a1a5ada085d6458f542b1cf27081416
RLSA-2023:0110
Moderate: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sqlite-3.26.0-17.el8_7.i686.rpm
888bd50f077bf70782d6630875dfddea98f4782d474fe3de287c86a0f6cbc97e
sqlite-3.26.0-17.el8_7.x86_64.rpm
da52f40c548a2cf17376d6f42f1f9bc0759ad20dd8cdba263f488d9d9b53497b
sqlite-devel-3.26.0-17.el8_7.i686.rpm
a6eb9d6dfd38ab5e583589911fbefbfbd14bd1e3846ae6fbe8e03b7b4ed11012
sqlite-devel-3.26.0-17.el8_7.x86_64.rpm
b93eca50687135f73465cd6b76c9f1965322bd652bde50f6195f8a7408c9bd76
sqlite-doc-3.26.0-17.el8_7.noarch.rpm
62de890713f95e66cecfbf4c9411060f95a3d58ba10b473b277294f7877ba70a
sqlite-doc-3.26.0-17.el8_7.noarch.rpm
62de890713f95e66cecfbf4c9411060f95a3d58ba10b473b277294f7877ba70a
sqlite-libs-3.26.0-17.el8_7.i686.rpm
2e22a5eb8fed954e7bcd084d3666bc5c4fa3761ec529ba43709ef0b6485e92a0
sqlite-libs-3.26.0-17.el8_7.x86_64.rpm
7048c7ef6e7b5926bf70a1b467010a9694beaa2ceaa69397033d2421ff83938c
RLBA-2023:0111
curl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Bug Fix(es) and Enhancement(s):
* Fall back automatically to HTTP1.1 from HTTP2.0 when performing auth method. (BZ#2144493)
none-baseos-rpms
curl-7.61.1-25.el8_7.1.x86_64.rpm
795124f1d1bddd0bc568f720e06bbd6788a4c7553fde4b5287c41e2152908c2a
libcurl-7.61.1-25.el8_7.1.i686.rpm
b7712da8f3b03e2ac8bd09e4baf07361d046db0f7c9c78363a12e63d32f4fc21
libcurl-7.61.1-25.el8_7.1.x86_64.rpm
44e96dae7a32104d09ad7318327776b3efa8e7ccedc9ef9004ba3409bf51e786
libcurl-devel-7.61.1-25.el8_7.1.i686.rpm
7feb4bbb3faca30d5ff7f65e575c5e3b8906feba859447c4e31aa20b369a1b87
libcurl-devel-7.61.1-25.el8_7.1.x86_64.rpm
87c20af4fc87fd7ab5c01221fd243a8c7f666feaf70e3422a1bcee7ec396299b
libcurl-minimal-7.61.1-25.el8_7.1.i686.rpm
80a46e6c176cb5ece9f531bf7824ddf98757803f0585273af108c6d8c76ce913
libcurl-minimal-7.61.1-25.el8_7.1.x86_64.rpm
231925f734309d069301aeb0358a0befd1d7798dd0f141b887638b6d415e0e03
RLSA-2023:0116
Moderate: libtasn1 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtasn1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libtasn1-4.13-4.el8_7.i686.rpm
97006f3ac80789a0840c6d7e4b4666f5d578d16f8067e40b7249d73f773f4500
libtasn1-4.13-4.el8_7.x86_64.rpm
698f540e70ef17aa66b99cfe52f953588a46ef65059a121df858530aa78fe12b
RLBA-2023:0120
authselect bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The authselect package configures authentication and identity sources from supported profiles.
Bug Fix(es) and Enhancements:
* Change the default password encryption algorithm back to sha512. (BZ#2151229)
none-baseos-rpms
authselect-1.2.5-2.el8_7.x86_64.rpm
e95dc725c549f3233a1aa63b6fc8e0c3211eceaedf210c9248c4f145739dbfed
authselect-libs-1.2.5-2.el8_7.i686.rpm
300ca77e924ca8b7ed9c78464685d911a4f8953530a3a75bae9c1507b7c859e1
authselect-libs-1.2.5-2.el8_7.x86_64.rpm
5c0c29fd06e9ec99832db4fd1501e9d201ec08f32d0602d0388f34a8f9d42ee0
RLBA-2023:0121
libqb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libqb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling.
Bug Fix(es) and Enhancement(s):
* pacemaker command "crm_attribute" intermittently fails with error code 102 (BZ#2151300)
none-baseos-rpms
libqb-1.0.3-13.el8_7.i686.rpm
5e4efc63031b1bbab7d51388ec9abc3605a894e3053679d6bd17ec336ce27697
libqb-1.0.3-13.el8_7.x86_64.rpm
e0efd877528fd39ea990fa9997a11f27c657e7db9cf479f880fd027b7e53c16f
libqb-devel-1.0.3-13.el8_7.i686.rpm
2cb310823921c058f51f440b6f232a57013260b79b38b49e4ecd390a8839dc55
libqb-devel-1.0.3-13.el8_7.x86_64.rpm
45175558d9e110d856f88c1b6b5c8beabe6a870534b4a49a31ac2fa1a1ca689e
RLBA-2023:0124
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871)
* SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961)
* UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989)
* authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883)
none-baseos-rpms
libipa_hbac-2.7.3-4.el8_7.3.i686.rpm
ae1ec325d39e8d89cb83d09e7c39850b094f36b0e487cd661744edbc426c6f50
libipa_hbac-2.7.3-4.el8_7.3.x86_64.rpm
6b40647e7b80410117036e54ab13d4c1fcfd0feff168c9efa81cd7a294647554
libsss_autofs-2.7.3-4.el8_7.3.x86_64.rpm
2abe579c4ffdc56c97865c289d5fd1bf6d1299c4a3f455ff3fdff36dc9ebb705
libsss_certmap-2.7.3-4.el8_7.3.i686.rpm
7cc898d9194311fc9c7c0f1ddcb946bca53120feb4102653f33362088d29afa6
libsss_certmap-2.7.3-4.el8_7.3.x86_64.rpm
f1e46e67ce2c8ba2384e624bbc16e888ac49023ae54fbe6e953814d6b4cb20ae
libsss_idmap-2.7.3-4.el8_7.3.i686.rpm
fdc4ab211f568cc95824c5dbf52942aba752c5b3c69368535ebbaf7ae79e6867
libsss_idmap-2.7.3-4.el8_7.3.x86_64.rpm
94666537c6621b86db022d639720f5e53822396cb3e192d80ee717bcf672b374
libsss_nss_idmap-2.7.3-4.el8_7.3.i686.rpm
37c762d024a177bda29c0c73fa0254b7358a559ef1a74b8a5fce939894361f23
libsss_nss_idmap-2.7.3-4.el8_7.3.x86_64.rpm
c0d8498d901322fcc782c5a4eab3cb178c914e5fc116f239c83f490f604e35f8
libsss_simpleifp-2.7.3-4.el8_7.3.i686.rpm
771e1d5c1747e91d1b4157f04ed4a7dd9f34be93af8ec104b8e92a9bf10eb3c0
libsss_simpleifp-2.7.3-4.el8_7.3.x86_64.rpm
b4c9570e3387cabec115e415799de32c218383f3f331239f62bc2af410d12dbd
libsss_sudo-2.7.3-4.el8_7.3.x86_64.rpm
1139edc554703c819058d09f04a3830db31f6c7f28e968937d7880bc0ef68ef3
python3-libipa_hbac-2.7.3-4.el8_7.3.x86_64.rpm
c4cd62b685bcf95b770178094d6860ed844979befa5d3500d18a7a00924fc70b
python3-libsss_nss_idmap-2.7.3-4.el8_7.3.x86_64.rpm
dfad347b627ba48abfa4e931827f0e1c795f3282e7a6c8c3188cda97e31d93e0
python3-sss-2.7.3-4.el8_7.3.x86_64.rpm
3e8763cfc3dd9adbd2b419368df54a093b64de01aa604cbe6cf6222593ebda47
python3-sssdconfig-2.7.3-4.el8_7.3.noarch.rpm
3f970ce3ad4b982366c148cf5018cc84fe95ef2806a4ace624ac1aeeaf83841b
python3-sssdconfig-2.7.3-4.el8_7.3.noarch.rpm
3f970ce3ad4b982366c148cf5018cc84fe95ef2806a4ace624ac1aeeaf83841b
python3-sss-murmur-2.7.3-4.el8_7.3.x86_64.rpm
61a7c08df8bef1cf1652468a740930975e4c52f0fb9da3f08263dfc353ecb43a
sssd-2.7.3-4.el8_7.3.x86_64.rpm
7c3baa320c7b740bf08bb67c55a9c790a6480f997b38e41e326d5e69608bfc12
sssd-ad-2.7.3-4.el8_7.3.x86_64.rpm
0e7992a19420b1bb74200ef92a139989ebf9b30b377f95ca6f7deaa03cc4bed2
sssd-client-2.7.3-4.el8_7.3.i686.rpm
c1f539adf6b3da9904ebc335d3977aba96d7f1a5c151895b188061ca7ab2c12a
sssd-client-2.7.3-4.el8_7.3.x86_64.rpm
f4aeb3e00faf97c8b2e4f6031709791eab6acc7681e4c575daee7d5f11effd94
sssd-common-2.7.3-4.el8_7.3.x86_64.rpm
d5a174d21352131d908f693cad3af713d20e5a15d8e6e2575976af4ad3031491
sssd-common-pac-2.7.3-4.el8_7.3.x86_64.rpm
88b2c379c74beb349f036be50d736a903770a9fbefa8b339cbbd867b57aa532f
sssd-dbus-2.7.3-4.el8_7.3.x86_64.rpm
0c886341fc961e0adabe7540c1ab7b194cc78f41f77aef306e022cbd9cd17d4e
sssd-ipa-2.7.3-4.el8_7.3.x86_64.rpm
92c10dc54edbf36335eb98ebd4dd07e2366c110d4f4cfb04953b4b6a45b2e670
sssd-kcm-2.7.3-4.el8_7.3.x86_64.rpm
64974f05f0da2a908b87df152ba2d30e1e576bf434057648e16f7a3fd851ad6d
sssd-krb5-2.7.3-4.el8_7.3.x86_64.rpm
7041c2128541b7698e3193e8df7e288af978afb95d13ce103579090c41a4831a
sssd-krb5-common-2.7.3-4.el8_7.3.x86_64.rpm
855a424d69ca18dd1449fbed49461a518bbc5aaa00c4be18464adaecffa7edf7
sssd-ldap-2.7.3-4.el8_7.3.x86_64.rpm
18d06837faec5cc53b9472935128a0e4e2339356a295572752ed9703c88519e4
sssd-nfs-idmap-2.7.3-4.el8_7.3.x86_64.rpm
e096e1bcbb2a958600e4e5654c6652d246a3f2fc140b95c24f1277d171998093
sssd-polkit-rules-2.7.3-4.el8_7.3.x86_64.rpm
c2d5b4f67b2b749328b760ac67f6797b741d2e887ab3fd35e73eb757ba3e3c89
sssd-proxy-2.7.3-4.el8_7.3.x86_64.rpm
c17e69a34bd8469ea6b01ed07a3c8c5be484bf99cb547d8a3edb767cda113965
sssd-tools-2.7.3-4.el8_7.3.x86_64.rpm
10f80f84bd2147fd7fffcf1edf600bd3819380dba6c5b4fd5a9f37b645dfcd24
sssd-winbind-idmap-2.7.3-4.el8_7.3.x86_64.rpm
6ac52a9c943338d0011231dd220b3ecf6ae7c8cc9394fbc1937ec5664af2aa9f
RLSA-2023:0173
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303)
* libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-15.el8_7.1.i686.rpm
402a8ae2e92d5403fbad680ea519e676d914a1a48b531004803a49891e297fdd
libxml2-2.9.7-15.el8_7.1.x86_64.rpm
e9a71d804fc627ec77aa50b455b5b94a33504adf93d4ba8ab8b1b8284cd95feb
python3-libxml2-2.9.7-15.el8_7.1.x86_64.rpm
2d53cb3dbc45a62369b67e8cebd1a83b13e85289c3ba3b3243f112ed6b2186ee
RLSA-2023:0284
Important: sudo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for sudo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sudo-1.8.29-8.el8_7.1.x86_64.rpm
99fd306e228fad26891792ff23712787394a9cff9907b6b82db5a11ffef4b5d5
RLBA-2020:1789
python-dns bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
python3-dns-1.15.0-10.el8.noarch.rpm
ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94
python3-dns-1.15.0-10.el8.noarch.rpm
ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94
python3-dns-1.15.0-10.el8.noarch.rpm
ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94
python3-dns-1.15.0-10.el8.noarch.rpm
ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94
python3-dns-1.15.0-10.el8.noarch.rpm
ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94
python3-dns-1.15.0-10.el8.noarch.rpm
ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94
RLSA-2025:16919
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: nfsd: don't ignore the return code of svc_proc_register() (CVE-2025-22026)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (CVE-2022-50087)
* kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.77.1.el8_10.x86_64.rpm
ff585292f7ddbfb3ddb1a936efd1d70fee92e57019249b61da85b2597b452fbf
kernel-4.18.0-553.77.1.el8_10.x86_64.rpm
2cafbf886316d50d4c59048c42b593aa23f173d650374d6a73caec707e994122
kernel-abi-stablelists-4.18.0-553.77.1.el8_10.noarch.rpm
078767be542af308823766dbac2ef9306787c7b49eac5e3d2a92918b069a913e
kernel-abi-stablelists-4.18.0-553.77.1.el8_10.noarch.rpm
078767be542af308823766dbac2ef9306787c7b49eac5e3d2a92918b069a913e
kernel-core-4.18.0-553.77.1.el8_10.x86_64.rpm
18e9b74ac260d19ebc586b1cef19905841d6e7da9cd96e5d533d2b5fc6df96f9
kernel-debug-4.18.0-553.77.1.el8_10.x86_64.rpm
006ef208e044fdd42df1e44c11cec0395fdeb338e4b7ca67bac247dc17f0ec31
kernel-debug-core-4.18.0-553.77.1.el8_10.x86_64.rpm
606aa79010481ca23bccec3ce159870d0d61bcd4beab7169637a53be113d62f5
kernel-debug-devel-4.18.0-553.77.1.el8_10.x86_64.rpm
aa1699bb81d93de32f9ef1a93959ebae6cdb5f8d42d93f8b050915fc6269f962
kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64.rpm
a6e5979ee2e0347e06b52e557bec5da85b020325d0a762f4aa70c6b8bb763b7b
kernel-debug-modules-4.18.0-553.77.1.el8_10.x86_64.rpm
af09b3ac5a783da67ace7a2d0f8822ec8afd30399b2aec7846ef04e380d4c88c
kernel-debug-modules-extra-4.18.0-553.77.1.el8_10.x86_64.rpm
6eb9ba245620a1261eeab8a21cba3df0b74249d780da295442364172919760a2
kernel-devel-4.18.0-553.77.1.el8_10.x86_64.rpm
03cf3596c92a8f89f6649f9080071ce97f2dd0959ff6431e9fb3ae8b73b4da39
kernel-doc-4.18.0-553.77.1.el8_10.noarch.rpm
bc2e315e1c24da8e83ccd5d84711eee1a5914e3126d2cfc7485bd353e3aa54eb
kernel-doc-4.18.0-553.77.1.el8_10.noarch.rpm
bc2e315e1c24da8e83ccd5d84711eee1a5914e3126d2cfc7485bd353e3aa54eb
kernel-modules-4.18.0-553.77.1.el8_10.x86_64.rpm
76ae947313b51e014629939a7ae943ec0738505fcbd5e1f0964439e2ef1a346c
kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64.rpm
9bab678e37f7d5e88b775310ea8010e7f468a69f08f8f9de0117ae20fd1e4013
kernel-tools-4.18.0-553.77.1.el8_10.x86_64.rpm
ccb6629f637210151d48bb7524fea27533b59fb6e3ced71f534699f6f693152b
kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64.rpm
7e3d2aa94954083dd3b71a74f312ebe5db8cf66835e2fb5f4b073243dc7a2a17
perf-4.18.0-553.77.1.el8_10.x86_64.rpm
ff9f2b1b1f3cda8648d25bbb11d2a9eb1bd894bb63ad28b098ca5f61099e05e5
python3-perf-4.18.0-553.77.1.el8_10.x86_64.rpm
21abb9add8986be40cf1b66ccf671c5657b24dc6d434f3c091365cbeff03fa08
RLBA-2022:1032
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022a, which addresses recent
time zone changes. Notably:
* In Palestine the daylight saving time (DST) starts on March 27, 2022, not on March 26.
* The zdump -v command now outputs better failure information.
* This update provides fixes for a code that read corrupted TZif data.
none-baseos-rpms
tzdata-2022a-1.el8.noarch.rpm
5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384
tzdata-2022a-1.el8.noarch.rpm
5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384
tzdata-2022a-1.el8.noarch.rpm
5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384
tzdata-2022a-1.el8.noarch.rpm
5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384
RLSA-2022:1065
Important: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-1.1.1k-6.el8_5.x86_64.rpm
80bf55f554905f96f7f2c00b7d13834671a44843a5100fc6d15ff21071cdb8c0
openssl-1.1.1k-6.el8_5.x86_64.rpm
80bf55f554905f96f7f2c00b7d13834671a44843a5100fc6d15ff21071cdb8c0
openssl-devel-1.1.1k-6.el8_5.i686.rpm
d5ac5657c3b1272ae92e8a528b0b097ebdeaa0d92e5bdfd6395cde3b22768662
openssl-devel-1.1.1k-6.el8_5.i686.rpm
d5ac5657c3b1272ae92e8a528b0b097ebdeaa0d92e5bdfd6395cde3b22768662
openssl-devel-1.1.1k-6.el8_5.x86_64.rpm
29e0e916371646d337ac19d83d9bcd822e99229cdfc879d9a3c47bbb5bee6f7c
openssl-devel-1.1.1k-6.el8_5.x86_64.rpm
29e0e916371646d337ac19d83d9bcd822e99229cdfc879d9a3c47bbb5bee6f7c
openssl-libs-1.1.1k-6.el8_5.i686.rpm
e7557b5375d75276d4bacbf87659b210243246c955742fc587043eed05928043
openssl-libs-1.1.1k-6.el8_5.i686.rpm
e7557b5375d75276d4bacbf87659b210243246c955742fc587043eed05928043
openssl-libs-1.1.1k-6.el8_5.x86_64.rpm
8f4e76a68b7384e8a1d7f9a796bd5709b797435ddc02d79de74cbdb2796e6ee7
openssl-libs-1.1.1k-6.el8_5.x86_64.rpm
8f4e76a68b7384e8a1d7f9a796bd5709b797435ddc02d79de74cbdb2796e6ee7
openssl-perl-1.1.1k-6.el8_5.x86_64.rpm
ada4d499b73dd8a7e3025976eb1d0da59e130c63fb7b89cb39d618672125f8b8
openssl-perl-1.1.1k-6.el8_5.x86_64.rpm
ada4d499b73dd8a7e3025976eb1d0da59e130c63fb7b89cb39d618672125f8b8
RLSA-2025:17415
Moderate: gnutls security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990)
* gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395)
Bug Fix(es) and Enhancement(s):
* gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620)
* gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gnutls-3.6.16-8.el8_10.4.i686.rpm
cd55d793e0fac4148f5cc9ba2f980028472df63cdd672f63a65eb2de517b47c2
gnutls-3.6.16-8.el8_10.4.x86_64.rpm
e8e1b15e242b3fbac5dcd3c24d252a4eeb325ab773f98f3b8f7b0c80010d1002
RLSA-2025:17715
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
vim-minimal-8.0.1763-21.el8_10.x86_64.rpm
2c7d828ea405665bf933fa48e1cc6c800428034e5d9449e0952e238b756eb284
RLBA-2019:3595
cronie bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cronie.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
cronie-1.5.2-4.el8.x86_64.rpm
694c02c093976cb735b0f2f948ce033da83daf9b91a0667d9aa03f693bf87a42
cronie-1.5.2-4.el8.x86_64.rpm
694c02c093976cb735b0f2f948ce033da83daf9b91a0667d9aa03f693bf87a42
cronie-anacron-1.5.2-4.el8.x86_64.rpm
436b6d3a6781a64877639e622ce96852b6d3f6f5a2dd00643952ae26fa8a82d3
cronie-anacron-1.5.2-4.el8.x86_64.rpm
436b6d3a6781a64877639e622ce96852b6d3f6f5a2dd00643952ae26fa8a82d3
cronie-noanacron-1.5.2-4.el8.x86_64.rpm
ccc3c830af55fcae1042ddd6fa8184a285733630a174b1d3ecb921551ed0b6f6
cronie-noanacron-1.5.2-4.el8.x86_64.rpm
ccc3c830af55fcae1042ddd6fa8184a285733630a174b1d3ecb921551ed0b6f6
RLBA-2019:3653
libuser bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libuser.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libuser-0.62-23.el8.i686.rpm
6ac6bea1e8b4df61e97a10f78ea83eeec012df306d19b71ff67a652c5f815e83
libuser-0.62-23.el8.i686.rpm
6ac6bea1e8b4df61e97a10f78ea83eeec012df306d19b71ff67a652c5f815e83
libuser-0.62-23.el8.x86_64.rpm
c5d2e6101e43ff26b30c571f4904925825b54ff1a227d6a983e1679c5b614f30
libuser-0.62-23.el8.x86_64.rpm
c5d2e6101e43ff26b30c571f4904925825b54ff1a227d6a983e1679c5b614f30
python3-libuser-0.62-23.el8.x86_64.rpm
f82c506399a46d99d381a7ce274dce00167dfa5f939de81be1a373e6d8510205
python3-libuser-0.62-23.el8.x86_64.rpm
f82c506399a46d99d381a7ce274dce00167dfa5f939de81be1a373e6d8510205
RLBA-2019:3666
libtirpc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtirpc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libtirpc-1.1.4-4.el8.i686.rpm
93230b69eca578459a4b21459974695f6c5715dbac069bae673b0aa038350fb5
libtirpc-1.1.4-4.el8.x86_64.rpm
9493b27250c73f123cd45a6b11f21e479427a41b294a2d1d1419523fa3311a7f
libtirpc-devel-1.1.4-4.el8.i686.rpm
540470370498c1f487f87c0a1f92fe92f426bf10a7066fc2a6a0e40606fe8f22
libtirpc-devel-1.1.4-4.el8.x86_64.rpm
ce04042f1fcfb791cc62e23490220ff120a00f311ff3255e4767e5c3874d317f
RLSA-2019:3673
Low: lldpad security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for lldpad.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lldpad packages provide the Linux user space daemon and configuration tool for Intel's Link Layer Discovery Protocol (LLDP) Agent with Enhanced Ethernet support.
Security Fix(es):
* lldptool: improper sanitization of shell-escape codes (CVE-2018-10932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
lldpad-1.0.1-13.git036e314.el8.i686.rpm
930c7acbb38a18cc450ac124b2c0725d1445a2feb9a59f3de9229e132dfb45b8
lldpad-1.0.1-13.git036e314.el8.x86_64.rpm
b5e9f476ade133a24827db16756d4f3813b77774e3c66aafe2ba67389a0f9575
RLBA-2019:3679
parted bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for parted.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
parted-3.2-38.el8.i686.rpm
49f148df4d50e50fb26d5e78734bda87b6f6586f34c51e4286d5924c2d458a66
parted-3.2-38.el8.x86_64.rpm
47dcebc05fee8d98c63e30d055ca566f8b537e7ded25386fa35ba08de261b8d5
RLSA-2019:3706
Moderate: lua security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for lua.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.
Security Fix(es):
* lua: use-after-free in lua_upvaluejoin in lapi.c resulting in denial of service (CVE-2019-6706)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
lua-libs-5.3.4-11.el8.i686.rpm
fc68faa1f02f4c5957816d88914ed3dd04c03b55c83db0e692f569f4d7b80af4
lua-libs-5.3.4-11.el8.x86_64.rpm
54648aa9a0fccfc841cb9c891eec2b6d49bb2c99ae6d1547c932089d4d9b766d
RLSA-2020:0903
Important: zsh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for zsh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell (the Korn shell), but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions (with autoloading), a history mechanism, and more.
Security Fix(es):
* zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
zsh-5.5.1-6.el8_1.2.x86_64.rpm
7fce711e8ec6816319ea43d2ee13116fa859602d76984f1f3b46de7ee4ffc191
zsh-5.5.1-6.el8_1.2.x86_64.rpm
7fce711e8ec6816319ea43d2ee13116fa859602d76984f1f3b46de7ee4ffc191
RLBA-2020:1762
rng-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rng-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
rng-tools-6.8-3.el8.x86_64.rpm
521debefff652a7a24b931b80eee027837a1b5bd4469b66cb7397a4694fe6750
RLEA-2020:1763
libnftnl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnftnl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
libnftnl-1.1.5-4.el8.i686.rpm
68de2a17de9e789e5fbbca24e42d3255ff76d4f23bdf40af19469afddce9e879
libnftnl-1.1.5-4.el8.i686.rpm
68de2a17de9e789e5fbbca24e42d3255ff76d4f23bdf40af19469afddce9e879
libnftnl-1.1.5-4.el8.x86_64.rpm
6ca8a5858118185ff195dd92d40cb872356fff6013e5799f648ea05052441a3b
libnftnl-1.1.5-4.el8.x86_64.rpm
6ca8a5858118185ff195dd92d40cb872356fff6013e5799f648ea05052441a3b
RLBA-2020:1813
libcap-ng bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
libcap-ng-0.7.9-5.el8.i686.rpm
afd840138fb5dd0875d3ea5cd124a067261527162dfb31f0995244dd87f8185d
libcap-ng-0.7.9-5.el8.x86_64.rpm
47182d0caf06fac78fdd904d7f49c9318ce107817824b217bb81add080dde239
libcap-ng-devel-0.7.9-5.el8.i686.rpm
7ac75881a6c423402e438fda1dc5d9feb8e4da2dbac4e4d97d522926533e0c90
libcap-ng-devel-0.7.9-5.el8.x86_64.rpm
3477e184fea1a9535eb307a21c82ef03283084175a5e3436b1aa397d08e8794e
libcap-ng-utils-0.7.9-5.el8.x86_64.rpm
81965a21a1b602694cea1b3830fe5426f7d3f3ac48bcef4af4a41342965d2a2a
RLBA-2020:1830
numatop bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numatop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
numatop-2.1-3.el8.x86_64.rpm
0522f17cb00b8a9054d90e08e4eb27c34ddb78d28afc54f0385c8df2974f33dd
numatop-2.1-3.el8.x86_64.rpm
0522f17cb00b8a9054d90e08e4eb27c34ddb78d28afc54f0385c8df2974f33dd
RLBA-2020:1847
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libnl3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
libnl3-3.5.0-1.el8.i686.rpm
074a0bba00ec6d8a803c35baa9028ebad37410e841a0ed226a7ae3266a18fcb6
libnl3-3.5.0-1.el8.i686.rpm
074a0bba00ec6d8a803c35baa9028ebad37410e841a0ed226a7ae3266a18fcb6
libnl3-3.5.0-1.el8.i686.rpm
074a0bba00ec6d8a803c35baa9028ebad37410e841a0ed226a7ae3266a18fcb6
libnl3-3.5.0-1.el8.x86_64.rpm
b3c44d264560d119d835036a9d4d499b8f6f0ee953b2fca8c8235dfee33331f0
libnl3-3.5.0-1.el8.x86_64.rpm
b3c44d264560d119d835036a9d4d499b8f6f0ee953b2fca8c8235dfee33331f0
libnl3-3.5.0-1.el8.x86_64.rpm
b3c44d264560d119d835036a9d4d499b8f6f0ee953b2fca8c8235dfee33331f0
libnl3-cli-3.5.0-1.el8.i686.rpm
cc81527f9fb6c2e4f439e7ef03814e678bdf3468109345472ded2fff029fd1be
libnl3-cli-3.5.0-1.el8.i686.rpm
cc81527f9fb6c2e4f439e7ef03814e678bdf3468109345472ded2fff029fd1be
libnl3-cli-3.5.0-1.el8.i686.rpm
cc81527f9fb6c2e4f439e7ef03814e678bdf3468109345472ded2fff029fd1be
libnl3-cli-3.5.0-1.el8.x86_64.rpm
8909ca201eb6948f46f58d5ee525d00c32cea7a1c71c6a528616ecf2a8e9392d
libnl3-cli-3.5.0-1.el8.x86_64.rpm
8909ca201eb6948f46f58d5ee525d00c32cea7a1c71c6a528616ecf2a8e9392d
libnl3-cli-3.5.0-1.el8.x86_64.rpm
8909ca201eb6948f46f58d5ee525d00c32cea7a1c71c6a528616ecf2a8e9392d
libnl3-devel-3.5.0-1.el8.i686.rpm
025c0c7997b178cf27176549d3ab0010b9b631ea36fed1524faaf7a51529d8dc
libnl3-devel-3.5.0-1.el8.i686.rpm
025c0c7997b178cf27176549d3ab0010b9b631ea36fed1524faaf7a51529d8dc
libnl3-devel-3.5.0-1.el8.i686.rpm
025c0c7997b178cf27176549d3ab0010b9b631ea36fed1524faaf7a51529d8dc
libnl3-devel-3.5.0-1.el8.x86_64.rpm
c36ca1f82a77f1fe08daebd59caaf2cb20498c2fdfc808a6d5ed0d8b3da89315
libnl3-devel-3.5.0-1.el8.x86_64.rpm
c36ca1f82a77f1fe08daebd59caaf2cb20498c2fdfc808a6d5ed0d8b3da89315
libnl3-devel-3.5.0-1.el8.x86_64.rpm
c36ca1f82a77f1fe08daebd59caaf2cb20498c2fdfc808a6d5ed0d8b3da89315
libnl3-doc-3.5.0-1.el8.x86_64.rpm
ee989e623bc341d4293d958fad6d12c5a72c736960eb8b425a9a55c88fcb705d
libnl3-doc-3.5.0-1.el8.x86_64.rpm
ee989e623bc341d4293d958fad6d12c5a72c736960eb8b425a9a55c88fcb705d
libnl3-doc-3.5.0-1.el8.x86_64.rpm
ee989e623bc341d4293d958fad6d12c5a72c736960eb8b425a9a55c88fcb705d
python3-libnl3-3.5.0-1.el8.x86_64.rpm
9a57c7b6ab043ad1f21ae4a04f68e76edda2673064516e1017f1e6920af6a5a3
python3-libnl3-3.5.0-1.el8.x86_64.rpm
9a57c7b6ab043ad1f21ae4a04f68e76edda2673064516e1017f1e6920af6a5a3
python3-libnl3-3.5.0-1.el8.x86_64.rpm
9a57c7b6ab043ad1f21ae4a04f68e76edda2673064516e1017f1e6920af6a5a3
RLBA-2020:1851
which bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for which.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
which-2.21-12.el8.x86_64.rpm
9adf378464008fecf8509b3e780c8fc1f944d94c2ef53096a12154cb14e9b516
RLBA-2020:1898
sg3_utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sg3_utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
sg3_utils-1.44-5.el8.x86_64.rpm
a080c4bdece5b523f25e49b8a3d7128c26c7fe0dac731527ec972bd05d38ccc6
sg3_utils-1.44-5.el8.x86_64.rpm
a080c4bdece5b523f25e49b8a3d7128c26c7fe0dac731527ec972bd05d38ccc6
sg3_utils-1.44-5.el8.x86_64.rpm
a080c4bdece5b523f25e49b8a3d7128c26c7fe0dac731527ec972bd05d38ccc6
sg3_utils-libs-1.44-5.el8.i686.rpm
51e152d513687be4aff329c5e553c8bf165d710a4341544fd353eb7f46fabc32
sg3_utils-libs-1.44-5.el8.i686.rpm
51e152d513687be4aff329c5e553c8bf165d710a4341544fd353eb7f46fabc32
sg3_utils-libs-1.44-5.el8.i686.rpm
51e152d513687be4aff329c5e553c8bf165d710a4341544fd353eb7f46fabc32
sg3_utils-libs-1.44-5.el8.x86_64.rpm
2bdb572602dbd27ac34d50fe6d4dea25d937c9165726f0138b4ea1812de72204
sg3_utils-libs-1.44-5.el8.x86_64.rpm
2bdb572602dbd27ac34d50fe6d4dea25d937c9165726f0138b4ea1812de72204
sg3_utils-libs-1.44-5.el8.x86_64.rpm
2bdb572602dbd27ac34d50fe6d4dea25d937c9165726f0138b4ea1812de72204
RLBA-2020:1904
texinfo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for texinfo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
info-6.5-6.el8.x86_64.rpm
6cf9553a12401f11467bddbd3a946ba3cfbcc15b01a59df41a61b0ea6846b189
info-6.5-6.el8.x86_64.rpm
6cf9553a12401f11467bddbd3a946ba3cfbcc15b01a59df41a61b0ea6846b189
RLBA-2020:1906
passwd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for passwd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
passwd-0.80-3.el8.x86_64.rpm
7e9b8c8f68311e4a6d51d90e5f610882dc3bd75ad0a05d7235e576c6621d98d9
passwd-0.80-3.el8.x86_64.rpm
7e9b8c8f68311e4a6d51d90e5f610882dc3bd75ad0a05d7235e576c6621d98d9
RLBA-2020:1911
make bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for make.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.2 Release Notes linked from the References section.
none-baseos-rpms
make-4.2.1-10.el8.x86_64.rpm
3d6a840e155f5b949a158d208ddf14b1e841aea4a6f7680302f446953d7559fe
make-4.2.1-10.el8.x86_64.rpm
3d6a840e155f5b949a158d208ddf14b1e841aea4a6f7680302f446953d7559fe
make-devel-4.2.1-10.el8.i686.rpm
5bc3303c71f781474f89b41f410435b8dcea5b6e9bc1cfc6af35551abf8db721
make-devel-4.2.1-10.el8.i686.rpm
5bc3303c71f781474f89b41f410435b8dcea5b6e9bc1cfc6af35551abf8db721
make-devel-4.2.1-10.el8.x86_64.rpm
87d25ff815399a231817c75fc426bc32370540f2904fd9417077c3d075210a08
make-devel-4.2.1-10.el8.x86_64.rpm
87d25ff815399a231817c75fc426bc32370540f2904fd9417077c3d075210a08
RLBA-2020:3380
ca-certificates bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ca-certificates.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ca-certificates package contains a set of Certificate Authority (CA)
certificates chosen by the Mozilla Foundation for use with the Internet
Public Key Infrastructure (PKI).
Bug Fix(es) and Enhancement(s):
* Annual Rocky Linux 8 ca-certificates update 2020 to nss 3.53 for Firefox 78
(BZ#1849732)
* circular dependency, ca-certificates req coreutils req openssl-libs req
ca-certificates, missing ln (BZ#1849824)
none-baseos-rpms
ca-certificates-2020.2.41-80.0.el8_2.noarch.rpm
1ddbafc0de6a5143e97eb9540a7a325637e95d006df9007f79fd2068bfe942bd
ca-certificates-2020.2.41-80.0.el8_2.noarch.rpm
1ddbafc0de6a5143e97eb9540a7a325637e95d006df9007f79fd2068bfe942bd
RLBA-2020:4447
lz4 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lz4.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
lz4-1.8.3-2.el8.x86_64.rpm
98fef958ed5749811938c5d22eaf1dd8e49331dcf4181239bd16f8f62f0a5357
lz4-devel-1.8.3-2.el8.i686.rpm
8b795100fa93a89db56e7387460066060802d05c1ed04004f79ad9ac245d99c6
lz4-devel-1.8.3-2.el8.x86_64.rpm
e30bac58ea4b5915a333eb7562549ef70be275a608eec37c89f6b3d15db7029c
lz4-libs-1.8.3-2.el8.i686.rpm
90c86e491f2c4e8c1ecf9a370538484548336f4fa989ccc6d06f792111b6d120
lz4-libs-1.8.3-2.el8.x86_64.rpm
94d7bf3bcbfa1b2634765ae7baf90d5c6dd6420bae9a72fcd623b5c675f87ab2
RLBA-2020:4450
rasdaemon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
rasdaemon-0.6.1-5.el8.x86_64.rpm
a5603b2e94222324d41712062a7bd4ec94cf729c880e560ff2038df4ff40ee08
RLSA-2020:4453
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode (CVE-2019-20807)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
vim-minimal-8.0.1763-15.el8.x86_64.rpm
471766db6e6243c352041ea14b4b76794eaf1489872771bb7568bd8dd84f0b63
RLBA-2020:4454
coreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for coreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
coreutils-8.30-8.el8.x86_64.rpm
3b9b8736cd21fb485d54a4159c818a7bc8a2fd2c6cbd4aa4eb7631fe9281e17f
coreutils-common-8.30-8.el8.x86_64.rpm
1c11fe2657f43262c477a443c47b3bd34cc316f23fab24a634823caa7c42720d
coreutils-single-8.30-8.el8.x86_64.rpm
fa698115e6efca3ffd910547f8cb73f1ceb8cb9ca591a566cb756eca74355352
RLBA-2020:4455
chkconfig bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chkconfig.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
chkconfig-1.13-2.el8.x86_64.rpm
c7b376aaff9c43c864e165b4df0371a69ffbb7097b62f332dfa7d456b29575aa
ntsysv-1.13-2.el8.x86_64.rpm
1f0cdfb2f906c77c33d1c46c14f004bc6deb863b235bdfcca7221f8126f54b09
RLBA-2020:4458
setup bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
setup-2.12.2-6.el8.noarch.rpm
c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71
setup-2.12.2-6.el8.noarch.rpm
c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71
setup-2.12.2-6.el8.noarch.rpm
c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71
setup-2.12.2-6.el8.noarch.rpm
c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71
setup-2.12.2-6.el8.noarch.rpm
c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71
setup-2.12.2-6.el8.noarch.rpm
c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71
RLSA-2020:4469
Low: cups security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c (CVE-2020-3898)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
cups-libs-2.2.6-38.el8.i686.rpm
3f443c7a2e24430d6509a4864d64e492f65bc1653f5b930fd0946a53b01ff92a
cups-libs-2.2.6-38.el8.x86_64.rpm
a3aa497fd5b944d620331d2f061a16fca0ba9c83181f2304ac914e54cfc569bf
RLBA-2020:4477
filesystem bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for filesystem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
filesystem-3.8-3.el8.x86_64.rpm
60ae783988f3b7ea85e4094667b8aec07e04a5cef07eb69f47a65f9ced4ec525
RLSA-2020:4482
Moderate: libgcrypt security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libgcrypt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
The following packages have been upgraded to a later upstream version: libgcrypt (1.8.5). (BZ#1764918)
Security Fix(es):
* libgcrypt: ECDSA timing attack allowing private key leak (CVE-2019-13627)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libgcrypt-1.8.5-4.el8.i686.rpm
3f92191b798e818de83234a57017e6651d01cc8837e705ff84117a8d5dd8bcaf
libgcrypt-1.8.5-4.el8.x86_64.rpm
1d90e363535412a39616532d92bffc2e8664257673a12d110e09c7a82e2d4669
libgcrypt-devel-1.8.5-4.el8.i686.rpm
bca87d78d77377d10c981697b359cd52dae1a818f966d0a4b8e76b8e474ad838
libgcrypt-devel-1.8.5-4.el8.x86_64.rpm
3b7ea59795f894290afd41b08fed4e590b25a343377c8d22915072c022902a6b
RLSA-2020:4484
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
expat-2.2.5-4.el8.i686.rpm
289b1d7f70c996e5b1442223319b845d8e726d399304f4e8d16114fb5ba17f7e
expat-2.2.5-4.el8.i686.rpm
289b1d7f70c996e5b1442223319b845d8e726d399304f4e8d16114fb5ba17f7e
expat-2.2.5-4.el8.x86_64.rpm
a091c9e3c46a7a6daa5339a1ea473bf8b6606d2ecd058e1123f89ec865d2d625
expat-2.2.5-4.el8.x86_64.rpm
a091c9e3c46a7a6daa5339a1ea473bf8b6606d2ecd058e1123f89ec865d2d625
expat-devel-2.2.5-4.el8.i686.rpm
66c6df612dfbb0362c71780a63d4fc8e2acc127a2140378b89c9a38aac9c5058
expat-devel-2.2.5-4.el8.i686.rpm
66c6df612dfbb0362c71780a63d4fc8e2acc127a2140378b89c9a38aac9c5058
expat-devel-2.2.5-4.el8.x86_64.rpm
8f7c9c8c3cee32dca80c69f638385043c0e516202a85a2443e566b8758c26eda
expat-devel-2.2.5-4.el8.x86_64.rpm
8f7c9c8c3cee32dca80c69f638385043c0e516202a85a2443e566b8758c26eda
RLSA-2020:4490
Moderate: gnupg2 security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnupg2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards.
The following packages have been upgraded to a later upstream version: gnupg2 (2.2.20). (BZ#1663944)
Security Fix(es):
* GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS (CVE-2019-13050)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
gnupg2-2.2.20-2.el8.x86_64.rpm
2139aba1f597f369f3b37aa7a125d995a5c98054baaf86868b9488c065ba198e
gnupg2-2.2.20-2.el8.x86_64.rpm
2139aba1f597f369f3b37aa7a125d995a5c98054baaf86868b9488c065ba198e
gnupg2-2.2.20-2.el8.x86_64.rpm
2139aba1f597f369f3b37aa7a125d995a5c98054baaf86868b9488c065ba198e
gnupg2-smime-2.2.20-2.el8.x86_64.rpm
f756ac3740cde01e9317642ea045e5d257e2b73d72ef920a182ad10cdfa4d5f8
gnupg2-smime-2.2.20-2.el8.x86_64.rpm
f756ac3740cde01e9317642ea045e5d257e2b73d72ef920a182ad10cdfa4d5f8
gnupg2-smime-2.2.20-2.el8.x86_64.rpm
f756ac3740cde01e9317642ea045e5d257e2b73d72ef920a182ad10cdfa4d5f8
RLSA-2020:4497
Moderate: cyrus-sasl security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cyrus-sasl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols.
Security Fix(es):
* cyrus-sasl: denial of service in _sasl_add_string function (CVE-2019-19906)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
cyrus-sasl-2.1.27-5.el8.i686.rpm
d987f338b45357a07f27d6a81edcc71c9853b8e54476f57fcd1eeac68ef4bf5e
cyrus-sasl-2.1.27-5.el8.i686.rpm
d987f338b45357a07f27d6a81edcc71c9853b8e54476f57fcd1eeac68ef4bf5e
cyrus-sasl-2.1.27-5.el8.x86_64.rpm
6f92dfbc0df77e88197859f461729781ddbec86bb10387a8afe2690a9ef6d6a4
cyrus-sasl-2.1.27-5.el8.x86_64.rpm
6f92dfbc0df77e88197859f461729781ddbec86bb10387a8afe2690a9ef6d6a4
cyrus-sasl-devel-2.1.27-5.el8.i686.rpm
6a229a19eb2106002edbdd57340f8d430b42402f0ee55935e52d29461186d29f
cyrus-sasl-devel-2.1.27-5.el8.i686.rpm
6a229a19eb2106002edbdd57340f8d430b42402f0ee55935e52d29461186d29f
cyrus-sasl-devel-2.1.27-5.el8.x86_64.rpm
7017e1d03d24749166524bb792f012135ce70a9559865de2771f2b2d9c34f266
cyrus-sasl-devel-2.1.27-5.el8.x86_64.rpm
7017e1d03d24749166524bb792f012135ce70a9559865de2771f2b2d9c34f266
cyrus-sasl-gs2-2.1.27-5.el8.i686.rpm
273c171b02be25dd7e8ac4c41031f9778e085eeddee4c36e97d2ae7bf095fb06
cyrus-sasl-gs2-2.1.27-5.el8.i686.rpm
273c171b02be25dd7e8ac4c41031f9778e085eeddee4c36e97d2ae7bf095fb06
cyrus-sasl-gs2-2.1.27-5.el8.x86_64.rpm
4926f4bae109eaa6ad514e7b68dd5a4b61fec68cd1d67bdf46e022a1c540b5a3
cyrus-sasl-gs2-2.1.27-5.el8.x86_64.rpm
4926f4bae109eaa6ad514e7b68dd5a4b61fec68cd1d67bdf46e022a1c540b5a3
cyrus-sasl-gssapi-2.1.27-5.el8.i686.rpm
439ee27eee0e37aaf92a1cdd0082c7908e8370f6c7cba081c4fa73713b0feb4a
cyrus-sasl-gssapi-2.1.27-5.el8.i686.rpm
439ee27eee0e37aaf92a1cdd0082c7908e8370f6c7cba081c4fa73713b0feb4a
cyrus-sasl-gssapi-2.1.27-5.el8.x86_64.rpm
bfb1476bf4414265826d0ee545bb5886f45d7b32060022ab01cc7ab4c24c0849
cyrus-sasl-gssapi-2.1.27-5.el8.x86_64.rpm
bfb1476bf4414265826d0ee545bb5886f45d7b32060022ab01cc7ab4c24c0849
cyrus-sasl-ldap-2.1.27-5.el8.i686.rpm
bd8028d14501efffbe8a5b31a2dbbea20f5a8778925fa17528e4973448ba373c
cyrus-sasl-ldap-2.1.27-5.el8.i686.rpm
bd8028d14501efffbe8a5b31a2dbbea20f5a8778925fa17528e4973448ba373c
cyrus-sasl-ldap-2.1.27-5.el8.x86_64.rpm
76a4ec29b66fb08b70f9244993a4b92a1d6298c6b6525e99503f64d4e6971719
cyrus-sasl-ldap-2.1.27-5.el8.x86_64.rpm
76a4ec29b66fb08b70f9244993a4b92a1d6298c6b6525e99503f64d4e6971719
cyrus-sasl-lib-2.1.27-5.el8.i686.rpm
96441785cd4b27e85cc623402c27e2129ac1e08bd675a1c8a3b300207851ec2a
cyrus-sasl-lib-2.1.27-5.el8.i686.rpm
96441785cd4b27e85cc623402c27e2129ac1e08bd675a1c8a3b300207851ec2a
cyrus-sasl-lib-2.1.27-5.el8.x86_64.rpm
597fd62a59d1a7c8be5ac0a8c516b75324312198db5aaa919830f6b3305d97ba
cyrus-sasl-lib-2.1.27-5.el8.x86_64.rpm
597fd62a59d1a7c8be5ac0a8c516b75324312198db5aaa919830f6b3305d97ba
cyrus-sasl-md5-2.1.27-5.el8.i686.rpm
d0f8bd809693a9f71c1a90f4324b77b0da16be487d0f76315db2fa8fff898eef
cyrus-sasl-md5-2.1.27-5.el8.i686.rpm
d0f8bd809693a9f71c1a90f4324b77b0da16be487d0f76315db2fa8fff898eef
cyrus-sasl-md5-2.1.27-5.el8.x86_64.rpm
6bb0b03a40917ac7e789647c058b6ff741adb9a2d7e7a3d1dd25f8fa42146a73
cyrus-sasl-md5-2.1.27-5.el8.x86_64.rpm
6bb0b03a40917ac7e789647c058b6ff741adb9a2d7e7a3d1dd25f8fa42146a73
cyrus-sasl-ntlm-2.1.27-5.el8.i686.rpm
f02bba869f0b79ca3693777063206a7254c71fd3ca0637f3af539bafacca5c39
cyrus-sasl-ntlm-2.1.27-5.el8.i686.rpm
f02bba869f0b79ca3693777063206a7254c71fd3ca0637f3af539bafacca5c39
cyrus-sasl-ntlm-2.1.27-5.el8.x86_64.rpm
96659095810b3548c2dcfabaf4fe13fc260a61612a88fdd57ddc1ec85cce3c0b
cyrus-sasl-ntlm-2.1.27-5.el8.x86_64.rpm
96659095810b3548c2dcfabaf4fe13fc260a61612a88fdd57ddc1ec85cce3c0b
cyrus-sasl-plain-2.1.27-5.el8.i686.rpm
289b43de410568a44df68385898ffbd3c00cb44281128edc7030f6f79d210c5e
cyrus-sasl-plain-2.1.27-5.el8.i686.rpm
289b43de410568a44df68385898ffbd3c00cb44281128edc7030f6f79d210c5e
cyrus-sasl-plain-2.1.27-5.el8.x86_64.rpm
22d753f74ec1fdd03141a136330d43848a17a5423943c4c497924cd2e7728c27
cyrus-sasl-plain-2.1.27-5.el8.x86_64.rpm
22d753f74ec1fdd03141a136330d43848a17a5423943c4c497924cd2e7728c27
cyrus-sasl-scram-2.1.27-5.el8.i686.rpm
e9a7e7b439cc979bd02362fff7586f68a75a8fc0fac2dde82c210934ec22698d
cyrus-sasl-scram-2.1.27-5.el8.i686.rpm
e9a7e7b439cc979bd02362fff7586f68a75a8fc0fac2dde82c210934ec22698d
cyrus-sasl-scram-2.1.27-5.el8.x86_64.rpm
a807e8ff6b46c9d01b721ad19ccde5f36ac47cd0d1dd067bde3ee450cd0f94e3
cyrus-sasl-scram-2.1.27-5.el8.x86_64.rpm
a807e8ff6b46c9d01b721ad19ccde5f36ac47cd0d1dd067bde3ee450cd0f94e3
RLBA-2020:4498
numactl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numactl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
numactl-2.0.12-11.el8.x86_64.rpm
bb2dd511e9abd416b0c7dffad3907c175fd0f1319f9db8b1a1e100cdc24cfa2d
numactl-devel-2.0.12-11.el8.i686.rpm
33807e7059cd84502ece49dc169df13df9e2f2b2917055f1ced99f0960985e65
numactl-devel-2.0.12-11.el8.x86_64.rpm
1119d6c649c1b65394ffbae9576855772e7481d7888da1deb03fd49bdcbf876a
numactl-libs-2.0.12-11.el8.i686.rpm
a92fccf7f6f7328890772ae2f2562082a1838e7fb290f06c567b1eabc6884470
numactl-libs-2.0.12-11.el8.x86_64.rpm
6477ae7b572a46bc51a69252a8e5e2caf2fdbddd6e39e9ed6cf7b009f92357ef
RLBA-2020:4502
grubby bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grubby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
grubby-8.40-41.el8.x86_64.rpm
ded86ec0923d7237b217940c9bbfa13f55b8c568f0d1ee6e7fc854ff7b17a613
RLBA-2020:4515
libffi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libffi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libffi-3.1-22.el8.i686.rpm
63e8211b42c00b6c0be4623a4d08da7f0289603b7461374507b92a3c7bdb16c1
libffi-3.1-22.el8.i686.rpm
63e8211b42c00b6c0be4623a4d08da7f0289603b7461374507b92a3c7bdb16c1
libffi-3.1-22.el8.x86_64.rpm
2f353e0557132932da3e979ac8abe17e763579be9872394186002148f840bd3e
libffi-3.1-22.el8.x86_64.rpm
2f353e0557132932da3e979ac8abe17e763579be9872394186002148f840bd3e
libffi-devel-3.1-22.el8.i686.rpm
af83bebd0f177379ba7741bd84bbd87b818b8d40a37f6822bb66402b5e7599cb
libffi-devel-3.1-22.el8.i686.rpm
af83bebd0f177379ba7741bd84bbd87b818b8d40a37f6822bb66402b5e7599cb
libffi-devel-3.1-22.el8.x86_64.rpm
35c11976f7f834efe45940a1eb3295a1367b15cc70e68b639075988925b43f5e
libffi-devel-3.1-22.el8.x86_64.rpm
35c11976f7f834efe45940a1eb3295a1367b15cc70e68b639075988925b43f5e
RLEA-2020:4516
memstrack bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for memstrack.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
memstrack-0.1.11-1.el8.x86_64.rpm
ff4000a477f60c16282f4d087a21eb069b21f1779e0d5affbe5d2ec02f9c44b3
memstrack-0.1.11-1.el8.x86_64.rpm
ff4000a477f60c16282f4d087a21eb069b21f1779e0d5affbe5d2ec02f9c44b3
memstrack-0.1.11-1.el8.x86_64.rpm
ff4000a477f60c16282f4d087a21eb069b21f1779e0d5affbe5d2ec02f9c44b3
RLBA-2020:4517
sed bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sed.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
sed-4.5-2.el8.x86_64.rpm
7bdd5c71d08c7adcb6ad4ebe75eb0d27cc5d8a54bc6d3636d139d08588d9a817
sed-4.5-2.el8.x86_64.rpm
7bdd5c71d08c7adcb6ad4ebe75eb0d27cc5d8a54bc6d3636d139d08588d9a817
RLEA-2020:4521
libmodulemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libmodulemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libmodulemd1-1.8.16-0.2.9.4.2.i686.rpm
22ecf51087fc6d289fa77aefdeffc0dce672453c9900a8029a8828dff01c26e8
libmodulemd1-1.8.16-0.2.9.4.2.x86_64.rpm
e64f224b1a48b036a2c9e7523e4d1d9a419cba4fcce0094d6867f62c7d30be23
libmodulemd-2.9.4-2.el8.i686.rpm
dbf00f67e4949912cd36a7ff05a61def9a0874a79212089fb7e09fa3c50a9138
libmodulemd-2.9.4-2.el8.x86_64.rpm
76b16c3a2eee9d292f5127b6fd49f0d3a9d8dc4a7568f0c1cc14c814007ffff5
RLEA-2020:4525
libcap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libcap-2.26-4.el8.i686.rpm
b26d4141495992351a93f4cb44103c8b8077305fb02bee895109a094a264da90
libcap-2.26-4.el8.x86_64.rpm
7e00050d7ed40079919eb08eee30b4ef596c9345d1055a82acb91af4cfd531ce
libcap-devel-2.26-4.el8.i686.rpm
64f127f65c130fc70ade5a71b02ea6efdeb9249bc6412ecc38c161c1ed6ae475
libcap-devel-2.26-4.el8.x86_64.rpm
9520a7c7a3b39912c614aa38e3630992f635d5a1365860945446efff4e4e138b
RLSA-2020:4539
Moderate: pcre2 security and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pcre2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl.
Security Fix(es):
* pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
pcre2-10.32-2.el8.i686.rpm
74c9568f0f29340f82520dbbc392c6ed7e54c5c61ea265dc11e6d94d5fa9ef75
pcre2-10.32-2.el8.i686.rpm
74c9568f0f29340f82520dbbc392c6ed7e54c5c61ea265dc11e6d94d5fa9ef75
pcre2-10.32-2.el8.i686.rpm
74c9568f0f29340f82520dbbc392c6ed7e54c5c61ea265dc11e6d94d5fa9ef75
pcre2-10.32-2.el8.x86_64.rpm
57392559400107d802849db3b9a4fc5d820263338fb674911bc85806c09ec288
pcre2-10.32-2.el8.x86_64.rpm
57392559400107d802849db3b9a4fc5d820263338fb674911bc85806c09ec288
pcre2-10.32-2.el8.x86_64.rpm
57392559400107d802849db3b9a4fc5d820263338fb674911bc85806c09ec288
pcre2-devel-10.32-2.el8.i686.rpm
728e9b530ff5f521dfa240487b0f98963a1f338a87674986e39bd1592f721327
pcre2-devel-10.32-2.el8.i686.rpm
728e9b530ff5f521dfa240487b0f98963a1f338a87674986e39bd1592f721327
pcre2-devel-10.32-2.el8.i686.rpm
728e9b530ff5f521dfa240487b0f98963a1f338a87674986e39bd1592f721327
pcre2-devel-10.32-2.el8.x86_64.rpm
9db30b17ae757aef9eed654f286f489bb1bfad3e0198d4c7b1c648931a058348
pcre2-devel-10.32-2.el8.x86_64.rpm
9db30b17ae757aef9eed654f286f489bb1bfad3e0198d4c7b1c648931a058348
pcre2-devel-10.32-2.el8.x86_64.rpm
9db30b17ae757aef9eed654f286f489bb1bfad3e0198d4c7b1c648931a058348
pcre2-utf16-10.32-2.el8.i686.rpm
bbfc3e6fd28313b42ba1dd046e39a94cbab4614dde194e487539f636e0dcdbfb
pcre2-utf16-10.32-2.el8.i686.rpm
bbfc3e6fd28313b42ba1dd046e39a94cbab4614dde194e487539f636e0dcdbfb
pcre2-utf16-10.32-2.el8.i686.rpm
bbfc3e6fd28313b42ba1dd046e39a94cbab4614dde194e487539f636e0dcdbfb
pcre2-utf16-10.32-2.el8.x86_64.rpm
daad95dab7cfd726b739291c7d7e0380ba7ab38c52e1dd1a8a38787ec91b1afd
pcre2-utf16-10.32-2.el8.x86_64.rpm
daad95dab7cfd726b739291c7d7e0380ba7ab38c52e1dd1a8a38787ec91b1afd
pcre2-utf16-10.32-2.el8.x86_64.rpm
daad95dab7cfd726b739291c7d7e0380ba7ab38c52e1dd1a8a38787ec91b1afd
pcre2-utf32-10.32-2.el8.i686.rpm
a40de568c6b0103f3e4d2ae32ae013904a8305ce8f7dd2ab1a0ea97805c31a68
pcre2-utf32-10.32-2.el8.i686.rpm
a40de568c6b0103f3e4d2ae32ae013904a8305ce8f7dd2ab1a0ea97805c31a68
pcre2-utf32-10.32-2.el8.i686.rpm
a40de568c6b0103f3e4d2ae32ae013904a8305ce8f7dd2ab1a0ea97805c31a68
pcre2-utf32-10.32-2.el8.x86_64.rpm
ffa87385a5312314b6bbf6af779db8ff71630837f2cbeefd6bd0e89b105e47ad
pcre2-utf32-10.32-2.el8.x86_64.rpm
ffa87385a5312314b6bbf6af779db8ff71630837f2cbeefd6bd0e89b105e47ad
pcre2-utf32-10.32-2.el8.x86_64.rpm
ffa87385a5312314b6bbf6af779db8ff71630837f2cbeefd6bd0e89b105e47ad
RLBA-2020:4544
setools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for setools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
python3-setools-4.3.0-2.el8.x86_64.rpm
3fc1053c93af1b724a06f0be7b2dd4228c1ea0ad29e419844d23457fdf9bd285
python3-setools-4.3.0-2.el8.x86_64.rpm
3fc1053c93af1b724a06f0be7b2dd4228c1ea0ad29e419844d23457fdf9bd285
setools-console-4.3.0-2.el8.x86_64.rpm
65e0a29f8278d563c05d44e9490ffd5804367b03e18713fb0a2df180718b3231
setools-console-4.3.0-2.el8.x86_64.rpm
65e0a29f8278d563c05d44e9490ffd5804367b03e18713fb0a2df180718b3231
RLSA-2020:4545
Moderate: libssh security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
The following packages have been upgraded to a later upstream version: libssh (0.9.4). (BZ#1804797)
Security Fix(es):
* libssh: denial of service when handling AES-CTR (or DES) ciphers (CVE-2020-1730)
* libssh: unsanitized location in scp could lead to unwanted command execution (CVE-2019-14889)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libssh-0.9.4-2.el8.i686.rpm
da2ea48ed5bce0bf5371a362574068b727e782ecd11e4d114756210bbe7d0e1a
libssh-0.9.4-2.el8.x86_64.rpm
5bc7e7a2c9c98ef10a9c1c18c4ff4dfbdb70c57a70dc0b927adcfdd47e00bd9d
libssh-config-0.9.4-2.el8.noarch.rpm
ea990d25ee8b5e301f6671b83a897737feb2ce889553964ba252e274d41a90e2
libssh-config-0.9.4-2.el8.noarch.rpm
ea990d25ee8b5e301f6671b83a897737feb2ce889553964ba252e274d41a90e2
RLBA-2020:4565
libtalloc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libtalloc-2.3.1-2.el8.i686.rpm
1142bc890bbe0be318041c7700d42d915a031ee5b9ef3363e3df64017b07825b
libtalloc-2.3.1-2.el8.x86_64.rpm
2cd3a2468f6413904401e0a1ba96b6de5945c7e1ec275643baf9017e1200794f
libtalloc-devel-2.3.1-2.el8.i686.rpm
32b24dd9fcfc90a566e7f4469fc1654838e6ec32381173dd14f950fd9642c49a
libtalloc-devel-2.3.1-2.el8.x86_64.rpm
b081a0657553a0d9ebdf52811346ee9697533568b933e869b50ebccbf5a1c158
python3-talloc-2.3.1-2.el8.i686.rpm
1a4fade0bd5f6bb7a1859fee35efd1a2693466afe7fb2ca7c5d9cc59fd2d9946
python3-talloc-2.3.1-2.el8.x86_64.rpm
bd44c1d820b8520df7834bef8e75209a9ebf5d1f3513fe372a757dcd7f20c6fd
RLBA-2020:4566
libtdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libtdb-1.4.3-1.el8.i686.rpm
89a9a747889088c4cf0e24b5fef4e4f8df61afe0556e5fa919590bf251e7271a
libtdb-1.4.3-1.el8.i686.rpm
89a9a747889088c4cf0e24b5fef4e4f8df61afe0556e5fa919590bf251e7271a
libtdb-1.4.3-1.el8.x86_64.rpm
8bfcf92fbfd53ed61146f4617ccd7210deb3ffa3da6ba11687200b38be4a2a5b
libtdb-1.4.3-1.el8.x86_64.rpm
8bfcf92fbfd53ed61146f4617ccd7210deb3ffa3da6ba11687200b38be4a2a5b
libtdb-devel-1.4.3-1.el8.i686.rpm
fff54325e3a5a9562332b5dc5d960af169101319faf9ee70f9c5de1dd45fc95e
libtdb-devel-1.4.3-1.el8.i686.rpm
fff54325e3a5a9562332b5dc5d960af169101319faf9ee70f9c5de1dd45fc95e
libtdb-devel-1.4.3-1.el8.x86_64.rpm
796295a4acafc18792faf8e4be2c77dd575c12a9207dbabbed62bfbe950ae533
libtdb-devel-1.4.3-1.el8.x86_64.rpm
796295a4acafc18792faf8e4be2c77dd575c12a9207dbabbed62bfbe950ae533
python3-tdb-1.4.3-1.el8.i686.rpm
dc718c73f0dfbf370d35a469cd08bdb51b2847fa615b009227e8056e42fe2da8
python3-tdb-1.4.3-1.el8.i686.rpm
dc718c73f0dfbf370d35a469cd08bdb51b2847fa615b009227e8056e42fe2da8
python3-tdb-1.4.3-1.el8.x86_64.rpm
deb9ce4c71936b45a412279ff20e7f40f36fa444e12622fe4d2202770023f485
python3-tdb-1.4.3-1.el8.x86_64.rpm
deb9ce4c71936b45a412279ff20e7f40f36fa444e12622fe4d2202770023f485
tdb-tools-1.4.3-1.el8.x86_64.rpm
bb7fc0d344ac6be5a6a1e5b63aa451bd1c62df9154200766f765b54b4df66582
tdb-tools-1.4.3-1.el8.x86_64.rpm
bb7fc0d344ac6be5a6a1e5b63aa451bd1c62df9154200766f765b54b4df66582
RLBA-2020:4582
tar bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
tar-1.30-5.el8.x86_64.rpm
1ba824420393a2e82ec3003951da2f06cb430ebee0e7d4408b3e4b92ad7c1edc
tar-1.30-5.el8.x86_64.rpm
1ba824420393a2e82ec3003951da2f06cb430ebee0e7d4408b3e4b92ad7c1edc
tar-1.30-5.el8.x86_64.rpm
1ba824420393a2e82ec3003951da2f06cb430ebee0e7d4408b3e4b92ad7c1edc
RLBA-2020:4567
libtevent bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libtevent-0.10.2-2.el8.i686.rpm
b8d719aec14736ecd13c3e2bb0b877b08414fbe18f224c6c959f75a8babb5e3b
libtevent-0.10.2-2.el8.x86_64.rpm
589f118969e4a2dea992bb193249cdc74a9ee1b1fd67fcb4bd40977bbbb5b7cf
libtevent-devel-0.10.2-2.el8.i686.rpm
a692f0b33598db1fe9e8ad2c47d31a8cfc589bb1274efa832c17dc82af46d645
libtevent-devel-0.10.2-2.el8.x86_64.rpm
64e8bca68781a1129be4805c25adbbaa49d39b26d933da1d4d7f72a4b0e125ea
python3-tevent-0.10.2-2.el8.x86_64.rpm
bbbe3d0695b3851987b42f16db8c190ae0d4b76d0932ef41fe5334775fd29c3a
RLBA-2020:4570
tboot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tboot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
tboot-1.9.12-2.el8.x86_64.rpm
2131e4721482322820aebd055653750dbc843170b13c82339f69905e1f695cb7
RLEA-2020:4572
pcsc-lite-ccid bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pcsc-lite-ccid.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
pcsc-lite-ccid-1.4.29-4.el8.x86_64.rpm
7714358dc6fd1e75e2a8fa44a64c8f335ad681d99445303a3b336e2561f03da3
RLBA-2020:4590
ps_mem bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ps_mem.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
ps_mem-3.6-7.el8.noarch.rpm
8eb652e615b944505be551add79944cc69157aa7190ce7c05fc91c2f59369e9e
ps_mem-3.6-7.el8.noarch.rpm
8eb652e615b944505be551add79944cc69157aa7190ce7c05fc91c2f59369e9e
ps_mem-3.6-7.el8.noarch.rpm
8eb652e615b944505be551add79944cc69157aa7190ce7c05fc91c2f59369e9e
ps_mem-3.6-7.el8.noarch.rpm
8eb652e615b944505be551add79944cc69157aa7190ce7c05fc91c2f59369e9e
RLBA-2020:4593
environment-modules bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for environment-modules.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
environment-modules-4.5.2-1.el8.x86_64.rpm
bc1451e21aa49b5e044d45bc347b7ccf2ce58e464cb8f85bb5b8a691cb59d1ec
environment-modules-4.5.2-1.el8.x86_64.rpm
bc1451e21aa49b5e044d45bc347b7ccf2ce58e464cb8f85bb5b8a691cb59d1ec
environment-modules-4.5.2-1.el8.x86_64.rpm
bc1451e21aa49b5e044d45bc347b7ccf2ce58e464cb8f85bb5b8a691cb59d1ec
RLBA-2020:4597
babeltrace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for babeltrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libbabeltrace-1.5.4-3.el8.i686.rpm
a65276b0e763b7d3542c7cd33c296a5603051bc507949c662f4c6960884bbf0a
libbabeltrace-1.5.4-3.el8.i686.rpm
a65276b0e763b7d3542c7cd33c296a5603051bc507949c662f4c6960884bbf0a
libbabeltrace-1.5.4-3.el8.i686.rpm
a65276b0e763b7d3542c7cd33c296a5603051bc507949c662f4c6960884bbf0a
libbabeltrace-1.5.4-3.el8.x86_64.rpm
9018f9c2e339054959f6824b4a3286b6cbcfcb230f8450fab812bbe460d59da8
libbabeltrace-1.5.4-3.el8.x86_64.rpm
9018f9c2e339054959f6824b4a3286b6cbcfcb230f8450fab812bbe460d59da8
libbabeltrace-1.5.4-3.el8.x86_64.rpm
9018f9c2e339054959f6824b4a3286b6cbcfcb230f8450fab812bbe460d59da8
RLSA-2021:1206
Important: gnutls and nettle security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nettle, gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.
Security Fix(es):
* nettle: Out of bounds memory access in signature verification (CVE-2021-20305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gnutls-3.6.14-8.el8_3.x86_64.rpm
1bb1b17d165b469e4d0911bb3aba27a0f07649ee108ae8ccde3f28b545efc508
gnutls-3.6.14-8.el8_3.i686.rpm
2d09dba1f7ac1009862a3f79f150ab2fece204f75479e1fc675da81b08e76659
nettle-3.4.1-4.el8_4.i686.rpm
49e09deed894b3fdae1664a002730a212b98d10d4215a6d8f2b112afb07bc61d
nettle-3.4.1-4.el8_4.x86_64.rpm
780af787dc3ffcdf711b014f939b52859b7e321f72000bddb09a482600fd29a0
RLBA-2020:4603
device-mapper-persistent-data bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-persistent-data.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-persistent-data-0.8.5-4.el8.x86_64.rpm
f5af1e56e2787b3137a0f6b73d70716fc09780cf508a82cb0b8f35d998523a54
RLBA-2021:1571
gcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libasan-8.4.1-1.el8.i686.rpm
ed85ce9c135e52974fddd1304c53f9fb4e418224d6a15b3d8e4c3d05feeeb24c
libasan-8.4.1-1.el8.x86_64.rpm
431c6ff1d5d76d5bfde34f9eeb0f4269ce28c36beae2c0f377deb95147d0a192
libatomic-8.4.1-1.el8.i686.rpm
34b150a58f108cbd8d94616e85061e992cbeb9f897ddbb74dfee024d9f74c2b1
libatomic-8.4.1-1.el8.x86_64.rpm
91b8d6f5fa9079a01a7b19dcaa3ddfe03c6dad272e7465cdea21b8c92b1e65d8
liblsan-8.4.1-1.el8.x86_64.rpm
4fb1b02180f0229b6887777c249971ead997a76285563ec931d7adced5c3005a
libatomic-static-8.4.1-1.el8.i686.rpm
ba62537679a733df3a617b790e6fce470a043e422d39414d9d202cbb6f3b9e12
libatomic-static-8.4.1-1.el8.x86_64.rpm
254fa0a255669239ea5415353e7ad81f098c955ce4ad4ea539caf033d409e122
libgcc-8.4.1-1.el8.i686.rpm
518e3c0a777fe7b914e922844f8f5478cdf824adcaa3616b670f42e970477968
libgcc-8.4.1-1.el8.x86_64.rpm
06b7b46df14ec6c892807c7ac4728755d3b4bfd1fb35f8e4b4a6d50676347489
libgfortran-8.4.1-1.el8.i686.rpm
3907d337c7106ac07e90a4a5157771d8301856124a18f499fbf1b1162daf58f6
libgfortran-8.4.1-1.el8.x86_64.rpm
1b1ef0e556a3559377df608ebcaf1f45e5afcda8e1470617b23ea3fb2ccb8728
libgomp-8.4.1-1.el8.i686.rpm
68ce67d60ef4e3ee2fc96104146433d23f9a2c12857922e6f3fc00bcb4600272
libgomp-8.4.1-1.el8.x86_64.rpm
1536a7b25b7e5443d20f3fee135a8dbf7bd1078ee3ed2a697e76a56284ce1643
libgomp-offload-nvptx-8.4.1-1.el8.x86_64.rpm
e8c2c660480b84398eabf6255274c061843150ede6d02a03e2c07eb384ca7c44
libitm-8.4.1-1.el8.i686.rpm
b3be10ebe9603058dae5e9d280bc132fb09015a9c0261307c4058ea7d17edf15
libitm-8.4.1-1.el8.x86_64.rpm
d68ddb81322a22875c5281f2ea56c554c0ef783c411c0396887b6eca884f09a4
libquadmath-8.4.1-1.el8.i686.rpm
59589df0fede4ee7fa9ba684a4bf1b4bace2647fe655d850b1857a6b4fd9c36b
libquadmath-8.4.1-1.el8.x86_64.rpm
405bb67671746c1e409aded5117920c6cd7f685e7bd9c3a63a5a5a1c474a0c2e
libstdc++-8.4.1-1.el8.i686.rpm
5a0436cb27d6a002a98d8443431c07d2e828006b1536d524a933150cf64d1587
libstdc++-8.4.1-1.el8.x86_64.rpm
1e9142ba75da769aec758db33becd85959acb1b5548e3492baca62d800ff2cee
libtsan-8.4.1-1.el8.x86_64.rpm
f08db649177594642553227a69a503c05783825ccdf1e421afc6f0806c44ad83
libubsan-8.4.1-1.el8.i686.rpm
26210cebbcdb7e29050ea150cc9d1723f11b51b15bbbf0996a0ec7e69249b272
libubsan-8.4.1-1.el8.x86_64.rpm
4bcac9a8c1b96aa6ef0f7a052dc7651e31e9dfe77b45bdd7ccc47284c1ff35f5
RLSA-2020:4952
Important: freetype security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for freetype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
* freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
freetype-2.9.1-4.el8_3.1.i686.rpm
c69cc99ce3dcd0506d399d41c31328e490de518a98820b738c010cb3255796f0
freetype-2.9.1-4.el8_3.1.i686.rpm
c69cc99ce3dcd0506d399d41c31328e490de518a98820b738c010cb3255796f0
freetype-2.9.1-4.el8_3.1.i686.rpm
c69cc99ce3dcd0506d399d41c31328e490de518a98820b738c010cb3255796f0
freetype-2.9.1-4.el8_3.1.x86_64.rpm
0de8dc5a9aab9bb81e5b45260aa7d3f5430c1ff7152451d69d8900829c432b94
freetype-2.9.1-4.el8_3.1.x86_64.rpm
0de8dc5a9aab9bb81e5b45260aa7d3f5430c1ff7152451d69d8900829c432b94
freetype-2.9.1-4.el8_3.1.x86_64.rpm
0de8dc5a9aab9bb81e5b45260aa7d3f5430c1ff7152451d69d8900829c432b94
freetype-devel-2.9.1-4.el8_3.1.i686.rpm
5d7343dcf12591c23cadeb6e35a5589c20cc0933498fde8ff62658bfb7b9919e
freetype-devel-2.9.1-4.el8_3.1.i686.rpm
5d7343dcf12591c23cadeb6e35a5589c20cc0933498fde8ff62658bfb7b9919e
freetype-devel-2.9.1-4.el8_3.1.i686.rpm
5d7343dcf12591c23cadeb6e35a5589c20cc0933498fde8ff62658bfb7b9919e
freetype-devel-2.9.1-4.el8_3.1.x86_64.rpm
ad886ef26bce8cdfff5b21ce8ac50e941477d87cc9282639a6ab46c03a0a085c
freetype-devel-2.9.1-4.el8_3.1.x86_64.rpm
ad886ef26bce8cdfff5b21ce8ac50e941477d87cc9282639a6ab46c03a0a085c
freetype-devel-2.9.1-4.el8_3.1.x86_64.rpm
ad886ef26bce8cdfff5b21ce8ac50e941477d87cc9282639a6ab46c03a0a085c
RLBA-2021:0276
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2021a, which addresses recent
time zone changes. Notably:
* South Sudan will change from UTC+03 to UTC+02 on February 1, 2021.
(BZ#1919721, BZ#1919720, BZ#1920186)
none-baseos-rpms
tzdata-2021a-1.el8.noarch.rpm
07c126ccfa4d384599054daa90c94d59d63fe455d4c0379f1219dfbeb151d09d
tzdata-2021a-1.el8.noarch.rpm
07c126ccfa4d384599054daa90c94d59d63fe455d4c0379f1219dfbeb151d09d
RLSA-2021:1024
Important: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)
* openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-1.1.1g-15.el8_3.x86_64.rpm
25fcc4e82f29e1bbc2bcdd392bc61662d06ef532be101b2eabedec8a6202b8db
openssl-devel-1.1.1g-15.el8_3.i686.rpm
ac761dc5f535ca80b8c2f3a098d98d63a908900d464651dd4e57c9bcf1947983
openssl-devel-1.1.1g-15.el8_3.x86_64.rpm
056ad4b5157af8c71c922da1d848333a8949c00fa1200bec734ecbb2fd5c5b93
openssl-libs-1.1.1g-15.el8_3.i686.rpm
01c9d8f335a303f0f983dcc11cb2fa9f219830bde13e75f1cd41f0df231cc5d2
openssl-libs-1.1.1g-15.el8_3.x86_64.rpm
5963de3de605f00f60510dc6bde0f6bcf15dc32cbd8183d137e068b0a80b4dbf
openssl-perl-1.1.1g-15.el8_3.x86_64.rpm
d0a3c2269cc764e96efac5d1de4083520c25276a28bbb2589ce828dabbc5e421
RLBA-2021:1091
file bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The file command is used to identify a particular file according to the
type of data the file contains. It can identify many different file types,
including Executable and Linkable Format (ELF) binary files, system
libraries, RPM packages, and different graphics formats.
Bug Fix(es) and Enhancement(s):
* ftype detection is not working (BZ#1905906)
none-baseos-rpms
file-5.33-16.el8_3.1.x86_64.rpm
7ea0897b577e82ede7896daab49f4fec5192453c681de308dde8f81160ba7625
file-libs-5.33-16.el8_3.1.i686.rpm
7575b37c4ecd4cc2b0aac2a9dbe872e9dfd135c6097496d9b4464422cd2ac7c8
file-libs-5.33-16.el8_3.1.x86_64.rpm
7ebb257ccb875343932762c6dab8e08ac054eb61059542f5daea826921e7f379
python3-magic-5.33-16.el8_3.1.noarch.rpm
916fde6a9fa08d51b78cbc179422c694ee80bc58adf738d84e8af6fee3459660
python3-magic-5.33-16.el8_3.1.noarch.rpm
916fde6a9fa08d51b78cbc179422c694ee80bc58adf738d84e8af6fee3459660
RLBA-2021:1094
crypto-policies bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crypto-policies.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Crypto policies is a system component that configures the core
cryptographic subsystems, covering the TLS, IPSec, SSH, DNSSec, and
Kerberos protocols. It provides a small set of policies, which the
administrator can select.
Bug Fix(es) and Enhancement(s):
* FIPS:OSPP needs to have the same settings as used on 8.1 Common Criteria
(BZ#1927024)
none-baseos-rpms
crypto-policies-20210209-1.gitbfb6bed.el8_3.noarch.rpm
f2d00ed407302c5ce89d83523eb0ddb9e4f0e79a178601c918a24e7cbf55b84e
crypto-policies-20210209-1.gitbfb6bed.el8_3.noarch.rpm
f2d00ed407302c5ce89d83523eb0ddb9e4f0e79a178601c918a24e7cbf55b84e
crypto-policies-scripts-20210209-1.gitbfb6bed.el8_3.noarch.rpm
9310789503f69fbefee3f925ad35f472ad2f986c78d1df318426387c2398614f
crypto-policies-scripts-20210209-1.gitbfb6bed.el8_3.noarch.rpm
9310789503f69fbefee3f925ad35f472ad2f986c78d1df318426387c2398614f
RLBA-2021:1570
openldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
openldap-2.4.46-16.el8.i686.rpm
395b8b328ee8bd6e07a1a245958b4bf3ed88cce49eade1426389be9ef19eac39
openldap-2.4.46-16.el8.x86_64.rpm
a35ec22623ed16b8efe534a0e98efd6e2652ed6a124a6fa74c7476bfd9158038
openldap-clients-2.4.46-16.el8.x86_64.rpm
1a992e48b3ae753f70d31753f40e854438e171dc70918ebc39e9ad79b6b8bf69
openldap-devel-2.4.46-16.el8.i686.rpm
7de47857c0700dc6bdfc6a1bd13439b66ad4afaab06ffdb8feee85ef9c449616
openldap-devel-2.4.46-16.el8.x86_64.rpm
fcef717cf1c63301ab7cccc001bd56a984d708cbb3e85cb91fed68bc27351170
RLBA-2021:1572
binutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
binutils-2.30-93.el8.x86_64.rpm
a70437ba2ae27230ce5d63ab88fce869ea788e48b10e530cbf9684ec68b247dd
RLEA-2021:1573
strace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
strace-5.7-2.el8.x86_64.rpm
fb0f3f3ad4b4a4b84345860d6b166dae42dd5d624b5048475db81f7cfa4224e2
RLSA-2021:1574
Moderate: NetworkManager and libnma security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libnma, NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
The following packages have been upgraded to a later upstream version: NetworkManager (1.30.0). (BZ#1878783)
Security Fix(es):
* NetworkManager: Profile with match.path setting triggers crash (CVE-2021-20297)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
NetworkManager-1.30.0-7.el8.x86_64.rpm
b7b4514b4f2da2c3b9fcb2e19d7afb07acb1849e7dbae2ad96de3f855a7185be
NetworkManager-adsl-1.30.0-7.el8.x86_64.rpm
1e335218f69d726d5bca730dae0be6c2313ab1894ec57bd5e63e242b14acb056
NetworkManager-bluetooth-1.30.0-7.el8.x86_64.rpm
f08902ebd3dcd40f8b5d32b7dd9107aa03d8fe496640b70efde35b90399eef5a
NetworkManager-config-connectivity-redhat-1.30.0-7.el8.noarch.rpm
fc733b155486218029d19dc8d26993ea9213a794176df6c5a398907f6fc448ac
NetworkManager-config-connectivity-redhat-1.30.0-7.el8.noarch.rpm
fc733b155486218029d19dc8d26993ea9213a794176df6c5a398907f6fc448ac
NetworkManager-config-server-1.30.0-7.el8.noarch.rpm
af019b1775f248edd7513a180eb2406b7ef8c861dcf9d3aaff6e616ea7570e21
NetworkManager-config-server-1.30.0-7.el8.noarch.rpm
af019b1775f248edd7513a180eb2406b7ef8c861dcf9d3aaff6e616ea7570e21
NetworkManager-dispatcher-routing-rules-1.30.0-7.el8.noarch.rpm
66310a696338e528e316101030737cd9faed1335026b468c6314d0204aa3ccd8
NetworkManager-dispatcher-routing-rules-1.30.0-7.el8.noarch.rpm
66310a696338e528e316101030737cd9faed1335026b468c6314d0204aa3ccd8
NetworkManager-libnm-1.30.0-7.el8.i686.rpm
744a61358178784237fbe8036bfddb56beb10afa581bd2b3ac8bdbeb39a43773
NetworkManager-libnm-1.30.0-7.el8.x86_64.rpm
a1902e3f1c1ad0c1ae9beadabb4ac2bb669ef0508c4046660fa610d76ad014c0
NetworkManager-ovs-1.30.0-7.el8.x86_64.rpm
7c178e29e8416bdc2cadc74418cc969c602415bb3d6ae3a62f6094ab971302b8
NetworkManager-ppp-1.30.0-7.el8.x86_64.rpm
8526233e886b69ed2f4cb491ec8320ba57ef4870d8e85fa792827914365761ef
NetworkManager-team-1.30.0-7.el8.x86_64.rpm
6e5c1be38208d653ed66ec99209a4afa9dcac691a9c53be68162363425f23ad3
NetworkManager-tui-1.30.0-7.el8.x86_64.rpm
da82db5d5c7e8b2d4c47ddbdfe0c033d34c7ce3e0bc526eca3a6dfac5dc210c5
NetworkManager-wifi-1.30.0-7.el8.x86_64.rpm
7b3757e2302b337f13c48a4030c0d195abad84011f6922599fad35d557e39811
NetworkManager-wwan-1.30.0-7.el8.x86_64.rpm
0ad2eed614e27a92d93bfba9b13d8178f81ea561b60fc648975d5e7e6a712355
RLBA-2021:1575
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.13-2.el8.x86_64.rpm
bbf2b7ff61969f38892d1ed3569948fd0b6233107bd98f39f3056f50bf4a2e21
python3-subscription-manager-rhsm-1.28.13-2.el8.x86_64.rpm
09f6beb6f1076dde79a5c357b24272351345b28cf30305e304751c8b6980c50f
python3-syspurpose-1.28.13-2.el8.x86_64.rpm
d4384c22807c906cc504b385d712dcaee52886992ce41a93dd51fbaf924c630c
rhsm-icons-1.28.13-2.el8.noarch.rpm
1caf0f3310cd1df80c1c4c837fc135dd35e619bfe0ee1444bef2636858405fdc
rhsm-icons-1.28.13-2.el8.noarch.rpm
1caf0f3310cd1df80c1c4c837fc135dd35e619bfe0ee1444bef2636858405fdc
subscription-manager-1.28.13-2.el8.x86_64.rpm
7053ba780d80ac83df43f9e064b810eed75376735edfc7c54ce53562204c727d
subscription-manager-cockpit-1.28.13-2.el8.noarch.rpm
49208c823c2eb0bde3a1e8d90670131f973d76cfbf9d7d57ac179c47bd84c2d6
subscription-manager-cockpit-1.28.13-2.el8.noarch.rpm
49208c823c2eb0bde3a1e8d90670131f973d76cfbf9d7d57ac179c47bd84c2d6
subscription-manager-plugin-ostree-1.28.13-2.el8.x86_64.rpm
8b552e1e27425d0ccda35111def66487ca7c0eddb82ace2efe406981ec9a3b63
subscription-manager-rhsm-certificates-1.28.13-2.el8.x86_64.rpm
055888923c940b40dc17078f909633ec3e39d6a1c4c241d1b007e0a857dd2477
RLEA-2021:1576
ethtool bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ethtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
ethtool-5.8-5.el8.x86_64.rpm
2937151f76b6535b3eaab9a7bfe05f8ecaa7b66db4b64e0b5ed045686754af1e
RLBA-2021:1579
gpgme bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpgme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
gpgme-1.13.1-7.el8.i686.rpm
98708040a691c10e6e1ccd119b74669b1c756790e8d868b9b28442740b3dca06
gpgme-1.13.1-7.el8.x86_64.rpm
577ea849b0b77ee714e4681cc4ee8e8e97c481a86b522797af27426ed5674236
gpgmepp-1.13.1-7.el8.i686.rpm
fe3620f9f40ebb45477a771ab327b9c83b8e94eb8a48247e1290d56e200f92c3
gpgmepp-1.13.1-7.el8.x86_64.rpm
2f33bcca50544c1aeb565b4401b3cda1437ce4d7657817d6bdb7be62dc6933ba
python3-gpg-1.13.1-7.el8.x86_64.rpm
6dc0e999e37fcb93381a617e525a3dba7cf10efe7c740b941394692be05c3a9e
RLEA-2021:1580
libarchive bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libarchive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
bsdtar-3.3.3-1.el8.x86_64.rpm
ef343ea54d9330b29e0924b8d24b7bc07b1e0d7125c3ee5e3e3c0cf7f69d00e7
bsdtar-3.3.3-1.el8.x86_64.rpm
ef343ea54d9330b29e0924b8d24b7bc07b1e0d7125c3ee5e3e3c0cf7f69d00e7
libarchive-3.3.3-1.el8.i686.rpm
693b507e1a25bebfca799fc69d352623f490b81bb5855af4094147e9c99ec0d9
libarchive-3.3.3-1.el8.i686.rpm
693b507e1a25bebfca799fc69d352623f490b81bb5855af4094147e9c99ec0d9
libarchive-3.3.3-1.el8.x86_64.rpm
063289e1b8d01e69e68fe20f8cf678bcf5d475bf86c478f7442ee5a9540537ec
libarchive-3.3.3-1.el8.x86_64.rpm
063289e1b8d01e69e68fe20f8cf678bcf5d475bf86c478f7442ee5a9540537ec
RLSA-2021:1581
Moderate: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: integer overflow in sqlite3_str_vappendf function in printf.c (CVE-2020-13434)
* sqlite: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener optimization in select.c (CVE-2020-15358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
sqlite-3.26.0-13.el8.i686.rpm
381950ff9b8b620fa0e55e3338bd52b3a5d0abea9e9f6b559fbcadfd519d79a8
sqlite-3.26.0-13.el8.x86_64.rpm
707232ce619d85dbb7bd8d84b77a8c0c5029e61bb535ef074133124a5b520e5e
sqlite-devel-3.26.0-13.el8.i686.rpm
cad6981a6697d81140acc04084096c53fef685212eca798f85efb2319cec2c47
sqlite-devel-3.26.0-13.el8.x86_64.rpm
a305e294bb0e6cf5a709758aa8ee1b671f1f2a28eca801510f8da6f8db57fdef
sqlite-doc-3.26.0-13.el8.noarch.rpm
44cc5e200a8a6dd3370f74c0414492cf0b9257cfc41fa7b39870f1a0c17b4e80
sqlite-doc-3.26.0-13.el8.noarch.rpm
44cc5e200a8a6dd3370f74c0414492cf0b9257cfc41fa7b39870f1a0c17b4e80
sqlite-libs-3.26.0-13.el8.i686.rpm
171ab48153db0fe25bf359bf173832ee619218a4787ecade0e9aa526f91b641d
sqlite-libs-3.26.0-13.el8.x86_64.rpm
ecf348ac420f2cfc724dcc7f5e465819b90f2647716a771bb22c106d8d5a2e3a
RLSA-2021:1582
Moderate: cpio security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cpio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another.
Security Fix(es):
* cpio: improper input validation when writing tar header fields leads to unexpected tar generation (CVE-2019-14866)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
cpio-2.12-10.el8.x86_64.rpm
e13bf9c859fdd2bb9b3327caa5ae6fceae2d38be64603b339a3d187909ce2233
cpio-2.12-10.el8.x86_64.rpm
e13bf9c859fdd2bb9b3327caa5ae6fceae2d38be64603b339a3d187909ce2233
RLSA-2021:1585
Moderate: glibc security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013)
* glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read (CVE-2019-9169)
* glibc: assertion failure in ISO-2022-JP-3 gconv module related to combining characters (CVE-2021-3326)
* glibc: iconv program can hang when invoked with the -c option (CVE-2016-10228)
* glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop (CVE-2020-27618)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
glibc-2.28-151.el8.i686.rpm
a8955f992778793e61675bad8ff4a1e246322b957212009cd90d27ffb74fa170
glibc-2.28-151.el8.x86_64.rpm
eaae075b3dabaa0871e26201f79cc350cfd4ca577e0ff8fd5d6dbc4b58eabaed
glibc-all-langpacks-2.28-151.el8.x86_64.rpm
ff0781cea0cb53a1f0eb9896cbd5b88c8dea590089825b5c335bc41c19369b30
glibc-common-2.28-151.el8.x86_64.rpm
44ce05716314241e1ba830295f98bef217afdfbe5f2cbb0c69bd308447edd314
glibc-devel-2.28-151.el8.i686.rpm
1b389d1befdbc54853d31a0a8de665cfab2a78e1f40b015141593c4bd0d8b7b5
glibc-devel-2.28-151.el8.x86_64.rpm
aaa5e0f0d9c479d67f06b7f67624b7f9261cbdf93a65e0cd95e8ccf949e20276
glibc-headers-2.28-151.el8.i686.rpm
b2f5ef653c073970975d98ad625546b86e1412be8c5affe075b859b11945c371
glibc-headers-2.28-151.el8.x86_64.rpm
413c22e299775391fd21bea291a86eb1772bf0156af23a1aa9b743d0b2f9468a
glibc-langpack-aa-2.28-151.el8.x86_64.rpm
339bd76202e86fc3fd1a792043b6801ac3132816a478ef96abfa07381acb2353
glibc-langpack-af-2.28-151.el8.x86_64.rpm
09ffa3bda692c5ae323ed807278c342e6e8cf3aadbe6446b36181c35071806e9
glibc-langpack-agr-2.28-151.el8.x86_64.rpm
07bdfa5497d6e2071ac50e276a4d1b1e85d172e08abd307d07b985996d33082d
glibc-langpack-ak-2.28-151.el8.x86_64.rpm
bb02228458e68df4b286524402e94e708590fc1eaec0d92bfd3e23137f769ee1
glibc-langpack-am-2.28-151.el8.x86_64.rpm
73152ea4ad45b678a23827311be81c97cbf7c19f207bd223b11c9744466c128a
glibc-langpack-an-2.28-151.el8.x86_64.rpm
b3d5ecc2b98a6e6cc68b7010de2e8fce9af35f3f9337ef1695ead001a7d7c208
glibc-langpack-anp-2.28-151.el8.x86_64.rpm
d80f014294f2c778b2751b73ddb4c6aa21b3b483055d11f77235ede993764a89
glibc-langpack-ar-2.28-151.el8.x86_64.rpm
104e8cdbf48ddfc737193487f059b8cf4232559afcc3ad4da9dfed02e6289aa5
glibc-langpack-as-2.28-151.el8.x86_64.rpm
a80e556dae9f10be1be91cc1005e72a33b15b344e86f9c1c4aa2b740cbe9c046
glibc-langpack-ast-2.28-151.el8.x86_64.rpm
233535fa354e818e9d257f369cec4d441de00b9b6760434fd42c2a3426a6a926
glibc-langpack-ayc-2.28-151.el8.x86_64.rpm
1fa351fbb61f3906539ce3d01ed8900f722d18abe65c74e6f6fd935fb2a27455
glibc-langpack-az-2.28-151.el8.x86_64.rpm
ff37fd93e9357faae8998bf14914ffb65875247fd1c6c81cb5b5a5de629f164a
glibc-langpack-be-2.28-151.el8.x86_64.rpm
aeed015bd88881442e80c85eb400700df5366450b3804ec55a6d806032142335
glibc-langpack-bem-2.28-151.el8.x86_64.rpm
69d194a6df8727bb3346b5b8a983a092699309f4e68a1f08ed4979f144f85185
glibc-langpack-ber-2.28-151.el8.x86_64.rpm
2334e5bfb8c5cb64494eb15ff4febf5653cc8dfb2ef5ad430083fafa19e93125
glibc-langpack-bg-2.28-151.el8.x86_64.rpm
fc44e807809e59e615c1abbaf19ba351bfdcc7dc9df9497a6c4a6c562184c8e0
glibc-langpack-bhb-2.28-151.el8.x86_64.rpm
dedf78dd354332f8aebd6f006a42fb0f0f14016c60bbb2524e271758d84466a4
glibc-langpack-bho-2.28-151.el8.x86_64.rpm
b4b67947d7953d481ab253fddae572ee5eb6bd534ba53f8b3bf5084ec27fca89
glibc-langpack-bi-2.28-151.el8.x86_64.rpm
f1bfafcb40b63dca6236c73549f0070c3145973766df5fa7c885823065024283
glibc-langpack-bn-2.28-151.el8.x86_64.rpm
284347ad5899d148c84b2c0c5a1261e673d7805ae212c61a760c00200db03750
glibc-langpack-bo-2.28-151.el8.x86_64.rpm
a7043215d3a41bb9e0be6bd2a579ec671f210c1dffe3f6aaac3da45719ca938b
glibc-langpack-br-2.28-151.el8.x86_64.rpm
f1225cdf809a3ea8ee90390b4063f32e1b4ed42a6a778b1fe5c7bab0f7739837
glibc-langpack-brx-2.28-151.el8.x86_64.rpm
b5471429c7522efddf0c1df556ba90fefebfec69a8de19e8a0459fec67fc9700
glibc-langpack-bs-2.28-151.el8.x86_64.rpm
2247b304b66345f41ecdb39ba1a299c68f29d85fe681e3bcce542bdf24c09cd8
glibc-langpack-byn-2.28-151.el8.x86_64.rpm
e156fd754f9434e3ef7e16ae0baee5da283f0db853c2ae676de48d02774b44b3
glibc-langpack-ca-2.28-151.el8.x86_64.rpm
4c4dc457fb8982c605f1e078f97ca18a7e02cb94032abbe45f2b5d4ba6d65311
glibc-langpack-ce-2.28-151.el8.x86_64.rpm
8531f3c65c94e74bb6dc5fed0ed74c77d63299a349bd14f8714a43b48a7d297d
glibc-langpack-chr-2.28-151.el8.x86_64.rpm
90fd59f164bd80e3224a307fe12744e3419b14a0c82960d18016fb67d33a3eee
glibc-langpack-cmn-2.28-151.el8.x86_64.rpm
c55a2244d00ecaf6cc1763e2d7c39ec475f98f8eac4fa372fa27448090633d29
glibc-langpack-crh-2.28-151.el8.x86_64.rpm
b2b433c7e1d7206dbfd70cb9aab22632bb476f8d4e2aaa51b3a0dcd55bb74e94
glibc-langpack-cs-2.28-151.el8.x86_64.rpm
25b813f118d68b36780accb3824cd84bdcceac474895fedcf64c2b324eb06408
glibc-langpack-csb-2.28-151.el8.x86_64.rpm
e2d122e90fca43ec0b213d4f5f167a31fbc9c5e2695e7609e28d88b69ee3f3bc
glibc-langpack-cv-2.28-151.el8.x86_64.rpm
e3719852b44339fb5b165c8501f2c545dfa0ff09fd622194168f075f56a5da9c
glibc-langpack-cy-2.28-151.el8.x86_64.rpm
8d39013dc6ebfebdbb3cbb720b8f78a056c8318763c051f93af7d2b9a3f2fb6a
glibc-langpack-da-2.28-151.el8.x86_64.rpm
43e131e82cd8345c97d31cac3a1b002afc4c78f3c4bec39940c1d53d7961916b
glibc-langpack-de-2.28-151.el8.x86_64.rpm
86640e3250e84c2ff56bb391335ae77f0998afbef81687b098e261472dd5354d
glibc-langpack-doi-2.28-151.el8.x86_64.rpm
84c767b24b21870f7c937425022d6a29ea80fdff4954380f2c9538bba7822648
glibc-langpack-dsb-2.28-151.el8.x86_64.rpm
6e473844d3cbde40a5546bd1265172eebdf2fec56feadaec55a1a88a7fbfb41d
glibc-langpack-dv-2.28-151.el8.x86_64.rpm
63ab83379d99ac14e04b0bb3bf58d33f721099422419f963bab942eff1317072
glibc-langpack-dz-2.28-151.el8.x86_64.rpm
287a910863daa5f555667749f977f99d13a9e00db14593150e730a0cabfaf361
glibc-langpack-el-2.28-151.el8.x86_64.rpm
3b0a8c1a001ce877fae4c188384ab4614470c1d43d9cb0e2139866b9c621cd92
glibc-langpack-en-2.28-151.el8.x86_64.rpm
3815649959f7fe84eb59a5c1e90bb3e25759739de4b242221347ba676f880e9f
glibc-langpack-eo-2.28-151.el8.x86_64.rpm
4c56e7ad549cc68eb284d4a1023b8ce8386370b8343257a6609248b396be2714
glibc-langpack-es-2.28-151.el8.x86_64.rpm
11d2e8fb5c5efc524572291479fdc4c88e14284d4959817a62b88be5bdf7103d
glibc-langpack-et-2.28-151.el8.x86_64.rpm
89710b0cc2e6e8bf4fba7afe47cbe647acb6064867e8aa73ea7e7ce92ea3f2c3
glibc-langpack-eu-2.28-151.el8.x86_64.rpm
75757ac34890e05c5335f0e4e790d25f95ed86821a678514f58f62ca94f877cc
glibc-langpack-fa-2.28-151.el8.x86_64.rpm
e5f5fa99bd025fc7f9d6888d79196da20688e1b84a0fbf1ab0715dc49a1190f8
glibc-langpack-ff-2.28-151.el8.x86_64.rpm
0072686b295e8c5b02394ecba8522a4ad71e414f0c2032524bbdf84f58c79123
glibc-langpack-fi-2.28-151.el8.x86_64.rpm
ced8472e822ef490dfd857edc3f0dba9c5e2cbdaedf1d4d16bf6ac4ede536c47
glibc-langpack-fil-2.28-151.el8.x86_64.rpm
d07bdb5abce053578fcbeda4dbabb06f87ea134be447fcaf0aacb968ff2634bd
glibc-langpack-fo-2.28-151.el8.x86_64.rpm
26b81918cd78067d071e7f2501f5663f22de2651916b36214d31960e2960c09e
glibc-langpack-fr-2.28-151.el8.x86_64.rpm
e725d3da11fedfb48b83372d91b94da82bbcb9566f842cd9f2efa22c175f67e5
glibc-langpack-fur-2.28-151.el8.x86_64.rpm
3d9e64a2ab8de8cadf18c1d9f0b13376a243ac67dce9fdef9dd453435006aa0f
glibc-langpack-fy-2.28-151.el8.x86_64.rpm
bad99dac35ae869c2687c772abfebe65c94489327d3859222cd75924b99a48f0
glibc-langpack-ga-2.28-151.el8.x86_64.rpm
07979ca79a6a06772216f89e53a0322ea7de0a519a9c58e414f2beeb873ef9b4
glibc-langpack-gd-2.28-151.el8.x86_64.rpm
bdca3586c2e825703f6aebbc3bf82e67b61b9ac418b30ecc9e85308fd5a75d12
glibc-langpack-gez-2.28-151.el8.x86_64.rpm
ad63f65e4b944d6633ba32e4269861abb6828857f685741b418f630b253e20ac
glibc-langpack-gl-2.28-151.el8.x86_64.rpm
cc7fadedd8d64b869007d7dae9d960bdb710a136d28745eb694ab44f6f470827
glibc-langpack-gu-2.28-151.el8.x86_64.rpm
24d17d676d6d726e1c818c6e71392724f811313f66dc66da429421e481765eb6
glibc-langpack-gv-2.28-151.el8.x86_64.rpm
c3ed32028ad5130ce26c72ae3a4d02b144336cd1f503847c2cebcd2547cfa12b
glibc-langpack-ha-2.28-151.el8.x86_64.rpm
2e2d37ca4882a455c122ddff69474c4d7ce8d627c648bfaeb56ea4909c6d9bd7
glibc-langpack-hak-2.28-151.el8.x86_64.rpm
a8a5478398aef6b1fd82265740ba00322c6d2d3f64bc0a895497bb55ec474ecb
glibc-langpack-he-2.28-151.el8.x86_64.rpm
6c6f05177c9e42eb2e7b529a5d88ba934932c83e4592c48665fad5ffe05fd62c
glibc-langpack-hi-2.28-151.el8.x86_64.rpm
4a1f64252db351b7c3255972b797e10d5d8a3858f9c5bc29018e6329226a93bc
glibc-langpack-hif-2.28-151.el8.x86_64.rpm
12184abef866a4ca38cf7fd3a1db6946831ced875f4ad38893b7fdf7d63bcdb7
glibc-langpack-hne-2.28-151.el8.x86_64.rpm
29c2eb3cfd968eeb64928d47d7d30754c5b56e1e98bb615552aa3501d21af92f
glibc-langpack-hr-2.28-151.el8.x86_64.rpm
83aa68dafee3604906ddc6f628506a81511d736fae7cda9e71275d01349ed9a7
glibc-langpack-hsb-2.28-151.el8.x86_64.rpm
548ededb98294719a1866a0d9b2a4043f0d728ba0327725763702bb220d6c8bf
glibc-langpack-ht-2.28-151.el8.x86_64.rpm
ea066e6306a82099ff6ab6ea797659e6aa6e951cf0aab00a59a2591feee15e81
glibc-langpack-hu-2.28-151.el8.x86_64.rpm
38cdf3286ca63f259e1f835f0082b4559b317cb3a05a5bb7e86e7814cab69834
glibc-langpack-hy-2.28-151.el8.x86_64.rpm
8065e0e8a6278530d593e58d87dc8503756f17ebf42f92f89a9966a8ec0193a5
glibc-langpack-ia-2.28-151.el8.x86_64.rpm
1f28cb7552e855727bb3f7bd6daafaf2faaa8cd82258e215f1873dff18d95601
glibc-langpack-id-2.28-151.el8.x86_64.rpm
b2ed0259460eeeb9144cb5e04762081b1bc73c3a6627c83bd05e846df7109651
glibc-langpack-ig-2.28-151.el8.x86_64.rpm
eb2eccaf571a177bf9c6c13ea78540d437a852cec2ba7a8e543aadef467fd4cc
glibc-langpack-ik-2.28-151.el8.x86_64.rpm
23a576eaa2f092875aa930644148019353d64b1cb47f7d089f70f2d1e0115c1d
glibc-langpack-is-2.28-151.el8.x86_64.rpm
957aef057943e770c56b6456fd1d3ed48a10cf88048534529a125e830428a58b
glibc-langpack-it-2.28-151.el8.x86_64.rpm
41f2ed37ab771e834549d1fdff77d0697385c296095b5ae01a14ce96666c7cae
glibc-langpack-iu-2.28-151.el8.x86_64.rpm
5af3704ed649358ac167f2d38782f46754aae5708c6e300e0604908822e83e07
glibc-langpack-ja-2.28-151.el8.x86_64.rpm
a035a5500abe9ccefc0a3b1ec0f94122b338d285181abec209c2693a54a7789e
glibc-langpack-ka-2.28-151.el8.x86_64.rpm
138bcd195010ea74f5691da4080d2fe8a57347662a9cd80395421f05de81ff66
glibc-langpack-kab-2.28-151.el8.x86_64.rpm
b84a3b135bcca02df477b8e6a61a6b2b5614456f09cfb9acfd5dea4a7df3c793
glibc-langpack-kk-2.28-151.el8.x86_64.rpm
7b5d03a7733416308f9eaf78e06bff20f800b1339b4d250e7d077fa06495a179
glibc-langpack-kl-2.28-151.el8.x86_64.rpm
8d67fa872846b443cca11036a444aa1730c72562e611cea71b202649ff7fd295
glibc-langpack-km-2.28-151.el8.x86_64.rpm
6e619ed73cf3b42299bf275ee5cc64a9146b3cbcf4f3110c5643ed72a80df14c
glibc-langpack-kn-2.28-151.el8.x86_64.rpm
94bc464ad77dc7d88fe05e1a001b8452333946f4cba8aae26f0f04aaca8acef0
glibc-langpack-ko-2.28-151.el8.x86_64.rpm
d247cba4f8dd697385e1dac341c7f009fd41737a7185fb14e07fdf9f8b40ebdd
glibc-langpack-kok-2.28-151.el8.x86_64.rpm
865b15684849ca2f92b779d7c2c39fb378cd6af8c97c190b8c91d7a987ba6389
glibc-langpack-ks-2.28-151.el8.x86_64.rpm
a70cdd1742d82028e2046a84b265bc2a706f30790c55480b9fa0f584fdf9c130
glibc-langpack-ku-2.28-151.el8.x86_64.rpm
ce50db360573417ef00bf7e3be7be8ba6d1ee340e5a09c4106f51a9fc9b6b59f
glibc-langpack-kw-2.28-151.el8.x86_64.rpm
19579c6259335795d3486c05b578d261e07802f70fd909a97c79d7129b5c8ce7
glibc-langpack-ky-2.28-151.el8.x86_64.rpm
6ea3f114f8ec77673b61680009efe987da9ccbfb7c2aba9b6db3c7ff8b9250ad
glibc-langpack-lb-2.28-151.el8.x86_64.rpm
96b751fb82d1c7eceebf379ecc52cd0f91b99f1f6896590430285b3cc0f4fb23
glibc-langpack-lg-2.28-151.el8.x86_64.rpm
6f66b3256be7059fa1b5c88ad5b0f3192d3d704dfcfec1ecba79bf6f324eb9e8
glibc-langpack-li-2.28-151.el8.x86_64.rpm
d2927145d7107272451d0a1a90804ee3401183296b99a4661210a4c1c2065cd2
glibc-langpack-lij-2.28-151.el8.x86_64.rpm
f512044a4aa50b83f9bec0feed0df5c1f482b36be2eab7edf73e5a33b37b2a0c
glibc-langpack-ln-2.28-151.el8.x86_64.rpm
f9dac0ec47baf14674c9bf0de36e9bc3712d933dae762d4c206de34f8bccad31
glibc-langpack-lo-2.28-151.el8.x86_64.rpm
29cb0789c0c40499e8436201308b41ba54767aae56982fbfd57b5930f779484a
glibc-langpack-lt-2.28-151.el8.x86_64.rpm
5120e33d8f3271aa35b862c7f2c36da5c5d402a2534813392a8cf245380d6306
glibc-langpack-lv-2.28-151.el8.x86_64.rpm
c128ee71a846868b8059b66a44503deccdbf5b7a18414eb330f5d027e7a9bead
glibc-langpack-lzh-2.28-151.el8.x86_64.rpm
661687f3dcfc2f45fd2a71bd041269e725106f81d3c5c977352ada091b5b5c20
glibc-langpack-mag-2.28-151.el8.x86_64.rpm
7ef5bcbe8a20eda312c9013b5e1b6c569dd1c9405643e45fa29a671528fb7c96
glibc-langpack-mai-2.28-151.el8.x86_64.rpm
189cdb7dfc35650d23a9dc98419a2ef77470750f0484160fa163bff514f876b0
glibc-langpack-mfe-2.28-151.el8.x86_64.rpm
56e1690d8236e0edac0e97463410dc83909f10d344ec7bfbccf7def8c6fd302a
glibc-langpack-mg-2.28-151.el8.x86_64.rpm
d31bd3622984f5ca63e28558af27d95f41fb8e409ded4094bf953cddf334425d
glibc-langpack-mhr-2.28-151.el8.x86_64.rpm
e61a532664a68f4fb2f144dcda79a4970cac5b18d661492fad4743bddc9d327e
glibc-langpack-mi-2.28-151.el8.x86_64.rpm
cab4951b998de50e3b7771eab6afe7bc578bd2fa7576fc27bed4ea9e57489c1f
glibc-langpack-miq-2.28-151.el8.x86_64.rpm
ee9bd8749a961ec218f0f7d6381efa1e66b7d5bfaf60b042bb9317ff7dfaa5db
glibc-langpack-mjw-2.28-151.el8.x86_64.rpm
f8786360e4caf848dacec14319d8514c3ce05808ce77c9996cef8cd885cef6bf
glibc-langpack-mk-2.28-151.el8.x86_64.rpm
9aa966d182aced596bf5a4fd1dff0d1e4e9d34a08f9e6b1c759eafaac0fd019a
glibc-langpack-ml-2.28-151.el8.x86_64.rpm
13950d976c129e5d82c293e73c936d0d53b643bc149b0e24fbee680a01c36af9
glibc-langpack-mn-2.28-151.el8.x86_64.rpm
804f21a95957df9b956bdd979d9f44bd5d09752b59cad2032c616570c8a157ac
glibc-langpack-mni-2.28-151.el8.x86_64.rpm
02e5343f3a4466c913bd4194bc322202c489f3361e8afddd1d8ff2ffafeba248
glibc-langpack-mr-2.28-151.el8.x86_64.rpm
866f61ae5573a51f60f2de5a3598559b1bc13a7e46b3a325e2ae42272c60d4df
glibc-langpack-ms-2.28-151.el8.x86_64.rpm
9459fe9fdfa0dfb330ad86552ae099a54fab1b5430606f0ed738d3c04be8c273
glibc-langpack-mt-2.28-151.el8.x86_64.rpm
cf9459440d67cd04901a999a4d3434922a39e188c423c2222c4ffd5180ff0f56
glibc-langpack-my-2.28-151.el8.x86_64.rpm
33ec0c664f15f9f6daa3b146598ad8da54899f91e0a34829adef9a5ea2715762
glibc-langpack-nan-2.28-151.el8.x86_64.rpm
316994fa417f58268966f6648a2a70769b640633799e175a9639d969ee75701a
glibc-langpack-nb-2.28-151.el8.x86_64.rpm
66553ab7b26a985134a29ac0cbd5990f4bf061c431fa3189786f0e4b65dd009a
glibc-langpack-nds-2.28-151.el8.x86_64.rpm
09e969f6ba17bf1281d3f1d6f92161ee7f31878aab6ac6c7ef391a1558d6f6ac
glibc-langpack-ne-2.28-151.el8.x86_64.rpm
fd4094f384cd9dced9a96ba4d28bd5acdfb5e1583ce2819c5a7d8e4042ac249c
glibc-langpack-nhn-2.28-151.el8.x86_64.rpm
7af2fb1bbfcbeaf2e731feb3007f9f53e6f8e90581f60597700562a1184fd9ee
glibc-langpack-niu-2.28-151.el8.x86_64.rpm
cd84a48fa09b612ab7d27f44547d51c8efbc899aa9866ce140b8777db6c8a99c
glibc-langpack-nl-2.28-151.el8.x86_64.rpm
96e448b57336f908bdd4c242624f9d50242e48b1cafee6a8b7d27165985ae424
glibc-langpack-nn-2.28-151.el8.x86_64.rpm
7492f19e3a022fb662c583b193a21088d58838ca1400545013b44728d490b29f
glibc-langpack-nr-2.28-151.el8.x86_64.rpm
38c8da206c34ffcb378fdd0bf6f921c49ddc90356a559d1642efd67595f4a7b3
glibc-langpack-nso-2.28-151.el8.x86_64.rpm
4a5975a5cebc30b02bd0c958d29a4a1dcc006a627851a8c6a509db765efe9303
glibc-langpack-oc-2.28-151.el8.x86_64.rpm
82b6f18ed9339075d2d5230396b22a2d9356aaa68162f7c5fc10054c5e59ee11
glibc-langpack-om-2.28-151.el8.x86_64.rpm
2e9a7c0aab5b53b7429cfe0e5821ad9ad2713f76765d4ed22f3a81c860f93c07
glibc-langpack-or-2.28-151.el8.x86_64.rpm
30087e4977bc730e7b40ec0fe965e2ff6201fe98e34b7750eefc2b3ff54ec811
glibc-langpack-os-2.28-151.el8.x86_64.rpm
d9fc4f372070faa50242345df59495ba0d195a4ee643162293468d0d94f5539f
glibc-langpack-pa-2.28-151.el8.x86_64.rpm
e15e855f502d55ec751e0d0b7cc13e83f56bf49a7a87d03a7539ac51be3f70e0
glibc-langpack-pap-2.28-151.el8.x86_64.rpm
8d143503524b3362f9b44ac67c57360a755bb0af8b2f3d2b26110cc5af147b71
glibc-langpack-pl-2.28-151.el8.x86_64.rpm
2bd1066ab1070fdcd8bd5cedbe461e9b890bae53149e9fa9ea81f8bfbe036616
glibc-langpack-ps-2.28-151.el8.x86_64.rpm
5bb39c98e73a0fece4e34b0ce6b579d0f40a9d4f60c005a5afb5302ef877e977
glibc-langpack-pt-2.28-151.el8.x86_64.rpm
e646546297be178b6e1979b90e20bde073e53e00c756cfa2f01ebfe6379bcae1
glibc-langpack-quz-2.28-151.el8.x86_64.rpm
d272d6196fedb7cb3ed103e5255eff3f7360797c60b1fb9aafd2bebe89e24f7a
glibc-langpack-raj-2.28-151.el8.x86_64.rpm
f78fd081c28488133e088b2ef9169ba876dad8e23daf61735280157cb6d43d8d
glibc-langpack-ro-2.28-151.el8.x86_64.rpm
538508fe8d52c6d287c15cae6fca55ada34821743b4c697b9f7f8d0fe9ee3eb1
glibc-langpack-ru-2.28-151.el8.x86_64.rpm
1b9f473a8b3b0a596914ad63a86cb1779fc20353566f3c3ed5762712dd5edd63
glibc-langpack-rw-2.28-151.el8.x86_64.rpm
632ad2d4ee81c5b147ac862a6e90170336b42e483f11edcebcd9fe3d87b20934
glibc-langpack-sa-2.28-151.el8.x86_64.rpm
2d1cd22172973bae9542c0da22c8293fd4e922bd95344e01dc2a9105bfadf93a
glibc-langpack-sah-2.28-151.el8.x86_64.rpm
d40941720ebb2bd8068c57632cdbdd5e9fc500f7ca7860d56c19852a8ac1b438
glibc-langpack-sat-2.28-151.el8.x86_64.rpm
5152ce9f1dc226cdd705e95132ee96ba3532d26bce5e07df884e255c83fb541a
glibc-langpack-sc-2.28-151.el8.x86_64.rpm
7d410a2367cbade102e40d918b38b490d8cb39c05bd16d10f208b16498398d6f
glibc-langpack-sd-2.28-151.el8.x86_64.rpm
feb66a4ff8c326e2d200a6e39fb12e09018b0afa7656018a4ab507ed9c5c36a0
glibc-langpack-se-2.28-151.el8.x86_64.rpm
57fa8b895f63a4d875d65da94cf1e85a46ad4eba1c4f0353a2e2a7ca8eef8699
glibc-langpack-sgs-2.28-151.el8.x86_64.rpm
16e0e6b36b60fe81c1ad4e2259c51dcbc7e760556c381c3c7029317f014648c4
glibc-langpack-shn-2.28-151.el8.x86_64.rpm
5db3e35792c3d645177af58402f8c63c2c1dfad8874318af15d74b835aeed109
glibc-langpack-shs-2.28-151.el8.x86_64.rpm
9dce2089668eb99844ceb70821f0fcde1f52a96914988ac8b4f1b29473e868dc
glibc-langpack-si-2.28-151.el8.x86_64.rpm
8bbed704562a357564278ab5e21a009e865a249c7162f43d60a3ca0da778edb3
glibc-langpack-sid-2.28-151.el8.x86_64.rpm
ffa1ddc95b3b001205c6b1c6fe573985a1e69de406ba54a4f8a1c5064c69dfd1
glibc-langpack-sk-2.28-151.el8.x86_64.rpm
228d4ba7ca22f67df03b45156f168cfd4bd28c6f7c4da725475d3768c77a954a
glibc-langpack-sl-2.28-151.el8.x86_64.rpm
e2f4a43d6c0d96de30d384ae0a1735e6e6629e8fa7c58ad01f0d2d55a5072968
glibc-langpack-sm-2.28-151.el8.x86_64.rpm
754fdae930031d99c58c22e055f596afa917bc6f4d66da2d1fe7aabdb0c45e4c
glibc-langpack-so-2.28-151.el8.x86_64.rpm
60adfdc9f6c8a8322fb57330817455e7646f2344dc525130db0e9c8c9418860f
glibc-langpack-sq-2.28-151.el8.x86_64.rpm
4098b2516fc95995d5bcec4f64591d157f806623944aeb6ca8b2766e0a968c41
glibc-langpack-sr-2.28-151.el8.x86_64.rpm
1b7e2494bef3ee24bd922c96f3bc9d3af94299876e6032045eb222ed8d8b2289
glibc-langpack-ss-2.28-151.el8.x86_64.rpm
207ec9e4ea14e5e9fefb93bd9ba5152614cc89e138c3110587e64369c81f7809
glibc-langpack-st-2.28-151.el8.x86_64.rpm
1f3e19d58edc43623e976c057de293157e7688d25d9e4f25e6900cf4c7e9e4d6
glibc-langpack-sv-2.28-151.el8.x86_64.rpm
8ec99d8a1e1a3291a92a745a227003f5387bb6402c2dd043d77f391a6a1432dd
glibc-langpack-sw-2.28-151.el8.x86_64.rpm
027eddcc5249e3a2c2bc6b5d5c609b23074d9a3f0033613c2fb9f1759e4b5150
glibc-langpack-szl-2.28-151.el8.x86_64.rpm
39e0819e3717c78e27cdd8b5c510b494c3cfd22417b8c4e9bb571a31057d1af9
glibc-langpack-ta-2.28-151.el8.x86_64.rpm
5ed91a922ad658ea888cfdc7a3ef877922ff0f75c6aef7120bb4f56a9db4f85f
glibc-langpack-tcy-2.28-151.el8.x86_64.rpm
c20d5a9919125c1258a9b458ab5119600fd633b464d0e11ce7faf33215170741
glibc-langpack-te-2.28-151.el8.x86_64.rpm
c124f98fba8d5adf46bb8a8b5e74679dd06a99946e466d3e690c890a4a20c99a
glibc-langpack-tg-2.28-151.el8.x86_64.rpm
d92ea52949e636d5f8d6f8ca797c7e8f66cc6639b16aaff4c0259f111df4feb8
glibc-langpack-th-2.28-151.el8.x86_64.rpm
4845ad3ed6eae7843d7ed8a4763f8def6ac767d4c30753b403e860f762895190
glibc-langpack-the-2.28-151.el8.x86_64.rpm
91cdbbd40513f74c96a38e03e24d8000987f7189d9b7f5dc9d8eff3ecdb64070
glibc-langpack-ti-2.28-151.el8.x86_64.rpm
5cd0783c848accbd8ace8b230eac1137eab35cd121191ec467a9bbd66ebe216e
glibc-langpack-tig-2.28-151.el8.x86_64.rpm
ac9c315f80424d0e37ea38d3c492c8a71d6efc9c7ffbd00b8aac676c50d9c336
glibc-langpack-tk-2.28-151.el8.x86_64.rpm
d03a257d9ef011eddb452cdc6f815ab81b1e6d19f4252bdf9f8a40ad223c94ad
glibc-langpack-tl-2.28-151.el8.x86_64.rpm
d8c9db408147864905f8c5428548d8cbb248043402e9da1b714bceeba74704b8
glibc-langpack-tn-2.28-151.el8.x86_64.rpm
6d1d749484e37af357d8b51dbd3ecfb7529120c7fc5a4602c251cec9fbcb300a
glibc-langpack-to-2.28-151.el8.x86_64.rpm
6e876eb9bce47800d454dc5f0844986eb7bcc015ac5345cd50d050e5bdf10147
glibc-langpack-tpi-2.28-151.el8.x86_64.rpm
ce1ae9a1cecf701972035cd6cad8a04ca821cd8561fb78e6191379f19c9e35f7
glibc-langpack-tr-2.28-151.el8.x86_64.rpm
9d136383f5bbe61227cc65beaa80ccb0acb6be9e4dd21222bbe1cc5e9ffe9171
glibc-langpack-ts-2.28-151.el8.x86_64.rpm
3779587a6b810683557108966170fef6df1e757c082bd2c0ed869ce56f8ac7c2
glibc-langpack-tt-2.28-151.el8.x86_64.rpm
2c279dfcaef1805192d3d8feafaf0ab62d59e78c62a8b1f6d06fec1d987b232a
glibc-langpack-ug-2.28-151.el8.x86_64.rpm
0d9c29d11dc636d66788dcdf38adf335fcef67e247be60259ab6c0e722dfbcce
glibc-langpack-uk-2.28-151.el8.x86_64.rpm
b7224118a76bad0a53e31f1663f27d2bc5e608110787cceeddd78136126ea50c
glibc-langpack-unm-2.28-151.el8.x86_64.rpm
936af46163a1944ef31570e7b6281b30d83970dce1e977ddb08848195e4ab9cd
glibc-langpack-ur-2.28-151.el8.x86_64.rpm
9fd8596cd7e4832c02784a98443ae5f59764ae8c881c8056c81c3d5a13d49c1e
glibc-langpack-uz-2.28-151.el8.x86_64.rpm
40900f3e5ce870d0db4042a5325ed1db16a3a6b3bea2f80c86fb4f0697a700f2
glibc-langpack-ve-2.28-151.el8.x86_64.rpm
e8d9bf141bfae9c07f351b65a4c79a649e78d4eb96266f9416cd5787cc209be4
glibc-langpack-vi-2.28-151.el8.x86_64.rpm
9a5094a70e956e26800d64adf1a960ab311b527957e6d802db6709e19a367d74
glibc-langpack-wa-2.28-151.el8.x86_64.rpm
c09d67b869ec3d620bf522ce01f6c973ee5a7ee42578ca26c459623a4ee8d692
glibc-langpack-wae-2.28-151.el8.x86_64.rpm
68f57e5fca849921ae60a85fbaf7269266e00e6520da2b15bee9b33f886ec986
glibc-langpack-wal-2.28-151.el8.x86_64.rpm
e491a5581c550f714edbbbfecc7ecba4cfc0211ab8e68c6cbc8dbca4e19381a3
glibc-langpack-wo-2.28-151.el8.x86_64.rpm
3065545a0d547cc66482f2c67ed9f39b7aaab3cf09a6f862fadd420e6616330b
glibc-langpack-xh-2.28-151.el8.x86_64.rpm
20d63ea8cedebb81b40f344a03dce605e85fd59fb7ada065403b87946988bdd5
glibc-langpack-yi-2.28-151.el8.x86_64.rpm
cb406ac83bef235f05e35ea1aa2c245e423431f2d7c5eab1b131aede87598153
glibc-langpack-yo-2.28-151.el8.x86_64.rpm
2b9e53d186d005c34ae4f5459e9fbd99ac233805a4606e61d485e1b962b9d6fe
glibc-langpack-yue-2.28-151.el8.x86_64.rpm
ae542f7070a05aa2b8f532d268ccc4fe3810d922bc0f1031fa3c79916a7db97f
glibc-langpack-yuw-2.28-151.el8.x86_64.rpm
621660659708d8e29f9721730025bf7362a5e596b51cddacca751f07fbfccee5
glibc-langpack-zh-2.28-151.el8.x86_64.rpm
ba160eb91f09e593d17406314db844809df1032dcee7c39c065aa6264556b33a
glibc-langpack-zu-2.28-151.el8.x86_64.rpm
b93beeda3a0c89e1abcb274f43fec760ef7f5a3809ecd3c99e52293c0023917e
glibc-locale-source-2.28-151.el8.x86_64.rpm
7338bd2382fccae74392838c4e5b7d64ef0ece72ab1457551827d5c4dd66fad6
glibc-minimal-langpack-2.28-151.el8.x86_64.rpm
44e2da5e962a0c700cc2d9589e6a92738574c0dbbc3420c9c5a301ff9f7d9819
libnsl-2.28-151.el8.i686.rpm
bb01843869e2426ef366a28ea148ef847b25f1c62c814ad788916f5cba3120b2
libnsl-2.28-151.el8.x86_64.rpm
fcaa16a4c81c0437b41b4e5917eb76ab871d98c7cb202d3e6b9602cfda00f63e
nscd-2.28-151.el8.x86_64.rpm
da953d851dcb2017898d01e3a3040b070f28dbbd62de26492b8752d49005652e
nss_db-2.28-151.el8.i686.rpm
cc6600b22e6be7faaf47e74abde2aff99f49855e98679ef2df5eef76466faa84
nss_db-2.28-151.el8.x86_64.rpm
6a911abca81b90c46eecfe4f51bc6ae48c439b3cfb829d61b2a717626b696155
RLBA-2021:1588
kmod-kvdo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo, vdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
kmod-kvdo-6.2.4.26-77.el8.x86_64.rpm
6c696262e272105e60f5e534028a292c827f91ce4834e68e09285842a3a10c08
vdo-6.2.4.14-14.el8.x86_64.rpm
95323c5ed8ebc153ec040c3e66458feae6c5f9c4eaa386988393d92395ae3d56
vdo-support-6.2.4.14-14.el8.x86_64.rpm
b61c3f37efca5b7dfa20abccc93b9e55a44529173cc82c95aa3c96321c349f30
RLBA-2021:1589
hwloc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
hwloc-2.2.0-1.el8.x86_64.rpm
30adb6cc8ea1438ac1731ab5f020f026c2885b002f813ebb979c98aa5ac50787
hwloc-libs-2.2.0-1.el8.i686.rpm
7998b9117e9f3fb2e34cf8d870830a7b84fab109c53ed403a759208790319b4d
hwloc-libs-2.2.0-1.el8.x86_64.rpm
0eaebe6d3520ac2910c0898e5ca435acddc4bedea85d863cf25bd6f1c7cc607e
RLBA-2021:1590
quota bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for quota.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
quota-4.04-12.el8.x86_64.rpm
2be808ec84ef0f3a15fcd32c3499b847c0d05781d52e07c1b2698fc40bba51ed
quota-doc-4.04-12.el8.noarch.rpm
8daf6c52073fe73951367564fe787b805fadc01662c8cca3268c37905e2252af
quota-doc-4.04-12.el8.noarch.rpm
8daf6c52073fe73951367564fe787b805fadc01662c8cca3268c37905e2252af
quota-nld-4.04-12.el8.x86_64.rpm
60c812ec89d02f8030cb6a04cf8da118bad8711b6d3151f15233d4f89aa42433
quota-nls-4.04-12.el8.noarch.rpm
62b388274490634701b862791915d337e03878b2f9a56aa227ae7d68d11879de
quota-nls-4.04-12.el8.noarch.rpm
62b388274490634701b862791915d337e03878b2f9a56aa227ae7d68d11879de
quota-rpc-4.04-12.el8.x86_64.rpm
2e40b59fb37d2836680557fd2dd8ac964319abbe4b29cea2d6065993d9ac0a3e
quota-warnquota-4.04-12.el8.x86_64.rpm
883e4a528dfe567d64748b142c9f402dcd25eb5d4306ce1c95c6c1288cbca5a0
RLBA-2021:1592
gssproxy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gssproxy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
gssproxy-0.8.0-19.el8.x86_64.rpm
6591d5d98723df7ca6f4d7bdd0cc0a0af0d10b87113e8afc66a636b7e9e2f625
gssproxy-0.8.0-19.el8.x86_64.rpm
6591d5d98723df7ca6f4d7bdd0cc0a0af0d10b87113e8afc66a636b7e9e2f625
RLSA-2021:1593
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS (CVE-2020-28196)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
krb5-devel-1.18.2-8.el8.i686.rpm
534d2dcd0888c316795f9fa17984e5ee1fdfa46556046af0923b4305ee22f829
krb5-devel-1.18.2-8.el8.x86_64.rpm
a0700721a08e193c0b9afcb7a12204cef7c29ccd3b4152d2a86f769bc50ca2c7
krb5-libs-1.18.2-8.el8.i686.rpm
8f10f6e97864923488214dc473ff06192d1e7929c162ad11615247bf583eb331
krb5-libs-1.18.2-8.el8.x86_64.rpm
6d98b089e3587948b2cd62e6ccd4bbe3bf199479054a4e4703cae7afe883c6df
krb5-pkinit-1.18.2-8.el8.i686.rpm
74f0586192a4d3d76acd50ad5f6a677889a63d5cdbf749379c599f10ce87749f
krb5-pkinit-1.18.2-8.el8.x86_64.rpm
19efeeaa7c18e2becaa1b1dbb9f049f058dab3489e5212591fe9a37aa8e3fd91
krb5-server-1.18.2-8.el8.i686.rpm
6139d5158314ad15d3cc0b7b5f4c99276aa35528d9e771343ea29feb70de7cf7
krb5-server-1.18.2-8.el8.x86_64.rpm
14e740b6836df2af2ebf13c4be392295f8372a575bbf552a59f5ac688e2514b4
krb5-server-ldap-1.18.2-8.el8.i686.rpm
869b499615f2358a18f415d54bf2d381609ae7ee69473b9935c3ac11f2347f7d
krb5-server-ldap-1.18.2-8.el8.x86_64.rpm
f69a69ba2424ae4fcf6ab90428f3d3ab7826ba762778a0f9bbb21fcff5e29bb2
krb5-workstation-1.18.2-8.el8.x86_64.rpm
c0d6693e1d4fbfaf7ea738c94f7b17df38ece2ae8368be36635787babb03cf43
libkadm5-1.18.2-8.el8.i686.rpm
6a15839ec1545644c3467cfd1c88b0b0bab5f4b4f16eeab711753bfdef891888
libkadm5-1.18.2-8.el8.x86_64.rpm
dd3b630e6fedc61c1072ce2b8f2bbeb7e96afb3752f157c11e616f2ec3cbe908
RLBA-2021:1594
RDMA stack bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mpitests, mvapich2, ucx, opensm, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, perftest, mpich, libfabric.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
ibacm-32.0-4.el8.i686.rpm
1298f760aaafed6b888ba92fe6e22660304f35bb3a1815c443c54149dcb3f97d
ibacm-32.0-4.el8.x86_64.rpm
e896928c2888bfac8a06be252586462875940e12a9943a8818e5b0f87f1b0842
infiniband-diags-32.0-4.el8.i686.rpm
72b00af02863d71dd913992f37c8904dd53edb4800b76737c2f4f2c7cf10be68
infiniband-diags-32.0-4.el8.x86_64.rpm
f66de51b5c8228cfd4e6b23bf6a190546b45a208db55707b9ec51e15e2cdec13
iwpmd-32.0-4.el8.x86_64.rpm
d876eb2afbe70e35cf066d7f19fac049a60230c3a32d37656eb3747fa1c95e08
libfabric-1.11.2-1.el8.i686.rpm
d87aa993860f670660976f31344154182d6ec0dc6c21105c6e5211279b3c4845
libfabric-1.11.2-1.el8.x86_64.rpm
cf172c67b76b31bf0998eda8d98fdd86586aedd8ae57e1b36d6329a9fd1e6fb9
libibumad-32.0-4.el8.i686.rpm
11ed6a813f955f6ece32646c3dcc0052eb83aa4c770606c5a2ba702d2541f7f2
libibumad-32.0-4.el8.x86_64.rpm
7d8a14fb817fa06dd030061d9266c5d5b2a1e15ad00b544a891eee6bbef8fcf9
libibverbs-32.0-4.el8.i686.rpm
661a977e6fc49a5ec53253eadb68e75e32fd313407a5a4ae14727f33f0163973
libibverbs-32.0-4.el8.x86_64.rpm
1437002faf8ba90c3934eadaebdfc7ca3569bb5f17cd2a2d22709decf958e0cf
libibverbs-utils-32.0-4.el8.x86_64.rpm
e619f168438a5824549767c07020d53bfb4bcb5d5373bd2ef1b154f0666e0fcf
libpsm2-11.2.185-1.el8.x86_64.rpm
2d85281a5bdf655c46487e9639deb3e32ab11463dd5f324dcf316c484ad98b2c
libpsm2-11.2.185-1.el8.x86_64.rpm
2d85281a5bdf655c46487e9639deb3e32ab11463dd5f324dcf316c484ad98b2c
libpsm2-compat-11.2.185-1.el8.x86_64.rpm
756797bb5d644c740634dfd8a7eaaa0ad4248172d02c931db6cb9aba88dfadf2
libpsm2-compat-11.2.185-1.el8.x86_64.rpm
756797bb5d644c740634dfd8a7eaaa0ad4248172d02c931db6cb9aba88dfadf2
librdmacm-32.0-4.el8.i686.rpm
6293fb7fd2730d4b8ff3fbdcb51f26344d3324626e11ce62d7df41f402028d62
librdmacm-32.0-4.el8.x86_64.rpm
548b0faf0e5db15c3567e9d14dbbfdfc25e37006c1cc34bc5907f83ed2248bdb
librdmacm-utils-32.0-4.el8.x86_64.rpm
fb927f9522a04490cffb9b47cf69a6a4023729a1804cd6998127841b2b97fd71
opensm-3.3.23-4.el8.x86_64.rpm
79da2a2664f5d18f5e474bcf4e985acd087d8b9a701064b9bdb448bdbbb3ef33
opensm-libs-3.3.23-4.el8.i686.rpm
d56b74bff8e45700c0cb98bbb37fe82c030532364b4a8e867c41170b29fa2f5d
opensm-libs-3.3.23-4.el8.x86_64.rpm
845689fc6ae04ea302eb3991dbc47270eceaf0a5cef9b313d6c8385803b7aaa7
perftest-4.4-8.el8.x86_64.rpm
0d83de26d2573bae2148c84801f6b102f8610c90f68ae2891264d1a1d2ff216d
python3-pyverbs-32.0-4.el8.x86_64.rpm
1179e4d72fde77d93f8a0f011815d1bd759c4df90924ee3ba9571068c532d291
rdma-core-32.0-4.el8.i686.rpm
d01d0d7147a0dd583db5765575c5eb48df5acc22a7d6e94cc1a55b40a229785b
rdma-core-32.0-4.el8.x86_64.rpm
61edee590e48727389ec79a0a65375613f979232c3d5e4e21b5193418c2b5907
rdma-core-devel-32.0-4.el8.i686.rpm
a27ef5ec73eb15a44af11534e0713c5d71650fc542c8be8ba29395285be55638
rdma-core-devel-32.0-4.el8.x86_64.rpm
4f5e20b6569bf7996dbcd114bffc7f91efe5891f11518cb35ee7b7b55c65147b
srp_daemon-32.0-4.el8.x86_64.rpm
d320baa1a9b636ecc0c3b3b7b719d512db1747ac9a9d7eaa32f02eaa215b8b6f
RLBA-2021:1595
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
opencryptoki-3.15.1-5.el8.x86_64.rpm
9479212fa3273291183559f8e083c21b9327e04badc405694700cf6edaa73b9e
opencryptoki-icsftok-3.15.1-5.el8.x86_64.rpm
8695708ac46c0d3c1c6a515fa0e6672564bd961e8fc8aa840b5b2d0ac268669c
opencryptoki-libs-3.15.1-5.el8.i686.rpm
1074b01347c11f57473a5c35990aac3e177a82c4c4d9fb248891c6d96219d309
opencryptoki-libs-3.15.1-5.el8.x86_64.rpm
ae4f34d10a7b3a4dda08469dfe1f27d65c4e55b3cb3c6eefe30541975c77c247
opencryptoki-swtok-3.15.1-5.el8.x86_64.rpm
d922148afca119296484b9d5b6686bbe687617df59238b78c9354d6679759767
opencryptoki-tpmtok-3.15.1-5.el8.x86_64.rpm
0d2a68a650e66f7426288b846a5536b0897b46feef1b0f40095c7b5d22ec58dd
RLBA-2021:1596
libselinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libselinux-2.9-5.el8.i686.rpm
27d70cf1ad4e74d341cc0b70650a85f44d8980695b1636c6ac6e90ca9f75c1d1
libselinux-2.9-5.el8.i686.rpm
27d70cf1ad4e74d341cc0b70650a85f44d8980695b1636c6ac6e90ca9f75c1d1
libselinux-2.9-5.el8.i686.rpm
27d70cf1ad4e74d341cc0b70650a85f44d8980695b1636c6ac6e90ca9f75c1d1
libselinux-2.9-5.el8.x86_64.rpm
1adba0de5ffc3867220990bcabcf7cc7d5b52409464aaecaaaf475054cd7f474
libselinux-2.9-5.el8.x86_64.rpm
1adba0de5ffc3867220990bcabcf7cc7d5b52409464aaecaaaf475054cd7f474
libselinux-2.9-5.el8.x86_64.rpm
1adba0de5ffc3867220990bcabcf7cc7d5b52409464aaecaaaf475054cd7f474
libselinux-devel-2.9-5.el8.i686.rpm
c5179922118aa2fa1a7ef3fe6fa4ab2bdd017d90dd70cb50216e4a82632bf3a3
libselinux-devel-2.9-5.el8.i686.rpm
c5179922118aa2fa1a7ef3fe6fa4ab2bdd017d90dd70cb50216e4a82632bf3a3
libselinux-devel-2.9-5.el8.i686.rpm
c5179922118aa2fa1a7ef3fe6fa4ab2bdd017d90dd70cb50216e4a82632bf3a3
libselinux-devel-2.9-5.el8.x86_64.rpm
b59380aae9b19e6cb3033f14ddde49fc8eeb8dfeb43de44335007032f38b1d27
libselinux-devel-2.9-5.el8.x86_64.rpm
b59380aae9b19e6cb3033f14ddde49fc8eeb8dfeb43de44335007032f38b1d27
libselinux-devel-2.9-5.el8.x86_64.rpm
b59380aae9b19e6cb3033f14ddde49fc8eeb8dfeb43de44335007032f38b1d27
libselinux-utils-2.9-5.el8.x86_64.rpm
c189e8ed74e46841d8feaecf76e631ed55007306daba581ee744c1e7c8b0cdc5
libselinux-utils-2.9-5.el8.x86_64.rpm
c189e8ed74e46841d8feaecf76e631ed55007306daba581ee744c1e7c8b0cdc5
libselinux-utils-2.9-5.el8.x86_64.rpm
c189e8ed74e46841d8feaecf76e631ed55007306daba581ee744c1e7c8b0cdc5
python3-libselinux-2.9-5.el8.x86_64.rpm
06cbbe35b3f11e74009097c576e6af3b56ddba22eecd388127f020431dd36476
python3-libselinux-2.9-5.el8.x86_64.rpm
06cbbe35b3f11e74009097c576e6af3b56ddba22eecd388127f020431dd36476
python3-libselinux-2.9-5.el8.x86_64.rpm
06cbbe35b3f11e74009097c576e6af3b56ddba22eecd388127f020431dd36476
RLSA-2021:1597
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c (CVE-2020-24977)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libxml2-2.9.7-9.el8.i686.rpm
ede2349cc389c7ca4f3c4a2716be013f4199dbc93949f9a18ae167ceb630b7f9
libxml2-2.9.7-9.el8.x86_64.rpm
7289defab529fab9314d0d8f401a91ef4b756de044bf3ac45568b62759d92c69
python3-libxml2-2.9.7-9.el8.x86_64.rpm
06f92a4eb3bff0db36aeb620579eaeee3c2e07dbcb4ba3e776c28994623c6768
RLSA-2021:1598
Moderate: bluez security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files.
Security Fix(es):
* bluez: double free in gatttool client disconnect callback handler in src/shared/att.c could lead to DoS or RCE (CVE-2020-27153)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
bluez-5.52-4.el8.x86_64.rpm
22be6a5c5dbb22a4a575311926294a4a5a989a1ca03a121d84e8aed6dc6b440a
bluez-hid2hci-5.52-4.el8.x86_64.rpm
08cf80388def243faed8e07e5c7e2082f634e264e6e426179c04741d7cf3a3e1
bluez-libs-5.52-4.el8.i686.rpm
52e7bd0d2e12d32ff2e64a94f8a732da8227d64f172ca3da0b720370e068f8b0
bluez-libs-5.52-4.el8.x86_64.rpm
5d8835a38ff3a2aa4435a3dfbed3abed00b6b8b53caf6cfdfdf8da17cf9edb93
bluez-obexd-5.52-4.el8.x86_64.rpm
2d9f8d36546c77254fa123b8431fe597ee22e1b8d75fe0434686749ae171b3ea
RLBA-2021:1601
json-c bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for json-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
json-c-0.13.1-0.4.el8.i686.rpm
1b3fc3ccde4d49a377965f799cab68fd4ba00b9705ceafb2e7ec17ebf8ab43b3
json-c-0.13.1-0.4.el8.x86_64.rpm
3913d735332089be90791d0cbc1c2f83ebbbd7304337189c01202d01351c2e5b
RLEA-2021:1602
python-rtslib bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-rtslib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
python3-rtslib-2.1.74-1.el8.noarch.rpm
0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3
python3-rtslib-2.1.74-1.el8.noarch.rpm
0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3
python3-rtslib-2.1.74-1.el8.noarch.rpm
0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3
python3-rtslib-2.1.74-1.el8.noarch.rpm
0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3
python3-rtslib-2.1.74-1.el8.noarch.rpm
0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3
python3-rtslib-2.1.74-1.el8.noarch.rpm
0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3
target-restore-2.1.74-1.el8.noarch.rpm
e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935
target-restore-2.1.74-1.el8.noarch.rpm
e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935
target-restore-2.1.74-1.el8.noarch.rpm
e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935
target-restore-2.1.74-1.el8.noarch.rpm
e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935
target-restore-2.1.74-1.el8.noarch.rpm
e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935
target-restore-2.1.74-1.el8.noarch.rpm
e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935
RLBA-2021:1603
zlib bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
zlib-1.2.11-17.el8.i686.rpm
343348880c094b65c8d2f791581f999487617b766f4982ff41333f0b3633454d
zlib-1.2.11-17.el8.i686.rpm
343348880c094b65c8d2f791581f999487617b766f4982ff41333f0b3633454d
zlib-1.2.11-17.el8.x86_64.rpm
fe7fda4fa84e69cb577bd9b3a8a33736c511d2dd3d526d865d30bce5abbe2fb6
zlib-1.2.11-17.el8.x86_64.rpm
fe7fda4fa84e69cb577bd9b3a8a33736c511d2dd3d526d865d30bce5abbe2fb6
zlib-devel-1.2.11-17.el8.i686.rpm
086f6912b8c0dcb0019cd36a982fc455d32eca58317d9fccb1593fd62152dd1f
zlib-devel-1.2.11-17.el8.i686.rpm
086f6912b8c0dcb0019cd36a982fc455d32eca58317d9fccb1593fd62152dd1f
zlib-devel-1.2.11-17.el8.x86_64.rpm
8677ec3280511956c7a1467246c3ed0fd9c61b708c7518ff4d2f99d79accdd8a
zlib-devel-1.2.11-17.el8.x86_64.rpm
8677ec3280511956c7a1467246c3ed0fd9c61b708c7518ff4d2f99d79accdd8a
RLEA-2021:1604
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
sos-4.0-11.el8.noarch.rpm
50b81cb4828abe89a90d67230db56a2f4c76f6d9477f8d28d235a0e5ad136869
sos-4.0-11.el8.noarch.rpm
50b81cb4828abe89a90d67230db56a2f4c76f6d9477f8d28d235a0e5ad136869
sos-audit-4.0-11.el8.noarch.rpm
b97221e0859852ec9f5f6208f3cbf3b86c5f654fa9556a41cc78801b42e82d28
sos-audit-4.0-11.el8.noarch.rpm
b97221e0859852ec9f5f6208f3cbf3b86c5f654fa9556a41cc78801b42e82d28
RLBA-2021:1605
libpwquality bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libpwquality.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libpwquality-1.4.4-3.el8.i686.rpm
ed55c803c813cebc9063c6b62efea64ebcfbad9c2944a78b73b3ae0a9075c501
libpwquality-1.4.4-3.el8.i686.rpm
ed55c803c813cebc9063c6b62efea64ebcfbad9c2944a78b73b3ae0a9075c501
libpwquality-1.4.4-3.el8.i686.rpm
ed55c803c813cebc9063c6b62efea64ebcfbad9c2944a78b73b3ae0a9075c501
libpwquality-1.4.4-3.el8.x86_64.rpm
222ffec77bfcf3ad9964362dd026a42c68be1a51f7d2c3cf28b43dc4ac45e0ca
libpwquality-1.4.4-3.el8.x86_64.rpm
222ffec77bfcf3ad9964362dd026a42c68be1a51f7d2c3cf28b43dc4ac45e0ca
libpwquality-1.4.4-3.el8.x86_64.rpm
222ffec77bfcf3ad9964362dd026a42c68be1a51f7d2c3cf28b43dc4ac45e0ca
python3-pwquality-1.4.4-3.el8.x86_64.rpm
c0dd137281dea319db2ec76f84235698d96af5c43da3249896a86bdc7f9c0f7e
python3-pwquality-1.4.4-3.el8.x86_64.rpm
c0dd137281dea319db2ec76f84235698d96af5c43da3249896a86bdc7f9c0f7e
python3-pwquality-1.4.4-3.el8.x86_64.rpm
c0dd137281dea319db2ec76f84235698d96af5c43da3249896a86bdc7f9c0f7e
RLBA-2021:1606
rpm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
python3-rpm-4.14.3-13.el8.x86_64.rpm
f197d50eeee9922088224d1e53e819b6012bcc27ceff65069dd0287efbfe5f57
rpm-4.14.3-13.el8.x86_64.rpm
2181382cd8c110ea09ba8801b38d1ea5838e84fb67b8ace8c2f39a071f9093c5
rpm-apidocs-4.14.3-13.el8.noarch.rpm
64c105f5034af1c57246c11b2cc3c8041e4f4a0b9094f327def414a6aa47c4a6
rpm-apidocs-4.14.3-13.el8.noarch.rpm
64c105f5034af1c57246c11b2cc3c8041e4f4a0b9094f327def414a6aa47c4a6
rpm-build-libs-4.14.3-13.el8.i686.rpm
cada0fc9b2a796f0fb1410397c326c4db1e359272825a002e6eaa4f4ad71b4f4
rpm-build-libs-4.14.3-13.el8.x86_64.rpm
5fbc2f4fa85e3f1d680cb809333c0ac203a27e99f8ca32d78060bc2c7ebf98b8
rpm-cron-4.14.3-13.el8.noarch.rpm
fb8f2a0189a3c8aea8bd39af62c9bd2f753b939314a19fd934327d02dc0a8f63
rpm-cron-4.14.3-13.el8.noarch.rpm
fb8f2a0189a3c8aea8bd39af62c9bd2f753b939314a19fd934327d02dc0a8f63
rpm-devel-4.14.3-13.el8.i686.rpm
a229cd1abc9c717d1b6e1b269a46ffeea9998a36ed180b32a7e0b33f67f7497a
rpm-devel-4.14.3-13.el8.x86_64.rpm
007b3d2c80ac0b74f281dec39082fb92def42364a20d9e6a86172af5c2baa884
rpm-libs-4.14.3-13.el8.i686.rpm
48f64734197f18a1360c22f84abdd3f37a53601b42c0d6070f9c94fe06efcc5c
rpm-libs-4.14.3-13.el8.x86_64.rpm
e34641b636a19d30f59f83b5ed11997adf9c87579b257ed4f8f9d36cc5737e2d
rpm-plugin-ima-4.14.3-13.el8.x86_64.rpm
a97e3d32d54997673a3d79553cb589cd417d7ce1bdbd53cbe14b630405bd7416
rpm-plugin-prioreset-4.14.3-13.el8.x86_64.rpm
484c012818f6fac1a5aea2f0f68c734819653b4d62d54fb960a01714ee79ebe2
rpm-plugin-selinux-4.14.3-13.el8.x86_64.rpm
2c4a1e0c08fb678aba344841ed01beaaeccc67df1df88f15533a894c2282c28f
rpm-plugin-syslog-4.14.3-13.el8.x86_64.rpm
40c283491de03a65d12d4e7c5381d05eb9fea3c4ff52b91c815fa4ad17b6e104
rpm-plugin-systemd-inhibit-4.14.3-13.el8.x86_64.rpm
d174a16c23a2cc1e8d47a18b2b584fbd248782d0546ad1a579a88cefa245d427
rpm-sign-4.14.3-13.el8.x86_64.rpm
cd2eb2e2545d6748d21a565fb390a076253efa44b552de75f00a5a13ea41a06e
RLBA-2021:1607
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
kexec-tools-2.0.20-46.el8.x86_64.rpm
1a0891a42fbc12ff72541d11a6c544171b3b030efafee7690faaeca41f9ccc6a
RLSA-2021:1608
Moderate: python-cryptography security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-cryptography.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers.
The following packages have been upgraded to a later upstream version: python-cryptography (3.2.1). (BZ#1873581, BZ#1891947)
Security Fix(es):
* python-cryptography: bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25659)
* python-cryptography: certain sequences of update() calls when symmetrically encrypting very large payloads could result in an integer overflow and lead to buffer overflows (CVE-2020-36242)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
python3-cryptography-3.2.1-4.el8.x86_64.rpm
288ea3ecc1a93418831842adbaa1793ce7d603eac14dfb81ef69f20e63769419
RLSA-2021:1610
Moderate: curl security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: FTP PASV command response can cause curl to connect to arbitrary host (CVE-2020-8284)
* curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used (CVE-2020-8285)
* curl: Inferior OCSP verification (CVE-2020-8286)
* curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set (CVE-2020-8231)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
curl-7.61.1-18.el8.x86_64.rpm
2f0d7d05495c361695bee70b14d76a34b385508e631990ff2a4edf64155c2440
libcurl-7.61.1-18.el8.i686.rpm
0d58c55b403d03f00c3dcd966ffb6bdd027ee631beaec519e020c3a7ab321e5f
libcurl-7.61.1-18.el8.x86_64.rpm
dd059bc5089cb86c89898768698a9b3d57ef8523c07098498fd5943b13ceef5f
libcurl-devel-7.61.1-18.el8.i686.rpm
391eba9a04b597b0368dfdbb586b66a59ff0b6316c0946febb06b0146fd4b13c
libcurl-devel-7.61.1-18.el8.x86_64.rpm
57572856c1bc1e36062f28c25149e3befc6c6fd2dd3abcad734c2333ef6038e3
libcurl-minimal-7.61.1-18.el8.i686.rpm
4280f415c19dbb0becd0f7e20db9b5bdc472ce7fa0d5f2eeb550470182ddc48c
libcurl-minimal-7.61.1-18.el8.x86_64.rpm
3edefc7234d8ff24277cf6825c5eb196dea2b0e5a1a2a68055cb515756a477dc
RLSA-2021:1611
Moderate: systemd security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any" (CVE-2019-3842)
* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
systemd-239-45.el8.i686.rpm
58cb83a07d6daf4800dd125fe53074af8c9e14e9f6a12233bba75fcf58a5b06a
systemd-239-45.el8.x86_64.rpm
ac861518100b1fb76e766ed9bcf1be5aeef269c74b539d259e5efbe0035bea54
systemd-container-239-45.el8.i686.rpm
3d7950c65a913dae519645c751cc84dbf1570fc4c191809f2775e8efb53e16bf
systemd-container-239-45.el8.x86_64.rpm
4c9eba3631f1d794b9742867cf4a01f59d131fee2a7ff4011d09f02cdf1b9f2a
systemd-devel-239-45.el8.i686.rpm
2210e17274deaf31f45e243441691160212a5bcd6f5d497e51e5039c05d449e2
systemd-devel-239-45.el8.x86_64.rpm
3eb9940d658e583a3168f1d533b05c70fe74485c6cafe7697148e2224b537d9b
systemd-journal-remote-239-45.el8.x86_64.rpm
29cdef0c48f04999ae649cde664221f8789bd1a9603464b22922271a8af56fb8
systemd-libs-239-45.el8.i686.rpm
4c09f5f1361c2db2241d02a9b97b498df869acbd5a2d1cd658bb34e2a15685a6
systemd-libs-239-45.el8.x86_64.rpm
393cfd58bfe7c297b5dbc5ddfdb7cec930e8304c7c63f636210c6c151ddf99c5
systemd-pam-239-45.el8.x86_64.rpm
3cd17e25893ce39ea8b0d3a5e590cbc829f9f65747bae5e60deb43e00d88629c
systemd-tests-239-45.el8.x86_64.rpm
37845b8058add59b85838d7aaefcfe90e0926c8a649f8a1665d3f608986babb4
systemd-udev-239-45.el8.x86_64.rpm
7c515c80e7bd4d4707b58cc6370fb063c2350ce0a9cab38fe26efc99ce23bf4c
RLEA-2021:1614
fcoe-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fcoe-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
fcoe-utils-1.0.33-3.git848bcc6.el8.x86_64.rpm
7dc07bcb0eeb3cea68d0f711102abb163a3b5e82bb58b6796e25a99ee05ab5a5
RLBA-2021:1616
elfutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
elfutils-0.182-3.el8.x86_64.rpm
1d5f134e5f8f5d5cfe9437791059ba585e0fdc59b75ba97369e48ed1f564982c
elfutils-debuginfod-0.182-3.el8.x86_64.rpm
fe1631791ce9b9284b0283edcff961912a497e2c8c79212fb37c2c26725dfe16
elfutils-debuginfod-client-0.182-3.el8.i686.rpm
4f41a96ff332628e9c28631c05db6002c88c67b1b1be59a55bc0c455f403d2d1
elfutils-debuginfod-client-0.182-3.el8.x86_64.rpm
3fab3c78b2da904f591cc2a179bb75d4e8c88c0d2a00ba9e980988fbc5c0f8f7
elfutils-debuginfod-client-devel-0.182-3.el8.i686.rpm
d8b01747b891f7d7cd1ac7c99d497747e798608106c3008d7c3cb92b63f84525
elfutils-debuginfod-client-devel-0.182-3.el8.x86_64.rpm
1df6a59f88bb8918ec9fc9f5870b5768d54e36cc47bfa8686d49f2302c25d8ae
elfutils-default-yama-scope-0.182-3.el8.noarch.rpm
0e0af0afb8b48ba11ff99c84b0d9d0f275aade4aa5804e3acee86214efe83bb8
elfutils-default-yama-scope-0.182-3.el8.noarch.rpm
0e0af0afb8b48ba11ff99c84b0d9d0f275aade4aa5804e3acee86214efe83bb8
elfutils-devel-0.182-3.el8.i686.rpm
0f6f03a1a3094bc92ec81470abccdba0ef01e5d21147a9a3ccb6d0190be78ee4
elfutils-devel-0.182-3.el8.x86_64.rpm
05d0479cdc02a7e7cb3c88c5658f6c261c41794f9b57c87afc980f5765e372b0
elfutils-libelf-0.182-3.el8.i686.rpm
797665e3511a1cd21f276941afe42011d8cff5470e316853ad58642bba02fef5
elfutils-libelf-0.182-3.el8.x86_64.rpm
2d132868a1f4bb20a1ccdcd2a92547547a41b441a3b3da97ce7dc1ace01b0733
elfutils-libelf-devel-0.182-3.el8.i686.rpm
c34557329c3b2e2f4afbf9f8655002ec77d22a5683a86c47edde5178c85a5293
elfutils-libelf-devel-0.182-3.el8.x86_64.rpm
066ad2c9094632636a8715dba0e8e883db9530534dfdce263cb204e1c58b24d8
elfutils-libs-0.182-3.el8.i686.rpm
9c845258e590eacd17058ce6790681c9b1de736f00a689c584a1e568051daea8
elfutils-libs-0.182-3.el8.x86_64.rpm
65de4643a47d19ce59cef6c8547683b12c10e81c689b129e28841a5623cadd35
RLEA-2021:1618
iscsi-initiator-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
iscsi-initiator-utils-6.2.1.2-1.gita8fcb37.el8.i686.rpm
257c819435a3932f3f01dbd9ac03741424bbaa6318849485769ec8f2e1e90d4e
iscsi-initiator-utils-6.2.1.2-1.gita8fcb37.el8.x86_64.rpm
18d595320601874e4106ba2fbaeb97de6c07fd74af62c195e81f707b89a94608
iscsi-initiator-utils-iscsiuio-6.2.1.2-1.gita8fcb37.el8.x86_64.rpm
ec71fff7f26dfbac0bc21eb21dcb9a4461a4b694f6467e68e3e596359a94afd5
python3-iscsi-initiator-utils-6.2.1.2-1.gita8fcb37.el8.x86_64.rpm
2058a06b731945ef74883a6bfa4fac72bbe1a7b1073d509696b4cadc208c9b58
RLSA-2021:1620
Important: linux-firmware security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
iwl1000-firmware-39.31.5.1-102.el8.1.noarch.rpm
a687384046a8ec8acb5b1dcbb5dd743f5cf74a58d438525a3f3eb4e85a4de4ff
iwl1000-firmware-39.31.5.1-102.el8.1.noarch.rpm
a687384046a8ec8acb5b1dcbb5dd743f5cf74a58d438525a3f3eb4e85a4de4ff
iwl100-firmware-39.31.5.1-102.el8.1.noarch.rpm
16ff9a63f70fadb2b3fa287b4fc1dc479b2f8cc3e60a1a58ed84903b3bbae4ad
iwl100-firmware-39.31.5.1-102.el8.1.noarch.rpm
16ff9a63f70fadb2b3fa287b4fc1dc479b2f8cc3e60a1a58ed84903b3bbae4ad
iwl105-firmware-18.168.6.1-102.el8.1.noarch.rpm
1d40ec5332d8d121a473ca8785813a34a613ff953c70d1da22ad14d5cece8a7e
iwl105-firmware-18.168.6.1-102.el8.1.noarch.rpm
1d40ec5332d8d121a473ca8785813a34a613ff953c70d1da22ad14d5cece8a7e
iwl135-firmware-18.168.6.1-102.el8.1.noarch.rpm
4ead9d7c935e53f7279d76cb973b2107dc06485b7ebe6c545c95c4636655b5ce
iwl135-firmware-18.168.6.1-102.el8.1.noarch.rpm
4ead9d7c935e53f7279d76cb973b2107dc06485b7ebe6c545c95c4636655b5ce
iwl2000-firmware-18.168.6.1-102.el8.1.noarch.rpm
6f07648ccf3baaa296261add371ff663df9b29a847e905b1addc06b9d10bd81a
iwl2000-firmware-18.168.6.1-102.el8.1.noarch.rpm
6f07648ccf3baaa296261add371ff663df9b29a847e905b1addc06b9d10bd81a
iwl2030-firmware-18.168.6.1-102.el8.1.noarch.rpm
1dd7bbef2189d6201accc58618103e217bc9417dad0cb8d6858f484bae951d56
iwl2030-firmware-18.168.6.1-102.el8.1.noarch.rpm
1dd7bbef2189d6201accc58618103e217bc9417dad0cb8d6858f484bae951d56
iwl3160-firmware-25.30.13.0-102.el8.1.noarch.rpm
4b61a97e6ac1b5f9cef070b4252f1419d02ab5529026736fdd6f9f59d47f4415
iwl3160-firmware-25.30.13.0-102.el8.1.noarch.rpm
4b61a97e6ac1b5f9cef070b4252f1419d02ab5529026736fdd6f9f59d47f4415
iwl3945-firmware-15.32.2.9-102.el8.1.noarch.rpm
1b157a5308f55c0959f7a4bbcb3fb0444b435f6c8275d9ab32eb521b92ef3cf0
iwl3945-firmware-15.32.2.9-102.el8.1.noarch.rpm
1b157a5308f55c0959f7a4bbcb3fb0444b435f6c8275d9ab32eb521b92ef3cf0
iwl4965-firmware-228.61.2.24-102.el8.1.noarch.rpm
4f269b72ea6b08d88d78d447c48288c7ecca28367e66244025da09469a57bd86
iwl4965-firmware-228.61.2.24-102.el8.1.noarch.rpm
4f269b72ea6b08d88d78d447c48288c7ecca28367e66244025da09469a57bd86
iwl5000-firmware-8.83.5.1_1-102.el8.1.noarch.rpm
b9c992cde879737babbcd6cc741f4401e54bd4108027bebdaf2c10401dbc096d
iwl5000-firmware-8.83.5.1_1-102.el8.1.noarch.rpm
b9c992cde879737babbcd6cc741f4401e54bd4108027bebdaf2c10401dbc096d
iwl5150-firmware-8.24.2.2-102.el8.1.noarch.rpm
1d695dcca2c0332d60860d63f36d0352dae41cc0eb83ca8e175b76e1aacc0095
iwl5150-firmware-8.24.2.2-102.el8.1.noarch.rpm
1d695dcca2c0332d60860d63f36d0352dae41cc0eb83ca8e175b76e1aacc0095
iwl6000-firmware-9.221.4.1-102.el8.1.noarch.rpm
a249728056ca58a9c4a4eb4bf9bcbe733d0c24b195c3614e7604707d675d5664
iwl6000-firmware-9.221.4.1-102.el8.1.noarch.rpm
a249728056ca58a9c4a4eb4bf9bcbe733d0c24b195c3614e7604707d675d5664
iwl6000g2a-firmware-18.168.6.1-102.el8.1.noarch.rpm
ca5cdfe8311c935aaf8ce3d654481135a026be89883f2d8d3be0a90e5a98ce74
iwl6000g2a-firmware-18.168.6.1-102.el8.1.noarch.rpm
ca5cdfe8311c935aaf8ce3d654481135a026be89883f2d8d3be0a90e5a98ce74
iwl6000g2b-firmware-18.168.6.1-102.el8.1.noarch.rpm
d2488a5fb95764b7c25425fb058367aa8752c883bd26a873bd2f7c8da475f997
iwl6000g2b-firmware-18.168.6.1-102.el8.1.noarch.rpm
d2488a5fb95764b7c25425fb058367aa8752c883bd26a873bd2f7c8da475f997
iwl6050-firmware-41.28.5.1-102.el8.1.noarch.rpm
953a958fbf61a1a6bff2102cedef05b5a0d11afd6671d020d6c4994ee12af846
iwl6050-firmware-41.28.5.1-102.el8.1.noarch.rpm
953a958fbf61a1a6bff2102cedef05b5a0d11afd6671d020d6c4994ee12af846
iwl7260-firmware-25.30.13.0-102.el8.1.noarch.rpm
40a72af5eb90efaeb78bbaf3048681ca2627fb9d170d17dc068705b689360302
iwl7260-firmware-25.30.13.0-102.el8.1.noarch.rpm
40a72af5eb90efaeb78bbaf3048681ca2627fb9d170d17dc068705b689360302
libertas-sd8686-firmware-20201218-102.git05789708.el8.noarch.rpm
5f2473e02993326bb1468d5cac746a0763750865e567b8d76d169a75e56fe05f
libertas-sd8686-firmware-20201218-102.git05789708.el8.noarch.rpm
5f2473e02993326bb1468d5cac746a0763750865e567b8d76d169a75e56fe05f
libertas-sd8787-firmware-20201218-102.git05789708.el8.noarch.rpm
8e5d42d37dd3b9f4a384e9a4fefd6b75a2f4a5712ae120ce6cc03b9feee75a8f
libertas-sd8787-firmware-20201218-102.git05789708.el8.noarch.rpm
8e5d42d37dd3b9f4a384e9a4fefd6b75a2f4a5712ae120ce6cc03b9feee75a8f
libertas-usb8388-firmware-20201218-102.git05789708.el8.noarch.rpm
54c5f9af5f51ed65460623e6122038509bf33a97d3e3811a1af931dbbed7e87c
libertas-usb8388-firmware-20201218-102.git05789708.el8.noarch.rpm
54c5f9af5f51ed65460623e6122038509bf33a97d3e3811a1af931dbbed7e87c
libertas-usb8388-olpc-firmware-20201218-102.git05789708.el8.noarch.rpm
1074e2c3e9dc36bd554614fa48cf052f1036be58eab68c4e01f4f43f4a1a29a0
libertas-usb8388-olpc-firmware-20201218-102.git05789708.el8.noarch.rpm
1074e2c3e9dc36bd554614fa48cf052f1036be58eab68c4e01f4f43f4a1a29a0
linux-firmware-20201218-102.git05789708.el8.noarch.rpm
e46da9352cd969c9222e30c690fd37ee3138354ef5ce7bf6f483c156d786d8dc
linux-firmware-20201218-102.git05789708.el8.noarch.rpm
e46da9352cd969c9222e30c690fd37ee3138354ef5ce7bf6f483c156d786d8dc
RLBA-2021:1621
autofs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
autofs-5.1.4-48.el8.x86_64.rpm
791325ccdee2a4de1047c3435ce4a4c03972a58ce27cff6db02dee33542697d2
RLBA-2021:1622
rsync bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
rsync-3.1.3-12.el8.x86_64.rpm
41db89d286a57e05686a5ec76a30aaa4339f8e370cf62f38f66ad584cad33d6b
rsync-3.1.3-12.el8.x86_64.rpm
41db89d286a57e05686a5ec76a30aaa4339f8e370cf62f38f66ad584cad33d6b
rsync-daemon-3.1.3-12.el8.noarch.rpm
72fa6893461b748c1f2254e2aa36efa54f5b2875817149ab7145a6854d347e8a
rsync-daemon-3.1.3-12.el8.noarch.rpm
72fa6893461b748c1f2254e2aa36efa54f5b2875817149ab7145a6854d347e8a
rsync-daemon-3.1.3-12.el8.noarch.rpm
72fa6893461b748c1f2254e2aa36efa54f5b2875817149ab7145a6854d347e8a
rsync-daemon-3.1.3-12.el8.noarch.rpm
72fa6893461b748c1f2254e2aa36efa54f5b2875817149ab7145a6854d347e8a
RLBA-2021:1624
initscripts bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for initscripts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
initscripts-10.00.15-1.el8.x86_64.rpm
e52e7ab267c7d79faf2a21155cb045647acf824da72e95678d9d57f7cee4d547
initscripts-10.00.15-1.el8.x86_64.rpm
e52e7ab267c7d79faf2a21155cb045647acf824da72e95678d9d57f7cee4d547
netconsole-service-10.00.15-1.el8.noarch.rpm
489cffbda2392eb077943af2e2365af795a787dd6bffae38f5ad5116d0f81fa8
netconsole-service-10.00.15-1.el8.noarch.rpm
489cffbda2392eb077943af2e2365af795a787dd6bffae38f5ad5116d0f81fa8
netconsole-service-10.00.15-1.el8.noarch.rpm
489cffbda2392eb077943af2e2365af795a787dd6bffae38f5ad5116d0f81fa8
netconsole-service-10.00.15-1.el8.noarch.rpm
489cffbda2392eb077943af2e2365af795a787dd6bffae38f5ad5116d0f81fa8
network-scripts-10.00.15-1.el8.x86_64.rpm
22f4daa2633701ee7208f1bbd3e0b66d7432892fecd87b90e7adb54081fed83d
network-scripts-10.00.15-1.el8.x86_64.rpm
22f4daa2633701ee7208f1bbd3e0b66d7432892fecd87b90e7adb54081fed83d
readonly-root-10.00.15-1.el8.noarch.rpm
4ceb96fe80aa878cb6c1cc4d5551aa6659a94c30337656339af059555150e7bd
readonly-root-10.00.15-1.el8.noarch.rpm
4ceb96fe80aa878cb6c1cc4d5551aa6659a94c30337656339af059555150e7bd
readonly-root-10.00.15-1.el8.noarch.rpm
4ceb96fe80aa878cb6c1cc4d5551aa6659a94c30337656339af059555150e7bd
readonly-root-10.00.15-1.el8.noarch.rpm
4ceb96fe80aa878cb6c1cc4d5551aa6659a94c30337656339af059555150e7bd
RLBA-2021:1625
hdparm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hdparm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
hdparm-9.54-3.el8.x86_64.rpm
aa8ea0c91ae55e8b26cd36182bca5da0535d36cb0462670fcd525110d0401b46
RLBA-2021:1626
procps-ng bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for procps-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
procps-ng-3.3.15-6.el8.i686.rpm
b441e3c7540440de5cc5fb4115f221029de3d6fca26d8b2d9ecd9e15024a5cec
procps-ng-3.3.15-6.el8.i686.rpm
b441e3c7540440de5cc5fb4115f221029de3d6fca26d8b2d9ecd9e15024a5cec
procps-ng-3.3.15-6.el8.i686.rpm
b441e3c7540440de5cc5fb4115f221029de3d6fca26d8b2d9ecd9e15024a5cec
procps-ng-3.3.15-6.el8.x86_64.rpm
a57c6fe29ff3fbce4f415d2afd0e1e9a3c61e2bef4aadb192453a5dd5a4e15ec
procps-ng-3.3.15-6.el8.x86_64.rpm
a57c6fe29ff3fbce4f415d2afd0e1e9a3c61e2bef4aadb192453a5dd5a4e15ec
procps-ng-3.3.15-6.el8.x86_64.rpm
a57c6fe29ff3fbce4f415d2afd0e1e9a3c61e2bef4aadb192453a5dd5a4e15ec
procps-ng-i18n-3.3.15-6.el8.noarch.rpm
7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df
procps-ng-i18n-3.3.15-6.el8.noarch.rpm
7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df
procps-ng-i18n-3.3.15-6.el8.noarch.rpm
7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df
procps-ng-i18n-3.3.15-6.el8.noarch.rpm
7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df
procps-ng-i18n-3.3.15-6.el8.noarch.rpm
7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df
procps-ng-i18n-3.3.15-6.el8.noarch.rpm
7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df
RLBA-2021:1629
libstoragemgmt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libstoragemgmt-1.8.7-1.el8.i686.rpm
23e335a5999521e4c27bb832214cf85909ea3b764dc1ab6b335f547593089e4b
libstoragemgmt-1.8.7-1.el8.x86_64.rpm
170b46d2e7f6b53f3225c157231c931374a39528e131be7730df4a58e5b95b36
libstoragemgmt-arcconf-plugin-1.8.7-1.el8.noarch.rpm
a87e9d205088b7533bcab8c498152558253d9c51582850480d4db9c977dc3d42
libstoragemgmt-arcconf-plugin-1.8.7-1.el8.noarch.rpm
a87e9d205088b7533bcab8c498152558253d9c51582850480d4db9c977dc3d42
libstoragemgmt-hpsa-plugin-1.8.7-1.el8.noarch.rpm
b24397f5b32d5284b06e4591ff53373629130cfd230e1443cb9c03ca504f25a6
libstoragemgmt-hpsa-plugin-1.8.7-1.el8.noarch.rpm
b24397f5b32d5284b06e4591ff53373629130cfd230e1443cb9c03ca504f25a6
libstoragemgmt-local-plugin-1.8.7-1.el8.noarch.rpm
08f860086211e7cca983f11602ee63595424a5063b9e8d7cb6aeae76c685cdaf
libstoragemgmt-local-plugin-1.8.7-1.el8.noarch.rpm
08f860086211e7cca983f11602ee63595424a5063b9e8d7cb6aeae76c685cdaf
libstoragemgmt-megaraid-plugin-1.8.7-1.el8.noarch.rpm
86841dbd69babaf9debc5fe88a0163cefc1e7405329112015b34065bac5b1e6c
libstoragemgmt-megaraid-plugin-1.8.7-1.el8.noarch.rpm
86841dbd69babaf9debc5fe88a0163cefc1e7405329112015b34065bac5b1e6c
libstoragemgmt-nfs-plugin-1.8.7-1.el8.noarch.rpm
5f8ee65b50ca7fd1d1ec88a4f786821b7fe17787e6e17775e50c5ffac0cf0e63
libstoragemgmt-nfs-plugin-1.8.7-1.el8.noarch.rpm
5f8ee65b50ca7fd1d1ec88a4f786821b7fe17787e6e17775e50c5ffac0cf0e63
libstoragemgmt-nfs-plugin-clibs-1.8.7-1.el8.x86_64.rpm
2b638ee9366cb484db77618b9416c3ec7970442c4d73ff8c4286ad59fdf5f05b
libstoragemgmt-nstor-plugin-1.8.7-1.el8.noarch.rpm
289e91787020726e8892f4dcb5ce134f60234c7c2af2f14792bf790f4427dc6b
libstoragemgmt-nstor-plugin-1.8.7-1.el8.noarch.rpm
289e91787020726e8892f4dcb5ce134f60234c7c2af2f14792bf790f4427dc6b
libstoragemgmt-smis-plugin-1.8.7-1.el8.noarch.rpm
e4f48caee83624c9172e53c7e78e589558d6405598b3711f61aa7f05c6f68758
libstoragemgmt-smis-plugin-1.8.7-1.el8.noarch.rpm
e4f48caee83624c9172e53c7e78e589558d6405598b3711f61aa7f05c6f68758
libstoragemgmt-udev-1.8.7-1.el8.x86_64.rpm
bafc41705585ded069b199f61ccb7228177a4e312400388bb31b0ed5a5ba1fbb
python3-libstoragemgmt-1.8.7-1.el8.noarch.rpm
73eba5a917d5542971b9ea9dd9236e4f5b21f54447d81cafe1f96569a66c79ae
python3-libstoragemgmt-1.8.7-1.el8.noarch.rpm
73eba5a917d5542971b9ea9dd9236e4f5b21f54447d81cafe1f96569a66c79ae
python3-libstoragemgmt-clibs-1.8.7-1.el8.x86_64.rpm
b9f29a5c5a2418b2908f0d2953ff6c5b1aeb1eb93a8c72f3d3ca667e088cf581
RLEA-2021:1632
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
tzdata-2021a-1.el8.noarch.rpm
07c126ccfa4d384599054daa90c94d59d63fe455d4c0379f1219dfbeb151d09d
tzdata-2021a-1.el8.noarch.rpm
07c126ccfa4d384599054daa90c94d59d63fe455d4c0379f1219dfbeb151d09d
RLBA-2021:1634
lsscsi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lsscsi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
lsscsi-0.32-2.el8.x86_64.rpm
f246dd2654e7f2ccd92bb0c1175dd615b2a1245e6a3354b57775fecb13b227ea
RLBA-2021:1635
realmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for realmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
realmd-0.16.3-22.el8.x86_64.rpm
b257733893c1caee4a64f7b226764e51c3e6aa654e227eecc87a884a5869ae50
RLEA-2021:1636
alsa-sof-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
alsa-sof-firmware-1.6.1-2.el8.noarch.rpm
768a6f6a35663ef961d1fc1923f52f9b36b552ae12289d8f47bd923149e051db
alsa-sof-firmware-debug-1.6.1-2.el8.noarch.rpm
70f33ae2acbb186460cd3cad012e1acd0b8b141fc779e297126771acafe400a2
RLBA-2021:1637
net-snmp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
net-snmp-libs-5.8-20.el8.i686.rpm
535d578a7f6ed93397c0d74516f99ce13f911c400ad902e28cac5ad83cf3372f
net-snmp-libs-5.8-20.el8.x86_64.rpm
06413369797525985129637b1e7fa5c850f01e3154bfe2af231dbf98a2dac216
RLBA-2021:1638
adcli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
adcli-0.8.2-9.el8.x86_64.rpm
babf3da6b1f6c84b23477458bf44ad3a43ba3c929dc9faeae1a4a428244c4fbf
adcli-doc-0.8.2-9.el8.noarch.rpm
47546286f27072d7ac55177f60207bbae63d0cd40332bb8897a91cd150b6378a
adcli-doc-0.8.2-9.el8.noarch.rpm
47546286f27072d7ac55177f60207bbae63d0cd40332bb8897a91cd150b6378a
RLBA-2021:1639
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
selinux-policy-3.14.3-67.el8.noarch.rpm
3664c14d3374eb006166d79bf5ca69ee915949541836b2e17af21db853fe397d
selinux-policy-3.14.3-67.el8.noarch.rpm
3664c14d3374eb006166d79bf5ca69ee915949541836b2e17af21db853fe397d
selinux-policy-devel-3.14.3-67.el8.noarch.rpm
efc6cd4bf08c1b055d987eda24d82d707d1a6655716c68514c51990a6f3d0f83
selinux-policy-devel-3.14.3-67.el8.noarch.rpm
efc6cd4bf08c1b055d987eda24d82d707d1a6655716c68514c51990a6f3d0f83
selinux-policy-doc-3.14.3-67.el8.noarch.rpm
a9c2a84572385eb95715bb1ff0682574456b1c80352acc510bd0dd00531445cb
selinux-policy-doc-3.14.3-67.el8.noarch.rpm
a9c2a84572385eb95715bb1ff0682574456b1c80352acc510bd0dd00531445cb
selinux-policy-minimum-3.14.3-67.el8.noarch.rpm
d5759abbcea0806ccca7e66e60f3696e547f8ea3b33a000455d364a3ff2d5114
selinux-policy-minimum-3.14.3-67.el8.noarch.rpm
d5759abbcea0806ccca7e66e60f3696e547f8ea3b33a000455d364a3ff2d5114
selinux-policy-mls-3.14.3-67.el8.noarch.rpm
352e622d1c449cae75530122218104e46dfc555b20a8332bea67e09b1a44e6f0
selinux-policy-mls-3.14.3-67.el8.noarch.rpm
352e622d1c449cae75530122218104e46dfc555b20a8332bea67e09b1a44e6f0
selinux-policy-sandbox-3.14.3-67.el8.noarch.rpm
8168c284e060e15d22f5861a0685e94ee0ff3ac046d9c6933e99e45923989907
selinux-policy-sandbox-3.14.3-67.el8.noarch.rpm
8168c284e060e15d22f5861a0685e94ee0ff3ac046d9c6933e99e45923989907
selinux-policy-targeted-3.14.3-67.el8.noarch.rpm
0b1a5419af7294468174ddc006b2aa9a704c3a076b3b199cee956355c01b53d4
selinux-policy-targeted-3.14.3-67.el8.noarch.rpm
0b1a5419af7294468174ddc006b2aa9a704c3a076b3b199cee956355c01b53d4
RLBA-2021:1640
syslinux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for syslinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
syslinux-6.04-5.el8.x86_64.rpm
1902ceed87edcbe1149676c3203fbb29bf613376d333b50919ce0661f7d80510
syslinux-6.04-5.el8.x86_64.rpm
1902ceed87edcbe1149676c3203fbb29bf613376d333b50919ce0661f7d80510
syslinux-6.04-5.el8.x86_64.rpm
1902ceed87edcbe1149676c3203fbb29bf613376d333b50919ce0661f7d80510
syslinux-extlinux-6.04-5.el8.x86_64.rpm
a8fc816a12caf6ead326bb535497ef0e48f316c9ffaf33b391b36731d083c332
syslinux-extlinux-6.04-5.el8.x86_64.rpm
a8fc816a12caf6ead326bb535497ef0e48f316c9ffaf33b391b36731d083c332
syslinux-extlinux-6.04-5.el8.x86_64.rpm
a8fc816a12caf6ead326bb535497ef0e48f316c9ffaf33b391b36731d083c332
syslinux-extlinux-nonlinux-6.04-5.el8.noarch.rpm
446264c852b00b3e2c40df91ba9c6d584aa92b9aeb366b93bab41e122dd41065
syslinux-extlinux-nonlinux-6.04-5.el8.noarch.rpm
446264c852b00b3e2c40df91ba9c6d584aa92b9aeb366b93bab41e122dd41065
syslinux-extlinux-nonlinux-6.04-5.el8.noarch.rpm
446264c852b00b3e2c40df91ba9c6d584aa92b9aeb366b93bab41e122dd41065
syslinux-nonlinux-6.04-5.el8.noarch.rpm
3f522e1a6fd44aad34f435fbedf1a51b31857e7bd457dd96dce4fc1c777bcf3e
syslinux-nonlinux-6.04-5.el8.noarch.rpm
3f522e1a6fd44aad34f435fbedf1a51b31857e7bd457dd96dce4fc1c777bcf3e
syslinux-nonlinux-6.04-5.el8.noarch.rpm
3f522e1a6fd44aad34f435fbedf1a51b31857e7bd457dd96dce4fc1c777bcf3e
syslinux-tftpboot-6.04-5.el8.noarch.rpm
66a9f1bff632696cf2524b6739bbbc586f9f09881b7491e110f93aa2551c0800
syslinux-tftpboot-6.04-5.el8.noarch.rpm
66a9f1bff632696cf2524b6739bbbc586f9f09881b7491e110f93aa2551c0800
syslinux-tftpboot-6.04-5.el8.noarch.rpm
66a9f1bff632696cf2524b6739bbbc586f9f09881b7491e110f93aa2551c0800
RLBA-2021:1641
gfs2-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gfs2-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
gfs2-utils-3.2.0-10.el8.x86_64.rpm
4849afc39069c48e7b1dbaaec92d75e4ef5f13dea7973273c17bcc7a929e97c9
RLBA-2021:1642
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
iptables-1.8.4-17.el8.i686.rpm
c68ebd6fb9137082df51547f815cd1e69192e1067f33bba90156c256866c4d42
iptables-1.8.4-17.el8.x86_64.rpm
2410a4312904f46eefdbd7636806a5b649d4c23ae55ae29ee3a2ecc7c2db86ae
iptables-arptables-1.8.4-17.el8.x86_64.rpm
5f9e78658921d27f97ff76713bd9ff04ebc2c77f94344be5cede3f833856651e
iptables-devel-1.8.4-17.el8.i686.rpm
6677c2ecd876fcc72c94286114a7ce2d43daec014d627e0faa3e6509e4191c6a
iptables-devel-1.8.4-17.el8.x86_64.rpm
a4a8bd952d097e4d189ae443f4d2891c395eb667985411b6eaee93a26c8c30ea
iptables-ebtables-1.8.4-17.el8.x86_64.rpm
e49dec058b9323c0a74312e50cb6e4feef19465afab5d2a977c0c39d8ff47088
iptables-libs-1.8.4-17.el8.i686.rpm
4bec449adebbc17736702020e9c29aca936c4ce688cc14c278bd315c9b78b277
iptables-libs-1.8.4-17.el8.x86_64.rpm
219cc423905fb9a2b46c217bb27461c91447b3481bf7adc3b7f2a33c25db481e
iptables-services-1.8.4-17.el8.x86_64.rpm
149de1fd7d6c51b816c930cbd393996883dd18dd88f3f5fb30d5f1f036c0e691
iptables-utils-1.8.4-17.el8.x86_64.rpm
e15bb3aa779cee7f8e3049edf8977ccb2e2bbcd9d61fe7bc8285eaf6ab440694
RLBA-2021:1643
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
firewalld-0.8.2-6.el8.noarch.rpm
9b08ed61af2453f1f329b78664d2644d96225ed215b0654e1badb5bf7a7e8180
firewalld-0.8.2-6.el8.noarch.rpm
9b08ed61af2453f1f329b78664d2644d96225ed215b0654e1badb5bf7a7e8180
firewalld-filesystem-0.8.2-6.el8.noarch.rpm
1f8fa731840ad5d427e3c7e6904f9ca69880127868ecff9f422e3d8010bd803a
firewalld-filesystem-0.8.2-6.el8.noarch.rpm
1f8fa731840ad5d427e3c7e6904f9ca69880127868ecff9f422e3d8010bd803a
python3-firewall-0.8.2-6.el8.noarch.rpm
027ddb435d359e7f21424e87fdb49c62b4fb0f4582982f12fde4e185fbf3c3f7
python3-firewall-0.8.2-6.el8.noarch.rpm
027ddb435d359e7f21424e87fdb49c62b4fb0f4582982f12fde4e185fbf3c3f7
RLSA-2021:1647
Moderate: samba security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for samba, openchange.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
The following packages have been upgraded to a later upstream version: samba (4.13.3). (BZ#1878109)
Security Fix(es):
* samba: Netlogon elevation of privilege vulnerability (Zerologon) (CVE-2020-1472)
* samba: Missing handle permissions check in SMB1/2/3 ChangeNotify (CVE-2020-14318)
* samba: Unprivileged user can crash winbind (CVE-2020-14323)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
ctdb-4.13.3-3.el8.x86_64.rpm
d1531d5c8c428e119ddfe46db9821702d2b41d00ea692c09625b1e37a3b15e53
ctdb-tests-4.13.3-3.el8.x86_64.rpm
2bb2ad389a0e5c230036c4baae5387a8555dcb428446891d2ad90f27eec74e4f
libsmbclient-4.13.3-3.el8.i686.rpm
64e0171957de3884fb34241d8f0ef9a7ef3f158b0acc4ca64c82d9559b5e39f3
libsmbclient-4.13.3-3.el8.x86_64.rpm
5b69954192fa4179f1ab93386667385063e0e1bc7cf6c52b7d5a21907ffa1778
libwbclient-4.13.3-3.el8.i686.rpm
1f1075a0a13bb4d1765828212bd08fbd8bf1feea45d9250afd74ddd8e7d5e9bb
libwbclient-4.13.3-3.el8.x86_64.rpm
0d54f828f06d680cb2b8f408c57a0c436455510c44cb234782da87a8d2c5e2cc
python3-samba-4.13.3-3.el8.i686.rpm
402c251c1a5c7e44c2007242e4c6cf6e9b9d59b20c6a801305a4d82f2a97d75e
python3-samba-4.13.3-3.el8.x86_64.rpm
c2f105f6e0c3297dde4bce06c2e86d5f362df552d76d9a8d7977255c38e77d47
python3-samba-test-4.13.3-3.el8.x86_64.rpm
3cb9cc66d33120c8463bb789d36f08bf38c90ebb464a41bf511e4a1b539bc974
samba-4.13.3-3.el8.x86_64.rpm
38d6a34417e74ca9b3d2001351f32cb13645b632a6fac20ce2b16478299460f3
samba-client-4.13.3-3.el8.x86_64.rpm
2301144d848144ddb64a4e59f6896cff6bb462265a93de89a321be4a6bd46c0a
samba-client-libs-4.13.3-3.el8.i686.rpm
7fa5ae5ea70d1fc70b10f4a4696c1abfc8e9ee10d3ce39ce2ba6659eb81a0068
samba-client-libs-4.13.3-3.el8.x86_64.rpm
fe76dce0386885a2431883528f1d9f50fca4c893f4c613d9f144b2f4f3d93154
samba-common-4.13.3-3.el8.noarch.rpm
3ee6d5946eced744d97a17cdafb21cb3c914a7730f659d64cbb955657074ca56
samba-common-4.13.3-3.el8.noarch.rpm
3ee6d5946eced744d97a17cdafb21cb3c914a7730f659d64cbb955657074ca56
samba-common-libs-4.13.3-3.el8.x86_64.rpm
40fef1fb321e688721cc43ae8efc24afa4f08afef619ce6f667abd0add2717cd
samba-common-tools-4.13.3-3.el8.x86_64.rpm
93f7d4e54d76d85244c894946c1369c30290cbd3d34d28cba5404b33fe6eabec
samba-krb5-printing-4.13.3-3.el8.x86_64.rpm
7e6dedd7960bd32b994022c6eb5077a7d913af4bffca5af4a9fa1e17cd6345b9
samba-libs-4.13.3-3.el8.i686.rpm
ac623526e42e30adbeffcba964ba2c16a617e3301e6daa4a7369b276640967c8
samba-libs-4.13.3-3.el8.x86_64.rpm
1f9be71b6eab6c49ddecc03ca6d483e01dc977583ddd23f23a2bdde9460a95d2
samba-pidl-4.13.3-3.el8.noarch.rpm
5967521389690e3d7cc3f250c21bce683bd3f078737ebf35123a3b103b589191
samba-pidl-4.13.3-3.el8.noarch.rpm
5967521389690e3d7cc3f250c21bce683bd3f078737ebf35123a3b103b589191
samba-test-4.13.3-3.el8.x86_64.rpm
3d89fc3948fa4851d4e2fe929ba151e5e468af58512efe3e108076022467804a
samba-test-libs-4.13.3-3.el8.x86_64.rpm
8b9c663530f21486cfc75dc6fbbc1d1428b81408f8e47a93e37d17beccf6cda0
samba-winbind-4.13.3-3.el8.x86_64.rpm
e37dd18fa54f41ad2684823c6d436ead20648c0fe306c4ab10db5cf9a06a46f0
samba-winbind-clients-4.13.3-3.el8.x86_64.rpm
d919cdb2359305a7c0f95e84d7e9657c88f11d53dcc21fd4174a1a1fd14d8028
samba-winbind-krb5-locator-4.13.3-3.el8.x86_64.rpm
33b060e8d0704e118f0c1629c71a94df6fd04b0fe6eec6d203408f680ae7c958
samba-winbind-modules-4.13.3-3.el8.i686.rpm
879e0a3870a01d7a9f78b23af87d8190323700a1cce176381f1f5994eea4c45a
samba-winbind-modules-4.13.3-3.el8.x86_64.rpm
4c8d79790cefceacc65c8229284f440e575e0d92118ddb69229a9b7840aaec4d
samba-winexe-4.13.3-3.el8.x86_64.rpm
053a00caca81b0e41a69ab69d55d6aaa1fe2ec70f46f1fd70963eb9a7fc85d71
RLBA-2021:1648
grub2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
grub2-common-2.02-99.el8.noarch.rpm
ed9f808337d02208d03ecc87f553cb7826ffd12a7f00b5edab6af4d338e0f85e
grub2-common-2.02-99.el8.noarch.rpm
ed9f808337d02208d03ecc87f553cb7826ffd12a7f00b5edab6af4d338e0f85e
grub2-efi-aa64-modules-2.02-99.el8.noarch.rpm
8354cc1cdb4d6ce29404a3e35146f4985d662da81add10144d0d208b40cfe8b7
grub2-efi-aa64-modules-2.02-99.el8.noarch.rpm
8354cc1cdb4d6ce29404a3e35146f4985d662da81add10144d0d208b40cfe8b7
grub2-efi-ia32-2.02-99.el8.x86_64.rpm
d502c30b0851822a2fa0ee82a23254b89d79ab6f507f7467d8fa8df656c255fd
grub2-efi-ia32-cdboot-2.02-99.el8.x86_64.rpm
5f9e1c58fe4fa628e30a5c32933186214f43e3ca2272f4bca497f45706208a91
grub2-efi-ia32-modules-2.02-99.el8.noarch.rpm
c9a600c9c7bb16f26bdebab4264fccddfd64599d8b648647bc6ff71891aeffea
grub2-efi-ia32-modules-2.02-99.el8.noarch.rpm
c9a600c9c7bb16f26bdebab4264fccddfd64599d8b648647bc6ff71891aeffea
grub2-efi-x64-2.02-99.el8.x86_64.rpm
a5daf825ba3d449c15d63db068e79115716cec3770d126bfb3ad9210b1faccb3
grub2-efi-x64-cdboot-2.02-99.el8.x86_64.rpm
0c433fbfeeb66293ac163d150a2e2c882b92fc1e125dfd3b7c4f8b5a9f1c9475
grub2-efi-x64-modules-2.02-99.el8.noarch.rpm
25752a34062c78ebf26c6c2da62009051948ca669f7b8ba9fc6cc225daa41e65
grub2-efi-x64-modules-2.02-99.el8.noarch.rpm
25752a34062c78ebf26c6c2da62009051948ca669f7b8ba9fc6cc225daa41e65
grub2-pc-2.02-99.el8.x86_64.rpm
96b6d8c0a6e96ed6d1a8e269004396423fb3fc59d09a25fb0730bf1ef2d739e2
grub2-pc-modules-2.02-99.el8.noarch.rpm
e1ee5658bc77e5b3978593ef8c20633067238c3204f731c8479e6452af363bf6
grub2-pc-modules-2.02-99.el8.noarch.rpm
e1ee5658bc77e5b3978593ef8c20633067238c3204f731c8479e6452af363bf6
grub2-tools-2.02-99.el8.x86_64.rpm
d51007e0b47e75e64c472232cb545a198a4c31ca2f2f8780ae90ccaed7c96db3
grub2-tools-efi-2.02-99.el8.x86_64.rpm
561f88a42e8da3731ee2fdff8811b486ea60cbdaf17ca08d60db85a9eec290de
grub2-tools-extra-2.02-99.el8.x86_64.rpm
378753d4d2e7d6a8769af8c84751afaf6069dbba4a88d57a7f3fb24b89bc7d63
grub2-tools-minimal-2.02-99.el8.x86_64.rpm
c2a09e3ef3940adc3abcaad729b4314cc0d7f1383637b9d373b1ce1ff54be539
RLBA-2021:1649
pam bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
pam-1.3.1-14.el8.i686.rpm
5c276544ca6aaf302d16408117356869c54b7575dd70a6a37e4f3a06ce52d2eb
pam-1.3.1-14.el8.x86_64.rpm
e82a349195579356b9371252737ab06d3a2c9e4d3de7f2b465b2a2b3538d7b71
pam-devel-1.3.1-14.el8.i686.rpm
383de6d11c85b94cfb1ec03127578e8cf1a66c5181dcb172eb1c79e356bdbb03
pam-devel-1.3.1-14.el8.x86_64.rpm
d5f33bf72a7976a5d3511fc16ab7d623134d07a2d170ef0412c458dbac92c9a0
RLBA-2021:1650
shadow-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shadow-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
shadow-utils-4.6-12.el8.x86_64.rpm
37256695fe9bd87f1413fdef705475f99baed621457aa9308fa13ee6eda6b65f
RLEA-2021:1651
mcelog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
mcelog-173-0.el8.x86_64.rpm
c285969b43f26cdf28ea03f8ebb41e0bc90f73423ecfaf4fa7c8b1b5b72709b6
RLBA-2021:1652
libldb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
ldb-tools-2.2.0-2.el8.x86_64.rpm
eca8d6a89238be6765363be191502f3ee8ae14ac319797f7a8186ab8d9c54ce7
libldb-2.2.0-2.el8.i686.rpm
508d9a3dce34b07fe5ad8ef22a59caa72dcc578afeaf2f241863d6ade2365371
libldb-2.2.0-2.el8.x86_64.rpm
7b8c768989d5493b2877b77c50ad1aa715626dc068f95227685ee92ee3cbc552
libldb-devel-2.2.0-2.el8.i686.rpm
dd457042b88d773c4db088f202bb82e9757b26483c9564a5652bb912d72957a8
libldb-devel-2.2.0-2.el8.x86_64.rpm
9ca54283bf9be8d3542b149fde8f2ebfe73a70615a24bf02f432e21544d33f66
python3-ldb-2.2.0-2.el8.i686.rpm
ed3fe18d7de0c464946433da36c93b572e5721c14232397af3f1e1490c3a9bad
python3-ldb-2.2.0-2.el8.x86_64.rpm
69e078041b1f67e9844c4c32656766795ce34f9560b1ae8db788ca489056b449
RLBA-2021:1653
iproute bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
iproute-5.9.0-4.el8.x86_64.rpm
242266bcf8187f60d6d6c13ca43f272452d05e27068e99070aad87345a5ac35b
iproute-tc-5.9.0-4.el8.x86_64.rpm
2a9b2cda0f01519a50dbfc13e647d9ebccb763b85d503afa1813d5c83b1df452
RLEA-2021:1654
freeipmi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freeipmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
freeipmi-1.6.6-1.el8.i686.rpm
ce0605ff797f061ef2d421aeacc8dd78a05fa66cefd0d3b66f45f39f523cad8a
freeipmi-1.6.6-1.el8.x86_64.rpm
5fa34708be3d1d5e35e02b08ca37cc185a9e95d780362d3e803d708163c0f4f9
freeipmi-bmc-watchdog-1.6.6-1.el8.x86_64.rpm
732d2b69aa36534c0eee9715f6f5a2478b70b2b6fafe055f37451079b920374e
freeipmi-ipmidetectd-1.6.6-1.el8.x86_64.rpm
56baecb647edbada306cdbeaa9141d7fd3c7c0ca9de6675e52bf789139d8baec
freeipmi-ipmiseld-1.6.6-1.el8.x86_64.rpm
4301c9161cb080bd6f7160d5ec1f3960eedd4622f95c4b215da6f40662295719
RLBA-2021:1655
libsolv bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libsolv-0.7.16-2.el8.i686.rpm
3ace686778c8bb0d2859396dd9f519a0e246251927f9ffb761fa9c518ed117e8
libsolv-0.7.16-2.el8.x86_64.rpm
c574f653c3a3a3c7df3690f2be25dcae9f860d2020d00aa7c002b8b83f89a283
python3-solv-0.7.16-2.el8.x86_64.rpm
afe02c62d1febb455ce9586326d539710677c467d000f770f85e3b2193fb43d1
RLEA-2021:1656
OpenIPMI bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for OpenIPMI.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
OpenIPMI-2.0.29-1.el8.i686.rpm
8b436f96f5ec91ceea977676675fe08c7bc42f87a790bb9b1077287a91665069
OpenIPMI-2.0.29-1.el8.x86_64.rpm
871b280c6387ac70dffed60fc08a22428c3615a52f70662b3d4087418bd6bb7e
OpenIPMI-lanserv-2.0.29-1.el8.i686.rpm
4aa8fea2cbe8567ebdbc745c9a7d511a1e7984543e8c9fb217d242eca34740c9
OpenIPMI-lanserv-2.0.29-1.el8.x86_64.rpm
ea96962c1caca2d6ad84513a389af146770e62123a9295b66edf157ac8d57247
OpenIPMI-libs-2.0.29-1.el8.i686.rpm
0490daedaf6cb3d67204cb4dc9ca7467c2936375b9acf800dc390cb0f361d845
OpenIPMI-libs-2.0.29-1.el8.x86_64.rpm
514fb3d1d54795ed153d0c7aa2574f6c48366ab659f6b91d6d2f86c3b2e0dfbf
OpenIPMI-perl-2.0.29-1.el8.x86_64.rpm
198f60c0a61e9f14af777c8c72988c0f855c40396008036efb4f26c78ce6c15e
python3-openipmi-2.0.29-1.el8.x86_64.rpm
caf35e8b445c8d4dcc211ac8efa877ae1108cf16c31eac1303244362e8096cfd
RLBA-2021:1657
dnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcomps, dnf-plugins-core, dnf, libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
dnf-4.4.2-11.el8.noarch.rpm
6b1829384be5635b78b9e28eac8159297abc2d4257dfd19b571661e309f5b973
dnf-4.4.2-11.el8.noarch.rpm
6b1829384be5635b78b9e28eac8159297abc2d4257dfd19b571661e309f5b973
dnf-automatic-4.4.2-11.el8.noarch.rpm
f31f87d75a623a5621966576cc19fdc68ad649b25f3cb907bb3372f5d7608d90
dnf-automatic-4.4.2-11.el8.noarch.rpm
f31f87d75a623a5621966576cc19fdc68ad649b25f3cb907bb3372f5d7608d90
dnf-data-4.4.2-11.el8.noarch.rpm
59a4445816057e5d15194ebaf2d9a4e40faa79717e530d839789899b3aeaa8e4
dnf-data-4.4.2-11.el8.noarch.rpm
59a4445816057e5d15194ebaf2d9a4e40faa79717e530d839789899b3aeaa8e4
dnf-plugins-core-4.0.18-4.el8.noarch.rpm
87b176ef090d9692a12be9f646914f54913f78ccc9c48b5a73b9a2db0d404813
dnf-plugins-core-4.0.18-4.el8.noarch.rpm
87b176ef090d9692a12be9f646914f54913f78ccc9c48b5a73b9a2db0d404813
libcomps-0.1.11-5.el8.i686.rpm
65ea21ffe7aad5fff06d44551e7c3c81663c25f69e691674e70e2cb78adf7d83
libcomps-0.1.11-5.el8.x86_64.rpm
14204045a01d3d763d3a61972fe4713e1a30ee1f9fbe9c1cf3d400f55e818e02
libcomps-devel-0.1.11-5.el8.i686.rpm
6348d2026b59e5d3092a4932a53d008cd8e19718a66085959a7caeffc2c06e9c
libcomps-devel-0.1.11-5.el8.x86_64.rpm
f0363cfb27b0e6b9f589c19bbbc891902b666b05a67af27f423bec539a7c5718
libdnf-0.55.0-7.el8.i686.rpm
e20b7b2a1dde2d4ab319b99d20d714c888a9fdd31936804b990e0ad3baac2de9
libdnf-0.55.0-7.el8.x86_64.rpm
77d7d2509e9f9329b191e14883c2e99e754f453cbef06e37045cd9d8f9f76f22
python3-dnf-4.4.2-11.el8.noarch.rpm
c6837f96dcbf6c52415e1c54a20a6d2b3f4ac2c06611aefad4da08d7b09aed51
python3-dnf-4.4.2-11.el8.noarch.rpm
c6837f96dcbf6c52415e1c54a20a6d2b3f4ac2c06611aefad4da08d7b09aed51
python3-dnf-plugin-post-transaction-actions-4.0.18-4.el8.noarch.rpm
70a17f806fc58339d56e9d7939ae4a25538a2d79b2551eec6de8be041f87594c
python3-dnf-plugin-post-transaction-actions-4.0.18-4.el8.noarch.rpm
70a17f806fc58339d56e9d7939ae4a25538a2d79b2551eec6de8be041f87594c
python3-dnf-plugins-core-4.0.18-4.el8.noarch.rpm
bbf9cf8ddb7ee718fe38d4a554b20b2577210fa5c707de76612a7f5a8178013f
python3-dnf-plugins-core-4.0.18-4.el8.noarch.rpm
bbf9cf8ddb7ee718fe38d4a554b20b2577210fa5c707de76612a7f5a8178013f
python3-dnf-plugin-versionlock-4.0.18-4.el8.noarch.rpm
f2d30a4ad495b3cf080d7408061cce57f0f84b43fe449fd263e2cea9c1a99ec3
python3-dnf-plugin-versionlock-4.0.18-4.el8.noarch.rpm
f2d30a4ad495b3cf080d7408061cce57f0f84b43fe449fd263e2cea9c1a99ec3
python3-hawkey-0.55.0-7.el8.x86_64.rpm
aef99a8cb6932ca2ecc960997af92661dd40cea03c4d34990b3261050469b982
python3-libcomps-0.1.11-5.el8.x86_64.rpm
c1db12f83937fb267877ca12de38b8ff55ea8485006fba28dfcedd09140f6c1a
python3-libdnf-0.55.0-7.el8.x86_64.rpm
f2ac2ea2b137a64ec83d7b3a2b19e79594737cc34170e3f68e8f8151dbadce81
yum-4.4.2-11.el8.noarch.rpm
87e18f3a843843fe046b374ea1af245aa9aca7507b690585629b2a55eb2b2f89
yum-4.4.2-11.el8.noarch.rpm
87e18f3a843843fe046b374ea1af245aa9aca7507b690585629b2a55eb2b2f89
yum-utils-4.0.18-4.el8.noarch.rpm
cb4ecfd323d1431993948e7769a2a12ee7c2c47a604a457a978a90c2b9ac9a42
yum-utils-4.0.18-4.el8.noarch.rpm
cb4ecfd323d1431993948e7769a2a12ee7c2c47a604a457a978a90c2b9ac9a42
RLBA-2021:1659
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-1.02.175-5.el8.x86_64.rpm
381d5c8c90fa2a71b434040ddf6125f95121d5cd6df86db4ab6324ebdb7d3324
device-mapper-event-1.02.175-5.el8.x86_64.rpm
f449f04c760a5bce31b4761a2932796744a4babfc15d980c02ca57275c7cb595
device-mapper-event-libs-1.02.175-5.el8.i686.rpm
acd88545cee13e379d4280c15a1d058d9877c0eab17a8ae232badb6278a8cdce
device-mapper-event-libs-1.02.175-5.el8.x86_64.rpm
56e40a290112706b7f39e4ecf9bf6766e76259e90ae0f9a1cf79746aece15750
device-mapper-libs-1.02.175-5.el8.i686.rpm
588d0fe2c12e70abf6f2add188439e46e3573c157f912857988b200f196bf8c9
device-mapper-libs-1.02.175-5.el8.x86_64.rpm
a35ae70e8613e62a8ec46e0cc1edb34b2b91cf8585ed59ada01d54c4407f17f1
lvm2-2.03.11-5.el8.x86_64.rpm
bfc5f0acc93c30cf5e480260c9e065da57b2b824d19795cb008f039fa10a445a
lvm2-dbusd-2.03.11-5.el8.noarch.rpm
4017999e9abf87f5c18d4d60cd43a5411361f8db60196ce173618e82e6082ad7
lvm2-dbusd-2.03.11-5.el8.noarch.rpm
4017999e9abf87f5c18d4d60cd43a5411361f8db60196ce173618e82e6082ad7
lvm2-libs-2.03.11-5.el8.i686.rpm
527d7e5d07f60a973a10f0ed57640d9627897dbd74c4ee22df2cb23f0d0a6bf7
lvm2-libs-2.03.11-5.el8.x86_64.rpm
613960c876aa58978b27f47b07effdd11e38a83818ad2c164e3fe877d6add53f
lvm2-lockd-2.03.11-5.el8.x86_64.rpm
26e906b5ae8b18a0dac6801a6c5966b356270b92c3756b94f56c06ce49666950
RLBA-2021:1661
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
dracut-049-135.git20210121.el8.x86_64.rpm
2c96601c4fc8c5ff4780ed154f598757aeb5530dbefddad3de983c35278f92e6
dracut-caps-049-135.git20210121.el8.x86_64.rpm
7d079d80f6f89bfa1130aa3a4af9385e6ceed3510d658bcd821ecf7227e75db5
dracut-config-generic-049-135.git20210121.el8.x86_64.rpm
35006d9f7aeb317966e862539a1793943f27eb8fe919914fe53b0d6520f83783
dracut-config-rescue-049-135.git20210121.el8.x86_64.rpm
578d4c88b392b38df52b8789f661e8fe7d226cad3c6cc266eeb040b8b66db767
dracut-live-049-135.git20210121.el8.x86_64.rpm
d59b895c0ded9dbea1a2a87130271f7ac0ea91a8a3f35ea4f79ee44504200b55
dracut-network-049-135.git20210121.el8.x86_64.rpm
9acd7039f38815ab1bf9b0e27be8cefe86cfff900a3d6080c31d868f4120293a
dracut-squash-049-135.git20210121.el8.x86_64.rpm
97b6b2a2a83bdaf46c6728fc510a8dd67619251a062bbabd0d4ddcf7be5819f2
dracut-tools-049-135.git20210121.el8.x86_64.rpm
6e15736202a0f10c5c236ee3617863f691aae39881984117d1480b20a85b20b8
RLBA-2021:1665
rpcbind bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpcbind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
rpcbind-1.2.5-8.el8.x86_64.rpm
0ba9696c23beff1c95feb71b839c412aa6af31e73bdc4ca9e5a820621afa8f98
rpcbind-1.2.5-8.el8.x86_64.rpm
0ba9696c23beff1c95feb71b839c412aa6af31e73bdc4ca9e5a820621afa8f98
rpcbind-1.2.5-8.el8.x86_64.rpm
0ba9696c23beff1c95feb71b839c412aa6af31e73bdc4ca9e5a820621afa8f98
RLBA-2021:1662
tpm2-tss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-tss.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
tpm2-tss-2.3.2-3.el8.i686.rpm
647d9d1c8a626cb06fc1dc8805c4e0d68327063596efd3314b862cf9b4880b54
tpm2-tss-2.3.2-3.el8.x86_64.rpm
4478cfc151444836bcae275a78d0d04ddd8020e2df1cb58a65c072f893b5e46a
tpm2-tss-devel-2.3.2-3.el8.i686.rpm
0578ba89e894aa4bcd3a231a84c3de4447fa1656e6f4d9da5edadbe1605b2982
tpm2-tss-devel-2.3.2-3.el8.x86_64.rpm
3a37e1c36fa7fb9b9b4f96d470fa618ebee38df6d66cce86837c92792ad9ec42
RLBA-2021:1663
tpm2-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
tpm2-tools-4.1.1-2.el8.x86_64.rpm
684ebbbe22e1669b3a0a66e9dea266c47980c0d350156cd8412be684b252f98b
RLBA-2021:1664
postfix bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postfix.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
postfix-3.5.8-1.el8.x86_64.rpm
6a891a04bc7e361016fd2dfbeb9c663f4b072e646ce953b7b6d8fcf382288c6b
RLBA-2021:1666
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libipa_hbac-2.4.0-9.el8.i686.rpm
18fa765723260878fc74aea72c5d052d94cca1baf2a1e4fe6d2dda9a8e92d71b
libipa_hbac-2.4.0-9.el8.x86_64.rpm
72041c6e0a05a79216ca3502822640d448d0babd919559b7576ad38a83231782
libsss_autofs-2.4.0-9.el8.x86_64.rpm
721cb97a926303ec3dfca9ab61f53c058310b6a82a1a8ea47754334ff56e4c32
libsss_certmap-2.4.0-9.el8.i686.rpm
e5241871641cea5935c4e27e3e478dc0c5dc5b85375df9100c98765ab7e2592d
libsss_certmap-2.4.0-9.el8.x86_64.rpm
8fab276123686b55e2dac0d3688710134ffabc40a75a2513ddc837a69e1d4475
libsss_idmap-2.4.0-9.el8.i686.rpm
3d61a8fcff26288a1d314e6a8857c6b43759bd4f4b198fe379bf864484b400f5
libsss_idmap-2.4.0-9.el8.x86_64.rpm
703a5b6ad73fe8c4c2b89fa208cb0ea6d5c9cf9c1759f243566a175f87fbb45f
libsss_nss_idmap-2.4.0-9.el8.i686.rpm
33baf0ff1eb28a7205c742a2ec20e5fcd007de8166d856988a3be0ae4f4d8a8c
libsss_nss_idmap-2.4.0-9.el8.x86_64.rpm
7a8c156831f4a623525e899862877ad14c505a3d48dfe8bc0b61e5e95caf47d4
libsss_simpleifp-2.4.0-9.el8.i686.rpm
c3af7d986189084c2d30d397823624fdaa4ad9ddeb85d35a869f0e60cd1b830a
libsss_simpleifp-2.4.0-9.el8.x86_64.rpm
4b566f978f938a953ed58cf8e23a29b0ad5546da9ea0bc1838d0246d7b676a6e
libsss_sudo-2.4.0-9.el8.x86_64.rpm
8b9a54de1e1c9c8c7da50683fc75f89ac2ca46aae376a42aeccea97d93a835e0
python3-libipa_hbac-2.4.0-9.el8.x86_64.rpm
edb167bdf57372bca82817c094b3f3d11c994c991af722a99c3288b3319e51bc
python3-libsss_nss_idmap-2.4.0-9.el8.x86_64.rpm
ac5e727e822a1702fc1fbde501d02ee20fbb285705bb30622825c2349248ea38
python3-sss-2.4.0-9.el8.x86_64.rpm
66ae6302aa5cfcc8bfd9ecca462a944b78ca6f75903a5dd3f6608b69bfecf4bd
python3-sssdconfig-2.4.0-9.el8.noarch.rpm
10ec8956b9663ef274bd2d1bb09984d2d2e0ab0d231dc0d284b5c06c43cef6a0
python3-sssdconfig-2.4.0-9.el8.noarch.rpm
10ec8956b9663ef274bd2d1bb09984d2d2e0ab0d231dc0d284b5c06c43cef6a0
python3-sss-murmur-2.4.0-9.el8.x86_64.rpm
9459d74fdf8fc2bd9b3ba559befd1e32a5e5951a8b1fc44799771ad5762bd188
sssd-2.4.0-9.el8.x86_64.rpm
bc9d2e9fdfc1a07c8dcd55f072b15107ac5111f6cd41fa27828c5f36814e1dbd
sssd-ad-2.4.0-9.el8.x86_64.rpm
b651e2de16f883ae302f707e33eea450556b4713709cf015ee785dea0d8b7b9f
sssd-client-2.4.0-9.el8.i686.rpm
feab77d39ceb745b18e22e9c5233b6c40b37723178166c241a34718d1a6108bc
sssd-client-2.4.0-9.el8.x86_64.rpm
3e042a05ca9e943cb4e2323d077d3c07e7b7ae48a353fc07672ff064b4fe307b
sssd-common-2.4.0-9.el8.x86_64.rpm
fef32156360cf52f69c78a0726a3150456a0399cbd0aca86379d13506c7428a3
sssd-common-pac-2.4.0-9.el8.x86_64.rpm
678996283669350667550e22e4186f100ca563a798b3fcbc308633cb8909a8cc
sssd-dbus-2.4.0-9.el8.x86_64.rpm
14d3e5e31b47a6fe4fc8bb2a585a9d4267b5bb4ec59795a5fdb845d16bd13148
sssd-ipa-2.4.0-9.el8.x86_64.rpm
b5a8261ff19c7c8e622955ced6db253b2da969020a93cc441da4ad36a458b6e5
sssd-kcm-2.4.0-9.el8.x86_64.rpm
6e2eb81ac36d570acfbeaddc0798c41228be8d8b31e8b97e5729de82641994ea
sssd-krb5-2.4.0-9.el8.x86_64.rpm
6c1109947d5ee69dd7934ebf4f56a6e0a607b2fcf74fe7a0188153af0e78e206
sssd-krb5-common-2.4.0-9.el8.x86_64.rpm
944883ab283d765a73d244feb10f64747c8be43ceb1d74d0c2ed76d5e2db0f40
sssd-ldap-2.4.0-9.el8.x86_64.rpm
7e844b50a8a079f3e082c2c9220a37c2d2932e1b7e654e2f3dc4b30ec15846c8
sssd-libwbclient-2.4.0-9.el8.x86_64.rpm
b3a18f9bbdd2a953d5dde6b1d30e92a493cc9a033f197fc96211ab6edcdb2a4d
sssd-nfs-idmap-2.4.0-9.el8.x86_64.rpm
d27163616003af2ea34f0eef058ba52703bc2b914ffa0b28fa73fbfe7c45de19
sssd-polkit-rules-2.4.0-9.el8.x86_64.rpm
c18b4b135c14963ce3bb759993b4ba051cefc9717e5c6a3f05f53d170a53eb7e
sssd-proxy-2.4.0-9.el8.x86_64.rpm
cda3bf3685e522db636a02f77749dd66898d2b7f67d8c0b415eb8038a52834af
sssd-tools-2.4.0-9.el8.x86_64.rpm
db62c88c040224a6b2880a3a2dca27d1f5cf87e994f3f401b6de9572bf995dbb
sssd-winbind-idmap-2.4.0-9.el8.x86_64.rpm
7b260522d9e0719f5055714ca09665a6f03c1d6c1aa2dd698794077eb8f7b336
RLBA-2021:1667
lm_sensors bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lm_sensors.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
lm_sensors-3.4.0-22.20180522git70f7e08.el8.x86_64.rpm
39bce46048c718867632ecc28e7750f153f3f0d3460b14e984eea6107f367bca
lm_sensors-devel-3.4.0-22.20180522git70f7e08.el8.i686.rpm
f09519e1872432512ee8561abf5bbf0c288374d06fb27b1224cdcf18afbd6e8e
lm_sensors-devel-3.4.0-22.20180522git70f7e08.el8.x86_64.rpm
a6d1bdfe4ef8490b208fc7ad8382591021a36e7a94ebe0f61821ad0eff055c2a
lm_sensors-libs-3.4.0-22.20180522git70f7e08.el8.i686.rpm
c1e349947876bd6a8edced702b19155ecea15a167aee30dbbcf59c23edb455de
lm_sensors-libs-3.4.0-22.20180522git70f7e08.el8.x86_64.rpm
1acc241c32c43a39217bb0b292ff43b0786efa5c058d39b25fcd1bf00910e376
RLBA-2021:1668
authselect bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
authselect-1.2.2-2.el8.x86_64.rpm
6ed74b016cd2efcbabca0a67e45a17fe9dc5e5f99d0620357ce3c4c9b6972c52
authselect-libs-1.2.2-2.el8.i686.rpm
63c95c6b9e0366cc2ba573e0e577e4c508b29099b7b9132a6af343550712e470
authselect-libs-1.2.2-2.el8.x86_64.rpm
b3283381495cd3ddcc818638a204d1ad1bd640cfc331c4fee8c34bbe1e4b0b5e
RLBA-2021:1669
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libnfsidmap-2.3.3-41.el8.i686.rpm
bb773d1fa874d7c784ab49b4d4038e4ade5ff39a0fbb59c01bc15774d4f7d0b7
libnfsidmap-2.3.3-41.el8.x86_64.rpm
8b684f0d1d5d0a40b8911feeb71279b3a3e8aadfdbe7cdc9a86a372f254ddca4
nfs-utils-2.3.3-41.el8.x86_64.rpm
c560928f77d32caa2c274d4cd935a1a4fbbe2d845f1e210fe75fdf4fcef4b487
RLBA-2021:1671
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
tuned-2.15.0-2.el8.noarch.rpm
b8343e8fe2a7aea7d0035653d11f880698333ac8c9c862d128ea5ae50b7786a7
tuned-2.15.0-2.el8.noarch.rpm
b8343e8fe2a7aea7d0035653d11f880698333ac8c9c862d128ea5ae50b7786a7
tuned-profiles-atomic-2.15.0-2.el8.noarch.rpm
82a745ab45e8802c5cb350501318e3838f2b3fbf6433ebf74b401ee72c5ac6f3
tuned-profiles-atomic-2.15.0-2.el8.noarch.rpm
82a745ab45e8802c5cb350501318e3838f2b3fbf6433ebf74b401ee72c5ac6f3
tuned-profiles-compat-2.15.0-2.el8.noarch.rpm
7a175e6499e89355bbede39504f615c50de4b7af679c6cd5a49afcfd1336c69f
tuned-profiles-compat-2.15.0-2.el8.noarch.rpm
7a175e6499e89355bbede39504f615c50de4b7af679c6cd5a49afcfd1336c69f
tuned-profiles-cpu-partitioning-2.15.0-2.el8.noarch.rpm
fb1cda32ab33672ba54c6e363e8ae3138e4572d0f50c5a6bb0f6ede729ce5d0a
tuned-profiles-cpu-partitioning-2.15.0-2.el8.noarch.rpm
fb1cda32ab33672ba54c6e363e8ae3138e4572d0f50c5a6bb0f6ede729ce5d0a
tuned-profiles-mssql-2.15.0-2.el8.noarch.rpm
407c9a1390baa78693f9a7e54e4c48d90ceb23314de8dea5635b6c6ad882dd6a
tuned-profiles-mssql-2.15.0-2.el8.noarch.rpm
407c9a1390baa78693f9a7e54e4c48d90ceb23314de8dea5635b6c6ad882dd6a
tuned-profiles-oracle-2.15.0-2.el8.noarch.rpm
454b67b7b338b08a08327a48ab2662fafb77691ea409ade618caa0b2e4c79ead
tuned-profiles-oracle-2.15.0-2.el8.noarch.rpm
454b67b7b338b08a08327a48ab2662fafb77691ea409ade618caa0b2e4c79ead
RLBA-2021:1672
libsemanage bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libsemanage-2.9-6.el8.i686.rpm
b3d717b6f87d7fd874cd7f43346ce7b5bfdf07a806da5436649cb677711c83a4
libsemanage-2.9-6.el8.i686.rpm
b3d717b6f87d7fd874cd7f43346ce7b5bfdf07a806da5436649cb677711c83a4
libsemanage-2.9-6.el8.x86_64.rpm
984dd8997bb5f2be7b960c0699cc38c01648233740317c0c405ceaf77ad539e6
libsemanage-2.9-6.el8.x86_64.rpm
984dd8997bb5f2be7b960c0699cc38c01648233740317c0c405ceaf77ad539e6
python3-libsemanage-2.9-6.el8.x86_64.rpm
a25f7ca41fb29769dc6683075d701c1e752407014353d66fbfdccf39bb973ab4
python3-libsemanage-2.9-6.el8.x86_64.rpm
a25f7ca41fb29769dc6683075d701c1e752407014353d66fbfdccf39bb973ab4
RLBA-2021:1674
lshw bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lshw.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
lshw-B.02.19.2-5.el8.x86_64.rpm
b94b4686daa6802813c4a4b7e1b3eb272d0126e1ed25818e41d70a87ee197547
RLSA-2021:1675
Low: libdb security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications.
Security Fix(es):
* libdb: Denial of service in the Data Store component (CVE-2019-2708)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libdb-5.3.28-40.el8.i686.rpm
bfe8e6f957c42f84ba3dffddddd4b17687ca8fbe920eaa917d5fa5d0f5e2da18
libdb-5.3.28-40.el8.x86_64.rpm
37844b1f136553bdad08e37f5553b24669912f0f94bb6f60a5ad8704191e282b
libdb-utils-5.3.28-40.el8.x86_64.rpm
9c2ba39cc7e5fc81e0c81dd3ee325642cda24cf93a5656ac98b1c619283be60f
RLBA-2021:1676
gawk bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gawk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
gawk-4.2.1-2.el8.x86_64.rpm
488ce2196dc316e24b1a0c395f0d53d58c9bf4951ae96be702bc97c8c7c416af
gawk-4.2.1-2.el8.x86_64.rpm
488ce2196dc316e24b1a0c395f0d53d58c9bf4951ae96be702bc97c8c7c416af
RLBA-2021:1677
unzip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
unzip-6.0-44.el8.x86_64.rpm
06efa78f7a972214df8ba8bc9a1184849107f195dfa9884ba8705ec1e2f5aef5
RLSA-2021:1678
Moderate: perl security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system administration utilities and web programming.
Security Fix(es):
* perl: heap-based buffer overflow in regular expression compiler leads to DoS (CVE-2020-10543)
* perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS (CVE-2020-10878)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
perl-Errno-1.28-419.el8.x86_64.rpm
aa0f1283dc9a2e3a949f4e7609386458f4e6dece561073dab0c93f91f331a86a
perl-interpreter-5.26.3-419.el8.x86_64.rpm
ee23f2c58c269b26f27c65ed9e67df4da394d603af3d2ddb1ce927e0d442dfe4
perl-IO-1.38-419.el8.x86_64.rpm
2919e456d8e7a7da170910e055f82502715acebf333b22db4b0689fce8d0c0d9
perl-IO-Zlib-1.10-419.el8.noarch.rpm
106785b6a99be71129756c9f7839113fceb4b555151eb8d6dbbe8589d666ade8
perl-IO-Zlib-1.10-419.el8.noarch.rpm
106785b6a99be71129756c9f7839113fceb4b555151eb8d6dbbe8589d666ade8
perl-libs-5.26.3-419.el8.i686.rpm
8a730e0e9819d133fc81631c8dfca346e2f8726ac722ea0a86879f90f7ce4dc3
perl-libs-5.26.3-419.el8.x86_64.rpm
e499fec233eed6767b5bc6ff1daf7b455f47f93a689391c03f66d8f9ee52908f
perl-macros-5.26.3-419.el8.x86_64.rpm
84c412c842d977f8a19ce4213d638ec4cd96cce38a429387ae2304804e2fdd93
perl-Math-Complex-1.59-419.el8.noarch.rpm
938cde781d174943027ce93cee586542eae11fab43c17309ef5def903ba4efb2
perl-Math-Complex-1.59-419.el8.noarch.rpm
938cde781d174943027ce93cee586542eae11fab43c17309ef5def903ba4efb2
RLBA-2021:1680
gzip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
gzip-1.9-12.el8.x86_64.rpm
d0ac81485ff4b26cbefb834746255de3c0a6b9523a0226308ed25ffaff9c9769
gzip-1.9-12.el8.x86_64.rpm
d0ac81485ff4b26cbefb834746255de3c0a6b9523a0226308ed25ffaff9c9769
RLBA-2021:1682
dmidecode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
dmidecode-3.2-8.el8.x86_64.rpm
f99d9e43d5b81dacc2d4e005097f39f5e33053ab6e0b87159c60e6e493bb73ac
RLBA-2021:1683
iputils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iputils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
iputils-20180629-7.el8.x86_64.rpm
df95a8e0356c48e9699e559a28b5226f071fe5eabd6e6cf64f90fdda9dd00674
iputils-20180629-7.el8.x86_64.rpm
df95a8e0356c48e9699e559a28b5226f071fe5eabd6e6cf64f90fdda9dd00674
iputils-ninfod-20180629-7.el8.x86_64.rpm
c9bcfa244f261060303277ccaa2553b0c8fbeb1a9424b85335e67b20ec17043e
iputils-ninfod-20180629-7.el8.x86_64.rpm
c9bcfa244f261060303277ccaa2553b0c8fbeb1a9424b85335e67b20ec17043e
RLBA-2021:1684
cockpit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
cockpit-238.2-1.el8.x86_64.rpm
f48ba3875493beb689ae87422bbb68e16937f7ed8decb3a2d00d198bc1b8a49e
cockpit-bridge-238.2-1.el8.x86_64.rpm
9c0deb36758dfd9244368d7a8523da879cb52fafd09384196e2545dc9eef4d9c
cockpit-doc-238.2-1.el8.noarch.rpm
e54497bf15c61ab16806a1569d96c57526d557443ea5b184f0c6d121f738d53c
cockpit-doc-238.2-1.el8.noarch.rpm
e54497bf15c61ab16806a1569d96c57526d557443ea5b184f0c6d121f738d53c
cockpit-system-238.2-1.el8.noarch.rpm
339faa4cf420a2caf0d6aabad7b761261bc4ac6eaf16a42c5f3188e2e9aea8fa
cockpit-system-238.2-1.el8.noarch.rpm
339faa4cf420a2caf0d6aabad7b761261bc4ac6eaf16a42c5f3188e2e9aea8fa
cockpit-ws-238.2-1.el8.x86_64.rpm
71444388e4a58dc945c395877e702f80c0706e1ebb7de68eb2561ad74180b236
RLEA-2021:1685
device-mapper-multipath bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-multipath-0.8.4-10.el8.x86_64.rpm
cb2f076416d4194d62022a5803d516c122ffa0c1c8c25845e1602e918ac25fbb
device-mapper-multipath-libs-0.8.4-10.el8.i686.rpm
fba615e1f55b29b5eb450a400e767f6c7c2b252dedbc1146894ef4b8c8e604cb
device-mapper-multipath-libs-0.8.4-10.el8.x86_64.rpm
0e7162f3269df1545803ec31fc4f29ebcceeaf2351bfef7d1b4ebfc64d339ffe
kpartx-0.8.4-10.el8.x86_64.rpm
2b908f7a6903b22bf69145bfc8eaadcf3a1b015bb91e6820970365eeb14eb7f1
libdmmp-0.8.4-10.el8.i686.rpm
496e01ba1b067de428388ecd8b95202b6df63667c733dd90814ee3ba32b028bc
libdmmp-0.8.4-10.el8.x86_64.rpm
0628bd8cb419d338c9c0135285b6a56381c2c1b3a72d6dd962756cb7be1f6091
RLSA-2021:1686
Moderate: wpa_supplicant security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for wpa_supplicant.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver.
Security Fix(es):
* wpa_supplicant: P2P group information processing vulnerability (CVE-2021-0326)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
wpa_supplicant-2.9-5.el8.x86_64.rpm
dc65b801a1bcc4ada6bf61fc4f1361540e82049e9761c9680bbb1d562803b611
wpa_supplicant-2.9-5.el8.x86_64.rpm
dc65b801a1bcc4ada6bf61fc4f1361540e82049e9761c9680bbb1d562803b611
RLBA-2021:1688
kpatch bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kpatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kpatch management tool provides a kernel patching infrastructure which allows you to patch a running kernel without rebooting or restarting any processes. The kpatch tool works at the function level for replacing old functions with new functions using hot patch modules.
This update fixes the following bugs and adds enhancements:
* [RFE] kpatch-patch dnf plugin (BZ#1798711)
* rebase kpatch user utility code (BZ#1877857)
* Kpatch unload issue under stress (BZ#1883238)
* kpatch.spec use %config for dnf plugin's kpatch.conf (BZ#1898191)
* kpatch-dnf: man page file permissions (BZ#1899341)
* kpatch-dnf is in BaseOS but has AppStream dependency (BZ#1912224)
Users of kpatch are advised to upgrade to these updated packages, which fix these bugs and add enhancements.
none-baseos-rpms
kpatch-0.9.2-3.el8.noarch.rpm
71671701db4da06c069ac1f4497ed9c6fd53b54a3dcf28eed8af74a46219d3c7
kpatch-0.9.2-3.el8.noarch.rpm
71671701db4da06c069ac1f4497ed9c6fd53b54a3dcf28eed8af74a46219d3c7
kpatch-dnf-0.2-3.el8.noarch.rpm
3f2f45e91d60d2bb73dcae2d9e3dc27db895fca5da69aac39ba65300d2271220
kpatch-dnf-0.2-3.el8.noarch.rpm
3f2f45e91d60d2bb73dcae2d9e3dc27db895fca5da69aac39ba65300d2271220
RLBA-2021:1690
xfsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
xfsprogs-5.0.0-8.el8.i686.rpm
91e03677f04e832e4be26460f5f0293ba6dc9cc6748fb10b5844f318ec414a2b
xfsprogs-5.0.0-8.el8.x86_64.rpm
58824e8021e6a6722eac8d310680ebe72f0ddedf56285929f3156db8c0da3a01
xfsprogs-devel-5.0.0-8.el8.i686.rpm
0be619b8cb357a063369517c27748638ebec7715b6d8158b50b11183b8231426
xfsprogs-devel-5.0.0-8.el8.x86_64.rpm
9bb6f266d09c38fa1be108ebd105ebc30cd5153c0dff2b91bf9436ca4fb9e89e
RLBA-2021:1692
smc-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smc-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
smc-tools-1.4.0-3.git71c863a.el8.i686.rpm
10e049968bd36a9309f5689080c12cd8f4ce5e406c54196e4810f23b7c549504
smc-tools-1.4.0-3.git71c863a.el8.x86_64.rpm
19f1be69f08f61217bc46ac1bbf41586eb2518f3eaa7fcb1d7f471eff79a0c20
RLBA-2021:1693
augeas bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for augeas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
augeas-1.12.0-6.el8.x86_64.rpm
9d15397712f8da3871a962cc1f1d05117006a25b6e995a5746da1b84b02ee825
augeas-1.12.0-6.el8.x86_64.rpm
9d15397712f8da3871a962cc1f1d05117006a25b6e995a5746da1b84b02ee825
augeas-libs-1.12.0-6.el8.i686.rpm
9deffca442d52a95780933c5852e3a8733c27d250ebfe5539f886b41c08d269a
augeas-libs-1.12.0-6.el8.i686.rpm
9deffca442d52a95780933c5852e3a8733c27d250ebfe5539f886b41c08d269a
augeas-libs-1.12.0-6.el8.x86_64.rpm
a8a9d8eff7b87d43bca136801e93f7a16d688eb3a87dd8b76a10b4c32a3d068d
augeas-libs-1.12.0-6.el8.x86_64.rpm
a8a9d8eff7b87d43bca136801e93f7a16d688eb3a87dd8b76a10b4c32a3d068d
RLBA-2021:1694
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libblkid-2.32.1-27.el8.i686.rpm
89b5aa283aa6a6d4bdfb9c1dee198280de8d49252f92e7af5a4c4b651bbf5b26
libblkid-2.32.1-27.el8.x86_64.rpm
22ea8359f4dec75d570281e1006af2607d8b25b70299d16c50f136a685b401e6
libblkid-devel-2.32.1-27.el8.i686.rpm
409d8c38f893967340cbe9e26da87cbb4330053de7312d69d5cc42dae9e522eb
libblkid-devel-2.32.1-27.el8.x86_64.rpm
5ebd6100f5cd8b5c9cfab946af9108ed692a5a4f3477f375eec9b4d50b7d41f0
libfdisk-2.32.1-27.el8.i686.rpm
57699112730913a0fe01568afa5b896a8a5668fe52f8b4365a94e8db3839828b
libfdisk-2.32.1-27.el8.x86_64.rpm
0eb71d50015eda7005c7dcf5695b2d1540d8818f4450c09197da6ea373d17867
libfdisk-devel-2.32.1-27.el8.i686.rpm
8f499a86b752a2a9fa0e9a4e9d496ee88d5a4742fb2f331244ae524baca3709a
libfdisk-devel-2.32.1-27.el8.x86_64.rpm
a795d5f83bfcf3e46901632cfd80dc1c2eff4dbc31d1307a2a1d5da6d0d0777b
libmount-2.32.1-27.el8.i686.rpm
7744ccdc360012cc59f0a0adffb935a6083add7ba1cda1d56753ab0e7c485d80
libmount-2.32.1-27.el8.x86_64.rpm
cd280021e86291bbb07af1d3c8cf9165d5af0c1ffe2d0f0a9b968cdf52da7f01
libsmartcols-2.32.1-27.el8.i686.rpm
4cf938a11425eea09f79cc4ee195035a34fe2f00f4f4b40e2eec5c7eae03eb5d
libsmartcols-2.32.1-27.el8.x86_64.rpm
5cb8e5fae326079bf7629cf0bdf388476e369fa64dfba46ba056a38b6fbbbe26
libsmartcols-devel-2.32.1-27.el8.i686.rpm
710f2731b8a53b7ef452e0e8903a089f0222d11f4852fe3ca07cc06fee7b8fdc
libsmartcols-devel-2.32.1-27.el8.x86_64.rpm
76dc9c94eee996a525debdf181bb51c5ff7d768c46c19b44619c0bd688ef8956
libuuid-2.32.1-27.el8.i686.rpm
aa42938d269bf0aec137e7e373be7bd3e642cb5f4bfe28e0db105d0e7743d9bf
libuuid-2.32.1-27.el8.x86_64.rpm
178e929869c38d8804da8689a77bb30e28b4ccb96ec6f32e1d95cbe31ead6ae9
libuuid-devel-2.32.1-27.el8.i686.rpm
7301287e30acea5f0ba408a301f761e90c32911cacf7bc60b25be1eb160a6d5f
libuuid-devel-2.32.1-27.el8.x86_64.rpm
4d60c3b08541e605d9d70fcadfee908586c43c9a49b6db587c679fda8728d493
util-linux-2.32.1-27.el8.x86_64.rpm
0f55f96c5c5d4ab417ef6a79de106a2c65e16e70b64842682dd5f9a52e187ed0
util-linux-user-2.32.1-27.el8.x86_64.rpm
b9bf860c9295b6e03246ae12e36bce36f43633f99b4983f816b7251067122d6c
uuidd-2.32.1-27.el8.x86_64.rpm
4a4b48bead4152387d28f81da66c254c695219bce7541f1a9283f7d9d42dc364
RLBA-2021:1695
ksc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ksc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
ksc-1.7-1.el8.noarch.rpm
eef773bab0a9e78048fabbac9a5b9788ad4dce6a05fef87e6824d90319668e52
ksc-1.7-1.el8.noarch.rpm
eef773bab0a9e78048fabbac9a5b9788ad4dce6a05fef87e6824d90319668e52
RLBA-2021:1697
hwdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
hwdata-0.314-8.8.el8.noarch.rpm
e647b500db38db11d1dc682abe6a12de9dd8c507b72dfde49514cf9979aff7c6
hwdata-0.314-8.8.el8.noarch.rpm
e647b500db38db11d1dc682abe6a12de9dd8c507b72dfde49514cf9979aff7c6
RLBA-2021:1700
fwupd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
fwupd-1.5.5-3.el8.x86_64.rpm
5c472a69f0e15a1ab9e0af304ff4eb98fdae7138e1b49044ee145e5ba6dd76a6
RLBA-2021:1701
mokutil bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mokutil.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
mokutil-0.3.0-11.el8.x86_64.rpm
b0af62b766c4a6747904041b0e5fca618dfc4c74557ee754d5a57b1f6b283770
mokutil-0.3.0-11.el8.x86_64.rpm
b0af62b766c4a6747904041b0e5fca618dfc4c74557ee754d5a57b1f6b283770
mokutil-0.3.0-11.el8.x86_64.rpm
b0af62b766c4a6747904041b0e5fca618dfc4c74557ee754d5a57b1f6b283770
RLBA-2021:1703
libsepol bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsepol.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libsepol-2.9-2.el8.i686.rpm
5176e1dd4b9e617da9ca0c7e0835072f2c511443f14242195702c9419feba69e
libsepol-2.9-2.el8.x86_64.rpm
ad2fd0e734e860106f1b834c5846c971778638fb65030cf3fd213709ef9dacdb
libsepol-devel-2.9-2.el8.i686.rpm
e1fe8e36c453e62e4f11f9136869e961f16ed798c057df25987b5ce10a79ec87
libsepol-devel-2.9-2.el8.x86_64.rpm
1c3a79dcd2c533ac55c60080c52ccbb7cae51a646c1f08d95e4dbfdc44da626c
RLBA-2021:1704
python-linux-procfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-linux-procfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
python3-linux-procfs-0.6.3-1.el8.noarch.rpm
625dff8b1f5fe99bb2dc222775d011d1b34156280951686cfc5fd4a2d68fdb67
python3-linux-procfs-0.6.3-1.el8.noarch.rpm
625dff8b1f5fe99bb2dc222775d011d1b34156280951686cfc5fd4a2d68fdb67
python3-linux-procfs-0.6.3-1.el8.noarch.rpm
625dff8b1f5fe99bb2dc222775d011d1b34156280951686cfc5fd4a2d68fdb67
python3-linux-procfs-0.6.3-1.el8.noarch.rpm
625dff8b1f5fe99bb2dc222775d011d1b34156280951686cfc5fd4a2d68fdb67
RLBA-2021:1706
mdadm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
mdadm-4.1-15.el8.x86_64.rpm
ecf1a35397ff20c84ecc454ecb29c7526b634297b1aabbb276fd2439d4a8dd34
RLBA-2021:1708
kmod bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
kmod-25-17.el8.x86_64.rpm
f3fb16dfc1fa11e0059cc37205f173154df247be20159df3bbc94c1b36ebe38e
kmod-libs-25-17.el8.i686.rpm
054eec70c65d306aa62a7d434832e9d9dcac595edad230eee597946d4f3fd267
kmod-libs-25-17.el8.x86_64.rpm
d17424aff5e4754f2e6fc12f3cd48cb273a9572be9b033380c0943e4ebeda452
RLBA-2021:1711
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
sanlock-lib-3.8.3-1.el8.i686.rpm
c55ae67deb11f8feee4db8b6b6dd4f1ba3ae040f2f46adf5378d2bb2db71ee0d
sanlock-lib-3.8.3-1.el8.x86_64.rpm
bdf9e39721beda2f34603ccb070d7b8f98882adf929d4336e8ce6bf9af8152d3
RLBA-2021:1713
tuna bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
tuna-0.15-2.el8.noarch.rpm
dd43a4ce8a5907ae2f75096360caaffe15fd51d25ccd6869e8c005f301d79a25
tuna-0.15-2.el8.noarch.rpm
dd43a4ce8a5907ae2f75096360caaffe15fd51d25ccd6869e8c005f301d79a25
RLBA-2021:1715
policycoreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
policycoreutils-2.9-14.el8.x86_64.rpm
38f06ed288c2925e1d249a1418722fcd61ecdfdc18fb813811ea3eb9e2c318d3
policycoreutils-dbus-2.9-14.el8.noarch.rpm
1633ebf2c4632e9ee248f959a3498f51ce7230dd3bdf543f3656e5ac1037de3f
policycoreutils-dbus-2.9-14.el8.noarch.rpm
1633ebf2c4632e9ee248f959a3498f51ce7230dd3bdf543f3656e5ac1037de3f
policycoreutils-devel-2.9-14.el8.i686.rpm
2aed4c4210e3261ea8223edb7541bc4df3c323fc279550cf4b884ef77a831604
policycoreutils-devel-2.9-14.el8.x86_64.rpm
9d2dc5e09d5d08146efbe6ddef64574113311a6c63257798c7780ff9a00a7968
policycoreutils-newrole-2.9-14.el8.x86_64.rpm
b540ddb3725e3899acdced8c4acffdb02b8a1e224b3d974f9e5ebfb8b8c96299
policycoreutils-python-utils-2.9-14.el8.noarch.rpm
5b3c047801374d5f436570de4276b450c5c4c98a901928c455845fc77cb3b438
policycoreutils-python-utils-2.9-14.el8.noarch.rpm
5b3c047801374d5f436570de4276b450c5c4c98a901928c455845fc77cb3b438
policycoreutils-restorecond-2.9-14.el8.x86_64.rpm
ed6225847fdc6f60c4343e9a7198ae23b7d47d77adb9db4009606fadae7a6f47
python3-policycoreutils-2.9-14.el8.noarch.rpm
14a0bb1786130cf335d6c17682f01e0c6a260d6603c194481223b9033c6c98d0
python3-policycoreutils-2.9-14.el8.noarch.rpm
14a0bb1786130cf335d6c17682f01e0c6a260d6603c194481223b9033c6c98d0
RLEA-2021:1716
accel-config bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accel-config.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
accel-config-2.8-1.el8.i686.rpm
d59f45214f2da6f77a6dc35c7f3ea81f334aac1bca34446cef4d0c29c80ba40e
accel-config-2.8-1.el8.x86_64.rpm
d79bc1f1617bc3abd78f0beb79cf465d2e5f363b4ef0fe6fe0b0ffabef04be98
accel-config-libs-2.8-1.el8.i686.rpm
8ef1a9e271ea951222c5ea74d35ef3eda6bde0b61b49787eac6ad681a8ad662d
accel-config-libs-2.8-1.el8.x86_64.rpm
044c0d2502496d2f8622c6d6ac770674ea3d508196cef77236912b9ebafde448
RLBA-2021:1717
libbpf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libbpf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libbpf-0.2.0-1.el8.i686.rpm
f37604cfe222f323da66884d3488551fd9b5cd1a1c5e76fda4e8a25a37e1710e
libbpf-0.2.0-1.el8.x86_64.rpm
967e1b91958459ab31107814b9c6129a4af06cdce157bde89f3d2878fac894d9
RLBA-2021:1718
irqbalance bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for irqbalance.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
irqbalance-1.4.0-6.el8.x86_64.rpm
81169d58ea2b8e21b543b8189e04d0570cc1f4e7e952b2ad6265b570d35ef42a
irqbalance-1.4.0-6.el8.x86_64.rpm
81169d58ea2b8e21b543b8189e04d0570cc1f4e7e952b2ad6265b570d35ef42a
irqbalance-1.4.0-6.el8.x86_64.rpm
81169d58ea2b8e21b543b8189e04d0570cc1f4e7e952b2ad6265b570d35ef42a
RLBA-2021:1719
ledmon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ledmon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
ledmon-0.95-1.el8.x86_64.rpm
dcd262de621f08a4637759e0f944f1f9f9ebddc769fd4ec7b9aa5b4903eddb5a
ledmon-0.95-1.el8.x86_64.rpm
dcd262de621f08a4637759e0f944f1f9f9ebddc769fd4ec7b9aa5b4903eddb5a
ledmon-0.95-1.el8.x86_64.rpm
dcd262de621f08a4637759e0f944f1f9f9ebddc769fd4ec7b9aa5b4903eddb5a
RLBA-2021:1721
microdnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
microdnf-3.4.0-4.el8.x86_64.rpm
6e2c8d5b35459c630e073f7038ed248aa5d00e4a96819e59285dc13964cfd572
RLEA-2021:1722
nftables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
nftables-0.9.3-18.el8.i686.rpm
927bb1b23102bb42bf6283de62729fc21e4ad0f86287237fac341b0d8303a555
nftables-0.9.3-18.el8.x86_64.rpm
f32bfc7c8c38d0f497722e92257b14f345de2efb3ca0ae79938dc1bda7b94e4d
python3-nftables-0.9.3-18.el8.x86_64.rpm
1b2465e4b912a385ee27a433f461f28c475942daf1f29003a8855ac51140c3a6
RLSA-2021:1723
Low: sudo security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for sudo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: symbolic link attack in SELinux-enabled sudoedit (CVE-2021-23240)
* sudo: possible directory existence test due to race condition in sudoedit (CVE-2021-23239)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
sudo-1.8.29-7.el8.x86_64.rpm
d12e7686d6ada16c7cf6ac1ca3587c4dda4db2f5c81221bea216f7cc7a2ecdf1
RLBA-2021:1724
boom-boot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for boom-boot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
boom-boot-1.3-1.el8.noarch.rpm
b5cdea9a34648cf65a8d38c95dee7b31e41c28a277d8d323e354df4409fa70a4
boom-boot-1.3-1.el8.noarch.rpm
b5cdea9a34648cf65a8d38c95dee7b31e41c28a277d8d323e354df4409fa70a4
boom-boot-conf-1.3-1.el8.noarch.rpm
b8f89040ce2e1e6430e24818ee9ea99444ba8a91f5587f54fa593e77f649120a
boom-boot-conf-1.3-1.el8.noarch.rpm
b8f89040ce2e1e6430e24818ee9ea99444ba8a91f5587f54fa593e77f649120a
boom-boot-grub2-1.3-1.el8.noarch.rpm
0c2761ea373502bda0b27a110e619e58fe32030d2e922d777e4699afe2eb93e5
boom-boot-grub2-1.3-1.el8.noarch.rpm
0c2761ea373502bda0b27a110e619e58fe32030d2e922d777e4699afe2eb93e5
python3-boom-1.3-1.el8.noarch.rpm
4ad0d82b5696ac1f2b9634f0eba55e2902fa91da85dc84dec57d563f0c4dd323
python3-boom-1.3-1.el8.noarch.rpm
4ad0d82b5696ac1f2b9634f0eba55e2902fa91da85dc84dec57d563f0c4dd323
RLBA-2021:1725
trace-cmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for trace-cmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
trace-cmd-2.7-9.el8.x86_64.rpm
405fe338015f1670c9c94078de5ef248a56cc688d1217f99b7ea074e9071cfee
trace-cmd-2.7-9.el8.x86_64.rpm
405fe338015f1670c9c94078de5ef248a56cc688d1217f99b7ea074e9071cfee
RLBA-2021:1726
glusterfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glusterfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
glusterfs-6.0-49.1.el8.x86_64.rpm
98fb5eb8a7fcd0fb2d24f706244b04875b6bfa08f9d01cacbecdd434a7988284
glusterfs-client-xlators-6.0-49.1.el8.x86_64.rpm
bc84e1f63986b0645fd4876ea1c90ef6afeec43e848f3bfd4edf6e8b5b8692fc
glusterfs-fuse-6.0-49.1.el8.x86_64.rpm
c920e666496cc5996538b3e68e6407716b9e2981f6a65f0544d697158386f55b
glusterfs-libs-6.0-49.1.el8.x86_64.rpm
1678ebd15dcfbe6e242e645977eca5e7f1bfd733071f8e88cf6185af951481e5
glusterfs-rdma-6.0-49.1.el8.x86_64.rpm
7c2d25097e19018f854fbd9efa1a06ed278e4817e712b03bc206bef75dc4a04b
RLEA-2021:1727
ndctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ndctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
daxctl-71.1-2.el8.x86_64.rpm
0b79c919b04c0ebdde6fe8c495eadbcc84a00d7f1c325027ab43a3c1a862b256
daxctl-71.1-2.el8.x86_64.rpm
0b79c919b04c0ebdde6fe8c495eadbcc84a00d7f1c325027ab43a3c1a862b256
daxctl-libs-71.1-2.el8.i686.rpm
57143561c5cf4904f66ed5cef883aa8d8c45c3cb08686d8a03c3fae1df5e70fa
daxctl-libs-71.1-2.el8.i686.rpm
57143561c5cf4904f66ed5cef883aa8d8c45c3cb08686d8a03c3fae1df5e70fa
daxctl-libs-71.1-2.el8.x86_64.rpm
d5dc79d6473acd029ed56641480340dcf9400992ce36578f4408810f39d62b2a
daxctl-libs-71.1-2.el8.x86_64.rpm
d5dc79d6473acd029ed56641480340dcf9400992ce36578f4408810f39d62b2a
ndctl-71.1-2.el8.x86_64.rpm
b48cc041b98040a7f20731574b1c1ea195325f86213bcbfc49f934c09f7ac8e3
ndctl-71.1-2.el8.x86_64.rpm
b48cc041b98040a7f20731574b1c1ea195325f86213bcbfc49f934c09f7ac8e3
ndctl-libs-71.1-2.el8.i686.rpm
6c92801142d66bf18961ebb8b52cca79ec87ce9029b4af30a319f67f10a32141
ndctl-libs-71.1-2.el8.i686.rpm
6c92801142d66bf18961ebb8b52cca79ec87ce9029b4af30a319f67f10a32141
ndctl-libs-71.1-2.el8.x86_64.rpm
f8fe8e95a77b09b7d1985fdcb99a1b44e3a50b24f60cdcace516ff7480d1c469
ndctl-libs-71.1-2.el8.x86_64.rpm
f8fe8e95a77b09b7d1985fdcb99a1b44e3a50b24f60cdcace516ff7480d1c469
RLBA-2021:1728
cryptsetup bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cryptsetup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
cryptsetup-2.3.3-4.el8.x86_64.rpm
8afeb9b2494990f0d848fdcebe4441dca321551b1ff32918728648c999866d6b
cryptsetup-2.3.3-4.el8.x86_64.rpm
8afeb9b2494990f0d848fdcebe4441dca321551b1ff32918728648c999866d6b
cryptsetup-libs-2.3.3-4.el8.i686.rpm
8e1fd80823122a75f34ecf35f44eff3fd0f1e8f3ffbf978d12eed1eb98a0e20e
cryptsetup-libs-2.3.3-4.el8.i686.rpm
8e1fd80823122a75f34ecf35f44eff3fd0f1e8f3ffbf978d12eed1eb98a0e20e
cryptsetup-libs-2.3.3-4.el8.x86_64.rpm
7afe9f56a7f19a71cc73ef2d6c9282b4db223fdb9c05e5eba72ae750a4bb2803
cryptsetup-libs-2.3.3-4.el8.x86_64.rpm
7afe9f56a7f19a71cc73ef2d6c9282b4db223fdb9c05e5eba72ae750a4bb2803
cryptsetup-reencrypt-2.3.3-4.el8.x86_64.rpm
d524e31cda4501a631430e32931531e4e64e7abd0fdca060b9d4073fb67cce5f
cryptsetup-reencrypt-2.3.3-4.el8.x86_64.rpm
d524e31cda4501a631430e32931531e4e64e7abd0fdca060b9d4073fb67cce5f
integritysetup-2.3.3-4.el8.x86_64.rpm
4ad8c39126262e7f08749d46c8882879644f1b4653d5e052d6dd78d89f28bd71
integritysetup-2.3.3-4.el8.x86_64.rpm
4ad8c39126262e7f08749d46c8882879644f1b4653d5e052d6dd78d89f28bd71
veritysetup-2.3.3-4.el8.x86_64.rpm
01ae8bb6d7782ae884983fcb5aafd531db0978b2ca9f15bfb9b4f22cf49bd3e1
veritysetup-2.3.3-4.el8.x86_64.rpm
01ae8bb6d7782ae884983fcb5aafd531db0978b2ca9f15bfb9b4f22cf49bd3e1
RLEA-2021:1729
libseccomp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libseccomp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libseccomp-2.5.1-1.el8.i686.rpm
153b0d0b6e7a3759e858e4a4e52e19de2a8e81225a092b3ebeff41f8322edb29
libseccomp-2.5.1-1.el8.i686.rpm
153b0d0b6e7a3759e858e4a4e52e19de2a8e81225a092b3ebeff41f8322edb29
libseccomp-2.5.1-1.el8.x86_64.rpm
2e01a08c81cdb3bfab51e0fd0b8169116a529fe241e412b1a44fcd04b1f0ee28
libseccomp-2.5.1-1.el8.x86_64.rpm
2e01a08c81cdb3bfab51e0fd0b8169116a529fe241e412b1a44fcd04b1f0ee28
RLBA-2021:1730
chrony bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chrony.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
chrony-3.5-2.el8.x86_64.rpm
0ea13f33520264bb64d30b5270fb29498f9b31bf6c479c7472e6b5ec2628e8f9
RLBA-2021:1733
libndp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libndp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
libndp-1.7-5.el8.i686.rpm
fbe1d7a49de8f7e82e3ca6f1337e967af10bdc6aa09ec8da71998fc71c6d5d45
libndp-1.7-5.el8.x86_64.rpm
ae50e1e61446f4b7ec045dd49b17f21f6cd99f43588d4d3ec6d43f8b0972d667
RLBA-2021:1735
nvme-cli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nvme-cli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.4 Release Notes linked from the References section.
none-baseos-rpms
nvme-cli-1.12-3.el8.x86_64.rpm
0b19d8dced7d4aad1dec8f089e9953efaa2c7a0b6637161d3a814b3b7bafa957
RLBA-2021:1980
openssh bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux,
UNIX, and similar operating systems. It includes the core files necessary
for both the OpenSSH client and server.
Bug Fix(es) and Enhancement(s):
* openssh - client window fix (BZ#1942364)
none-baseos-rpms
openssh-8.0p1-6.el8_4.2.x86_64.rpm
de09059ff1e2036f95f69abfc366d8a5931f046cf54bca8e2438ab068e6745d8
openssh-cavs-8.0p1-6.el8_4.2.x86_64.rpm
518b60efe35caec005c2f4ee9ed4aa287555313e2c4f33794d555b74620302af
openssh-clients-8.0p1-6.el8_4.2.x86_64.rpm
03ca2ae9e1264d3918f6d4ca4deccd6ef4d1e0ebcbdedbe2108eaeec9877ede1
openssh-keycat-8.0p1-6.el8_4.2.x86_64.rpm
03fd94468c4aa87719fff816565f1d2db7a26161be17d110fa265962d07335fe
openssh-ldap-8.0p1-6.el8_4.2.x86_64.rpm
3ba6e1890fa77d405031db21d8800ba211d4742bce4a84cd3f48618223c97c11
openssh-server-8.0p1-6.el8_4.2.x86_64.rpm
81deccb763c88398b7dd3c078579809f7b7cea7b1741af928a44a289c9547b1b
pam_ssh_agent_auth-0.10.3-7.6.el8_4.1.x86_64.rpm
6119e1a6c81f095e0175c765537d776c19b1ed7d2d1fad0d2125b8132efb37d9
RLBA-2021:1981
dbus bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used
both for the system-wide message bus service, and as a
per-user-login-session messaging facility.
Bug Fix(es) and Enhancement(s):
* "Failed to reset fd limit before activating service:
org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit:
Operation not permitted" messages (BZ#1942052)
none-baseos-rpms
dbus-1.12.8-12.el8_4.2.x86_64.rpm
1084f05a63df0098dd8f95dedace852e0e3cde7bab4646fde7a12c74d6d7af14
dbus-common-1.12.8-12.el8_4.2.noarch.rpm
3bebc6b4e4458675968dc503961e1750f4555d2498a1ae7ae223e9b80888dec4
dbus-common-1.12.8-12.el8_4.2.noarch.rpm
3bebc6b4e4458675968dc503961e1750f4555d2498a1ae7ae223e9b80888dec4
dbus-daemon-1.12.8-12.el8_4.2.x86_64.rpm
bb6c2ee4610206deb05b0c05ec1b8883393580449eac41702e48c580cbaea72f
dbus-libs-1.12.8-12.el8_4.2.i686.rpm
16b53d8e4d9a85b0391d8ed98de9a64f443389aeba78c2fd9a113fd72c263cfb
dbus-libs-1.12.8-12.el8_4.2.x86_64.rpm
67b1e877d0efb9bcb423ca477f3703450c2bb13375414d22869ae8c990ec215d
dbus-tools-1.12.8-12.el8_4.2.x86_64.rpm
a0bab7ee52a4a800ed6ed28b592abf0cdaa925846933caeaf620ad069283e7c3
RLBA-2021:1988
bash bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bash packages provide Bash (Bourne-again shell), which is the default
shell for Rocky Linux.
Bug Fix(es) and Enhancement(s):
* bash loops forever trying to reap children, spins on the CPU (BZ#1947522)
none-baseos-rpms
bash-4.4.20-1.el8_4.x86_64.rpm
537f7063bdbcd72042105fc69167d42952d9bf7e8ca066c00cfcc251618a60f3
bash-doc-4.4.20-1.el8_4.x86_64.rpm
e07b86d8d04b9ded8419fdf4ee6400d3a929b064479bc4ef733eb64cc364bc4e
RLSA-2021:1989
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bind-export-devel-9.11.26-4.el8_4.i686.rpm
15bad35d27ceb5c4fd9f2b20feb3df7c3027dc552d638d5afbd814b5c21a6d62
bind-export-devel-9.11.26-4.el8_4.x86_64.rpm
b1e8ab5dc8fae1c0d004b1c2a45350e70b352f661bf04f6dbbe4a3b4fdbcd9a3
bind-export-libs-9.11.26-4.el8_4.i686.rpm
f839228af685dbedb155d45162c838682ddd6baf58f0167f53c52b5eebb44f26
bind-export-libs-9.11.26-4.el8_4.x86_64.rpm
fc71074c5df7d9cb4ab9dd143ecece8e5e17ccc94e6564fbd999feaebdb1b924
RLSA-2021:2168
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: userspace applications can misuse the KVM API to cause a write of 16 bytes at an offset up to 32 GB from vcpu->run (CVE-2021-3501)
* kernel: nitro_enclaves stale file descriptors on failed usercopy (CVE-2021-3543)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* OVS mistakenly using local IP as tun_dst for VXLAN packets (?) (BZ#1944667)
* Selinux: The task calling security_set_bools() deadlocks with itself when it later calls selinux_audit_rule_match(). (BZ#1945123)
* [mlx5] tc flower mpls match options does not work (BZ#1952061)
* mlx5: missing patches for ct.rel (BZ#1952062)
* CT HWOL: with OVN/OVS, intermittently, load balancer hairpin TCP packets get dropped for seconds in a row (BZ#1952065)
* [Lenovo 8.3 bug] Blackscreen after clicking on "Settings" icon from top-right corner. (BZ#1952900)
* Rocky Linux 8.x missing uio upstream fix. (BZ#1952952)
* Turbostat doesn't show any measured data on AMD Milan (BZ#1952987)
* P620 no sound from front headset jack (BZ#1954545)
* Rocky Linux kernel 8.2 and higher are affected by data corruption bug in raid1 arrays using bitmaps. (BZ#1955188)
* [net/sched] connection failed with DNAT + SNAT by tc action ct (BZ#1956458)
none-baseos-rpms
bpftool-4.18.0-305.3.1.el8_4.x86_64.rpm
183129b2273404855df90a26b2fe7ceafa035515b3b41c2616f5e280407c4880
kernel-4.18.0-305.3.1.el8_4.x86_64.rpm
446efe32a2ae0a8cd944bf19262fe2716285f9a4ab513e864d5afc41304dbf0e
kernel-abi-stablelists-4.18.0-305.3.1.el8_4.noarch.rpm
b517b95fbd88d945442ce178b58171f7d1c44de90c26fc570734511fc29c8bf9
kernel-abi-stablelists-4.18.0-305.3.1.el8_4.noarch.rpm
b517b95fbd88d945442ce178b58171f7d1c44de90c26fc570734511fc29c8bf9
kernel-core-4.18.0-305.3.1.el8_4.x86_64.rpm
0cbeffcc970b8ef1bd96fc87b129f1efc98af2629ca9b693fd18bf13351545dc
kernel-cross-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
ac0a0722d112dac78b9c8d6faa2987d822e8379c91b5e4b0c6829e68a38ab176
kernel-debug-4.18.0-305.3.1.el8_4.x86_64.rpm
15b03f7eade76185e4533dc00caae9f9d804937a353d5bdb77ac89bf71e5724a
kernel-debug-core-4.18.0-305.3.1.el8_4.x86_64.rpm
6ca566471351956699fc2a4d7f3afc16b48f9a753dc8ddb8d17ea9322bfca655
kernel-debug-devel-4.18.0-305.3.1.el8_4.x86_64.rpm
9e7f96d37a0f9c63e22c9b1bb05d61d6f0fd7c368f31ee5e2e8acb6b04016dcc
kernel-debuginfo-common-x86_64-4.18.0-305.3.1.el8_4.x86_64.rpm
195d8001ca05a8ad5edfb2e230886ac2407a331b6d83325dc71058d4c12fdc49
kernel-debug-modules-4.18.0-305.3.1.el8_4.x86_64.rpm
366ba71f855a9e579f93943762760afa7e6bdd0a233c9df7238409dfdfd6179f
kernel-debug-modules-extra-4.18.0-305.3.1.el8_4.x86_64.rpm
263e3386100003650265b4b6e5868182789330c425caa6efac86ded3b802a9f5
kernel-devel-4.18.0-305.3.1.el8_4.x86_64.rpm
018bdde319a2633fae3db77ba200d015742255ad455bcae6acd4aa6ae2b53f9b
kernel-doc-4.18.0-305.3.1.el8_4.noarch.rpm
40afba5d2cb0428ae6b3f81711b55c31e059cefb45c6b49530ad027e8f1908a2
kernel-doc-4.18.0-305.3.1.el8_4.noarch.rpm
40afba5d2cb0428ae6b3f81711b55c31e059cefb45c6b49530ad027e8f1908a2
kernel-headers-4.18.0-305.3.1.el8_4.x86_64.rpm
878b9355f91aa7a4cfa696dcc1a2f4dc0309a45e85df11c7fbda5c0516b2abba
kernel-modules-4.18.0-305.3.1.el8_4.x86_64.rpm
128eecfd6cad28b7621b7aaa70443cbb79c44b897de59b359c1160463b45be58
kernel-modules-extra-4.18.0-305.3.1.el8_4.x86_64.rpm
95d93624d43ecebdeb9839137a0b72c55e715567b2edae6b33ffbc114e569961
kernel-tools-4.18.0-305.3.1.el8_4.x86_64.rpm
f66dc5a6d69c4b8e6c5af7c29e64c753411a7ea610979a3e9795733940a06c89
kernel-tools-libs-4.18.0-305.3.1.el8_4.x86_64.rpm
2acaaa166b56ee099d1b2ad8274c3c49e77dacec28e55f7abd6b8f3dfe08448b
perf-4.18.0-305.3.1.el8_4.x86_64.rpm
4ddb0517bfa145b32f211419e1c6e563eacc687747a447ac38bc2339bad0355a
python3-perf-4.18.0-305.3.1.el8_4.x86_64.rpm
d1021e5487757a353d0db2cee312d072416f2e439f449dc315c436ef5ca0836e
RLSA-2021:2170
Important: glib2 security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Refcounting issue causes crashes and slow workarounds (BZ#1953553)
none-baseos-rpms
glib2-2.56.4-10.el8_4.i686.rpm
afb2f0e69f351d21ddc10b66bb94b90c0951a91a8a2294fa3324559c67d1457f
glib2-2.56.4-10.el8_4.x86_64.rpm
1999b12aeef9ef5720a7e06522c554b27dc1fcd7d84555425286fa12d615e0d9
glib2-devel-2.56.4-10.el8_4.i686.rpm
36ca5f06ae5d0806889cfa226dd7b87723be8c120199c53ea494bbc5d0db53f3
glib2-devel-2.56.4-10.el8_4.x86_64.rpm
73494ead3c496940439826668765ad01d20c9d0bdfd6aa18e092056a154dee41
glib2-fam-2.56.4-10.el8_4.x86_64.rpm
f146ce923df98f9ccb0b487eb807f75b5d95227b1f2bbe574b87e1b51e99a35e
glib2-tests-2.56.4-10.el8_4.x86_64.rpm
70217b81927c9809e98a7e2a8c69b3e4197b6456770690d5483641fe36eb4366
RLSA-2021:2238
Important: polkit security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for polkit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.
Security Fix(es):
* polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync() (CVE-2021-3560)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
polkit-0.115-11.el8_4.1.x86_64.rpm
3153e1d2e19d1ed5528da5abb6483bed60a7e569c4d54825ca185b66126b6173
polkit-devel-0.115-11.el8_4.1.i686.rpm
b53f68e3178aa6528760e86d3e29677671e928490652de1303655b82574b8b4d
polkit-devel-0.115-11.el8_4.1.x86_64.rpm
061ce39c9724ccc4ea0a631b2769aaa9b6918eaa383e36f1832ec9005698b93b
polkit-docs-0.115-11.el8_4.1.noarch.rpm
2291b90fe90153c989742fd4c03f9d709d97f0ecfa2be79b8f47abf43cba4370
polkit-docs-0.115-11.el8_4.1.noarch.rpm
2291b90fe90153c989742fd4c03f9d709d97f0ecfa2be79b8f47abf43cba4370
polkit-libs-0.115-11.el8_4.1.i686.rpm
b5427e570aab48e1dd4e0147933bf362cc869abfab677dfd6e2d046c1754fa0d
polkit-libs-0.115-11.el8_4.1.x86_64.rpm
3b9f5b0162dffa7fa4d47ba8aa433692ac8f2cbe1bcd3a46866261a4c30cc350
RLSA-2021:2308
Important: microcode_ctl security, bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
* hw: information disclosure on some Intel Atom processors (CVE-2020-24513)
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20210525 release
none-baseos-rpms
microcode_ctl-20210216-1.20210525.1.el8_4.x86_64.rpm
9c888f1456991b4c5cbd06bbff4d29205c6e0ba311a183bb38f6ce7cd94af860
RLSA-2021:2359
Important: dhcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dhcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
dhcp-client-4.3.6-44.el8_4.1.x86_64.rpm
90cd2206d2b5f4903eddcef2b3976d9055c31d0dc0d735bcfb52e777093b1316
dhcp-common-4.3.6-44.el8_4.1.noarch.rpm
07528bf3c775ff4e4b77a91611efaf6bb28c01f31e9ffb9949fff8d587e54a31
dhcp-common-4.3.6-44.el8_4.1.noarch.rpm
07528bf3c775ff4e4b77a91611efaf6bb28c01f31e9ffb9949fff8d587e54a31
dhcp-libs-4.3.6-44.el8_4.1.i686.rpm
d64ca96f1afecd1e53518d20901871c2bdb48610853621c1759d35cb010718cb
dhcp-libs-4.3.6-44.el8_4.1.x86_64.rpm
4f83e10ac30a16b28c2f468fcf87bcaa237054a40bff0995a5dbaa1cbff614ef
dhcp-relay-4.3.6-44.el8_4.1.x86_64.rpm
7b2756642ccdacae6284725b033cdb204d4a61e314e880d3d0c54ad6f5b75628
dhcp-server-4.3.6-44.el8_4.1.x86_64.rpm
f2a588e2a93fcd38aa2f11122b655277d7cb517f4a4261c8d1858f7398ec0d6c
RLBA-2021:2565
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according
to a selected profile.
Bug Fix(es) and Enhancement(s):
* Updates to the mssql tuned profile (BZ#1945617)
none-baseos-rpms
tuned-2.15.0-2.el8_4.1.noarch.rpm
8d56d391dcadedc679b094d0569b59bb18f9f0e3c99bb456b0e8887cb1961a15
tuned-2.15.0-2.el8_4.1.noarch.rpm
8d56d391dcadedc679b094d0569b59bb18f9f0e3c99bb456b0e8887cb1961a15
tuned-profiles-atomic-2.15.0-2.el8_4.1.noarch.rpm
e0a8e4ac0595e2e28f3d844382a34e8f90637184131efe0288206aa09fc51da8
tuned-profiles-atomic-2.15.0-2.el8_4.1.noarch.rpm
e0a8e4ac0595e2e28f3d844382a34e8f90637184131efe0288206aa09fc51da8
tuned-profiles-compat-2.15.0-2.el8_4.1.noarch.rpm
b9428975589fdab986830306470328db6f077f67b5ef85c3d735c239195fb3b2
tuned-profiles-compat-2.15.0-2.el8_4.1.noarch.rpm
b9428975589fdab986830306470328db6f077f67b5ef85c3d735c239195fb3b2
tuned-profiles-cpu-partitioning-2.15.0-2.el8_4.1.noarch.rpm
f6074d990a303cc915def05e81b8d71a905ea7ccc6e1d563490feddc86952a9d
tuned-profiles-cpu-partitioning-2.15.0-2.el8_4.1.noarch.rpm
f6074d990a303cc915def05e81b8d71a905ea7ccc6e1d563490feddc86952a9d
tuned-profiles-mssql-2.15.0-2.el8_4.1.noarch.rpm
148b57ccb210fe71b86631e035b34f1a626b2d36d278059593b80277740064f4
tuned-profiles-mssql-2.15.0-2.el8_4.1.noarch.rpm
148b57ccb210fe71b86631e035b34f1a626b2d36d278059593b80277740064f4
tuned-profiles-oracle-2.15.0-2.el8_4.1.noarch.rpm
3c9175fb1420df35e93a93f4ae1d83ddf500c8ebacba2bf133a1cb78bacdb363
tuned-profiles-oracle-2.15.0-2.el8_4.1.noarch.rpm
3c9175fb1420df35e93a93f4ae1d83ddf500c8ebacba2bf133a1cb78bacdb363
RLSA-2021:2566
Moderate: fwupd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fwupd packages provide a service that allows session software to update device firmware.
Security Fix(es):
* grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372)
* grub2: Use-after-free in rmmod command (CVE-2020-25632)
* grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647)
* grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749)
* grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779)
* grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225)
* grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
fwupd-1.5.9-1.el8_4.x86_64.rpm
6428e3760c3522f9bd5fc756b9b1bd1be53d1ca22f69b712f72b775233b0a320
RLBA-2021:2568
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's
kexec feature either on a normal or a panic reboot. The kexec fastboot
mechanism allows booting a Linux kernel from the context of an already
running kernel.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux8] SSH/NFS kdump failed if static ip:
/usr/lib/dracut/modules.d/99kdumpbase/module-setup.sh: line 145: ipcalc:
command not found (BZ#1959655)
none-baseos-rpms
kexec-tools-2.0.20-46.el8_4.1.x86_64.rpm
05450c7cdd94d77c4c9d3d338df301f592eadcd50e0c2e426e886ee8bfe26fb0
RLSA-2021:2569
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)
* libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)
* libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)
* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)
* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-9.el8_4.2.i686.rpm
d59784f8e20a1f8ba9c310d5fee3352152e63c6e96ad2456a66598ba9e21c836
libxml2-2.9.7-9.el8_4.2.x86_64.rpm
1756ec3478c53a952219521b0767c355a9a95e4613c5f578f976d972684a860f
python3-libxml2-2.9.7-9.el8_4.2.x86_64.rpm
379350a752632d2dae142c29d51407cd36efd5b6fa2de7381b89823740d52523
RLSA-2021:2570
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034)
* kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [ESXi][Rocky Linux-8] VMXNET3 v4 causes invalid checksums of inner packets of VXLAN tunnel (BZ#1960702)
* fnic crash from invalid request pointer (BZ#1961705)
* GFS2: Failed FS thaw call makes the entire snapshot failed. (BZ#1961849)
* dm writecache: fix performance degradation in ssd mode (BZ#1962241)
* Kernel BUG with act_ct and IP fragments (BZ#1963940)
* core: backports from upstream (BZ#1963952)
* Hibernate resume on Rocky Linux fails in Amazon EC2 C5.18xlarge instance (BZ#1964930)
* [SanityOnly] panic caused by i40e_msix_clean_rings (BZ#1964962)
* tc reclassification limit is too low for OVN (BZ#1965148)
* tc action ct nat src addr does not work while used with ct nat dst addr together (BZ#1965150)
* CNB: Rebase/update TC subsystem for Rocky Linux 8.5 (BZ#1965457)
* sctp: crash due to use after free of sctp_transport structure (BZ#1965632)
none-baseos-rpms
bpftool-4.18.0-305.7.1.el8_4.x86_64.rpm
9e999a60ac19db194e35d7e593f7b9bb4d91931733283408ad4cb085054aa018
kernel-4.18.0-305.7.1.el8_4.x86_64.rpm
5656f82ab1cf2c3f03451b618bb60530f059e64fbf0eeebfd16c7c26980ce5bc
kernel-abi-stablelists-4.18.0-305.7.1.el8_4.noarch.rpm
ec2397fe0271ac6473c3e4a61664ebf3055ec4d6d277afb60bf598b9ec308711
kernel-abi-stablelists-4.18.0-305.7.1.el8_4.noarch.rpm
ec2397fe0271ac6473c3e4a61664ebf3055ec4d6d277afb60bf598b9ec308711
kernel-core-4.18.0-305.7.1.el8_4.x86_64.rpm
54a5455e07dbdeb7887048286945f2451273461f1dca124f06c44a36f2f79731
kernel-cross-headers-4.18.0-305.7.1.el8_4.x86_64.rpm
d9218354bf4df629c7af8e5871c693b3d2c570fe3c27e32553f885d351686f31
kernel-debug-4.18.0-305.7.1.el8_4.x86_64.rpm
3f9996d97f7abc8c8ba57fa7a674e679ebd4221c7d166079dbedbf934a819108
kernel-debug-core-4.18.0-305.7.1.el8_4.x86_64.rpm
15b314eef70846457405ed5722832100527500b397e1d934945aaee8a62e6017
kernel-debug-devel-4.18.0-305.7.1.el8_4.x86_64.rpm
aafef56963099bcfbcafb25b7ddbf9009884289328ff6bb2b35a547d21164193
kernel-debuginfo-common-x86_64-4.18.0-305.7.1.el8_4.x86_64.rpm
a8ba2f1816fac141a97ea17ee4f33a66c0ed8e0dd33031d5edd3e1350ca6bc86
kernel-debug-modules-4.18.0-305.7.1.el8_4.x86_64.rpm
a486eec715fa34f9bfb644cc8d731e61a5d7d7345a3a26ec85308e65dac1f493
kernel-debug-modules-extra-4.18.0-305.7.1.el8_4.x86_64.rpm
9c3248cbad216cce0db34c474083d881e667f03f2a63d4521bdc0e414bc29ba2
kernel-devel-4.18.0-305.7.1.el8_4.x86_64.rpm
8bbe8ba7b654bf7d629702f7c4a95d98a45d5b20360b546381878b1c24e95d5d
kernel-doc-4.18.0-305.7.1.el8_4.noarch.rpm
238df13cf74ccc9baa28a03989d9f8a3e804d703c89594395a9b4dc657a233b3
kernel-doc-4.18.0-305.7.1.el8_4.noarch.rpm
238df13cf74ccc9baa28a03989d9f8a3e804d703c89594395a9b4dc657a233b3
kernel-headers-4.18.0-305.7.1.el8_4.x86_64.rpm
7acfdc3aa10c8df47ca2436262d3f064a506d77fa7689fafc9f1080a44ef4244
kernel-modules-4.18.0-305.7.1.el8_4.x86_64.rpm
b1d64e32184edf230171046c64dbd28c18f4fb560f9d46dea7068225bd88e73a
kernel-modules-extra-4.18.0-305.7.1.el8_4.x86_64.rpm
f4074b47687dd76a6a9fad0305ecaaa07c9241543308bca77cac1646e4ecfb3b
kernel-tools-4.18.0-305.7.1.el8_4.x86_64.rpm
805753119eab96e1e56c65ea4bd0fcca31f653f843b4f9b1ce2a92d03592d938
kernel-tools-libs-4.18.0-305.7.1.el8_4.x86_64.rpm
eac2222c74300bad6d9694bb2c87758abcbc2193fe1d8027013b0a0393606af5
perf-4.18.0-305.7.1.el8_4.x86_64.rpm
2fe892031e32d74479470f31ebb6a3edba0d86442d35d54f23b48064fc928976
python3-perf-4.18.0-305.7.1.el8_4.x86_64.rpm
ff163470fd74585f598016cc65cda2eeb0f47364b89b7ce268dc7e11431ae4f8
RLBA-2021:2571
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of
daemons to manage access to remote directories and authentication
mechanisms. It also provides the Name Service Switch (NSS) and the
Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Wrong default debug level of sssd tools (BZ#1942438)
* IPA missing secondary IPA Posix groups in latest sssd 1.16.5-10.el7_9.7
(BZ#1945654)
* SSSD not detecting subdomain from AD forest (Rocky Linux 8.3) (BZ#1945655)
* No gpo found and ad_gpo_implicit_deny set to True still permits user
login (BZ#1945656)
* pam_sss_gss.so doesn't work with large kerberos tickets (BZ#1949170)
none-baseos-rpms
libipa_hbac-2.4.0-9.el8_4.1.i686.rpm
e8058792834be1ceb247766e5827d2624f2cbcfc82d08fc6b0959195276b2d6a
libipa_hbac-2.4.0-9.el8_4.1.x86_64.rpm
b8ad3923b44a8c63f3af7b6f82ce1033e3e804ecc6522abda3f996105e126f12
libsss_autofs-2.4.0-9.el8_4.1.x86_64.rpm
ab4134abc14cfaa76d80a911faadc92a956437d8cb6f28000bcbe7078bde882f
libsss_certmap-2.4.0-9.el8_4.1.i686.rpm
740fcd4a9f0d5faa748ad4fbba6e9832433a99ded2fde648633cd96c263c2e1c
libsss_certmap-2.4.0-9.el8_4.1.x86_64.rpm
69fc6474a0144aa2290d9c1e3c560b2572513df14e9cbaa1442add67a721fbe1
libsss_idmap-2.4.0-9.el8_4.1.i686.rpm
af5002affc19e233459e07bbba7f3f1b3fd04cab8336014b347695be28549485
libsss_idmap-2.4.0-9.el8_4.1.x86_64.rpm
2d6fcc29afe247e275085d862141df423ef7819c755ffd9e6f9ab7e0dcb3eca1
libsss_nss_idmap-2.4.0-9.el8_4.1.i686.rpm
722345c9965452c78d04a87d7919ab671d4b611115ee9e8ae310e0f5ed7dcadb
libsss_nss_idmap-2.4.0-9.el8_4.1.x86_64.rpm
f3b83be4dbd24e7470ebc9814a59be81a77fa128f42d2edd0576602cf98e62f2
libsss_simpleifp-2.4.0-9.el8_4.1.i686.rpm
5660a47ddc9227ec5acd682819a672cd5a975b9900091dbf36006c56a6a06e7f
libsss_simpleifp-2.4.0-9.el8_4.1.x86_64.rpm
2bb541cf4f7f6a3842d4be1886795e7537ada49097b242252a1a6e55686819eb
libsss_sudo-2.4.0-9.el8_4.1.x86_64.rpm
68ba62c728cbb1d44217a8da854b94b56ecb40f67806d2ebb611ffe3e302be7f
python3-libipa_hbac-2.4.0-9.el8_4.1.x86_64.rpm
ac3f15d8331ef3beab0122e8221dddbcc48a4a47491d28f2fe533bf6ccc16a99
python3-libsss_nss_idmap-2.4.0-9.el8_4.1.x86_64.rpm
e39d628abae68f7c8301f8885314a07f5e75b933aeb20ff69c604703f8a0c000
python3-sss-2.4.0-9.el8_4.1.x86_64.rpm
00ca8e40717baa23de7e96647a68e7da6a692f5b7d3274bcef74f2b8599ad0ab
python3-sssdconfig-2.4.0-9.el8_4.1.noarch.rpm
1c11c61e8d0f8dd603b06d9f04f5826ce7917c00db8e2a63b613e5f3f3d369ef
python3-sssdconfig-2.4.0-9.el8_4.1.noarch.rpm
1c11c61e8d0f8dd603b06d9f04f5826ce7917c00db8e2a63b613e5f3f3d369ef
python3-sss-murmur-2.4.0-9.el8_4.1.x86_64.rpm
0a722434c4a3aa91b20e58c957eddd30fc7fbb0f68579d4dd16e6cf5b5561bb4
sssd-2.4.0-9.el8_4.1.x86_64.rpm
3498b815b973dd6424f729c8c1f4f216379530fbe632fa7cf6965f93cab37768
sssd-ad-2.4.0-9.el8_4.1.x86_64.rpm
9b027813601bb57ab2d668987774f6c419f58daebfb30bd3b7eba4c3062c6a51
sssd-client-2.4.0-9.el8_4.1.i686.rpm
63daa200fbb5823ecf17a94dcc9e347bcd63d94aa6f44c3cb961c5cdd7bfa823
sssd-client-2.4.0-9.el8_4.1.x86_64.rpm
bc751b2ab3ffe2d0a43a2e70481da52ad262cc2c12b99fdccb265362415b608a
sssd-common-2.4.0-9.el8_4.1.x86_64.rpm
bab9827143d513670ceec647f72b0de430d4c11820298b1b2a8fe6050185d9c8
sssd-common-pac-2.4.0-9.el8_4.1.x86_64.rpm
b44a19221f0548b5470ee01609881d490ff76b6ef7642f896455ef4f3fd828a8
sssd-dbus-2.4.0-9.el8_4.1.x86_64.rpm
61695357869f3f9afbb92078ef8e5029c2b7a4cee60fca94856083bca2701c26
sssd-ipa-2.4.0-9.el8_4.1.x86_64.rpm
7edf3e301cd2597edc754c0e0ab995e76665890c849e77d82034247f1495cf2f
sssd-kcm-2.4.0-9.el8_4.1.x86_64.rpm
ee344dd9b6cbdcfe972bdc68707de0d850c0d847cf0f9ee27bd7e73d3c2dcb73
sssd-krb5-2.4.0-9.el8_4.1.x86_64.rpm
3de3faa47cebd503d09e7c93ac495435aaf40cc714e1d78c18237abf5e1a455f
sssd-krb5-common-2.4.0-9.el8_4.1.x86_64.rpm
83d9adb457f1469301dbe7675e5ce24791de018efc9b2571ca6842fe666df681
sssd-ldap-2.4.0-9.el8_4.1.x86_64.rpm
9466c8148e93f28fc3366768025a3a813f0a1918a2e8ed0b79498e0acec614e9
sssd-libwbclient-2.4.0-9.el8_4.1.x86_64.rpm
b0f6ef383b5eae9dd1e2a7cfed911528c9369fcad48170f6cb3f3ff90e39d9d7
sssd-nfs-idmap-2.4.0-9.el8_4.1.x86_64.rpm
295c1ba9c0d655f39c9a564a0835e15ef9da299d9ea5940da3416cd80aa00234
sssd-polkit-rules-2.4.0-9.el8_4.1.x86_64.rpm
a8225a6f0f2dd674ff65e45a5ff2a3b4e0f772ea2393401a7f0b60cc7ceeec23
sssd-proxy-2.4.0-9.el8_4.1.x86_64.rpm
b51e2106d23a6a8773151e0f4a0413e7d654e083b85479c7e9b9411f03217e64
sssd-tools-2.4.0-9.el8_4.1.x86_64.rpm
b91ee83ecf4e2da22aad0e2ffd6bf48189b41885fb8fab2900db161a38c9c033
sssd-winbind-idmap-2.4.0-9.el8_4.1.x86_64.rpm
55fb9bab56de821265abefcc3d8cd4bbd70340f22fb3e3cbd6edd4f81cd81d61
RLBA-2021:2572
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for
Linux, compatible with the SysV and LSB init scripts. It provides
aggressive parallelism capabilities, uses socket and D-Bus activation for
starting services, offers on-demand starting of daemons, and keeps track of
processes using Linux cgroups. In addition, it supports snapshotting and
restoring of the system state, maintains mount and automount points, and
implements an elaborate transactional dependency-based service control
logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.4 takes long time to boot up FC server with LUNs attached
(BZ#1963980)
none-baseos-rpms
systemd-239-45.el8_4.1.i686.rpm
7bd0dfcc4b16c6acb2131e9f475cce4265df473b36931cccf81746a23262e1e5
systemd-239-45.el8_4.1.x86_64.rpm
65c8bfbd00557c68119d0f7251c816fc9c990c8a14e980d05938b97f83a689d2
systemd-container-239-45.el8_4.1.i686.rpm
aa59c436fc989689acda4867fd4889c3fd9e56b400c8ca3ad383a338a23e6226
systemd-container-239-45.el8_4.1.x86_64.rpm
90bc47d896adc99c5c683432acb9271f3a612e54ec76dba3bae853a17a3d4a0f
systemd-devel-239-45.el8_4.1.i686.rpm
da55998c512028e17f3849b44ad9fbb42adfa6f660077ef3adda1310415dec9f
systemd-devel-239-45.el8_4.1.x86_64.rpm
94625ae4220c64d9d686a959040781b2d2eef58e7254457b2f3a9149a51625aa
systemd-journal-remote-239-45.el8_4.1.x86_64.rpm
c897a734b65cbf6217495931b1c27b0f102b3718d737ec0e36db22242406922c
systemd-libs-239-45.el8_4.1.i686.rpm
f33c3c4f2c5555fe27444b722d5a01761e9a29ba00a3688b52cc6a5e950f1100
systemd-libs-239-45.el8_4.1.x86_64.rpm
60caa5732529cb992838afad1f60434e7f728ff8cad76afc7ba18690ae5e45c5
systemd-pam-239-45.el8_4.1.x86_64.rpm
32849e2d49562988429705da5ec62c8e4435ec20e300a3fd7bf5aceaa548ff37
systemd-tests-239-45.el8_4.1.x86_64.rpm
745caf5d69f1b1da1e6a1ebccbe2ed5bd14313a7ec83f7fd64742ee9692c809d
systemd-udev-239-45.el8_4.1.x86_64.rpm
2b0def7381d55a214addfb9a2f613dec20c51468c1deb12df4168a491a57b8c3
RLBA-2021:2573
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sanlock packages provide a shared storage lock manager. Hosts with
shared access to a block device or a file can use sanlock to synchronize
their activities. VDSM and libvirt use sanlock to synchronize access to
shared devices or files.
Bug Fix(es) and Enhancement(s):
* bad client message causes closed connection and released leases
(BZ#1965481)
* Expose sanlock_inquire() in python bindings (BZ#1965483)
none-baseos-rpms
sanlock-lib-3.8.3-3.el8_4.i686.rpm
d2a4845bc38f8fa7b56fde6cf3387aec24d456c7b111fe6d8ececc94a1d14b03
sanlock-lib-3.8.3-3.el8_4.x86_64.rpm
60f3cec3d2d2ee7a04f69078cd120999ae12b66cbac5e98884dc69a165ba1c62
RLSA-2021:2574
Moderate: rpm security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Security Fix(es):
* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-rpm-4.14.3-14.el8_4.x86_64.rpm
d1689ef59a10353ccf79177ade34d652ba01058f802664a8c7e7d943b1b27d8f
rpm-4.14.3-14.el8_4.x86_64.rpm
0760740095034c2e37abd3f267d06dc5527388476fc1223078cbd906865caf95
rpm-apidocs-4.14.3-14.el8_4.noarch.rpm
955f914d3e4a9a9b8e575c99028d935ad636de199b877fdfd9fd26fdefac4014
rpm-apidocs-4.14.3-14.el8_4.noarch.rpm
955f914d3e4a9a9b8e575c99028d935ad636de199b877fdfd9fd26fdefac4014
rpm-build-libs-4.14.3-14.el8_4.i686.rpm
b3f9fb44a778f74a09daaa0e7671d4e23c5e1ee1e599a412eb85e72bb27cb07e
rpm-build-libs-4.14.3-14.el8_4.x86_64.rpm
95c9ccd2d51ef6f8f7476a7abf2dc6f810511f2e44699ac71f5fe10f66684104
rpm-cron-4.14.3-14.el8_4.noarch.rpm
5d3f615fabad399d40bcd5046bf57cf8fd007363b1acfdc4e77d9036c94f6300
rpm-cron-4.14.3-14.el8_4.noarch.rpm
5d3f615fabad399d40bcd5046bf57cf8fd007363b1acfdc4e77d9036c94f6300
rpm-devel-4.14.3-14.el8_4.i686.rpm
0428e8922e36153ebfb72a647cf3287434298571658b4537d857fdefdc069061
rpm-devel-4.14.3-14.el8_4.x86_64.rpm
c087c9d03c14f8ec3c15c400bd0a61cff51fccaf04420a92e1f44b2b0b53a39a
rpm-libs-4.14.3-14.el8_4.i686.rpm
ea33521f801cad9b70ea870132d11bc0dc07688ebda9f8de8d7523f854c400be
rpm-libs-4.14.3-14.el8_4.x86_64.rpm
c0be9cab1f35852ee066450bb72bf433f596cfa35453302f4573dee14b5a4b96
rpm-plugin-ima-4.14.3-14.el8_4.x86_64.rpm
b4b5362b0b33f8257d1aea0126ac01d5ade4d7ca97249c44a1d81751da1f78cc
rpm-plugin-prioreset-4.14.3-14.el8_4.x86_64.rpm
b5d21ae09da5e465e5a6e49af8b32aa2fc7eb279c8351e519e60c66ed62991b7
rpm-plugin-selinux-4.14.3-14.el8_4.x86_64.rpm
4c37037a1d261544d277726d0697c1806a0ea3f2da43350cf8e48a3ef995afd4
rpm-plugin-syslog-4.14.3-14.el8_4.x86_64.rpm
9b0def2f0c1dc5a38fc2cdeaa1c337abf34be92d22b2a8dc13e6f504872f827c
rpm-plugin-systemd-inhibit-4.14.3-14.el8_4.x86_64.rpm
7a6c18ea2a2a075b994096f5046d5818c22cd09f1301ce894e6dceb1faf6d859
rpm-sign-4.14.3-14.el8_4.x86_64.rpm
b831ea67a3cffe2195e406b9b96ba1b0e592d9b5845baaddb428017fa6787941
RLBA-2021:2576
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and
connections, attempting to keep active network connectivity when available.
Its capabilities include managing Ethernet, wireless, mobile broadband
(WWAN), and PPPoE devices, as well as providing VPN integration with a
variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* [NMCI] Automatic connection not removed when veth device gets removed
(BZ#1965336)
* [SNO][assisted-operator][nmstate] Bond Interface is down when booting
from the discovery ISO (BZ#1965337)
* NetworkManager doesn't honour tlb_dynamic_lb=0 when creating a bonding
device with mode=balance-alb (BZ#1965948)
* Provide a way to ignore existing TC qdiscs and filters (BZ#1972566)
none-baseos-rpms
NetworkManager-1.30.0-9.el8_4.x86_64.rpm
928208d1db746ee5668970800af881527bb77db8a083ff12a19c68cc4c0025b0
NetworkManager-adsl-1.30.0-9.el8_4.x86_64.rpm
5361523d64c5654ccc5675a794020ab81cf8379a17580e6982095a9bc4f68d0c
NetworkManager-bluetooth-1.30.0-9.el8_4.x86_64.rpm
98d9c1e253d02445d230b7b760edd1c3d92e54f0fe82b5783b7d3370b5c57650
NetworkManager-config-connectivity-redhat-1.30.0-9.el8_4.noarch.rpm
f3ba429069a37287930ef1dd357bacd4a5bd7592053c9b91f02e1708a5f1a777
NetworkManager-config-connectivity-redhat-1.30.0-9.el8_4.noarch.rpm
f3ba429069a37287930ef1dd357bacd4a5bd7592053c9b91f02e1708a5f1a777
NetworkManager-config-server-1.30.0-9.el8_4.noarch.rpm
6aa36a5643f70de98b581f1c6ec94e8e8423d732d870562286d9d646ea8ab3b4
NetworkManager-config-server-1.30.0-9.el8_4.noarch.rpm
6aa36a5643f70de98b581f1c6ec94e8e8423d732d870562286d9d646ea8ab3b4
NetworkManager-dispatcher-routing-rules-1.30.0-9.el8_4.noarch.rpm
c9ebb18523db0e5b57d5a87ea809c36a1ea396cf7118e120808122cbb391543a
NetworkManager-dispatcher-routing-rules-1.30.0-9.el8_4.noarch.rpm
c9ebb18523db0e5b57d5a87ea809c36a1ea396cf7118e120808122cbb391543a
NetworkManager-libnm-1.30.0-9.el8_4.i686.rpm
e085ef0174942d7542e7272268e6eabae8d22299884fedf929d4d9c6791e7d72
NetworkManager-libnm-1.30.0-9.el8_4.x86_64.rpm
f6f9cfbcf9dc11a69b295864aa151a86803ac1ce8225aecf29ab6336c94a16c6
NetworkManager-ovs-1.30.0-9.el8_4.x86_64.rpm
f527e1020ae5670c19aa7ae585c5968b3f11f402e3d16c0fddddab990b767054
NetworkManager-ppp-1.30.0-9.el8_4.x86_64.rpm
d8fe8b8666f67606ddcee23f363b33e008de85b88099cd2c5892e763ce256ae5
NetworkManager-team-1.30.0-9.el8_4.x86_64.rpm
e5d19c023d34cb6a82356da021e7ebf0a043142049b3a4048c962135bf6537c0
NetworkManager-tui-1.30.0-9.el8_4.x86_64.rpm
2768b4518315a1095d93c194ae00717545c49e34f159a4411212cca335a6d549
NetworkManager-wifi-1.30.0-9.el8_4.x86_64.rpm
2e15dff1b9c37b24736e79c91bd6a057fd8aa20249db1760c7eb01ca1cf4281d
NetworkManager-wwan-1.30.0-9.el8_4.x86_64.rpm
54ba2aa4abd8c687e383d3804dafeaa5cd86324a4f7729aaaf8c4e4d6d420bff
RLBA-2021:2577
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The subscription-manager packages provide programs and libraries to allow
users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation
entitlement platform.
Bug Fix(es) and Enhancement(s):
* dnf uploadprofile does not read variables set by files in /etc/yum/vars/
(BZ#1951053)
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.13-3.el8_4.x86_64.rpm
54aab393daf2e521c8c19c8d30cc0ba0669cc99c35b00d8c9405fa01f1ca3963
python3-subscription-manager-rhsm-1.28.13-3.el8_4.x86_64.rpm
e7655d79e0cea012f1ab1300f1b88ab54d1dec0e20497839d71ec4187551f834
python3-syspurpose-1.28.13-3.el8_4.x86_64.rpm
75f4aee6cabcc2a8da0d15b0bc95dcf31e942744eddbc5ac51e405e9c4f41d16
rhsm-icons-1.28.13-3.el8_4.noarch.rpm
4bc6232c7c1ceb710cd4c5220ab874683e2109881688e348e791e0b1ece79965
rhsm-icons-1.28.13-3.el8_4.noarch.rpm
4bc6232c7c1ceb710cd4c5220ab874683e2109881688e348e791e0b1ece79965
subscription-manager-1.28.13-3.el8_4.x86_64.rpm
4ef8979c0165c84685b5efbc1246c9a5138eb8fd0763319bd9c740b7d15e9836
subscription-manager-cockpit-1.28.13-3.el8_4.noarch.rpm
c2c12a33785a8c81ef1150a52c8943f6e9a5982edf8c2461b445156fb503d3d5
subscription-manager-cockpit-1.28.13-3.el8_4.noarch.rpm
c2c12a33785a8c81ef1150a52c8943f6e9a5982edf8c2461b445156fb503d3d5
subscription-manager-plugin-ostree-1.28.13-3.el8_4.x86_64.rpm
9dba68266b4fc18ceb3175e20a1067dc8ce3ac417db21bcf865347d0d42e4a39
subscription-manager-rhsm-certificates-1.28.13-3.el8_4.x86_64.rpm
8a37cf3cc278ef0fc224713b7fb02f94f555bb15c8152feccf93a5be1a50c17c
RLBA-2021:2578
unzip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unzip utility is used to list, test, and extract files from zip
archives.
Bug Fix(es) and Enhancement(s):
* Sync the various fixes for the zip-bomb detection (cloned for Rocky Linux 8.4.z)
(BZ#1970326)
none-baseos-rpms
unzip-6.0-45.el8_4.x86_64.rpm
317f2f2a947739278dd6c619a0fbb53e7c3878132385d9ae326b04f5dfbe11d3
unzip-6.0-45.el8.x86_64.rpm
500f19921ec1fd892112e6044168791f86ca4c31bcd344da9289f284cbf17277
RLBA-2021:2579
nvme-cli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nvme-cli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The nvme-cli packages provide the Non-volatile Memory Express (NVMe)
command-line interface to manage and configure NVMe controllers.
Bug Fix(es) and Enhancement(s):
* [Lenovo 8.5 FEAT] nvme-cli update (BZ#1970382)
none-baseos-rpms
nvme-cli-1.12-4.el8_4.x86_64.rpm
ebbeeaeae682796dd43019ce29c56a540a4f2bcab2f429c73b8954d262d055ab
RLBA-2021:2580
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
firewalld is a firewall service daemon that provides a dynamic customizable
firewall with a D-Bus interface.
Bug Fix(es) and Enhancement(s):
* allow firewalld to set 16+ char long device names interfaces (like ovs
interfaces can be) (BZ#1955594)
none-baseos-rpms
firewalld-0.8.2-7.el8_4.noarch.rpm
df084b00f05c91c50e048ee20ce31705f8bc9b87b80fa2e352d53784acb672ff
firewalld-0.8.2-7.el8_4.noarch.rpm
df084b00f05c91c50e048ee20ce31705f8bc9b87b80fa2e352d53784acb672ff
firewalld-filesystem-0.8.2-7.el8_4.noarch.rpm
a35c21fbb221611e6c309d319210f00b5f4978a7eb64fd3a8f563ad79b23abfb
firewalld-filesystem-0.8.2-7.el8_4.noarch.rpm
a35c21fbb221611e6c309d319210f00b5f4978a7eb64fd3a8f563ad79b23abfb
python3-firewall-0.8.2-7.el8_4.noarch.rpm
313f800ac556b3a2d52ef5ef94a0b63c42f463805bfb8547d084d563a5e39bd6
python3-firewall-0.8.2-7.el8_4.noarch.rpm
313f800ac556b3a2d52ef5ef94a0b63c42f463805bfb8547d084d563a5e39bd6
RLBA-2021:2581
openldap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenLDAP is an open-source suite of Lightweight Directory Access Protocol
(LDAP) applications and development tools. LDAP is a set of protocols used
to access and maintain distributed directory information services over an
IP network. The openldap packages contain configuration files, libraries,
and documentation for OpenLDAP.
Bug Fix(es) and Enhancement(s):
* got undefined symbol: EVP_md2, version OPENSSL_1_1_0 after upgrading from
openldap-2.4.46-11 to openldap-2.4.46-15 (BZ#1972742)
none-baseos-rpms
openldap-2.4.46-17.el8_4.i686.rpm
da58aa7dfed8cb527119e96644a52ca30c7976a357f3b70247554bcee0492839
openldap-2.4.46-17.el8_4.x86_64.rpm
1257c7020f5981322895edc9d6f8f058deac1241ceea32b5dec1e25f275d108b
openldap-clients-2.4.46-17.el8_4.x86_64.rpm
d924dd6f317b7c94d43c872f046a97e789b86cccf297cca29456e82e6cda6890
openldap-devel-2.4.46-17.el8_4.i686.rpm
5b0a59e718f06e7b6cb7ecea3593b5665eeaa08334f13006abdbf3a5f2c73b77
openldap-devel-2.4.46-17.el8_4.x86_64.rpm
456b005c3670a007165aba107c8b133e36ef88c5ee919d041a4174c2e97710c8
RLSA-2021:2714
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909)
* kernel: race condition for removal of the HCI controller (CVE-2021-32399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* pinctrl_emmitsburg: improper configuration (BZ#1963984)
* [Ampere] locking/qrwlock: Fix ordering in queued_write_lock_slowpath (BZ#1964419)
* Rocky Linux8.4 - [P10] [NPIV Multi queue Test kernel- 4.18.0-283.el8.ibmvfc_11022021.ppc64le] DLPAR operation fails for ibmvfc on Denali (ibmvfc/dlpar/Rocky Linux8.4) (BZ#1964697)
* Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967099)
* backport fixes for Connection Tracking offload (BZ#1968679)
* fm10k: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969910)
* ixgbevf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969911)
* ena: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969913)
* b44, bnx2, bnx2x, bnxt, tg3: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969914)
* e1000, e1000e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969915)
* ice: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969917)
* igb: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969919)
* igbvf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969920)
* igc: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969921)
* ixgbe: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969922)
* i40e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969923)
* iavf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969925)
* Backport netlink extack tracepoint (BZ#1972938)
* [Rocky Linux8.4] kernel panic when create NPIV port on qedf driver (BZ#1974968)
none-baseos-rpms
bpftool-4.18.0-305.10.2.el8_4.x86_64.rpm
764718c61d71bd243da691836f80bd98a2b242bbfc6d37ed8ed117e918cd945b
kernel-4.18.0-305.10.2.el8_4.x86_64.rpm
2a0bfb46d2dc90c015870ca81b2a900252aa2542be67fdd67a606edabe38a83f
kernel-abi-stablelists-4.18.0-305.10.2.el8_4.noarch.rpm
f0f66afb3a7d687515317fde4572f13b00bec2ca5a9899b94b6ddfee4b40ca6d
kernel-abi-stablelists-4.18.0-305.10.2.el8_4.noarch.rpm
f0f66afb3a7d687515317fde4572f13b00bec2ca5a9899b94b6ddfee4b40ca6d
kernel-core-4.18.0-305.10.2.el8_4.x86_64.rpm
7469f90326990ae80bad7e23472a5efac3d327f938e79e9795e4ee16f38b88d9
kernel-cross-headers-4.18.0-305.10.2.el8_4.x86_64.rpm
8cfecf398c6820be4a4e87b499f3fd65282a42ad0a8f584314963ce2faf33c1f
kernel-debug-4.18.0-305.10.2.el8_4.x86_64.rpm
17c555cb8d58a7c5b4bb353b9cd348f7364fdfcbe92f6a0eb2e71bd7e0bef77d
kernel-debug-core-4.18.0-305.10.2.el8_4.x86_64.rpm
6aba30279ae30608dc93e5f737db32809a0ab794a2f7620101f60f112d91eebf
kernel-debug-devel-4.18.0-305.10.2.el8_4.x86_64.rpm
632fd3efabb2f6e6aeddea6f1bdca4249261eec0aad3af6e0e11d26a5244f768
kernel-debuginfo-common-x86_64-4.18.0-305.10.2.el8_4.x86_64.rpm
539698d2d35bdf662f3120468f871c7135dbe41f8b5b6f28fbd4665f21e86aa7
kernel-debug-modules-4.18.0-305.10.2.el8_4.x86_64.rpm
b9cbc7676db7a4acda58ba6c065e828d2be578162cb5e56d358b794e9f1f328e
kernel-debug-modules-extra-4.18.0-305.10.2.el8_4.x86_64.rpm
ad7b853dbdf382f609d7de359d891180ef802c866bf28aaafaa781e6dd4701b3
kernel-devel-4.18.0-305.10.2.el8_4.x86_64.rpm
a35754be5eccbce6fbffcde5dabd824098e5377e22aa497d770bfe4b3126682c
kernel-doc-4.18.0-305.10.2.el8_4.noarch.rpm
52a57b581f0e5c8433998ee37fd74b750594f40f380e7553ce5f76f379043278
kernel-doc-4.18.0-305.10.2.el8_4.noarch.rpm
52a57b581f0e5c8433998ee37fd74b750594f40f380e7553ce5f76f379043278
kernel-headers-4.18.0-305.10.2.el8_4.x86_64.rpm
afd2c8c8881fa82d3591ec6511f12b0dde55b34c7af5132c89dbe991722da538
kernel-modules-4.18.0-305.10.2.el8_4.x86_64.rpm
dde6313a73399b7a0d2c7f53f1e9cf27c5f4fa32457a4e23b136f372880f0fe7
kernel-modules-extra-4.18.0-305.10.2.el8_4.x86_64.rpm
a13f2a302da722b509bb18aa2f16d7f5bc00db3eced553c67caf26d505a149f0
kernel-tools-4.18.0-305.10.2.el8_4.x86_64.rpm
821e81371362faabeac1e2ba9b8a2afadd710595dd006a56842b62dc31260ade
kernel-tools-libs-4.18.0-305.10.2.el8_4.x86_64.rpm
93ffe197944f2cad311940300212c61aceb732a8b2ee8cf0612a340b56b1a37b
perf-4.18.0-305.10.2.el8_4.x86_64.rpm
f5955d9b0f31af88950c5a2ff0d49baf67a686740c947dd0ce6e1559e2d90aa9
python3-perf-4.18.0-305.10.2.el8_4.x86_64.rpm
f8ee6de87fa388f249716061c848df9f60b2f476e93a4048f339098367a1c39d
RLSA-2021:2717
Important: systemd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
systemd-239-45.el8_4.2.i686.rpm
0b83472017773b776aac242dc5836f9636ea0c8109594f74338e307a6660ec15
systemd-239-45.el8_4.2.x86_64.rpm
ef0ceb58724a4fbc3939ac83ed3f24de4b2b9bf1cbaacb1effb0e422b25e757e
systemd-container-239-45.el8_4.2.i686.rpm
c939b80d68b7b87bddfd577f6d5d4c10072576659d5b7426795d8f3e4f44add4
systemd-container-239-45.el8_4.2.x86_64.rpm
33f9eccd08e0ad60e3228a254aaa5b62562dfd53a3838f457db9f68fac802b50
systemd-devel-239-45.el8_4.2.i686.rpm
4e74e97b53eb4ef9947fd175a0d10868e82d7ec2b41b17d0a72cd12192ff4209
systemd-devel-239-45.el8_4.2.x86_64.rpm
a6dc364d10cc148a7a32cb61828487becebaf9719b475839e8fe8106cd42f3c7
systemd-journal-remote-239-45.el8_4.2.x86_64.rpm
a66ff7ee5fd720a6f0e1717618dea327e06b9ee5e5c8c8d0a8195d0c70a9f3fe
systemd-libs-239-45.el8_4.2.i686.rpm
207e6f6485ff65f2acee35ac79afc176d89a8a3b8374e8536e24e47e75e85dd4
systemd-libs-239-45.el8_4.2.x86_64.rpm
88053daea628d23366a9128d083696d16e59372ffb09041662c7f49b178af038
systemd-pam-239-45.el8_4.2.x86_64.rpm
e0b90847bb36fecbec093ba627698d9c6f243e3c6d416f7bdcd733b2bf0b1cf9
systemd-tests-239-45.el8_4.2.x86_64.rpm
649284736ef4c65b1d12111a596d1cecfea06dd5bd9b66fa7b0bc2e0eb9616af
systemd-udev-239-45.el8_4.2.x86_64.rpm
eec4a8dfc8d04bb28470e66143c4a7cfc1344d507471e62719b8ad8fd32085b5
RLSA-2021:3027
Important: microcode_ctl security, bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: Vector Register Data Sampling (CVE-2020-0548)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: vt-d related privilege escalation (CVE-2020-24489)
* hw: improper isolation of shared resources in some Intel Processors
(CVE-2020-24511)
* hw: observable timing discrepancy in some Intel Processors
(CVE-2020-24512)
* hw: Information disclosure issue in Intel SGX via RAPL interface
(CVE-2020-8695)
* hw: Vector Register Leakage-Active (CVE-2020-8696)
* hw: Fast forward store predictor (CVE-2020-8698)
none-baseos-rpms
microcode_ctl-20210216-1.20210608.1.el8_4.x86_64.rpm
d2ec269d62af6271d3d7b648c1d8008a4298e0df82db530f9332076ad4a35c46
RLBA-2021:3046
mdadm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mdadm packages contain a utility for creating, managing, and monitoring
Linux multiple disk (MD) devices.
Bug Fix(es) and Enhancement(s):
* [FJ8.2 Bug]: RAID volume status is not updated when multiple drives fail.
(BZ#1965414)
none-baseos-rpms
mdadm-4.1-16.el8_4.x86_64.rpm
46cfa290a8e10c01ada70e17e348caa8197fed8d2429cdb254f7cafeb7a88efd
RLBA-2021:3047
perl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system
administration utilities and web programming.
Bug Fix(es) and Enhancement(s):
* [perl-net-ping] wrong return value on failing DNS name lookup
(BZ#1973176)
none-baseos-rpms
perl-Errno-1.28-419.el8_4.1.x86_64.rpm
a6fd8f42a46e203f403fb2ef50d1b6ed5c2d25fcd6ea7214de511e06512792b2
perl-interpreter-5.26.3-419.el8_4.1.x86_64.rpm
c10ad6ffd60cbcea10e37b9c4bd234d63bcf5a6f167fb6287efd6aca206d2b2c
perl-IO-1.38-419.el8_4.1.x86_64.rpm
7c8448b40b51c21ab8de23d77dc0eee52b0fa00d954241d61f6837c053391444
perl-IO-Zlib-1.10-419.el8_4.1.noarch.rpm
58fcc2a1e2621cec83dd6e09435bd91fd3745b6fda82e6dea3800bd194574d1a
perl-IO-Zlib-1.10-419.el8_4.1.noarch.rpm
58fcc2a1e2621cec83dd6e09435bd91fd3745b6fda82e6dea3800bd194574d1a
perl-libs-5.26.3-419.el8_4.1.i686.rpm
879fc9b9daf18a65ea177d75b11c4c544643acdd22221a718af89e98fdff5b58
perl-libs-5.26.3-419.el8_4.1.x86_64.rpm
9872874304c5a32c3cf6009f6aa2a7774ace7b0879ca47feab0315a039231541
perl-macros-5.26.3-419.el8_4.1.x86_64.rpm
3ae02c61acedb4c5adcd14bab15db31d9d577a3e9ebaea874dedaf4c6c5a1c16
perl-Math-Complex-1.59-419.el8_4.1.noarch.rpm
0d2c1daa26feac434d3923e0d1e32c8ee0f3e760d2f3a43639947efa3b737978
perl-Math-Complex-1.59-419.el8_4.1.noarch.rpm
0d2c1daa26feac434d3923e0d1e32c8ee0f3e760d2f3a43639947efa3b737978
RLBA-2021:3050
samba bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB)
protocol and the related Common Internet File System (CIFS) protocol, which
allow PC-compatible machines to share files, printers, and various
information.
Bug Fix(es) and Enhancement(s):
* /sbin/ldconfig: /lib64/libsmbldap.so.2 is not a symbolic link
(BZ#1964314)
* smbd tries to delete files with wrong permissions (uses guest instead of
user from force user) (BZ#1964398)
* Memory leak in RPC server could allocate a lot of memory for print
servers (BZ#1969831)
none-baseos-rpms
samba-libs-4.13.3-4.el8_4.i686.rpm
799ce571abfc12152f756866ea40295af065fc71bed9a5bed8649cdfd3ce914b
ctdb-4.13.3-4.el8_4.x86_64.rpm
07b27ba2f4e4866648779871ccb251336919d4e0cd585fb505dcceaec2b521ff
ctdb-tests-4.13.3-4.el8_4.x86_64.rpm
8aba09c2ac5639febe3ac6a611a746cfdd652fbecc7631f93cc8f10bda85082e
libsmbclient-4.13.3-4.el8_4.i686.rpm
ac6cb32092e69fdafc08de239819af46039f24fff6c7d1482cc672648970e518
libsmbclient-4.13.3-4.el8_4.x86_64.rpm
552613065eaf4f08591b17d415623f4138b062895478b0991a910d0eaec8e4ac
libwbclient-4.13.3-4.el8_4.i686.rpm
21cee6657a53c41b658d7f939cf1ee14775be86f989f3fe4581783a842c54ba5
libwbclient-4.13.3-4.el8_4.x86_64.rpm
3a9e43ecac418f5c3b0c6264562e711a687b94f6557d279ccf86ec79fffb72c3
python3-samba-4.13.3-4.el8_4.i686.rpm
11c393374b25bbfe4a545685b47fe6e77ea40a7273877e82de66ea2fd7ccdb74
python3-samba-4.13.3-4.el8_4.x86_64.rpm
fc37c4d409cb67781cc5740dfef84c2514490fdf0fd8c64957980036a7b33ecc
python3-samba-test-4.13.3-4.el8_4.x86_64.rpm
198585750562c2018a347fa173fa6320fe6295d6fce25287e501eca387970502
samba-4.13.3-4.el8_4.x86_64.rpm
66f9c8f9b8d6c6e5ba2f50c690fa957261254eaf0ee791fb3aef98d36c35e296
samba-client-4.13.3-4.el8_4.x86_64.rpm
4ebb8e998a6d528dbd8dcafe007c3628fe716d045f52b00c5ed22d7a77e02690
samba-client-libs-4.13.3-4.el8_4.i686.rpm
9f4c0733a16a23e4bc4b33c840d661632710b621f47ca3acb0f747a593d09f26
samba-client-libs-4.13.3-4.el8_4.x86_64.rpm
7c3e148e293b6b88c6d8658df4dbeb7244f07b96b5237b285ca72acc3cacba7c
samba-common-4.13.3-4.el8_4.noarch.rpm
6f89322879f8d8e0d596d9f31b21454555eadd6af2529c9db9b20cc3c1ef39cf
samba-common-4.13.3-4.el8_4.noarch.rpm
6f89322879f8d8e0d596d9f31b21454555eadd6af2529c9db9b20cc3c1ef39cf
samba-common-libs-4.13.3-4.el8_4.x86_64.rpm
7c680330719de9e9d333ae7007caa799101adb2a74e2c257372d5cc170e9218a
samba-common-tools-4.13.3-4.el8_4.x86_64.rpm
5ad0067d2f7fc79eda5d53d09c57b067539cb7a004be022ea900519cac3db6ae
samba-krb5-printing-4.13.3-4.el8_4.x86_64.rpm
d2ecbd3da8da3f72842a21fabace2e15544360eb982eb77697b44a3094d63201
samba-libs-4.13.3-4.el8_4.x86_64.rpm
c18c069de63428cdbb8e30bef479c84af5f86511e283aa6d562ed2cba2e7b6ab
samba-pidl-4.13.3-4.el8_4.noarch.rpm
c6fc9c3aad802c25ee34eb68f96f0fc67eff8e16e58596f18566fcf36a7a76e8
samba-pidl-4.13.3-4.el8_4.noarch.rpm
c6fc9c3aad802c25ee34eb68f96f0fc67eff8e16e58596f18566fcf36a7a76e8
samba-test-4.13.3-4.el8_4.x86_64.rpm
bef5f8ce586d14d6a9d7312ffcfbd66a0239e4704831d53159f14ba7a4a8c368
samba-test-libs-4.13.3-4.el8_4.x86_64.rpm
86fe91cf3951018373f4c97fb7ee81df32e3d01361d4da59153a921bd4f1f534
samba-winbind-4.13.3-4.el8_4.x86_64.rpm
15921bffbed3eae890787e24fa2cf2e94624c80bed3fb782af324c650f6c942d
samba-winbind-clients-4.13.3-4.el8_4.x86_64.rpm
ae78435484de92e7cc2d701fb9e8d1b22a8424cd56ebd2fff0b7615aca236602
samba-winbind-krb5-locator-4.13.3-4.el8_4.x86_64.rpm
b2dec180af70b13daef123a0e1ba35bfcf5ec45525bd8e7385e3fafa64e29cfa
samba-winbind-modules-4.13.3-4.el8_4.i686.rpm
7c5f14f5fe36c555f01f1b012b62f24362334e2975d88c41ad438de9e75d15a5
samba-winbind-modules-4.13.3-4.el8_4.x86_64.rpm
3e52bc6f93c100148ca983c4b1d7f2d24844b4b6c47179c6c83f51edf63a350f
samba-winexe-4.13.3-4.el8_4.x86_64.rpm
be4a132c54c9392e44327675d2d459f6bf950935dc032e46b30178cff0a3e20e
RLBA-2021:3048
autofs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The autofs utility controls the operation of the automount daemon. The
daemon automatically mounts file systems when in use and unmounts them when
they are not busy.
Bug Fix(es) and Enhancement(s):
* autofs: already mounted as other than autofs or failed to unlink entry in
tree (BZ#1973888)
none-baseos-rpms
autofs-5.1.4-48.el8_4.1.x86_64.rpm
ee88c5adf0c0280f511668c9ae1b96dde418c4a383501164c913cc1c10664e58
RLBA-2021:3051
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined
processes run on the system.
Bug Fix(es) and Enhancement(s):
* SELinux is preventing kexec from read access on the file
/var/lib/kdump/initramfs-*kdump.img (BZ#1976260)
none-baseos-rpms
selinux-policy-3.14.3-67.el8_4.1.noarch.rpm
10edfddc28c1b471e9bb4a98e372a294d468b10c0c95d45eec243afeff287c63
selinux-policy-3.14.3-67.el8_4.1.noarch.rpm
10edfddc28c1b471e9bb4a98e372a294d468b10c0c95d45eec243afeff287c63
selinux-policy-devel-3.14.3-67.el8_4.1.noarch.rpm
e772098f937c6277f7a980675c58a048fa000bf199c4a680cb9bfdbfd479ac5c
selinux-policy-devel-3.14.3-67.el8_4.1.noarch.rpm
e772098f937c6277f7a980675c58a048fa000bf199c4a680cb9bfdbfd479ac5c
selinux-policy-doc-3.14.3-67.el8_4.1.noarch.rpm
41b6950927dd5b3b1e7c36d0aadcb1dd9f44352a8d0f6e1c06a23b4d6b67fa36
selinux-policy-doc-3.14.3-67.el8_4.1.noarch.rpm
41b6950927dd5b3b1e7c36d0aadcb1dd9f44352a8d0f6e1c06a23b4d6b67fa36
selinux-policy-minimum-3.14.3-67.el8_4.1.noarch.rpm
37fd29a4d912ae2f264a1f6be0938c9025207c0710f926942dc62cd012cf656b
selinux-policy-minimum-3.14.3-67.el8_4.1.noarch.rpm
37fd29a4d912ae2f264a1f6be0938c9025207c0710f926942dc62cd012cf656b
selinux-policy-mls-3.14.3-67.el8_4.1.noarch.rpm
259e04a73729606985e75f63434324d605975500fad107506924c96758f1d2e4
selinux-policy-mls-3.14.3-67.el8_4.1.noarch.rpm
259e04a73729606985e75f63434324d605975500fad107506924c96758f1d2e4
selinux-policy-sandbox-3.14.3-67.el8_4.1.noarch.rpm
90cc9e17aa25725dabbc8da642b639c7623f3b3a7125a7707973a461773b9120
selinux-policy-sandbox-3.14.3-67.el8_4.1.noarch.rpm
90cc9e17aa25725dabbc8da642b639c7623f3b3a7125a7707973a461773b9120
selinux-policy-targeted-3.14.3-67.el8_4.1.noarch.rpm
b8d8eac510976bf6cf74654c33ecaedb97a2a14d8fb334aee61315e4ce9ba35c
selinux-policy-targeted-3.14.3-67.el8_4.1.noarch.rpm
b8d8eac510976bf6cf74654c33ecaedb97a2a14d8fb334aee61315e4ce9ba35c
RLBA-2021:3052
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's
kexec feature either on a normal or a panic reboot. The kexec fastboot
mechanism allows booting a Linux kernel from the context of an already
running kernel.
Bug Fix(es) and Enhancement(s):
* kdump initrd generation fails if /boot not writable (BZ#1976252)
none-baseos-rpms
kexec-tools-2.0.20-46.el8_4.2.x86_64.rpm
a215b67371f6849fac8a0424071bb2e09ee5559d4d6dfae36b6556bb6cdaf096
RLBA-2021:3053
virt-what bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-what.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The virt-what utility is used to detect whether the operating system is
running inside a virtual machine.
Bug Fix(es) and Enhancement(s):
* Nutanix AHV is detected as hyperv (BZ#1979952)
none-baseos-rpms
virt-what-1.18-9.el8_4.x86_64.rpm
4a8a4b846bf9f3f5b676cdc9f5cf8e44fe1d930bdabdedd9ddd3d4951ec3dd8d
RLBA-2021:3054
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API,
implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards.
These packages includes support for the IBM 4758 Cryptographic CoProcessor
(with the PKCS#11 firmware loaded), the IBM eServer Cryptographic
Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC
0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic
Function (FC 3863 on IBM System z). The opencryptoki packages also bring a
software token implementation that can be used without any cryptographic
hardware. These packages contain the Slot Daemon (pkcsslotd) and general
utilities.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.5 - openCryptoki: Soft token does not check if an EC key is valid
(BZ#1979173)
none-baseos-rpms
opencryptoki-3.15.1-6.el8_4.x86_64.rpm
a7c221e100cc4c2c67b2ee0a0d83184050e8719ca72534a240ea199a9bbc2c50
opencryptoki-icsftok-3.15.1-6.el8_4.x86_64.rpm
516ef13d6ba0a08ff2f08fc5b34b393c01f5c8b505528992239d72735a4e1f8f
opencryptoki-libs-3.15.1-6.el8_4.i686.rpm
07ea2bfc8c20889ba8194874f3d96691b9a942be517e46a894f14e33270b2d4a
opencryptoki-libs-3.15.1-6.el8_4.x86_64.rpm
0fc2cb610a89c1b4b4d0f6bf8ba21803b19d3e96640beadd44ddc941dfe54f67
opencryptoki-swtok-3.15.1-6.el8_4.x86_64.rpm
d03a8302465801d160588f7902469052679336f30e56145b496ef8b63bbd363a
opencryptoki-tpmtok-3.15.1-6.el8_4.x86_64.rpm
79cfffb3003c4dc06b1d4a131a5e8ba63f212c11d20cd5ef7767f916f5c9887c
RLBA-2021:3055
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and
connections, attempting to keep active network connectivity when available.
Its capabilities include managing Ethernet, wireless, mobile broadband
(WWAN), and PPPoE devices, as well as providing VPN integration with a
variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Incorrect set hostname to localhost using DNS reverse lookup of ipv6
address (BZ#1970398)
none-baseos-rpms
NetworkManager-1.30.0-10.el8_4.x86_64.rpm
7cab1fec7f11e146e54ce36497f674ac5ccdfef643eaf55da0a1820922bbdd1a
NetworkManager-adsl-1.30.0-10.el8_4.x86_64.rpm
b7c28690acca0d32a9edf7f5e6b7f61a26f2bc985f39a01b4f56e96e2cec425b
NetworkManager-bluetooth-1.30.0-10.el8_4.x86_64.rpm
695ea13b257bca56340f55675dd0f0ac17ab121fbd8a0d8970c7c6f0b41b38c3
NetworkManager-config-connectivity-redhat-1.30.0-10.el8_4.noarch.rpm
fbb893f7530008788dfc0d64c851c66984f20ffd6912e011cb07c693f002ac96
NetworkManager-config-connectivity-redhat-1.30.0-10.el8_4.noarch.rpm
fbb893f7530008788dfc0d64c851c66984f20ffd6912e011cb07c693f002ac96
NetworkManager-config-server-1.30.0-10.el8_4.noarch.rpm
f74ad2360c999a364a281400ac7f5ac8b23fc42ed031ca7ad1eba38fa1dcfb1f
NetworkManager-config-server-1.30.0-10.el8_4.noarch.rpm
f74ad2360c999a364a281400ac7f5ac8b23fc42ed031ca7ad1eba38fa1dcfb1f
NetworkManager-dispatcher-routing-rules-1.30.0-10.el8_4.noarch.rpm
cf58b404bcf37cd97bfa2988916dfe557242fafc800f75b8ca72ac37efd6af2a
NetworkManager-dispatcher-routing-rules-1.30.0-10.el8_4.noarch.rpm
cf58b404bcf37cd97bfa2988916dfe557242fafc800f75b8ca72ac37efd6af2a
NetworkManager-libnm-1.30.0-10.el8_4.i686.rpm
179bac8bd7ca4b382b5409fa3c1352b9a60af4d4e3e0d02b65f7f27d2d7af705
NetworkManager-libnm-1.30.0-10.el8_4.x86_64.rpm
16267b2d425abfb8a683824655fc8af71803486a649b99ccb26386c8d7833988
NetworkManager-ovs-1.30.0-10.el8_4.x86_64.rpm
3866c0702452ab4c1ecf065e2de3078eceed060554a6f212e1c6fa880ce5f58c
NetworkManager-ppp-1.30.0-10.el8_4.x86_64.rpm
24901a013edd8933c22a1c58363b927bc245317d3c166dfdac21e7b739bc1bef
NetworkManager-team-1.30.0-10.el8_4.x86_64.rpm
bf238e277ec4ca806b36229f11e040711aa61daada45caf4962184176355b15e
NetworkManager-tui-1.30.0-10.el8_4.x86_64.rpm
06b21e5fb59265bae8d0ae6f5dea7ea924dfe1f8f0c28c4cf90b3ea0cb208e81
NetworkManager-wifi-1.30.0-10.el8_4.x86_64.rpm
2ab6bb1cc665c3a1eb882bfd2770bc0253f3561800ca13f2379250142f203c3c
NetworkManager-wwan-1.30.0-10.el8_4.x86_64.rpm
1a5011e5f6d8cd3e8c323e13eb35372563d03b84014fa95fccfd05a8d599a210
RLBA-2021:3056
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The nfs-utils packages provide a daemon for the kernel Network File System
(NFS) server and related tools, which provides better performance than the
traditional Linux NFS server used by most users. These packages also
contain the mount.nfs, umount.nfs, and showmount programs.
Bug Fix(es) and Enhancement(s):
* Rocky Linux 8.4 fails to obey sloppy mount option. (BZ#1982340)
none-baseos-rpms
libnfsidmap-2.3.3-41.el8_4.2.i686.rpm
d89bce54c88d6d56fcfea660f2a494f2082109d777fd5cebec17e659f5474a6b
libnfsidmap-2.3.3-41.el8_4.2.x86_64.rpm
d85b7e392d54c261db03c848d3825180c1f93cd617666160fd73dc417299fca2
nfs-utils-2.3.3-41.el8_4.2.x86_64.rpm
e6a6ea177c8ae0550b279dabf84d843d61a11103002aeb4851bdb15a0c7c8850
RLSA-2021:3057
Important: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609)
* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543)
* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Urgent: Missing dptf_power.ko module in Rocky Linux8 (BZ#1968381)
* [mlx5] kdump over NFS fails: mlx5 driver gives error "Stop room 95 is bigger than the SQ size 64" (BZ#1969909)
* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth hci_error_reset on intel-tigerlake-h01 (BZ#1972564)
* Update CIFS to kernel 5.10 (BZ#1973637)
* Backport "tick/nohz: Conditionally restart tick on idle exit" to Rocky Linux 8.5 (BZ#1978710)
* Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)
* Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)
* [Rocky Linux8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)
* act_ct: subject to DNAT tuple collision (BZ#1982494)
Enhancement(s):
* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)
none-baseos-rpms
bpftool-4.18.0-305.12.1.el8_4.x86_64.rpm
c44042a776f4c91d3071970d99dbac005dade9a41c3b976b68e02b51c3fbacb6
kernel-4.18.0-305.12.1.el8_4.x86_64.rpm
6469e68392625e029cb663f746a6cdc340db8e3d8590f073584bbc777d005189
kernel-abi-stablelists-4.18.0-305.12.1.el8_4.noarch.rpm
6d89489545e3fce41e85ba1bc652842e24c844230022570180a10795c189b8b7
kernel-abi-stablelists-4.18.0-305.12.1.el8_4.noarch.rpm
6d89489545e3fce41e85ba1bc652842e24c844230022570180a10795c189b8b7
kernel-core-4.18.0-305.12.1.el8_4.x86_64.rpm
6b7b42c0682ad843c02a75d7d96d90ce9934ea8d582ef21a127ebcf216b8d834
kernel-cross-headers-4.18.0-305.12.1.el8_4.x86_64.rpm
657604ad64559c1a2dfd0b1d124d963debcbbf86479e7fd9d719595d3d2cf3ee
kernel-debug-4.18.0-305.12.1.el8_4.x86_64.rpm
fb72c03b5153dc08dc5f077dfa15cc6e679033899e242e169e5b2d9ae79de138
kernel-debug-core-4.18.0-305.12.1.el8_4.x86_64.rpm
d8f28b742401bb35482f3bb503301250a62acaeb6e591aa07e7a05baf19e12b0
kernel-debug-devel-4.18.0-305.12.1.el8_4.x86_64.rpm
db1b78ea2abd3d932a45bacfc75e86769b7953b0fb7daea00a612804a301d5dc
kernel-debuginfo-common-x86_64-4.18.0-305.12.1.el8_4.x86_64.rpm
71dba8bcde0cbcaffb4a26aef742ac0be189c1715b71cb140eaf870e627673a5
kernel-debug-modules-4.18.0-305.12.1.el8_4.x86_64.rpm
d44ca2668ebf528dc89e7eb0efc49a656f22cd1559b464b8f59be499ab2b8a21
kernel-debug-modules-extra-4.18.0-305.12.1.el8_4.x86_64.rpm
6324c0ab4f8a2eeddd5378b98587b6b2f18d16a3746fabfde283efa586b931b4
kernel-devel-4.18.0-305.12.1.el8_4.x86_64.rpm
dad7a172c28be86836ab362442445449eae552e88e5a0308c27e9165bc9a45cc
kernel-doc-4.18.0-305.12.1.el8_4.noarch.rpm
e5a88969b329d2977549e45ce459ca9ac28e98e3aa2015ad3010f03694891a7f
kernel-doc-4.18.0-305.12.1.el8_4.noarch.rpm
e5a88969b329d2977549e45ce459ca9ac28e98e3aa2015ad3010f03694891a7f
kernel-headers-4.18.0-305.12.1.el8_4.x86_64.rpm
7366c06807d09bf9fdfb899df79bad843b12410143c389fcd01fe68e258c7389
kernel-modules-4.18.0-305.12.1.el8_4.x86_64.rpm
ce003598fb79c7632870b965335688fbd518c10acd127dc1816fb988ea265614
kernel-modules-extra-4.18.0-305.12.1.el8_4.x86_64.rpm
0874b15963a3ba1763a6de97f240a3902ffc92579e617f5af0454a3c13dc8cc6
kernel-tools-4.18.0-305.12.1.el8_4.x86_64.rpm
18fb471e45be0eb64fd5671a9f316358780f24feb7069b6844833abfb1edd3e0
kernel-tools-libs-4.18.0-305.12.1.el8_4.x86_64.rpm
a7efc5b178006cdc8a73b25e759b1accbb537d2f077e908366b20ba91472809f
perf-4.18.0-305.12.1.el8_4.x86_64.rpm
973c676ae20cd9a9f09a1880c5474d148439f4628555597af47af4080bcd99df
python3-perf-4.18.0-305.12.1.el8_4.x86_64.rpm
d89f3f888ece07cb81abb65e98e8d9f66f156c15aa2f5ea694813be780d1499a
RLSA-2021:3058
Moderate: glib2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform (CVE-2021-27218)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glib2-2.56.4-10.el8_4.1.i686.rpm
6d50d5a41ebc9171e45b0d00483965d1b125c6269fd11cd7de8fe1028306d86f
glib2-2.56.4-10.el8_4.1.x86_64.rpm
86d124e872a4e367f590c308e134d12048b0a1a2277cb3f3a7100e2a3f22f5a2
glib2-devel-2.56.4-10.el8_4.1.i686.rpm
5cf3c21236feb9c9d248dc749249ccac1466c93788f9b296e6d71583bd679e50
glib2-devel-2.56.4-10.el8_4.1.x86_64.rpm
65e345f397d242e9fcb1cf0e8ede2fe4d425046f51b75aab05bb13de8261fecb
glib2-fam-2.56.4-10.el8_4.1.x86_64.rpm
eea06c2cfad80717774e5413e245d20719d6f9e4e8e25fb6013f3fd974306f67
glib2-tests-2.56.4-10.el8_4.1.x86_64.rpm
f7dee8409f5f61e1dcebeba526581c2aceaed39245ec9286e26154345df7aaa6
RLBA-2021:3059
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for
Linux, compatible with the SysV and LSB init scripts. It provides
aggressive parallelism capabilities, uses socket and D-Bus activation for
starting services, offers on-demand starting of daemons, and keeps track of
processes using Linux cgroups. In addition, it supports snapshotting and
restoring of the system state, maintains mount and automount points, and
implements an elaborate transactional dependency-based service control
logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* fix rate-limiting of mount events (BZ#1984406)
none-baseos-rpms
systemd-239-45.el8_4.3.i686.rpm
1040676ab60c0b4f3a3a98a8a4d9d54038c88f601236d758c20adb30c3aa8be7
systemd-239-45.el8_4.3.x86_64.rpm
57a5506f9e597ad9eda57ec7c5a4d67c7e276005c47714f6dd221c9f22edb15a
systemd-container-239-45.el8_4.3.i686.rpm
c4fda7c5633db02271fd7f95e2636dc1e0b55c36afbeb23e23690905d0766945
systemd-container-239-45.el8_4.3.x86_64.rpm
eae61393f2c79c552af04b70019296e9802a3a43fbd8cf639cecd4cc32f8b91b
systemd-devel-239-45.el8_4.3.i686.rpm
b2fc6baa94147f5e330379c7a5de37cb5094a9a4fc808dbe4e6acc18ca183d71
systemd-devel-239-45.el8_4.3.x86_64.rpm
054c1ea3d781c8d2c349bb957c6a8107ea8f0b2ce007249a0bfe3964ff27a32c
systemd-journal-remote-239-45.el8_4.3.x86_64.rpm
04c07bbe4364f6baa1e895b265a3feb5cb6122678706eff138f4078c70e5d23b
systemd-libs-239-45.el8_4.3.i686.rpm
95f1e21705ec49f06d3710043cb3085febaefb414a949712e7d27db9ae529f1d
systemd-libs-239-45.el8_4.3.x86_64.rpm
7f813f607c65045fb8f6627e845ade5faa157b23fe722e3cf3d6edac8f608692
systemd-pam-239-45.el8_4.3.x86_64.rpm
fa52d64759e57dd8310f3ef65b41871de8c5050804b5f15393865342b69d8ec9
systemd-tests-239-45.el8_4.3.x86_64.rpm
ba07e6788346d7a10760fc02de6c30bd4158a82ff62972a52bc27975fab37186
systemd-udev-239-45.el8_4.3.x86_64.rpm
67b60672cb2ad3828eab673b89055d7f1e6acd2960ef9c2ecdeb52144cf9d97a
RLSA-2021:3151
Important: sssd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: shell command injection in sssctl (CVE-2021-3621)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libipa_hbac-2.4.0-9.el8_4.2.i686.rpm
c65e0abaaa8e7f007fa9ea3276575468d75efd633c715fc6d88967d295d303b0
libipa_hbac-2.4.0-9.el8_4.2.x86_64.rpm
675c3d76ebfd39f0797829e0a9b01834e7bffb287b2332aafa01b317aee148c4
libsss_autofs-2.4.0-9.el8_4.2.x86_64.rpm
5635205dcf60758fc408ab7d91fb9d2d55b9a8d1deb962df1ef21cdc45279f5e
libsss_certmap-2.4.0-9.el8_4.2.i686.rpm
35a1856b2cd0edf0548ca0a12c1dd0b2f1c84d8bf220ba508508aba43a3df728
libsss_certmap-2.4.0-9.el8_4.2.x86_64.rpm
74061fd567266dfa00c16384e16a5c5c762e8865f3cf7fddc8c2c68eaaea9123
libsss_idmap-2.4.0-9.el8_4.2.i686.rpm
af4cd0cd72ce334c263420f04a63c3c05e2a5ef538e6aecc580ff1824bc198c6
libsss_idmap-2.4.0-9.el8_4.2.x86_64.rpm
54334f3f765002b5330c3c6ad7549e9fbc738502baab447e11433d602f55d144
libsss_nss_idmap-2.4.0-9.el8_4.2.i686.rpm
33db1cf707570e5fdac7dd84fbf666f5e4a6128cfce6a9e4ee5934d6f7d79eb8
libsss_nss_idmap-2.4.0-9.el8_4.2.x86_64.rpm
00db551e02fdb5c543eb3ed8367541afce203310d85f5779446ba9cf8364aa26
libsss_simpleifp-2.4.0-9.el8_4.2.i686.rpm
aacad1614d5490c42db3c33274d481bcf4b27894d462e40f362466cd00e35bdc
libsss_simpleifp-2.4.0-9.el8_4.2.x86_64.rpm
7420249d11ea2d791052956c9e887c8fff92bef51766e10cff4e59ab14ccdae5
libsss_sudo-2.4.0-9.el8_4.2.x86_64.rpm
35bba1f6c30b88d885201af58168554e45f823af6e90efe0350b3fb67b090479
python3-libipa_hbac-2.4.0-9.el8_4.2.x86_64.rpm
dfd80ff747e16a32ae9c1a96b621c6ee08908c4951dd1ae043ce83c9b127333f
python3-libsss_nss_idmap-2.4.0-9.el8_4.2.x86_64.rpm
4e24663df61727d64ea3dbc966b5b1cac0cec025725803501dcd79c7fcbc3c68
python3-sss-2.4.0-9.el8_4.2.x86_64.rpm
2d8778b293b1637f61637a4e7cdc7fa64be6677b413654b99e1c977c47eb095f
python3-sssdconfig-2.4.0-9.el8_4.2.noarch.rpm
82d4d8853104901fb5d2b9a36f380bb13db23e376d13d4830a7b9e965727492b
python3-sssdconfig-2.4.0-9.el8_4.2.noarch.rpm
82d4d8853104901fb5d2b9a36f380bb13db23e376d13d4830a7b9e965727492b
python3-sss-murmur-2.4.0-9.el8_4.2.x86_64.rpm
40539b451c5e25923879c40a2e9c25f8009398ab6df15973bf21a3ca4a321890
sssd-2.4.0-9.el8_4.2.x86_64.rpm
f1e65fca515d01ab8e24fb75d4a5155a177d474174f861438b3ae46b4eaeb3e9
sssd-ad-2.4.0-9.el8_4.2.x86_64.rpm
981d74f609adf669c56cc7e365910b56103cf6a878b1e3a354e529c43113069c
sssd-client-2.4.0-9.el8_4.2.i686.rpm
b173cfe849f0279c49683065b23d2f66f549587f9e5f282bdd525e52ad705cec
sssd-client-2.4.0-9.el8_4.2.x86_64.rpm
1d52af2a4ea5bec3b1c98db0dd21e03a63d3433db6a8201b18bc42ba605cfb77
sssd-common-2.4.0-9.el8_4.2.x86_64.rpm
33122c7fc82d06b223521486455c4a1b11dede96b852a6c1aabaa1c7989f2780
sssd-common-pac-2.4.0-9.el8_4.2.x86_64.rpm
c6f9de3339f591722c6595dbd7535b210b7916ea19de352f92bffa394ad4965a
sssd-dbus-2.4.0-9.el8_4.2.x86_64.rpm
eee8dce54ac7a7438f1bb4e1727a3a318d23ef3ac7ce856f6f84f74b60e211e8
sssd-ipa-2.4.0-9.el8_4.2.x86_64.rpm
eeac2e4b9a6a0f90c568f74630a03b888547694919f45826a2dec3a3939628ac
sssd-kcm-2.4.0-9.el8_4.2.x86_64.rpm
f80becd9b50f881c2f2c18c607c7dd69613ba79f5c1429bfb8b52410c36a0506
sssd-krb5-2.4.0-9.el8_4.2.x86_64.rpm
d2722fc16f3e4fe15675d442b791666ce0dbc6a2c80e9788a1df7f6fb98e8a0c
sssd-krb5-common-2.4.0-9.el8_4.2.x86_64.rpm
18a8d78220232c653277016a529efbc9136268228ca3d3c1a3e1692b34c3211f
sssd-ldap-2.4.0-9.el8_4.2.x86_64.rpm
29d1f4d1c60d7a21faff0614e29b26d57e04ef2d011de41e5213a575c5982fdf
sssd-libwbclient-2.4.0-9.el8_4.2.x86_64.rpm
8f7ce7dd7318299de0e1b11c757c7f943767b53dd2db2e2e23df603d8504d685
sssd-nfs-idmap-2.4.0-9.el8_4.2.x86_64.rpm
ba34792c735694301fc8f8e5c560b0e3f3d876e4a31637a67d127add367f5381
sssd-polkit-rules-2.4.0-9.el8_4.2.x86_64.rpm
4e4a5acf7a6181f7068ffd16c6530e1d0baa4a5b83e62736e49cbc36ebfcafaa
sssd-proxy-2.4.0-9.el8_4.2.x86_64.rpm
d9dd37f761b7a787fe3359ec4b074f5bc3bcc11c5fda22ec1c00a74a404d20e5
sssd-tools-2.4.0-9.el8_4.2.x86_64.rpm
357d990881a6b8758e2302b433017464ef0c73d9c77a61db2ca9d4f2b2d41189
sssd-winbind-idmap-2.4.0-9.el8_4.2.x86_64.rpm
a490d06b806ca252f6a17c15c9012d19f50bd5f7d8e344d884bbd3bcad7558ca
RLSA-2021:3447
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576)
* kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c (CVE-2021-38201)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Update Broadcom Emulex lpfc driver for Rocky Linux8.5 with bug fixes (BZ#1948608)
* cyclictest shows >50us latency when guest enters idle (RT guest with 18 RT vCPUs) (BZ#1981336)
* xfrm: backports from upstream (BZ#1981840)
* A task is stuck waiting for the completion of the vmci_resouce releasing upon the balloon reset. (BZ#1982042)
* [mlx5] backport driver bits of net: zero-initialize tc skb extension on allocation (BZ#1982220)
* Kernel cannot kill a process doing compaction for hugepage allocation (BZ#1984085)
* Rocky Linux8.4 Nightly[0108] - [P10] [Regression] Kdump failed on Rocky Linux8.4 on SAN disk via flavafish adapter (qla2xxx/HPT/Radix) (BZ#1986156)
* [Rocky Linux8.5] scheduler updates and fixes (BZ#1987296)
* Rocky Linux 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id's over 8 (BZ#1989097)
* fixes for oopses in security mitigation runtime code patching (BZ#1989174)
* act mirred doesn't scrub packets when sending them to ingress (BZ#1992226)
* HPE: Cannot install 8.4 using the DVD presented to the iLO (BZ#1993894)
* NFS client hangs on share listing when server side readdir verifiers are implemented (BZ#1993895)
* SNO: The load is extremely high (~870) when pao is added and a profile is applied. (BZ#1994879)
* timeout value of conntrack entry with TCP ESTABLISHED status is too short (BZ#1995554)
* Increase the default value for flowtable offload timeouts (BZ#1995555)
* ice/iavf driver stop responding (BZ#1997534)
* [FJ8.4 Bug]: [REG] Some files in /proc/sys/user show wrong data (BZ#1998002)
none-baseos-rpms
bpftool-4.18.0-305.17.1.el8_4.x86_64.rpm
f8866eb6c88bb7b3da9b600ba8f07c78f82f6461c3490e860958876f179ee459
kernel-4.18.0-305.17.1.el8_4.x86_64.rpm
b8f363b6f9c29670cec6c12f938122ced857d042fba7c2c6885a83eeca1974fc
kernel-abi-stablelists-4.18.0-305.17.1.el8_4.noarch.rpm
ad028efb119d12cd8ed4cda841f5cac640f774fa8aeb273e3debcdea2e3b20f0
kernel-abi-stablelists-4.18.0-305.17.1.el8_4.noarch.rpm
ad028efb119d12cd8ed4cda841f5cac640f774fa8aeb273e3debcdea2e3b20f0
kernel-core-4.18.0-305.17.1.el8_4.x86_64.rpm
1880467dc2416dc9711e43349545a3fdddbc48b10f3a03e78893633b0f057fc9
kernel-cross-headers-4.18.0-305.17.1.el8_4.x86_64.rpm
4d4e756edb04ae2b8f9a047e8da3c9d1ae894ca36b30dca28776a57f17987493
kernel-debug-4.18.0-305.17.1.el8_4.x86_64.rpm
5e6f4928916fb1a08c477db4ab64cd8c7a494d84f9850a1e748e6074c7d6c312
kernel-debug-core-4.18.0-305.17.1.el8_4.x86_64.rpm
8af0a33cf46bc536a517510aec2d8993b842935b6158bd60cd8b9f09d92a55ca
kernel-debug-devel-4.18.0-305.17.1.el8_4.x86_64.rpm
0222ffe52878c28e25f69db7b2a825986a2863dc736ac8909cd64447bca882bd
kernel-debuginfo-common-x86_64-4.18.0-305.17.1.el8_4.x86_64.rpm
f1e7d51ee9558f1de8c406ec429efa942731cd60791b350e50e6467aceee0de7
kernel-debug-modules-4.18.0-305.17.1.el8_4.x86_64.rpm
4a67f67b8c99f029bd028792b352bdd989196fbe188ccbd38731fe9cf1d7b976
kernel-debug-modules-extra-4.18.0-305.17.1.el8_4.x86_64.rpm
e2a8757fbd8794e70a8bfe7a425240645e887dff3ccf09f320389429b0da3ece
kernel-devel-4.18.0-305.17.1.el8_4.x86_64.rpm
d34365d9919ea7c168a9db926d19ce4aaafeda3907b2ebf9e2d19118aaab4da7
kernel-doc-4.18.0-305.17.1.el8_4.noarch.rpm
4b3a0650899df54b569c5f7043f7b41ddefb74254386f57047db6bc0c9d43e70
kernel-doc-4.18.0-305.17.1.el8_4.noarch.rpm
4b3a0650899df54b569c5f7043f7b41ddefb74254386f57047db6bc0c9d43e70
kernel-headers-4.18.0-305.17.1.el8_4.x86_64.rpm
1e011d88086125c47a0fa170a36e69bb91e562cefdca5c3c7fe85f8756bbf142
kernel-modules-4.18.0-305.17.1.el8_4.x86_64.rpm
8c82b122b6043fa66afd5ce56a3af909fd52bcfcfc88a82143b4f2f889da7ae1
kernel-modules-extra-4.18.0-305.17.1.el8_4.x86_64.rpm
e4cf03beb6a9fae6ae0d5bbade7223b0d96a307a9b9d68fbe17ebdcd2ecef100
kernel-tools-4.18.0-305.17.1.el8_4.x86_64.rpm
63758d8ef13e91c826419f92f788bdda7f0289419864ce3d81306392bf68395c
kernel-tools-libs-4.18.0-305.17.1.el8_4.x86_64.rpm
19c3982f5821314e93ac0c392d0aa997738edda3c850044c80c2f34c1c1222c6
perf-4.18.0-305.17.1.el8_4.x86_64.rpm
4dbcabc53134e9605ce41f7754e5bd055006912e002ed9a962d73ac24019f6bf
python3-perf-4.18.0-305.17.1.el8_4.x86_64.rpm
fd0b7d0fd3377b713d43eb12bfe5b4ab990696dc44de7cba67aee615d625b1f7
RLSA-2021:3548
Moderate: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux8.4 Nightly[0308] - HST:STC950:Fleetwood: LPAR crashed during LPM: BUG at lib/locks.c:34! (using ibmvfc) (BZ#1969792)
* Rocky Linux8.2 - s390/vtime: fix increased steal time accounting (BZ#1988386)
* [FJ8.4 Bug]: Installation of Rocky Linux8.4 hang up on a Tatlow platform while loading intel_lpss_pci module. (BZ#1989560)
* kernel panic in drm_fb_helper_dirty_work() caused by a race condition qxl driver (BZ#1992839)
* [Rocky Linux8.4] TIOCGSERIAL ioctl fails on serial device (BZ#1993872)
* Rocky Linux8.4 Nightly[0208] - kernel panic when executing test case for persistent device configuration (using DASD) (BZ#1995206)
* Killing ceph daemon leaving an unhealthy ocs/ocp cluster (worker node/s NotReady) (BZ#1995862)
* ceph: potential data corruption in cephfs write_begin codepath (BZ#1996680)
* libceph: allow addrvecs with a single NONE/blank address (BZ#1996682)
* [iavf] traffic stops after host sets vf trust on (BZ#1997536)
* [ice][iavf] hit some call trace and system panic when create-remove-vfs in loop (BZ#1997538)
* Missing backport of IMA boot aggregate calculation in Rocky Linux 8.4 kernel (BZ#1997766)
* XArray tests broken for single processor (BZ#1997997)
* [Rocky Linux-8.4] mlock() end up returning -EINVAL instead of -ENOMEM in rewriting the upper address bits. (BZ#1997998)
* Kernel panic at n_tty_set_termios+0x30 (BZ#1997999)
* [ice]BUG: scheduling while atomic: ifenslave/270215/0x00000200 (BZ#2000129)
* [ice]port lost connectivity after removing from bonding (BZ#2000130)
Enhancement(s):
* [Mellanox 8.5 FEAT] mlx5: drivers update upto Linux v5.12 (BZ#1983681)
none-baseos-rpms
bpftool-4.18.0-305.19.1.el8_4.x86_64.rpm
344022c9d13e63ca3e17eda040c80c041260680dbb50c4f371cbc0b2037197f9
kernel-4.18.0-305.19.1.el8_4.x86_64.rpm
7b894859b28b805fb063a5ec6183b2eb57c9c02b86ede903679c97dd63d921ab
kernel-abi-stablelists-4.18.0-305.19.1.el8_4.noarch.rpm
b57b5493554c754133d2a22045617edf72f4e325515cdaa296cc132acebeb32b
kernel-abi-stablelists-4.18.0-305.19.1.el8_4.noarch.rpm
b57b5493554c754133d2a22045617edf72f4e325515cdaa296cc132acebeb32b
kernel-core-4.18.0-305.19.1.el8_4.x86_64.rpm
4ab76744fbdfa6b89feeb397899c07af704f2e5701193c91c6fbcfa382d0444f
kernel-cross-headers-4.18.0-305.19.1.el8_4.x86_64.rpm
014ed634aedbefe22c5168ba17d7fe29d872c2224ae98f1670f0bc8c7dbe3ad6
kernel-debug-4.18.0-305.19.1.el8_4.x86_64.rpm
38214922434a826d2e954b84c1119e351d8f29c58fa41f0c29aab33cf6345e7d
kernel-debug-core-4.18.0-305.19.1.el8_4.x86_64.rpm
ff8896e6e89458cd134af7e3ecbbe63841d765aac303ccf6f90b00cf575af3f3
kernel-debug-devel-4.18.0-305.19.1.el8_4.x86_64.rpm
8ce5080a89781f4f98f0f1c480c36a5a840862e00f3dfad817a9478913cb497c
kernel-debuginfo-common-x86_64-4.18.0-305.19.1.el8_4.x86_64.rpm
a4a1fbd59e79865a6e2ea0ac5e3c7b661c441d787b64547e61e3eadc15c839fa
kernel-debug-modules-4.18.0-305.19.1.el8_4.x86_64.rpm
f4610fc00077cd55bbdd4a0c80a0093334d41cbdbb055584b9ae23a365339882
kernel-debug-modules-extra-4.18.0-305.19.1.el8_4.x86_64.rpm
babb98ae066640ece029d9c08e9271d183ab5945ce903b303005a77129ea2279
kernel-devel-4.18.0-305.19.1.el8_4.x86_64.rpm
f4f2c29f7e1824ace5ed50136a32a50eaafb278e802ca51b0dc22109f6cfc07f
kernel-doc-4.18.0-305.19.1.el8_4.noarch.rpm
d34833c85149b74c78ad422584a501ca4f1bc18c8fb6b6e8f2115f78fab5e1cc
kernel-doc-4.18.0-305.19.1.el8_4.noarch.rpm
d34833c85149b74c78ad422584a501ca4f1bc18c8fb6b6e8f2115f78fab5e1cc
kernel-headers-4.18.0-305.19.1.el8_4.x86_64.rpm
5a126cfb866978cb67bfc50b6c36b7ddbebc12239c1124065136343520a7e29f
kernel-modules-4.18.0-305.19.1.el8_4.x86_64.rpm
39fe1d1476ae8c292e7454ca9220bb37b0509de89717415c5a33a6cab6742a56
kernel-modules-extra-4.18.0-305.19.1.el8_4.x86_64.rpm
bd4c8056ea2297ea52d0a47b3b51c1616edea4722fc4850d75ac1d7e2992e604
kernel-tools-4.18.0-305.19.1.el8_4.x86_64.rpm
e4f492335e703a963e6570979a5ac6281506d0b1a99fb83514717271819700ab
kernel-tools-libs-4.18.0-305.19.1.el8_4.x86_64.rpm
1110ea263418e3fb21e0c339ad0a5fc4fbfe85b28429cad5b8ff6a40876ecd91
perf-4.18.0-305.19.1.el8_4.x86_64.rpm
3960e800b3a5d83b2e57be9f7be11bd6aff0ab67c495bd95b61cbd928f33ffbf
python3-perf-4.18.0-305.19.1.el8_4.x86_64.rpm
0e75f7b45b5468416f79a3d82be4ec65740e2119c365ab446743e2d3d3341ff7
RLBA-2021:3573
ca-certificates bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ca-certificates.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ca-certificates package contains a set of Certificate Authority (CA)
certificates chosen by the Mozilla Foundation for use with the Internet
Public Key Infrastructure (PKI).
Bug Fix(es) and Enhancement(s):
* Annual 2021 ca-certificates update 2.48 from nss 3.66 for Firefox 91
(BZ#1971200)
none-baseos-rpms
ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm
2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136
ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm
2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136
ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm
2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136
ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm
2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136
ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm
2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136
ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm
2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136
RLSA-2021:3582
Moderate: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: Content not matching hash in Metalink is not being discarded (CVE-2021-22922)
* curl: Metalink download sends credentials (CVE-2021-22923)
* curl: Bad connection reuse due to flawed path name checks (CVE-2021-22924)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libcurl-7.61.1-18.el8_4.1.i686.rpm
334c6d7a52b46281e6564be256ab87875c369d1e46e11e07a178767b383fe483
curl-7.61.1-18.el8_4.1.x86_64.rpm
ab028c540f77474d21f6e35955fb38d0d2d61b5410ebcd4f84140b1a155f1743
libcurl-7.61.1-18.el8_4.1.x86_64.rpm
188c35fadc995b37258c56d6583c1fd71d527ae879a9839512a9b7d48e61e10c
libcurl-devel-7.61.1-18.el8_4.1.i686.rpm
f80021161b0ccbac0f857cecf0f7670c52060fdfe6f45c73748f9106e4189ab1
libcurl-devel-7.61.1-18.el8_4.1.x86_64.rpm
92f0e8f2f469bd6d3f1e636318013a0d527c7ffb6a27f20060166667ce389cae
libcurl-minimal-7.61.1-18.el8_4.1.i686.rpm
d1fe876402fbe2297f196cf3fb4bc82a005cf7227be5af90284e8809163bfb00
libcurl-minimal-7.61.1-18.el8_4.1.x86_64.rpm
09a2d2463a202ab8f371d900bd93d03b8b5511cf4fbe66604a0077aa4a20a583
RLBA-2021:3574
rng-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rng-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rng-tools packages contain random number generator user-space
utilities, such as the rngd daemon.
Bug Fix(es) and Enhancement(s):
* rngd uses 100% CPU while in a yield() loop (BZ#1966437)
none-baseos-rpms
rng-tools-6.8-4.el8_4.x86_64.rpm
da313a8353bf2798cbc1b1070f273d1de8e82959a505b8f214d38996ec65ea80
RLSA-2021:3576
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS (CVE-2021-36222)
* krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field (CVE-2021-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
krb5-devel-1.18.2-8.3.el8_4.i686.rpm
eea515ead105a2b632777585b6d8308fb224ab7018deb1303b9208cc3dcc6d77
krb5-devel-1.18.2-8.3.el8_4.x86_64.rpm
45f2e57179eab55d2e281483ec7e77ad42cb47659ecec76b99565a9a4ba15e05
krb5-libs-1.18.2-8.3.el8_4.i686.rpm
fd40b4e64351ac0cd0ce0fcb0cd4c2d1133e964cd8fa6f9cbc573fcd6f1c4242
krb5-libs-1.18.2-8.3.el8_4.x86_64.rpm
99cff72fad8db2faedf5e15ae5de958ad8de806dbb794f2b5446e1c609d01733
krb5-pkinit-1.18.2-8.3.el8_4.i686.rpm
cc28ae231205e535f77ede37ec50ac17e14c187765adea19921e93551d14154c
krb5-pkinit-1.18.2-8.3.el8_4.x86_64.rpm
da522ec5515e9b5ed3d2adbe12e928c791b05b22f039d17f4f89764103628bec
krb5-server-1.18.2-8.3.el8_4.i686.rpm
e128984bc6dfe44d1a007e8b400ab2becae03e9f7ce8ceb9d26b9ff303c9ae3a
krb5-server-1.18.2-8.3.el8_4.x86_64.rpm
c44b17fc3967f1711b707722c9fe303b43bbd3a88ca6406073d4d8b57c6da5c9
krb5-server-ldap-1.18.2-8.3.el8_4.i686.rpm
bb7b0b2ea6a14896aafe903c71b3f6c2ac9ec58040164776c1ba9dc9d1803878
krb5-server-ldap-1.18.2-8.3.el8_4.x86_64.rpm
5ed38b510ae964463c1f38384eaa29393d3ae72c6819d9a434c05d2aed52e51e
krb5-workstation-1.18.2-8.3.el8_4.x86_64.rpm
2bebfdcb57e07bf99339abc4095e1706d1f8ec1afc0b01604002c138ca401160
libkadm5-1.18.2-8.3.el8_4.i686.rpm
222b04273b2bfc8a8d510f8e4e62c37e5057551d46df85da94cea011e48b30fa
libkadm5-1.18.2-8.3.el8_4.x86_64.rpm
ad75ccbbb4b56101635794307079df6bad44e0e30bde3a829d3e91d2fefac972
RLBA-2021:3583
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux-8.4.0.z] sosreport needs to collect data about conversions and
upgrades (BZ#1992957)
none-baseos-rpms
sos-4.0-12.el8_4.noarch.rpm
39a81dafcd5c3450e1e4ffbca9685cdf55dee803e4ba634a9963f8cd38ba330a
sos-4.0-12.el8_4.noarch.rpm
39a81dafcd5c3450e1e4ffbca9685cdf55dee803e4ba634a9963f8cd38ba330a
sos-audit-4.0-12.el8_4.noarch.rpm
e54e8d0f093bce5875ecca5766cc4bd4bd905728036cbeee2e1f35f66208d0f2
sos-audit-4.0-12.el8_4.noarch.rpm
e54e8d0f093bce5875ecca5766cc4bd4bd905728036cbeee2e1f35f66208d0f2
RLBA-2021:3586
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The subscription-manager packages provide programs and libraries to allow
users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation
entitlement platform.
Bug Fix(es) and Enhancement(s):
* [RFE] subscription-manager should return a module stream's "activity" in
the modular profile (BZ#1993897)
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.13-4.el8_4.x86_64.rpm
3984430fd9c8ebc36867cb782b8b6b96bcd6ec80695c4884aa822d6d583f1c86
python3-subscription-manager-rhsm-1.28.13-4.el8_4.x86_64.rpm
90873416517b1660b7e7c9564e37cf19f452fca38a92234a09cdbfccbdd5c7c3
python3-syspurpose-1.28.13-4.el8_4.x86_64.rpm
cbd8819346db113f1fca41f3be988379532fbc88b16422bcfbc4f4a6494ab650
rhsm-icons-1.28.13-4.el8_4.noarch.rpm
d6630f9d8a1cdb74e1d1956584f0d043e3792f2ff464376347e0db0b2d8c9c6d
rhsm-icons-1.28.13-4.el8_4.noarch.rpm
d6630f9d8a1cdb74e1d1956584f0d043e3792f2ff464376347e0db0b2d8c9c6d
subscription-manager-1.28.13-4.el8_4.x86_64.rpm
a189ea8121b94bb799c5761d68d399a13eaa7c142389eaa77fc6fd2f26167224
subscription-manager-cockpit-1.28.13-4.el8_4.noarch.rpm
3d00ba1a08adee6bea6f83cf8f6caee2caf2d7d618ba51edb6b9a342df7689b1
subscription-manager-cockpit-1.28.13-4.el8_4.noarch.rpm
3d00ba1a08adee6bea6f83cf8f6caee2caf2d7d618ba51edb6b9a342df7689b1
subscription-manager-plugin-ostree-1.28.13-4.el8_4.x86_64.rpm
7337b6162604d3c1be6e8bf1e511213b04c873ec7cde3cda57742fda49a6ffbe
subscription-manager-rhsm-certificates-1.28.13-4.el8_4.x86_64.rpm
3053ebce10d3446504cd6630b89723feb1b6d97934ae051171e51145e03076a7
RLBA-2021:3587
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API,
implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards.
These packages includes support for the IBM 4758 Cryptographic CoProcessor
(with the PKCS#11 firmware loaded), the IBM eServer Cryptographic
Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC
0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic
Function (FC 3863 on IBM System z). The opencryptoki packages also bring a
software token implementation that can be used without any cryptographic
hardware. These packages contain the Slot Daemon (pkcsslotd) and general
utilities.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.4 - pkcstok_migrate leaves options with multiple strings in
opencryptoki.conf file options without double-quotes (openCryptoki)
(BZ#1995919)
none-baseos-rpms
opencryptoki-3.15.1-7.el8_4.x86_64.rpm
36cce6ec235a9ba1a48291ad35aa29099bb3361b1c0bee5089ce40f71e4dc5f4
opencryptoki-icsftok-3.15.1-7.el8_4.x86_64.rpm
3fab0f959eca215683c421195bbedfe1905bec5893f56f6cfd5a9f3e35320f7d
opencryptoki-libs-3.15.1-7.el8_4.i686.rpm
cb9e7b8d84eb8f1e1d4fc1d5780af0c5e889950f806d10b6c7866531f6ad93bc
opencryptoki-libs-3.15.1-7.el8_4.x86_64.rpm
f21b925f202a76e8184d1823423d3416b081d0ae4cdf14df9714fddc35ccce2b
opencryptoki-swtok-3.15.1-7.el8_4.x86_64.rpm
526c9496ac231a48d76c63c2f9edab16837d32fa976e53328a2c957374ad8055
opencryptoki-tpmtok-3.15.1-7.el8_4.x86_64.rpm
57a3fa891d830cd364333c94a4da660bb1c74f3ea1e6d862ff797f4d5b8d7fac
RLEA-2021:3591
strace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The strace utility intercepts and records the system calls that are made
and received by a running process and prints a record of each system call,
its arguments, and its return value to standard error output or a file. It
is often used for problem diagnoses, debugging, and for instructional
purposes.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux-8.4.0.z] RFE: backport commit
e921913eecd5025dae688fdf9c365023fe3b8a0c (SELinux support) (BZ#2000565)
none-baseos-rpms
strace-5.7-2.1.el8_4.x86_64.rpm
1d863e409455318437cc8734eadc609dd7eb843021bafbd33e3acf16bcd18a52
RLBA-2021:3592
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined
processes run on the system.
Bug Fix(es) and Enhancement(s):
* RFE: Grant rpc.gssd access to $HOME/.k5identity in selinux-policy
(BZ#1995594)
none-baseos-rpms
selinux-policy-3.14.3-67.el8_4.2.noarch.rpm
c7f80ad4b665c937e450847e961ae3f4d99ffd99a970cc745a928764bbd4b205
selinux-policy-3.14.3-67.el8_4.2.noarch.rpm
c7f80ad4b665c937e450847e961ae3f4d99ffd99a970cc745a928764bbd4b205
selinux-policy-devel-3.14.3-67.el8_4.2.noarch.rpm
fab208cefc87ef9be1e5992d7fb87cde645bf32ea7008426749bd8fe9e2475ec
selinux-policy-devel-3.14.3-67.el8_4.2.noarch.rpm
fab208cefc87ef9be1e5992d7fb87cde645bf32ea7008426749bd8fe9e2475ec
selinux-policy-doc-3.14.3-67.el8_4.2.noarch.rpm
e6d0bf65da218a5074c56e4bba737e4786c616136a13ec08f3e0d180ce99c649
selinux-policy-doc-3.14.3-67.el8_4.2.noarch.rpm
e6d0bf65da218a5074c56e4bba737e4786c616136a13ec08f3e0d180ce99c649
selinux-policy-minimum-3.14.3-67.el8_4.2.noarch.rpm
954f28d491adcf5ad2338c8048eb3adec3f682ed4ae2b22b58261d92cfc46c42
selinux-policy-minimum-3.14.3-67.el8_4.2.noarch.rpm
954f28d491adcf5ad2338c8048eb3adec3f682ed4ae2b22b58261d92cfc46c42
selinux-policy-mls-3.14.3-67.el8_4.2.noarch.rpm
4b4197a5c6b9a816aa8a20de91f30545f6f5a822136c331dee8237f8fb039bfa
selinux-policy-mls-3.14.3-67.el8_4.2.noarch.rpm
4b4197a5c6b9a816aa8a20de91f30545f6f5a822136c331dee8237f8fb039bfa
selinux-policy-sandbox-3.14.3-67.el8_4.2.noarch.rpm
ae07e6023ad48e49fd4030687f0c83615827272cae6e8fdf11af8250429e9210
selinux-policy-sandbox-3.14.3-67.el8_4.2.noarch.rpm
ae07e6023ad48e49fd4030687f0c83615827272cae6e8fdf11af8250429e9210
selinux-policy-targeted-3.14.3-67.el8_4.2.noarch.rpm
26566367e728cb4013d8209b7998b49cd0ae695d6e9100db20d728833b146a83
selinux-policy-targeted-3.14.3-67.el8_4.2.noarch.rpm
26566367e728cb4013d8209b7998b49cd0ae695d6e9100db20d728833b146a83
RLBA-2021:3790
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2021c, which addresses recent
time zone changes. Notably:
* Samoa does not switch to the daylight saving time (DST) in 2021.
(BZ#2007732, BZ#2007785, BZ#2008251, BZ#2010126, BZ#2010127, BZ#2010312)
none-baseos-rpms
tzdata-2021c-1.el8.noarch.rpm
6a8c045717ffa65b5c94f9dad9a8e0736a99bed960a1b7270a01149561b36926
tzdata-2021c-1.el8.noarch.rpm
6a8c045717ffa65b5c94f9dad9a8e0736a99bed960a1b7270a01149561b36926
RLBA-2021:4003
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2021e, which addresses recent
time zone changes. Notably:
* The Pacific/Fiji timezone has suspended daylight saving time (DST) for the 2021/2022 season.
* The 'zic -r' command now marks unspecified timestamps with "-00".
* Palestine will end daylight saving time (DST) on October 29, 2021 at 01:00, rather than the predicted October 30, 2021.
(BZ#2015242, BZ#2015246, BZ#2016369)
none-baseos-rpms
tzdata-2021e-1.el8.noarch.rpm
75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a
tzdata-2021e-1.el8.noarch.rpm
75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a
tzdata-2021e-1.el8.noarch.rpm
75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a
tzdata-2021e-1.el8.noarch.rpm
75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a
RLBA-2021:4052
bluez bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bluez packages contain the following utilities for use in Bluetooth
applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start
scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files.
Bug Fix(es) and Enhancement(s):
* [Dell 8.4 BUG] Bluetooth keyboard paired and connected but does not work
on firt pair. (BZ#1972918)
none-baseos-rpms
bluez-5.52-5.el8_4.x86_64.rpm
5e87df03b796a688edfdff47a864b06a2beed1f6946563a2cac65964de227915
bluez-hid2hci-5.52-5.el8_4.x86_64.rpm
011835bc21cd6e0b5cb2c8339e200af7ce275d4cf627eaf357dd544549f2a494
bluez-libs-5.52-5.el8_4.i686.rpm
71eb5c19ddca1eb5110146a695d8265b992982b2b766fcec455cf848b34186aa
bluez-libs-5.52-5.el8_4.x86_64.rpm
63a4656e1738d08f9cfdf55874f39200ccaec0a16b0083abafde6ed54056bcfe
bluez-obexd-5.52-5.el8_4.x86_64.rpm
674996d70e40a5e14bdcc835b7c6037407613e35ca0af57c9bb36333f1a644e4
RLEA-2021:4053
rasdaemon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rasdaemon packages provide a RAS (Reliability, Availability and
Serviceability) logging tool, which records memory errors, using the EDAC
tracing events.
Bug Fix(es) and Enhancement(s):
* [RFE] latest rasdaemon (hardware check for ROME and MILAN) (BZ#1975506)
none-baseos-rpms
rasdaemon-0.6.1-5.1.el8_4.x86_64.rpm
e4b06f0a73aa0436b915a856d1c826f08b2ae10a8f2f63e28664836a9b650300
RLBA-2021:4054
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iptables utility controls the network packet filtering code in the
Linux kernel.
Bug Fix(es) and Enhancement(s):
* iptables-nft returns incorrect result for -C when concurrently running
(BZ#1990016)
none-baseos-rpms
iptables-1.8.4-17.el8_4.1.i686.rpm
8dd030c802f23219347f33f2c63cdcd6d428c918bf7dbe91465ea4ee1b121d06
iptables-1.8.4-17.el8_4.1.x86_64.rpm
0ea9cacd8a4c0ce65942e62afd474247cf1234f9b58e255e81e897675575ef20
iptables-arptables-1.8.4-17.el8_4.1.x86_64.rpm
a79ae0e88697eab0351520bcc800b91fa19138b62988279b529114684e05e5e9
iptables-devel-1.8.4-17.el8_4.1.i686.rpm
5cc76aebe17fbc67fcc1ff19013ef49be4f3b2f7e55de83ed4ddfe35a9b1e181
iptables-devel-1.8.4-17.el8_4.1.x86_64.rpm
55d83942c5df199bf27ba1957fe394e72aec2057c52df6ebd595ab1456f24a9b
iptables-ebtables-1.8.4-17.el8_4.1.x86_64.rpm
7f88a0c3456e51a8dd3d155ac0c15bd7456d6abd58c9526ae916966acb3dc7dd
iptables-libs-1.8.4-17.el8_4.1.i686.rpm
579ee551ab874e077eaf5957daaa1764c85a4b3372174826279bc84558cc1c2f
iptables-libs-1.8.4-17.el8_4.1.x86_64.rpm
b4c1899fe0f1c742ac63b8e80e5ba7c7be5438cbaaf2f22348e3d7e13c115260
iptables-services-1.8.4-17.el8_4.1.x86_64.rpm
b8854ff2f227885c47e1c86f48ab54028c0e0e72b87b7e7602dc2e67060dcb8e
iptables-utils-1.8.4-17.el8_4.1.x86_64.rpm
ebc204d5d0f9bb947cb2c39db591f28fe574001571666e10322d856b8eb77dc8
RLBA-2021:4055
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The nfs-utils packages provide a daemon for the kernel Network File System
(NFS) server and related tools, which provides better performance than the
traditional Linux NFS server used by most users. These packages also
contain the mount.nfs, umount.nfs, and showmount programs.
Bug Fix(es) and Enhancement(s):
* RFE: Prevent $HOME modification for rpc.gssd with conditional flag
(BZ#1995593)
none-baseos-rpms
libnfsidmap-2.3.3-41.el8_4.3.i686.rpm
05f8daf3643fdb821c7fabbead65a9e68231cc14177053bfc80052ebe1326b38
libnfsidmap-2.3.3-41.el8_4.3.x86_64.rpm
e7bc6c9577acb3e5a66cb101e8c9cdd879631d96f1b42b627d9a12b1aee0d23b
nfs-utils-2.3.3-41.el8_4.3.x86_64.rpm
861278016695a75212d1701cb70d2d27296d3d5fc34331dfd04141a01f5c1bbe
RLSA-2021:4056
Important: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385)
* kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c (CVE-2021-0512)
* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [HPE 8.3 bug] No EDAC MC0 message with one-DIMM two-processor configuration under Rocky Linux8.3 (BZ#1982182)
* mlx: devlink port function shows all zero hw_addr (BZ#1986837)
* net/sched: act_mirred: allow saving the last chain processed on xmit path (BZ#1992230)
* Rocky Linux8.3 - System hang and / or r/o fs during SVC/v5k/v7k maintenance with ibmvfc (BZ#1993892)
* Rocky Linux8.1 Snapshot3 - PVT:940:virt:4TB:LPM operation failed by returning HSCLA2CF, HSCL365C SRC's - Linux partition suspend timeout (-> documentation/Linux Alert through LTC bug 182549) (BZ#1993952)
* Rocky Linux8.4 - benchTableRepDMLAsyncBarrier regresses by 34% on Rocky Linux8.4 on POWER9 compared to Rocky Linux8.2 (performance) (BZ#1997431)
* [panic] call trace: ice_probe+0x238/0x10f0 [ice] (BZ#1997539)
* [ice, PTP] ice: fix GPIO 1PPS signal (BZ#1997572)
* Fix locality handling in the tpm_tis driver (BZ#1998219)
* [ice, PTP]: fix Tx queue iteration for Tx timestamp enablement (BZ#2000128)
* PCI passthrough with NVidia GPU "Invalid device 0003:01:00.0 iommu_group file /sys/bus/pci/devices/0003:01:00.0/iommu_group is not a symlink" (BZ#2000602)
* [DELL 8.4 BUG] - System Hangs at Dell Logo When Boot to OS(e1000e with wrong GbE checksum) (BZ#2002335)
* Rocky Linux8.4 - kernel: Fix hanging ioctl caused by wrong msg counter (BZ#2002635)
* kernel: get_timespec64 does not ignore padding in compat syscalls (BZ#2003569)
* [mlx5] eth0: hw csum failure (BZ#2005980)
* xlog_grant_head_wait() does not return and system hangs (BZ#2007413)
* panic while breaking a lease/delegation after user mode helper invocation (BZ#2010331)
* Lockd invalid cast to nlm_lockowner (BZ#2010820)
* [xfstests generic/388] XFS: Assertion failed: 0, file: fs/xfs/xfs_mount.c, line: 1218 (BZ#2011919)
Enhancement(s):
* [Intel 8.5 FEAT] ice: Enable PTP Support (BZ#1998220)
* [Intel 8.5 FEAT] ice: Enable GPIO/SDP Support (BZ#1998221)
none-baseos-rpms
bpftool-4.18.0-305.25.1.el8_4.x86_64.rpm
8a43c31de5cdac26eeffd567e2446a83bcc9ad135692633aa40c0035cfe51eea
kernel-4.18.0-305.25.1.el8_4.x86_64.rpm
054aa3d1fbed2427daefe691ee71b74c2d46090d1f3d4980b5e8bb9b05ff6a41
kernel-abi-stablelists-4.18.0-305.25.1.el8_4.noarch.rpm
fb0f8fba117a6ee3ed953404d203fc1343b7801a1a81afa917be53df4004e8e8
kernel-abi-stablelists-4.18.0-305.25.1.el8_4.noarch.rpm
fb0f8fba117a6ee3ed953404d203fc1343b7801a1a81afa917be53df4004e8e8
kernel-core-4.18.0-305.25.1.el8_4.x86_64.rpm
e495101a1265b0a47c5de4a2fa3cb3c1c9f1b4e894c70a9b1d3e50d7df9827a3
kernel-cross-headers-4.18.0-305.25.1.el8_4.x86_64.rpm
f6f0c30ebc1742b183f125b5f8dca97e4b9f0122c4d1af2895c9fa41b95fdbc4
kernel-debug-4.18.0-305.25.1.el8_4.x86_64.rpm
21bacc1b36f0a0259d530cb2489799d26bfeb3267767bb99c182494e2a2dcc28
kernel-debug-core-4.18.0-305.25.1.el8_4.x86_64.rpm
ce1d23c9305e9b85ba76a4db017f14b1edd980b41284481b6b189f03b913ce66
kernel-debug-devel-4.18.0-305.25.1.el8_4.x86_64.rpm
4bfee0d8d4d507a5c195383290078b7a65acdc0e7ce39c909581b2e9fee802fc
kernel-debuginfo-common-x86_64-4.18.0-305.25.1.el8_4.x86_64.rpm
8c4b35940f8cb19d9eea91ca4335eed324d5c881bb76338a9f85c92bf5939718
kernel-debug-modules-4.18.0-305.25.1.el8_4.x86_64.rpm
00cd2a88a77f8b8eae0b1fe24646d6c3575e36f782fe7d96a37c3a6b52dc438b
kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.x86_64.rpm
ed60b0af20914a92c01f36fc437440fa2a038b3dfe96c8bdd8e3a02b30e3dcb8
kernel-devel-4.18.0-305.25.1.el8_4.x86_64.rpm
1eedeffd1e263e719f2901a50bab93c919f7b4c62fd9535a1899e888beec4cd2
kernel-doc-4.18.0-305.25.1.el8_4.noarch.rpm
e9e54640c6153d51645a46aa2f9c05fb8c2a98a2b0bb2cba0af99392050eb2f5
kernel-doc-4.18.0-305.25.1.el8_4.noarch.rpm
e9e54640c6153d51645a46aa2f9c05fb8c2a98a2b0bb2cba0af99392050eb2f5
kernel-headers-4.18.0-305.25.1.el8_4.x86_64.rpm
c1e04fd03a7ee0f2534aa568443dfcf7722e094b80c435fd199401640377703d
kernel-modules-4.18.0-305.25.1.el8_4.x86_64.rpm
fd409a9f35ae7545635031e0da0993e5a8ffe357a2a6fff25c3396b345c8054b
kernel-modules-extra-4.18.0-305.25.1.el8_4.x86_64.rpm
17d4fc56c23bbac21e86195974f789ab4c13166f7addc7550e16befe5e8fe262
kernel-tools-4.18.0-305.25.1.el8_4.x86_64.rpm
75cf16a7203381c132064dc4d4654821d76c3f075ffde150d5af2bde5ec99721
kernel-tools-libs-4.18.0-305.25.1.el8_4.x86_64.rpm
02ebe19d3140609d3d3b9d8c40172fca4d3bc23638ac352c49ef1e61dad12f2e
perf-4.18.0-305.25.1.el8_4.x86_64.rpm
62b7e62ebbf6b69f492b2e11f5fd11acd9fc8f0f3f2d8e62347908495c990b6d
python3-perf-4.18.0-305.25.1.el8_4.x86_64.rpm
05a1b1e9177f57aad6288e845b665db8c92729eca22c5a3afaaa91a5759afb9d
RLSA-2021:4058
Moderate: samba security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
ctdb-4.13.3-5.el8_4.x86_64.rpm
a75345f96a116a6985858c5b0042be37e75a2b5c8c227ab0b0ad80a9baaeda89
ctdb-tests-4.13.3-5.el8_4.x86_64.rpm
e97a47d47c6720dafc7b22b736782860af6ac2c6886e025ad838a477367008df
libsmbclient-4.13.3-5.el8_4.i686.rpm
d7a5fb3c6186479a60c112228fdb59e9dfee6bcf99a3de90972b3ba25f2b29a9
libsmbclient-4.13.3-5.el8_4.x86_64.rpm
9fd5a388d67f6705e213c60c17e63d90b752d3b67606b27eac4ba3a29dcdabd8
libwbclient-4.13.3-5.el8_4.i686.rpm
be0408f7929c22688528aa5c7f0a1cf6267ded6faf91e1c4a27ee4f365b19d6d
libwbclient-4.13.3-5.el8_4.x86_64.rpm
3b93b0f1ac35766ec1fb337e930e062e431cd64a4508c991678d18d2a5760d5f
python3-samba-4.13.3-5.el8_4.i686.rpm
30ff1bed4b6c9373cbf1b8ee9cdc9db7fecb30a16646aac65668fc3aede71856
python3-samba-4.13.3-5.el8_4.x86_64.rpm
1cd7d4f6240ba572b387c1bfc768615c73593cc3d10d7c5ac6edd75eb813e41e
python3-samba-test-4.13.3-5.el8_4.x86_64.rpm
0ead9a99ef76317bd42fa13a9ebe8c06a9c7342c1f5c513210103c76c3edbf06
samba-4.13.3-5.el8_4.x86_64.rpm
899001630110aa2d08c9ed809b81dd69adb6048b0011dc54a5ffd3c35a2cb719
samba-client-4.13.3-5.el8_4.x86_64.rpm
d32d53677e3ca9d331addc2f3923989d7d948e729b988ab381848e5483dd5d14
samba-client-libs-4.13.3-5.el8_4.i686.rpm
c87dddf736343f3f7502280c9276fd96ea51472e95fd6eea1385d450c04964c8
samba-client-libs-4.13.3-5.el8_4.x86_64.rpm
893950f1601e70fb31d3da3a6dde6363bb8d73f18d0577218d9a0a7823f91aef
samba-common-4.13.3-5.el8_4.noarch.rpm
60d09667d50a65040065329b0c3511e1310a7e7dbe140a14af66309066368e17
samba-common-4.13.3-5.el8_4.noarch.rpm
60d09667d50a65040065329b0c3511e1310a7e7dbe140a14af66309066368e17
samba-common-libs-4.13.3-5.el8_4.x86_64.rpm
f6b3bf7792db4f8e073bcf9b821a227a351ade0d6800607544906d38b7ebd5a5
samba-common-tools-4.13.3-5.el8_4.x86_64.rpm
bf5e7e59d8550088023228489737e090af15ebdb005c712a0882a48d2ca79f40
samba-krb5-printing-4.13.3-5.el8_4.x86_64.rpm
74f2d5dc2b9d8d173e409b5f778733114b8f2f915a3fd123987830b6f2aa7ed0
samba-libs-4.13.3-5.el8_4.i686.rpm
04c4037f54d78e17a73a37f5b9044f0acb2e5fc02e4294b760a535e89391ca37
samba-libs-4.13.3-5.el8_4.x86_64.rpm
85b32c36da17b4fb69a336859bee4454ae5cb50b4d9e7c2377f598f093275221
samba-pidl-4.13.3-5.el8_4.noarch.rpm
1f51ecc581b1b46d2534076750b77413070e35690bd01fd0b75e6c59fc483a55
samba-pidl-4.13.3-5.el8_4.noarch.rpm
1f51ecc581b1b46d2534076750b77413070e35690bd01fd0b75e6c59fc483a55
samba-test-4.13.3-5.el8_4.x86_64.rpm
e4b241adb48ee3360e71bd53ad7a0df5e044327e102c11c602ba17385b721fcc
samba-test-libs-4.13.3-5.el8_4.x86_64.rpm
09829ef527be71fe6b6b3eda75e60d08c75f3a1e7b0682a023616da01fdd75b3
samba-winbind-4.13.3-5.el8_4.x86_64.rpm
7c8d3c55c0c0cbeb89d5019fc07f0993d83aead4e3f36d05ef7d4502dfe2e462
samba-winbind-clients-4.13.3-5.el8_4.x86_64.rpm
139330f794426e4ba8a32016cf936d64e4be74042b12bd82265771698dd29939
samba-winbind-krb5-locator-4.13.3-5.el8_4.x86_64.rpm
4c179cc7ff1c5dfbd5e16aac44ea1f7b60ee4eda89a76fd94f7a820d9b5f1501
samba-winbind-modules-4.13.3-5.el8_4.i686.rpm
36af0d9ef6ca58e4e43cf671e4fcd0757fe5f632b883b32ce2a32640735ce97c
samba-winbind-modules-4.13.3-5.el8_4.x86_64.rpm
93309d860be1e7c438a0f9794f8e53434f82ade060e816baefb5122171cf74f7
samba-winexe-4.13.3-5.el8_4.x86_64.rpm
6f32ebf84288ff6edfd79c04616fa68ac6848b7098f6a5dd1555823fc230fefd
RLBA-2021:4543
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
Bug Fix(es) and Enhancement(s):
* Update to tzdata-2021d and tzdata-2021e - changes for Pacific/Fiji and
Asia/Gaza (BZ#2016370)
none-baseos-rpms
tzdata-2021e-1.el8.noarch.rpm
75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a
tzdata-2021e-1.el8.noarch.rpm
75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a
tzdata-2021e-1.el8.noarch.rpm
75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a
tzdata-2021e-1.el8.noarch.rpm
75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a
RLSA-2021:4059
Moderate: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols (CVE-2021-22946)
* curl: Server responses received before STARTTLS processed after TLS handshake (CVE-2021-22947)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
curl-7.61.1-18.el8_4.2.x86_64.rpm
7d96da78428505eef3df08e69ffafa7a1590af9e7b4327fb58f6161e3d1503bc
libcurl-7.61.1-18.el8_4.2.i686.rpm
073a49d83b7cf6b6007f7a07341ca1315b989f002464d5f18d9428e3fd87dce4
libcurl-7.61.1-18.el8_4.2.x86_64.rpm
3777a81d29d3f28c3dec159909e8e894436ab0ffb8050c566cbc2a4603f33888
libcurl-devel-7.61.1-18.el8_4.2.i686.rpm
c13aeaa766077ca51cbd11a1fcb470e7b50819aa5d0a293c079fcefddcaad23c
libcurl-devel-7.61.1-18.el8_4.2.x86_64.rpm
c340c869d6d322c5f306c9112ba6beecd43fc89ddcaa98851dbce51779f205be
libcurl-minimal-7.61.1-18.el8_4.2.i686.rpm
1ef1d67fa8a50b0eedcd8f1dc1b62d4f6dc9b8125378be7299d1742429b838bd
libcurl-minimal-7.61.1-18.el8_4.2.x86_64.rpm
399bbcdd856eafd5b1c71c81594348db672c2c1f6e3b1259052bc76ebb9f47a7
RLSA-2021:4060
Moderate: libsolv security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm.
Security Fix(es):
* libsolv: heap-based buffer overflow in pool_installable() in src/repo.h (CVE-2021-33928)
* libsolv: heap-based buffer overflow in pool_disabled_solvable() in src/repo.h (CVE-2021-33929)
* libsolv: heap-based buffer overflow in pool_installable_whatprovides() in src/repo.h (CVE-2021-33930)
* libsolv: heap-based buffer overflow in prune_to_recommended() in src/policy.c (CVE-2021-33938)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libsolv-0.7.16-3.el8_4.i686.rpm
f166eb73e8d320c733fb1e2a05b48a85eb6a08669726709c88b189547f7af772
libsolv-0.7.16-3.el8_4.x86_64.rpm
7b721945b2351a3ef3648a03d954107a82cdc50c0104a73d6c0e8734c0827d83
python3-solv-0.7.16-3.el8_4.x86_64.rpm
bdd556edddb3a247055559056c9f3170417d256a922350c63f9f3d26102f846f
RLBA-2021:4061
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and
connections, attempting to keep active network connectivity when available.
Its capabilities include managing Ethernet, wireless, mobile broadband
(WWAN), and PPPoE devices, as well as providing VPN integration with a
variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* IPv6 Default gateway deleted from routing table (BZ#2007264)
* [nm-cloud-setup] [AWS] default route inter-feres with other subnets on
the VM (making containers unreachable) (BZ#2007341)
* [Azure][Rocky Linux-8.5] nm-cloud-setup.service makes network connectivity loss
(BZ#2014510)
none-baseos-rpms
NetworkManager-1.30.0-13.el8_4.x86_64.rpm
9f4035bb82e6f5a217d360e528a4e6332b3a95b7d024a7cf94ddcae1dd0b0ec4
NetworkManager-adsl-1.30.0-13.el8_4.x86_64.rpm
a68a66d92b8b183fe4f6ca4c0446963a1457d7dedd5af95e31ae014d22e44d80
NetworkManager-bluetooth-1.30.0-13.el8_4.x86_64.rpm
a8dae489e217a58433a97dabe100aae9a4ff59e28e02401d724869048902e51f
NetworkManager-config-connectivity-redhat-1.30.0-13.el8_4.noarch.rpm
71cc8abaf436a2fd888b2fc11f3dfbaf900badad653d5f9b5fc18b79edbe510c
NetworkManager-config-connectivity-redhat-1.30.0-13.el8_4.noarch.rpm
71cc8abaf436a2fd888b2fc11f3dfbaf900badad653d5f9b5fc18b79edbe510c
NetworkManager-config-server-1.30.0-13.el8_4.noarch.rpm
1db01085ee11b9d8435869b92952b6b76ef79cc85e5d47e18871044a2f806c74
NetworkManager-config-server-1.30.0-13.el8_4.noarch.rpm
1db01085ee11b9d8435869b92952b6b76ef79cc85e5d47e18871044a2f806c74
NetworkManager-dispatcher-routing-rules-1.30.0-13.el8_4.noarch.rpm
c3d11f3135eb2096c0c0a83b5686fe6e64bbe353b7f618a82020c7a760db1f88
NetworkManager-dispatcher-routing-rules-1.30.0-13.el8_4.noarch.rpm
c3d11f3135eb2096c0c0a83b5686fe6e64bbe353b7f618a82020c7a760db1f88
NetworkManager-libnm-1.30.0-13.el8_4.i686.rpm
790059037e830d6aae9142685ee4de74d161860b3d720bd00ab9f251b659babd
NetworkManager-libnm-1.30.0-13.el8_4.x86_64.rpm
1dd16efd72a06f35c86f657299054d8651a15f8c389931fa8cd673df8f0ffb9a
NetworkManager-ovs-1.30.0-13.el8_4.x86_64.rpm
70aaa602d9c7cecfa86d01628c110f0a2f58497221fc894050df4a9ee74c5511
NetworkManager-ppp-1.30.0-13.el8_4.x86_64.rpm
368eaa0ec5f551857fb864fbe93d6418fa69bec31c9269a3f3b894786f4c8b2d
NetworkManager-team-1.30.0-13.el8_4.x86_64.rpm
0fd23dca0c6c0029ed8a1d8c32681310c421f74ca1de7f791120436c5bdb4cb7
NetworkManager-tui-1.30.0-13.el8_4.x86_64.rpm
cc371ff7b983987ebbe9d9697ce980c94eacdf5454dd726237503c2588fc5a5e
NetworkManager-wifi-1.30.0-13.el8_4.x86_64.rpm
0306ce6d663d42604ddf1d9c0f2549558f0e4ffa2280052eba417daba1fecea6
NetworkManager-wwan-1.30.0-13.el8_4.x86_64.rpm
24f9d3f97013c47b0f91dbfcc4ab6aa3010ff8b141bd7735eb95d01dff9b030b
RLBA-2021:4062
sudo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sudo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system
administrators to provide certain users with the permission to execute
privileged commands, which are used for system management purposes, without
having to log in as root.
Bug Fix(es) and Enhancement(s):
* Request to backport https://www.sudo.ws/repos/sudo/rev/b4c91a0f72e7 to
Rocky Linux 8 (BZ#2015136)
none-baseos-rpms
sudo-1.8.29-7.el8_4.1.x86_64.rpm
9d672a06e198ebe827e8fbe2adf0fb24ff73f073921071f482ffa8be8e0a5d92
sudo-1.8.29-7.el8_4.1.x86_64.rpm
9d672a06e198ebe827e8fbe2adf0fb24ff73f073921071f482ffa8be8e0a5d92
RLBA-2021:4392
fwupd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
fwupd-1.5.9-1.el8_4.x86_64.rpm
6428e3760c3522f9bd5fc756b9b1bd1be53d1ca22f69b712f72b775233b0a320
RLBA-2021:4410
unzip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
unzip-6.0-45.el8_4.x86_64.rpm
317f2f2a947739278dd6c619a0fbb53e7c3878132385d9ae326b04f5dfbe11d3
unzip-6.0-45.el8.x86_64.rpm
500f19921ec1fd892112e6044168791f86ca4c31bcd344da9289f284cbf17277
RLBA-2021:4423
bluez bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
bluez-5.52-5.el8_4.x86_64.rpm
5e87df03b796a688edfdff47a864b06a2beed1f6946563a2cac65964de227915
bluez-hid2hci-5.52-5.el8_4.x86_64.rpm
011835bc21cd6e0b5cb2c8339e200af7ce275d4cf627eaf357dd544549f2a494
bluez-libs-5.52-5.el8_4.i686.rpm
71eb5c19ddca1eb5110146a695d8265b992982b2b766fcec455cf848b34186aa
bluez-libs-5.52-5.el8_4.x86_64.rpm
63a4656e1738d08f9cfdf55874f39200ccaec0a16b0083abafde6ed54056bcfe
bluez-obexd-5.52-5.el8_4.x86_64.rpm
674996d70e40a5e14bdcc835b7c6037407613e35ca0af57c9bb36333f1a644e4
RLEA-2021:4518
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
tzdata-2021c-1.el8.noarch.rpm
6a8c045717ffa65b5c94f9dad9a8e0736a99bed960a1b7270a01149561b36926
tzdata-2021c-1.el8.noarch.rpm
6a8c045717ffa65b5c94f9dad9a8e0736a99bed960a1b7270a01149561b36926
RLBA-2021:4357
kpatch bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kpatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
kpatch-dnf-0.2-5.el8.noarch.rpm
e12e42569f0327bba9b2bc6757b422b4b8ce35a8b93acc63c6b1b7a6e309913c
kpatch-0.9.2-5.el8.noarch.rpm
f83c6fb7b382f466439ba29419b0fde58616a4bc6b389af96571967d74dc2037
kpatch-0.9.2-5.el8.noarch.rpm
f83c6fb7b382f466439ba29419b0fde58616a4bc6b389af96571967d74dc2037
kpatch-dnf-0.2-5.el8.noarch.rpm
e12e42569f0327bba9b2bc6757b422b4b8ce35a8b93acc63c6b1b7a6e309913c
RLBA-2021:4365
dbus bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
dbus-1.12.8-14.el8.x86_64.rpm
7eb1ac910c2bc2b9daff09e1aa9a78b119ba2d43c76fe3457272e346bd9bbdca
dbus-common-1.12.8-14.el8.noarch.rpm
8c500d8036be9d35fe1439cce7a69571271e03fa2ea13d9a1d3307867a915d41
dbus-common-1.12.8-14.el8.noarch.rpm
8c500d8036be9d35fe1439cce7a69571271e03fa2ea13d9a1d3307867a915d41
dbus-daemon-1.12.8-14.el8.x86_64.rpm
3a487cde971abb859892bf51063b1fa0ba14f96d1b9af36323f0417e13ab1101
dbus-libs-1.12.8-14.el8.i686.rpm
82c2a5bf47bac7226a63ce87b18f8ce517e5c991cbc35ff52251c6bf290e0970
dbus-libs-1.12.8-14.el8.x86_64.rpm
286728d83327cd55d26bc82328435ab8342786e88e8a05dfa208c5677b4605d7
dbus-tools-1.12.8-14.el8.x86_64.rpm
ac881d79d3a0c6d4728a6942ba7bbc9d9e3fa69521f7fc51f24a6948c87cb3b9
RLBA-2021:4240
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
microcode_ctl-20210608-1.el8.x86_64.rpm
d4e6526ea2436c990e444f017e484179874180437181ffa07054f0dd479f7cac
RLBA-2021:4355
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
firewalld-0.9.3-7.el8.noarch.rpm
a5b5f089bd7b3a2ea0a3c966c54264547b2944108d90cf0c2e0a57a3b3816d78
firewalld-0.9.3-7.el8.noarch.rpm
a5b5f089bd7b3a2ea0a3c966c54264547b2944108d90cf0c2e0a57a3b3816d78
firewalld-filesystem-0.9.3-7.el8.noarch.rpm
c309357255b6f4020b0b9d3f4bd7beea6501bbbea0f2d9ccf7906efa659f19c6
firewalld-filesystem-0.9.3-7.el8.noarch.rpm
c309357255b6f4020b0b9d3f4bd7beea6501bbbea0f2d9ccf7906efa659f19c6
python3-firewall-0.9.3-7.el8.noarch.rpm
3d9ec216977b38e39daa356a88c164bff4dbd4080855d3cc9bc20adfc8f2b159
python3-firewall-0.9.3-7.el8.noarch.rpm
3d9ec216977b38e39daa356a88c164bff4dbd4080855d3cc9bc20adfc8f2b159
RLSA-2021:4358
Moderate: glibc security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Arbitrary read in wordexp() (CVE-2021-35942)
* glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c (CVE-2021-27645)
* glibc: mq_notify does not handle separately allocated thread attributes (CVE-2021-33574)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
glibc-2.28-164.el8.i686.rpm
4dae8cdec3a0b56789b2a33c4b7a8b9176a3df82eff152ed72d06647d00f3e43
glibc-2.28-164.el8.x86_64.rpm
dc1d3f15d36d9bb389301182ae180073702b3cdb50c78b1bbddb515c54e0e2cb
glibc-all-langpacks-2.28-164.el8.x86_64.rpm
910b8d03d3ea3cc127e248f17c312b56c74cdad8edc62239e286824c8794d9d7
glibc-common-2.28-164.el8.x86_64.rpm
74b653d5be3361222dceb1a9b720d2892ceff7d40581a265d51943d7f9b66cc2
glibc-devel-2.28-164.el8.i686.rpm
e5cdd80db87dd4011860a9f9ce77810fdb3404eb6d681b20c1639fac646f162e
glibc-devel-2.28-164.el8.x86_64.rpm
85de8b49edde154a6f5fc83bd2b38fe561d9a7b6a9d798c470111c9d1841494a
glibc-headers-2.28-164.el8.i686.rpm
a25154242ed21f4f91980f2017cdbbf5eb00aeb8e76b1d5c5cf34eefe27b62f4
glibc-headers-2.28-164.el8.x86_64.rpm
fea83b36f2fb7df01b37e04797784c0ea0a40055d3f8ddeab3133e080962f9a9
glibc-langpack-aa-2.28-164.el8.x86_64.rpm
8c2e2a6d8aeae447e108f64b2825ce66f154c2f2d271ae551d45554bbb0ced99
glibc-langpack-af-2.28-164.el8.x86_64.rpm
ed82c03be27be24e53b9af725839f96385238a594b6719b6a9145d36e8377134
glibc-langpack-agr-2.28-164.el8.x86_64.rpm
5ed4407065cd109ef4156df6b9b062937cd7619088300e7e426eb58187487800
glibc-langpack-ak-2.28-164.el8.x86_64.rpm
19ac1ae4a5197e60d77f9a404de0dfeb58e78fb5bcf9e75b64d04a7e44f98450
glibc-langpack-am-2.28-164.el8.x86_64.rpm
593d090d48560e15fba6c85bce7372622e3e80a705e4a5af7ad42e97cfdcef29
glibc-langpack-an-2.28-164.el8.x86_64.rpm
c1ca78b573e637d25623d91c1d6bee4f8eea4c208972d892dc37eeffedd24052
glibc-langpack-anp-2.28-164.el8.x86_64.rpm
8c45da9032926cbe52a664daa6f02864e894e23c4830340d5b848d7b66b1cd13
glibc-langpack-ar-2.28-164.el8.x86_64.rpm
6d6d68e480275103c479c32c394bb61a583aa22494a849eb54c7864f045f9276
glibc-langpack-as-2.28-164.el8.x86_64.rpm
097c6ea402de413c602cc6d6e214354d744f3a8be4de46b128e13a2d776ab83f
glibc-langpack-ast-2.28-164.el8.x86_64.rpm
750e01bb8eb92ac9ade00d3b7d7d000cd1355b2525a6d004570f1da4aa959042
glibc-langpack-ayc-2.28-164.el8.x86_64.rpm
0670af69f00dd3fca959ba9464705030a0b1768438916a02d253d16fc377ceb7
glibc-langpack-az-2.28-164.el8.x86_64.rpm
e45fc4d5d3164c53283d7b726e98a40bd8abd0f52e1c8afd942536a35271e487
glibc-langpack-be-2.28-164.el8.x86_64.rpm
4fa740910e720502bdb746f0176341ebe8ffd39eb95f6004396b293e3af377ae
glibc-langpack-bem-2.28-164.el8.x86_64.rpm
1a59bfef6593e1a6fb1b5d81c22ed030e13609b3413ac7375687d6625bd81544
glibc-langpack-ber-2.28-164.el8.x86_64.rpm
15236736edeefb1ab6f78e2daee037b72c2db54e5ffe9d3220570cd5c0f6b3c1
glibc-langpack-bg-2.28-164.el8.x86_64.rpm
f488c31ef80e2a7f0c306c415a91d0c67a4bb85bd61fb5732cd529b99eefca2a
glibc-langpack-bhb-2.28-164.el8.x86_64.rpm
44f3f0a9a044befec05167b202c63fa7d05e253e1d373501ff20df5b68018bb5
glibc-langpack-bho-2.28-164.el8.x86_64.rpm
b434b37e6ee196b44465d6e895c56866a7b5c33b45ef29f190f0e42667f7334f
glibc-langpack-bi-2.28-164.el8.x86_64.rpm
a8933f794d4032ce41e9d63017dfddb1d030e1b549042cc83947330a7e6c952d
glibc-langpack-bn-2.28-164.el8.x86_64.rpm
6326fda0bea359f283dbb5ac1cb7df0e477f1e01e2e55a5425dc67fb335be890
glibc-langpack-bo-2.28-164.el8.x86_64.rpm
569c99a5d11456603f5d53ab866be11491ba52d0ceacfe13f2b0f6ab41e4b806
glibc-langpack-br-2.28-164.el8.x86_64.rpm
23001397bceebc70cef893998b047b8ba020ba9b1d799337315fd2fa092225fd
glibc-langpack-brx-2.28-164.el8.x86_64.rpm
522c2efe9943edb71bef4441bc8a094a14db1ab58ae5a371fc4cd6faa88ef121
glibc-langpack-bs-2.28-164.el8.x86_64.rpm
9590486c2e1ac23cab9c79ace3fabbadb8d0f59844ffb7bdeacd545670034530
glibc-langpack-byn-2.28-164.el8.x86_64.rpm
3e6509c2579cae64ab143120f5b97c08cc4a047ea97d8c712de82eece3c80091
glibc-langpack-ca-2.28-164.el8.x86_64.rpm
e8f0f18dbb97f16e60b6756e09ddb5b8d00706d9a1ce2d7e9940701d810c767b
glibc-langpack-ce-2.28-164.el8.x86_64.rpm
787be77896f9ec45bc9ac53d973ad7d5ce1135b88c8384bc789cfd350306e35d
glibc-langpack-chr-2.28-164.el8.x86_64.rpm
e437bee632a63232edbbcb6df8659cd422346e06a58459dd0a934ebe4c4230a4
glibc-langpack-cmn-2.28-164.el8.x86_64.rpm
2ceee685f86b6a1d01e60dc97cad08368290fc66e97fd1d48244391a9030b6d5
glibc-langpack-crh-2.28-164.el8.x86_64.rpm
d9bb494a9dcf68cea9b8ee0edea0992201d6a4f745e852465fd768f6b0e7dc85
glibc-langpack-cs-2.28-164.el8.x86_64.rpm
65dbd9d9d08f08a4a24ad1390e448a5297ab8a41fdb38595e0d31f9bba0c7554
glibc-langpack-csb-2.28-164.el8.x86_64.rpm
0f291cd5ebfa863d514a79300fa0591701118b33f7f92cd97a28989ed1ee3171
glibc-langpack-cv-2.28-164.el8.x86_64.rpm
7a5c6f7c8edc437655f5e8e2f3ae5dde45ab8a5bd0e33e6a15cb19fb0d1fcdf3
glibc-langpack-cy-2.28-164.el8.x86_64.rpm
8c9ff4c93e37d247ca3494715b224af19d57fe5d8d77fededb5d1fb5655986ef
glibc-langpack-da-2.28-164.el8.x86_64.rpm
145a9f21d6eae5c828afe46f551d25bcd59c76195a2f5aa7eef12b0fa27389b6
glibc-langpack-de-2.28-164.el8.x86_64.rpm
7b50a0f0455bf0a9247c1d022689b3e4d8d8404b2e80848c70168311079408e6
glibc-langpack-doi-2.28-164.el8.x86_64.rpm
2a94dc4646916e15bd4c79442d7785dcc23d008701d3d8569037b4370758d219
glibc-langpack-dsb-2.28-164.el8.x86_64.rpm
571cc41736cfdf5bf2eeb0b581a56aa3fbd5a06572eef9bf239b58431de798d1
glibc-langpack-dv-2.28-164.el8.x86_64.rpm
516f0d868d021252f011cefa9fe88bc26e715050572e04ed6a5e0e726bcc2550
glibc-langpack-dz-2.28-164.el8.x86_64.rpm
fb36d43cff75cf6a77fe81096a5a754e500b8c673b657865710f76accaede058
glibc-langpack-el-2.28-164.el8.x86_64.rpm
0a52fe44cce6c37cf2cd5c998e6f8870bec12d0c5a31f4513051cc5bf076a085
glibc-langpack-en-2.28-164.el8.x86_64.rpm
f1b4bfcc590f62d6ccdaf040a214356b90f82772a2043868c4b9824d213af7b4
glibc-langpack-eo-2.28-164.el8.x86_64.rpm
497125c3f08c1fe1dac061a74f265070d69d1d4e8c3f7c0af2dc3608b394a879
glibc-langpack-es-2.28-164.el8.x86_64.rpm
d8f1b92648ef6b1c001db29894b2c48f37bc5cbdaa6922cebbc9c2da99165979
glibc-langpack-et-2.28-164.el8.x86_64.rpm
a44fd7277f8d481d83ab789f4cabcc37667624ffefb7b56f976b93152abdb1cb
glibc-langpack-eu-2.28-164.el8.x86_64.rpm
3077a3afb005d2c3b863c384f89ac8a42924c6c62d2adfe1c7207e9b1824254f
glibc-langpack-fa-2.28-164.el8.x86_64.rpm
693a61d162c6dfd84bfcc2904c3b63cd7033f21d426649a330053be6e2d1634c
glibc-langpack-ff-2.28-164.el8.x86_64.rpm
4eb9d8e1c819ff9d3a1fe491b075a82034b97560f438c3be05bee1d60a8f1081
glibc-langpack-fi-2.28-164.el8.x86_64.rpm
f0c6c7da6db4698cc5bf3fcce741e8d8eb1262cb5eb2da0b504029d6e65a67ea
glibc-langpack-fil-2.28-164.el8.x86_64.rpm
086b8eaf639d4032b13f9c34a9cc7749216dadbbfbc77286f952d268e488ba87
glibc-langpack-fo-2.28-164.el8.x86_64.rpm
9699c630ad3a5d2b390e8f3b165aec383b242cb53f09bdd77a501edc4333591b
glibc-langpack-fr-2.28-164.el8.x86_64.rpm
c602108c966a5760471499dd88b9b1acaf21d94150903894b7079f057b6dbbe9
glibc-langpack-fur-2.28-164.el8.x86_64.rpm
4322c00812c2a0187b1b2156baa8fea70b5d001b2837481543620c323fce5fdc
glibc-langpack-fy-2.28-164.el8.x86_64.rpm
374de1f2e81b0d4011d15cccd6d3821555037a7f70bda4b65d7714a6edcc7e22
glibc-langpack-ga-2.28-164.el8.x86_64.rpm
fa49d734ac0d00bde0cac4dea0617a9de959b0474fa0b9d6f8ff1291a656eb08
glibc-langpack-gd-2.28-164.el8.x86_64.rpm
573ee70c304b9761c0aacc2d3a4f7d93d5fd23537e49b91ed54a6b9a6a30a71c
glibc-langpack-gez-2.28-164.el8.x86_64.rpm
ffa76596c4ba2cb4dcf15e23b4de7575b66e414c836100fd121d02b1fe65a640
glibc-langpack-gl-2.28-164.el8.x86_64.rpm
41f3d20645fc838fffb5550e154d6c7ba2ac3f3790096e3d88a6eb4b200675af
glibc-langpack-gu-2.28-164.el8.x86_64.rpm
5a26fa712790cae052a24dee9ea5c389f3f32d43c5715514e71289bccfdcb028
glibc-langpack-gv-2.28-164.el8.x86_64.rpm
beab3dc7ec2e841333efaf607a8c6ee32cb2eb939edb9588a4095980bbf9a4bc
glibc-langpack-ha-2.28-164.el8.x86_64.rpm
0acb1bd25ba670be7a1d41b53b08da3d3a4797ee12e2aa803289ed5e80a72368
glibc-langpack-hak-2.28-164.el8.x86_64.rpm
f7988cfeb1f3afb4dae367bde858999c9878858ab8339020f3eb388bd90fa518
glibc-langpack-he-2.28-164.el8.x86_64.rpm
b9c1b555f0bc0267f6008d79fbd53dd51d9439f87624c4cc98ca3288bce0fc00
glibc-langpack-hi-2.28-164.el8.x86_64.rpm
35feeee33f3b269e485454bfe597df235ed26ee7bc0d1f6a822d51a17a7cffb6
glibc-langpack-hif-2.28-164.el8.x86_64.rpm
6816d04f13e5d9b9517d2df4314d2a9e6f07cf1df2c111583e2fc92b27303eb1
glibc-langpack-hne-2.28-164.el8.x86_64.rpm
2bb17fad427c1ddad38206ae5d532a1bca45b74b609b4bd95e1f9d5f59ef0eed
glibc-langpack-hr-2.28-164.el8.x86_64.rpm
7df8aae3a6c6c086d0c6ea253d2d346a2f25cb91e1b855523dafc853fc54c509
glibc-langpack-hsb-2.28-164.el8.x86_64.rpm
906f54a61c1dabaadd754e54b81b0e55448fd66ba0a54cf1caf12832a6f0a0af
glibc-langpack-ht-2.28-164.el8.x86_64.rpm
04b265856c7eace476f20e284d8a5599eb7b6c6332a4339c6de83f8687c595b3
glibc-langpack-hu-2.28-164.el8.x86_64.rpm
e43d7b7781582ee4d2fc7149a7aa302d0d68867e41561fa23417dc9a817b58f8
glibc-langpack-hy-2.28-164.el8.x86_64.rpm
2bbae227d32dfd2dc8b2468e625b3412f0ffd4d117b8d824c1259472125cad26
glibc-langpack-ia-2.28-164.el8.x86_64.rpm
022afea426629efd543a4952f458c108e5e1db2da2b3c99b0312a0a91de31d1b
glibc-langpack-id-2.28-164.el8.x86_64.rpm
f08a0271ffa65365b58f92d4f99ed362e6e60bd921fd90ba5669b771a4846f93
glibc-langpack-ig-2.28-164.el8.x86_64.rpm
3fac5727c3d2f51ef21d78979f41ee41f70d56250f0aa2219952969decb4403f
glibc-langpack-ik-2.28-164.el8.x86_64.rpm
fae03176a6c1b8254315341c87aff593b5119ff27d902c1bc2fb3c0b99f1ef79
glibc-langpack-is-2.28-164.el8.x86_64.rpm
49b1fff15a7288bbee40174570311feb5798c964e8a5f93ae86aa4f6948b6c79
glibc-langpack-it-2.28-164.el8.x86_64.rpm
2267d23342b944c14e10432e257089db2553fb1bd6c748ba602232098174e47b
glibc-langpack-iu-2.28-164.el8.x86_64.rpm
338144eb19ede38ee573241758f96c774cb9809776dbb1ba1b0b79936d643082
glibc-langpack-ja-2.28-164.el8.x86_64.rpm
61fbe63b717cb93235c0df9fea54144c7d62f781447a3ea9e89795fbbf6c142d
glibc-langpack-ka-2.28-164.el8.x86_64.rpm
7a40a7a139e186f927ccec992be1307f9ddbd8030e2f74780a5d46d67da25783
glibc-langpack-kab-2.28-164.el8.x86_64.rpm
9be6776c24481c914633a681ba200fa66d7e6d4a6e162e03751f14944143a742
glibc-langpack-kk-2.28-164.el8.x86_64.rpm
05d5b740e49f13f6164b13faaf225770d44870dc025a5e63dc070eb33db404fb
glibc-langpack-kl-2.28-164.el8.x86_64.rpm
2789d9079480aed3eb793a5015db42479ad22bdd66f29edb6da9d2b01419e019
glibc-langpack-km-2.28-164.el8.x86_64.rpm
738f7a75286d2eeef868a3a25d46c1027843ee372bdaf209ec056ab7aaa814e3
glibc-langpack-kn-2.28-164.el8.x86_64.rpm
7f3b4f763a6ca46921524ed55b3e96cc91055c7aca740a1ae4700c1e6d16aea0
glibc-langpack-ko-2.28-164.el8.x86_64.rpm
d21d97243644a5cfce9e85f12b69f8e7d028ca5a9a4c8fc6cab39d1d6af0f510
glibc-langpack-kok-2.28-164.el8.x86_64.rpm
4abc043ae501b6d2afc131e2482da67df1abab3c20fe389b6eaf93be3cef6a4e
glibc-langpack-ks-2.28-164.el8.x86_64.rpm
7df1cf913e323d0db856f5fd84041e04e5bb21e8e8211d5ccafafbd8db786da6
glibc-langpack-ku-2.28-164.el8.x86_64.rpm
a099050835c57686bc808acbd6e9a25ce0a408644d44149d316b2daa387e8f19
glibc-langpack-kw-2.28-164.el8.x86_64.rpm
b3eab4505fec60c0a2595a38ccb2875d0d4af5416d8584712694139d0ad34c9b
glibc-langpack-ky-2.28-164.el8.x86_64.rpm
95c9ccadc6dfdcb73cd4352dc9b6e1047ade500c9a68c2bfc24fc5cf08e7cabe
glibc-langpack-lb-2.28-164.el8.x86_64.rpm
31ef3a2a1c4d48d64aedd7b6a50cc110de0af1b8dedf18ed3926fdefd3194da8
glibc-langpack-lg-2.28-164.el8.x86_64.rpm
891fa4c455b425eb2336e2a0214f582d3c26213c77a2a74faacdffb5e00f1b3b
glibc-langpack-li-2.28-164.el8.x86_64.rpm
34e1a7962fb729c7bf204ad89851ffacefa78a0867d7ccbe9ef2a2abe55a7104
glibc-langpack-lij-2.28-164.el8.x86_64.rpm
09c55ea3e19737f56f11191c134420a957ee91a7cc4893cdb2681c07659e1afd
glibc-langpack-ln-2.28-164.el8.x86_64.rpm
844f73958f75437562c412dd34c3f4455bae038c8de02f2f61d35b9ea525daa6
glibc-langpack-lo-2.28-164.el8.x86_64.rpm
fc91dd48f999d72b13f01acc133901c6346081c21ec9e2d9a9bb0e7b7d8a9247
glibc-langpack-lt-2.28-164.el8.x86_64.rpm
41d84d4f8b3d57ab5456865e7b206628fc40566823673e2df8dc654ad2128a69
glibc-langpack-lv-2.28-164.el8.x86_64.rpm
7a0991e134d2d7934fbc6c5a80ca589d56b4f8b3e201e4ac0a72bcb20307763c
glibc-langpack-lzh-2.28-164.el8.x86_64.rpm
fb6f2df1d79ef5cd318cdbcd82554d505c1e1ca01a2c94be94bf0942505101c4
glibc-langpack-mag-2.28-164.el8.x86_64.rpm
d8e8ad5cc71e4a14646abb44e29911de16e685e2001a7753b4e9124e177b10bf
glibc-langpack-mai-2.28-164.el8.x86_64.rpm
41cc16b8401a552084786b45d8f427e7424f4f5006fc0417968b7d6c4d36feb8
glibc-langpack-mfe-2.28-164.el8.x86_64.rpm
002e93eb9dc1b03a3de39896b1adbff7db4a5f8c68e03146d62e3ab0b6c49516
glibc-langpack-mg-2.28-164.el8.x86_64.rpm
6b1ba8be2cba37a612506c2ab4e445f1b1c23002fe9e7f22ac6c31f91dd7df6b
glibc-langpack-mhr-2.28-164.el8.x86_64.rpm
7f69dba24955c8d0223888aa0aa2a4e19e577017381f15274e2cf865e51ed627
glibc-langpack-mi-2.28-164.el8.x86_64.rpm
09a50d7c07b02ea2789bc6ff711d0aec57a60082a31329498ea5082984ae5340
glibc-langpack-miq-2.28-164.el8.x86_64.rpm
338f4c8112f62c4e964af7b9a917fbad00fb1f593277cb0f643d4d94d3f2a99a
glibc-langpack-mjw-2.28-164.el8.x86_64.rpm
7955a1c1f5661e9d23ff64d7571e2fa497fb97762f0f920c6af102fc178a1067
glibc-langpack-mk-2.28-164.el8.x86_64.rpm
24d0ef0b8c082a00b61b0fdc0265250b85e33c31defa607e5f561e4a6ad8975a
glibc-langpack-ml-2.28-164.el8.x86_64.rpm
4c06b8469f59a6454e8c1aca2e121a20a9c4ef35fe0d309ebf702bb2cf1ad08c
glibc-langpack-mn-2.28-164.el8.x86_64.rpm
63e06f9d2e04208c47b6d64673f8ad2f999f545bc82be716e8c2c4c9f882ca03
glibc-langpack-mni-2.28-164.el8.x86_64.rpm
2a3290ea97b2046973e49033de6d39f00acf665c0f7d5a9c70d9fdcc804bb98a
glibc-langpack-mr-2.28-164.el8.x86_64.rpm
c6bdc68213555e751cbf0cb662b983f921c955a79d012eed1b7b1c8b16869891
glibc-langpack-ms-2.28-164.el8.x86_64.rpm
8e96edca60757f27aa220031692c584012b764572592275c2360127c18f28c1a
glibc-langpack-mt-2.28-164.el8.x86_64.rpm
4576035d0270b1295c4fba2ef763b54e4904202933439ed74b9a90b47218575e
glibc-langpack-my-2.28-164.el8.x86_64.rpm
d94d8f1a18f97faabb9159d8c404b7e572a360a8584502928a59daf0305ce4a6
glibc-langpack-nan-2.28-164.el8.x86_64.rpm
dcab4f94d12fb57d73d99fccbcf9b8f6fc73aae44076b4be1dd43aca3db81b88
glibc-langpack-nb-2.28-164.el8.x86_64.rpm
407af318bbfb18ab0722e1fb19a76ab469c627752815c6541e45ea86525e7e53
glibc-langpack-nds-2.28-164.el8.x86_64.rpm
fd09c9d5bf0c67afe934d31bbc2bb33371c62c809d3b45b5d5000c49f68cd0bc
glibc-langpack-ne-2.28-164.el8.x86_64.rpm
ecf6aa6932831404e0084fc1af469cc3edeca8207c3e6062589f34f93b73db83
glibc-langpack-nhn-2.28-164.el8.x86_64.rpm
701b9fc49ca158dfd494f94f61942641d32d76faa560cb693a4453681a4b7663
glibc-langpack-niu-2.28-164.el8.x86_64.rpm
54d88208d90f369372f44d7fe97281233e65f333cbdb4ee3e107ad4c9a66bc69
glibc-langpack-nl-2.28-164.el8.x86_64.rpm
2e47ae283b5489183650ae382a77b041aaadfcc533fcd56a26bcc26b98f2c774
glibc-langpack-nn-2.28-164.el8.x86_64.rpm
a33a55d4327b79f6caa6bad0c950e037c1c85b7acfd322e22102eb0eb9abc160
glibc-langpack-nr-2.28-164.el8.x86_64.rpm
66b6c3839684423934d92ebfd1b6f7a732c3f4b32b92891819101f86e3951812
glibc-langpack-nso-2.28-164.el8.x86_64.rpm
930219e16bb2fd7188ef8d95784fd97941aa3b7611ea947e2e3f658533780636
glibc-langpack-oc-2.28-164.el8.x86_64.rpm
84f2ff261d7ab20ba92d82ec9570021d825f06e3cc0755b45afe34020bf67f31
glibc-langpack-om-2.28-164.el8.x86_64.rpm
a3359f0856a5785f7be9dccb89b048df8684f504136bb68e9615a9e0282fe910
glibc-langpack-or-2.28-164.el8.x86_64.rpm
a91809dc6ec200b8a78a2b08a7225d3ed49d3be1cd17b9e533e64befe8d2bbaf
glibc-langpack-os-2.28-164.el8.x86_64.rpm
c8834c1bdd4902fcba7fb4b24f0ec78c34d75647c390b35f050edb673e7522d3
glibc-langpack-pa-2.28-164.el8.x86_64.rpm
07655ceab78898bfb702689aab1d2df8205a6e94af472c407917015f624d8979
glibc-langpack-pap-2.28-164.el8.x86_64.rpm
ccb93c63d74672409394fd31c30c711f0f4b4f888cd7316d302db877ef830229
glibc-langpack-pl-2.28-164.el8.x86_64.rpm
759146e3bf3547ecf604ea054ace6e131c91d4bf71f9a580bfb3e36c4a9694a1
glibc-langpack-ps-2.28-164.el8.x86_64.rpm
37d22bff068fc24ac585743dfe9ec8b7033386faf68b33bac217db40fd7c587c
glibc-langpack-pt-2.28-164.el8.x86_64.rpm
5a15c73d27fdad57f5c11f1045249382300bed036796518c8b3117277ec73976
glibc-langpack-quz-2.28-164.el8.x86_64.rpm
4a5c1f7b21d41e57a6d2c38b7393f0596a0b888d23122f62d978fa3550f01169
glibc-langpack-raj-2.28-164.el8.x86_64.rpm
b2c60a521b47283968ca4deb87a45294b9abca0d1fbaba720766df35864cad3d
glibc-langpack-ro-2.28-164.el8.x86_64.rpm
e213ffac34095315b9439cc8994689000304fcff033aef7b16fe7f1f2180db65
glibc-langpack-ru-2.28-164.el8.x86_64.rpm
29503d60e36d108ae14fa2b5b94858e398f5a15e1ae18f562ccfbc496f85089b
glibc-langpack-rw-2.28-164.el8.x86_64.rpm
a73cbac6b3c00fa49127624e90555dbab72eedeec8450363e0bb09c589fe15e0
glibc-langpack-sa-2.28-164.el8.x86_64.rpm
7f578d96043ad294990952bfbd1f2d18245f22a0f7b1dcab9db711f40a818e2e
glibc-langpack-sah-2.28-164.el8.x86_64.rpm
ceb326042a64167ec07f4edb5be5f46461b09ea9220725373e5d5f1e3c8c2e1d
glibc-langpack-sat-2.28-164.el8.x86_64.rpm
9f568ebe2a17c81305109eff7017cee4b09b7637bcaac7a4c484162b38079865
glibc-langpack-sc-2.28-164.el8.x86_64.rpm
4c4d5ae53b25aa5684ef148df60b2c3cc36a2a82d488bbfcc3fb673ffdca0052
glibc-langpack-sd-2.28-164.el8.x86_64.rpm
d8fc70110a86407553e0729139c43d29257522ad96f011e9529473498733f9eb
glibc-langpack-se-2.28-164.el8.x86_64.rpm
1b797ea6c805b982aec5647f44969193a1146594411fa610ed2c9c9409ea9734
glibc-langpack-sgs-2.28-164.el8.x86_64.rpm
7cfdfdddfec8440cd4a64614a3f396d916ffbb20aae45e23e6f839ca95c4e489
glibc-langpack-shn-2.28-164.el8.x86_64.rpm
8714f942e23e30da08e52784f45af6d963df749b9b2716ae6c97dada44fa5048
glibc-langpack-shs-2.28-164.el8.x86_64.rpm
2fc3f7292d0e0144f9f3056693fd8cdec4da53d479fa800b3a100bfae6015e12
glibc-langpack-si-2.28-164.el8.x86_64.rpm
0c8dc30f2c49da2c31bf120f775a9e71f901e47431000e69731941e996ae0882
glibc-langpack-sid-2.28-164.el8.x86_64.rpm
de9d6cdbc816bfba2cf5301b7022f65dbb01856927942ed6d13f46f476b011f2
glibc-langpack-sk-2.28-164.el8.x86_64.rpm
3078e4c01022a9a04910131b611d49b736cc078c2d159b65244448001abd9348
glibc-langpack-sl-2.28-164.el8.x86_64.rpm
dd4945fd9c56ae768ae8089b6e3dc5179bc27be2c52da0b5630bfd716304aefc
glibc-langpack-sm-2.28-164.el8.x86_64.rpm
5919bfab90c56c3af80115b3a003c2b6d1c4ef1e578abb32f12e57fda8bc0ca9
glibc-langpack-so-2.28-164.el8.x86_64.rpm
0448dd3cd4c6693feb713ee0ff066e13760ccd4dbb969c6c7a9e528e51ff5c49
glibc-langpack-sq-2.28-164.el8.x86_64.rpm
a2b9fc838bd782744e4667a06130ed0b43089c20e8ce62b9126b9c986067ff49
glibc-langpack-sr-2.28-164.el8.x86_64.rpm
9c68902bf3ca8a332f7cd7cf9ea4e3b4e764330a803d38d06dfd5ffd2ad35d53
glibc-langpack-ss-2.28-164.el8.x86_64.rpm
a3afd5cd15e586a55de9a8e95a9f78f7048e439dfac400c541ea6eb643e3a4d8
glibc-langpack-st-2.28-164.el8.x86_64.rpm
0bdfd73262949c3a0ca60a70f4ef68a4abf331ee0004de7d27b1ed4eb7d65087
glibc-langpack-sv-2.28-164.el8.x86_64.rpm
e7151e4f37d425ed48e92c0004f70481479318c4058bbf24daface99121ab6eb
glibc-langpack-sw-2.28-164.el8.x86_64.rpm
ee13ccde0d571deba7d03b499d1150976cc24511c2087b6e8d97ac0ac4c7df5b
glibc-langpack-szl-2.28-164.el8.x86_64.rpm
82579a833dd5b36fdd24e19578782aa7f7186a2fc72e59450f2ae17c0fb30db2
glibc-langpack-ta-2.28-164.el8.x86_64.rpm
f41c7d03d612a64ccd42c3ac80cfb27da55da2438fbba77d3cda03b0c75a84c1
glibc-langpack-tcy-2.28-164.el8.x86_64.rpm
2d88394a52e345ebba4b7d5e1fb9996fec8dee21a637bdb3ee9eb39047829c83
glibc-langpack-te-2.28-164.el8.x86_64.rpm
d382a90f456bff6958b3f540619e6f5073ce6893b14fec841fa9fa13297c6d8a
glibc-langpack-tg-2.28-164.el8.x86_64.rpm
98e8dd57217523146ea66ed832513bba8de8d74c47c16e867dcad81d0eaadd8d
glibc-langpack-th-2.28-164.el8.x86_64.rpm
4334c75648fdc119070dd1b6f80ec335f7482b5f9d5e9c2053d81294c35f6ed6
glibc-langpack-the-2.28-164.el8.x86_64.rpm
273de08c380e56a33dd31c0f5ec15499e75e5e0773b18f4b86cedb30aafa72bd
glibc-langpack-ti-2.28-164.el8.x86_64.rpm
b2b64be2a1922f9ad3e49ba3df790971fdd4e57103e37be28af9f67a84fc70a3
glibc-langpack-tig-2.28-164.el8.x86_64.rpm
a39d4d52005bd37967b2523f61682dc5e8eba75a943ee15a4e33a0f38731a269
glibc-langpack-tk-2.28-164.el8.x86_64.rpm
76c8e69ad4d0fe2a0f638b7ab32d1f8a28c9da47b43d34946b58a6d3333a2141
glibc-langpack-tl-2.28-164.el8.x86_64.rpm
39cd887a91bab645c09eb905990ef627c6c9ddbf2ea8b566204815cfc3316db1
glibc-langpack-tn-2.28-164.el8.x86_64.rpm
69d7704f0ecd3c28c16a437d67d7c8cbd7c57def9843160ae310a1e4dc175880
glibc-langpack-to-2.28-164.el8.x86_64.rpm
04e3bcd352ee63bc76212fd2b5aa7c5d380b0e8f738bcb09fb3167f612c26c6f
glibc-langpack-tpi-2.28-164.el8.x86_64.rpm
3a3c2bebe729a388c9cf9df1bd00191f7a0e7f1327f948f4e48e0c4dc49baba1
glibc-langpack-tr-2.28-164.el8.x86_64.rpm
d73b0b1a62ae118dd5a5a04f022fbbfa98198038933e2bce7a0ca2ae6015cafc
glibc-langpack-ts-2.28-164.el8.x86_64.rpm
4f2c304097cce599aa778be7bd9cd2cbd856591bf78840c9fbafd9ec888971c6
glibc-langpack-tt-2.28-164.el8.x86_64.rpm
0492ecb8ef16c33665878602410623b530a61ebaad411c505a19cb4e887b8664
glibc-langpack-ug-2.28-164.el8.x86_64.rpm
e03d1cc2cf11a275e5d3946449d0f4304e4158a8a76c4484959961317045e4a7
glibc-langpack-uk-2.28-164.el8.x86_64.rpm
3717732609fbffbd9e07e275ece927501197e6cf9247b833d8c5102149a80bdb
glibc-langpack-unm-2.28-164.el8.x86_64.rpm
d24204b9eece715426a1c2af3b5634ff94e690a04d8d467bae9d2e1b1936ce1d
glibc-langpack-ur-2.28-164.el8.x86_64.rpm
118a5b214d929f2f267234abb3c7d07fa41bc44020699b568dd011c1da894104
glibc-langpack-uz-2.28-164.el8.x86_64.rpm
769672d22704aa371f258bb75e9b90a10a9e43ffe9f2bb88264eb1325164d3e5
glibc-langpack-ve-2.28-164.el8.x86_64.rpm
40474b9dfdb1d76e2ddf8637b2ae997a891188189d1215ececda466926c492ac
glibc-langpack-vi-2.28-164.el8.x86_64.rpm
1f8961e29a6635fdd3f915b10005f9709c031095d55fcbea18555b363430af11
glibc-langpack-wa-2.28-164.el8.x86_64.rpm
bf90469bdef28002b317e91c1f398d11037a34dff250f46ec39c6b0e64598c47
glibc-langpack-wae-2.28-164.el8.x86_64.rpm
2c692ac4f0bf787c0898dec7fe2e74ad5be6155e5df9f39195ba7c49e90dcca6
glibc-langpack-wal-2.28-164.el8.x86_64.rpm
499e52d389e7bf7678181eac25cf22b5e4362ec6a75b142166baf49e426321f3
glibc-langpack-wo-2.28-164.el8.x86_64.rpm
8149648d4a2f8bf04b83acc4e6720662d179f61eb9e6f3df69faf19721424ebb
glibc-langpack-xh-2.28-164.el8.x86_64.rpm
e2dd056d8e5f11265bee8da7e55c3a6b2d174092d5e36aa46d7233af22178ebb
glibc-langpack-yi-2.28-164.el8.x86_64.rpm
81c2eb4c879434ed0f868f0430f6f4b35cd9b7e16fb77e81bc5c734d51f1a802
glibc-langpack-yo-2.28-164.el8.x86_64.rpm
cc9a69fee56d5aaf8e3df560a0353dd6afc0309df48a7c5763fe1f3fc4443469
glibc-langpack-yue-2.28-164.el8.x86_64.rpm
c72443c6e491725b0b2c1ca4c4faf9f8183c72fb19b484605d3b8e51e19e5ff4
glibc-langpack-yuw-2.28-164.el8.x86_64.rpm
d48d0e60c6b5b30deff19aaf652d66bebf78bf3328f733ae33e26f9dd8164d36
glibc-langpack-zh-2.28-164.el8.x86_64.rpm
9abcb6a6a7140d7e04630cb6a301f76520b55f0aebca3a16b208b608edb911c9
glibc-langpack-zu-2.28-164.el8.x86_64.rpm
3136746855598d9b49fc19ca2c4364b5fdf0157b26fd52d25d34e323003d74d7
glibc-locale-source-2.28-164.el8.x86_64.rpm
b2d2c6aa2cae688221337cb5c36eb921fd2f5ec85066fda7cf5566ad6c02c7f9
glibc-minimal-langpack-2.28-164.el8.x86_64.rpm
85836dcf8984adc2e6ff84a6177c540df363f807bbef72fa56cc6b850d49cd16
libnsl-2.28-164.el8.i686.rpm
bfd9a78feee536307cb480b0f2f3116de03da3303fb7bcccba128faf7c36c3e2
libnsl-2.28-164.el8.x86_64.rpm
6ed22ed43474f5362944634376a319bf00fb9823f8b48e421cb393ad701a6fbd
nscd-2.28-164.el8.x86_64.rpm
89163fcc8331d0d52792c97fc91efe56ec500409ddbd328e121ed3ba3c18d93f
nss_db-2.28-164.el8.i686.rpm
3a36e8cc7e318f441f030e14ebac0cbeeb3f028cbb1d18556a689f6a8297f55c
nss_db-2.28-164.el8.x86_64.rpm
22516d7e59ef532ce5f87b853f453592aa7ebcd1713813bfb1929240043e49a9
RLBA-2021:4359
kmod-kvdo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo, vdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
kmod-kvdo-6.2.5.72-81.el8.x86_64.rpm
5834cba3a28df4936d0528246799506c75ddd65abca0b4740fa3a1f5b4a9f369
vdo-6.2.5.74-14.el8.x86_64.rpm
9b0a4e9665529835a980a0dca486c212904e5ba666438585a37e5d4f47046288
vdo-support-6.2.5.74-14.el8.x86_64.rpm
7956718a96dd2b45b68d455fc01b36f27583d9d3f9cedc695ef41117773d2a03
RLSA-2021:4374
Moderate: file security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format (ELF) binary files, system libraries, RPM packages, and different graphics formats.
Security Fix(es):
* file: heap-based buffer overflow in cdf_read_property_info in cdf.c (CVE-2019-18218)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
file-libs-5.33-20.el8.x86_64.rpm
76edea60c2f44a910fbaad0f4705b0116a361d3042570696ffa1f6d06f735657
file-5.33-20.el8.x86_64.rpm
b3ff816812aea81833f929288cde10b34175b80b0f05cbc3280eb15625731305
file-5.33-20.el8.x86_64.rpm
b3ff816812aea81833f929288cde10b34175b80b0f05cbc3280eb15625731305
file-libs-5.33-20.el8.i686.rpm
d29857da918783326a547c2cd3e332fe0aefe91e9fbf7de44bdccc52b6c36007
file-libs-5.33-20.el8.i686.rpm
d29857da918783326a547c2cd3e332fe0aefe91e9fbf7de44bdccc52b6c36007
file-libs-5.33-20.el8.x86_64.rpm
76edea60c2f44a910fbaad0f4705b0116a361d3042570696ffa1f6d06f735657
python3-magic-5.33-20.el8.noarch.rpm
57ff09854617dbb0bc6f6f40cd5eee425e95f98240f9efb09c68545d8f16b333
python3-magic-5.33-20.el8.noarch.rpm
57ff09854617dbb0bc6f6f40cd5eee425e95f98240f9efb09c68545d8f16b333
python3-magic-5.33-20.el8.noarch.rpm
57ff09854617dbb0bc6f6f40cd5eee425e95f98240f9efb09c68545d8f16b333
python3-magic-5.33-20.el8.noarch.rpm
57ff09854617dbb0bc6f6f40cd5eee425e95f98240f9efb09c68545d8f16b333
RLBA-2021:4360
which bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for which.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
which-2.21-16.el8.x86_64.rpm
592c5465a712cf62b92d3d21365cb25eb047d02e8c5f5f800ac27e43512d94c5
RLSA-2021:4361
Moderate: NetworkManager security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
The following packages have been upgraded to a later upstream version: NetworkManager (1.32.10). (BZ#1934465)
Security Fix(es):
* systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured (CVE-2020-13529)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
NetworkManager-1.32.10-4.el8.x86_64.rpm
8219a614ecef38416ad83f01efcc99e225dcd52a9724fb2849543f17e9635347
NetworkManager-adsl-1.32.10-4.el8.x86_64.rpm
d900986c079c176f092d462b3326b69e33bec7b1c3b61278c3f00d8f0bbce8af
NetworkManager-bluetooth-1.32.10-4.el8.x86_64.rpm
cad7a058b86dea8d8051699793295076e40f9a729b669d290b8e55dbb36e9b06
NetworkManager-config-connectivity-redhat-1.32.10-4.el8.noarch.rpm
3235d0950e9226e93a54869448e0d206540246e6c13c547b1ed6aa45d305ee45
NetworkManager-config-connectivity-redhat-1.32.10-4.el8.noarch.rpm
3235d0950e9226e93a54869448e0d206540246e6c13c547b1ed6aa45d305ee45
NetworkManager-config-server-1.32.10-4.el8.noarch.rpm
03eea92d4979e1c791b84942aac2023cf7daba184fb6c9d5c6fcc2f590f7f8d0
NetworkManager-config-server-1.32.10-4.el8.noarch.rpm
03eea92d4979e1c791b84942aac2023cf7daba184fb6c9d5c6fcc2f590f7f8d0
NetworkManager-dispatcher-routing-rules-1.32.10-4.el8.noarch.rpm
5bb6c9aa7b7aa4b1d7fff9fd72c679038a56364a46713b14de797dd38da020a7
NetworkManager-dispatcher-routing-rules-1.32.10-4.el8.noarch.rpm
5bb6c9aa7b7aa4b1d7fff9fd72c679038a56364a46713b14de797dd38da020a7
NetworkManager-libnm-1.32.10-4.el8.i686.rpm
92919c085c8671782722913005648d39d6f9f40a8ef56a963320e10b61030fa1
NetworkManager-libnm-1.32.10-4.el8.x86_64.rpm
0a7667b198921a8ca2f671ad6eff553415f5bc6542a4ccbe22159ca8603228a8
NetworkManager-ovs-1.32.10-4.el8.x86_64.rpm
f6b852ef800357b56f8c736a91236560eccda19b10fe4908f5738dd01aba634a
NetworkManager-ppp-1.32.10-4.el8.x86_64.rpm
039b44410ff22ded653b00ad58c911731f63c526ce470f2fdbd12af2853bb121
NetworkManager-team-1.32.10-4.el8.x86_64.rpm
1eff75d738eb23047e6e3e8aafc6f10e86b4dfb5bd1fe53fd75bed45d975e6d1
NetworkManager-tui-1.32.10-4.el8.x86_64.rpm
75832e3e9b734d81ddf078739a89d06bd6513822173481b6c65116eea6a7e06c
NetworkManager-wifi-1.32.10-4.el8.x86_64.rpm
45f4ba3796ebf47c42c57e92fe75f22fa31845ccfd8983768e4b59e7e7f36426
NetworkManager-wwan-1.32.10-4.el8.x86_64.rpm
bb3ae72c45fd66828599409eabdb48b5e7ee21e56358434172aacf2b8f7d77a3
RLBA-2021:4362
ModemManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ModemManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
ModemManager-1.10.8-4.el8.x86_64.rpm
86d30e3cc892109e3c38f8300ea966e13ffc833520a5b53adc95ad51e6f14b4e
ModemManager-glib-1.10.8-4.el8.i686.rpm
491449269dd3f967785b694d249bd4fc91b3527b4db4fcb5db08be1648d4ecbb
ModemManager-glib-1.10.8-4.el8.x86_64.rpm
879009dad0006de6e14fc35684d0afd1b33c3f3a7faf44a8dd392b3e1a96f959
RLSA-2021:4364
Moderate: binutils security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Security Fix(es):
* binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() (CVE-2021-3487)
* binutils: Race window allows users to own arbitrary files (CVE-2021-20197)
* binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c (CVE-2020-35448)
* binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (CVE-2021-20284)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
binutils-2.30-108.el8.x86_64.rpm
9d8fbfaee5dc252304059db1f63ad2ec26cba0282d8494b55d423351bcbcccd0
RLEA-2021:4366
libstoragemgmt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libstoragemgmt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libstoragemgmt-1.9.1-1.el8.i686.rpm
59d8cdc444bbdf67e22aa626398cc3ac6a51dfe0e0b893bf6f7748f901050957
libstoragemgmt-1.9.1-1.el8.x86_64.rpm
430cdf16f1120c681c2d4247f8f544765c6a45f71735224a5b3bb7b511d38a8e
libstoragemgmt-arcconf-plugin-1.9.1-1.el8.noarch.rpm
e3271a406cacdc48575b89c382884728cf6b6fb4868551653e291bc803412c26
libstoragemgmt-arcconf-plugin-1.9.1-1.el8.noarch.rpm
e3271a406cacdc48575b89c382884728cf6b6fb4868551653e291bc803412c26
libstoragemgmt-hpsa-plugin-1.9.1-1.el8.noarch.rpm
10e5299c6eb6681dcabb332b6404df22dfec7a8c0fb012c1ef66979277047c3e
libstoragemgmt-hpsa-plugin-1.9.1-1.el8.noarch.rpm
10e5299c6eb6681dcabb332b6404df22dfec7a8c0fb012c1ef66979277047c3e
libstoragemgmt-local-plugin-1.9.1-1.el8.noarch.rpm
f2b1fc6fffea6a5c4d1ec526edd29556c78578e260ed817968331c3ba3ed86fd
libstoragemgmt-local-plugin-1.9.1-1.el8.noarch.rpm
f2b1fc6fffea6a5c4d1ec526edd29556c78578e260ed817968331c3ba3ed86fd
libstoragemgmt-megaraid-plugin-1.9.1-1.el8.noarch.rpm
a93efef8d28c07c59cfea9af732b1075a7679ab9f0ddb7a682d555e53f70999b
libstoragemgmt-megaraid-plugin-1.9.1-1.el8.noarch.rpm
a93efef8d28c07c59cfea9af732b1075a7679ab9f0ddb7a682d555e53f70999b
libstoragemgmt-smis-plugin-1.9.1-1.el8.noarch.rpm
17b037b18590c16c28da02491ad6183ddb38d9b7e5615e3c9b4452885692c8f5
libstoragemgmt-smis-plugin-1.9.1-1.el8.noarch.rpm
17b037b18590c16c28da02491ad6183ddb38d9b7e5615e3c9b4452885692c8f5
libstoragemgmt-udev-1.9.1-1.el8.x86_64.rpm
f0b8d04cb09cd2c713800f68dc9549a2da8d5ac63d82646e2c7bdaa0b8ebd7f7
python3-libstoragemgmt-1.9.1-1.el8.i686.rpm
4216028079ca39bf7189054adff70a0629024fd58573e10fbde452757a81fd80
python3-libstoragemgmt-1.9.1-1.el8.x86_64.rpm
2d71c0b3fbda037d43297c7236ec3c5c4d4f97e2d385bb0aaa524459096e2c5e
RLBA-2021:4367
device-mapper-multipath bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-multipath-0.8.4-17.el8.x86_64.rpm
6c926ec53efb3fd31766c47e40b3410ee7dd6cec6a26df45c5958afd045b61d2
device-mapper-multipath-libs-0.8.4-17.el8.i686.rpm
7e5b98584724259c123fab33b553179a028d21966603fc3e1ce0fa151158312d
device-mapper-multipath-libs-0.8.4-17.el8.x86_64.rpm
fc44c1578c11fe3e6336b159ba3189866deba6bdb5c823c8c2f49889caca1abc
kpartx-0.8.4-17.el8.x86_64.rpm
b0ab5a64fb89f2fd647a4a10dcd3535d44e903c1af526778a13d43be99411bed
libdmmp-0.8.4-17.el8.i686.rpm
3a6c20dd293e7cf5b15cbd4457a02bc1777335c3f5540a240720a3f3d5308a13
libdmmp-0.8.4-17.el8.x86_64.rpm
17783aee037816faf813a2a53c39b93fd06e8f693ccad7de2eafc516a0abae57
RLSA-2021:4368
Moderate: openssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Observable discrepancy leading to an information leak in the algorithm negotiation (CVE-2020-14145)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
openssh-8.0p1-10.el8.x86_64.rpm
5555f23023760bda0d4418306bdff9ecbc9e068a0331982b154385583feb079e
openssh-cavs-8.0p1-10.el8.x86_64.rpm
10732b1e750fc12e561bc0a720789ca45a254df850bbac97b091f6125fd0cd87
openssh-clients-8.0p1-10.el8.x86_64.rpm
cf2fd404a872aa158b609f52019d005e3d857e4fef97f7e47b240376e109a73b
openssh-keycat-8.0p1-10.el8.x86_64.rpm
65ced97e4686e86316ca8586c73ea01d840f16c111a7cdcc18165821a5daad95
openssh-ldap-8.0p1-10.el8.x86_64.rpm
2e0f1f65e41a9b4a42507e884b3c9dec0bb192e92b63aad2de8e06db332fa93e
openssh-server-8.0p1-10.el8.x86_64.rpm
82abc5ffdf0839f106d2fee674e41f7fca752aeb55e706b2d641d4cca2bc96d2
pam_ssh_agent_auth-0.10.3-7.10.el8.x86_64.rpm
f4ac8edfc6d02e2669d9058c5e07f164ac0af83e35db8de898eef74bc29b3e3e
RLBA-2021:4370
virt-what bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-what.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
virt-what-1.18-12.el8.x86_64.rpm
96d3a8a22bad06b9c7d2cfcf37c2f2fe65773b9488d14719d41ffbfcff9b6fd9
RLBA-2021:4372
autofs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
autofs-5.1.4-74.el8.x86_64.rpm
26f8019a3cb5e37ebf8659c7986e9958556cb3e197a33b6d71b08c6640657229
RLBA-2021:4375
libtirpc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtirpc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libtirpc-1.1.4-5.el8.i686.rpm
9933fa70d62e2ef00e601dec871972a077c2e08c477802269fe89c49ec9cb230
libtirpc-1.1.4-5.el8.x86_64.rpm
f3078ae81098ab1ba894e1b2c075396e3d38711f1b6de180eefa92e58e82a44e
libtirpc-devel-1.1.4-5.el8.i686.rpm
52bb8758ad378f31f50f4ebd06951384fbd0cb49660340e0661dd8d7a8840d1d
libtirpc-devel-1.1.4-5.el8.x86_64.rpm
b93bb8f4f1c11f6b349cdf6fdf580bee55d8035fe83905897d0c14d2fded3d54
RLBA-2021:4376
dmidecode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
dmidecode-3.2-10.el8.x86_64.rpm
675e25f187dd0d1dfa49bd0e44675630aabbfae49cef3850182c3f98831b3981
RLBA-2021:4378
krb5 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
krb5-devel-1.18.2-14.el8.i686.rpm
d5a7891e7901a55be70af00b0c3d1297b006aedec57eaae641041308bbd525e7
krb5-devel-1.18.2-14.el8.i686.rpm
d5a7891e7901a55be70af00b0c3d1297b006aedec57eaae641041308bbd525e7
krb5-devel-1.18.2-14.el8.x86_64.rpm
211d261784a4c9d5c5f418210623f0585a2718ea3a585dc69a8f61114544954c
krb5-devel-1.18.2-14.el8.x86_64.rpm
211d261784a4c9d5c5f418210623f0585a2718ea3a585dc69a8f61114544954c
krb5-libs-1.18.2-14.el8.i686.rpm
8b5120bc8cfbe4b98701a7361c15a627c1d479ee27fca245cb305fd6cec689c6
krb5-libs-1.18.2-14.el8.i686.rpm
8b5120bc8cfbe4b98701a7361c15a627c1d479ee27fca245cb305fd6cec689c6
krb5-libs-1.18.2-14.el8.x86_64.rpm
1269e26b528b4761aacdfe6fb2d9a3626b83b9766a60a5ec2b4d662f2e49b15a
krb5-libs-1.18.2-14.el8.x86_64.rpm
1269e26b528b4761aacdfe6fb2d9a3626b83b9766a60a5ec2b4d662f2e49b15a
krb5-pkinit-1.18.2-14.el8.i686.rpm
431665bb9d3848a4e7821a4236c7be912054216fabe100ef9f6da341d4d55362
krb5-pkinit-1.18.2-14.el8.i686.rpm
431665bb9d3848a4e7821a4236c7be912054216fabe100ef9f6da341d4d55362
krb5-pkinit-1.18.2-14.el8.x86_64.rpm
8f22a2ade7123d83b960a53650dca479fd0de1f61f4155ba611f49c661ccdaed
krb5-pkinit-1.18.2-14.el8.x86_64.rpm
8f22a2ade7123d83b960a53650dca479fd0de1f61f4155ba611f49c661ccdaed
krb5-server-1.18.2-14.el8.i686.rpm
6e9c5db9d8b12174444e1a7e523604948ab752a6adca803dbb6e6a448f45757c
krb5-server-1.18.2-14.el8.i686.rpm
6e9c5db9d8b12174444e1a7e523604948ab752a6adca803dbb6e6a448f45757c
krb5-server-1.18.2-14.el8.x86_64.rpm
3db1b75db8154ca266e9626735f11347c79ed2a9947b566bf655a944fbf59961
krb5-server-1.18.2-14.el8.x86_64.rpm
3db1b75db8154ca266e9626735f11347c79ed2a9947b566bf655a944fbf59961
krb5-server-ldap-1.18.2-14.el8.i686.rpm
6405d174c708f69edbd2ab513c01d668c135f800479f1d8ed72e5f50c0546dfe
krb5-server-ldap-1.18.2-14.el8.i686.rpm
6405d174c708f69edbd2ab513c01d668c135f800479f1d8ed72e5f50c0546dfe
krb5-server-ldap-1.18.2-14.el8.x86_64.rpm
df5d56508d135aabb9e2b5bdc292e75ec69adadfa6c261c93b90133fac333572
krb5-server-ldap-1.18.2-14.el8.x86_64.rpm
df5d56508d135aabb9e2b5bdc292e75ec69adadfa6c261c93b90133fac333572
krb5-workstation-1.18.2-14.el8.x86_64.rpm
76dcfafcbe7d0590a971d63f4c208630742a118e78a158f64a749751973a09ca
krb5-workstation-1.18.2-14.el8.x86_64.rpm
76dcfafcbe7d0590a971d63f4c208630742a118e78a158f64a749751973a09ca
libkadm5-1.18.2-14.el8.i686.rpm
fa6b13350965417c7c53188b9e9942f4816cbf58dcbbdd46f5f9fd855bbd961e
libkadm5-1.18.2-14.el8.i686.rpm
fa6b13350965417c7c53188b9e9942f4816cbf58dcbbdd46f5f9fd855bbd961e
libkadm5-1.18.2-14.el8.x86_64.rpm
a29cf955d30edf73bded25dfbefeeeb3334e0cabe1323bba47b2273a3a6b7a46
libkadm5-1.18.2-14.el8.x86_64.rpm
a29cf955d30edf73bded25dfbefeeeb3334e0cabe1323bba47b2273a3a6b7a46
RLBA-2021:4380
cockpit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
cockpit-251.1-1.el8.x86_64.rpm
f94b4ac1e6a1028d3b5c8b532f5e2897073de266a1fe1d0692aa1681226e0fb0
cockpit-bridge-251.1-1.el8.x86_64.rpm
1fdf2dfc08ca8565c0cc91a7f0b8fbe60f1c47b9b0a2c70b71eceeefb3320b52
cockpit-doc-251.1-1.el8.noarch.rpm
d93fd922e67b4d2d59742e032d24e30456f05fc49d4c7fae63e25f86c76c8018
cockpit-doc-251.1-1.el8.noarch.rpm
d93fd922e67b4d2d59742e032d24e30456f05fc49d4c7fae63e25f86c76c8018
cockpit-system-251.1-1.el8.noarch.rpm
72727001f09b6123e89a69567256f5b38c6d3c0b39d896de4854196c0fbcad7f
cockpit-system-251.1-1.el8.noarch.rpm
72727001f09b6123e89a69567256f5b38c6d3c0b39d896de4854196c0fbcad7f
cockpit-ws-251.1-1.el8.x86_64.rpm
c9309d53600d43770eb1cffc91f785665a1a99fa83a11349351152bee0de4fa9
RLSA-2021:4384
Moderate: bind security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly (CVE-2021-25214)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
bind-export-devel-9.11.26-6.el8.i686.rpm
07b0acb212340fc0c5d7588bd5cd8f128f72a1954e257d6fe8854e11a215320a
bind-export-devel-9.11.26-6.el8.x86_64.rpm
275552fa64206d19cc1502efb1abd99a057b1f3650672df505a1bbd80302c9a2
bind-export-libs-9.11.26-6.el8.i686.rpm
2ab7f420611a481fa94be65665071e0b5f799fcf821096773aee7c56154e3ff8
bind-export-libs-9.11.26-6.el8.x86_64.rpm
0b93e1157b7cde3b4e6289a789a4b966a827cc04f558185d234b15cf5e8d8dbc
RLSA-2021:4385
Moderate: glib2 security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib2: Possible privilege escalation thourgh pkexec and aliases (CVE-2021-3800)
* glib: g_file_replace() with G_FILE_CREATE_REPLACE_DESTINATION creates empty target for dangling symlink (CVE-2021-28153)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
glib2-2.56.4-156.el8.i686.rpm
9559423471cc2b9d1c95aa32c548f24b1dca8a53ce33d0ac13b4235c166530b4
glib2-2.56.4-156.el8.x86_64.rpm
d0daebe71291aff02c68df450d46a6cec72a5ad652ca0d24531746d75bc0d8fa
glib2-devel-2.56.4-156.el8.i686.rpm
7c5330df8ec8b011be523c27c590c6806ac6932489ff357069ef574da8213c3b
glib2-devel-2.56.4-156.el8.x86_64.rpm
642b5ce59ed2cadf2483aaa0372c4331db5a7d9630f910742c16b8eb2a42b533
glib2-fam-2.56.4-156.el8.x86_64.rpm
cf131cc4f984a6e778bcf5084143fdac3b846cd50704988b2df815b012118a14
glib2-tests-2.56.4-156.el8.x86_64.rpm
ee9ce46b3830a965e8c625642060ff09f58ec369c11f42afd1980faf273af1cb
RLSA-2021:4386
Low: gcc security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* libiberty: Integer overflow in demangle_template() function (CVE-2018-20673)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libasan-8.5.0-3.el8.i686.rpm
40cd1505c7f3112b7ded4c59249b47347ec4001964fc6b807c8f3d2072afc765
libasan-8.5.0-3.el8.x86_64.rpm
4c8cc2b3138aa07242d35ee119b4107db41882ccd62fc62a8790b344ac9d5de0
libatomic-8.5.0-3.el8.i686.rpm
73a1c01b35376a58dc02428d44440003a7ec0165c5f105c68198e7ae4beda5d7
libatomic-8.5.0-3.el8.x86_64.rpm
e395e681f290d7e395a4e16aaa4a4665cb09c0a3daaf06f78ef50732fa71ca8c
libatomic-static-8.5.0-3.el8.i686.rpm
39c2788ba4799e45eb6a1e9b559d1121f0b7e15aef4a9c269e5e714f4c825f1c
libatomic-static-8.5.0-3.el8.x86_64.rpm
e7b3d10b47fb839e5abdd9bf3279124c55b1ff7746b3e13452b0bdcc9febe28d
libgcc-8.5.0-3.el8.i686.rpm
ff29e12f4add048b691bd2983f58c6c0ebe979623f7280792bacdb484adb23d2
libgcc-8.5.0-3.el8.x86_64.rpm
db3e18fe12716a40e8c284d7286f294af030fb2702d0b03b1393ac7a9098759b
libgfortran-8.5.0-3.el8.i686.rpm
0a9881a5b0ac1fca4e054e7cec4ea748853ad06b15ccecc26268818d6c28b698
libgfortran-8.5.0-3.el8.x86_64.rpm
97b2f8bef0faa9cdc87e4d9509d440874de6585c327f743f0a07c1f964fc95c9
libgomp-8.5.0-3.el8.i686.rpm
6b75cff17249d1e1937cc4a0c8478df993931fa67a60c533d69c8402bb76d757
libgomp-8.5.0-3.el8.x86_64.rpm
dd66f22ce556cf57b311ad7706ef0caaee21922f0e20d44b953c6218c45c6261
libgomp-offload-nvptx-8.5.0-3.el8.x86_64.rpm
2e35fff973caad825421e0df75d99bca6945b94b3483466db4bc37bb5acf61f4
libitm-8.5.0-3.el8.i686.rpm
3c0335e6c9c2017cd4757734ab2601d0485946b9423b0cb49f61b76a8d404f0c
libitm-8.5.0-3.el8.x86_64.rpm
c4cdc88a821775d6b112330a4916aface38e7830630d35df725073cdcde024ee
liblsan-8.5.0-3.el8.x86_64.rpm
41413e011198f1772ce685ef01a0916723ed4dfc7132e037dc73ac6cb179bb23
libquadmath-8.5.0-3.el8.i686.rpm
0ef6336f2b130789e80bf2a1def524386a51c4f7f3cfceeeab8a8c2779ebb2ec
libquadmath-8.5.0-3.el8.x86_64.rpm
11f908542775fb7d2068b17c7c450ab636febeb46daedb165f1c8adcff17435d
libstdc++-8.5.0-3.el8.i686.rpm
2ef81b93bf7b445bdd3a1584567974f09b0883815c6fe7291e9a7854f580a0a5
libstdc++-8.5.0-3.el8.x86_64.rpm
be0a688bf057c574f3208d3e5c99d3afcd6b5a2d04211d92b4c25da003ec8075
libtsan-8.5.0-3.el8.x86_64.rpm
fb2599cbde4fcfd5ceb0128f0c8f6de575d12d402e00892e0e91413ba6b8da36
libubsan-8.5.0-3.el8.i686.rpm
0e9f4971b9306468d6723b6be09b1d5b51d9ce25d62e3d7c2ffab5e89feddd66
libubsan-8.5.0-3.el8.x86_64.rpm
ae69183a3f1a8770826a8325a233c41213e5bdeeef8a6a089e8047b4a2f9b43e
RLSA-2021:4387
Low: libssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: NULL pointer dereference in sftpserver.c if ssh_buffer_new returns NULL (CVE-2020-16135)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libssh-0.9.4-3.el8.i686.rpm
6b666af6ed073443ddf154144aabebfe9d4437ff7d61e48c5cdd5a343e07b300
libssh-0.9.4-3.el8.x86_64.rpm
18e68ddb2bca1e188b76b487396225e0ead6e4b09818f81cf3d077c4be60cfe3
libssh-config-0.9.4-3.el8.noarch.rpm
cd9235af7f4e353b4a946975b1fa6c30c1e3952d6ba2744cda79a65f0b4c3572
libssh-config-0.9.4-3.el8.noarch.rpm
cd9235af7f4e353b4a946975b1fa6c30c1e3952d6ba2744cda79a65f0b4c3572
RLEA-2021:4388
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
sos-4.1-5.el8.noarch.rpm
75b87368bf8358ad9533925ba5e3c02c3537cb33e82d898126fb964d755e27fe
sos-4.1-5.el8.noarch.rpm
75b87368bf8358ad9533925ba5e3c02c3537cb33e82d898126fb964d755e27fe
sos-audit-4.1-5.el8.noarch.rpm
3fed5a9c176bd2803cf61635834e05a8aebda183018f02d982a1f6bfa0c4642f
sos-audit-4.1-5.el8.noarch.rpm
3fed5a9c176bd2803cf61635834e05a8aebda183018f02d982a1f6bfa0c4642f
RLBA-2021:4390
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.21-3.el8.x86_64.rpm
72c42dcd1f6cd8f8c0e8bc22b1d9ebc7331412679cecf6d89160189368646c7d
python3-cloud-what-1.28.21-3.el8.x86_64.rpm
cdef5409dd03e44176219c2f9aba49ac96fb2336f74bb5f566d547dcfcc0c3a0
python3-subscription-manager-rhsm-1.28.21-3.el8.x86_64.rpm
fc48e6f32ff9e5efe9302dfdd84ab9a891309064c9057d59d3578e978efe51c2
python3-syspurpose-1.28.21-3.el8.x86_64.rpm
26dbc17fab3f7e1a61172e25e7c6fb41b3933325ea2faf27e03b656c9b16b6d1
rhsm-icons-1.28.21-3.el8.noarch.rpm
0120420e10f5aad6b27f3c729b5602db159869bc3b343f8e491fc45343502ed3
rhsm-icons-1.28.21-3.el8.noarch.rpm
0120420e10f5aad6b27f3c729b5602db159869bc3b343f8e491fc45343502ed3
subscription-manager-1.28.21-3.el8.x86_64.rpm
a9f46689e80b4a55db5a25cd1108c8412f4ecf8c02ac7714e058580fd77d4543
subscription-manager-cockpit-1.28.21-3.el8.noarch.rpm
b9a0654b9848cc3190b9d81aacbc69d23f811324839829ce30ba58bea4c5fe8e
subscription-manager-cockpit-1.28.21-3.el8.noarch.rpm
b9a0654b9848cc3190b9d81aacbc69d23f811324839829ce30ba58bea4c5fe8e
subscription-manager-plugin-ostree-1.28.21-3.el8.x86_64.rpm
6192556ce60a3738da020ca1570bde34c15de65a0f1ef0f0a6bd21d33dd8851e
subscription-manager-rhsm-certificates-1.28.21-3.el8.x86_64.rpm
e549497ed91645c71e6d3dd5845aee33cf46012405da3f55f44d7d32d9bf8e35
RLBA-2021:4391
kmod bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
kmod-25-18.el8.x86_64.rpm
427238de42cf851c1aa6c5c253cb123d4fd054e9ea1d76f375298fbcb77120e4
kmod-libs-25-18.el8.i686.rpm
5456ea03c530647f69d51010f1cab984e8f8b6806446cfb9d3d961dd84b13ddc
kmod-libs-25-18.el8.x86_64.rpm
b9702c1babfa3debe6b1c1770d15fc9e918ff326a30299504c53d5c42e2b21c8
RLSA-2021:4393
Moderate: cups security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: access to uninitialized buffer in ipp.c (CVE-2020-10001)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
cups-libs-2.2.6-40.el8.i686.rpm
3a2ea622b7522cfb184498e61b1ec21aaf7a54c835bedecf40ddd1d8a8f53ca9
cups-libs-2.2.6-40.el8.x86_64.rpm
56c6b59b3efd2eacb42551ac66b2884786e9679e0a245e62f2a09dec921c4b8f
RLBA-2021:4394
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
dracut-049-191.git20210920.el8.x86_64.rpm
bf5fd9b77b6a8bef6d0eb86b2bdacca58c6f1bfaa49e8be8743053d96319f7d2
dracut-caps-049-191.git20210920.el8.x86_64.rpm
edd1749e4de93b5cd864c707013b8fdf1c68b6d4b37d4e0cf69383dd51351a1f
dracut-config-generic-049-191.git20210920.el8.x86_64.rpm
8dde73fb50b1c383c9d2136c124ce195dc99641691b44823eddb9f3cc506e1c0
dracut-config-rescue-049-191.git20210920.el8.x86_64.rpm
8e22fa0964ea96d99925da791952ac05e0dc00d622a6b3508ff9451484ad6c77
dracut-live-049-191.git20210920.el8.x86_64.rpm
66c8c222eb2d2c8618d52d4ae1bad6acd32af9bcda98429c512645c5e1cf381b
dracut-network-049-191.git20210920.el8.x86_64.rpm
29704cc46b11dad25c2c7f3ab9a65bf172a830802b3c2e8c21caf96d88a2eaee
dracut-squash-049-191.git20210920.el8.x86_64.rpm
a8fe6d86940b6a924cc10b57dd5103c774393ab2ff84886b9962dba7105c53d0
dracut-tools-049-191.git20210920.el8.x86_64.rpm
b5f9f39aab3f6cfc34aabe8eba179e4d1a1513c0ce61ffd3857cc17bb6d3cedb
RLBA-2021:4395
pam bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
pam-1.3.1-15.el8.i686.rpm
b2fa9391214c7ac7f647a54198e0efef725c4994158e64e07d4fab400da713c6
pam-1.3.1-15.el8.x86_64.rpm
abc379d8c90e155528a74602b39eb4f475c48b924c50e27c31378d7ed425c433
pam-devel-1.3.1-15.el8.i686.rpm
64576baf0bea9ac2e850069462f219218e5a16b0806afd51b9d3d4c1ec243927
pam-devel-1.3.1-15.el8.x86_64.rpm
0209965df407771c2e40ac7c11b2184052dc1cd703af81e2236347150cabb011
RLSA-2021:4396
Moderate: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: out-of-bounds access due to the use of 32-bit memory allocator interfaces (CVE-2019-5827)
* sqlite: dropping of shadow tables not restricted in defensive mode (CVE-2019-13750)
* sqlite: fts3: improve detection of corrupted records (CVE-2019-13751)
* sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS (CVE-2019-19603)
* sqlite: NULL pointer dereference in sqlite3ExprCodeTarget() (CVE-2020-13435)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
sqlite-3.26.0-15.el8.i686.rpm
5d8274ffd244726cc7ad4fe2a63c3868412df854db9181dc87f45d4ca3cabb21
sqlite-3.26.0-15.el8.i686.rpm
5d8274ffd244726cc7ad4fe2a63c3868412df854db9181dc87f45d4ca3cabb21
sqlite-3.26.0-15.el8.x86_64.rpm
92119cc6c23657a7547d6f44f8fa847b4e45336d8b43b9a27ed6c755f9384777
sqlite-3.26.0-15.el8.x86_64.rpm
92119cc6c23657a7547d6f44f8fa847b4e45336d8b43b9a27ed6c755f9384777
sqlite-devel-3.26.0-15.el8.i686.rpm
9f0fcdb8bb762de7d697281f0075f56d4ea5a312934194b926ac1fef05604f89
sqlite-devel-3.26.0-15.el8.i686.rpm
9f0fcdb8bb762de7d697281f0075f56d4ea5a312934194b926ac1fef05604f89
sqlite-devel-3.26.0-15.el8.x86_64.rpm
51fc6ca66ee8c29eabfdfaeccb09eb7458fcb4c93baa33f5a77ac8faa24c2314
sqlite-devel-3.26.0-15.el8.x86_64.rpm
51fc6ca66ee8c29eabfdfaeccb09eb7458fcb4c93baa33f5a77ac8faa24c2314
sqlite-doc-3.26.0-15.el8.noarch.rpm
45a518871657f95edb057e2acf0b38992a5bbfb2f8c9c7393d60fb2c7d157367
sqlite-doc-3.26.0-15.el8.noarch.rpm
45a518871657f95edb057e2acf0b38992a5bbfb2f8c9c7393d60fb2c7d157367
sqlite-doc-3.26.0-15.el8.noarch.rpm
45a518871657f95edb057e2acf0b38992a5bbfb2f8c9c7393d60fb2c7d157367
sqlite-doc-3.26.0-15.el8.noarch.rpm
45a518871657f95edb057e2acf0b38992a5bbfb2f8c9c7393d60fb2c7d157367
sqlite-libs-3.26.0-15.el8.i686.rpm
95be51cb1aa0f9b07174cddc14e92f343156a476253807fd3309b4cbd1900886
sqlite-libs-3.26.0-15.el8.i686.rpm
95be51cb1aa0f9b07174cddc14e92f343156a476253807fd3309b4cbd1900886
sqlite-libs-3.26.0-15.el8.x86_64.rpm
33d18ae2a33bc894bfa7a04bfe403dd1cb9ddc93bbb86c5f97a8cbdbee1b4820
sqlite-libs-3.26.0-15.el8.x86_64.rpm
33d18ae2a33bc894bfa7a04bfe403dd1cb9ddc93bbb86c5f97a8cbdbee1b4820
RLBA-2021:4400
nvme-cli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nvme-cli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
nvme-cli-1.14-3.el8.x86_64.rpm
854e1a0ee1edb0f28c33ff38fd2f10d681cd0e120c9c104b4219593bd25c3a20
RLBA-2021:4403
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libnfsidmap-2.3.3-46.el8.i686.rpm
616caa7303e83702bf7ba1c24ba8780fd80e1ba4f8b3bf1c58b1b2381b5aace9
libnfsidmap-2.3.3-46.el8.x86_64.rpm
d63e1d85d5a2761992705efee86b0b868bb69f7b16022d65c5531459dcc5df76
nfs-utils-2.3.3-46.el8.x86_64.rpm
74ce9af45237314fba3984bfa547b18289e94459b8d49287df01a144cf9391c7
RLSA-2021:4404
Low: kexec-tools security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel.
Security Fix(es):
* kexec-tools: incorrect permissions on kdump dmesg file (CVE-2021-20269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
kexec-tools-2.0.20-57.el8.x86_64.rpm
23580abc20d4b20d8451df6376aea142a4af86832b8b115c07f0852ecf27e753
RLBA-2021:4407
libcomps bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcomps.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libcomps-0.1.16-2.el8.i686.rpm
c06f027a1ee5cb8735628d947c4ed3c30e378d55638c82cf293265722d8611e4
libcomps-0.1.16-2.el8.x86_64.rpm
725ae9de31f8090cf3bb41fbf1400b8b7353725b960cf42eb69be188559e8bfb
python3-libcomps-0.1.16-2.el8.x86_64.rpm
1030a20c970214e96db595e9111307a95c58f91ed02549e3a7769ce8a663e893
RLSA-2021:4408
Low: libsolv security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm.
Security Fix(es):
* libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c (CVE-2021-3200)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libsolv-0.7.19-1.el8.i686.rpm
1710bf39fa51a3f9fce15cb82512c28b8f443107e332ef6d24147f589fd4ac77
libsolv-0.7.19-1.el8.x86_64.rpm
508a5ffb6de51afca2840ce6b5dc6a46a6a1808da9e64e772277d09735d3ef56
python3-solv-0.7.19-1.el8.x86_64.rpm
64600a7b17155a74509834e8c637d8b2f06d68b4736980b63f5a993b9b43042c
RLSA-2021:4409
Moderate: libgcrypt security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libgcrypt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
Security Fix(es):
* libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm (CVE-2021-33560)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libgcrypt-1.8.5-6.el8.i686.rpm
cc6183ebbd1fcc66e2da5430968d494cf481b3f51b9994b43afa096da361e2c1
libgcrypt-1.8.5-6.el8.i686.rpm
cc6183ebbd1fcc66e2da5430968d494cf481b3f51b9994b43afa096da361e2c1
libgcrypt-1.8.5-6.el8.x86_64.rpm
119e47dab1357f9afbf80f8c3ef09b4d5c615a7ec707080d9070c1d51f72a41d
libgcrypt-1.8.5-6.el8.x86_64.rpm
119e47dab1357f9afbf80f8c3ef09b4d5c615a7ec707080d9070c1d51f72a41d
libgcrypt-devel-1.8.5-6.el8.i686.rpm
7b8895f0dedc5ea59d68a8f2604e3abec3bfe60a0c73481dd9644d0d15a9f68b
libgcrypt-devel-1.8.5-6.el8.i686.rpm
7b8895f0dedc5ea59d68a8f2604e3abec3bfe60a0c73481dd9644d0d15a9f68b
libgcrypt-devel-1.8.5-6.el8.x86_64.rpm
66917bd08df131ccce2d80ede51b5be2b4e971e00cb852ca291a4f89b3bce9d0
libgcrypt-devel-1.8.5-6.el8.x86_64.rpm
66917bd08df131ccce2d80ede51b5be2b4e971e00cb852ca291a4f89b3bce9d0
RLBA-2021:4417
shadow-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shadow-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
shadow-utils-4.6-14.el8.x86_64.rpm
23df0717a7a679c4736aecdc8e106b3f4853e31075c332798640a6c5301a1d66
RLBA-2021:4418
coreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for coreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
coreutils-8.30-12.el8.x86_64.rpm
9b65fbd5e3e9b67e172fb76ae97b2d80948199b8614f8cd1169652e029fca8a0
coreutils-8.30-12.el8.x86_64.rpm
9b65fbd5e3e9b67e172fb76ae97b2d80948199b8614f8cd1169652e029fca8a0
coreutils-common-8.30-12.el8.x86_64.rpm
5123912d558612b179d91500a4d322f9d2714b9bd7dc7ce38c5b3a18d203cf43
coreutils-common-8.30-12.el8.x86_64.rpm
5123912d558612b179d91500a4d322f9d2714b9bd7dc7ce38c5b3a18d203cf43
coreutils-single-8.30-12.el8.x86_64.rpm
fc64b5a5f9f62ba87685254647db1cc6a8a8b3938d89dff93fddc2e1e0704efb
coreutils-single-8.30-12.el8.x86_64.rpm
fc64b5a5f9f62ba87685254647db1cc6a8a8b3938d89dff93fddc2e1e0704efb
RLBA-2021:4419
ksc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ksc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
ksc-1.8-3.el8.noarch.rpm
f108de2bb73856b1afd45aaea2a8cd6ae6bf546d402850b32926cc31aa6d9693
ksc-1.8-3.el8.noarch.rpm
f108de2bb73856b1afd45aaea2a8cd6ae6bf546d402850b32926cc31aa6d9693
RLBA-2021:4420
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
selinux-policy-3.14.3-80.el8.noarch.rpm
547ec26d89be9c6a702d6e4b914fa28b39553f8ee601add3762c49ce9e996f0b
selinux-policy-3.14.3-80.el8.noarch.rpm
547ec26d89be9c6a702d6e4b914fa28b39553f8ee601add3762c49ce9e996f0b
selinux-policy-devel-3.14.3-80.el8.noarch.rpm
638fc43e33f395c9b25eaf88df4bffbc8d21fa1c461ad19ff49cc16a51e5c0ff
selinux-policy-devel-3.14.3-80.el8.noarch.rpm
638fc43e33f395c9b25eaf88df4bffbc8d21fa1c461ad19ff49cc16a51e5c0ff
selinux-policy-doc-3.14.3-80.el8.noarch.rpm
6415e3c9d89436beccd9574068630d5d21674b0ccf337f44e0786b74d230546f
selinux-policy-doc-3.14.3-80.el8.noarch.rpm
6415e3c9d89436beccd9574068630d5d21674b0ccf337f44e0786b74d230546f
selinux-policy-minimum-3.14.3-80.el8.noarch.rpm
1bde56aabf07fae8f744af576d886237826f388770dc2dceee1e674c727355f7
selinux-policy-minimum-3.14.3-80.el8.noarch.rpm
1bde56aabf07fae8f744af576d886237826f388770dc2dceee1e674c727355f7
selinux-policy-mls-3.14.3-80.el8.noarch.rpm
08da9f120351b57ea120627f298e2be4077528e573e5cdf530fab88223d08d4b
selinux-policy-mls-3.14.3-80.el8.noarch.rpm
08da9f120351b57ea120627f298e2be4077528e573e5cdf530fab88223d08d4b
selinux-policy-sandbox-3.14.3-80.el8.noarch.rpm
5211832eebaf13bfa469c734290b03237ef5d6f68730ea9824a60133476257d1
selinux-policy-sandbox-3.14.3-80.el8.noarch.rpm
5211832eebaf13bfa469c734290b03237ef5d6f68730ea9824a60133476257d1
selinux-policy-targeted-3.14.3-80.el8.noarch.rpm
163854ab6f21525bedfdbca215df754c18f74d1076c9613e0e5f73f5aedafe56
selinux-policy-targeted-3.14.3-80.el8.noarch.rpm
163854ab6f21525bedfdbca215df754c18f74d1076c9613e0e5f73f5aedafe56
RLBA-2021:4422
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
sanlock-lib-3.8.4-1.el8.i686.rpm
48fee113ee06f60cfed77922e367bd89c67d4c743fea00a45c6d46a6dcffad15
sanlock-lib-3.8.4-1.el8.x86_64.rpm
89f5eda61011e54f8f8ce487cf761a3bf7a36e6f40bf042390d8332901111a5e
RLSA-2021:4424
Moderate: openssl security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: integer overflow in CipherUpdate (CVE-2021-23840)
* openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
openssl-1.1.1k-4.el8.x86_64.rpm
43735f2a614adfea55cc093b6d618b307e634f610ec524eb7eca9ff0c2fd64aa
openssl-devel-1.1.1k-4.el8.i686.rpm
1551c57324ea99b4bfd079c24682704408f73830415e60be4f101f1c7561cc16
openssl-devel-1.1.1k-4.el8.x86_64.rpm
340f7ec463ea38a85aad1eb1631d0c80d9fb6f932618fdf3d8d72a1841c54603
openssl-libs-1.1.1k-4.el8.i686.rpm
161d2ea19e2811e7ccd18df9a62058db08c7fbf824d475c6d8ec7358fbf97532
openssl-libs-1.1.1k-4.el8.x86_64.rpm
ec52c04cf1a9bbe927facb09b75c7b185a2c0b881a53ddb9bf8f58eb70d8f691
openssl-perl-1.1.1k-4.el8.x86_64.rpm
5efce3522df2d350f45978ce4e8ff7c8fbc617be3e4b642607d71393c31cb3d0
RLEA-2021:4425
ethtool bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ethtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
ethtool-5.8-7.el8.x86_64.rpm
e3dd9f4c727c8f7f42e3ffa22e97a7ec35d4da23cbdeaa7439109f0b0a56a8ef
RLBA-2021:4427
rng-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rng-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
rng-tools-6.13-1.git.d207e0b6.el8.x86_64.rpm
2b23379f26848d75d8c4bdef2f96622700c79ef82df5b6e2b0b906bc1d5188f6
RLBA-2021:4428
polkit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for polkit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
polkit-0.115-12.el8.x86_64.rpm
e5f98ed16683b513baacfe586cbf3962bd863d98b68adbf3b63918cc096e4f43
polkit-devel-0.115-12.el8.i686.rpm
7e481434a1b7b743a37c925a9d78be911662b89210db7479bea234f8a4037583
polkit-devel-0.115-12.el8.x86_64.rpm
5c340b8c8118846fbf7d611b50bff12df0e7f0f51daf2f699deed697a485520b
polkit-docs-0.115-12.el8.noarch.rpm
2736648f4527ee836671b191a22c56e10cfbd2415a16f28dc93f42ab84038d33
polkit-docs-0.115-12.el8.noarch.rpm
2736648f4527ee836671b191a22c56e10cfbd2415a16f28dc93f42ab84038d33
polkit-libs-0.115-12.el8.i686.rpm
4d11c68bb5fe8bf251eef7c9718b5dd9dffe20065e526a52cd8918e87955189f
polkit-libs-0.115-12.el8.x86_64.rpm
e23749475b1eb13e3de4a1520a53db8f23fbb4bd6379451f8829dc424e02bca6
RLBA-2021:4429
librepo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
librepo-1.14.0-2.el8.i686.rpm
7cba74e52106e0d17335b74b0e8c22c435fb2558826a9c31b27151d3e4af332f
librepo-1.14.0-2.el8.x86_64.rpm
041097e0128fc749daef90f36d87b6fbc774f9894b0df476f609576d6b53a362
python3-librepo-1.14.0-2.el8.x86_64.rpm
4432b1f0b18ffef78804c717b0ecda896f2d27fb7c921115dd21abb5cc8fa104
RLBA-2021:4430
realmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for realmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
realmd-0.16.3-23.el8.x86_64.rpm
ae90e70acf6a46c67224b2c06cb1a35fdfbbc3f379e58b423a77a2729f56f74b
RLBA-2021:4431
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-1.02.177-10.el8.x86_64.rpm
7fbf8e00c09aa0ce1b6606efaa16514de8240120f469dfda573061c78888456d
device-mapper-event-1.02.177-10.el8.x86_64.rpm
74c9c00e0339c10c42660b33c896caa0538ab353491a12de0e663d1e5bf22d77
device-mapper-event-libs-1.02.177-10.el8.i686.rpm
2b3f08a282ab2fd831cfd170220ae96ae4b1e6ae55b8365ce069fda850a6b075
device-mapper-event-libs-1.02.177-10.el8.x86_64.rpm
dd11e4ab83e54a6eaccc4726b2d4a4c7b0d4e1f693eb1a68adc20511983050d0
device-mapper-libs-1.02.177-10.el8.i686.rpm
9fa0feedd66a593a3177ea2fc50c12ac8551d767f2afb7cfd6500495640649f7
device-mapper-libs-1.02.177-10.el8.x86_64.rpm
a9180042c5e697da5d53d1869f8ad61cc23a753c765315e6aedc39d247fae4df
lvm2-2.03.12-10.el8.x86_64.rpm
a4177ba4b4d622cf0b751bc7f16277c1944ae137ced2ac4007e0c0780f4fb6fc
lvm2-dbusd-2.03.12-10.el8.noarch.rpm
77f693f0fe3b9c8edd44451145d43acae524422283cb60978584f79d74387f9f
lvm2-dbusd-2.03.12-10.el8.noarch.rpm
77f693f0fe3b9c8edd44451145d43acae524422283cb60978584f79d74387f9f
lvm2-libs-2.03.12-10.el8.i686.rpm
dd1683787dbf00ddcd49585cb0a8d7ab20bcccaee40b38ea41710a4e36e24ccd
lvm2-libs-2.03.12-10.el8.x86_64.rpm
6330eb955bca5c1fda4104cd8e25246bb738f920d67bf4dc2ee7e46c69e442c9
lvm2-lockd-2.03.12-10.el8.x86_64.rpm
ac2064d1a1af18686d522569fe29635fb29e1b880af96fa684d8f5f987bd6faf
RLBA-2021:4433
elfutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
elfutils-0.185-1.el8.x86_64.rpm
3e4ac2eaff9b98994ec7deaefbcf709c19e146175ece4d3cffda2ba228c21d89
elfutils-debuginfod-0.185-1.el8.x86_64.rpm
36c6dd3eb123e0299991dc3d0b910a26442fc3111fbab08b08c3ed4240fb419d
elfutils-debuginfod-client-0.185-1.el8.i686.rpm
3948ddc6298819ead8c0d57514c657c132e7a58a270f51426d545ae24117604e
elfutils-debuginfod-client-0.185-1.el8.x86_64.rpm
9bc20a6842faa67bb9c6065ace7555cc98b060e9374a00a5f037f41de7587b07
elfutils-debuginfod-client-devel-0.185-1.el8.i686.rpm
f252bff0697de92d350656ee57f2dc21e3d76a8ea4b7c4a3f4d1e0c097c0e2e8
elfutils-debuginfod-client-devel-0.185-1.el8.x86_64.rpm
65918d4182e181eaf77cb583cc57ef8b10cd8039f6e20db5e497b28b39fecae4
elfutils-default-yama-scope-0.185-1.el8.noarch.rpm
494cb9c9a0cbb041e9e61a4d87ef568ceec24b3e8daae391015ebb976922fd91
elfutils-default-yama-scope-0.185-1.el8.noarch.rpm
494cb9c9a0cbb041e9e61a4d87ef568ceec24b3e8daae391015ebb976922fd91
elfutils-devel-0.185-1.el8.i686.rpm
03f70dbab2d1cd21b155901aa62bbecbc8902c9decb3b218bffddcce38f00a4d
elfutils-devel-0.185-1.el8.x86_64.rpm
af91cdf585119217176bcb42095948902561a026fc8cbc0ea685716b3670c11c
elfutils-libelf-0.185-1.el8.i686.rpm
ff75a1ff701ca6adf7b5e5fca9489792178d0aaadddc48a7c286dbd9421736b8
elfutils-libelf-0.185-1.el8.x86_64.rpm
5bec2a5aa4f204053c0eaa1ca2acebf53018db6fcddfb7038b83ff64bda85e84
elfutils-libelf-devel-0.185-1.el8.i686.rpm
f1b6d7c758334d7776bc82bf23f2aaed4012cf512b39d54054427ebe58cc7bb3
elfutils-libelf-devel-0.185-1.el8.x86_64.rpm
b380517037344aa6f758e64022795a23053adf71cb5cfffe33835df0ec341568
elfutils-libs-0.185-1.el8.i686.rpm
ce69d363d9943a025353e21c248443d329441315eab445c496d557dc2aa6d955
elfutils-libs-0.185-1.el8.x86_64.rpm
e07487a822dc63d2278ec4990e0705fe6c2bd2fac4c0eddeac87ea2d6d7be81b
RLBA-2021:4435
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libipa_hbac-2.5.2-2.el8.i686.rpm
7517846eb1d872d70ae235ea236f298ecfdcb7c1831b706e40de4be6bb8c52e3
libipa_hbac-2.5.2-2.el8.x86_64.rpm
61255d4087b79a441727b07a19c34f1136f27f9ff2319a7d65f36a8d1edde846
libsss_autofs-2.5.2-2.el8.x86_64.rpm
40c8292856aab5e02d5616e2c3d02889fdcdce46a9acc5a0052a617f57bc0333
libsss_certmap-2.5.2-2.el8.i686.rpm
5bf6e35e84e2c98ab8798c3797253f68ac1237b699afd6c6f35687524d53417f
libsss_certmap-2.5.2-2.el8.x86_64.rpm
928b6da530e86990dfe757371668de5357ec30591e919769055c2c8aaea978cb
libsss_idmap-2.5.2-2.el8.i686.rpm
a60b9f742563a87a1ff4e4dadad8dd473f811a6a1ad5a778799bd63cddcd2dcc
libsss_idmap-2.5.2-2.el8.x86_64.rpm
afb8e8fd9bc8afb21137bfe348144679a1e102ba0483862893ceff1c347b0a13
libsss_nss_idmap-2.5.2-2.el8.i686.rpm
674850f271ce6640188da83d573b60004f27590a3256723e26a25ed74e3e5d59
libsss_nss_idmap-2.5.2-2.el8.x86_64.rpm
90e54c339fa9e1283b57fce0ee0136447734f89f2af991225e96f55e4789d7d9
libsss_simpleifp-2.5.2-2.el8.i686.rpm
1d5d218eda6b0ca4d4082cca9ba28bd4f8167f52aaf5d3adc544c2b131e684b7
libsss_simpleifp-2.5.2-2.el8.x86_64.rpm
66e6d7ca85fd84925e7981b9b80856e23e31c4beca31acde0090518e2acfa56b
libsss_sudo-2.5.2-2.el8.x86_64.rpm
fcc1c1d27887c90777c1c4dea4250cbd44af10c880461d27fd1a7dc30fab5cab
python3-libipa_hbac-2.5.2-2.el8.x86_64.rpm
76623fa2306011bf863c91e09f351b4222b479a6ac4baca015a4fef60d607896
python3-libsss_nss_idmap-2.5.2-2.el8.x86_64.rpm
bc5ebd2033dd37336e4c12ece06e8c281fa296904d55a49c6244b75af98c1586
python3-sss-2.5.2-2.el8.x86_64.rpm
9bfcd52a0b50d3f8983065d271149ddb4a47554c41a4124cceea17a5f770aa36
python3-sssdconfig-2.5.2-2.el8.noarch.rpm
d07e9424a9a569e1fe3e915f90cb78db8fba6086699df75e396efb87b7346fbc
python3-sssdconfig-2.5.2-2.el8.noarch.rpm
d07e9424a9a569e1fe3e915f90cb78db8fba6086699df75e396efb87b7346fbc
python3-sss-murmur-2.5.2-2.el8.x86_64.rpm
77809b96c7d69366a83e7212b2f6c5d74d5eece7a14091a5793a10c36ae50efe
sssd-2.5.2-2.el8.x86_64.rpm
553f590864975ae81739993ddffe6224d2bb6aaf11aa9de260bfaba31601eb5c
sssd-ad-2.5.2-2.el8.x86_64.rpm
8692a867041016e9c0ebb2ecfc4d00a1e59b4efa99acda83da30d04698a7e6e0
sssd-client-2.5.2-2.el8.i686.rpm
7af3f0560bde544fa9ef9499edc1670901cc9af8b6c06782bd69409e7ce5fd56
sssd-client-2.5.2-2.el8.x86_64.rpm
644bfdb7b0488b3df7e58e5cb2e7ddf0a18caae50a3dce22f9a158be385099b6
sssd-common-2.5.2-2.el8.x86_64.rpm
1e02d782f3140feb13402dd5aebcfa9f8b0877ca42e151926c3c6570721a5566
sssd-common-pac-2.5.2-2.el8.x86_64.rpm
1fd058eed899b9177fd986b430954a322dbd04c1d1c3a3e6eadcd0f48d2b1637
sssd-dbus-2.5.2-2.el8.x86_64.rpm
afde0a425bc11a8dbedc93e81ddb8cfb70d9983ef4490db4829a53b51fa54d5a
sssd-ipa-2.5.2-2.el8.x86_64.rpm
f5799aeb594909f7d1cc78d1d214930f02cf9352a33ff9bfaafa58db0a6b235a
sssd-kcm-2.5.2-2.el8.x86_64.rpm
42643d2750f519f363ec888c10e0903297027be47b9912e96a7c9c0b5a00ed1d
sssd-krb5-2.5.2-2.el8.x86_64.rpm
d4ed63b9464353b219071cb50ffd30033081b4be2f71d6b9203790dd2557b22a
sssd-krb5-common-2.5.2-2.el8.x86_64.rpm
db47e5c840c5a068777fab4879bf19a8e47e6610ded69f8f3f072230c08959bc
sssd-ldap-2.5.2-2.el8.x86_64.rpm
ec11ff8e869d2459157282582a589c5854e4382c657a52f8cb127cda9de6485c
sssd-nfs-idmap-2.5.2-2.el8.x86_64.rpm
13d7012ab2c74b5a2641d1ffbfe5d739869d9871840e003f6f2d38fac1ea6ad4
sssd-polkit-rules-2.5.2-2.el8.x86_64.rpm
f9ee13e9f8e248feb55e1fb0d61761279e5206c30b84bfceb15a08172559d9dc
sssd-proxy-2.5.2-2.el8.x86_64.rpm
30c050e35d3bcbf98561a526332e727b40bf6e841ed409f80a846f4af56a9829
sssd-tools-2.5.2-2.el8.x86_64.rpm
67b76e59d483dec93b38b629974f8a345974d041ed86a79ac9085f5274135b12
sssd-winbind-idmap-2.5.2-2.el8.x86_64.rpm
c371ea3dafd1ae102d8ab2d05b3e67f1b546af3c5259843a36babd97260762f1
RLBA-2021:4436
libtalloc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libtalloc-2.3.2-1.el8.i686.rpm
8f9e269d82afd8ef8cafeaa3b10e7af183025c2c57869ebb001a583ec787d43b
libtalloc-2.3.2-1.el8.x86_64.rpm
f222c01e6fce2dfe36c013fe512ea261202759548a687da4da92315203a8ad53
libtalloc-devel-2.3.2-1.el8.i686.rpm
1e684e5bee61a6fc88d590bf8aaebb712caa2963ae0bff1522ec207dde63597b
libtalloc-devel-2.3.2-1.el8.x86_64.rpm
e42d0fc7f5a8d5096aa89a74cd6dff68b41a6f1b57ea0b889c381bf8f4e03c9a
python3-talloc-2.3.2-1.el8.i686.rpm
5061da2fefd6ae31e85152dae887f4af5bc9194ff4ff232be37dd4549b72313d
python3-talloc-2.3.2-1.el8.x86_64.rpm
d5cf55bec3cb141f0802bbb17e3fb70a91ac1e9416bfdbc6e2a7c3da5b319bcd
RLBA-2021:4438
samba bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
ctdb-4.14.5-2.el8.x86_64.rpm
cb7773539e664b4d1a2708547c8a022e0be4c5e57e4422179b4a4e525369574a
libsmbclient-4.14.5-2.el8.i686.rpm
39f8bb6e20a0c027a68072088caf0e1aacad0549f20f3d243a4defd5dae6444c
libsmbclient-4.14.5-2.el8.x86_64.rpm
0f8f4902d4d9c6ddd70fdeb306fc164889b1b9309c8eb02886fdf70e6b7e6520
libwbclient-4.14.5-2.el8.i686.rpm
eb6f325271edc06456d2ce594806f843cb9083486743f8073cfb926edc9dde5a
libwbclient-4.14.5-2.el8.x86_64.rpm
b940fa9582735e277ed22ea372b1ecb7a4a17db3ba281f857dd27c543760d476
python3-samba-4.14.5-2.el8.i686.rpm
5d8e01fb1579df34a5f90a4c9c8f63b182c308d131002e6698b313eeaaa1af34
python3-samba-4.14.5-2.el8.x86_64.rpm
e28b5f2a80357003efcf88c86abaf9d2ffb42217e5eb2773db410c89f4c301e9
python3-samba-test-4.14.5-2.el8.x86_64.rpm
8b0c50e3ecf5473e2e070c62b777e7ee29f695b1f1dab9aac3dc6841465602d7
samba-4.14.5-2.el8.x86_64.rpm
86322a22246c3889abb3a5bb0330e6a8d1928eab05192c7471deffe5424d17c2
samba-client-4.14.5-2.el8.x86_64.rpm
29df9eca5486acfc638dfe9a3a48bbfbcdc3fad7e6e9f7581d21a66629202790
samba-client-libs-4.14.5-2.el8.i686.rpm
548af830a3fb6bd61b25c9e1d5c3c0f7474e5a6b3a8928eec613ed790f0e0b3b
samba-client-libs-4.14.5-2.el8.x86_64.rpm
05446252e247d51c88426e6c5b9f3287374aea2d2b622e230eceaa8bc44e84ec
samba-common-4.14.5-2.el8.noarch.rpm
75e68cc74b07e844d673118fa212f8fd376ba9fc1d254f1ffd8d4a1de4278098
samba-common-4.14.5-2.el8.noarch.rpm
75e68cc74b07e844d673118fa212f8fd376ba9fc1d254f1ffd8d4a1de4278098
samba-common-libs-4.14.5-2.el8.x86_64.rpm
b770593f45e2b03f8dce72b5f08d895ccc1e822c4a546ed2ba2d8a8ec9253dd1
samba-common-tools-4.14.5-2.el8.x86_64.rpm
379aa6d943f0db09897e11769209184bcbea72870a5c725a4433e6ce90e65151
samba-krb5-printing-4.14.5-2.el8.x86_64.rpm
6e74bfd930c87fef5de63404c61c298d703db0cbc115f91f34387d286de56b76
samba-libs-4.14.5-2.el8.i686.rpm
ff2b4eda83ed787f4b8819fa4d18066bea008b10a7fa6bbb5780aa379e8a03de
samba-libs-4.14.5-2.el8.x86_64.rpm
1e16167b8e14f9a8b6a15bd5506640232de353ded9b68a8352d7b43ee5830c95
samba-pidl-4.14.5-2.el8.noarch.rpm
4ac686ac5db8d61363ce5d9b3bf1f525b0ab8605ed1c24b4839a31bd582a6044
samba-pidl-4.14.5-2.el8.noarch.rpm
4ac686ac5db8d61363ce5d9b3bf1f525b0ab8605ed1c24b4839a31bd582a6044
samba-test-4.14.5-2.el8.x86_64.rpm
2660ce8bcc41afbe8c99b3441e103fa4821964d3f2ddbb9dd4c2c50a6b011b45
samba-test-libs-4.14.5-2.el8.x86_64.rpm
28df084c0c80375d1fbdd9a688596e3a461a9f2112c784127b66726b2206b7d5
samba-winbind-4.14.5-2.el8.x86_64.rpm
a109aaca0b11fc2fd13f0e07d10c47647336da49a8446c630d4b55b0660441ff
samba-winbind-clients-4.14.5-2.el8.x86_64.rpm
63c142cb44b7086311f04e1d8293a30e4b9c2eb52b293863987a8b690f8a0d24
samba-winbind-krb5-locator-4.14.5-2.el8.x86_64.rpm
c0823c6392755f86fb40a4ea7a182e986b0eefa120bacb16ac80e5a32567ade7
samba-winbind-modules-4.14.5-2.el8.i686.rpm
0d736761e7a611e4e6f25c46785db19a71457b8cccabcb30bfc8ddf8f3b4f801
samba-winbind-modules-4.14.5-2.el8.x86_64.rpm
0cf9c4b53ccd4222270a84ac96ce36fd73a51cf67bead895aa2dfdfd80a921b4
samba-winexe-4.14.5-2.el8.x86_64.rpm
4b8d974930d7c3fb24c137e7d49fff054ca331f3379f250a8b2c1f624e5fc405
RLEA-2021:4439
net-snmp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
net-snmp-libs-5.8-22.el8.i686.rpm
fbbe9b23b1f5f01372e716b237923d548b8696a936bc9aa7a70352369caea86a
net-snmp-libs-5.8-22.el8.x86_64.rpm
c89e78eb0ba098e05fc95ccd06640b93f8f5bd67ed60dcf235d8c8140a520ea1
RLBA-2021:4440
bluez bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
bluez-5.56-2.el8.x86_64.rpm
a4e7df0208c81140bbb04071c26b5437953e6a70b68e2dbf08de299a062cdf8c
bluez-hid2hci-5.56-2.el8.x86_64.rpm
433bacd7457c377942bf7e9c490c9b9730c25ea3bdf47b7f57c256da0ea663b4
bluez-libs-5.56-2.el8.i686.rpm
cb8cac4a3e41b117f32f57e392f3a2e05d41d3710d684fdd2671f69c0f6a5c2b
bluez-libs-5.56-2.el8.x86_64.rpm
cd77f2e52161f14b80b6bd1665302bb98dfa40693674d08f2a9298b28e762ac3
bluez-obexd-5.56-2.el8.x86_64.rpm
c55520ae6118fe49762dd6b36a78ce2625754a451f5117b47f988da6f903d1f9
RLBA-2021:4447
lldpad bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lldpad.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
lldpad-1.0.1-16.git036e314.el8.i686.rpm
267322b25d7d1ebc828f26ca33fa9c70e474d4faac6f7fb9bd3a00fe57b93bd7
lldpad-1.0.1-16.git036e314.el8.i686.rpm
267322b25d7d1ebc828f26ca33fa9c70e474d4faac6f7fb9bd3a00fe57b93bd7
lldpad-1.0.1-16.git036e314.el8.x86_64.rpm
cf520f5865f1b443eca4524a7956613a6b82aff677a58f125b35121dbf4d6609
lldpad-1.0.1-16.git036e314.el8.x86_64.rpm
cf520f5865f1b443eca4524a7956613a6b82aff677a58f125b35121dbf4d6609
RLBA-2021:4448
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
opencryptoki-3.16.0-5.el8.x86_64.rpm
bb2d669f8face4c0afc24bfb8392ad21d4d6bf5c659f693be77e1466b48d177b
opencryptoki-icsftok-3.16.0-5.el8.x86_64.rpm
bb924b9b9d4841af3e8e185cd5e6c2796e8ee6d5362c522302a6cfb99b540bef
opencryptoki-libs-3.16.0-5.el8.i686.rpm
536e161b79be9b494383bcc59a515875eab26e9dde98d5c59d699d239edc44d1
opencryptoki-libs-3.16.0-5.el8.x86_64.rpm
b9fc535e04cd23c780c56a91d30ef1310d7910eed5d2e087b594b8a072fb0e72
opencryptoki-swtok-3.16.0-5.el8.x86_64.rpm
abb1c82e78526dbe7a34a0c1e69153f62efcecf5a9794162f274327ff78d5672
opencryptoki-tpmtok-3.16.0-5.el8.x86_64.rpm
5b553a843ab42e074bdebf9395e5220f12781c8424097d8ad35be897d03f4bce
RLEA-2021:4452
rasdaemon bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rasdaemon.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
rasdaemon-0.6.1-6.el8.x86_64.rpm
254bfd900da3d27b35af93a45651fbf8a327acd35b37105f14561149bb27ac9a
RLBA-2021:4457
device-mapper-persistent-data bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-persistent-data.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-persistent-data-0.9.0-4.el8.x86_64.rpm
c619c26abf378feeed382e408f3572667ef04dff033a1d4b5e9626c0ecbcfe14
RLBA-2021:4458
gpgme bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpgme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
gpgme-1.13.1-9.el8.i686.rpm
5dce93b7da4546bfd4b468c738b74888a2490a4d92dbaf4ada80340838bd51cc
gpgme-1.13.1-9.el8.x86_64.rpm
cd76e58f9c8521e216bded1dae0fef5af5e321238609cfc1ec93ce22f38b9ad9
gpgmepp-1.13.1-9.el8.i686.rpm
9fe86012ba8fc5c63fc716ca00958d85624dfbcf245234d9c838410bc492a36c
gpgmepp-1.13.1-9.el8.x86_64.rpm
90e9845c4efe63ec65c5c348302cd84f2321cec0ac4508196dcbad2fcbc319b0
python3-gpg-1.13.1-9.el8.x86_64.rpm
af99718126944c69f6550699fe456bf11ddf9a23a442349ada1be8e928f5a43f
RLEA-2021:4473
accel-config bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accel-config.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
accel-config-3.1-1.el8.x86_64.rpm
ee9fa0f00f60031e40e43aac43abdee64f03b08491d56d950d45eaf752819221
accel-config-3.1-1.el8.i686.rpm
796a49240284fcc135f6bbb5236dafc362d7fe9e968c8e50aede72a9777f1f75
accel-config-libs-3.1-1.el8.i686.rpm
c914a4f9161b9836ba52039153a807931f3433ad1073c753eeb5be28fd7d6ed9
accel-config-libs-3.1-1.el8.x86_64.rpm
27c59c78dce95ebcf51a32142099e41448cc7348ad541a09379f8fcb225cfb39
RLBA-2021:4459
perl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
perl-Errno-1.28-420.el8.x86_64.rpm
c62cf70ba00823f675401c001ee81002bb65af2f2521e2483265157a1613a923
perl-interpreter-5.26.3-420.el8.x86_64.rpm
43c1a38413746efc2e611cb70bb97cb1110ece0943facdbdc9dd7fe6bc41d60a
perl-IO-1.38-420.el8.x86_64.rpm
d0a077fc2962eb92bb9a62a89fbfd4b2ee32ec390271d80168ee90b1b572db76
perl-IO-Zlib-1.10-420.el8.noarch.rpm
043d79a20a572726629777b96208c83afb03f61e9940933404198950be66f748
perl-IO-Zlib-1.10-420.el8.noarch.rpm
043d79a20a572726629777b96208c83afb03f61e9940933404198950be66f748
perl-libs-5.26.3-420.el8.i686.rpm
3a6a66cf98b982a480ac9c1fc8c028c6c6c8f9b22981c7af941c1bb5a7361e91
perl-libs-5.26.3-420.el8.x86_64.rpm
310edbaf57c88529e92e819d24bf9ffdaf75873f3cdff3f153565ee46a94c190
perl-macros-5.26.3-420.el8.x86_64.rpm
bfd42d67d81b09f6cb249597b8dd134e71a15f141309b533e5937021b2a811e6
perl-Math-Complex-1.59-420.el8.noarch.rpm
ad044d76a9f04aa8125ae77b0a39c670f47c303efb3da8ec9e0b2863d59a7ae8
perl-Math-Complex-1.59-420.el8.noarch.rpm
ad044d76a9f04aa8125ae77b0a39c670f47c303efb3da8ec9e0b2863d59a7ae8
RLBA-2021:4460
crypto-policies bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for crypto-policies.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
crypto-policies-20210617-1.gitc776d3e.el8.noarch.rpm
e3b2363ac79f5c551a5bdb0da1a6bf9763fdcc3525fa62b3fd057d094e56d46c
crypto-policies-20210617-1.gitc776d3e.el8.noarch.rpm
e3b2363ac79f5c551a5bdb0da1a6bf9763fdcc3525fa62b3fd057d094e56d46c
crypto-policies-scripts-20210617-1.gitc776d3e.el8.noarch.rpm
0ed00c7869530fc5ddb0113a1a66a1e8dcf62a021f8a3308c31e67a51ff979e2
crypto-policies-scripts-20210617-1.gitc776d3e.el8.noarch.rpm
0ed00c7869530fc5ddb0113a1a66a1e8dcf62a021f8a3308c31e67a51ff979e2
RLBA-2021:4462
chrony bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chrony.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
chrony-4.1-1.el8.x86_64.rpm
94c4477b4a005d477bbefe0bf147006ae23ac55b9e26d926b46e6595b1f5c840
chrony-4.1-1.el8.x86_64.rpm
94c4477b4a005d477bbefe0bf147006ae23ac55b9e26d926b46e6595b1f5c840
RLBA-2021:4463
hwdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
hwdata-0.314-8.10.el8.noarch.rpm
afbed11aab18f79384efc937fed93b3fe687572f4b816edfe03bf254ef776fee
hwdata-0.314-8.10.el8.noarch.rpm
afbed11aab18f79384efc937fed93b3fe687572f4b816edfe03bf254ef776fee
RLSA-2021:4464
Moderate: dnf security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dnf-plugins-core, dnf, libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
dnf is a package manager that allows users to manage packages on their systems. It supports RPMs, modules and comps groups & environments.
Security Fix(es):
* libdnf: Signature verification bypass via signature placed in the main RPM header (CVE-2021-3445)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
dnf-4.7.0-4.el8.noarch.rpm
29da544e469a878be0ab8f46248bda588361fd613243e7c07146bf72ee21cee1
dnf-4.7.0-4.el8.noarch.rpm
29da544e469a878be0ab8f46248bda588361fd613243e7c07146bf72ee21cee1
dnf-automatic-4.7.0-4.el8.noarch.rpm
facd9358e798557d84a121f72d55fd4922a71b9e44a5b36e680ec2693641c002
dnf-automatic-4.7.0-4.el8.noarch.rpm
facd9358e798557d84a121f72d55fd4922a71b9e44a5b36e680ec2693641c002
dnf-data-4.7.0-4.el8.noarch.rpm
4aebe0c7cc4ae4919f1b9b3576c81cdea236393f7a1edbc8bf52f34b0c1d523c
dnf-data-4.7.0-4.el8.noarch.rpm
4aebe0c7cc4ae4919f1b9b3576c81cdea236393f7a1edbc8bf52f34b0c1d523c
dnf-plugins-core-4.0.21-3.el8.noarch.rpm
a85df958cc79012e667af47e00a6e7ffaae0bce0431e9dd003a578ebba6f6736
dnf-plugins-core-4.0.21-3.el8.noarch.rpm
a85df958cc79012e667af47e00a6e7ffaae0bce0431e9dd003a578ebba6f6736
libdnf-0.63.0-3.el8.i686.rpm
6f14f6aec6d36fc51b5f30494cab66f80ec69df37c18bdbdaee7785cc7d0928e
libdnf-0.63.0-3.el8.x86_64.rpm
04d812d7ac5b9c4c1919e3be4d7fbca0cb4a128529a5827132564022b9f7205b
python3-dnf-4.7.0-4.el8.noarch.rpm
bca91559aca686fc637fbf2fc503e92b6fbbbb1348b8c8432b2794704e0b007a
python3-dnf-4.7.0-4.el8.noarch.rpm
bca91559aca686fc637fbf2fc503e92b6fbbbb1348b8c8432b2794704e0b007a
python3-dnf-plugin-post-transaction-actions-4.0.21-3.el8.noarch.rpm
59ab38e104e11870c1c881a7c2c2fa68ad856ad089cb7542359f1da98acced0e
python3-dnf-plugin-post-transaction-actions-4.0.21-3.el8.noarch.rpm
59ab38e104e11870c1c881a7c2c2fa68ad856ad089cb7542359f1da98acced0e
python3-dnf-plugins-core-4.0.21-3.el8.noarch.rpm
5fbb4c974a56106ec5650c2b2b88183c219e2b4667dd3e400f95090afbe2cd38
python3-dnf-plugins-core-4.0.21-3.el8.noarch.rpm
5fbb4c974a56106ec5650c2b2b88183c219e2b4667dd3e400f95090afbe2cd38
python3-dnf-plugin-versionlock-4.0.21-3.el8.noarch.rpm
f22793709cc854b9346faec79c88ad0a823dd10ebcec840bbc2751186b289705
python3-dnf-plugin-versionlock-4.0.21-3.el8.noarch.rpm
f22793709cc854b9346faec79c88ad0a823dd10ebcec840bbc2751186b289705
python3-hawkey-0.63.0-3.el8.x86_64.rpm
713f14e54eece8fdf370cdae8938af3c3b34cee6654babc10b412b61ec80d3c0
python3-libdnf-0.63.0-3.el8.x86_64.rpm
4b3e36881c8cd6370960cab184702827e5c89e57105d4446e09276593e8f5915
yum-4.7.0-4.el8.noarch.rpm
96b67759c2f7143a44dac036d15effd30d257e9abe24e5b389bc9c1231127bf3
yum-4.7.0-4.el8.noarch.rpm
96b67759c2f7143a44dac036d15effd30d257e9abe24e5b389bc9c1231127bf3
yum-utils-4.0.21-3.el8.noarch.rpm
f2198961baff86067bbdd94e01be158c0e4146d7baebfcae085447016fdc1489
yum-utils-4.0.21-3.el8.noarch.rpm
f2198961baff86067bbdd94e01be158c0e4146d7baebfcae085447016fdc1489
RLBA-2021:4465
nftables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
nftables-0.9.3-21.el8.i686.rpm
b8f5819a20741740d68fff311e8c29b3704bd891eb3c4c50ad98038a0d822f8e
nftables-0.9.3-21.el8.x86_64.rpm
9e288311c070701a0327152371d2fb695adbb313d62ccdd6b341b26410759283
python3-nftables-0.9.3-21.el8.x86_64.rpm
deca8dd96d9169a3f4248dd75374351ca9b9a64c2973d6b184f722abf4dfa375
RLBA-2021:4467
e2fsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for e2fsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
e2fsprogs-1.45.6-2.el8.x86_64.rpm
c20bc711085e535314c5276dbef12ad3c1491401d16d1a2fb6315fbaadea4f35
e2fsprogs-devel-1.45.6-2.el8.i686.rpm
8b7a172aa9b176b97d159f35844ecc107caae16de93f65f54d37e567a5eb9524
e2fsprogs-devel-1.45.6-2.el8.x86_64.rpm
a6878238e1854b5479524ac7208145a7468ae4bfb437922b681093129cef43f8
e2fsprogs-libs-1.45.6-2.el8.i686.rpm
64b185c872a2efe59c0b47906a40e294595650e5c92c11bfa6b1bb1cc8928476
e2fsprogs-libs-1.45.6-2.el8.x86_64.rpm
3025f0cb01299b274fa1c7f85d37fee7dc5f219ff7d87aa35fe6f7793f2b6fa3
libcom_err-1.45.6-2.el8.i686.rpm
426b9195ef0f540e8c01a62bfd52b104122f96344b0a15d9667b310d10ff90e5
libcom_err-1.45.6-2.el8.x86_64.rpm
283019991740f7cd8d41725ba6e2a703eb11a42163a4cb770f46036efb2de609
libcom_err-devel-1.45.6-2.el8.i686.rpm
00f6ce114ab1c55ab2cbf5a7dc402860c5212354351ccce03bcbc928c3b0bd21
libcom_err-devel-1.45.6-2.el8.x86_64.rpm
53ea45811e774ede158e0a9938cc121651ac18d2503213b30432d1b2b242bfe0
libss-1.45.6-2.el8.i686.rpm
45b20dcf87bfe1c0bcc1adb5689f2ff9a51cd73fad66e1c45c64c2075dac63d7
libss-1.45.6-2.el8.x86_64.rpm
85ac512e16a2f430cd6323faabbbfcd4849f10f5c9d1707b2027086997fa0bf2
RLBA-2021:4468
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
iptables-1.8.4-20.el8.i686.rpm
65a155ca52b41e49a9dc853a040c008c3ac40aa937a46fc8e7bcf2c552ad4adb
iptables-1.8.4-20.el8.x86_64.rpm
50e323fcfaf8bdd8a5c41cb43375780062d83c81e7bc808ee0ef496aefc2dc7c
iptables-arptables-1.8.4-20.el8.x86_64.rpm
eb9f66d8e54f3256d15d0a0297303912547904549fbb56f98609bc353260922f
iptables-devel-1.8.4-20.el8.i686.rpm
a85f6d2350e4a0b8ea7c67d850127bee7fc7ff832accd507a842c2bb7a7f1a90
iptables-devel-1.8.4-20.el8.x86_64.rpm
ddfd9343c6a64e3bb6a5d5cdf45cff536d87f262b3b386ce93e33183551fc865
iptables-ebtables-1.8.4-20.el8.x86_64.rpm
02cbda516050b48cc50b64025680ba873194db50493cabeba114d0515b7cfc89
iptables-libs-1.8.4-20.el8.i686.rpm
8866296f525ec02bad5d428ccc5f2555f13c5f6d5b5e2894f152e9faf33a9e64
iptables-libs-1.8.4-20.el8.x86_64.rpm
d9847c189f882442497e9481eee9e7c074864aae7ef1e17cb7891e3df01918d0
iptables-services-1.8.4-20.el8.x86_64.rpm
b4e3bded7338d4026947683b18c3b8cbeb29db0c13b1870f7a1e4fec7d6a6a8b
iptables-utils-1.8.4-20.el8.x86_64.rpm
1452efa82616a7f6e2cdd899e2ef49434727a4b400fd742ccee330d03bd4ff0f
RLBA-2021:4469
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
systemd-239-51.el8.i686.rpm
40550c3ca6cc86d078849a186749241992588febe50bf82f82b44af3b6b1dec8
systemd-239-51.el8.x86_64.rpm
b10fb807391e0ac2dcd2c74184e49b3906a6a7f81b57ed93206ee6da992772be
systemd-container-239-51.el8.i686.rpm
c85265efd9ed48478cf3bead73665d8d6d7cae428217bce62faa130aff7e0681
systemd-container-239-51.el8.x86_64.rpm
39c1e5a5bc0437a520c4b4706ca3783b55e6aed4e5d168078356dcfbf35936e4
systemd-devel-239-51.el8.i686.rpm
6f008560f67862e99aafec57e755f7faf22f71057d142e3db3a81284244ebc7d
systemd-devel-239-51.el8.x86_64.rpm
f599777844b22abbba6984d553e36048f8c0e4551ffdd5e5ac70750536b1d0e9
systemd-journal-remote-239-51.el8.x86_64.rpm
0d9135571b186e5f68eecf2ca05ac3a672f5ab533d65267501a6ac48b9f70514
systemd-libs-239-51.el8.i686.rpm
abc6cf3200fb44443ab292445404cd1419fdb9d751f3f02482f4dcbdd6199736
systemd-libs-239-51.el8.x86_64.rpm
cb124c038dba488a3c5ee556cc7623752e1d7c04aad0b0bd847d921cbd22b066
systemd-pam-239-51.el8.x86_64.rpm
e5f10179104d3f4d6b599a8c9e6de871b99c4cb6a13e368f8e85c405ec30ab63
systemd-tests-239-51.el8.x86_64.rpm
9ec727276f3b06a4fd2f609514df4807ae92938f5d5225424e420809450f3670
systemd-udev-239-51.el8.x86_64.rpm
8f96414f5a863bea07c6a48abc03db222373c84fc9427fef848899985a41ba92
RLBA-2021:4471
tboot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tboot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
tboot-1.10.2-1.el8.x86_64.rpm
82d77e34891c7e922ca735f1a10b5999993f759380bf98935efc027e42bee592
tboot-1.10.2-1.el8.x86_64.rpm
82d77e34891c7e922ca735f1a10b5999993f759380bf98935efc027e42bee592
RLBA-2021:4472
tuna bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
tuna-0.16-1.el8.noarch.rpm
2d8cd7455caca597ec2f412bb2195f815dd971bcc0c46d4550fb53d341c6d902
tuna-0.16-1.el8.noarch.rpm
2d8cd7455caca597ec2f412bb2195f815dd971bcc0c46d4550fb53d341c6d902
RLBA-2021:4474
smc-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smc-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
smc-tools-1.6.0-3.git393dd23.el8.i686.rpm
c2c68e0e695cccf0c172c3264497cc6890c564eaf5982d4bd0266a1725925a0e
smc-tools-1.6.0-3.git393dd23.el8.x86_64.rpm
168b9984d92e22cb0d88930d59892364ede6b2fb4040ddc75136916348b9fd67
RLBA-2021:4476
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
tuned-2.16.0-1.el8.noarch.rpm
53f70e5ef39b833e2ff9a564576ebfc65438fa81d9d3c2202e219485fe842973
tuned-2.16.0-1.el8.noarch.rpm
53f70e5ef39b833e2ff9a564576ebfc65438fa81d9d3c2202e219485fe842973
tuned-profiles-atomic-2.16.0-1.el8.noarch.rpm
af40583263e711231e071304f1bf878b6c3a31931210a158d715030519964aae
tuned-profiles-atomic-2.16.0-1.el8.noarch.rpm
af40583263e711231e071304f1bf878b6c3a31931210a158d715030519964aae
tuned-profiles-compat-2.16.0-1.el8.noarch.rpm
f80d452322ea578352ac95a7fdde3a8183278bf5fe840154b309b5c1b88cdce0
tuned-profiles-compat-2.16.0-1.el8.noarch.rpm
f80d452322ea578352ac95a7fdde3a8183278bf5fe840154b309b5c1b88cdce0
tuned-profiles-cpu-partitioning-2.16.0-1.el8.noarch.rpm
b6abf23e3fafe26ab39c0de8413a5eeb54a128a945b9a3592d015211a5558290
tuned-profiles-cpu-partitioning-2.16.0-1.el8.noarch.rpm
b6abf23e3fafe26ab39c0de8413a5eeb54a128a945b9a3592d015211a5558290
tuned-profiles-mssql-2.16.0-1.el8.noarch.rpm
c8a23413d9d388e438ee9ce6d66f4aa896cf6171641f8f261ca934c3549aded9
tuned-profiles-mssql-2.16.0-1.el8.noarch.rpm
c8a23413d9d388e438ee9ce6d66f4aa896cf6171641f8f261ca934c3549aded9
tuned-profiles-oracle-2.16.0-1.el8.noarch.rpm
efa84ef7111ddac14d41f7ad498f4fe7641c5583a3b4184b3acf91c9ee82a6dd
tuned-profiles-oracle-2.16.0-1.el8.noarch.rpm
efa84ef7111ddac14d41f7ad498f4fe7641c5583a3b4184b3acf91c9ee82a6dd
RLBA-2021:4486
libtevent bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libtevent-0.11.0-0.el8.i686.rpm
f5734987a7c03a89ffea72cbb4a84de9ab70ff32354b07131cb72041746f9fbc
libtevent-0.11.0-0.el8.i686.rpm
f5734987a7c03a89ffea72cbb4a84de9ab70ff32354b07131cb72041746f9fbc
libtevent-0.11.0-0.el8.x86_64.rpm
d2f2a6c437aded734e7521743279c0fcae93ac3c3b7b213e91d68f6cf4d6a18b
libtevent-0.11.0-0.el8.x86_64.rpm
d2f2a6c437aded734e7521743279c0fcae93ac3c3b7b213e91d68f6cf4d6a18b
libtevent-devel-0.11.0-0.el8.i686.rpm
207fb695ab9ee18ade3c133bfe0bad9736efdfecb63348ee391ddc752f417012
libtevent-devel-0.11.0-0.el8.i686.rpm
207fb695ab9ee18ade3c133bfe0bad9736efdfecb63348ee391ddc752f417012
libtevent-devel-0.11.0-0.el8.x86_64.rpm
b8a16c3df58e5a690acc1a18cb48e2028bc4c63e615822499d54f9d3600435f0
libtevent-devel-0.11.0-0.el8.x86_64.rpm
b8a16c3df58e5a690acc1a18cb48e2028bc4c63e615822499d54f9d3600435f0
python3-tevent-0.11.0-0.el8.x86_64.rpm
15249d50f8376ba9da7553fc25d83eb8439ea0dd73571b7ecfd5fa1165cd7206
python3-tevent-0.11.0-0.el8.x86_64.rpm
15249d50f8376ba9da7553fc25d83eb8439ea0dd73571b7ecfd5fa1165cd7206
RLBA-2021:4487
xfsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
xfsprogs-5.0.0-9.el8.i686.rpm
df7254d7dc8397eca02ebce457a4cb2fc7145bb4fdd1b51442c31da08fd7057a
xfsprogs-5.0.0-9.el8.x86_64.rpm
55c4a9cde7c9326f8f58e23379119ae794c1ed828709bb54a992f51fb0e7b298
xfsprogs-devel-5.0.0-9.el8.i686.rpm
a0ffd63affb554290c1cac58b18cdbe34cb0997bc15297964f516637fb28d94d
xfsprogs-devel-5.0.0-9.el8.x86_64.rpm
555b21d52bf707b69ca849c13ab64936ace6ea6320cac510b913780d1e27addd
RLSA-2021:4489
Low: rpm security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Security Fix(es):
* rpm: missing length checks in hdrblobInit() (CVE-2021-20266)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
python3-rpm-4.14.3-19.el8.x86_64.rpm
ed6af4fb2f1753bba2c6ee46b6deaac6c85ea300c44f610432d0347bd1f2dbb4
rpm-4.14.3-19.el8.x86_64.rpm
665c6220d7e1eea8b36577f24b74e3986af8c7cceccd267ed601375818df66e7
rpm-apidocs-4.14.3-19.el8.noarch.rpm
819191c8bb1646d3b7cedcb6dd376d10a885bfcdd46c5784bae653c53f7549cd
rpm-apidocs-4.14.3-19.el8.noarch.rpm
819191c8bb1646d3b7cedcb6dd376d10a885bfcdd46c5784bae653c53f7549cd
rpm-build-libs-4.14.3-19.el8.i686.rpm
3b915ae5d98db0c56fe725a66400e85f080e11deb0cb8474826099632088a268
rpm-build-libs-4.14.3-19.el8.x86_64.rpm
dab6c54ecce3572c843b39d28392fe314fbd2698ce41e86c88c6e5dedba9fdc7
rpm-cron-4.14.3-19.el8.noarch.rpm
b5497f7333c7c841f09fb29b3db3e3832f760153a49fc8961e8784fe880e58ca
rpm-cron-4.14.3-19.el8.noarch.rpm
b5497f7333c7c841f09fb29b3db3e3832f760153a49fc8961e8784fe880e58ca
rpm-devel-4.14.3-19.el8.i686.rpm
fa446d1fe6344e5722887f0703e59c5a7ed86e6609831fa8aa86c359cf25c3c7
rpm-devel-4.14.3-19.el8.x86_64.rpm
d8857a2e960c82e1b199e41c91ac433ef935caabf2f45b5c3421f74c0f90a3c3
rpm-libs-4.14.3-19.el8.i686.rpm
5a33d33d4446ded4b2efdfbdb7732a9a5810a7d503cb20c29748737fc710823b
rpm-libs-4.14.3-19.el8.x86_64.rpm
ac3ed5c2680f8e05a6bf235dc6f0770dde81c98486cf9a50beec6e1e5256208e
rpm-plugin-ima-4.14.3-19.el8.x86_64.rpm
b21129bbfffa5e4be8146e1b9165ccbba53397f062d06b66e788093eb6d1f1ee
rpm-plugin-prioreset-4.14.3-19.el8.x86_64.rpm
ca773b9cbbcd8755df3cdb077cde5081420725dbb6303b2f8dbcc5f2681f4fd6
rpm-plugin-selinux-4.14.3-19.el8.x86_64.rpm
5bca217700b0338d7c8d0102ef16ad3bcdb6e804d250bd33a5106610983a6063
rpm-plugin-syslog-4.14.3-19.el8.x86_64.rpm
ad5fb3a5513b44e9d536befc6a469a086565c895bf404f6142be808521c47faa
rpm-plugin-systemd-inhibit-4.14.3-19.el8.x86_64.rpm
a229ff2727026884263a2c8ba37ec68b61fb803fcdd02d0211e2569e1ba5f2eb
rpm-sign-4.14.3-19.el8.x86_64.rpm
bcf9ee30f9faaf56ca98f3d32d8fa0f41afb762df86cdcd370a004e1a6f911ae
RLBA-2021:4490
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libblkid-2.32.1-28.el8.i686.rpm
fcef2b51ab33316c66e0b18d210b78b5503e762aab538e5fc4d1a7de0f5358e1
libblkid-2.32.1-28.el8.x86_64.rpm
de2355a3ca83c4f7ddc02c738afd4d2fcd8f88599807e0bab16d42636325703c
libblkid-devel-2.32.1-28.el8.i686.rpm
088e1265a75410a7d5afa90bfef7864a442bbbe6b487026515965ad014d2004d
libblkid-devel-2.32.1-28.el8.x86_64.rpm
f9e6fd2f3ab157370521bcc92d0a19b296ee811664d3b84e8ac7eb5e5816e437
libfdisk-2.32.1-28.el8.i686.rpm
d6464c56a79366b45c6f6eb3662f08a758e072d018d4ce0183536ebf78f37d10
libfdisk-2.32.1-28.el8.x86_64.rpm
9ec2f2551e2c6fc356251eae40e42284bf2d88d2089dc19c792aa3c2ef3ebcc5
libfdisk-devel-2.32.1-28.el8.i686.rpm
6ed691adad691ad5deed4a5b396dbec524a0292f882adc85c01ae7e4143cb056
libfdisk-devel-2.32.1-28.el8.x86_64.rpm
472fc34799d2894bae6022867c7aa0f11e01d281e0cbcdf513d9f5f944a7616d
libmount-2.32.1-28.el8.i686.rpm
4b0be0f4ee104526d0471b4f7a64de5c006f5dc4a4be505d2fcb56eeb3c9d8bd
libmount-2.32.1-28.el8.x86_64.rpm
3af6507af034dc8089fd2dfd0ae32ed1a01e1648744acc7e0b85ec5b1f3a668c
libsmartcols-2.32.1-28.el8.i686.rpm
aed28f3cff780ead7829c60baf4a76c0b0a89d6948b1676c37335c8217bd909e
libsmartcols-2.32.1-28.el8.x86_64.rpm
b7a2ae5d2d03a28fcd3f880d399225d91935f0f5d9e18ce663ba8654ada0cdc6
libsmartcols-devel-2.32.1-28.el8.i686.rpm
543c142b7d6f36bf28cf10be66c49d7020270ca9588f098ef572e472acd30eba
libsmartcols-devel-2.32.1-28.el8.x86_64.rpm
9a36657d0a529e7efc2cd59d74e3a6aafd8d2b04c40d0e42fd67ba584225a95d
libuuid-2.32.1-28.el8.i686.rpm
13a54e6ae911fc9265a5fbb908f8c8bca7126a40f847fac59290522117cad76a
libuuid-2.32.1-28.el8.x86_64.rpm
71e68d6b3d6efa1459440ae9a259f89ad9b9c7849a7627b959c4c813f826aa14
libuuid-devel-2.32.1-28.el8.i686.rpm
d92eac2ba6a09e0bf9098f6625467c2933980c4eb9cacb8699bbda786db2d2f6
libuuid-devel-2.32.1-28.el8.x86_64.rpm
edbe351b828175b651eb9343c0531d051635f20db4d79d2aa1963427dbe88952
util-linux-2.32.1-28.el8.x86_64.rpm
950b4c996d94f68d17d0c5ad0b1f07fb291529e92bbb6a62e69899f00360ed4d
util-linux-user-2.32.1-28.el8.x86_64.rpm
721a2038900b9b600e3bf031e32bddce970a89e9597d42843b7ae10e05553199
uuidd-2.32.1-28.el8.x86_64.rpm
6101884c2dba6b98f7887e1c755a44349fa7e156d55a0f7000483b974f011217
RLEA-2021:4491
libbpf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libbpf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libbpf-0.4.0-1.el8.i686.rpm
0256e3365a505623e2407a935f366cfd170f0eb73eaa631a9a1e0d9626bbade0
libbpf-0.4.0-1.el8.x86_64.rpm
28b0bf49d6c23d031ad17ec5ade7640bbde625634e02e604102fec408772653e
RLBA-2021:4492
dhcp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dhcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
dhcp-client-4.3.6-45.el8.x86_64.rpm
55a9bbd0d3a1617b7f8df242838803fdcf4c764fad7b556c806844e66f718aea
dhcp-common-4.3.6-45.el8.noarch.rpm
425ca05cd9b464637cc1f4467de8be11029df891d3c20205bc9884f3f5f17b64
dhcp-common-4.3.6-45.el8.noarch.rpm
425ca05cd9b464637cc1f4467de8be11029df891d3c20205bc9884f3f5f17b64
dhcp-libs-4.3.6-45.el8.i686.rpm
b3d50adba356dc31e400d1a44fd14ce52a6ae0e2a4f9081ba7b3b476bbcf7b51
dhcp-libs-4.3.6-45.el8.x86_64.rpm
ccdef2a9d35b2434c2b5cb1bc378faa2fdf34f16dbe1c347040171bb4e42ad8c
dhcp-relay-4.3.6-45.el8.x86_64.rpm
a8b304802e098d04f8a1c14150602b5fb91c252d944bf5cf0036cd9d4c4dd1d5
dhcp-server-4.3.6-45.el8.x86_64.rpm
2023bd7fa6ab182f4251447aeee75ad515d46c959938f8c0cc2fb97827dc0910
RLBA-2021:4493
libqmi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libqmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libqmi-1.24.0-3.el8.i686.rpm
82e93d7f59c4d11e73cd3f29f1ecda9b8d3e65dde0c2fe6a0a40cc52da8f8f3a
libqmi-1.24.0-3.el8.x86_64.rpm
5c5e405fd2d194a0c3581de656f07c1ccafcf802d912dd962fd5b20d2cbba6dc
libqmi-utils-1.24.0-3.el8.x86_64.rpm
558ffd78dc1e8febabd7d9a636257c07af3045ad77a58f722d3cdc2382819cd2
RLBA-2021:4494
mdadm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
mdadm-4.2-rc2.el8.x86_64.rpm
57b775a2ce8bb3cd42aa3b09c13db11c620dda0f390d254d77a5822db47f52d5
RLBA-2021:4495
bash bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
bash-4.4.20-2.el8.x86_64.rpm
f83a42b6397a9a928a592aaae15f3a6c669e6e75d90050e113c05fb655535c2d
bash-doc-4.4.20-2.el8.x86_64.rpm
4e7f135731669edc18f360e305d0d51357e9c69e78a00dbc4bbefacd3d6741fb
RLBA-2021:4497
policycoreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
policycoreutils-2.9-16.el8.x86_64.rpm
ede71dcde0d7c6ed5cda295eaccc6c3097c8baafedf9178075822c015fa5130b
policycoreutils-dbus-2.9-16.el8.noarch.rpm
0d69473ffbf8c94d4dffb2e396eb828f55095791bc7e641dca222775f0ac5bc1
policycoreutils-dbus-2.9-16.el8.noarch.rpm
0d69473ffbf8c94d4dffb2e396eb828f55095791bc7e641dca222775f0ac5bc1
policycoreutils-devel-2.9-16.el8.i686.rpm
448ae5d713c1bb434c8f205dc7eaba5431ed3d866cff6debf998d77368f6ea94
policycoreutils-devel-2.9-16.el8.x86_64.rpm
80e33d1e5ba95cfa2213dd71c61ab1e845b44cebfb645f2f582bda1ceba7ad1a
policycoreutils-newrole-2.9-16.el8.x86_64.rpm
84bce3b987a1a18dcecb0ccff06acccf3d06503d2c28e971a6a23affb0e4f3d3
policycoreutils-python-utils-2.9-16.el8.noarch.rpm
18a44d5feef63ca0a1ba5f455ae1e2af1dc4a54ba1550becdd4a7862fbcc8942
policycoreutils-python-utils-2.9-16.el8.noarch.rpm
18a44d5feef63ca0a1ba5f455ae1e2af1dc4a54ba1550becdd4a7862fbcc8942
policycoreutils-restorecond-2.9-16.el8.x86_64.rpm
c1705a2bd5346234a06d89f0c7100c4fed77fb3b9ff329922dbe985eb2520379
python3-policycoreutils-2.9-16.el8.noarch.rpm
90f6439142b1e214d1e2e38b26c9f016f1213d7e1b536941242b8a07bf142b22
python3-policycoreutils-2.9-16.el8.noarch.rpm
90f6439142b1e214d1e2e38b26c9f016f1213d7e1b536941242b8a07bf142b22
RLEA-2021:4498
alsa-sof-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
alsa-sof-firmware-1.8-1.el8.noarch.rpm
5374b0c795b73cb2d68c26ca41dd94f5d0d9948cca1d06b3d1a097cd3f339324
alsa-sof-firmware-debug-1.8-1.el8.noarch.rpm
5436975943b4b80f956d52e6f8b94cae86753bc53c8b0523fd4ab7bed6529239
RLBA-2021:4499
linux-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
iwl1000-firmware-39.31.5.1-103.el8.1.noarch.rpm
77da1fa4b50d8608d1f71fc30a22286328260cd4ae4906c9684459b38a827563
iwl1000-firmware-39.31.5.1-103.el8.1.noarch.rpm
77da1fa4b50d8608d1f71fc30a22286328260cd4ae4906c9684459b38a827563
iwl100-firmware-39.31.5.1-103.el8.1.noarch.rpm
f434d904f1147a5499c7a6947857c97efad7bcb3a14e742aa59e4e50cf4af56c
iwl100-firmware-39.31.5.1-103.el8.1.noarch.rpm
f434d904f1147a5499c7a6947857c97efad7bcb3a14e742aa59e4e50cf4af56c
iwl105-firmware-18.168.6.1-103.el8.1.noarch.rpm
b3aca817d99ed30bbc4d0991e1acc5964be536cb7535ceb9e4c83f6447d9e647
iwl105-firmware-18.168.6.1-103.el8.1.noarch.rpm
b3aca817d99ed30bbc4d0991e1acc5964be536cb7535ceb9e4c83f6447d9e647
iwl135-firmware-18.168.6.1-103.el8.1.noarch.rpm
e043ce21871e171540a78251c3436d9598a96da9073061631dbdfd77e1d32438
iwl135-firmware-18.168.6.1-103.el8.1.noarch.rpm
e043ce21871e171540a78251c3436d9598a96da9073061631dbdfd77e1d32438
iwl2000-firmware-18.168.6.1-103.el8.1.noarch.rpm
de2109081b1b071d9f64457dd9e3d3d6d2c90ac5366a26e98556d7d520c9e744
iwl2000-firmware-18.168.6.1-103.el8.1.noarch.rpm
de2109081b1b071d9f64457dd9e3d3d6d2c90ac5366a26e98556d7d520c9e744
iwl2030-firmware-18.168.6.1-103.el8.1.noarch.rpm
852a67a7189b71305a73cf962dccfcd8c3978c5525bf4d53135732d218a04fa5
iwl2030-firmware-18.168.6.1-103.el8.1.noarch.rpm
852a67a7189b71305a73cf962dccfcd8c3978c5525bf4d53135732d218a04fa5
iwl3160-firmware-25.30.13.0-103.el8.1.noarch.rpm
3d0dda3c3b4bf6d5a34c634956fd2af9d10f3ef421fc64952ef563e90c79cbde
iwl3160-firmware-25.30.13.0-103.el8.1.noarch.rpm
3d0dda3c3b4bf6d5a34c634956fd2af9d10f3ef421fc64952ef563e90c79cbde
iwl3945-firmware-15.32.2.9-103.el8.1.noarch.rpm
56692457bd15bbdc61cf60562a905e937eb3dab8c40d31962bfdc349db96b61f
iwl3945-firmware-15.32.2.9-103.el8.1.noarch.rpm
56692457bd15bbdc61cf60562a905e937eb3dab8c40d31962bfdc349db96b61f
iwl4965-firmware-228.61.2.24-103.el8.1.noarch.rpm
3f8e38f46a15a62f02bdbd28db1bfdc0501b4dba969009171a8d76f638baa786
iwl4965-firmware-228.61.2.24-103.el8.1.noarch.rpm
3f8e38f46a15a62f02bdbd28db1bfdc0501b4dba969009171a8d76f638baa786
iwl5000-firmware-8.83.5.1_1-103.el8.1.noarch.rpm
5099057b8d5acb1609d7d3675f2b1c943695b6f9ab749b5ac38493c4a2953408
iwl5000-firmware-8.83.5.1_1-103.el8.1.noarch.rpm
5099057b8d5acb1609d7d3675f2b1c943695b6f9ab749b5ac38493c4a2953408
iwl5150-firmware-8.24.2.2-103.el8.1.noarch.rpm
2e3f1e3c203f031a15930f57ab6fa0c7f7afa1745f07c4059035524ede109faa
iwl5150-firmware-8.24.2.2-103.el8.1.noarch.rpm
2e3f1e3c203f031a15930f57ab6fa0c7f7afa1745f07c4059035524ede109faa
iwl6000-firmware-9.221.4.1-103.el8.1.noarch.rpm
4fa790b8492667c5ce84935717e3421242377bd8068c66ab5a5b549e6a63e315
iwl6000-firmware-9.221.4.1-103.el8.1.noarch.rpm
4fa790b8492667c5ce84935717e3421242377bd8068c66ab5a5b549e6a63e315
iwl6000g2a-firmware-18.168.6.1-103.el8.1.noarch.rpm
48e19d471670f373d54c6127aa158f47d92d8ef39f7aba00341379dcad0372fd
iwl6000g2a-firmware-18.168.6.1-103.el8.1.noarch.rpm
48e19d471670f373d54c6127aa158f47d92d8ef39f7aba00341379dcad0372fd
iwl6000g2b-firmware-18.168.6.1-103.el8.1.noarch.rpm
dd5f33a20c3c81ab3892c7cd7020df6a3f67b66f78cf0921c3a53e28d5b2d144
iwl6000g2b-firmware-18.168.6.1-103.el8.1.noarch.rpm
dd5f33a20c3c81ab3892c7cd7020df6a3f67b66f78cf0921c3a53e28d5b2d144
iwl6050-firmware-41.28.5.1-103.el8.1.noarch.rpm
d10340b4922d496d5abdcf379613d01cfe2a88978d45a55a9b0a29e0fdbbf4de
iwl6050-firmware-41.28.5.1-103.el8.1.noarch.rpm
d10340b4922d496d5abdcf379613d01cfe2a88978d45a55a9b0a29e0fdbbf4de
iwl7260-firmware-25.30.13.0-103.el8.1.noarch.rpm
cb2a9a86d772cb83e1b6ef8eadba077c3f54e83f41781283b59d9606bafc9234
iwl7260-firmware-25.30.13.0-103.el8.1.noarch.rpm
cb2a9a86d772cb83e1b6ef8eadba077c3f54e83f41781283b59d9606bafc9234
libertas-sd8686-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
7865dc4ebe6381bb7562815c8a2d80fab7012a98c58cd0f92331490c8036df46
libertas-sd8686-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
7865dc4ebe6381bb7562815c8a2d80fab7012a98c58cd0f92331490c8036df46
libertas-sd8787-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
7e8cc79d36db9631a7f413b9c931e5e20b55023fb78945983d774f7385c4175b
libertas-sd8787-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
7e8cc79d36db9631a7f413b9c931e5e20b55023fb78945983d774f7385c4175b
libertas-usb8388-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
e619f0f5ad5e6f9e53b75f2f970b8a666cfd79e42cf3c09defab7df86ff00c27
libertas-usb8388-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
e619f0f5ad5e6f9e53b75f2f970b8a666cfd79e42cf3c09defab7df86ff00c27
libertas-usb8388-olpc-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
5675dce198847c66c797b93074d3762b5c383e8258196ea0da73e10003c598cc
libertas-usb8388-olpc-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
5675dce198847c66c797b93074d3762b5c383e8258196ea0da73e10003c598cc
linux-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
a2e7aaec39acef0367cca57d8c42d9930fe226f8e1fdbe296c6b2db4b8c54255
linux-firmware-20210702-103.gitd79c2677.el8.noarch.rpm
a2e7aaec39acef0367cca57d8c42d9930fe226f8e1fdbe296c6b2db4b8c54255
RLBA-2021:4500
mcelog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
mcelog-175-1.el8.x86_64.rpm
e59fbd9e4035a298de3e0c8461bd719173a333d0c5fee19073c09ca7b72e6222
RLBA-2021:4502
glusterfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glusterfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
glusterfs-6.0-56.4.el8.x86_64.rpm
aa9a9937feec0560d664b31988d64bfa5d1553499d796218a7b7f4cca6d4fe78
glusterfs-client-xlators-6.0-56.4.el8.x86_64.rpm
0c7ef9903a36f093ffa598544d73c72a6f9f3c0868646ca98b7dbc1b4b9d163b
glusterfs-fuse-6.0-56.4.el8.x86_64.rpm
dd64f7b839294a8d9379a2ea84122f030e80bb5a5e767c1d99a438aeae6a9b1b
glusterfs-libs-6.0-56.4.el8.x86_64.rpm
190ec435bbb364bd360b4a94c5a0a0f9766990043277522460a0fa2203735f7f
glusterfs-rdma-6.0-56.4.el8.x86_64.rpm
9d1fb920477f213807201225d35f1229dba8961f0d5b5ae8895af6ae17f4d221
RLBA-2021:4504
postfix bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for postfix.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
postfix-3.5.8-2.el8.x86_64.rpm
23473ed4fe4d33691ce6d3801513cf031ec84f033432b8da80a6588b6d12d972
RLSA-2021:4517
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: heap-based buffer overflow in utf_ptr2char() in mbyte.c (CVE-2021-3778)
* vim: use-after-free in nv_replace() in normal.c (CVE-2021-3796)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
vim-minimal-8.0.1763-16.el8.x86_64.rpm
c01059ef9d21c2b592fb4d0790e2b8d73cd34c92672f403005bcb641de9f64f5
RLBA-2021:4509
grubby bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grubby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
grubby-8.40-42.el8.x86_64.rpm
3cdf4a4695231e3cc59c4721f6dd77eda72f148bfccba82b7022a0823c974da7
grubby-8.40-42.el8.x86_64.rpm
3cdf4a4695231e3cc59c4721f6dd77eda72f148bfccba82b7022a0823c974da7
RLSA-2021:4511
Moderate: curl security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: Leak of authentication credentials in URL via automatic Referer (CVE-2021-22876)
* curl: TELNET stack contents disclosure (CVE-2021-22898)
* curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure (CVE-2021-22925)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
curl-7.61.1-22.el8.x86_64.rpm
e372199f281feaad685fa855a3c585c381ca5abcbe2d7e5a6dde103f337cb7e2
curl-7.61.1-22.el8.x86_64.rpm
e372199f281feaad685fa855a3c585c381ca5abcbe2d7e5a6dde103f337cb7e2
libcurl-7.61.1-22.el8.i686.rpm
7508b40b10f354ae27647efa810be3d53c7255fc39494d6addd5df536c5a9295
libcurl-7.61.1-22.el8.i686.rpm
7508b40b10f354ae27647efa810be3d53c7255fc39494d6addd5df536c5a9295
libcurl-7.61.1-22.el8.x86_64.rpm
7cc35e59072c0f21b2f8f7c4d8769b8b143299bab5438619d0a895ee9be62b8b
libcurl-7.61.1-22.el8.x86_64.rpm
7cc35e59072c0f21b2f8f7c4d8769b8b143299bab5438619d0a895ee9be62b8b
libcurl-devel-7.61.1-22.el8.i686.rpm
4c278eb72cbb6d9cbc0ac4677cc25ef11302ce2b149e19e9e9789ea3fbcb2fb1
libcurl-devel-7.61.1-22.el8.i686.rpm
4c278eb72cbb6d9cbc0ac4677cc25ef11302ce2b149e19e9e9789ea3fbcb2fb1
libcurl-devel-7.61.1-22.el8.x86_64.rpm
b97faa42eb51fb20ceb8a70d9fb7e5647de92775d52292ace032108f3d3fab30
libcurl-devel-7.61.1-22.el8.x86_64.rpm
b97faa42eb51fb20ceb8a70d9fb7e5647de92775d52292ace032108f3d3fab30
libcurl-minimal-7.61.1-22.el8.i686.rpm
b2ec1f86fd58731f4fe6bb19540b8cca8d61418a47760babef44fe37eb6d1707
libcurl-minimal-7.61.1-22.el8.i686.rpm
b2ec1f86fd58731f4fe6bb19540b8cca8d61418a47760babef44fe37eb6d1707
libcurl-minimal-7.61.1-22.el8.x86_64.rpm
a01088cec7aaabebb5389eb6181dc11e1fe240319e6ce18f7f625434386591f0
libcurl-minimal-7.61.1-22.el8.x86_64.rpm
a01088cec7aaabebb5389eb6181dc11e1fe240319e6ce18f7f625434386591f0
RLEA-2021:4514
strace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
strace-5.7-3.el8.x86_64.rpm
c947bc439100a43c19dcaf7fd3ede569689ebe54c4c498d7b9ce246cb8180123
RLBA-2021:4515
libcap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
libcap-2.26-5.el8.i686.rpm
1b745a574fb73be41cd1d0124e6314202e46803c603d14486f01dc0233edc08c
libcap-2.26-5.el8.x86_64.rpm
cc34596559c9118d8f2e3d91720bd0171a39e7f3958f59c5fa212386e9f04dfc
libcap-devel-2.26-5.el8.i686.rpm
cb950825d68877ccdf65dd65856e853b8de3d097f154caa7df7f04767bdfd6d4
libcap-devel-2.26-5.el8.x86_64.rpm
c9d76a889d56bad3ecb6bca75a525cabc09a851fbfeedc6a04989134524c046e
RLSA-2021:4382
Moderate: json-c security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for json-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
JSON-C implements a reference counting object model that allows users to easily construct JavaScript Object Notation (JSON) objects in C, output them as JSON formatted strings, and parse JSON formatted strings back into the C representation of JSON objects.
Security Fix(es):
* json-c: integer overflow and out-of-bounds write via a large JSON file (CVE-2020-12762)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
json-c-0.13.1-2.el8.i686.rpm
f3949e2c5f9aa6c49230b6a086707572a25dc3a21b20787d548b81af9d242dd1
json-c-0.13.1-2.el8.x86_64.rpm
495f51b14e26a4393df37172a5f2abb813454bbf80d60c0702f5f2437b0ec055
RLBA-2021:4389
iproute bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
iproute-5.12.0-4.el8.x86_64.rpm
13582ebf77a8ad6fd84b36b4d3fe1439d62aef5a2234262d29abef2af12502ae
iproute-tc-5.12.0-4.el8.x86_64.rpm
a7be2fb9d6bb32646e06d681af59191d54c25b80ea1e34ee7010b6e6b2a84aeb
RLBA-2021:4437
libldb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
ldb-tools-2.3.0-2.el8.x86_64.rpm
bd3f33d1a9e0eedb1778d98b99ea58b48506c06afc7fa649d9540006a2436a62
libldb-2.3.0-2.el8.i686.rpm
e145cbd3e775b84afd8e2533ece329a9789130b7c8a550a6ea2f2664aa479d16
libldb-2.3.0-2.el8.x86_64.rpm
1ce156344dd00d2a67f3a814a13b4c0da4db45becc421fe1e011125dac549476
libldb-devel-2.3.0-2.el8.i686.rpm
3d939f2117e01237caa96bfddcbc85e13dea163c7b9247a12693428aee07d950
libldb-devel-2.3.0-2.el8.x86_64.rpm
7961a9dc64370322a6a508635fc919541644f26fa0ed078d6e996e073d7f0ca4
python3-ldb-2.3.0-2.el8.i686.rpm
fcf050fc8ce163f025b463ad8b0e26c7ebf1ffd23d195fa5792ce5ae069e5713
python3-ldb-2.3.0-2.el8.x86_64.rpm
29f505e946b7a5460310023fcb9ab19e0c1d3f4a867bf3f30ce77c933db6b5a2
RLBA-2021:4482
authselect bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for authselect.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.5 Release Notes linked from the References section.
none-baseos-rpms
authselect-1.2.2-3.el8.x86_64.rpm
0d8b5a9d1ebb315154d115123b49a2515c1efe2bda2c33ea45c79ab45487ff33
authselect-1.2.2-3.el8.x86_64.rpm
0d8b5a9d1ebb315154d115123b49a2515c1efe2bda2c33ea45c79ab45487ff33
authselect-libs-1.2.2-3.el8.i686.rpm
8de2b4e0979b4296c62eed69c1637650ab0b2f080c6060ed532bcfb09b5dfa6d
authselect-libs-1.2.2-3.el8.i686.rpm
8de2b4e0979b4296c62eed69c1637650ab0b2f080c6060ed532bcfb09b5dfa6d
authselect-libs-1.2.2-3.el8.x86_64.rpm
1b546917745a90a3bf92ffca012fca9c2b73710ff96533c9bab6d42ee65df017
authselect-libs-1.2.2-3.el8.x86_64.rpm
1b546917745a90a3bf92ffca012fca9c2b73710ff96533c9bab6d42ee65df017
RLBA-2021:4541
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of
daemons to manage access to remote directories and authentication
mechanisms. It also provides the Name Service Switch (NSS) and the
Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* tps tests fail with cross dependency on sssd debuginfo package: removal
of 'sssd-libwbclient-debuginfo' is missing (BZ#2014460)
none-baseos-rpms
libipa_hbac-2.5.2-2.el8_5.1.i686.rpm
c0b6a1ed37ad23caa4ea9214b8a6b7a7cb9f56cb0721eb5515545eddcf4fd8eb
libipa_hbac-2.5.2-2.el8_5.1.x86_64.rpm
fcb22419df2a7086ee788dce9b978e636b7ae2d012893cfcdcff1fa5810643a4
libsss_autofs-2.5.2-2.el8_5.1.x86_64.rpm
f709649d75b564ef6b017abefff08d2422d375f66a1c692a2e2bb86616362a87
libsss_certmap-2.5.2-2.el8_5.1.i686.rpm
56fb6fd37a3a3ea3348f6a054458735befae93a2054256d681e1824973bfc4ed
libsss_certmap-2.5.2-2.el8_5.1.x86_64.rpm
06226cd6b414be37e47d7ebd162182c99187a8beb97f46e78b1d826a6649d258
libsss_idmap-2.5.2-2.el8_5.1.i686.rpm
aad4f79e5c8d3cb08d38c4b448dbe1591497830aec0539e92b6900f44e330fd4
libsss_idmap-2.5.2-2.el8_5.1.x86_64.rpm
d4599a046342286ab9b3d5d3b559a22e3f39973b33b21697ea1e22b357532cae
libsss_nss_idmap-2.5.2-2.el8_5.1.i686.rpm
6961909307e500e6ce32ee3e86bf21440efa04b6821475e57ff802103015cd22
libsss_nss_idmap-2.5.2-2.el8_5.1.x86_64.rpm
e2663f77ba7950dd163dba54d063450502644726cf438535523df4e746333178
libsss_simpleifp-2.5.2-2.el8_5.1.i686.rpm
be172fdef2678f2006fae95a50d44cbb5a8cbffe8826621002c451b5365e9daa
libsss_simpleifp-2.5.2-2.el8_5.1.x86_64.rpm
ee051d2c77b96f93f984c29c57e3814337513c2e9f608a4d54ca9f9ab08273a8
libsss_sudo-2.5.2-2.el8_5.1.x86_64.rpm
fc69fde9daf93fb5115dcfd6531ade2ca59a5dab723da0fa3260b0abb95581dd
python3-libipa_hbac-2.5.2-2.el8_5.1.x86_64.rpm
2517cdf1f559237f5ed6eb4e02444da55fba3d1368461c5700545a2c904984b5
python3-libsss_nss_idmap-2.5.2-2.el8_5.1.x86_64.rpm
e6b8ad4e0671ecfe6499ac122480b8dcff65f32d65c3d1ee90a2924d1c16f02b
python3-sss-2.5.2-2.el8_5.1.x86_64.rpm
ed88a41e26cd74bf2d64fe1d3e3f9f36b4feabaa70cd6830be962ed3b9c61ba2
python3-sssdconfig-2.5.2-2.el8_5.1.noarch.rpm
65751ac056f68bab4a657276f41e9f37b0eb4310c8c62423df5d2ee51fb60a11
python3-sssdconfig-2.5.2-2.el8_5.1.noarch.rpm
65751ac056f68bab4a657276f41e9f37b0eb4310c8c62423df5d2ee51fb60a11
python3-sss-murmur-2.5.2-2.el8_5.1.x86_64.rpm
16e97b6b5c23d9282fcaf577e679c93a1291ca0f2182912c440da9802b64fd40
sssd-2.5.2-2.el8_5.1.x86_64.rpm
0cbcdcab316229463af900d88af5262671aec28d0f7e27e7d45a10b31b5da552
sssd-ad-2.5.2-2.el8_5.1.x86_64.rpm
ad714156dbc5a7f32ae9c2c5961b4d193af37134da0d3b9e0e28a2202b68a0bf
sssd-client-2.5.2-2.el8_5.1.i686.rpm
4ee5c0e402ee1190920cfee8b3e1c17de64ddb3bc7434623dacd63afe45abd05
sssd-client-2.5.2-2.el8_5.1.x86_64.rpm
17357d4f0d60c9fedb9d4ab463960d812362b4082908b4605e87b7fb78c5b183
sssd-common-2.5.2-2.el8_5.1.x86_64.rpm
f0042d08a0a9623b3dc3356efa40415f1747ae418ca3619f1c19adbcea11bffe
sssd-common-pac-2.5.2-2.el8_5.1.x86_64.rpm
cc482a4639319128c895443e83e66f8cb7edfda15303b0477616a905f9a52e11
sssd-dbus-2.5.2-2.el8_5.1.x86_64.rpm
20a4b5e0addc7043eac35a09e23921065c9422d71b554b0c973c56a94c887db3
sssd-ipa-2.5.2-2.el8_5.1.x86_64.rpm
73a05f0de318298f9eb14460d494cece9e8e339bdc7fb13634116afb06a21e82
sssd-kcm-2.5.2-2.el8_5.1.x86_64.rpm
d05b1a1cc2322abb5d727a1c203a10751bb05eb8dde765d548ea1d95a879731f
sssd-krb5-2.5.2-2.el8_5.1.x86_64.rpm
3c54465bd56386a6e98360918e8328a9327d8628262a001364eb470f0a387023
sssd-krb5-common-2.5.2-2.el8_5.1.x86_64.rpm
70932ea22274b4e0e15cdc132ede4cfab1d8b24a8e12fc760e4b4d56a25936e1
sssd-ldap-2.5.2-2.el8_5.1.x86_64.rpm
1831c6848c2672c61e58e04667a0744af0b7e3168ce7dc7fc19a714c56c2d4c2
sssd-nfs-idmap-2.5.2-2.el8_5.1.x86_64.rpm
de2a49362739d5712436d3f76831913032acb061e78635b64c0b5fbba3a46f07
sssd-polkit-rules-2.5.2-2.el8_5.1.x86_64.rpm
310599c201e8d8a2ba27fe2090ccf79a2b629ee44d3b903dc2648308fd820611
sssd-proxy-2.5.2-2.el8_5.1.x86_64.rpm
b6e0fbda04cd4ea65c551d7d656f582aeff2b8d3cca30d928da6e9b6bc5cb036
sssd-tools-2.5.2-2.el8_5.1.x86_64.rpm
de5f4127319acdbb1f6806c74db306a493f240cc8e0a8458b373ab2f55b90e7f
sssd-winbind-idmap-2.5.2-2.el8_5.1.x86_64.rpm
c3ac9402bfbe01bb40caf14b6623c8d8b07bee20ec2b2a38cfbf856e8dbc1f8c
RLSA-2021:4587
Moderate: gcc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters:
This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters.
There are three levels of warning supported by gcc:
"-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.)
"-Wbidirectional=none", which turns the warning off.
"-Wbidirectional=any", which warns about any use of bidirectional characters.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libasan-8.5.0-4.el8_5.i686.rpm
72ae45442516ec3cf632679fda5a76f5617239b91e3ad13099e9d29adcb58dcc
libasan-8.5.0-4.el8_5.x86_64.rpm
4a7a2d6b0808328c342559814ea629007b8f46ecae657be30da4ccfd10572731
libatomic-8.5.0-4.el8_5.i686.rpm
b165f3e7faf1efa80d7ea6579895bae9cc2ae172877df37bdf27ab5a546a7ad7
libatomic-8.5.0-4.el8_5.x86_64.rpm
cfc1a8b66aff1e2393eb6405ab3ce89c14dca1af91454c58b7d0b68433a8a5c8
libatomic-static-8.5.0-4.el8_5.i686.rpm
ac5e3422530a8f4bb5c087c78952d32b9b90768081d12239ae977eb2f1d60252
libatomic-static-8.5.0-4.el8_5.x86_64.rpm
166d6727c17e2dafde3d43f1e1c55ec25a40893473b503a011b7d9c84f127f78
libgcc-8.5.0-4.el8_5.i686.rpm
1216edb92b47651a30a24dc189fe535fa8edb45e9c1e17ac8b05546b18c83352
libgcc-8.5.0-4.el8_5.x86_64.rpm
ab911cc2bf6f6536b32b3df2edfcb5bbf45a8f0f9ee7d7482bdfd02b42ba52d6
libgfortran-8.5.0-4.el8_5.i686.rpm
9b4f32ef3b4e8f7719c4a2a6c6caf9436c03c5662d4beeb75be1d81c16805067
libgfortran-8.5.0-4.el8_5.x86_64.rpm
b1e553952940321437aac0501c2231c74c68e382570c9832349b0f6f89476415
libgomp-8.5.0-4.el8_5.i686.rpm
e8e836cb89dc3574667dfc40afa55d2837fda6dc14f3b370e5e625450b0639d6
libgomp-8.5.0-4.el8_5.x86_64.rpm
dd4a9cdd44da891f08eae2ec3976ee9d2a14eaa522e94e85402909ef499578df
libgomp-offload-nvptx-8.5.0-4.el8_5.x86_64.rpm
150ff7a3fe4b24384684ab2115798f2732b2c0ccdfdd86f41d30680161c95760
libitm-8.5.0-4.el8_5.i686.rpm
12051ef3b1e0ddc7eda44f58a9a851caa4c89b7d14d581b8b792cede68547317
libitm-8.5.0-4.el8_5.x86_64.rpm
8d14fe3be4852d820006d498fd4e1065c671a4fcd4a804d611577c70eefeb368
liblsan-8.5.0-4.el8_5.x86_64.rpm
face1bf04467bbf07a2c6f48a9370a6505667100561bd38d6a26a70b3757924b
libquadmath-8.5.0-4.el8_5.i686.rpm
048e524950ca943157ac8b938a9ed81dabfbdc9b778c101a856fa14ca70c3d4d
libquadmath-8.5.0-4.el8_5.x86_64.rpm
a7f6b7aedc804fe8285bea210d6f86911655f404fd22170c3bdab8e3ec7ac131
libstdc++-8.5.0-4.el8_5.i686.rpm
f77bf723de091825d79f1bd310903e928fa6f4d44a723c3b7de96c3762370ebd
libstdc++-8.5.0-4.el8_5.x86_64.rpm
30ead24b28536b64a80d2978f5b6e942d421baef0f64288c08e82cd7ffd56944
libtsan-8.5.0-4.el8_5.x86_64.rpm
339310e87098fda68ffa3144dcf326d08badf0ed07ebe119c5b8005251144323
libubsan-8.5.0-4.el8_5.i686.rpm
56f506f757ceb25563fa66b50956b4211a24003953282056779a9ada5a67f8b2
libubsan-8.5.0-4.el8_5.x86_64.rpm
c1080c8a9b0e80d6a8f88b251a2878d649b6047abf6b026ad1e5cf607c19e074
RLSA-2021:4647
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type (CVE-2021-43267)
* kernel: timer tree corruption leads to missing wakeup and system freeze (CVE-2021-20317)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-348.2.1.el8_5.x86_64.rpm
da0f22c8f6ab423c240b7fa0c8d019f24fa40601fd21af59d31581513ead1748
kernel-4.18.0-348.2.1.el8_5.x86_64.rpm
7686d73c68a527aefa816ac782dde9b105a7033c576369cc8178ec4ea4613cec
kernel-abi-stablelists-4.18.0-348.2.1.el8_5.noarch.rpm
16e5d30eed91f617439f3528b6ffa0109c833f5af2f722a5d5c79ce4ed6fbd34
kernel-abi-stablelists-4.18.0-348.2.1.el8_5.noarch.rpm
16e5d30eed91f617439f3528b6ffa0109c833f5af2f722a5d5c79ce4ed6fbd34
kernel-core-4.18.0-348.2.1.el8_5.x86_64.rpm
3f2c4faf764d82864d763cbc6f531da6c78c9cbd8fc59b13ad593996b9af1adf
kernel-cross-headers-4.18.0-348.2.1.el8_5.x86_64.rpm
61643ed0d9f92bcedc40db1c4bc09f58f8cc55235ea9e508dc4dcaadd6018481
kernel-debug-4.18.0-348.2.1.el8_5.x86_64.rpm
ed516793fc405d6c4c98e3aa4ba5c3a846300116ab03b0a6f2865926d9bf606a
kernel-debug-core-4.18.0-348.2.1.el8_5.x86_64.rpm
d48018a88e8051bd5ffd90cd785d5ab19e63ed39b5812451e0d535e9c272d5c4
kernel-debug-devel-4.18.0-348.2.1.el8_5.x86_64.rpm
dda65beefe091e89b016b9334fe70cc96451d09575ab20da68a145ba5afaa0e3
kernel-debuginfo-common-x86_64-4.18.0-348.2.1.el8_5.x86_64.rpm
58860204f29297a42c30354cc7f89058fc69bc1d26895df0389107ac2b4f0e6c
kernel-debug-modules-4.18.0-348.2.1.el8_5.x86_64.rpm
f382fd6b73ef926a142cd36125c618842cb57d2699a120c2d70218fcca89a9dd
kernel-debug-modules-extra-4.18.0-348.2.1.el8_5.x86_64.rpm
285c5e2af629d91c4525c256e20984a189971c4ef0fd2f5e34b0a65dfa49d5d0
kernel-devel-4.18.0-348.2.1.el8_5.x86_64.rpm
940f797a9800edd353a33e1c557960dec80ef68c53cd844e72f90e8e76aec254
kernel-doc-4.18.0-348.2.1.el8_5.noarch.rpm
0d7df8d65059ce7456629b6dfa003f2a43e204e9121b85f6d146bd2fc7386f0a
kernel-doc-4.18.0-348.2.1.el8_5.noarch.rpm
0d7df8d65059ce7456629b6dfa003f2a43e204e9121b85f6d146bd2fc7386f0a
kernel-headers-4.18.0-348.2.1.el8_5.x86_64.rpm
03a9f0c6885cf30242847d84aac586447a3ddd46c7a213af026c7e7ae8e46130
kernel-modules-4.18.0-348.2.1.el8_5.x86_64.rpm
01a740219f201039a5445fae4204f1832e3829f607c13513bfb05a353078969e
kernel-modules-extra-4.18.0-348.2.1.el8_5.x86_64.rpm
e1d619a43768883b459a931ad80acb25eaf6c6c7fba7fb7d58358531da8b9e70
kernel-tools-4.18.0-348.2.1.el8_5.x86_64.rpm
2cafd74417a1b35d60f251e97a62f1188f82bade576f890c7a0a5cd6eb00f0dd
kernel-tools-libs-4.18.0-348.2.1.el8_5.x86_64.rpm
57bfa24f9e4d757a572f750079cfcb60864123258b8f6b3bec9394cb868f0ccf
perf-4.18.0-348.2.1.el8_5.x86_64.rpm
d6d133033495e235b09f39ff5b6d03373e1b5def1b314c6d95db7f76c291ee24
python3-perf-4.18.0-348.2.1.el8_5.x86_64.rpm
d579cadb62684f976f1ad2f27a7829cc2064021c9e234126d92382fb45fb0888
RLSA-2021:4595
Moderate: binutils security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Security Fix(es):
* Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574)
The following changes were introduced in binutils in order to facilitate detection of BiDi Unicode characters:
Tools which display names or strings (readelf, strings, nm, objdump) have a new command line option --unicode / -U which controls how Unicode characters are handled.
Using "--unicode=default" will treat them as normal for the tool. This is the default behaviour when --unicode option is not used.
Using "--unicode=locale" will display them according to the current locale.
Using "--unicode=hex" will display them as hex byte values.
Using "--unicode=escape" will display them as Unicode escape sequences.
Using "--unicode=highlight" will display them as Unicode escape sequences highlighted in red, if supported by the output device.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
binutils-2.30-108.el8_5.1.x86_64.rpm
6978da177cecff26d2cb0b0d722c44f50a1b4ee8253bb8a6e744a5fe1675b7dc
RLSA-2021:5082
Important: samba security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717)
* samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124)
* samba: Subsequent DCE/RPC fragment injection vulnerability (CVE-2021-23192)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
ctdb-4.14.5-7.el8_5.x86_64.rpm
7035e53312fdfb6c2e27095d0053fc312dafa396578363da1cf5d45a3d3e0f14
libsmbclient-4.14.5-7.el8_5.i686.rpm
5b00dee2f11198ae398dd0b70664b918a59de441f6517ef200ed0bd13fdf7cf7
libsmbclient-4.14.5-7.el8_5.x86_64.rpm
e1068b40b67bba9f2da059cb5db882efed712b0647a17c388468fb37eabb06a9
libwbclient-4.14.5-7.el8_5.i686.rpm
e06bd49f0206298dd2cb706a04b6bd5ed03607996b2b1c09b56cb4920e54199f
libwbclient-4.14.5-7.el8_5.x86_64.rpm
0cb87860cb98cd0310f25f276de1a2b17659fec5d14f43066efb3a4e6e4ad4a7
python3-samba-4.14.5-7.el8_5.i686.rpm
92ea9fcdaf0bf94594d7fb22579e90616366db9b0387975f710147b5bc5d80e4
python3-samba-4.14.5-7.el8_5.x86_64.rpm
6eacd716ae1528963c907294c4713486e40630c51db3237f1935f84608c2b8f6
python3-samba-test-4.14.5-7.el8_5.x86_64.rpm
5b681174348218dfd3032864c8bc211ca6fbe1a8ac4cd8878f43bf444527f20b
samba-4.14.5-7.el8_5.x86_64.rpm
5ee606df73e42b139a58c3c57b56c6d7181b6bad1685a00ced29749a0e57a1e5
samba-client-4.14.5-7.el8_5.x86_64.rpm
f7d9d65d3d12525cb05f7e60e62e492bb68896a629d993bb5c9c987611861c9d
samba-client-libs-4.14.5-7.el8_5.i686.rpm
3473295aaa7ac7a4d11a65786f21d4943b78da482f019b12b4b46b08cf0ba253
samba-client-libs-4.14.5-7.el8_5.x86_64.rpm
84d9d4151e4eacba3bc7af8bebea48c67ad0db9b5dbb47edd4a40fece4ad1b43
samba-common-4.14.5-7.el8_5.noarch.rpm
574b74f2163c819e23f51f66c528505cc6a0cf4e6525e44c50a70157f0c5e9a6
samba-common-4.14.5-7.el8_5.noarch.rpm
574b74f2163c819e23f51f66c528505cc6a0cf4e6525e44c50a70157f0c5e9a6
samba-common-libs-4.14.5-7.el8_5.x86_64.rpm
9d3774f11e6cebd91e7f52c7d8a5b060357b9d525c2d0dd0bf12462c70ab951a
samba-common-tools-4.14.5-7.el8_5.x86_64.rpm
4fdf300777f85d510b3ed17dee6ca01761423b9d4c138f869a5faff340bb3471
samba-krb5-printing-4.14.5-7.el8_5.x86_64.rpm
6e4519cf79c4702dbe79ba6ab25309216511fa7950f5865c8b6e1a7315456eaa
samba-libs-4.14.5-7.el8_5.i686.rpm
daeb02076fa0bdd65cd9986f8ebdd7f226ffd95071c931bd14ad6dc7a564376b
samba-libs-4.14.5-7.el8_5.x86_64.rpm
f9ca9bbe3e2b3e23e8226c33cb2a958381a0838b00dbcd1228ed0058f57b8f1d
samba-pidl-4.14.5-7.el8_5.noarch.rpm
c11aef50e52bc8686a081c75b19a5283025a6bcc8e14c97b9f3ae23615db2b24
samba-pidl-4.14.5-7.el8_5.noarch.rpm
c11aef50e52bc8686a081c75b19a5283025a6bcc8e14c97b9f3ae23615db2b24
samba-test-4.14.5-7.el8_5.x86_64.rpm
2f158c33d6668736250efbacc6ea6fdc01f7f90da6573d86375e3760e01ae04f
samba-test-libs-4.14.5-7.el8_5.x86_64.rpm
29dfc524447d7bd9412a839defeb0eca0d88478f28fd91170a2f97a8c8e13044
samba-winbind-4.14.5-7.el8_5.x86_64.rpm
dcd1455ce14cb54295762628e651410fca1539d6fdf0d27a3822f37ba125e800
samba-winbind-clients-4.14.5-7.el8_5.x86_64.rpm
481be7237845396181658c4c17b9de3607beb412aa09894690d5ee9775f74bee
samba-winbind-krb5-locator-4.14.5-7.el8_5.x86_64.rpm
c62a0d979ec41ac118e493007f9d5520c7abb4957f1990101640253999a591fe
samba-winbind-modules-4.14.5-7.el8_5.i686.rpm
faf18120330872b7b2452faab0769aab3f955e7a4e3a87299a0204765f3a3613
samba-winbind-modules-4.14.5-7.el8_5.x86_64.rpm
419855297c19c1a17921b3e6d32d94ca445f0c0c4ed57eaa233d3212b78920f8
samba-winexe-4.14.5-7.el8_5.x86_64.rpm
7891ae95f72f8fdbb88db32a813cd901b9e7d796422f2d11d64d055021f669b6
RLBA-2021:5174
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined
processes run on the system.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux 8.4] Backport container-selinux policy to allow spc_t domains to
set bpf rules on any domain (BZ#2015846)
* AVC prevents ping -I from running in UBI 8 container (BZ#2027691)
none-baseos-rpms
selinux-policy-3.14.3-80.el8_5.2.noarch.rpm
8c76dca18373e71c5f922ef3425d3b2a1dd2f277cf6cb3889f346f8b29d08603
selinux-policy-3.14.3-80.el8_5.2.noarch.rpm
8c76dca18373e71c5f922ef3425d3b2a1dd2f277cf6cb3889f346f8b29d08603
selinux-policy-devel-3.14.3-80.el8_5.2.noarch.rpm
d9dc311e5966176a306d5819e0bedd5c3699b1c6fb36166cb51e3e6398e636ef
selinux-policy-devel-3.14.3-80.el8_5.2.noarch.rpm
d9dc311e5966176a306d5819e0bedd5c3699b1c6fb36166cb51e3e6398e636ef
selinux-policy-doc-3.14.3-80.el8_5.2.noarch.rpm
0e7053abf5bbdb3112e0a96b5c2a68419381dce6723ee858994aae795d579f41
selinux-policy-doc-3.14.3-80.el8_5.2.noarch.rpm
0e7053abf5bbdb3112e0a96b5c2a68419381dce6723ee858994aae795d579f41
selinux-policy-minimum-3.14.3-80.el8_5.2.noarch.rpm
d2949214a211cd64eb0d19680c9b8d3286b4bfac183163f9e8e44ea8282393fd
selinux-policy-minimum-3.14.3-80.el8_5.2.noarch.rpm
d2949214a211cd64eb0d19680c9b8d3286b4bfac183163f9e8e44ea8282393fd
selinux-policy-mls-3.14.3-80.el8_5.2.noarch.rpm
999353d7ad1728f9b8544e42e9eb2b277ebf89e88a926f19c21f1fd6543893f7
selinux-policy-mls-3.14.3-80.el8_5.2.noarch.rpm
999353d7ad1728f9b8544e42e9eb2b277ebf89e88a926f19c21f1fd6543893f7
selinux-policy-sandbox-3.14.3-80.el8_5.2.noarch.rpm
49593efcd6442441fb989a321236f49c4c76fc38a244fe92005cbeef78776dac
selinux-policy-sandbox-3.14.3-80.el8_5.2.noarch.rpm
49593efcd6442441fb989a321236f49c4c76fc38a244fe92005cbeef78776dac
selinux-policy-targeted-3.14.3-80.el8_5.2.noarch.rpm
f98720de037613c7bbdfa1411283ac77bd155f13302495b183776e7fe9dab0e2
selinux-policy-targeted-3.14.3-80.el8_5.2.noarch.rpm
f98720de037613c7bbdfa1411283ac77bd155f13302495b183776e7fe9dab0e2
RLBA-2021:5202
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for
Linux, compatible with the SysV and LSB init scripts. It provides
aggressive parallelism capabilities, uses socket and D-Bus activation for
starting services, offers on-demand starting of daemons, and keeps track of
processes using Linux cgroups. In addition, it supports snapshotting and
restoring of the system state, maintains mount and automount points, and
implements an elaborate transactional dependency-based service control
logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* Network interface names are not necessarily predictable and don't match
previous names (BZ#2030027)
none-baseos-rpms
systemd-239-51.el8_5.3.i686.rpm
862df89fa903a252ceb3d5607fc6b9b9ff97e5e5aa1b54aec880f120f291ec10
systemd-239-51.el8_5.3.x86_64.rpm
439dde52b0d162e74bdb081a667885c2407f413fcad81b7909d022a27e44648c
systemd-container-239-51.el8_5.3.i686.rpm
9f94f679a87acb0d9ddfcd95d744edae90e22ad0b321376f74b1c24dce6dc17d
systemd-container-239-51.el8_5.3.x86_64.rpm
cb43c1008bb1b197230ba03f117e5405aef5b38129d797eff4c95e5136b3a4f1
systemd-devel-239-51.el8_5.3.i686.rpm
ebbfc2bedde2034b65322c1d2cf5352740557927d4b90a9b2bd19865bd083cbb
systemd-devel-239-51.el8_5.3.x86_64.rpm
b0ff482c070a2f007f0a20b73dd81384c1247985066d458a9c4bdc3bea3ac87d
systemd-journal-remote-239-51.el8_5.3.x86_64.rpm
eff8fc8bb3a40d46760a3dc20acd92ba0de526e84f0221ecb27a987299991c4c
systemd-libs-239-51.el8_5.3.i686.rpm
a7990d8beba3596713a2f4ebc13cf99eab394d9b25ce80d1c687addd52836fa6
systemd-libs-239-51.el8_5.3.x86_64.rpm
0be550cdab2e377922521a2d062e3efb3bf5b224c77cb8b5cfed98591f906876
systemd-pam-239-51.el8_5.3.x86_64.rpm
f66c4b74bbd40d7fdabedfed6d20aa067e0324d743a021ff9554f9c5d0bd4835
systemd-tests-239-51.el8_5.3.x86_64.rpm
081b0e6cc6d7a93ad86fa6a6edc1b3201e2fabe5cd65133c94266119ab9d9399
systemd-udev-239-51.el8_5.3.x86_64.rpm
238169d3d7af26aa839bbd62eaf4b34a1d114ab2765de4695bc7a0483f9b2a22
RLBA-2021:5224
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API,
implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards.
These packages includes support for the IBM 4758 Cryptographic CoProcessor
(with the PKCS#11 firmware loaded), the IBM eServer Cryptographic
Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC
0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic
Function (FC 3863 on IBM System z). The opencryptoki packages also bring a
software token implementation that can be used without any cryptographic
hardware. These packages contain the Slot Daemon (pkcsslotd) and general
utilities.
Bug Fix(es) and Enhancement(s):
* IPA: usr/lib/api/apiutil.c Could not open
/run/lock/opencryptoki/LCK..APIlock (BZ#2009328)
none-baseos-rpms
opencryptoki-3.16.0-7.el8_5.x86_64.rpm
bf1dba1e96f59a8d11fecec44c557652da8784c617749911971da93674812d2e
opencryptoki-icsftok-3.16.0-7.el8_5.x86_64.rpm
8c9baaddb08b91307c6eb04f3f6c7b954b9bcb24ca560829e159ea9940d7ed14
opencryptoki-libs-3.16.0-7.el8_5.i686.rpm
5fcdc1b366f6391c17e28e655603870a690495e6f71c08fa6cf334ef25569c8f
opencryptoki-libs-3.16.0-7.el8_5.x86_64.rpm
0ddad22f5bb425d1e0d4ae19739935a3a438d15005b9f7658136546dff7937d3
opencryptoki-swtok-3.16.0-7.el8_5.x86_64.rpm
77f4191c785063e1f8555aa60102ed4688a462752818e59498dd7a19f6fdc28c
opencryptoki-tpmtok-3.16.0-7.el8_5.x86_64.rpm
2a7008ddfe0c4aa67f86625add82b1274af62bcc2d214f052df7cba2751c1fd6
RLBA-2021:5225
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's
kexec feature either on a normal or a panic reboot. The kexec fastboot
mechanism allows booting a Linux kernel from the context of an already
running kernel.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux-8.5][fence kdump] kdump kernel failed with default crashkernel
size that "/bin/sh: error while loading shared libraries: libtinfo.so.6:
cannot open shared object file: No such file or directory " (BZ#2018861)
none-baseos-rpms
kexec-tools-2.0.20-57.el8_5.1.x86_64.rpm
8864633050114e6486aef46a7826a9347ad55edcb34fb7d41f071e00a6ebd63b
RLSA-2021:5226
Moderate: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-1.1.1k-5.el8_5.x86_64.rpm
9a0a993b8e69a96813a81b950550f6663ee89b2195125c402d3c907ee1b02346
openssl-devel-1.1.1k-5.el8_5.i686.rpm
5b3b1140cadc9a90ebe808aa678011f3487124a8179b4a8154340145fe7bb936
openssl-devel-1.1.1k-5.el8_5.x86_64.rpm
9028a7fd0705b115771ff8a6ac51975162cf545924d8794088b3a7d8b951cbdc
openssl-libs-1.1.1k-5.el8_5.i686.rpm
0030399e8a74aedd27c981c78561258999ebfdd03db531a9e35773aba91dab70
openssl-libs-1.1.1k-5.el8_5.x86_64.rpm
8d3741e3dd32b766ab1a06dec31ca6839b01bde6f99035fe302dd5d9bdfe2a1d
openssl-perl-1.1.1k-5.el8_5.x86_64.rpm
e34f975bfd9e09c358b4a2b33b97870ebeb178ea86a959f58af992f29aa44e55
RLSA-2021:5227
Moderate: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename() (CVE-2021-20321)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* panic while breaking a lease/delegation after user mode helper invocation (BZ#2010333)
* The ASR driver is causing a system crash in Rocky Linux8.4 compared to Rocky Linux8.3 due to kernel changes (BZ#2016384)
* Rocky Linux8: DFS provided SMB shares are not accessible following unprivileged access (BZ#2017177)
* Avoid hitting the rtnl_trylock/restart_syscall logic in net-sysfs when possible (BZ#2021165)
* Rocky Linux8: x86/Kconfig: Do not enable AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (BZ#2024678)
* Rocky Linux8.4-[Regression][P10][DD2.0][Rainier/Denali] - system crashed while offlining and onlining cores (BZ#2026450)
none-baseos-rpms
bpftool-4.18.0-348.7.1.el8_5.x86_64.rpm
09a6791dc570f98e76e0f8cd1fd299f1939516f30e2b21d8743ed77feb3f501f
kernel-4.18.0-348.7.1.el8_5.x86_64.rpm
c035b98eebb1a13de8e8f17ad06affe2ed64b6568a9c8cc2aff438fa39ab021f
kernel-abi-stablelists-4.18.0-348.7.1.el8_5.noarch.rpm
3a4a48b42a89a6f7f34726a0c80f812fb0e42e6eec0369a719d5d4c8e1b5f0ae
kernel-abi-stablelists-4.18.0-348.7.1.el8_5.noarch.rpm
3a4a48b42a89a6f7f34726a0c80f812fb0e42e6eec0369a719d5d4c8e1b5f0ae
kernel-core-4.18.0-348.7.1.el8_5.x86_64.rpm
eca536bff5108eb76988aa572e323de7bb02220a2b007ab11f394c15e091d895
kernel-cross-headers-4.18.0-348.7.1.el8_5.x86_64.rpm
cc1818a252e3598b2e7332c405731d87e6c683ca0335f9fbca45ceb7e43d349f
kernel-debug-4.18.0-348.7.1.el8_5.x86_64.rpm
4490c5825973b5121253849c04c9c944a4a54567efc81bf45c9cddb3206c8e6f
kernel-debug-core-4.18.0-348.7.1.el8_5.x86_64.rpm
35bdf89e2481efaab74e5e2c92cb953a40444ec8f32767f6373f905c2febf859
kernel-debug-devel-4.18.0-348.7.1.el8_5.x86_64.rpm
3e3d453e42cd34fd16a69c125c457f178c8d29444fec8bcb265b3d11353df585
kernel-debuginfo-common-x86_64-4.18.0-348.7.1.el8_5.x86_64.rpm
8079db7d9a3ab05649b5a4d50ce8641feff856ac0f3b83da99d76675f01b81da
kernel-debug-modules-4.18.0-348.7.1.el8_5.x86_64.rpm
decaaa20c92d13e11cc14e309d5d46c1c3d8f49123928765e971dc5866a6bc3d
kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.x86_64.rpm
626b4dea1d42dc47fdcf73216daecd9d60e382f6f7c509151db4edb7d3bfc685
kernel-devel-4.18.0-348.7.1.el8_5.x86_64.rpm
a95d6ab710379905db235afdd406bf3fd44be31c1c3f5a95a0fa9037e89420f5
kernel-doc-4.18.0-348.7.1.el8_5.noarch.rpm
e9fff3a106e20eee79789ebc5fdc5d3bd1ee7b0d54b87341a4798a359746bc6d
kernel-doc-4.18.0-348.7.1.el8_5.noarch.rpm
e9fff3a106e20eee79789ebc5fdc5d3bd1ee7b0d54b87341a4798a359746bc6d
kernel-headers-4.18.0-348.7.1.el8_5.x86_64.rpm
3bad39184849e04dfad0241f54081d3b72eb3df33e58948216b65c5f669a5911
kernel-modules-4.18.0-348.7.1.el8_5.x86_64.rpm
00060cfa0c4f66c527f592bd87d1e914202ecf26cfe0bc31e1a408dcbf6ef976
kernel-modules-extra-4.18.0-348.7.1.el8_5.x86_64.rpm
c18428ffde2ad0b5ecd7c5f1d69ebc7e7b1aa15e22011cd1ac753da128886375
kernel-tools-4.18.0-348.7.1.el8_5.x86_64.rpm
a6ca79b4455a54529070e8aaee36c8d549661bc3c36e37596d28ce58f9a59b13
kernel-tools-libs-4.18.0-348.7.1.el8_5.x86_64.rpm
7e90bb6999388d83bad4be014a2a00596cc1b0f2dddfff07c260ffa4b9bc3f7e
perf-4.18.0-348.7.1.el8_5.x86_64.rpm
4647883e483c9610a175f42854a3f58d11acca0513e99d8d83cc508dbb70e5d0
python3-perf-4.18.0-348.7.1.el8_5.x86_64.rpm
d2fe2bfbdd82615e4c667a1af68c4ab4671be619a4d375a8d514c33f3d5c2af9
RLBA-2021:5228
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of
daemons to manage access to remote directories and authentication
mechanisms. It also provides the Name Service Switch (NSS) and the
Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Lookup with fully-qualified name does not work with 'cache_first = True'
(BZ#2013379)
* autofs lookups for unknown mounts are delayed for 50s (BZ#2016923)
* 2.5.x based SSSD adds more AD domains than it should based on the
configuration file (not trusted and from a different forest) (BZ#2018440)
* Make backtrace less "chatty" (avoid duplicate backtraces) (BZ#2021499)
* pam responder does not call initgroups to refresh the user entry
(BZ#2028828)
none-baseos-rpms
libipa_hbac-2.5.2-2.el8_5.3.i686.rpm
a47de9f3fa6f74246283a325c6fe6d7caa29c05afaf43d84ade4ad45ab0d445b
libipa_hbac-2.5.2-2.el8_5.3.x86_64.rpm
274b403781df8c8d5706aa55824adaa4c65a6b0351970720376920e9e44546d3
libsss_autofs-2.5.2-2.el8_5.3.x86_64.rpm
c8d18998ff1bfee42c25d1923c7d312f97630271da4130da181d5b6529122d45
libsss_certmap-2.5.2-2.el8_5.3.i686.rpm
c32d3933c0e76fa4a53743e2adde643efa411813940fd3791e3aad96ad6bd543
libsss_certmap-2.5.2-2.el8_5.3.x86_64.rpm
59478d7af58bc0891f8bf96ef6705b103098bab214da6bc7ecc084291db00b35
libsss_idmap-2.5.2-2.el8_5.3.i686.rpm
fc9ea4cb649a25ec17a6b1db9141cf800f0d9bcbc61c69e1b6fe5be2e1b4c5bc
libsss_idmap-2.5.2-2.el8_5.3.x86_64.rpm
e82ede425f81de9e7028c1c5c62f911eb31b68d31c33aacd2e3ef43444ca9de5
libsss_nss_idmap-2.5.2-2.el8_5.3.i686.rpm
c367076f9f10234877d00f5a53f9bbadfcf4ca17b2a2c6a619a661a86264c1f2
libsss_nss_idmap-2.5.2-2.el8_5.3.x86_64.rpm
1d598ee5f6f0375f601b0dec433bf9e32a35bc06da52516852fe645119fb58b5
libsss_simpleifp-2.5.2-2.el8_5.3.i686.rpm
30418e77e0cbb0ad5b6ec5589147fa140fe63674b385d915632a1b96c3d02437
libsss_simpleifp-2.5.2-2.el8_5.3.x86_64.rpm
712ba603e8b1de094dcd1a983712d44f4edc1c286e2e12760a0dac9563316197
libsss_sudo-2.5.2-2.el8_5.3.x86_64.rpm
7ddc9a45abf0f241ae6a5f2e0f150623009e0fd1c8b5982e52c92c618a15d028
python3-libipa_hbac-2.5.2-2.el8_5.3.x86_64.rpm
62ca66ae4fe15ad19abf8504d261b30e97785f54fd5dd830ae323b7dc31a1047
python3-libsss_nss_idmap-2.5.2-2.el8_5.3.x86_64.rpm
48002d79e69a47f37d9425fbdd900a89e3f919922c8c18f614c92c418d25ae12
python3-sss-2.5.2-2.el8_5.3.x86_64.rpm
2c0ff9cdb0c9e504b83f7152b45ef3be56800dba7f9f70d7643a7520f649efab
python3-sssdconfig-2.5.2-2.el8_5.3.noarch.rpm
52dca3200fc0b9bd4c5a3ec851274c722dcb3cdc2e0f2c35d5cc8b0bbcc73dcf
python3-sssdconfig-2.5.2-2.el8_5.3.noarch.rpm
52dca3200fc0b9bd4c5a3ec851274c722dcb3cdc2e0f2c35d5cc8b0bbcc73dcf
python3-sss-murmur-2.5.2-2.el8_5.3.x86_64.rpm
9baf70226a73ec0d7b85aa34d24d4c7d6186094a323a9fcb7645f3c8e6db202c
sssd-2.5.2-2.el8_5.3.x86_64.rpm
e47bb5bb23aed433a91eb046b53d3dbc14503aa4aa2eec7d39328cb695d6607d
sssd-ad-2.5.2-2.el8_5.3.x86_64.rpm
f320cd6b2797f82916f886a21986afa5da0ac561155dc1fdb9f0b980f4bbc10e
sssd-client-2.5.2-2.el8_5.3.i686.rpm
705ff9abf7837a71dbda9de8150bb1c61da4a5cb02009e0c60ece6f9978c3f2a
sssd-client-2.5.2-2.el8_5.3.x86_64.rpm
8be7173a698c23686a8894278817d7c79e318d4d5821e25812278506a887c538
sssd-common-2.5.2-2.el8_5.3.x86_64.rpm
b7828563d7f48957b5a0204ba6ead37ec16d30dc286604664cdfc2e93b14aecf
sssd-common-pac-2.5.2-2.el8_5.3.x86_64.rpm
ddba50397efa2825806af04f8afe22972f89936619f2ac46df931dbdc539905c
sssd-dbus-2.5.2-2.el8_5.3.x86_64.rpm
8856dbc7af07d2480eba899684bba8820ac8b6bca0fb6b5dd8fde83fcd771796
sssd-ipa-2.5.2-2.el8_5.3.x86_64.rpm
28fe274d7ef66bb9f255be802c25f0fd780fd23a45da4aae4dbfadf656e1c83c
sssd-kcm-2.5.2-2.el8_5.3.x86_64.rpm
0e9f13ab2c5982113e2cabde40aaeda0692c6e3c783ad865a8462bcf468c3000
sssd-krb5-2.5.2-2.el8_5.3.x86_64.rpm
eb2185a6ff736cc47c78b9558359ab84d32dbb0f8e7d2488d37451370262a491
sssd-krb5-common-2.5.2-2.el8_5.3.x86_64.rpm
851c10b1b82033589a1d6b4b15a5cf0cded3f586423b2386ebf83ec78eee86fb
sssd-ldap-2.5.2-2.el8_5.3.x86_64.rpm
08d02e5107584eb6ffb8cc3cb0f600d1a7b48aa6662514776105bceb8307d757
sssd-nfs-idmap-2.5.2-2.el8_5.3.x86_64.rpm
a07a1163bde3a59716433420156b84414797c8afa65efc7374ad2260e6e87565
sssd-polkit-rules-2.5.2-2.el8_5.3.x86_64.rpm
bb13511ba950a36900fb6b7247ac9f06756f75540c4ced7dd33b0dc1533837dc
sssd-proxy-2.5.2-2.el8_5.3.x86_64.rpm
9902254388644a5c3c4a4c80154eef922f595db4e92860cb1322ccbb360288f8
sssd-tools-2.5.2-2.el8_5.3.x86_64.rpm
4a8a3b2d148989b023dcc19038eda78307b32e226ca74982be1e3b9b17d64f33
sssd-winbind-idmap-2.5.2-2.el8_5.3.x86_64.rpm
278b39486887c185d5f8f3f4e89fd215a0f2d8407b23196bf40f65b68d77dde2
RLBA-2021:5229
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for
Linux, compatible with the SysV and LSB init scripts. It provides
aggressive parallelism capabilities, uses socket and D-Bus activation for
starting services, offers on-demand starting of daemons, and keeps track of
processes using Linux cgroups. In addition, it supports snapshotting and
restoring of the system state, maintains mount and automount points, and
implements an elaborate transactional dependency-based service control
logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* systemd coredump in message_extend_fields -> realloc (BZ#2024903)
none-baseos-rpms
systemd-239-51.el8_5.2.i686.rpm
df8e67487e0cd9a244a9c8827d671751455683de3859dd569cf7e2a082ded11e
systemd-239-51.el8_5.2.x86_64.rpm
e0cd51601e6114bfd950736ea22803ef44ab3f5e0adc353eef4fe0f32a9fd351
systemd-container-239-51.el8_5.2.i686.rpm
d97c4cf52ede12bfeba048ae910d4b071b39cd2c74d48a4fc089b5978becec74
systemd-container-239-51.el8_5.2.x86_64.rpm
8bbddc89631e0612f72022858151268ceef46ba4995648d8dadf2b6beb087dac
systemd-devel-239-51.el8_5.2.i686.rpm
99cacf6a493c2bd85c6fc811625c7993bdf9b964cfd50e279f29987b4d000c6a
systemd-devel-239-51.el8_5.2.x86_64.rpm
15d19ed2372587723e49b7282d4353dcd2d9744b703a5ccd172cf54e5e4848d9
systemd-journal-remote-239-51.el8_5.2.x86_64.rpm
9adb43d19bb0c81b0c46f1ae0b8eceb2178cf85a47c7b5d9c25a57a2276bbd83
systemd-libs-239-51.el8_5.2.i686.rpm
71bdaa3e332f8f68fc5bf392bf8494a5c478704b57a0ba31284551e9c2d1dbb4
systemd-libs-239-51.el8_5.2.x86_64.rpm
5e624b7e70b994f155342d42f3d962b5bad190b6659b88bef196014945ee3488
systemd-pam-239-51.el8_5.2.x86_64.rpm
aacb70ced40f6348e3e99be599c6ca7679125a967afb234179f4738b837e3102
systemd-tests-239-51.el8_5.2.x86_64.rpm
02fe2bb2a98f29b826729f3cab3f959896a361868f67625f99dd9d2e834a166b
systemd-udev-239-51.el8_5.2.x86_64.rpm
397df266d4b51dca92ff69b08114d48d7c1ae70d5787b2e9370ed535023b9889
RLSA-2022:0188
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155)
* kernel: fs_context: heap overflow in legacy parameter handling (CVE-2022-0185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel show “ BUG: scheduling while atomic:xxx“ and reboot when an uncorrectable memory error injection on Rocky Linux8.4 beta and GA (BZ#2008789)
* tcp: Sockets can be orphaned in the FIN-WAIT-1 or CLOSING states. (BZ#2021574)
* Hostnetwork pod to service backed by hostnetwork on the same node is not working with OVN Kubernetes (BZ#2024411)
* ice: bug fixes for kernel crashes (BZ#2026698)
* [Rocky Linux-8.6][SanityOnly] Backport leftover migrate_disable BPF related change (BZ#2027689)
* xfs: I_DONTCACHE flag is ignored [xfstests: xfs/177] (BZ#2028534)
* FIPS: deadlock between PID 1 and "modprobe crypto-jitterentropy_rng" at boot, preventing system to boot (BZ#2029365)
* Rocky Linux8.6: Backport upstream RCU commits up to v5.12 (BZ#2029449)
* i40e,ixgbe: revert XDP partial backport from kernel 5.13 (BZ#2029845)
* spec: Support separate tools build (BZ#2031053)
* RCU stall WARNING: at kernel/rcu/tree.c:1392 rcu_advance_cbs_nowake+0x51/0x60 (BZ#2032579)
* block: update to upstream v5.14 (BZ#2034396)
none-baseos-rpms
bpftool-4.18.0-348.12.2.el8_5.x86_64.rpm
cf2a3a409549be5ce80743aaeac6d292eaebd6884f8f70dd2e58310030c2dd24
kernel-4.18.0-348.12.2.el8_5.x86_64.rpm
b0b85a5a8f86a88342555fed529d4eecd07831dc2f4f7d9d3b4365597abc80ba
kernel-abi-stablelists-4.18.0-348.12.2.el8_5.noarch.rpm
a1753d23596c4bd97bfaa8d2d93f4c43032f1812207312b7cd45a6e4e0ade2a8
kernel-abi-stablelists-4.18.0-348.12.2.el8_5.noarch.rpm
a1753d23596c4bd97bfaa8d2d93f4c43032f1812207312b7cd45a6e4e0ade2a8
kernel-core-4.18.0-348.12.2.el8_5.x86_64.rpm
129babbe928a9642d959c47b2fe04acb5174f62916b1553f7456b2d80d3963d2
kernel-cross-headers-4.18.0-348.12.2.el8_5.x86_64.rpm
95f37b20aec960d64e884b174829fd7a26b5482ced6ae157386c8ebfc309c51e
kernel-debug-4.18.0-348.12.2.el8_5.x86_64.rpm
5e804c05d605cc7f62724f1e6541e1fc866dea06e0b5cb02816ec5557c58fb4c
kernel-debug-core-4.18.0-348.12.2.el8_5.x86_64.rpm
cddf1ee20bc376e6c7c6b7ebc97f6fb9834a6be17a8662789af772f7f9a9d02e
kernel-debug-devel-4.18.0-348.12.2.el8_5.x86_64.rpm
7e08d329eb93fc29e01408147adf1dc927e87c180fce31f86711e2f960bbe594
kernel-debuginfo-common-x86_64-4.18.0-348.12.2.el8_5.x86_64.rpm
e89a7b097f4aea6e82d86e6b9902a14bbf8e27ab705310facf8c37f5050d63ee
kernel-debug-modules-4.18.0-348.12.2.el8_5.x86_64.rpm
6f0b9d74db6eb8f1006a8e0c5a9f16a67c3ff9e0b9c68e28d83a1d6ece6a640b
kernel-debug-modules-extra-4.18.0-348.12.2.el8_5.x86_64.rpm
241f3dd50dfb8957db5fa155dc791177cb72875d433d40843700f0d1498541e6
kernel-devel-4.18.0-348.12.2.el8_5.x86_64.rpm
e7945491a2f49e90bcca94c82cdbf8bb7860a0017aea63fa575799d71fac9150
kernel-doc-4.18.0-348.12.2.el8_5.noarch.rpm
a0dc39e37a1e2e2ba227c27010e7fb85c8dd7e0791ee763822de72119f5886aa
kernel-doc-4.18.0-348.12.2.el8_5.noarch.rpm
a0dc39e37a1e2e2ba227c27010e7fb85c8dd7e0791ee763822de72119f5886aa
kernel-headers-4.18.0-348.12.2.el8_5.x86_64.rpm
e12edc6cb78a433ae4904616326219a75fea6435d5d9b6ddf346327daf93abe1
kernel-modules-4.18.0-348.12.2.el8_5.x86_64.rpm
275131c6c795d01237741e1326a460cbde40952b66dc1c6d822cc97b422ecd75
kernel-modules-extra-4.18.0-348.12.2.el8_5.x86_64.rpm
68097f3a6a4a0fe4dbc29a50ee27439e93241cb375cc4fa79bf4a6cf218cb467
kernel-tools-4.18.0-348.12.2.el8_5.x86_64.rpm
6c99be151269b96bac0fe37536bed8cfe22a99c555fdc7ecf0b3bde56bcb4e6c
kernel-tools-libs-4.18.0-348.12.2.el8_5.x86_64.rpm
2374e5e4eb60119cb5c394f0e5b0b11a6bd3370720ad5508f19e66b3bb5bbb7a
perf-4.18.0-348.12.2.el8_5.x86_64.rpm
a0d4d1b168e4cfb897541ab1922e6ef235e6e856574be75fff2162d41f81e262
python3-perf-4.18.0-348.12.2.el8_5.x86_64.rpm
f6cfc57672fa3486702a26b8d1721dc89b9843fe6afe4297c6d4c5f019e650b7
RLSA-2022:0267
Important: polkit security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for polkit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.
Security Fix(es):
* polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
polkit-0.115-13.el8_5.1.x86_64.rpm
19dc946baf95673de1d02c396e7539b51a511d6712188413a3cf4e903a4a2925
polkit-devel-0.115-13.el8_5.1.i686.rpm
1f23684b10b24795e5a7ec3203e5ba1e8ed11120ba301e347a7d25eae856f664
polkit-devel-0.115-13.el8_5.1.x86_64.rpm
ab4c7ca7270511021804d6defb1c4763f236b5a6828179b69382cfb42ce14985
polkit-docs-0.115-13.el8_5.1.noarch.rpm
69b16552a1fa95c4dc4fe1d816ce9515d3f1a517965d47444b300338dcf10004
polkit-docs-0.115-13.el8_5.1.noarch.rpm
69b16552a1fa95c4dc4fe1d816ce9515d3f1a517965d47444b300338dcf10004
polkit-libs-0.115-13.el8_5.1.i686.rpm
28b2c2817b5d8bb9cf4f9fc256140694ecafe839ad32610e67d95e027c61044e
polkit-libs-0.115-13.el8_5.1.x86_64.rpm
d6639082a0dafed9362aada360187658cb51af51f8c4cc23670104263eab1f53
RLSA-2022:0332
Critical: samba security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Critical
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution (CVE-2021-44142)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Fix username map script regression introduced with CVE-2020-25717 (BZ#2046174)
* Fix possible segfault when joining the domain (BZ#2046160)
none-baseos-rpms
ctdb-4.14.5-9.el8_5.x86_64.rpm
b9f5b39e08cda252b89afa095dbdd01dcf4aadbcb81c7af33526fd95fc685ba0
libsmbclient-4.14.5-9.el8_5.i686.rpm
c18322ff8c7a77420124dd9156f4baa0558a975f645af19c8856d9459576899f
libsmbclient-4.14.5-9.el8_5.x86_64.rpm
8b29381b61404a7146362aa2cea86de3bdeeb8c0d0aa84c7e5317c172c4dc05d
libwbclient-4.14.5-9.el8_5.i686.rpm
91aaea7d183719c959470e7ea674e6c401e7a020bf7da268169b75ee937a7213
libwbclient-4.14.5-9.el8_5.x86_64.rpm
be683d9615b9edf1fc4d88e72933de9d94300804aa6c864949c44d8ed8aca807
python3-samba-4.14.5-9.el8_5.i686.rpm
60dc32324c1d1faeab2f813acc140161e2fdb162fbd7326bc730e1ddbe66f88d
python3-samba-4.14.5-9.el8_5.x86_64.rpm
41cad8c7c950308b995dd7679d0a14c01cfb2faaf999e1c852ad7708cd3043b3
python3-samba-test-4.14.5-9.el8_5.x86_64.rpm
fa4a54a12c4e35a225a545ce9c73f0ab40c2518fbc7cabb2097375fe1c729da9
samba-4.14.5-9.el8_5.x86_64.rpm
08fd1a259dda9f66ebb2bb2110c6cda5a86e0811895cc190283082ce0e53be3d
samba-client-4.14.5-9.el8_5.x86_64.rpm
f2cf989f99a5847ea8470ea7bab0eb9690bb51f1fd9e7d2ef9d2ebda26044f18
samba-client-libs-4.14.5-9.el8_5.i686.rpm
bf6b8eb2249395bdfa65ace95de0c659404d72bc27a8df37268877a73e4e9c22
samba-client-libs-4.14.5-9.el8_5.x86_64.rpm
2ccb513324e5432f2eec95e9950324017401bbb754a04a1a3a048d664f5d7735
samba-common-4.14.5-9.el8_5.noarch.rpm
f87c4f2b9bec2b10bf97bf034d9f3a0acc5767e91c366c02869672909a4b2027
samba-common-4.14.5-9.el8_5.noarch.rpm
f87c4f2b9bec2b10bf97bf034d9f3a0acc5767e91c366c02869672909a4b2027
samba-common-libs-4.14.5-9.el8_5.x86_64.rpm
7e1c737ad390debcd3444d3cd912ea66bbd5707e13a9a4cd46fbcc02e471df69
samba-common-tools-4.14.5-9.el8_5.x86_64.rpm
84126e2a182605a7b6b6617b0a6a2e26067578cb06d23e25e4acd93cd42504c5
samba-krb5-printing-4.14.5-9.el8_5.x86_64.rpm
9df1e8e992bba77b974338370351f44da0ca9d55a8b2a5eff7492a4f8ad916dd
samba-libs-4.14.5-9.el8_5.i686.rpm
55bded768e419f2a1af724fd60db9169b676195163a67de20c0474385041689a
samba-libs-4.14.5-9.el8_5.x86_64.rpm
9a3d9f14af82116370df4b183a295dc5c1835cd6c965a6488d59fba671818e2e
samba-pidl-4.14.5-9.el8_5.noarch.rpm
ce00e8571d04da9acb0dbb02d9f001d6c5cca208d0eb577f859615e9b6d35315
samba-pidl-4.14.5-9.el8_5.noarch.rpm
ce00e8571d04da9acb0dbb02d9f001d6c5cca208d0eb577f859615e9b6d35315
samba-test-4.14.5-9.el8_5.x86_64.rpm
8fe3e04109766ef1d5e40728d42b9c24dc2f348244b3995fb785ac43405ea35c
samba-test-libs-4.14.5-9.el8_5.x86_64.rpm
9a3bf42b93d41136185087121153fdcd7ece6e21d40bfab1e90b55927ba9f438
samba-winbind-4.14.5-9.el8_5.x86_64.rpm
6fc1a201fc3b3ba23a268667b8883bf23b0c6a3f1b6484d6c34e9c4474de182b
samba-winbind-clients-4.14.5-9.el8_5.x86_64.rpm
d0e49427a54264224528ed9694fc1d3bfb461f3c699de846f5d01a06f9130da5
samba-winbind-krb5-locator-4.14.5-9.el8_5.x86_64.rpm
c490c4cb09523cc29d25cecf4aad1d3fccc4300f886a8b3e2dcf24c67206c984
samba-winbind-modules-4.14.5-9.el8_5.i686.rpm
9c341cc259bd42422b83c3fe129dabdad8218ba2b5bc48094daf41dc3d23b39e
samba-winbind-modules-4.14.5-9.el8_5.x86_64.rpm
a5c17414785514be083fb03ef80478b5180ac6a03153b7845b86a86b39370df1
samba-winexe-4.14.5-9.el8_5.x86_64.rpm
ba376c473bf5a43ecae79cbb89b38c5f28e2ed95497f84ef6843f2d9d092a630
RLSA-2022:0366
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: heap-based buffer overflow in win_redr_status() in drawscreen.c (CVE-2021-3872)
* vim: illegal memory access in find_start_brace() in cindent.c when C-indenting (CVE-2021-3984)
* vim: heap-based buffer overflow in find_help_tags() in help.c (CVE-2021-4019)
* vim: use-after-free in win_linetabsize() (CVE-2021-4192)
* vim: out-of-bound read in getvcol() (CVE-2021-4193)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
vim-minimal-8.0.1763-16.el8_5.4.x86_64.rpm
c3d2b5a57ada94d3d9e2697d50c1d67c0dad85e7b3590deb2bc94f6c38b90622
RLBA-2022:0367
cockpit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit enables users to administer GNU/Linux servers using a web browser.
It offers network configuration, log inspection, diagnostic reports,
SELinux troubleshooting, interactive command-line sessions, and more.
Bug Fix(es) and Enhancement(s):
* Cockpit 251 Administrative Access MFA Prompt Window Broken (BZ#2032849)
none-baseos-rpms
cockpit-251.3-1.el8_5.x86_64.rpm
a86b1d6bf587fa0772d3e619cff2101e10d2305381e526e7478701f27a5e3e25
cockpit-bridge-251.3-1.el8_5.x86_64.rpm
c8edcee3070b5ec8e1e1bb46b34ce9ee21b82401f94518d6f93fe26a328bfb53
cockpit-doc-251.3-1.el8_5.noarch.rpm
ce97b2df0e8b21c6344f3cc7807ff683ee0103c6aa2b3fd7ac6542b835dbdb5f
cockpit-doc-251.3-1.el8_5.noarch.rpm
ce97b2df0e8b21c6344f3cc7807ff683ee0103c6aa2b3fd7ac6542b835dbdb5f
cockpit-system-251.3-1.el8_5.noarch.rpm
57e16a113fccdb1021483083f8a9404be120f2ec79adc6430a4fcacc67774004
cockpit-system-251.3-1.el8_5.noarch.rpm
57e16a113fccdb1021483083f8a9404be120f2ec79adc6430a4fcacc67774004
cockpit-ws-251.3-1.el8_5.x86_64.rpm
625e1dc75d01c0f92e346ca75fe5161824b5afcc6605a60535346e7f82b6aade
RLSA-2022:0368
Moderate: rpm security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Security Fix(es):
* rpm: RPM does not require subkeys to have a valid binding signature (CVE-2021-3521)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-rpm-4.14.3-19.el8_5.2.x86_64.rpm
44b41b8cfcd66300f73cd5c194f53c2171ba36d3625e76af00e8c0c6ebd32a2a
rpm-4.14.3-19.el8_5.2.x86_64.rpm
9507ab3a23969ab081bbad53e43da10c124bf4cd4107a50371506e3fafd0f11f
rpm-apidocs-4.14.3-19.el8_5.2.noarch.rpm
b50ccc3d780822f43bfa2e8a0000e55d78c042c7307ced7371fe7f69c85651fb
rpm-apidocs-4.14.3-19.el8_5.2.noarch.rpm
b50ccc3d780822f43bfa2e8a0000e55d78c042c7307ced7371fe7f69c85651fb
rpm-build-libs-4.14.3-19.el8_5.2.i686.rpm
7d2ff4df6d72ee592d7c7150177225b4b8fa5656c59a0ab53d95a8082199641f
rpm-build-libs-4.14.3-19.el8_5.2.x86_64.rpm
235f5cbba875baf1631d2fcb320f4fd1d9c844e8f3ced4d4f6f7cf5ff27c636d
rpm-cron-4.14.3-19.el8_5.2.noarch.rpm
003e6a1d82093172f0a86c29a38e19b030a142a78b91a9026abdfc3f04f8d994
rpm-cron-4.14.3-19.el8_5.2.noarch.rpm
003e6a1d82093172f0a86c29a38e19b030a142a78b91a9026abdfc3f04f8d994
rpm-devel-4.14.3-19.el8_5.2.i686.rpm
e139cfa5637ce5205e36c8a7816d28773e9e3515c5718711971bc993a5290213
rpm-devel-4.14.3-19.el8_5.2.x86_64.rpm
787a55ff1c9083f40c897ffd832b4880dbe3bd48799212917d3021a12f1b6f4d
rpm-libs-4.14.3-19.el8_5.2.i686.rpm
903bd63250aaa4e8eaae0c70b7ba88ef46cff93f1a6ed6b0771f532ae283a8e8
rpm-libs-4.14.3-19.el8_5.2.x86_64.rpm
9ee67f5606ea57e4d82579d31f318f09e9840577895f41c11060732ac0e49566
rpm-plugin-ima-4.14.3-19.el8_5.2.x86_64.rpm
7ee73e188d88c2be72afc7122d97f42b79e5ea3777d698c88c7bd9cac692d623
rpm-plugin-prioreset-4.14.3-19.el8_5.2.x86_64.rpm
826e3a4ace7d9abe3ae57d6e041067efc34546e88ded5400bf7aa1808f131666
rpm-plugin-selinux-4.14.3-19.el8_5.2.x86_64.rpm
8a15881b51aa916fcf61cbd3a4fa0d2a1901660d758e6edd966dde6ac3725911
rpm-plugin-syslog-4.14.3-19.el8_5.2.x86_64.rpm
ba0b11ee7e9b64cb046e5e457934aa70324607df9c92bde1c837c6bd9ed51d87
rpm-plugin-systemd-inhibit-4.14.3-19.el8_5.2.x86_64.rpm
31bbe751090848383f700b43525d0a66811512482d389d2b89e292c503355b6d
rpm-sign-4.14.3-19.el8_5.2.x86_64.rpm
5fcdaef460de89b481044066b65b6f338fa0ef1b771498497bea5341b424a63e
RLBA-2022:0369
dnf-plugins-core bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dnf-plugins-core packages provide core plugins for YUM4. They add these commands: builddep, config-manager, copr, debug, debuginfo-install, download, needs-restarting, repoclosure, repograph, repomanage, and reposync.
Bug Fix(es) and Enhancement(s):
* "needs-restarting -r" not notifying kernel modification (BZ#2037008)
none-baseos-rpms
dnf-plugins-core-4.0.21-4.el8_5.noarch.rpm
31b9c90083a8d45c095c783405cf2ac411d744e4738521ab2816027bc6857431
dnf-plugins-core-4.0.21-4.el8_5.noarch.rpm
31b9c90083a8d45c095c783405cf2ac411d744e4738521ab2816027bc6857431
python3-dnf-plugin-post-transaction-actions-4.0.21-4.el8_5.noarch.rpm
e438a4ae4555a1b06eed09f71f8f0d085adcae6119fa8a26cd4caff67d3769f0
python3-dnf-plugin-post-transaction-actions-4.0.21-4.el8_5.noarch.rpm
e438a4ae4555a1b06eed09f71f8f0d085adcae6119fa8a26cd4caff67d3769f0
python3-dnf-plugins-core-4.0.21-4.el8_5.noarch.rpm
3f56ddbddad3eb60098c140bddc06734cb7305f29ed30503c1a067f688c8f28f
python3-dnf-plugins-core-4.0.21-4.el8_5.noarch.rpm
3f56ddbddad3eb60098c140bddc06734cb7305f29ed30503c1a067f688c8f28f
python3-dnf-plugin-versionlock-4.0.21-4.el8_5.noarch.rpm
6a86925d90d543c94c1ac29766c6ea48db1b4aced14c327df93cb609c9b3434c
python3-dnf-plugin-versionlock-4.0.21-4.el8_5.noarch.rpm
6a86925d90d543c94c1ac29766c6ea48db1b4aced14c327df93cb609c9b3434c
yum-utils-4.0.21-4.el8_5.noarch.rpm
841a80cd87c0a6d96dd44b164255b9c9bdfd4fe7ff0ce90c6e10640b9efe922c
yum-utils-4.0.21-4.el8_5.noarch.rpm
841a80cd87c0a6d96dd44b164255b9c9bdfd4fe7ff0ce90c6e10640b9efe922c
RLSA-2022:0892
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: extracting a symlink with ACLs modifies ACLs of target (CVE-2021-23177)
* libarchive: symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive (CVE-2021-31566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libarchive-3.3.3-3.el8_5.x86_64.rpm
3d5aa00c6aca065c1c7760c07e39100c6919decc77a232baab16df8a5e0070e2
bsdtar-3.3.3-3.el8_5.x86_64.rpm
0a2c4713148c1efa4606a9ecc3687ede2a4427757f2f27dd5106b70510c1d994
bsdtar-3.3.3-3.el8_5.x86_64.rpm
0a2c4713148c1efa4606a9ecc3687ede2a4427757f2f27dd5106b70510c1d994
libarchive-3.3.3-3.el8_5.i686.rpm
fcc5d7ba7b51b3978c4b3f035a8fc7b5c78534be55b63b1841e4ec388f296f49
libarchive-3.3.3-3.el8_5.i686.rpm
fcc5d7ba7b51b3978c4b3f035a8fc7b5c78534be55b63b1841e4ec388f296f49
libarchive-3.3.3-3.el8_5.x86_64.rpm
3d5aa00c6aca065c1c7760c07e39100c6919decc77a232baab16df8a5e0070e2
RLSA-2022:0370
Moderate: cryptsetup security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cryptsetup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The cryptsetup packages provide a utility for setting up disk encryption using the dm-crypt kernel module.
Security Fix(es):
* cryptsetup: disable encryption via header rewrite (CVE-2021-4122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
cryptsetup-2.3.3-4.el8_5.1.x86_64.rpm
638bf09c8c17e41c32c415e02dd8a0ce16f3177853d87286655f2b8cd70119f0
cryptsetup-libs-2.3.3-4.el8_5.1.i686.rpm
9ce09a7dac0072c669d5bdc556d311f06c8259ee4a3bc0b723c003d2586b202c
cryptsetup-libs-2.3.3-4.el8_5.1.x86_64.rpm
d6392509d52ec05989453675d2ec6273697f1ca91b506ce425ed72937070675c
cryptsetup-reencrypt-2.3.3-4.el8_5.1.x86_64.rpm
86cc88b64b1dd1e5bbcfe0930f8cf84abd6cb1bbd66edcc12a21ae79de84d7cf
integritysetup-2.3.3-4.el8_5.1.x86_64.rpm
c86e95506e8d75c8d3199ae66d68b4e506127d74f6824a8fe3fc07beda15e259
veritysetup-2.3.3-4.el8_5.1.x86_64.rpm
a3f9ab4e891ba61086fe95dd9f9395c75add22324ad2bca0a06b76562003f8c4
RLBA-2022:0371
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of
daemons to manage access to remote directories and authentication
mechanisms. It also provides the Name Service Switch (NSS) and the
Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* sssd-kcm has requirement on krb5 symbol "krb5_unmarshal_credentials" only
available in latest Rocky Linux8.5 krb5 libraries (BZ#2030651)
* AD Domain in the AD Forest Missing after sssd latest update (BZ#2035285)
none-baseos-rpms
libipa_hbac-2.5.2-2.el8_5.4.i686.rpm
3f1fed82e046ef74702542d82accf0d46cd29c36dc588c24231a579f9e5b9db6
libipa_hbac-2.5.2-2.el8_5.4.x86_64.rpm
efe93dbb674db0d1ba6b53253b09fc4697b64ac50e92f97f87276e7d51df6f4f
libsss_autofs-2.5.2-2.el8_5.4.x86_64.rpm
fb0fed217c9fb65c7a4ff85e0e6a285e469e1fb95671eaca3ca931935a0470b7
libsss_certmap-2.5.2-2.el8_5.4.i686.rpm
7b6e41d9230d98739e8ee349df89b4d12a1e4c1c06ef1667d6101ebda6edd166
libsss_certmap-2.5.2-2.el8_5.4.x86_64.rpm
f0bd3e44ae1a89d0b9a2fa0b6649e8aa78da736ffdba768c050e9f886ea89854
libsss_idmap-2.5.2-2.el8_5.4.i686.rpm
feae772d1eec63a17cd996fd356f98e3ef9b2add39b62ad6b3ffe3b86c479208
libsss_idmap-2.5.2-2.el8_5.4.x86_64.rpm
56c542f760b47ff3cd123934d5996f9b63411cf67bdefd9dc1ee060886db9c19
libsss_nss_idmap-2.5.2-2.el8_5.4.i686.rpm
cfba636307268c3e2bfac724389b8d6ea7ac76371a6f512c8410a32ceb192e41
libsss_nss_idmap-2.5.2-2.el8_5.4.x86_64.rpm
37a8f555363bed95b01e42172c25fa5fa99ee8f83e259ea1f442bb9456359c56
libsss_simpleifp-2.5.2-2.el8_5.4.i686.rpm
7b9d49e0fa268a12f2192b318f7b3222cd1305df23e74c9c9ced6dfeab0859ed
libsss_simpleifp-2.5.2-2.el8_5.4.x86_64.rpm
b88751dfea3ae56f61ab35f0980cc73965f61e2d3d9fd9e8c6ce3604a63a2990
libsss_sudo-2.5.2-2.el8_5.4.x86_64.rpm
a8d019fa8ad9e4257f4473bad48c5d745828db3cf723d8cc2db9fa76a3c5abcd
python3-libipa_hbac-2.5.2-2.el8_5.4.x86_64.rpm
aa6ba530e65f69d00f27b49817647bb4debde8c8ecd6efc9b0c08bcdd37fbbfd
python3-libsss_nss_idmap-2.5.2-2.el8_5.4.x86_64.rpm
92f6c3fb222b231bb547bd7426579ad21921405c13f1ece02ff693820434c3fb
python3-sss-2.5.2-2.el8_5.4.x86_64.rpm
80c30f191b89a4790c6e2bca103dfbf2d1792556cd23199fa9ef22ccc0fa882b
python3-sssdconfig-2.5.2-2.el8_5.4.noarch.rpm
83898074a81f114978fda83014a26fef9c73d9f777844ac04babdde382058e23
python3-sssdconfig-2.5.2-2.el8_5.4.noarch.rpm
83898074a81f114978fda83014a26fef9c73d9f777844ac04babdde382058e23
python3-sss-murmur-2.5.2-2.el8_5.4.x86_64.rpm
2d5a49021b2309a949a7825b26e7e2a7cef63bea05e06d8d2007ae5922981378
sssd-2.5.2-2.el8_5.4.x86_64.rpm
c32d2ee3bdae5ead0850cd96caa44e39b44238f24f37cbd5aac7d8dad4ac6de4
sssd-ad-2.5.2-2.el8_5.4.x86_64.rpm
ad4f3225359fc5f6eb8f835dfef6faac8c95931c9d0bfd881cab3f9a76dca297
sssd-client-2.5.2-2.el8_5.4.i686.rpm
584dc75b8a4433521f2b3ce6401927235c60952a24e663a6fa96351c551f428f
sssd-client-2.5.2-2.el8_5.4.x86_64.rpm
a5f68b1c16cec428086be325bd91092cbce295ca6c6e69fb7a83cf714ee4ce57
sssd-common-2.5.2-2.el8_5.4.x86_64.rpm
eccef07d8e27806143e4b642e56db54338126b1790fec7b2f8cfbbac58be562b
sssd-common-pac-2.5.2-2.el8_5.4.x86_64.rpm
0d635835995a7e83e0572ef101d1e2648269892c9bdc3783d3bb264dcda5d5dd
sssd-dbus-2.5.2-2.el8_5.4.x86_64.rpm
dd34892eca23faf72f684c74598b1e1e12ca6461e7d981da7d2702cb4c91ab8d
sssd-ipa-2.5.2-2.el8_5.4.x86_64.rpm
7eae1ed2356a84c82993e95be551234a0267fdea21e7400ad9d3dffa0e9ac480
sssd-kcm-2.5.2-2.el8_5.4.x86_64.rpm
7ac93820688df0a9161a96a11bbab2b440e9137919e85fbf8cbc5ad2460127ac
sssd-krb5-2.5.2-2.el8_5.4.x86_64.rpm
dc8b78a9d5d11f34b25fabba98890569cbd5320b67001c34e9721e9a123d6e30
sssd-krb5-common-2.5.2-2.el8_5.4.x86_64.rpm
398cdf2c00a25c4c851afd65448b146e59ec1a1fa58262a61a1a7d0398a8f42e
sssd-ldap-2.5.2-2.el8_5.4.x86_64.rpm
9db070ba69776a3465822396f2234e53fad32529bc48d502a0e4766a092263b0
sssd-nfs-idmap-2.5.2-2.el8_5.4.x86_64.rpm
27808266dc9f1c5ccb0d9596ab7d73614d2bf0271e94bce93c79a9baf8a329e5
sssd-polkit-rules-2.5.2-2.el8_5.4.x86_64.rpm
a3f66ef834a453f110a2347fa11499345b5a904cf9840988aaf0db1430d81411
sssd-proxy-2.5.2-2.el8_5.4.x86_64.rpm
e3217f1c9bf5c61c0838cd38d0e196aefe7033e772af61eccdd643f137455930
sssd-tools-2.5.2-2.el8_5.4.x86_64.rpm
3641fa62cdf0f50ffb4e9910af6e690aa0af501e70c525d6ee9461c29f5f9923
sssd-winbind-idmap-2.5.2-2.el8_5.4.x86_64.rpm
bb4280cfa489b873f1ea4257e564ae785b4577919c55367a60d01548709a1995
RLSA-2022:0825
Important: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The following packages have been upgraded to a later upstream version: kernel (4.18.0). (BZ#2036888)
Security Fix(es):
* kernel: improper initialization of the "flags" member of the new pipe_buffer (CVE-2022-0847)
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920)
* kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout (CVE-2021-4154)
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330)
* kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435)
* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492)
* kernel: missing check in ioctl allows kernel memory read/write (CVE-2022-0516)
* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Intel QAT Kernel power up fix (BZ#2016437)
* Rocky Linux8.4 seeing scsi_dma_map failed with mpt3sas driver and affecting performance (BZ#2018928)
* [Lenovo 8.4 bug] audio_HDMI certification failed on Rocky Linux 8.4GA (No hdmi out) (BZ#2027335)
* [Rocky Linux-8.5][4.18.0-323.el8.ppc64le][POWER8/9/10] security_flavor mode is not set back to zero post online migration (BZ#2027448)
* iommu/amd: Fix unable to handle page fault due to AVIC (BZ#2030854)
* [Lenovo 8.4 bug]The VGA display shows no signal (black screen) when install Rocky Linux8.4(beta or rc1) in the legacy BIOS mode. (BZ#2034949)
* Double free of kmalloc-64 cache struct ib_port->pkey_group from module ib_core . (BZ#2038724)
* Bus error with huge pages enabled (BZ#2039015)
* Rocky Linux8 - kvm: floating interrupts may get stuck (BZ#2040769)
* Data corruption on small files served by httpd, which is backed by cifs-mount (BZ#2041529)
* Add a net/mlx5 patch for Hardware Offload Fix (BZ#2042663)
* Windows guest random Bsod when 'hv-tlbflush' enlightenment is enabled (BZ#2043237)
* DNS lookup failures when run two times in a row (BZ#2043548)
* net/sched: Fix ct zone matching for invalid conntrack state (BZ#2043550)
* Kernel 4.18.0-348.2.1 secpath_cache memory leak involving strongswan tunnel (BZ#2047427)
* OCP node XFS metadata corruption after numerous reboots (BZ#2049292)
* Broadcom bnxt_re: RDMA stats are not incrementing (BZ#2049684)
* ice: bug fix series for 8.6 (BZ#2051951)
* panic while looking up a symlink due to NULL i_op->get_link (BZ#2052558)
* ceph omnibus backport for Rocky Linux-8.6.0 (BZ#2053725)
* SCTP peel-off with SELinux and containers in OCP (BZ#2054112)
* Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode (BZ#2054117)
* dnf fails with fsync() over local repository present on CIFS mount point (BZ#2055824)
none-baseos-rpms
bpftool-4.18.0-348.20.1.el8_5.x86_64.rpm
701aad9d59ea0de0fb6be01ae012d3b1bb65cae473b261032a9953d7d2259ff1
kernel-4.18.0-348.20.1.el8_5.x86_64.rpm
aed6f11a0056e537c50f61de85dd3bb5d73eefada20b42aecf6f2f7e9ce3796c
kernel-abi-stablelists-4.18.0-348.20.1.el8_5.noarch.rpm
2a5eb00946fd216ea1d6a2be65cc5049fa92d266b54427e8b37c54391f5ef21d
kernel-abi-stablelists-4.18.0-348.20.1.el8_5.noarch.rpm
2a5eb00946fd216ea1d6a2be65cc5049fa92d266b54427e8b37c54391f5ef21d
kernel-core-4.18.0-348.20.1.el8_5.x86_64.rpm
28f537deed7bea62bb8b782b29bae846a93ed59ebe05f39788a7e932d6b5f449
kernel-cross-headers-4.18.0-348.20.1.el8_5.x86_64.rpm
ba470adb95c955e7bfff14c8f9b116dbdbe61f8e7fe0d80cb26c55a7d99dddeb
kernel-debug-4.18.0-348.20.1.el8_5.x86_64.rpm
edfc07f192081b7eb91b79eeab3914fbbe6554c1a7eea3e8fd47b745f0611f6e
kernel-debug-core-4.18.0-348.20.1.el8_5.x86_64.rpm
bc6350d495ab1ffbe50d8ef50249f1293126ae710181dcb250989834d3bdddc4
kernel-debug-devel-4.18.0-348.20.1.el8_5.x86_64.rpm
87b62db4143915de7ea627a444c3412fded8e496ba38b7cc3ea8b74221f0945e
kernel-debuginfo-common-x86_64-4.18.0-348.20.1.el8_5.x86_64.rpm
26a277f6c16ac59b3b17798b9b964c9568dd2f344d632eff8b772f43a7256171
kernel-debug-modules-4.18.0-348.20.1.el8_5.x86_64.rpm
1ce5007e1b5cfccc2f0b74516c29e17e2b1be9df68bf61a35b4c577b964f2fed
kernel-debug-modules-extra-4.18.0-348.20.1.el8_5.x86_64.rpm
b1e568ad5d5d17b4f0e4a2c8ddfc658c3825c6c8f070a4d13b64a709a039cf8d
kernel-devel-4.18.0-348.20.1.el8_5.x86_64.rpm
0df9645d53f975b40451c6c1a7d8005a2b78501236ad9b9be9acfa151718b5a6
kernel-doc-4.18.0-348.20.1.el8_5.noarch.rpm
a98a9f9cd6ca173baf5ae5444199c81a88abcd520cb0048f132ead8c28faff3e
kernel-doc-4.18.0-348.20.1.el8_5.noarch.rpm
a98a9f9cd6ca173baf5ae5444199c81a88abcd520cb0048f132ead8c28faff3e
kernel-headers-4.18.0-348.20.1.el8_5.x86_64.rpm
ab0d9ed5c23bba071554e3d45b0759754dbb665bebad6d301d4a1749dceb4d23
kernel-modules-4.18.0-348.20.1.el8_5.x86_64.rpm
8c83c6b8cca9bc800570adf7560d4d8e3cf438d87c339ca2a83237bd980d75f6
kernel-modules-extra-4.18.0-348.20.1.el8_5.x86_64.rpm
bc4db9c43c6d0f7b1853229d241cc91e0fc81e4449803dfd6a3fe4ab240794c1
kernel-tools-4.18.0-348.20.1.el8_5.x86_64.rpm
778b6cdb9ca4760f8a3e503714abfc22bbbc77246869fa07d8ffadc81ed13f43
kernel-tools-libs-4.18.0-348.20.1.el8_5.x86_64.rpm
75b5aace13a46a43695acb90dfdeea7aa035c5f210ab19d396990fca2d27dd71
perf-4.18.0-348.20.1.el8_5.x86_64.rpm
10cf5a83926c2b3397cc5543e7814edd1ef10141f5bb0c78ae72a76acaad073b
python3-perf-4.18.0-348.20.1.el8_5.x86_64.rpm
32bd0df4c02e499f243e5928bb3be593c7cfc9be5cf311d1ada8f4e0693e4540
RLBA-2022:0893
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for
Linux, compatible with the SysV and LSB init scripts. It provides
aggressive parallelism capabilities, uses socket and D-Bus activation for
starting services, offers on-demand starting of daemons, and keeps track of
processes using Linux cgroups. In addition, it supports snapshotting and
restoring of the system state, maintains mount and automount points, and
implements an elaborate transactional dependency-based service control
logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* Rate-limiting mount events can make starting/stopping mount units
unreliable (BZ#2037395)
* Node upgrade failed due to "expected target osImageURL" MCD error
(BZ#2038878)
* Unable to ensure pod container exists: failed to create container for
[kubepods burstable ...] : Argument list too long (BZ#2039327)
* Update list of Rocky Linux specific network naming schemes (BZ#2040244)
none-baseos-rpms
systemd-239-51.el8_5.5.i686.rpm
9657b1d1316f236162999cf1b7cc288883cbca0194d81b63cc7f937f7eec3973
systemd-239-51.el8_5.5.x86_64.rpm
cf4a1cea73cfe16b5d55a1655e36d63615480ce71d5725c1b69d8464945e2a51
systemd-container-239-51.el8_5.5.i686.rpm
67752f685149e6958276b5b621afb1016b5045767789e69f778c556be3fb5709
systemd-container-239-51.el8_5.5.x86_64.rpm
abf5c8c28b4b840342ba37a82c77230257fe4f5772cb4dee4d05a669ef61ef1b
systemd-devel-239-51.el8_5.5.i686.rpm
a87b4b9bcb38ff5cb1203fc376c2f10c890d0b5275302df365edc9c3c5f1f042
systemd-devel-239-51.el8_5.5.x86_64.rpm
2b0bb8ecaab71034634f500f886e507dc3a6fd50cdccf1288c20053b2f00f9a2
systemd-journal-remote-239-51.el8_5.5.x86_64.rpm
f1dfb5c3be92537953d612b12f54588da887e38f5a2205a301ebdbe157171899
systemd-libs-239-51.el8_5.5.i686.rpm
ee775430d2181a084a41ef117cb12ea5844515d39a06c25b54817e2c9f7a977e
systemd-libs-239-51.el8_5.5.x86_64.rpm
8ed1a9b7cc86c2106951a8a653c8caa50d392df4c2da2b68ffd549e55ed8ea79
systemd-pam-239-51.el8_5.5.x86_64.rpm
f4e6747ca97ecac53a559010d9711485101eba39d2208e0883525e51d307ead1
systemd-tests-239-51.el8_5.5.x86_64.rpm
8ea389530096c2d84370f6fe5ce5f91ab62833d29e6c6e2e872919b23e46aafd
systemd-udev-239-51.el8_5.5.x86_64.rpm
eb40437ae3c4f0a9938d3686f976d876fc51f253c67517b9a6bd94bc552ac419
RLSA-2022:0894
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Heap-based buffer overflow in block_insert() in src/ops.c (CVE-2022-0261)
* vim: Heap-based buffer overflow in utf_head_off() in mbyte.c (CVE-2022-0318)
* vim: Heap-based buffer overflow in init_ccline() in ex_getln.c (CVE-2022-0359)
* vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow (CVE-2022-0361)
* vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c (CVE-2022-0392)
* vim: Use after free in src/ex_cmds.c (CVE-2022-0413)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
vim-minimal-8.0.1763-16.el8_5.12.x86_64.rpm
67c562571f9a138051eb94e4d2ecaeddc9064f00fb6120a3ca14f590948b0060
RLBA-2022:0895
linux-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are
required by various devices to operate.
Bug Fix(es) and Enhancement(s):
* Certain amdgpu firmware files cause random hangs with AMD Picasso / Raven
Ridge APUs (BZ#2018309)
none-baseos-rpms
iwl1000-firmware-39.31.5.1-104.el8_5.1.noarch.rpm
5971236d7b88db6a031a5f080294ee5c573021203a416f588822bc9c388d2077
iwl1000-firmware-39.31.5.1-104.el8_5.1.noarch.rpm
5971236d7b88db6a031a5f080294ee5c573021203a416f588822bc9c388d2077
iwl100-firmware-39.31.5.1-104.el8_5.1.noarch.rpm
8f5dcdcd6d592b6318a2a7aff63d05ed94bc091af8824d135399d4575f36239b
iwl100-firmware-39.31.5.1-104.el8_5.1.noarch.rpm
8f5dcdcd6d592b6318a2a7aff63d05ed94bc091af8824d135399d4575f36239b
iwl105-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
5a35fffac404551f88b18ee23cff424867f5304f6b0ca30c425cc2827c85f7f4
iwl105-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
5a35fffac404551f88b18ee23cff424867f5304f6b0ca30c425cc2827c85f7f4
iwl135-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
7a34a0dae327ae13e83f0f65429a4cd3af24deb1f83e5c864e8173971b9b70e4
iwl135-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
7a34a0dae327ae13e83f0f65429a4cd3af24deb1f83e5c864e8173971b9b70e4
iwl2000-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
fe95918877a19a4bc80176eb6740d200a13f8392ab6bd8d626409b321b1fd622
iwl2000-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
fe95918877a19a4bc80176eb6740d200a13f8392ab6bd8d626409b321b1fd622
iwl2030-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
4b68d09bda08ad714aab6c4b9604681039de5bed53810cbf8d27455fdc7fec1c
iwl2030-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
4b68d09bda08ad714aab6c4b9604681039de5bed53810cbf8d27455fdc7fec1c
iwl3160-firmware-25.30.13.0-104.el8_5.1.noarch.rpm
d7697e982a20504182b55a19d6fe7a9faec694a235f6f5eef2c7a19b1c58d57c
iwl3160-firmware-25.30.13.0-104.el8_5.1.noarch.rpm
d7697e982a20504182b55a19d6fe7a9faec694a235f6f5eef2c7a19b1c58d57c
iwl3945-firmware-15.32.2.9-104.el8_5.1.noarch.rpm
81597e12252f521a5140a8026d82c5dd1bdcb00a265c5db8abde913834b8de80
iwl3945-firmware-15.32.2.9-104.el8_5.1.noarch.rpm
81597e12252f521a5140a8026d82c5dd1bdcb00a265c5db8abde913834b8de80
iwl4965-firmware-228.61.2.24-104.el8_5.1.noarch.rpm
bbdb7120b1d626d9e15dcdcbe939435c5b1898ca6a3e7f3d00eec352ce0bd852
iwl4965-firmware-228.61.2.24-104.el8_5.1.noarch.rpm
bbdb7120b1d626d9e15dcdcbe939435c5b1898ca6a3e7f3d00eec352ce0bd852
iwl5000-firmware-8.83.5.1_1-104.el8_5.1.noarch.rpm
df8da30c67d4aa84a87e3f52804d1c97f7acb3a0a0e2b7a2a3cae531f4e5b7a5
iwl5000-firmware-8.83.5.1_1-104.el8_5.1.noarch.rpm
df8da30c67d4aa84a87e3f52804d1c97f7acb3a0a0e2b7a2a3cae531f4e5b7a5
iwl5150-firmware-8.24.2.2-104.el8_5.1.noarch.rpm
890f0ab7d90170b68f6556358cb4c525657b9de606ef78dee5454df7576c2ce4
iwl5150-firmware-8.24.2.2-104.el8_5.1.noarch.rpm
890f0ab7d90170b68f6556358cb4c525657b9de606ef78dee5454df7576c2ce4
iwl6000-firmware-9.221.4.1-104.el8_5.1.noarch.rpm
b4367bad8758aa9667fa6ccf953da4fd17af5c7d185d417a89cece3e66be736b
iwl6000-firmware-9.221.4.1-104.el8_5.1.noarch.rpm
b4367bad8758aa9667fa6ccf953da4fd17af5c7d185d417a89cece3e66be736b
iwl6000g2a-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
1026573db9da2fce76d1518c51827cc95be2f6905fc5190259d46a6f68869b7a
iwl6000g2a-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
1026573db9da2fce76d1518c51827cc95be2f6905fc5190259d46a6f68869b7a
iwl6000g2b-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
ec6d6a4ccbea8019443b461e229c14d1a37679bf65618db323309ccd7339ebff
iwl6000g2b-firmware-18.168.6.1-104.el8_5.1.noarch.rpm
ec6d6a4ccbea8019443b461e229c14d1a37679bf65618db323309ccd7339ebff
iwl6050-firmware-41.28.5.1-104.el8_5.1.noarch.rpm
8ce1eede015ccecd5450b3f0f37e6ac06ea350bbef1fa8294cf70116095f9f61
iwl6050-firmware-41.28.5.1-104.el8_5.1.noarch.rpm
8ce1eede015ccecd5450b3f0f37e6ac06ea350bbef1fa8294cf70116095f9f61
iwl7260-firmware-25.30.13.0-104.el8_5.1.noarch.rpm
2bfe1c9155d1e3bc28f95a28c79bd17f35dbfd3740761e77d93dea735d5e7f0e
iwl7260-firmware-25.30.13.0-104.el8_5.1.noarch.rpm
2bfe1c9155d1e3bc28f95a28c79bd17f35dbfd3740761e77d93dea735d5e7f0e
libertas-sd8686-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
57bb0b0c258d6601b67e2544c651aa8ccc57adbe0a7b77325c7309a427254e5b
libertas-sd8686-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
57bb0b0c258d6601b67e2544c651aa8ccc57adbe0a7b77325c7309a427254e5b
libertas-sd8787-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
31543ca05c6bab86d4944e4bae1862be6df81e359115bbd205a6d9259b26d6ed
libertas-sd8787-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
31543ca05c6bab86d4944e4bae1862be6df81e359115bbd205a6d9259b26d6ed
libertas-usb8388-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
ba816ad95cf30d826e53cdd88ad16385a6b4d299687b82d85e47d92b87202a0b
libertas-usb8388-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
ba816ad95cf30d826e53cdd88ad16385a6b4d299687b82d85e47d92b87202a0b
libertas-usb8388-olpc-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
dc258bf711a04d0a31b4a46378fa01d80f63c5ff3ed5bf06db90a520331fc85f
libertas-usb8388-olpc-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
dc258bf711a04d0a31b4a46378fa01d80f63c5ff3ed5bf06db90a520331fc85f
linux-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
16f6eabd02c348cabafa5e8ecb458eb50c7d0584fa4fe76bf1b1df5f11a84d67
linux-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm
16f6eabd02c348cabafa5e8ecb458eb50c7d0584fa4fe76bf1b1df5f11a84d67
RLSA-2022:0896
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Off-by-one buffer overflow/underflow in getcwd() (CVE-2021-3999)
* glibc: Stack-based buffer overflow in svcunix_create via long pathnames (CVE-2022-23218)
* glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname (CVE-2022-23219)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-2.28-164.el8_5.3.i686.rpm
87b00ef387b3beee17f05b9778e5522b2da271b1930a0d84e2d8490efd027402
glibc-2.28-164.el8_5.3.x86_64.rpm
af6edb7ae53bc2648b26507a420fc80c4332c4fd3b137419f56906c685b71ee0
glibc-all-langpacks-2.28-164.el8_5.3.x86_64.rpm
691162aa15b354ec47a60084eebc8e1576b75ffe361affe773f091c051a9140b
glibc-common-2.28-164.el8_5.3.x86_64.rpm
f61f2126f4ae9fe7d9ace7cd1d6da2b58ca741cbece0191856d4a60e861e94c6
glibc-devel-2.28-164.el8_5.3.i686.rpm
c7cd6bdeb3e83f70dbcc65c184c1cf53a6907629e5221653c0bcf497cf34df0c
glibc-devel-2.28-164.el8_5.3.x86_64.rpm
c2ee6e8d8b0ee8451330b8895441af6f58540e517a378c66d546fbe507b1c40e
glibc-headers-2.28-164.el8_5.3.i686.rpm
03ca4df9028383538b1703523bfb8ebaf4dab48f223713e1dcb39551120ff9a3
glibc-headers-2.28-164.el8_5.3.x86_64.rpm
5086e6f29df8e64c313da0052b9133cda266a69636eea9c99d586b68c25121d2
glibc-langpack-aa-2.28-164.el8_5.3.x86_64.rpm
4e26f0cec1ec5d9028d4ea68268e9655e3f5839d7b1603a5d78bb92696dcefb4
glibc-langpack-af-2.28-164.el8_5.3.x86_64.rpm
86d7772ac29092ae5b73c31bcee1a2f7f2bb9a74a8e2f09682c0c5d02f83778c
glibc-langpack-agr-2.28-164.el8_5.3.x86_64.rpm
8ad31ad5acd871c75d033be0df893edc4c51ba4c97220192c151a823bf32ab58
glibc-langpack-ak-2.28-164.el8_5.3.x86_64.rpm
2d4dc937070b1817b8befb40473e35e6ae1aa81f6c89210d2556ccba284fef27
glibc-langpack-am-2.28-164.el8_5.3.x86_64.rpm
52b5b7e81726e9097aea81de80b8fc4a8ef34f8490033343c4b9bf4de5c2a4bc
glibc-langpack-an-2.28-164.el8_5.3.x86_64.rpm
c57c2ba9b8467d8dd885159feda15a5c5c21cdaed24c88f0e40973fa0247145a
glibc-langpack-anp-2.28-164.el8_5.3.x86_64.rpm
c025265a1745a0c4ab8fb23917f142d54cd7baf4238d4485e695e514b6133e9f
glibc-langpack-ar-2.28-164.el8_5.3.x86_64.rpm
03e852c8a744a799d57e678adfc0e98e4e46cac3ce14ebea4a3acb4b00108ba1
glibc-langpack-as-2.28-164.el8_5.3.x86_64.rpm
317c2c14dbbd8997d4a85698bf1b1e6c7210e05555fb0f2811935f648b07e60e
glibc-langpack-ast-2.28-164.el8_5.3.x86_64.rpm
d3c98ce17fa3b12983e869c664d3d69d9561c42c79bea340d3d54a7b92e9c7aa
glibc-langpack-ayc-2.28-164.el8_5.3.x86_64.rpm
2dc6c70ea2f16f77d4d028e83c298cc0dc773f43b7b34b544fd6af16bc96c760
glibc-langpack-az-2.28-164.el8_5.3.x86_64.rpm
d68ec800d9cfde1bc3832ff45365fbc1ba64e9761073c97bd52327901e6057f4
glibc-langpack-be-2.28-164.el8_5.3.x86_64.rpm
e6afb0a30aaeb68d9cfc63a3333bb58ff2050c6ac1e5ce50d5b6753d838a5706
glibc-langpack-bem-2.28-164.el8_5.3.x86_64.rpm
7ae33f0e329440913f14a3ecc89ab31a739ae3fba1d1322d32745f713299b183
glibc-langpack-ber-2.28-164.el8_5.3.x86_64.rpm
26d204128f0c4dd14eed2fe1aeaafe7c3df9f80d6649625b49f756d958a61273
glibc-langpack-bg-2.28-164.el8_5.3.x86_64.rpm
f35e7c3aa1713a0bce248d74aebc692a12d06cd9a53884b21e7a1f23ce2d0dab
glibc-langpack-bhb-2.28-164.el8_5.3.x86_64.rpm
a6d6555046d90781e2ac7e97fa037d9c58d26f02e8a7005e70001f92d6461a09
glibc-langpack-bho-2.28-164.el8_5.3.x86_64.rpm
a78f2b223923822e5b94d30742169df476f630896f7114cbb28e336beea1d5c9
glibc-langpack-bi-2.28-164.el8_5.3.x86_64.rpm
e7c89888b5f8dfb9119ab2bf1f9f3c4fddade975a97d735cfac665e4eb95cee9
glibc-langpack-bn-2.28-164.el8_5.3.x86_64.rpm
8bcda592b2479d474e4ff666e25d5950c51a399ccc84615fabfe08b81b604b3e
glibc-langpack-bo-2.28-164.el8_5.3.x86_64.rpm
3f3bcf72e60f2effa290ffb1d1f258c92a95b887c2a2a2c36935c723dcc1ee02
glibc-langpack-br-2.28-164.el8_5.3.x86_64.rpm
3674d767d2192c303d0ae6417d00cbfb5746657df7bf3a188993d31a528945dd
glibc-langpack-brx-2.28-164.el8_5.3.x86_64.rpm
9410eb0a5fc71c56a4f373461550a95010f82db8660adc95263293337ac2d310
glibc-langpack-bs-2.28-164.el8_5.3.x86_64.rpm
10d76ed762a7d18fa7d30210d1b1eabf67056cbd6dc2664628b7bf702bc5ee3b
glibc-langpack-byn-2.28-164.el8_5.3.x86_64.rpm
aaebb5e385246e360cb98e9da25a00c6148f27fab0e28474f5c88fd839b4d31d
glibc-langpack-ca-2.28-164.el8_5.3.x86_64.rpm
03359a6467077762f87daa45521e78ffd348d9dc466f60984a06bf471ac3fcda
glibc-langpack-ce-2.28-164.el8_5.3.x86_64.rpm
0c67a4fc4602d724693fa367e99e9ba41a18811418ea4b483892a97ac1819c67
glibc-langpack-chr-2.28-164.el8_5.3.x86_64.rpm
5f64ceb1c7e522b05eb7a9334d0a8bd46c5e372faac187faa30b4c45f825c6cc
glibc-langpack-cmn-2.28-164.el8_5.3.x86_64.rpm
f367477212c9beda282088030f2c0388f638e91bd3b972edc2cbd1e5e3d15d2f
glibc-langpack-crh-2.28-164.el8_5.3.x86_64.rpm
39142445cff4620b322043be823f5ef4f01bd99d557234c9860aceb58cab887f
glibc-langpack-cs-2.28-164.el8_5.3.x86_64.rpm
6dd919883c18955327f77944fea5eb6a25fd4511ebfdbe374b0ccfd376d727a2
glibc-langpack-csb-2.28-164.el8_5.3.x86_64.rpm
400c2679a63909b43da38d8689a61ffcb414ce60bcced739c86ce0e66ff8de9b
glibc-langpack-cv-2.28-164.el8_5.3.x86_64.rpm
62ef12300072e5226bf6744582129b1dd6df8bea90686b4d539b9cffb55a0e46
glibc-langpack-cy-2.28-164.el8_5.3.x86_64.rpm
3d03e3f5a97adb142330959c75bb692b8134eed3f89a03e6dc1b7fef4ca67c64
glibc-langpack-da-2.28-164.el8_5.3.x86_64.rpm
2f56267082390622c953fea0959097c4595c1767a1a24003672570c1f8670735
glibc-langpack-de-2.28-164.el8_5.3.x86_64.rpm
f9cc823edf2a46b97997f57d96034d8dd47fcae174fdecfb1bd16f01ee33efc2
glibc-langpack-doi-2.28-164.el8_5.3.x86_64.rpm
8b24b50422e4aece9a0a16b48d5b555cc5004b8bfdbc5ebc00c8f3d4139254f4
glibc-langpack-dsb-2.28-164.el8_5.3.x86_64.rpm
731c7250816851ed0ed596f222a9d85933dfc3674f4e6a6d1e6808172089a41f
glibc-langpack-dv-2.28-164.el8_5.3.x86_64.rpm
5897a00ca26cefd4129e098b09292e232bc6a3a1be6e7da0a0204d04ad709723
glibc-langpack-dz-2.28-164.el8_5.3.x86_64.rpm
0da8cc12078fd588b6f74d95cd501ba3fb2a4d1831d9624306c4ae7328b31756
glibc-langpack-el-2.28-164.el8_5.3.x86_64.rpm
5707cd61a06144bbb4323edbeaff5d6db513e7bb6c10455a1d020604fc7d5645
glibc-langpack-en-2.28-164.el8_5.3.x86_64.rpm
081f678da895d17622bba06d843b9a3095664bbcb2be38d2713495d1be4df7f6
glibc-langpack-eo-2.28-164.el8_5.3.x86_64.rpm
a8df9457997c0b9bd76c35f5252a24e581eff5cb75723cfc089c0764eef7303e
glibc-langpack-es-2.28-164.el8_5.3.x86_64.rpm
8ff3b91bed3288242505c912b20cb20720e1dfb95f6f8de588261ea94722acfd
glibc-langpack-et-2.28-164.el8_5.3.x86_64.rpm
551d4c2bbd97103795e29366d7e23870f041be5cd2578e501313a586cd4ff549
glibc-langpack-eu-2.28-164.el8_5.3.x86_64.rpm
10e7ba76abbe2402409d27a5c9ce93f50e131b8ba77312e00b8a7dfc1fe37279
glibc-langpack-fa-2.28-164.el8_5.3.x86_64.rpm
c6b3f257b16f9cad2e04925af5664c8c9f76ad307105b8b47bf81d5d7a815f39
glibc-langpack-ff-2.28-164.el8_5.3.x86_64.rpm
dfa07057f380558da1c72171eee287f5c262685629a9657db16258a455b0d186
glibc-langpack-fi-2.28-164.el8_5.3.x86_64.rpm
d4dc0f5976651d3e7b7317824414a16e7a2bab386ac8e1782edd7d6adf1226c2
glibc-langpack-fil-2.28-164.el8_5.3.x86_64.rpm
a90aecfef9698cff9f22c02ca382578425bf9a9c6d9fedeae42d609a129f4738
glibc-langpack-fo-2.28-164.el8_5.3.x86_64.rpm
5e467561aa20c9fce35b77a97a9dfe7425e9edca39e209b4d2f78b979e70cab9
glibc-langpack-fr-2.28-164.el8_5.3.x86_64.rpm
16b1e0acc9b72419b9c68f368aae0902e9c0a113e98439d1ad53f52f365e1482
glibc-langpack-fur-2.28-164.el8_5.3.x86_64.rpm
485943889c508224701cca025a8cf473d32be015a1dd33d44ea7b1e77114d2a5
glibc-langpack-fy-2.28-164.el8_5.3.x86_64.rpm
d634936fce5b984582977c48bed37a83334b737556345c61c332b4d7d93b6d9d
glibc-langpack-ga-2.28-164.el8_5.3.x86_64.rpm
218c0bf4b79afbe5ef2e9647ff1f5b18d81a183600d4d138821865461ac001fd
glibc-langpack-gd-2.28-164.el8_5.3.x86_64.rpm
ceab2f782945ff261b4739d85a4484e4c6a7aa8fd7fac882eb1096f8b34e0eb6
glibc-langpack-gez-2.28-164.el8_5.3.x86_64.rpm
899dfa73905932e9aac3e19fc7ccb3987e5d328f62ef8f557a5d8603e4d96d03
glibc-langpack-gl-2.28-164.el8_5.3.x86_64.rpm
df8b6e0f8daf0b45d65a82502ab65e54198010ded5298923bb87c40c3904a072
glibc-langpack-gu-2.28-164.el8_5.3.x86_64.rpm
603a8993901e5c9a7f0e5c3bd566915192d8a16f8e5494186eec808e2ad057c6
glibc-langpack-gv-2.28-164.el8_5.3.x86_64.rpm
e53e5ff4e6e32dfe82cea73e97d33a8b94b6dd55b3049ed8aa3d2a0e3ce7fe7f
glibc-langpack-ha-2.28-164.el8_5.3.x86_64.rpm
5a795c4b29df0c4d464d4679804ce66ab2624eab190691d74de54ca17b2d9156
glibc-langpack-hak-2.28-164.el8_5.3.x86_64.rpm
fb09ddd0ad497b64f55380e14be757dcbb2e2d36d65effefec935ec54af104b7
glibc-langpack-he-2.28-164.el8_5.3.x86_64.rpm
9576011ac6ccfce4d25c6293f717d11686a50b7b0da7a309f18093c20950280e
glibc-langpack-hi-2.28-164.el8_5.3.x86_64.rpm
69a7264889b305d839f50165460da7381a44971b3ead4ceeb298a793aed04915
glibc-langpack-hif-2.28-164.el8_5.3.x86_64.rpm
515e0f2713f967faff31ee212577e64c2b4335e0a6f82a700d954d4e4007036e
glibc-langpack-hne-2.28-164.el8_5.3.x86_64.rpm
796f21552a3b933758e452bfa745cc699346c757948469a4ce18c71da6aed1bb
glibc-langpack-hr-2.28-164.el8_5.3.x86_64.rpm
c7e2d1827511473172286520ca394c153dcc0040452f592d41d931ac6e76fce6
glibc-langpack-hsb-2.28-164.el8_5.3.x86_64.rpm
d62d4450461a694d53efba73c47e54b5cabdcb71d13898b62a2ff0b4589dc43c
glibc-langpack-ht-2.28-164.el8_5.3.x86_64.rpm
a07e3fe5797da90f4ddbc1d6b02a599e5e4874a79f373c18930a380a3d29ed22
glibc-langpack-hu-2.28-164.el8_5.3.x86_64.rpm
50ad280d9cbac291ab05727577c7bf2293520aa8453c67b628155a3ac20c20fa
glibc-langpack-hy-2.28-164.el8_5.3.x86_64.rpm
722a2fd8f6b191b9a73ed1fbc66b53567d11cd4e1dd385ae504fb15f72209686
glibc-langpack-ia-2.28-164.el8_5.3.x86_64.rpm
bb5a44ffcf570d6e16fad7a709d03d78eec9548fd8e9ef98ce8f3313af4998e8
glibc-langpack-id-2.28-164.el8_5.3.x86_64.rpm
b7b82d98cf429982f7f86d005775a0efeb60d42c9a5a7cf7efd9bccdee0f892b
glibc-langpack-ig-2.28-164.el8_5.3.x86_64.rpm
b7647b73c9966a32f06707ff7b63c5b067f85d966f5c1a75d97986d0f5032a72
glibc-langpack-ik-2.28-164.el8_5.3.x86_64.rpm
42cc4686e861d27c9b521f70bc9596a83164096da24e8f26d21ea238dc1a763d
glibc-langpack-is-2.28-164.el8_5.3.x86_64.rpm
80c9913d283bb4864a9c6f40925242248a56d574b07eeaedfb73bccbddb560a3
glibc-langpack-it-2.28-164.el8_5.3.x86_64.rpm
1f56c8e8b2be6806ee5d4be15ef45820f9781a24375a2edbad9059a9085b76cd
glibc-langpack-iu-2.28-164.el8_5.3.x86_64.rpm
2e92c1b68e08ba60a7b6ad446d107dd2ffaf6b422c05a3daeda064badd19ae6a
glibc-langpack-ja-2.28-164.el8_5.3.x86_64.rpm
f6a4a4ef4db58c096576d8e3f25e95b90b2047a7bcc57e2c802fad7f839e0f22
glibc-langpack-ka-2.28-164.el8_5.3.x86_64.rpm
995c047efad169297aa3ff0af80d946baaf0df9c58ad0b5eee9b95a70d37fbda
glibc-langpack-kab-2.28-164.el8_5.3.x86_64.rpm
241f8e6f897f4d4f0debcdfc370bdf7e6b69c516749ec3b18512f2c638b763b7
glibc-langpack-kk-2.28-164.el8_5.3.x86_64.rpm
788fd3191c4410d002ca9a68b91089907e4678c0a1a1d5d9f3055ff39cef6eae
glibc-langpack-kl-2.28-164.el8_5.3.x86_64.rpm
03564e478a21a94f82fbcba48c242772f193f516ee4ab2acb6052f55b77312a5
glibc-langpack-km-2.28-164.el8_5.3.x86_64.rpm
351edab8f86c2b9eb7f4002d21bbfe9ce021a11197eb6ab4235d23f3b3491a8c
glibc-langpack-kn-2.28-164.el8_5.3.x86_64.rpm
21b6830c7529c2fb8c0fd1ead08138e562fec0b630496029c210a09208196c58
glibc-langpack-ko-2.28-164.el8_5.3.x86_64.rpm
807a2f0a7ffccfb3dcad3baceae55bb8bc5df1d86843b004abb14f18c6e840e8
glibc-langpack-kok-2.28-164.el8_5.3.x86_64.rpm
3968715310bfb6a2c6abee6c8e099cfb3b8b4d9f88bca230467789fac0a684f8
glibc-langpack-ks-2.28-164.el8_5.3.x86_64.rpm
b14aeaf0ad72dadac6d4fa9f6bf6ca474a9d0c704adcbb2de4cc782037e74a63
glibc-langpack-ku-2.28-164.el8_5.3.x86_64.rpm
b6009492d7bacbe00e16f98cb639ec9dcffdef013b9ee127c37778774b1c6866
glibc-langpack-kw-2.28-164.el8_5.3.x86_64.rpm
ece6db84bc8f67f1260d602f2b89da52235b18293d9e8deecb2c80611636d90b
glibc-langpack-ky-2.28-164.el8_5.3.x86_64.rpm
faf069ec4928083648c65f0c5ea46e1308537888a616cb859a1ee662ca616bd0
glibc-langpack-lb-2.28-164.el8_5.3.x86_64.rpm
81aced853a04c3036dc091cfa1e186ed8dac6dd764df28c5c7a1215d78cfcc47
glibc-langpack-lg-2.28-164.el8_5.3.x86_64.rpm
d32f5642b44a4cfdcc6ce897f5eae84b3b3dddef9fae20150c04cc5b80b3f414
glibc-langpack-li-2.28-164.el8_5.3.x86_64.rpm
d1d594ec45a772b5946cdd3ae14687b374bc73cce80435021637146c54c7e9ca
glibc-langpack-lij-2.28-164.el8_5.3.x86_64.rpm
9ea6a2699f2bd61354c41ac993af9ab9082722abb08a12ead24537399bee2beb
glibc-langpack-ln-2.28-164.el8_5.3.x86_64.rpm
9f55154a7bfef5278e6d3f3831e5a9e145c0307da3b198bb09369ec6401ad9b1
glibc-langpack-lo-2.28-164.el8_5.3.x86_64.rpm
824fa0f0a0c56713006aaa8f52a77fa6cf161d324ec6ae2453a7af57d47bd2f3
glibc-langpack-lt-2.28-164.el8_5.3.x86_64.rpm
ca0b9df64c11146b7b45faa96df5614870a5504b2163a1d7e6728ce97082ef7b
glibc-langpack-lv-2.28-164.el8_5.3.x86_64.rpm
91296cd5bce61c4d7d3861877fcd2b7e9a1f5712ba14a0db467e8ab815c43932
glibc-langpack-lzh-2.28-164.el8_5.3.x86_64.rpm
52bb16c5f219916d01ce2392647d2b5e52c7d8d9f4e5ec4400dbbf21dc44b084
glibc-langpack-mag-2.28-164.el8_5.3.x86_64.rpm
54eb149d0914126003092989c638537f088a0acb30a1ba52a3f46137d42b74a2
glibc-langpack-mai-2.28-164.el8_5.3.x86_64.rpm
f5ee2166f5a34765b79b3c496b52cce67ef3011d9de390022b9179c4d0f65467
glibc-langpack-mfe-2.28-164.el8_5.3.x86_64.rpm
4a5d4e335f5559982960e9ea7bc0d7ccaa1054edc8736757a231b4ed316e5702
glibc-langpack-mg-2.28-164.el8_5.3.x86_64.rpm
b6f9b2d765a838b7536c7cef4c1e751ad506615a41561617fe22d5edabd41570
glibc-langpack-mhr-2.28-164.el8_5.3.x86_64.rpm
18b61334150cd7779f91e922ca920e0429b0e0fee839ab6297926f84b9e73175
glibc-langpack-mi-2.28-164.el8_5.3.x86_64.rpm
98d45a56220a6893aacd2ef289870212e73e6e2a3cd493f89dee91f80f87e1d3
glibc-langpack-miq-2.28-164.el8_5.3.x86_64.rpm
85c71354ab12b940d94df06bee79bd5ea5984cce57b9ad0d7373e0f846b672ba
glibc-langpack-mjw-2.28-164.el8_5.3.x86_64.rpm
e9c26082287c05339271948631d4c1cd8b679305ffceb71cac48875aa2892da8
glibc-langpack-mk-2.28-164.el8_5.3.x86_64.rpm
6760081c8e695edd69be0666fc777aa645f967f4059592c0cea2de69224b965f
glibc-langpack-ml-2.28-164.el8_5.3.x86_64.rpm
dd75755f694bcad273b26f99dcd55055a7bbd7fb414aea57ebdd139d46702317
glibc-langpack-mn-2.28-164.el8_5.3.x86_64.rpm
6b80061bcaff7c8d43dc50c6310b593284ab714a881b43084cd224e07c67ccd4
glibc-langpack-mni-2.28-164.el8_5.3.x86_64.rpm
8138b15ac9f3cfe3ef16d81a0b716c79e799d16493bbc333cf1432bae5855d21
glibc-langpack-mr-2.28-164.el8_5.3.x86_64.rpm
de348f4313a62fb74c547f0daec26431b518064b660cb7e3453a55f069de399c
glibc-langpack-ms-2.28-164.el8_5.3.x86_64.rpm
a7c69f5d84013d39d24bbcdcb7085ed8b80141d0f0f5f1aecb57c4b0ea79abe6
glibc-langpack-mt-2.28-164.el8_5.3.x86_64.rpm
b90f9eee5cefcaf5ad502b3a18e85a24ddd809bf2b3135f7bdf22aebdeb29237
glibc-langpack-my-2.28-164.el8_5.3.x86_64.rpm
4bbacefeb57245974442c7877229d74b1e058ed6fff60c30fc7e503ce09eb948
glibc-langpack-nan-2.28-164.el8_5.3.x86_64.rpm
47196a41c938a836c707c78ea6aca5382b445da5f2bd645bd2502019fc4f7071
glibc-langpack-nb-2.28-164.el8_5.3.x86_64.rpm
6e84a3648d51dfce187fb8aac9dfb86627d4ef17bd19c14dd8a89432fe4a8560
glibc-langpack-nds-2.28-164.el8_5.3.x86_64.rpm
2084c82c79c17f801e9bb4e1ab40ec44db311ada72cc50634c366ea5d00247ce
glibc-langpack-ne-2.28-164.el8_5.3.x86_64.rpm
3ed50eacd9e676e02ca4904df0f9891f17a2acf5ff3f4b3785b25eb3a7ec4a3f
glibc-langpack-nhn-2.28-164.el8_5.3.x86_64.rpm
37eb9934dba4a3148a9d3e24a19c8933f3d61a59b133b50aeb647af6bae384f2
glibc-langpack-niu-2.28-164.el8_5.3.x86_64.rpm
c025e557f442cf3925f0c62e80c6234aa0ff564206733c8ee550e83b40aabf6f
glibc-langpack-nl-2.28-164.el8_5.3.x86_64.rpm
1ed9796436ec499d9756b83344ba2a0c1420d7d1040684e5205d27c69c75ba07
glibc-langpack-nn-2.28-164.el8_5.3.x86_64.rpm
63cc06d672e6ef331141c4a5c69214f7dab678de024057653ac43d8cdca796e2
glibc-langpack-nr-2.28-164.el8_5.3.x86_64.rpm
ac716c6eed07ad1d19c587596e6a4be4943b9fa5213af7c7a14b2881237bc227
glibc-langpack-nso-2.28-164.el8_5.3.x86_64.rpm
a6cd29ac2b3719800a7c20d6af50a38524a6589d83a581d038000a394cad904e
glibc-langpack-oc-2.28-164.el8_5.3.x86_64.rpm
703e0141dbf3d613283acf856fa2689ae9044eadbd740a4bb77f470c955d11c5
glibc-langpack-om-2.28-164.el8_5.3.x86_64.rpm
fbb501fd1e511297f7aefb03129004fa199ec083648288a0662455032a1c82c9
glibc-langpack-or-2.28-164.el8_5.3.x86_64.rpm
1037afd7c153ed2fe5be0bfb418686f960de4cba07f31b234dbb25cf794b9c0b
glibc-langpack-os-2.28-164.el8_5.3.x86_64.rpm
92f011435cc67b1928062b850c99e346ea370c76a4c435aaf2e3c5b8fb052d35
glibc-langpack-pa-2.28-164.el8_5.3.x86_64.rpm
1ad90a3121ffe6fabdc4a0fa5cffa31dc38b14e6d6c3db776151ebca64a1b394
glibc-langpack-pap-2.28-164.el8_5.3.x86_64.rpm
84ed6acc94f3b4f2a19996c76f86b9326990af219c78cf869bdba5ab83b438a4
glibc-langpack-pl-2.28-164.el8_5.3.x86_64.rpm
1faf60337726c536af2d213b0dcde546851eef2b5023219f908204266ac5c7cb
glibc-langpack-ps-2.28-164.el8_5.3.x86_64.rpm
d79d496b3c0886e3123df39375a70af0f7192431cf37c9c3f86c9eadde419473
glibc-langpack-pt-2.28-164.el8_5.3.x86_64.rpm
8cc37f93a601df6382d6c1c0812ff12005fb291f2a5b285f175ff590f9a491ba
glibc-langpack-quz-2.28-164.el8_5.3.x86_64.rpm
ea2f0a2aa72325d1c020eadaceba77192645cf8e6ccfabd36a3218a4de70afa8
glibc-langpack-raj-2.28-164.el8_5.3.x86_64.rpm
966e03592074f64e0f6bf872e35777c3bf58d3ff11cc6462bc005e91b350770e
glibc-langpack-ro-2.28-164.el8_5.3.x86_64.rpm
cdf4ab3a16e6f09dc7d7732ccd3235d60f770b2cbf41347c7a2a8dade59cae6a
glibc-langpack-ru-2.28-164.el8_5.3.x86_64.rpm
a2503e282df48481251c411b8328f66da703317dad2efbf913475f9491bfb3a8
glibc-langpack-rw-2.28-164.el8_5.3.x86_64.rpm
429f04c4b0e2ccd795f88982d992e1efe78022c8a44eba4aa63117a201773eb4
glibc-langpack-sa-2.28-164.el8_5.3.x86_64.rpm
5f75cd2362f3ccbda34829c81e21294c3b27dfc21ee297152181ca52372cbcca
glibc-langpack-sah-2.28-164.el8_5.3.x86_64.rpm
bfa89bf738cd1e20dc22b98789afff7af83fc6cad7a9cb58b6228ccda4113a8d
glibc-langpack-sat-2.28-164.el8_5.3.x86_64.rpm
979667ce74bf291eab438b9491739bd4117e57b01eaca18afb269871e8089b3f
glibc-langpack-sc-2.28-164.el8_5.3.x86_64.rpm
a04af1f39b1e2601f2021c5cbbcbd6d495e5e079499ee0dc5ca086d52063a699
glibc-langpack-sd-2.28-164.el8_5.3.x86_64.rpm
ec9514a0d39971e83b7640ae5b2dfe4d24de97f36bb133463e1c52897b44f581
glibc-langpack-se-2.28-164.el8_5.3.x86_64.rpm
547cbdf322811635077626ca61d70065b095257c2069e61a0860dfce82bb1b8a
glibc-langpack-sgs-2.28-164.el8_5.3.x86_64.rpm
fb16c66ab5fc7a049d5cd518894c3812cf5dd9dc532c2ac83e83d8bf7345414a
glibc-langpack-shn-2.28-164.el8_5.3.x86_64.rpm
1a6486189e8b04f6053d29d4947fcc30ea2e03690bf2c742710fa908668f2dbe
glibc-langpack-shs-2.28-164.el8_5.3.x86_64.rpm
abc4cc0ac520144d831d6123e6c6f69b14f161263cd3e1cbbac483ac92b3c37f
glibc-langpack-si-2.28-164.el8_5.3.x86_64.rpm
c72267be3cb3e2630cd4b50c3aadbc60343e9aa8ccf01d4f1fe66894413853a8
glibc-langpack-sid-2.28-164.el8_5.3.x86_64.rpm
61c0b2e5634df88ddff5d254dc8139f906ea2fb93e1513209bc26e31d8d0c7a6
glibc-langpack-sk-2.28-164.el8_5.3.x86_64.rpm
61a1a77895da7af195176159d888e5e311a8e3c9f3ce00642309aab0431a248b
glibc-langpack-sl-2.28-164.el8_5.3.x86_64.rpm
011d215d72cf5c498406bc29674921f0c6434ffca6597a3912ae3b61569734d6
glibc-langpack-sm-2.28-164.el8_5.3.x86_64.rpm
2442926b65051fd001c6380891818b431584c626151f81ae0cdf9c3c84b6fd96
glibc-langpack-so-2.28-164.el8_5.3.x86_64.rpm
a1f4ec1dbb9040ece5bba01af6a6f65da8af82ebeb484f2769844ee9524677cc
glibc-langpack-sq-2.28-164.el8_5.3.x86_64.rpm
360595ebc091c8e15ef77b450e1e7282dd31107e61efba5d919e58b35ebdf2b6
glibc-langpack-sr-2.28-164.el8_5.3.x86_64.rpm
c3e60c8cd538196a4f8a62564a96815f9e9e03c91f7e1afd07f2371390d6f5b6
glibc-langpack-ss-2.28-164.el8_5.3.x86_64.rpm
2c87cd911c4d2e6a4e3e65cc8e7581d5035e4b7ceb8f88dc3a577359e7cd3741
glibc-langpack-st-2.28-164.el8_5.3.x86_64.rpm
7d433f511aa512deeba9a7e84f5b19810c536905f26c5eaeeb594a814816120c
glibc-langpack-sv-2.28-164.el8_5.3.x86_64.rpm
26a65e008ddf3f04d971c73d21722a79fa5082438fe0f5d074869504c99b6ef1
glibc-langpack-sw-2.28-164.el8_5.3.x86_64.rpm
8ac2d0d3a5bf8343bc8138e351b6fbb9aa751a4d2025837ec0ca63308edd9b71
glibc-langpack-szl-2.28-164.el8_5.3.x86_64.rpm
3d2f11b50fa5c363892c9d76032d1c22123e2bb48ce26e7e3c86d22e39d7543a
glibc-langpack-ta-2.28-164.el8_5.3.x86_64.rpm
a14a120781f43d8d0ce2dc8426dc8721ca82fcc0beeb84e106e5bd10960e570f
glibc-langpack-tcy-2.28-164.el8_5.3.x86_64.rpm
2f43a4ec4352a6eae5c5d130fc6bf4e92d16fc2fb9066c7abc6685ae6921944f
glibc-langpack-te-2.28-164.el8_5.3.x86_64.rpm
deea56e797921049ad33d6734d0d863144fdd5854af28798a1cfc78afa61d76a
glibc-langpack-tg-2.28-164.el8_5.3.x86_64.rpm
c03f159120086247d57b7d70b98972624ca1a65f5952ebc5930c13092881bdb4
glibc-langpack-th-2.28-164.el8_5.3.x86_64.rpm
564ff881a8958c8b497cb909f86623620763809e7ff101700344e36eca7d97d5
glibc-langpack-the-2.28-164.el8_5.3.x86_64.rpm
a5fd8877a4e2b5597e87426fcb3f0941f3a5a92da060deb22f8c5781da641131
glibc-langpack-ti-2.28-164.el8_5.3.x86_64.rpm
3900230b2d5a182c5a67c687aa6b3f70284bc7846674a19b8125a2039b228e74
glibc-langpack-tig-2.28-164.el8_5.3.x86_64.rpm
787ae8593973df3845135866e7c197ea72a718848631352e58ca2d77ec80e63a
glibc-langpack-tk-2.28-164.el8_5.3.x86_64.rpm
6c055a302607e802121e37551de698929a280337c93b1931521a8a74a0259256
glibc-langpack-tl-2.28-164.el8_5.3.x86_64.rpm
09c47fae84a51317b87062b3e2bd2e863bc8497309cb284ac86411fa10eb763b
glibc-langpack-tn-2.28-164.el8_5.3.x86_64.rpm
ffb42e30a01a80ffbb23eb1a03643b1ac7b66fbf626f50fc0ec9c91dd3c66030
glibc-langpack-to-2.28-164.el8_5.3.x86_64.rpm
0e7e8a84ae19a310a17745b7c6e231ea54a64e8eb42033d0ac7269c456b9283d
glibc-langpack-tpi-2.28-164.el8_5.3.x86_64.rpm
d6006097829dda5ffa68c7326cc024dbbdb7e9122149e614e59f268466507926
glibc-langpack-tr-2.28-164.el8_5.3.x86_64.rpm
f2cfcb4b22a91353a865ee91377911f9963b64756ffb8bbe888092768726be0d
glibc-langpack-ts-2.28-164.el8_5.3.x86_64.rpm
1db914506acae5765c5bc3041ef6732637c1e608ebb0315a28250956795d1996
glibc-langpack-tt-2.28-164.el8_5.3.x86_64.rpm
50befbf66f349d1c2e1d2bb2a53a1081571f515b991385396d59afdf9570c113
glibc-langpack-ug-2.28-164.el8_5.3.x86_64.rpm
e2a08fec56f24161808c4ab1606ca074ded9e514b58ad7e56f7ae4f00cd70e1a
glibc-langpack-uk-2.28-164.el8_5.3.x86_64.rpm
52ad79d7c953df61099acb3182ccbc1c31456d034a194648ac1b7a5f7b13f128
glibc-langpack-unm-2.28-164.el8_5.3.x86_64.rpm
99f50bf869292c3e10d92f4466a5b5f0456558b102d70d0c05954deb4c1bbd2e
glibc-langpack-ur-2.28-164.el8_5.3.x86_64.rpm
e730820b5609058c4601f217c399762da4205cc43482c45156eed2b7c6ecbb37
glibc-langpack-uz-2.28-164.el8_5.3.x86_64.rpm
8189ddcaf81277b10a0b5f363e7b21cbf95edf240928dd095d2372913b506d5b
glibc-langpack-ve-2.28-164.el8_5.3.x86_64.rpm
073ff96c4cba8f9ff537a93f2b971e32741b97e1e251ea5e00e4c089e75b0c29
glibc-langpack-vi-2.28-164.el8_5.3.x86_64.rpm
f70814fdb612cfb38d97e7210d00b83356d524ba186a462813dedda68df690e2
glibc-langpack-wa-2.28-164.el8_5.3.x86_64.rpm
a58674ec5db434087a5aaa2bcd8674d91db4b480e12b1e97c64652e422c35f83
glibc-langpack-wae-2.28-164.el8_5.3.x86_64.rpm
4e478a5b0dcd10036fc06aef7bbf74718c7eec1f5fbcd32d482c8a6c92214e8e
glibc-langpack-wal-2.28-164.el8_5.3.x86_64.rpm
ce785c240cb0e271b7bc29a1400e0871145818cbceb626b5e6e481ada66bac72
glibc-langpack-wo-2.28-164.el8_5.3.x86_64.rpm
1ac4ab2f8327b3dc0cfda9dad6adfc917b6f0c9615e5b9aa4e126361bed5f107
glibc-langpack-xh-2.28-164.el8_5.3.x86_64.rpm
0fb0b89b0487295182a8c13606b435d64263bd08ce233885c8105ffecf251ac2
glibc-langpack-yi-2.28-164.el8_5.3.x86_64.rpm
a1fb843ab89237d1a1f448b0bb7dcba4a8282da10cd90693f68de3619436133e
glibc-langpack-yo-2.28-164.el8_5.3.x86_64.rpm
bf029d482259af63f92afcfb012bb5d45832a222255fb0fe1a2d839fc3304720
glibc-langpack-yue-2.28-164.el8_5.3.x86_64.rpm
049de079fb7eb803a1480f3a4ecab3837b4eef64b4790b80f48609ce179a562c
glibc-langpack-yuw-2.28-164.el8_5.3.x86_64.rpm
f4df832dd252e7971008a63380eb0f08abfeb44ec13a6e25581dfcf7260f0942
glibc-langpack-zh-2.28-164.el8_5.3.x86_64.rpm
1859152375b941696589e69df63c64397e4035653d935b0c708f9203ba7a1ee9
glibc-langpack-zu-2.28-164.el8_5.3.x86_64.rpm
3666257e591aeb115570ee6cbf07e3c95be38d4b2da9b5c5226987a51dc857e7
glibc-locale-source-2.28-164.el8_5.3.x86_64.rpm
c46835fed6b07179f6ebf6ff634883689856f8126bb2fd769923875836d6d652
glibc-minimal-langpack-2.28-164.el8_5.3.x86_64.rpm
f7752095d56e7a5b834304377df042fb86c44aa029cf3a981b626471b08c2534
libnsl-2.28-164.el8_5.3.i686.rpm
4fbd559d8d4ea1104133d3f79fe343437568a6af6011a3bcdae7eeedf474d9ab
libnsl-2.28-164.el8_5.3.x86_64.rpm
f9730c5959768193e624e8952ce4f991cf302b0a695191c279799d5109079131
nscd-2.28-164.el8_5.3.x86_64.rpm
bb84010648f5f1739963ba98334742983f0efdcfa26dccea0f271fe16c1a84dc
nss_db-2.28-164.el8_5.3.i686.rpm
1716ae5693265c2a3da29c53738529391eb9eaaaf5e42d16a1ae1b7cdaded25f
nss_db-2.28-164.el8_5.3.x86_64.rpm
7051b96450017bd98b6000fd988cd0cc8657666dc771e0e97d24b0920975b603
RLBA-2022:0897
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The subscription-manager packages provide programs and libraries to allow
users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation
entitlement platform.
Bug Fix(es) and Enhancement(s):
* Subscription manager sends redundant requests to the server in SCA mode
(BZ#2044349)
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.21-5.el8_5.x86_64.rpm
4d6ca9bc4d3dfd8f6b02511eec31d4f479d0cdb53b53e4e87536af2db38a7b9a
python3-cloud-what-1.28.21-5.el8_5.x86_64.rpm
e3a910314e8dee9891698ab80b3e18fbead1c0db5f9182f1ca415205031a756e
python3-subscription-manager-rhsm-1.28.21-5.el8_5.x86_64.rpm
b14f5b64d8c7ce0b42fd484dd9c6cd992600c0ea175a34b59990da4d6565157d
python3-syspurpose-1.28.21-5.el8_5.x86_64.rpm
94d23cee8525033b5a8a79463a89cc2e52c379f1b344c450cab228e325248f9d
rhsm-icons-1.28.21-5.el8_5.noarch.rpm
2685ec43ee279e459a4e6e722f32e4e3eb7087a00b2d7aaa99f71e9a28adf3ff
rhsm-icons-1.28.21-5.el8_5.noarch.rpm
2685ec43ee279e459a4e6e722f32e4e3eb7087a00b2d7aaa99f71e9a28adf3ff
subscription-manager-1.28.21-5.el8_5.x86_64.rpm
1214dbfe0e39a81aea55c227875f0dffb645a7e3a5a4806f1edb18976c556514
subscription-manager-cockpit-1.28.21-5.el8_5.noarch.rpm
8a9c0c944b8df10798df233f84311648e146559bf94e9c880bb061cac9a32b09
subscription-manager-cockpit-1.28.21-5.el8_5.noarch.rpm
8a9c0c944b8df10798df233f84311648e146559bf94e9c880bb061cac9a32b09
subscription-manager-plugin-ostree-1.28.21-5.el8_5.x86_64.rpm
b8affcca8b13395b60a317d1cc4de841c0aff62a474e82c81ee8b3f0b0dfd684
subscription-manager-rhsm-certificates-1.28.21-5.el8_5.x86_64.rpm
ff4bdbccc77c272d1e844b2c0388a6acf255b87fb624b0af9889de0ff0983be8
RLBA-2022:0898
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lvm2 packages include complete support for handling read and write
operations on physical volumes, creating volume groups from one or more
physical volumes, and creating one or more logical volumes in volume
groups.
Bug Fix(es) and Enhancement(s):
* Multiple concurrent lv refreshes fail (BZ#2040514)
none-baseos-rpms
device-mapper-1.02.177-11.el8_5.x86_64.rpm
7a37bc160d92387995638a3ff86a9d03cc4929108c5121744df449f4388512bc
device-mapper-event-1.02.177-11.el8_5.x86_64.rpm
97a123b994b780a77396adf17a0cf897fb3e16254711e98ea504a4f2a255bda1
device-mapper-event-libs-1.02.177-11.el8_5.i686.rpm
8b209c9c4ccccf84daaf629367f837a26e5aa1897b137409a3fb939ebfed7891
device-mapper-event-libs-1.02.177-11.el8_5.x86_64.rpm
81322b91f7a325a13d4a167a764a10e43e20dc3ba3c0c8ca4955eed55191ff30
device-mapper-libs-1.02.177-11.el8_5.i686.rpm
65a5ab9d316c096b4e6e8e4515a036ff7d4bfd4a44eb624d0d77ca5838fdb08c
device-mapper-libs-1.02.177-11.el8_5.x86_64.rpm
21027eca0bf5b70110668e120da523dc255c1e5811d798207cf8a78dded3b267
lvm2-2.03.12-11.el8_5.x86_64.rpm
3d426ed2fa9a511614da44c6b0c9ab5248a60df08ec3e1782e044d11746730cb
lvm2-dbusd-2.03.12-11.el8_5.noarch.rpm
69860ff90bc2ad064336263aa08fef9f84c20a0d158f01b03411236748e9d60f
lvm2-dbusd-2.03.12-11.el8_5.noarch.rpm
69860ff90bc2ad064336263aa08fef9f84c20a0d158f01b03411236748e9d60f
lvm2-libs-2.03.12-11.el8_5.i686.rpm
d5e2efdab191199da96ee783fc7d3823cb1d878d0039c45eb665e9716326329d
lvm2-libs-2.03.12-11.el8_5.x86_64.rpm
aaabec6ea823416652343aac24d9236d9e149eac94e45ef998d1b23bca857c47
lvm2-lockd-2.03.12-11.el8_5.x86_64.rpm
e18bd130c1a23f9aa1bcbe0448993cbe38a9f88a25dd15e7c2dfe17c1d11798c
RLSA-2022:0899
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-12.el8_5.i686.rpm
189f93890f857a69fb9d94a6d0879aaa8ea99c1fb9c3b0998147275b514081d2
libxml2-2.9.7-12.el8_5.x86_64.rpm
5501b57865b463fa9d2bcd30d2b6c492554fda003d771535f09e6a13c56b35a1
python3-libxml2-2.9.7-12.el8_5.x86_64.rpm
ea7a9ff0e6704ee854bafc145df1d6b75b339ca27e4d7b13b5e681d3e9bd0dbb
RLBA-2022:0900
samba bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB)
protocol and the related Common Internet File System (CIFS) protocol, which
allow PC-compatible machines to share files, printers, and various
information.
Bug Fix(es) and Enhancement(s):
* Samba 4.14.5 - virusfilter_vfs_openat: Not scanned: Directory or special
file (BZ#2056877)
none-baseos-rpms
ctdb-4.14.5-10.el8_5.x86_64.rpm
a806c07265b670a54887c17e570b6b40ada5fc14494b28efccf31cc50680a304
libsmbclient-4.14.5-10.el8_5.i686.rpm
7141e81aba0c32fc7cd4fa85cd8664b1af969ea11e55a4ff6cd7241e1502bafc
libsmbclient-4.14.5-10.el8_5.x86_64.rpm
1b823d09730acbfd06be4c8fecaf13fade3075d5e261ea12cc553df7f62b89b2
libwbclient-4.14.5-10.el8_5.i686.rpm
917fbd1183e2dd9032f505887605ae4f36aa186a7d86046b3765e2d132c4ca95
libwbclient-4.14.5-10.el8_5.x86_64.rpm
a049eb21b52de2afb3877036fa3a9e334ec9e26025419a7bf39af23508da33dc
python3-samba-4.14.5-10.el8_5.i686.rpm
c77895a6fcd61b6c45b046ad6b001ff198604ccea20b9f8236b62eefcb94eb83
python3-samba-4.14.5-10.el8_5.x86_64.rpm
9c4fd84439c706b9feb88d5fad5ae98c8e9f62739639cb2b16a775125024e440
python3-samba-test-4.14.5-10.el8_5.x86_64.rpm
22ed44a8a200ea530484e4619ca3db3d5f0c5a3a61861a1e75064751af500b1a
samba-4.14.5-10.el8_5.x86_64.rpm
6d53fddb6c4cfc95597c017fc6e7025eade7ff2f8aded61fca27ed23e74b89dc
samba-client-4.14.5-10.el8_5.x86_64.rpm
13a778e8a7105737b4401a44d62a822c6aada6cc2d45c7bd6c298575cbd5bb97
samba-client-libs-4.14.5-10.el8_5.i686.rpm
42bcd2dd852eea167e7d2c5392726eef78bd8ed176204ce948e9bf02042129ad
samba-client-libs-4.14.5-10.el8_5.x86_64.rpm
92510931ee249c0dd77578f153ef80c2502a73c571f7138b75c75fea30c192bb
samba-common-4.14.5-10.el8_5.noarch.rpm
36395db705290487f4381ac7f43ebd359bd7c149c82802799fe470efa669539b
samba-common-4.14.5-10.el8_5.noarch.rpm
36395db705290487f4381ac7f43ebd359bd7c149c82802799fe470efa669539b
samba-common-libs-4.14.5-10.el8_5.x86_64.rpm
a74ea5b6a569e7dfb1eb382815255fa1422d9c5459e8f48d27b53793f2548533
samba-common-tools-4.14.5-10.el8_5.x86_64.rpm
a274003c0dc9e1c9977d3de6ee4babcf50ae7b7e6141d6aa214dc091dc6e8915
samba-krb5-printing-4.14.5-10.el8_5.x86_64.rpm
c2281770b3e7e6cd330b28a72c2cfd43f6630732ddaf43b7d91836cc0a43caf5
samba-libs-4.14.5-10.el8_5.i686.rpm
03510d4e10ebd7a7027ee1ab901ac2395f886cdc63b95509651b16e043592797
samba-libs-4.14.5-10.el8_5.x86_64.rpm
057ff15dc9a83c414cf35dbc4be076762fcf37e20459ed149fab28b03fa4a086
samba-pidl-4.14.5-10.el8_5.noarch.rpm
d475cfd587c72bd74a312a47ec558cf153c9f00626a45a61522e4982b3fc6cd5
samba-pidl-4.14.5-10.el8_5.noarch.rpm
d475cfd587c72bd74a312a47ec558cf153c9f00626a45a61522e4982b3fc6cd5
samba-test-4.14.5-10.el8_5.x86_64.rpm
e6cd5c68687a66fca442426716f3c33a0b463ffe9f0de2f7359569a320bd1afe
samba-test-libs-4.14.5-10.el8_5.x86_64.rpm
b47e8215bcd4b1d949afed2a8f0d715be3549f79922f714776c5b993f02e9af8
samba-winbind-4.14.5-10.el8_5.x86_64.rpm
9023f8c45e26d05cb991db0f82595433779665bf7f00df2599a5aaaf8a06cd97
samba-winbind-clients-4.14.5-10.el8_5.x86_64.rpm
0beabcfba9bf8f852b2635bb17df8d927431b395ac344f49a8bc9c83583d3871
samba-winbind-krb5-locator-4.14.5-10.el8_5.x86_64.rpm
22e6fa0e78bfb76523855adbda408c5be4831724922cc8413b0f64bd9b966f81
samba-winbind-modules-4.14.5-10.el8_5.i686.rpm
738220d66f351c2d167289a01923934fd8e442bb20ad9d0726eb8ced348ab2f4
samba-winbind-modules-4.14.5-10.el8_5.x86_64.rpm
fe0a0f86e88e65362a0dd495420460e191b24b78f3eb17e0b2a37b08ffb4c053
samba-winexe-4.14.5-10.el8_5.x86_64.rpm
904e35f53ec558dd23859fc9e53a511d7d41b20409e8423ed18ea74cbdb6b9c0
RLBA-2022:0901
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
firewalld is a firewall service daemon that provides a dynamic customizable
firewall with a D-Bus interface.
Bug Fix(es) and Enhancement(s):
* firewall-cmd takes hours when adding 55K ipsets (BZ#2046343)
none-baseos-rpms
firewalld-0.9.3-7.el8_5.1.noarch.rpm
1999ea7b588868ec6d98d54ca69702d9c5af417cc9b1eab3e918dcf2aaffc843
firewalld-0.9.3-7.el8_5.1.noarch.rpm
1999ea7b588868ec6d98d54ca69702d9c5af417cc9b1eab3e918dcf2aaffc843
firewalld-filesystem-0.9.3-7.el8_5.1.noarch.rpm
4c4d3749a05409559889fb3ea69b51178d8bbe166461ad297bfbaf319373b8b0
firewalld-filesystem-0.9.3-7.el8_5.1.noarch.rpm
4c4d3749a05409559889fb3ea69b51178d8bbe166461ad297bfbaf319373b8b0
python3-firewall-0.9.3-7.el8_5.1.noarch.rpm
33920c9e7ab58b641f68912fc3e8544584066e225e06121f6789ba94db9a8d1b
python3-firewall-0.9.3-7.el8_5.1.noarch.rpm
33920c9e7ab58b641f68912fc3e8544584066e225e06121f6789ba94db9a8d1b
RLSA-2022:0951
Important: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236)
* expat: Integer overflow in storeRawNames() (CVE-2022-25315)
* expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960)
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
* expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
* expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.2.5-4.el8_5.3.i686.rpm
7f9600125577835c56960325986ab9c0e8d4b6859c55da2ff0406a6f7bd6b27b
expat-2.2.5-4.el8_5.3.x86_64.rpm
1c5153730c23d4be65d4b2b002d1aa89fd49ea8cdf3bd404c1c222854e560221
expat-devel-2.2.5-4.el8_5.3.i686.rpm
a257d3ec0969c971404f981c60b19173ea79ea5245cbe00fcd6be2c43ea98719
expat-devel-2.2.5-4.el8_5.3.x86_64.rpm
397bc2f50985f91f748e370b637008caf455f855e006dad3e8c002e2a381f5e1
RLBA-2022:1545
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to the microcode-20220204 release, which addresses CVE-2021-0127, CVE-2021-0145, and CVE-2021-33120 (BZ#2049541, BZ#2049553, BZ#2049570)
none-baseos-rpms
microcode_ctl-20210608-1.20220207.1.el8_5.x86_64.rpm
b3d6aa82ca05d06a5612a486482ff8fd35b668aee2fc7d90c936e0410f968560
RLBA-2022:1547
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sanlock packages provide a shared storage lock manager. Hosts with shared access to a block device or a file can use sanlock to synchronize their activities. VDSM and libvirt use sanlock to synchronize access to shared devices or files.
Bug Fix(es) and Enhancement(s):
* sanlock lockspace stuck in 'ADD' for days (BZ#2066125)
none-baseos-rpms
sanlock-lib-3.8.4-2.el8_5.i686.rpm
066b85a3f4aea182f13fd3224c5cd2c0e49de2dd5013f4d80b2b1bb2bad5dd94
sanlock-lib-3.8.4-2.el8_5.x86_64.rpm
749913ea4b92f635dab1b2215bb04b2599eb977d84f31d5d1a18e0366c73e08d
RLBA-2022:1548
device-mapper-multipath bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.
Bug Fix(es) and Enhancement(s):
* multipathd.socket is missing start conditions (BZ#2054877)
none-baseos-rpms
device-mapper-multipath-0.8.4-17.el8_5.1.x86_64.rpm
d85c3bb12bbc36d2db6ee0a5408fc7f3d43f959a0260ec76ea21baa3f37103e8
device-mapper-multipath-libs-0.8.4-17.el8_5.1.i686.rpm
9c1da657f2488597a5da1ae182a27439c64b3a75caf64ddbeab927f3f8ab8aec
device-mapper-multipath-libs-0.8.4-17.el8_5.1.x86_64.rpm
c29875814062fee9bee81e81d2e8f22829c80900db0f439113b85009f01332bf
kpartx-0.8.4-17.el8_5.1.x86_64.rpm
aeb88145af84a642631cade112ab3ea41f79e98fc278944ce9514e3d9b26768d
libdmmp-0.8.4-17.el8_5.1.i686.rpm
b06a15b616fdf94a5682b799d12f4141ff38c4c743f9f0903cb9100b6697bdbf
libdmmp-0.8.4-17.el8_5.1.x86_64.rpm
de74a5d2213525581c973bc186c403db7bc07b5527296e9cd0b2c0edd9ba460f
RLBA-2022:1549
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* NetworkManager DHCP client does not work maybe due to received NAKs (BZ#2065188)
none-baseos-rpms
NetworkManager-1.32.10-5.el8_5.x86_64.rpm
8170029708c4e46ff90443003f989978852a612a84acd0759f7842e9d3602a67
NetworkManager-adsl-1.32.10-5.el8_5.x86_64.rpm
0558c7df1f0cfef494f5eac84d4173d5092d1fd17c661f061823919055e96866
NetworkManager-bluetooth-1.32.10-5.el8_5.x86_64.rpm
52ae8383515f55ff9e409885914f7c01f43e08ce0e2e917c18461a22f092c0f2
NetworkManager-config-connectivity-redhat-1.32.10-5.el8_5.noarch.rpm
3205c15eecb678076ba608f462c6e8f8d307cf7c92cd0706cae8f47c1e600b8b
NetworkManager-config-connectivity-redhat-1.32.10-5.el8_5.noarch.rpm
3205c15eecb678076ba608f462c6e8f8d307cf7c92cd0706cae8f47c1e600b8b
NetworkManager-config-server-1.32.10-5.el8_5.noarch.rpm
392235eb743e2a22345b3247c79fc9f04f8ad93eb485ee8416c957af4b9d5ef7
NetworkManager-config-server-1.32.10-5.el8_5.noarch.rpm
392235eb743e2a22345b3247c79fc9f04f8ad93eb485ee8416c957af4b9d5ef7
NetworkManager-dispatcher-routing-rules-1.32.10-5.el8_5.noarch.rpm
a623e5faec3fc6652e6eec6835f1b8a507ab903572f86bd257493574c33688ae
NetworkManager-dispatcher-routing-rules-1.32.10-5.el8_5.noarch.rpm
a623e5faec3fc6652e6eec6835f1b8a507ab903572f86bd257493574c33688ae
NetworkManager-libnm-1.32.10-5.el8_5.i686.rpm
12821fbed9de29e3e4cea125065bea086d2869c8cf96503660c6844b9fa75ce2
NetworkManager-libnm-1.32.10-5.el8_5.x86_64.rpm
bfed72139edbb4742bda575a92ef7a52fd4cc441ec94a09f8fc5316b6c6e4b8e
NetworkManager-ovs-1.32.10-5.el8_5.x86_64.rpm
9b58b4e21f6a83b33bceda46d0a6065fa1dc9c040825da43f4d046906224c9f0
NetworkManager-ppp-1.32.10-5.el8_5.x86_64.rpm
22520502fbb37457c8547ad4d279a948bfcb072ad4a74c683f975720226d63b8
NetworkManager-team-1.32.10-5.el8_5.x86_64.rpm
59b3ca6ee77f4dc35f2e7f6e7111702a02b21abf54b97d0966c910ffb42630c4
NetworkManager-tui-1.32.10-5.el8_5.x86_64.rpm
4adf3267f55d8a83b586707564eeac8318ce424398a7a43ea071002f523a3ebb
NetworkManager-wifi-1.32.10-5.el8_5.x86_64.rpm
54870e33b64b97be08c23a205ab056a7d247270bb7287890e0d86496e3576a03
NetworkManager-wwan-1.32.10-5.el8_5.x86_64.rpm
7cf71fa7503c322d87839d1c1d36987e5e96c1438fe7e54b5555fc8bf6b01d96
RLSA-2022:1550
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in RDMA listen() (CVE-2021-4028)
* kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Backport DFS fixes from upstream (BZ#2056329)
* [Rocky Linux8.5] lpfc driver often fails to detect storage directly connected to Broadcom FC HBA (BZ#2058193)
* nf_reinject calls nf_queue_entry_free on an already freed entry->state (BZ#2061446)
* gfs2 blocking in gdlm_lock (BZ#2069750)
none-baseos-rpms
bpftool-4.18.0-348.23.1.el8_5.x86_64.rpm
b34ad839e4c70edae54173fba1695f12011c1e6a6867c3dbbe3199a543e57fb7
kernel-4.18.0-348.23.1.el8_5.x86_64.rpm
ddb4d7e974b11eb62ec07ac899823c12e6fb1850f6b9cf5b8182e8fffeadf9aa
kernel-abi-stablelists-4.18.0-348.23.1.el8_5.noarch.rpm
26666a57f0ea2fe4333260a6edf8011cf2ab53bf6862f4ddb0cf4addabe004f2
kernel-abi-stablelists-4.18.0-348.23.1.el8_5.noarch.rpm
26666a57f0ea2fe4333260a6edf8011cf2ab53bf6862f4ddb0cf4addabe004f2
kernel-core-4.18.0-348.23.1.el8_5.x86_64.rpm
7ab8507e754879e92c00dcedb8c6512529e91f6c903c80f303bd39cce7844985
kernel-cross-headers-4.18.0-348.23.1.el8_5.x86_64.rpm
611a4ed339f8e3e94c3405c4b8f7a448e64b60a1c2df820b94b0b397ec3f29cc
kernel-debug-4.18.0-348.23.1.el8_5.x86_64.rpm
8b922257615da3808e37fa850ab8c41ee43bc3c018390c4a88acfa99df115fce
kernel-debug-core-4.18.0-348.23.1.el8_5.x86_64.rpm
e1024f7d5c5aa025bfa6be606371b4dd8100afe372a2695fa0e4fd4a8cb9f87e
kernel-debug-devel-4.18.0-348.23.1.el8_5.x86_64.rpm
b1b4eed1d8625fd2b407368305a9366257b99950b3ee497e39c8d0024be203cd
kernel-debuginfo-common-x86_64-4.18.0-348.23.1.el8_5.x86_64.rpm
239e63bd511b4f1e4d70744525bebc5b039f16973de7d0ad2609420d0fb407a3
kernel-debug-modules-4.18.0-348.23.1.el8_5.x86_64.rpm
d444b7483c6555ff2a80f691f1416cb2e746477d3e57145ca956d4afc629b20a
kernel-debug-modules-extra-4.18.0-348.23.1.el8_5.x86_64.rpm
aff2923c9324677120e82b47fae09b9c9988246eaab66db99775d3f47352a897
kernel-devel-4.18.0-348.23.1.el8_5.x86_64.rpm
fa2bd1576260693ceedb4149e4976c0105714513f479604fd2d0490f5c441080
kernel-doc-4.18.0-348.23.1.el8_5.noarch.rpm
760f591adfa724989e0f71d985bf1eda31a40ce5ff96c4b23e18712e731bdac7
kernel-doc-4.18.0-348.23.1.el8_5.noarch.rpm
760f591adfa724989e0f71d985bf1eda31a40ce5ff96c4b23e18712e731bdac7
kernel-headers-4.18.0-348.23.1.el8_5.x86_64.rpm
aa491450c4906fdffcb36f709c9265608e010040ce09ab50004d1fff22b6e183
kernel-modules-4.18.0-348.23.1.el8_5.x86_64.rpm
17eaa3f203daea25c877f2949f8da8fbc23329c8bf966d539c168d46fe807bce
kernel-modules-extra-4.18.0-348.23.1.el8_5.x86_64.rpm
83b70f8671f6c6603b36b7828fd43c64c7f2208fc0b3f2eec86c3e41273e5c53
kernel-tools-4.18.0-348.23.1.el8_5.x86_64.rpm
187cfbe074fda9769fefd8cfc52d6ee28b1647b77b375ca24ef642ccd0e5dc9c
kernel-tools-libs-4.18.0-348.23.1.el8_5.x86_64.rpm
ca44dde59a094212e13c5c73dceaddea3ca6c8a7f956cf43d790cdd02d581e35
perf-4.18.0-348.23.1.el8_5.x86_64.rpm
bf272c4cb4ddbfb85938e216c83f0b93253a41c4f169acbdf6dc1db96c927e6a
python3-perf-4.18.0-348.23.1.el8_5.x86_64.rpm
53dd5b57bf0afc067de97233f3bec1f655aa1494888ee7dfe2c3286a2cd8ea2a
RLEA-2022:1551
alsa-sof-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The alsa-sof-firmware package contains firmware binaries for the Sound Open Firmware project.
Bug Fix(es) and Enhancement(s):
* Update Intel SOF firmware to 1.9 (BZ#2044420)
none-baseos-rpms
alsa-sof-firmware-1.9.3-1.el8_5.noarch.rpm
cba497cce66875d230a4968d284acc195e6b128d55a53c9413d3b478cee6203e
alsa-sof-firmware-1.9.3-1.el8_5.noarch.rpm
cba497cce66875d230a4968d284acc195e6b128d55a53c9413d3b478cee6203e
alsa-sof-firmware-debug-1.9.3-1.el8_5.noarch.rpm
dc236315050ba322e7a0e0d0402d7f1eb3fc29118e3033818805d9f9cbdd0be3
alsa-sof-firmware-debug-1.9.3-1.el8_5.noarch.rpm
dc236315050ba322e7a0e0d0402d7f1eb3fc29118e3033818805d9f9cbdd0be3
RLSA-2022:1552
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: use after free in utf_ptr2char (CVE-2022-1154)
none-baseos-rpms
vim-minimal-8.0.1763-16.el8_5.13.x86_64.rpm
50456e8153c72a2737bd02f0c4b37cc413c8f2b6e6da0bf2a14f84798361cd2f
vim-minimal-8.0.1763-16.el8_5.13.x86_64.rpm
50456e8153c72a2737bd02f0c4b37cc413c8f2b6e6da0bf2a14f84798361cd2f
RLSA-2022:1642
Important: zlib security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Security Fix(es):
* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
zlib-1.2.11-18.el8_5.i686.rpm
39b79e8e246d544b6e7673af6424d60a83b751307d00b749d9679ae1bdc7ce6f
zlib-1.2.11-18.el8_5.i686.rpm
39b79e8e246d544b6e7673af6424d60a83b751307d00b749d9679ae1bdc7ce6f
zlib-1.2.11-18.el8_5.x86_64.rpm
91866feb0e0c113fedab45d7e533528279a36c1cf0653b88811fc37a43d51784
zlib-1.2.11-18.el8_5.x86_64.rpm
91866feb0e0c113fedab45d7e533528279a36c1cf0653b88811fc37a43d51784
zlib-devel-1.2.11-18.el8_5.i686.rpm
2073bff405289d41f15818c424c92e0d072f0dab2e1b5ddc83c09a5d610f72ce
zlib-devel-1.2.11-18.el8_5.i686.rpm
2073bff405289d41f15818c424c92e0d072f0dab2e1b5ddc83c09a5d610f72ce
zlib-devel-1.2.11-18.el8_5.x86_64.rpm
ef524110e82fe831e14ec80ef04de57c7b4388ecddce7ea8e8a0f65752c0fc9d
zlib-devel-1.2.11-18.el8_5.x86_64.rpm
ef524110e82fe831e14ec80ef04de57c7b4388ecddce7ea8e8a0f65752c0fc9d
RLSA-2022:1643
Important: xmlrpc-c security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
xmlrpc-c-1.51.0-5.el8_5.1.i686.rpm
f4775a12a96b595a5c6abf0f283bebe42e44d0b047aa7d14cd58a696dfbdd3eb
xmlrpc-c-1.51.0-5.el8_5.1.x86_64.rpm
10e6b600946e47552f65eea8364793289e08bf29acfd9d92f2ceaee8d09e2bcf
xmlrpc-c-client-1.51.0-5.el8_5.1.i686.rpm
e5f6fc10cc7b9622f1ce1e3df5f9e0f9603151d14adade5d0a8a6976b581765c
xmlrpc-c-client-1.51.0-5.el8_5.1.x86_64.rpm
1a2a6d1a6bcdee2127a0dd77dadf9b19ee9e6ce26825b081cc5c41ef8c85acf2
RLEA-2022:2037
alsa-sof-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
alsa-sof-firmware-1.9.3-1.el8_5.noarch.rpm
cba497cce66875d230a4968d284acc195e6b128d55a53c9413d3b478cee6203e
alsa-sof-firmware-1.9.3-1.el8_5.noarch.rpm
cba497cce66875d230a4968d284acc195e6b128d55a53c9413d3b478cee6203e
alsa-sof-firmware-debug-1.9.3-1.el8_5.noarch.rpm
dc236315050ba322e7a0e0d0402d7f1eb3fc29118e3033818805d9f9cbdd0be3
alsa-sof-firmware-debug-1.9.3-1.el8_5.noarch.rpm
dc236315050ba322e7a0e0d0402d7f1eb3fc29118e3033818805d9f9cbdd0be3
RLEA-2022:2012
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
tzdata-2022a-1.el8.noarch.rpm
5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384
tzdata-2022a-1.el8.noarch.rpm
5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384
tzdata-2022a-1.el8.noarch.rpm
5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384
tzdata-2022a-1.el8.noarch.rpm
5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384
RLBA-2022:2005
glibc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
glibc-2.28-189.1.el8.x86_64.rpm
333ca8dca080b42cc6976c58db0dbc274e3e8cb80dea07d5c6d8179bce997dc3
glibc-2.28-189.1.el8.i686.rpm
834fb09a476bc0f05fc3e47190cc54310ed370f95893b5ac6a1210496b6bcbeb
glibc-all-langpacks-2.28-189.1.el8.x86_64.rpm
2b9593034623fee33875ea44d65f687f82977bf3f71156c8a64d5174ab1062fe
glibc-common-2.28-189.1.el8.x86_64.rpm
419807117328d881a7a8083c540a20d53131a05606a4647d86f767c1bf4a4327
glibc-devel-2.28-189.1.el8.i686.rpm
471bd97011c679ac713b13d49d192d563653fb8e6ad555450d40a68ad50e4e92
glibc-devel-2.28-189.1.el8.x86_64.rpm
b2d79cfb2006a50e8ef0c5a812f358f490c52d8953d79a26da965eec3dca5408
glibc-gconv-extra-2.28-189.1.el8.x86_64.rpm
f588e95ffe551ddb2654b4b0f39f5c14e212c0954a1a80e0ee12255a20c226d1
glibc-headers-2.28-189.1.el8.i686.rpm
36f88fb507993048be7b59cc96e84dbc17bcd7eb21700d8eb561b48cba0a820a
glibc-headers-2.28-189.1.el8.x86_64.rpm
7b83b8c0fb38c1d2aead66a8f8499bafb88aa983271165d99accde9968007758
glibc-langpack-aa-2.28-189.1.el8.x86_64.rpm
86d0d4211a763179482c0a24b213fbefd4c14bb70051d16e764e0d8b55709008
glibc-langpack-af-2.28-189.1.el8.x86_64.rpm
c5ddd34ab13d5ca5a8fd85f19dc0b3e80042c088c9fad134b6ec4ce4e500c163
glibc-langpack-agr-2.28-189.1.el8.x86_64.rpm
9a696aadc68b0a33a86eee9fb32b26f988477ded31ba54409f37beeec246a368
glibc-langpack-ak-2.28-189.1.el8.x86_64.rpm
f2728a2d7d032deaa6f4ad9f55cd10182b76d0a93705ae396f369f3f710382aa
glibc-langpack-am-2.28-189.1.el8.x86_64.rpm
1593b4880bc82a7a5b11fda26eb51a839256796639082de2ed422e881db38abc
glibc-langpack-an-2.28-189.1.el8.x86_64.rpm
b88268d18ad606cbc3c22ec0f7dde0fd4210a972e9ff9c81cb3740b131f09f99
glibc-langpack-anp-2.28-189.1.el8.x86_64.rpm
ac5da0f87a71d4248c32722c7028e508446481652593c78a6332a9eb2d6b5c33
glibc-langpack-ar-2.28-189.1.el8.x86_64.rpm
a404cbd56392e26d94b4c6c186a4eafa4d9337a583f44de32d601820cd4815d2
glibc-langpack-as-2.28-189.1.el8.x86_64.rpm
1fce783328d77d38ada26c9469f05afdb5199b4bc3d5cef7c3c89782056771c5
glibc-langpack-ast-2.28-189.1.el8.x86_64.rpm
ee25588acf7ca03c77c2b72719ccb5fdf1236e124c2eb09ba8d9fcafacd69468
glibc-langpack-ayc-2.28-189.1.el8.x86_64.rpm
0a86c26bb180cc506ab52e0b1039f2b7ceb4eae44fe932022f588d39c455ac2a
glibc-langpack-az-2.28-189.1.el8.x86_64.rpm
1c08d1260eada6fc165f81cb741435fbd0956e24db47f6c7cfad3adc953bd776
glibc-langpack-be-2.28-189.1.el8.x86_64.rpm
b35270f7dc3c17bc6a1aa36df0737d137e3fa351c85509628a7c684bf9b0954f
glibc-langpack-bem-2.28-189.1.el8.x86_64.rpm
afce3cd6375740f12fc3d5e3d2067723ab047a963b42c572542b9e4776eb3aa3
glibc-langpack-ber-2.28-189.1.el8.x86_64.rpm
1ec768ec5477f392b7d1c7d9b35715fd1881206373c9644c37cae7697d1ddac8
glibc-langpack-bg-2.28-189.1.el8.x86_64.rpm
e98908718bf80baf66b49fe126989c1534272fc134bd8f4746e6b01cd98958f4
glibc-langpack-bhb-2.28-189.1.el8.x86_64.rpm
1199183641b6316bc9a89566b65b29ac1fcbb94d91b35dfa13d7d5af14a2b37f
glibc-langpack-bho-2.28-189.1.el8.x86_64.rpm
0ae2610bc572fec129cbaf66151288f1487965ea3f951a86c44c766734361b2b
glibc-langpack-bi-2.28-189.1.el8.x86_64.rpm
3b24e3ba96b3ecb1f1747cfbefbd7afb21574bce52c3dfe92712da5199accf18
glibc-langpack-bn-2.28-189.1.el8.x86_64.rpm
d0d1e436ffab44e4c6e9102ff147c94cda67717d9ab60e1442b6b13770b6cc52
glibc-langpack-bo-2.28-189.1.el8.x86_64.rpm
36f2e23ec6c9587f61c7e42e8a942c4edc100cafc74061993d9eacc6a5d35f12
glibc-langpack-br-2.28-189.1.el8.x86_64.rpm
ee3cd1e7c05d797f04a359c875946afa99e680b8c20cfecdd5423621a175751d
glibc-langpack-brx-2.28-189.1.el8.x86_64.rpm
87c9727a541bcd93910837b3e50ac1e3302ce08cfbd5d9953052a127092061fd
glibc-langpack-bs-2.28-189.1.el8.x86_64.rpm
df8950817b845ebdd94343acfc77a44bbaba85660941345f5fa1016180cb48b3
glibc-langpack-byn-2.28-189.1.el8.x86_64.rpm
cc64df334871d619ac4a7bbed9e382a8d6f9145f44bc985b705a6f53decca14b
glibc-langpack-ca-2.28-189.1.el8.x86_64.rpm
a77a4eaa32fe846c519f28250b78d3bd59710dec17abeb255deade0b4ae0a156
glibc-langpack-ce-2.28-189.1.el8.x86_64.rpm
428397e97f8c24f9882154fe968c9558968e15be4b6f1dc510efc776effd447e
glibc-langpack-chr-2.28-189.1.el8.x86_64.rpm
10e374e6137ae20706cab8fbe52e9145220141a34f4a54b98b45e72df2e0671e
glibc-langpack-cmn-2.28-189.1.el8.x86_64.rpm
77e1872f1e091517cca983fc005843a60a4b3bde3ec2010535c83da374115617
glibc-langpack-crh-2.28-189.1.el8.x86_64.rpm
641ff0548a1a7c721e1b527a7229f89a6b5a21e6af546c7818fab3b659ae624d
glibc-langpack-cs-2.28-189.1.el8.x86_64.rpm
e0f5912af7e499a0b465949dc963c611de54c2cc82cb856461293ab4bb1c11de
glibc-langpack-csb-2.28-189.1.el8.x86_64.rpm
d62ae3a76974da6cc620005addb87fe044a670a280240e631e73e1526d9b7c2c
glibc-langpack-cv-2.28-189.1.el8.x86_64.rpm
8e79cc644bc2eb6da31a6bf298fe729173d5c335afec5a55babc1fb05acd5633
glibc-langpack-cy-2.28-189.1.el8.x86_64.rpm
e10e6c396b3f15a0b71f99135f5e60943a7fe6306f521272b753702d9a9b7c2d
glibc-langpack-da-2.28-189.1.el8.x86_64.rpm
04fb336cabb4422c3cda3c791d0f53f2c14cf7adac23f16f15e1e80fe5bd7984
glibc-langpack-de-2.28-189.1.el8.x86_64.rpm
833a1adbc02d1c48758652a5a11f2532248df970598553aee76c8c95784297a3
glibc-langpack-doi-2.28-189.1.el8.x86_64.rpm
4ccc8a7c52702cea283eb8cd8f5c7350434395b703bc83384a78e7560510b675
glibc-langpack-dsb-2.28-189.1.el8.x86_64.rpm
35bd6f55b083bfa48aee5808f8799d68ddac963678aca078938eda13db264159
glibc-langpack-dv-2.28-189.1.el8.x86_64.rpm
59b109ba0491486da2c7ecea96e11e884a5aaf6e0fe697feacf65dfe85f56351
glibc-langpack-dz-2.28-189.1.el8.x86_64.rpm
8f73cd523e9d61477ec22f59cb4527e73c27cbf9c2b41429968aa2b4793c9fa5
glibc-langpack-el-2.28-189.1.el8.x86_64.rpm
0377c2f528b2c7597a4139d29d0cc272ced44842370291a2b798bdf9768acee4
glibc-langpack-en-2.28-189.1.el8.x86_64.rpm
09af23543f904baf652e6b58f8ee41d2755c1a196c539d26a84a34aaaff40073
glibc-langpack-eo-2.28-189.1.el8.x86_64.rpm
d53f03f670844f44f9b0385235e1c2812cfd4afabef452f888a112a4db107ec9
glibc-langpack-es-2.28-189.1.el8.x86_64.rpm
6cd80ed5db2ace08a890f8fb5cd716b39f9346781e627fb2a7c708f5dee1799a
glibc-langpack-et-2.28-189.1.el8.x86_64.rpm
811d6e5773de1fa547d8272ee7a578f9c391e913de6f67af9a824c578235dafb
glibc-langpack-eu-2.28-189.1.el8.x86_64.rpm
6d292b6bac879bc16386c599d1399001b246bdd62ed5b587c7e4d618e0060ee8
glibc-langpack-fa-2.28-189.1.el8.x86_64.rpm
48e9649e5305ca1ea3977bf13cb0daf9c83366e91654cb047a89eafe874df48a
glibc-langpack-ff-2.28-189.1.el8.x86_64.rpm
da87068b98f31588fbe174d5cdde8a95d617f145f3bb28ad8047a2fd56045abd
glibc-langpack-fi-2.28-189.1.el8.x86_64.rpm
ed347ea78ed35dc0a101df5a3ce0e8122afc3856ac8146c6bbdbfb3450f58f6b
glibc-langpack-fil-2.28-189.1.el8.x86_64.rpm
3d22ac491ab5210390b50399e5c32aedc5c16b0d7e54cdf477774e4908d767cb
glibc-langpack-fo-2.28-189.1.el8.x86_64.rpm
aec978d9915962b18f1daaa017b9a0da2b7ff0783ef09a60d62f8f45261aad9c
glibc-langpack-fr-2.28-189.1.el8.x86_64.rpm
608796b75b1785f7bc26cdb35c3cceba87389cb90a5e703990b3ce0aefb213ca
glibc-langpack-fur-2.28-189.1.el8.x86_64.rpm
d3ce86cd2ee068d0f7fbff89e9d18d4192d9c85cf15f318044c2cbc2f370c029
glibc-langpack-fy-2.28-189.1.el8.x86_64.rpm
b2a3a5f99501a1ebe0b14af7a06aa0680cda922d83d2eb5a0c67d9ed2e18039c
glibc-langpack-ga-2.28-189.1.el8.x86_64.rpm
bba521501eb61c1d05caa8b44d6ec12364555716ebb4be97a7e8d9fa43c2225e
glibc-langpack-gd-2.28-189.1.el8.x86_64.rpm
d54ccfd6e2e85e4b847263cb92aa1e1d80bf0e1b47be99e22b9906d18a1b8eea
glibc-langpack-gez-2.28-189.1.el8.x86_64.rpm
acc143c9f005cd815e2d1ed87754f19fb841a28d0a033aff0a4e34f417abcc6b
glibc-langpack-gl-2.28-189.1.el8.x86_64.rpm
07608a614bb5583ad1e4242985cb08f9c6101ebf9b787d1f3c9bf5bba15a5340
glibc-langpack-gu-2.28-189.1.el8.x86_64.rpm
aa8a92f2164d48e238e5a061b14cf637cbc0553b09b0665eb7f193504b9f007e
glibc-langpack-gv-2.28-189.1.el8.x86_64.rpm
70566299215b57d5747be4fcc6f1039cd44ce824167e2a686f690313158aa96a
glibc-langpack-ha-2.28-189.1.el8.x86_64.rpm
c00001bdcef572f52c6885cf0449189337458f92288f0b489ec62e7e99c65174
glibc-langpack-hak-2.28-189.1.el8.x86_64.rpm
bb3fa54719e0745fa7df7ff10827cbd742937ce5dc0b8212ec9ff2ecf864292a
glibc-langpack-he-2.28-189.1.el8.x86_64.rpm
0c4271a099dd9ac3e6f8153ff6a5daba028a315ab35e2521453f88f30393acaa
glibc-langpack-hi-2.28-189.1.el8.x86_64.rpm
2b5e7648f43b6f91dab3822ccf123f83dc9b1dd60ec3c6482a3956540f208584
glibc-langpack-hif-2.28-189.1.el8.x86_64.rpm
4d83b4a37a3f31d9e18ef4c8e4cf19d3d0aac64240493902c325dfe76b253c48
glibc-langpack-hne-2.28-189.1.el8.x86_64.rpm
61a1849a43f1464cb81d4a465345032d5688b7d02ee4cd827bb6bcaa40e55a8f
glibc-langpack-hr-2.28-189.1.el8.x86_64.rpm
d3d1ea95b085fb84d0deb397c021ff5e52bf2cc7ae476b058bfeae0c606e9b69
glibc-langpack-hsb-2.28-189.1.el8.x86_64.rpm
a352fb5c4182934b14a69b091d374cf331c7f1028fc3801a3197bdea732808a0
glibc-langpack-ht-2.28-189.1.el8.x86_64.rpm
afe995874e02dd327d8771424ceabd380d842453e699cf601762969a59985b76
glibc-langpack-hu-2.28-189.1.el8.x86_64.rpm
7d5c9f1b26c461d7de9deee8ca247dbb411c61ec7040928a6b68bafc9410de56
glibc-langpack-hy-2.28-189.1.el8.x86_64.rpm
e19edbdc04a71a47257534fefde3787e5b82c9644bab74390b7352e8dd0e2e64
glibc-langpack-ia-2.28-189.1.el8.x86_64.rpm
641f92b3f7e0b897fd350311ba3a19cc726c469ccf768dd62a4f5b67eb5e9fff
glibc-langpack-id-2.28-189.1.el8.x86_64.rpm
38300916d11ef5dbdc43156b05cafdd1b0147aaaac263da111b45ba6a13bb309
glibc-langpack-ig-2.28-189.1.el8.x86_64.rpm
e162174f2f175160f7fdbc02f0176c0a9b490a3ac145684eb129eb4b8a1d8c04
glibc-langpack-ik-2.28-189.1.el8.x86_64.rpm
1b71ecdf163b555f1f909e28ebf358a922cf28609565ba52fb8eb41514a3dc4d
glibc-langpack-is-2.28-189.1.el8.x86_64.rpm
d51a4d383b9bfbadc84de16e18832a1d15e7bb716b59f08c5407f441c2f535ca
glibc-langpack-it-2.28-189.1.el8.x86_64.rpm
6ae30e139472632b9b937ba7674946758dbaa0cbffc97f433712453bc93ac52f
glibc-langpack-iu-2.28-189.1.el8.x86_64.rpm
e803eea904fc80aabfd2df9b8afabf28b1d9c6eaf0d6d11c8d922c28e450f6cc
glibc-langpack-ja-2.28-189.1.el8.x86_64.rpm
e89fabfaf5b8bb26d99d37310ad30d699d03741458c8e00c1491f9876ce28e3a
glibc-langpack-ka-2.28-189.1.el8.x86_64.rpm
f441ead82c0b96047465954fa5922ed0df3aefe1984deb26186bbccf9b2747c0
glibc-langpack-kab-2.28-189.1.el8.x86_64.rpm
fcdb69cfd023dd33641748f8eeb2f3be6528379b98913bc9261b0ad3d8e33c04
glibc-langpack-kk-2.28-189.1.el8.x86_64.rpm
c09ed04e89d868323c6807557517afc7f489dd3b1edb8516e7ae81af150d9cf1
glibc-langpack-kl-2.28-189.1.el8.x86_64.rpm
e89c72c0f5ab78cd9c8562781a3b7ccee891a440487dd9f92358f784e41476f7
glibc-langpack-km-2.28-189.1.el8.x86_64.rpm
ef73dc3456cb8a20f4dec9fb69ed233f707bb6072019234babdbf7e4fb6d93d9
glibc-langpack-kn-2.28-189.1.el8.x86_64.rpm
49d42bb9b771de75e2b47c946a27d590a48088787725459af75a84067ed96e44
glibc-langpack-ko-2.28-189.1.el8.x86_64.rpm
a48d6659fa8ed378bda9e93ef44fa86babfdbd9aa7bf9ac845f68aaffb126e59
glibc-langpack-kok-2.28-189.1.el8.x86_64.rpm
100e29417f7bb4d053995b5df3f207886cff22d23130c0ccbe22c7c2f8027cd8
glibc-langpack-ks-2.28-189.1.el8.x86_64.rpm
f067fc076d3c86813826b0784c87069b3ac5911b0a52c957b012489a5ce01cc3
glibc-langpack-ku-2.28-189.1.el8.x86_64.rpm
e6a4dc40d56b27e80771eaa4ef69855c2f895c7f404986973da1fdabe66be2b4
glibc-langpack-kw-2.28-189.1.el8.x86_64.rpm
f28280b60a206a4bfd4cca5520b1c6e562c52c27299d7c54fc003ef30da71a48
glibc-langpack-ky-2.28-189.1.el8.x86_64.rpm
12da6ecb5c10a9b260eed9d23c2a53db7e266fe2b6e7a8229f556e21bcc1210f
glibc-langpack-lb-2.28-189.1.el8.x86_64.rpm
c921d5720b9202c6a74ed742eaf85471b9b136407436400292d8382486d06dea
glibc-langpack-lg-2.28-189.1.el8.x86_64.rpm
78e1b3013accb47a446734d1cf37f467220ba99f8521290a371df960d9d459f5
glibc-langpack-li-2.28-189.1.el8.x86_64.rpm
ab1fecc78622a320c66fd1d786996f99f2e31bf2099132c68487f551cd0226ef
glibc-langpack-lij-2.28-189.1.el8.x86_64.rpm
04b756c221fcc45bb21eb3b289f8800237983b2ed44d43a052df868b267488c7
glibc-langpack-ln-2.28-189.1.el8.x86_64.rpm
d38bf1ec02c68087613ed646c80f15176f5874b291346c1cf6af9762a79ae077
glibc-langpack-lo-2.28-189.1.el8.x86_64.rpm
c5a2b93bd4f77a5ab855c55b7f01c891d4df4b6fa58e9dc76a52b5d48aeaa952
glibc-langpack-lt-2.28-189.1.el8.x86_64.rpm
9e204552ec859810e933d565256415a352658a49505fbcc6d49f10726a3bbbf4
glibc-langpack-lv-2.28-189.1.el8.x86_64.rpm
e2726724b680adc1db5f4b7d74eb47b6c66baac05b636e98c60955d13450101a
glibc-langpack-lzh-2.28-189.1.el8.x86_64.rpm
9570426014b85bbd9132a313b962d02b41ebb838a0358a23569f1a2926996840
glibc-langpack-mag-2.28-189.1.el8.x86_64.rpm
64cd9230975cc69631377b0f15b13b4fad3fe723c12a3d98394b4eef24ce6469
glibc-langpack-mai-2.28-189.1.el8.x86_64.rpm
08e17cde4dd8e772234bcda428c8a5c553920e8ce11129b55464f250949320e1
glibc-langpack-mfe-2.28-189.1.el8.x86_64.rpm
cd42221372b58524022afb62b3681252a987298dee28d49587dd20a9f150f1fd
glibc-langpack-mg-2.28-189.1.el8.x86_64.rpm
76876e6356fdb5473f0dda62c6fb4e104848b49ca842b072644c1460fb8be8fb
glibc-langpack-mhr-2.28-189.1.el8.x86_64.rpm
9446908ef446ee0ad60f690c84eb3455a718495290c16108bf8c374ee7975301
glibc-langpack-mi-2.28-189.1.el8.x86_64.rpm
7343adf671f68cae2cd9d8ef69bd5b56917439577bb4412385ecb89e72cf91db
glibc-langpack-miq-2.28-189.1.el8.x86_64.rpm
387720349645660e247c312a7599b4c74bf75a2ecad68d09149edd2c37a51a7b
glibc-langpack-mjw-2.28-189.1.el8.x86_64.rpm
f41f2d0897e2eb398a0271df9c37dab9d88aa5a79b5347575dd5161b1690fc17
glibc-langpack-mk-2.28-189.1.el8.x86_64.rpm
69c921cbd71582dd1fe2888d7bd5d2dfd6f68ed07ad2678bb9780f9b9ddb6190
glibc-langpack-ml-2.28-189.1.el8.x86_64.rpm
d116fce930ce81c8c5255b29421454c8f6f56b4d21bcbaa41c02d918939c260f
glibc-langpack-mn-2.28-189.1.el8.x86_64.rpm
f4192e05b8de141ff2827de1c6d5a96cc535fac3ad3aa912ec7b86f798dc3b3f
glibc-langpack-mni-2.28-189.1.el8.x86_64.rpm
e30f5afe8bf86210499aa9777460645670e47e3e7df8248b8b08ae8a0fa556bc
glibc-langpack-mr-2.28-189.1.el8.x86_64.rpm
3898455b3fabf3009e11fc45e580c21be8ea057efc9e7707456c9ce35a4277a0
glibc-langpack-ms-2.28-189.1.el8.x86_64.rpm
2a0e0efd9826cb08f4a4d6cc331b70fe4fdc4e82ca8355ba3b657ce790214090
glibc-langpack-mt-2.28-189.1.el8.x86_64.rpm
af7676e335f04791dbcb10c900f2962a26873468d34901481479032b5d75cc26
glibc-langpack-my-2.28-189.1.el8.x86_64.rpm
716b7e3bb2472740b5b6ea542ae6869f95bff50feb120d56f22f4d0d2cc2a88c
glibc-langpack-nan-2.28-189.1.el8.x86_64.rpm
12053a3cb98dfab9d3a931c8dfe2db6622870ed442d1dd14f224af34fa388369
glibc-langpack-nb-2.28-189.1.el8.x86_64.rpm
c5f685528c7ee4ebd66ee855322f4385f265c6d7ef75ccca66b92345577aeb02
glibc-langpack-nds-2.28-189.1.el8.x86_64.rpm
42783628b14cac82555cbb1e9a39a2624d296588a1d2a2f1a052102314a58a4c
glibc-langpack-ne-2.28-189.1.el8.x86_64.rpm
487efd594fae3552a0acb1430f998dd4f628d2d8854f9b95e1795a0f76fa8cdf
glibc-langpack-nhn-2.28-189.1.el8.x86_64.rpm
cf9c191095800e0976f31969e56c554c3b32e5d7eeacf9ea37c2b2c8f4aa24ad
glibc-langpack-niu-2.28-189.1.el8.x86_64.rpm
c16e4da631a91a2152bd16723641dc1e9d22b9c0dcf8e4e8e178a31226a4a62e
glibc-langpack-nl-2.28-189.1.el8.x86_64.rpm
5b03601272771c0626851bf926d5bc9113f84f5665e15de282a5a0e6b12fda0f
glibc-langpack-nn-2.28-189.1.el8.x86_64.rpm
71fde1207486a108d95545bed0f09405760b9fb0df2beec02edfabf29a19946c
glibc-langpack-nr-2.28-189.1.el8.x86_64.rpm
988c2df7884a0fbae703e0cdccd325407304f7fcadd0f48a6072ed2a59d3756c
glibc-langpack-nso-2.28-189.1.el8.x86_64.rpm
e0059959345e2fcaaea32eb32d3e0893ab81c09d5ac3f05d6f88928fd6042f53
glibc-langpack-oc-2.28-189.1.el8.x86_64.rpm
3406d751087a84e512eaa78c7e169345f9c0f4dae2e9c8d619076ccdf6489204
glibc-langpack-om-2.28-189.1.el8.x86_64.rpm
d265bd1776350fc59ee0ef384b34d245e8bb4ae9af98992451f65945b89346e6
glibc-langpack-or-2.28-189.1.el8.x86_64.rpm
d49d070aa9e64c3b802bff41de896de2a644a979462dec6387a8cd5c622801d4
glibc-langpack-os-2.28-189.1.el8.x86_64.rpm
87976122f73e50b3fb1da3f5e670257dcfa8c3ca3c577354d07297d15722a436
glibc-langpack-pa-2.28-189.1.el8.x86_64.rpm
b71c62bd2be9a722c761fa7b220188c2d1e5e0c39b67181dea90d89bdd73cfd2
glibc-langpack-pap-2.28-189.1.el8.x86_64.rpm
b66df2febddfbe3d282be4b645e9c6bcbaf71e7a617e3fb8327e4df882944d1e
glibc-langpack-pl-2.28-189.1.el8.x86_64.rpm
8bd54a77817f6cabc275b39976c73fd849b7684630ffa695fda7f6830177820d
glibc-langpack-ps-2.28-189.1.el8.x86_64.rpm
8fb2cc8ed4fa422770e1f14d3324a0bd81cfa03a4a4158f58883b123291b0aab
glibc-langpack-pt-2.28-189.1.el8.x86_64.rpm
d1965ea7f5683bce6999a5ab298737daae0636c2f0c9752b4181b7418a9b73e1
glibc-langpack-quz-2.28-189.1.el8.x86_64.rpm
1ab996bf140c6e587d38f62a9d5a78069a097435c81bb22747250195a83e7ded
glibc-langpack-raj-2.28-189.1.el8.x86_64.rpm
2238b40d698e9e2f01e78ea8f0bfa4b77d9ecd9f49266021cb6feb96251298b2
glibc-langpack-ro-2.28-189.1.el8.x86_64.rpm
8cdfda2d049a4cb71fca348d30d6af88168636af6e4951d1fb503b6dae20f3af
glibc-langpack-ru-2.28-189.1.el8.x86_64.rpm
c32fd0beee1f777c3b8de5cab5b833622356c4d8e348deb58b4d5317656d527e
glibc-langpack-rw-2.28-189.1.el8.x86_64.rpm
5e42c441631690b5c4b3521f696bbd2e2adf8163f820405a363c3edaa8707878
glibc-langpack-sa-2.28-189.1.el8.x86_64.rpm
af851624c1b9c521126a10d74836b478aad18c43c5b2c6fb4084f5a0ec964d9a
glibc-langpack-sah-2.28-189.1.el8.x86_64.rpm
8e40b2f5f8e0819a2aa6c65db96787b3cd3776571a84a74623fa76cf8ed984be
glibc-langpack-sat-2.28-189.1.el8.x86_64.rpm
94edce5a3d80da43af3c20467993904e7a3f48221c954b01962d8cbf19adaf4b
glibc-langpack-sc-2.28-189.1.el8.x86_64.rpm
38d901116295f1b8fce9d33bc9518f46b08a66104527945502fc42a8126842a6
glibc-langpack-sd-2.28-189.1.el8.x86_64.rpm
779e29c4f7d46420c248c91cbbf520a098dba66bfc287490c4e284b02bc8367e
glibc-langpack-se-2.28-189.1.el8.x86_64.rpm
beb344d1120238187a9c0da2a38befee4a77ee4e657a4d22b1dd390d0f7d88c0
glibc-langpack-sgs-2.28-189.1.el8.x86_64.rpm
fc70b65b00a222c78cebc6bc8494afae4ad7578a278411ae61ceb5c14a54707c
glibc-langpack-shn-2.28-189.1.el8.x86_64.rpm
b284bee7841a075026d6fc30997013963a19a0ef8b88122e5548b32797f9a352
glibc-langpack-shs-2.28-189.1.el8.x86_64.rpm
13c41e6df7ba755851de84cda418067ac82eaab73abd8b0a24053cb20ec3025f
glibc-langpack-si-2.28-189.1.el8.x86_64.rpm
1a112740d663e8a0ff835fdb9e0f323258b4424049a293af6d465189bde17bde
glibc-langpack-sid-2.28-189.1.el8.x86_64.rpm
f68eca97d9236a031a810c33fdc0f933889e38720f2e16b8ec65773ce569887b
glibc-langpack-sk-2.28-189.1.el8.x86_64.rpm
00337e112a213029154f05f39325993bbdbf87f7128d2060aaad87ee5aaf5b63
glibc-langpack-sl-2.28-189.1.el8.x86_64.rpm
caaf3b1513f03c11a2588a512cddcb721a624e79c9ee7164c672cf93b3ff4d08
glibc-langpack-sm-2.28-189.1.el8.x86_64.rpm
b62eb66c9c1f0ce34a2c24ac4a17194300accb393b53210699187e38e94adf74
glibc-langpack-so-2.28-189.1.el8.x86_64.rpm
d322f3b6c0abfab7b8d8a92615544f4723dc2c1bf7b2bd4a3ce8e4006d8dbb4b
glibc-langpack-sq-2.28-189.1.el8.x86_64.rpm
6864a489517398ab35492fda8b6241e07533a03ccd01bee95758b082d15639ce
glibc-langpack-sr-2.28-189.1.el8.x86_64.rpm
9570e292e723dd754955863bd6e28310ae266f3ed8108b420002ee76d476e70e
glibc-langpack-ss-2.28-189.1.el8.x86_64.rpm
8a38187c95ac823ca891db65656839fa59fe5f260dae2dbe8b6d39b1fbc42e32
glibc-langpack-st-2.28-189.1.el8.x86_64.rpm
7dd0657d281566bf61cf8bc33578c088e2f4778738cd5d08a387b9469a8b0fed
glibc-langpack-sv-2.28-189.1.el8.x86_64.rpm
ead04f351c40d70a0c0d9d7ac2a0caad544b18991050e4a45e3899113ac4a61d
glibc-langpack-sw-2.28-189.1.el8.x86_64.rpm
bb2bcf6cce3103146329a978e14d6a8ec382f239046aaf313e1429c2148aa856
glibc-langpack-szl-2.28-189.1.el8.x86_64.rpm
bfdab2bd5007e1d7f04cdd150cae629903a38863fe2ed535b30781845c2e2d33
glibc-langpack-ta-2.28-189.1.el8.x86_64.rpm
ba872776d4908865a6a6304fc0557f9ac6069c0685397565e621a33fee6a1777
glibc-langpack-tcy-2.28-189.1.el8.x86_64.rpm
7fe2ca303086af5b0f1a8f3bcbe7c2ff822562165ed72e8e8f53187f85c94ec9
glibc-langpack-te-2.28-189.1.el8.x86_64.rpm
2b5324da7ed9971b53f7c61f7b0590417289f91dac385b05996f2ae46e6aaccb
glibc-langpack-tg-2.28-189.1.el8.x86_64.rpm
f207d1d276b29de092bc940f0039f1cc9cda7917a07c1ef162ba6d9b67380342
glibc-langpack-th-2.28-189.1.el8.x86_64.rpm
0d4c44d0353bdecd55c720484129eca322cf4d9c1a538d48ab74647171a56f5f
glibc-langpack-the-2.28-189.1.el8.x86_64.rpm
d710d6c6a444d4ca1d9bc7c8cdb459c29cb4ea8030c27fd993171bf052b3348d
glibc-langpack-ti-2.28-189.1.el8.x86_64.rpm
40234230ac93a3395053e9cff9edb75ae0cb00d258803178f7b3fd0041c0d70c
glibc-langpack-tig-2.28-189.1.el8.x86_64.rpm
d8884737756eccdf732028fcce7653b1487c81a7a5092538fa96c18664891756
glibc-langpack-tk-2.28-189.1.el8.x86_64.rpm
f224e0aa33c8aa408c1a57de98a9407f5f1a36beb64edce0ac0d821689d30e3a
glibc-langpack-tl-2.28-189.1.el8.x86_64.rpm
5e8cdfe213793219f49a892d623fcf700ff0ff2d45d53fb5eceb7ab0f3840fc6
glibc-langpack-tn-2.28-189.1.el8.x86_64.rpm
7d78e2f062ef5b933ad252aee5d35e12eac2eb92f7e2b7c295a63a45152a01b7
glibc-langpack-to-2.28-189.1.el8.x86_64.rpm
2cd1b1aca1a731ecf6af996eaefdeb773e352c5fc34b6397134eeb5de95b21cb
glibc-langpack-tpi-2.28-189.1.el8.x86_64.rpm
67933d749f117daba81dc03153a06e128875daee1e3969177fd5968cb441d5b5
glibc-langpack-tr-2.28-189.1.el8.x86_64.rpm
9d5da03098da017e9e6918ce095e40482ff096f6c262e426db2009dd636d29c5
glibc-langpack-ts-2.28-189.1.el8.x86_64.rpm
c77e4c3943f180488028734d77cb5f5983e2a349a403cb8862b535e9892d4cd1
glibc-langpack-tt-2.28-189.1.el8.x86_64.rpm
c599858475c587511280280fab9c119d78889c748227f036728c172014d43f00
glibc-langpack-ug-2.28-189.1.el8.x86_64.rpm
ea4be8f2f161e438ee8339603880dec7826a81a0556993ffcb66a53b0337e4dd
glibc-langpack-uk-2.28-189.1.el8.x86_64.rpm
5ca5de51e63854b7fe7312fbc2e6c8c174014fb50148625a9aaf97cc81091a5e
glibc-langpack-unm-2.28-189.1.el8.x86_64.rpm
11cb7810f342e5f68d9e567d44dc9850d78d26d17fc053f2804e3ca1162e42c9
glibc-langpack-ur-2.28-189.1.el8.x86_64.rpm
d1a02e92685df82f007870a575ae19d83495b429593d11c0d9999070dbe1eefd
glibc-langpack-uz-2.28-189.1.el8.x86_64.rpm
598887f96325432045f414f2295c02959870f6ad5902bb57c4164a5cd47b4626
glibc-langpack-ve-2.28-189.1.el8.x86_64.rpm
9adb411dbd82c87bb87f9a61a22bda88ff42b57c6026800843b130678940c2b2
glibc-langpack-vi-2.28-189.1.el8.x86_64.rpm
45fd474ca83e6d8ea8758aa37ed0a2daac56dceaa31148abcbb1046f3264d222
glibc-langpack-wa-2.28-189.1.el8.x86_64.rpm
2407f1d140e0dfe7b8f162f6f8daa8496735fca15790f83254dd55bee2fb19b7
glibc-langpack-wae-2.28-189.1.el8.x86_64.rpm
e7610bccf6ab80b6b26f19e56c94f643175664669c1b45a5f60de719c5025c6b
glibc-langpack-wal-2.28-189.1.el8.x86_64.rpm
c6f68c799ea30b9c15a8e398cbbc608162406b1e66ddc855b08c0e813f50ee2c
glibc-langpack-wo-2.28-189.1.el8.x86_64.rpm
12bd05cc1328d867612b0161e1e0f87ce90c12dd1cae8100c94385ca1c3a7595
glibc-langpack-xh-2.28-189.1.el8.x86_64.rpm
4662b04f1d946ac2d86a3d0eca5ee31920c690ae40d62723f7a3d96a55d8a229
glibc-langpack-yi-2.28-189.1.el8.x86_64.rpm
f5d8153dd91e2eab3bdb1e0c694b007ae15eb5b0dc2b6d58ddd85c57a1a1532b
glibc-langpack-yo-2.28-189.1.el8.x86_64.rpm
ed6196a836558a6a8b65e9ea1d677c83d940b837bd5c36bb9acdcd1855d76e70
glibc-langpack-yue-2.28-189.1.el8.x86_64.rpm
e98ff8e35c57dd04ebbb209fde9eb9d6dfb759ea4159d5f18f720c2ce1c36964
glibc-langpack-yuw-2.28-189.1.el8.x86_64.rpm
d1f4e97770d5f32127ea983ae2d4b8c6a1e9167ee2024a32fcaf9c04348ba387
glibc-langpack-zh-2.28-189.1.el8.x86_64.rpm
a7e362ec479f9271c164b11cadc1d4dd35916b1738e35a89b1f77c1a1e0e2f99
glibc-langpack-zu-2.28-189.1.el8.x86_64.rpm
21fa773cbb34ea4bb2b906d571301b6750c4c21f5bec7a100a47ca03a9946eac
glibc-locale-source-2.28-189.1.el8.x86_64.rpm
81c7774e3530bf8d58365c266e5cd8c56f33706ac461154dcfa47d2677ec6c3c
glibc-minimal-langpack-2.28-189.1.el8.x86_64.rpm
478d7f4a0a140b0db342c43c8d42cd328a31a6959be5a6647fbd7dc7deda36b6
libnsl-2.28-189.1.el8.i686.rpm
06dab6cdfac3c20494035f6dbb45d4874b53590a8d83379972899dbfe272f0f7
libnsl-2.28-189.1.el8.x86_64.rpm
be5b71b907c688fd3a37e441de5ddab5fb235fda6cd635b0a12fb1a1b9dc8ada
nscd-2.28-189.1.el8.x86_64.rpm
65b4b0ae30bf39f45d1d5dbfb541715ceb2d32ca389629ce70915f0d8b4fb112
nss_db-2.28-189.1.el8.i686.rpm
27a9baf6d4611da147a9d34c9b8cb86cebbb58e90cd25b82d239d47db21b1133
nss_db-2.28-189.1.el8.x86_64.rpm
eebdb3a70b8fdf2972bfab8570b854310f479bdae010a2e6f7f944843123b29e
RLEA-2022:1985
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
NetworkManager-1.36.0-4.el8.x86_64.rpm
142b9f5aeb9f337f58f814856fa17e6039f17e247aad4294f3fd5fb8594b7979
NetworkManager-adsl-1.36.0-4.el8.x86_64.rpm
34b948c9cd7d178c45dbde533e5aad76cb5c96035e8b3a514305c5d2c182b073
NetworkManager-bluetooth-1.36.0-4.el8.x86_64.rpm
ca90959626c12fe456cdff383655229961252d2a1828c6173d1e4d5a3e7c0e13
NetworkManager-config-connectivity-redhat-1.36.0-4.el8.noarch.rpm
fef24e5778991cde815933a545b47096f40e17a224350436c0c5d7cb38aa93b4
NetworkManager-config-connectivity-redhat-1.36.0-4.el8.noarch.rpm
fef24e5778991cde815933a545b47096f40e17a224350436c0c5d7cb38aa93b4
NetworkManager-config-server-1.36.0-4.el8.noarch.rpm
16e19499cf71fa9aa3f6d0125927494b3396b0c648ee270526a253a864f11612
NetworkManager-config-server-1.36.0-4.el8.noarch.rpm
16e19499cf71fa9aa3f6d0125927494b3396b0c648ee270526a253a864f11612
NetworkManager-dispatcher-routing-rules-1.36.0-4.el8.noarch.rpm
de359a8aabf49c8c87da3a9165e02b3297801f3f563672bd3c465faea95da333
NetworkManager-dispatcher-routing-rules-1.36.0-4.el8.noarch.rpm
de359a8aabf49c8c87da3a9165e02b3297801f3f563672bd3c465faea95da333
NetworkManager-initscripts-updown-1.36.0-4.el8.noarch.rpm
a327bb51d16ab51e2f53012e32b902be6631891a546840b138737e6e10ef184b
NetworkManager-initscripts-updown-1.36.0-4.el8.noarch.rpm
a327bb51d16ab51e2f53012e32b902be6631891a546840b138737e6e10ef184b
NetworkManager-libnm-1.36.0-4.el8.i686.rpm
f87dc83287e8f1d45d4619c5608726ddb7a79a3c9e4f61514c442e2242c3f872
NetworkManager-libnm-1.36.0-4.el8.x86_64.rpm
56daed19829b734036cd9d08a248f9cbc1742283b43a8f5970e5d96268e544c8
NetworkManager-ovs-1.36.0-4.el8.x86_64.rpm
b73f8d9672902bcad110ff81e61766f7c906b0fb1179b23423abf4fbf6bfc528
NetworkManager-ppp-1.36.0-4.el8.x86_64.rpm
52775f739c0f8562b8f7039e063a4bad1e2ccd5e82ccd6aa344dc4f7cc425e79
NetworkManager-team-1.36.0-4.el8.x86_64.rpm
3401fe02db51538cbb701e454d86ab20eb242d9ff9ac274f07f0604a0714cae2
NetworkManager-tui-1.36.0-4.el8.x86_64.rpm
a6278b94483cb23e40988d727c9686e5d8415c374e19fbd049423a2b001493d4
NetworkManager-wifi-1.36.0-4.el8.x86_64.rpm
6505761153f23ad047e6bf03c455f339f367ff57eba0f781148a66d4da7284ed
NetworkManager-wwan-1.36.0-4.el8.x86_64.rpm
231a43eb65b1ad2d772b70e762c7a23aa6573164319abf06341d00f59e9ef0d7
RLEA-2022:1998
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
sos-4.2-15.el8.noarch.rpm
9896c7d46e258902fb8012ac0a5784001e411bfc1715be2608c7950f221445a9
sos-4.2-15.el8.noarch.rpm
9896c7d46e258902fb8012ac0a5784001e411bfc1715be2608c7950f221445a9
sos-audit-4.2-15.el8.noarch.rpm
92564df0461df6f0e53769c52a9358c884f5a413ecacad63c486087035c8612f
sos-audit-4.2-15.el8.noarch.rpm
92564df0461df6f0e53769c52a9358c884f5a413ecacad63c486087035c8612f
RLBA-2022:2002
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
iptables-1.8.4-22.el8.i686.rpm
88550ef7499c3a634674a27afc34981adf5a0567001d718d97509e8fbe8c255d
iptables-1.8.4-22.el8.x86_64.rpm
340950ff838ab20880e5aef76f7fcecf87f92bd20a9d347df5ae9aac5cdd8070
iptables-arptables-1.8.4-22.el8.x86_64.rpm
dededcfd4ddd990716fe4c294353b9aaeb12b8487a017a9dab0b72262c79b278
iptables-devel-1.8.4-22.el8.i686.rpm
d135a62590682feee704d10addb88bd044b2659e61dfd448d9f08dc4adae2e60
iptables-devel-1.8.4-22.el8.x86_64.rpm
e0d1f391cdeead02ff2f2551d1fc5b2046e6dd491bc2f91fceb6566140b9a772
iptables-ebtables-1.8.4-22.el8.x86_64.rpm
1bb3197162162bfe8ef0491743d54dcf5f2a08c110045ca96b8faf5617287803
iptables-libs-1.8.4-22.el8.i686.rpm
65dcc59e58a39bcdaa7c967d0447e39ab4161990f0540f326d442044e3a06f7f
iptables-libs-1.8.4-22.el8.x86_64.rpm
55bce6c2706d57ae5945e4f0532604a5dee785ff43405900efc1eb31ea067ef3
iptables-services-1.8.4-22.el8.x86_64.rpm
7e1bbd9cc8f369ef891d10a3a023a1b954a03609eda1d0bf535c7a482f2a1f01
iptables-utils-1.8.4-22.el8.x86_64.rpm
a908d36189b98c70ecd5a0a244d0c858766d521c3178a6265b8824e684443a61
RLBA-2022:2003
kmod-kvdo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
kmod-kvdo-6.2.6.14-84.el8.x86_64.rpm
d8984c6d3ee76fbf0dd62f0ccdb60aa302b17f0a3b11852efe665edb0af26b15
RLSA-2022:2008
Moderate: cockpit security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.
The following packages have been upgraded to a later upstream version: cockpit (264.1). (BZ#1984902, BZ#1992620, BZ#2004041, BZ#2008208)
Security Fix(es):
* cockpit: authenticates with revoked certificates (CVE-2021-3698)
* cockpit: pages vulnerable to clickjacking (CVE-2021-3660)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
cockpit-264.1-1.el8.x86_64.rpm
7757a1d9486de817eea1f44528a4322f6c79ccf407d9e8bf62eb43ffaf83814e
cockpit-bridge-264.1-1.el8.x86_64.rpm
b7217b23cb3bb5a5d5845c7336059c0b7cd2726f645b7c101e92db00cededd62
cockpit-doc-264.1-1.el8.noarch.rpm
e2d4f83f4d3472036c3e4e4aaf75ce20cf63c4179e48593aab5dc115719c9d4d
cockpit-doc-264.1-1.el8.noarch.rpm
e2d4f83f4d3472036c3e4e4aaf75ce20cf63c4179e48593aab5dc115719c9d4d
cockpit-system-264.1-1.el8.noarch.rpm
2be6eab904fd072df9cd5d71e4afd82c07879690ff0976909b286d1dd1566377
cockpit-system-264.1-1.el8.noarch.rpm
2be6eab904fd072df9cd5d71e4afd82c07879690ff0976909b286d1dd1566377
cockpit-ws-264.1-1.el8.x86_64.rpm
d52f0f16a9b12b1da99ad7c50eb62b14221cd19c3a2b1e989c68f1c24c756490
RLSA-2022:2013
Moderate: openssh security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured (CVE-2021-41617)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
openssh-8.0p1-13.el8.x86_64.rpm
fb75a209f852b892499b31fadd5839c94b3881f739bca45b26ef046c275fd9e2
openssh-cavs-8.0p1-13.el8.x86_64.rpm
140b8e02ad147f5c5626647e09278532598ba3c98f378bd2327bb5fbb88141b8
openssh-clients-8.0p1-13.el8.x86_64.rpm
65995c96412725f400eed03a19818dd0f794c532269a7b43658033d461602823
openssh-keycat-8.0p1-13.el8.x86_64.rpm
1b0cb2b81e106b512eb22f8627da3fd599729120d827665cdfbb93a8b5d974e5
openssh-ldap-8.0p1-13.el8.x86_64.rpm
cd0ddfcb967a89bcf55f9abc14b5ad2145cfdb9494a1d9ec1a6e4f0b0197b8ff
openssh-server-8.0p1-13.el8.x86_64.rpm
5ce4d272ec86a1863ba1ac4254e8f9f39aab50351c3bf67b1fe133600ace2714
pam_ssh_agent_auth-0.10.3-7.13.el8.x86_64.rpm
b5b1c30026618f4901699c1ec74243d79be7466faa5d4034feaee00a4d3ac74c
RLBA-2022:2019
gdisk bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gdisk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
gdisk-1.0.3-9.el8.x86_64.rpm
bc7b6612113dc8aafcfaaeaef5b570c9e3b6ec427abb2d2312ecdc3a20a7f9b9
RLBA-2022:2025
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libnfsidmap-2.3.3-51.el8.i686.rpm
6bd3c62329ea8826de2d7e985b5c88efdcd8657bb38903918e3ec4cdd92e44cf
libnfsidmap-2.3.3-51.el8.x86_64.rpm
5e74e306dbcc44fc6e2df75b5125ee3b134cb77198c06683759b5b1f06629cab
nfs-utils-2.3.3-51.el8.x86_64.rpm
b5a4014cd7f96c25011131c218a0b06a7c4380ec92d963ae88d2e3934292cff1
RLEA-2022:2026
strace bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
strace-5.13-4.el8.x86_64.rpm
d7101d8d258067bcdfc9ed4cc2180f3462b465ee2e4238693455796c998ef9f6
RLBA-2022:2030
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
opencryptoki-3.17.0-3.el8.x86_64.rpm
a6064c8eae008304bec06ef238f47072561a07c5a54e7876c2c054ab6cecb80f
opencryptoki-icsftok-3.17.0-3.el8.x86_64.rpm
2ddb78ba085e151d80fde68699300070846b6b4e3726a45c944dc537c07d173b
opencryptoki-libs-3.17.0-3.el8.i686.rpm
0113501bc350e55ceddf0b0f839ebb8c872cd5e9c4a5be297137e80720fef90f
opencryptoki-libs-3.17.0-3.el8.x86_64.rpm
c82d4ee8d89afcac8c7e10ded6a4d708bd8539f4e7b2866bb9346abad7e41eb7
opencryptoki-swtok-3.17.0-3.el8.x86_64.rpm
8bdc9ebda5e6573fb9e73b3ee89fda5d472b4ead2874e551ad7bea2df45018aa
opencryptoki-tpmtok-3.17.0-3.el8.x86_64.rpm
2a62bb5d152e1345196b4784620da23e60a536da91e115a20af5404df67370f8
RLBA-2022:2032
cups bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
cups-libs-2.2.6-44.el8.i686.rpm
0cd97c428a535ab56b0329cf060243a843de17526c50eaacadb21939d0c8d6da
cups-libs-2.2.6-44.el8.x86_64.rpm
a6df858d0c439f79ee51b008e3125cc7f9c495f75f5fdc2ecea526f3a9365a73
RLBA-2022:2047
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.29-3.el8.x86_64.rpm
7f328b706cf37da13dacb7ad3171864d7a83f298946853f29c56bf0c4e68677e
python3-cloud-what-1.28.29-3.el8.x86_64.rpm
03d3f44a60a38f888239bfae8ea5c74afde0bdd4ed5bc21d7400de4fab4ae5ab
python3-subscription-manager-rhsm-1.28.29-3.el8.x86_64.rpm
3a450feedddd3f62ee0b7b9d40b3c4be78e0efa57a6d30c127315fe14fac980f
python3-syspurpose-1.28.29-3.el8.x86_64.rpm
698db96fb32e66e9fa26ecac3db9204d5791822f6a15d91efc590e02c78cdcc4
rhsm-icons-1.28.29-3.el8.noarch.rpm
e5b8d8298eb1d2df57c1b78c873155f29df752ded25b2a7ed9d9278d7a12b228
rhsm-icons-1.28.29-3.el8.noarch.rpm
e5b8d8298eb1d2df57c1b78c873155f29df752ded25b2a7ed9d9278d7a12b228
subscription-manager-1.28.29-3.el8.x86_64.rpm
c135fbc333616ac74ce1ae91dcbc65bf497afd1dfd08fc12f0629bf0f22334e8
subscription-manager-cockpit-1.28.29-3.el8.noarch.rpm
12520ecdb5459f642190bb41abfcf7442aa7e11aacd199ab52f766c690065890
subscription-manager-cockpit-1.28.29-3.el8.noarch.rpm
12520ecdb5459f642190bb41abfcf7442aa7e11aacd199ab52f766c690065890
subscription-manager-plugin-ostree-1.28.29-3.el8.x86_64.rpm
4430a54007e19831eaaa4c6122c50b0ee7d0555356367597484923b364e6d4b8
subscription-manager-rhsm-certificates-1.28.29-3.el8.x86_64.rpm
05e6e293cda91243032d22618c504584e9c5e1cea8e0882161ece455f32b4f08
RLBA-2022:2055
elfutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
elfutils-0.186-1.el8.x86_64.rpm
56999c7e3e76ef1bc2559357c4fabed9d4f64aa5f0fcc8aee0e2f52036d5f1c6
elfutils-debuginfod-0.186-1.el8.x86_64.rpm
67c9778e1c27f4d3b7d888f3a41f11e199ef18d19432fed055352ea5b21b98f2
elfutils-debuginfod-client-0.186-1.el8.i686.rpm
f853713dad881e02b3d749c966afeb01831a49933307fcccc305f4681d380292
elfutils-debuginfod-client-0.186-1.el8.x86_64.rpm
186e601d10098cb7f3385e1620f2e928fa42575dd31287dc9fe57ab6a074e0bd
elfutils-debuginfod-client-devel-0.186-1.el8.i686.rpm
e56c862d6a588c9846ace751de911281b3e1810e0f36f8fa12f77238274d3bd0
elfutils-debuginfod-client-devel-0.186-1.el8.x86_64.rpm
2176ed8272219f3deb73b15d61ef26779b0dd5048816575374c69cf9c25c13c8
elfutils-default-yama-scope-0.186-1.el8.noarch.rpm
11080f14e2c3f331365b2f8ec45b3fb5a8ed009f09de690c48cf818db21e2eae
elfutils-default-yama-scope-0.186-1.el8.noarch.rpm
11080f14e2c3f331365b2f8ec45b3fb5a8ed009f09de690c48cf818db21e2eae
elfutils-devel-0.186-1.el8.i686.rpm
223f2ef7a369012f730fa8ade8e7c363045a83f170f8ee694c8e1e135161852a
elfutils-devel-0.186-1.el8.x86_64.rpm
ed9404f89f43fa1c65b10c6e7517747980282f8dd01156661045ff53906ed7ca
elfutils-libelf-0.186-1.el8.i686.rpm
0653aecc9924e4bc0a5f91c11c4a22d778acd6e66337a1ae7c46933e1b2aaab9
elfutils-libelf-0.186-1.el8.x86_64.rpm
d3915a59f2961d8291668ebb3ac669ce9663b4fdf55153af8110e5b99462c916
elfutils-libelf-devel-0.186-1.el8.i686.rpm
cf1b5832a0be9d784aa3f94d70a7d86a497f4b1cecd2e37461ac3a981a684a86
elfutils-libelf-devel-0.186-1.el8.x86_64.rpm
e958df88661f68508642b3a0bb2a7cf5fda8e6a712e0066a4174f5bd7350c443
elfutils-libs-0.186-1.el8.i686.rpm
3aa2e5740c6b9e38fab2a6a663807508483edc384676bb4a53c304e1544deadf
elfutils-libs-0.186-1.el8.x86_64.rpm
6d56f966d79707d38b5ab7d52b839a148685776b26e697f2c7f791d7c6f20efc
RLBA-2022:2068
policycoreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
policycoreutils-2.9-19.el8.x86_64.rpm
62db592605c4270be5c98f73a59193b0ddc2a4c448e30ce41da9624d887e7c51
policycoreutils-dbus-2.9-19.el8.noarch.rpm
cc4c3681f131c8a71ac5ff45468f2cb220e9838bf90e315ea0ee52e69b4751aa
policycoreutils-dbus-2.9-19.el8.noarch.rpm
cc4c3681f131c8a71ac5ff45468f2cb220e9838bf90e315ea0ee52e69b4751aa
policycoreutils-devel-2.9-19.el8.i686.rpm
8f929facfb0b865a458dc45b1c8cfd282fbb294b67d37c51e7aec2019258b5d7
policycoreutils-devel-2.9-19.el8.x86_64.rpm
b00267174801b2665391c3d92bcded84e0a14be78217630ac46afdeae9a5b121
policycoreutils-newrole-2.9-19.el8.x86_64.rpm
2a2cfa93b5a00a4c6b6f8395fcf6a85e68afc527077291f2af4c20d72681f3ca
policycoreutils-python-utils-2.9-19.el8.noarch.rpm
f66c33dd17315357253779ffdf0341fa1014dbb19ebb394c4c8aa62707c1247c
policycoreutils-python-utils-2.9-19.el8.noarch.rpm
f66c33dd17315357253779ffdf0341fa1014dbb19ebb394c4c8aa62707c1247c
policycoreutils-restorecond-2.9-19.el8.x86_64.rpm
54d8fa43ee875ec810e8ce8054d86797c6423015717cc8949dabeca112b71002
python3-policycoreutils-2.9-19.el8.noarch.rpm
12e5e07af3908292fb33b74262f0af11ceea8f36aabe8ee535c1e66180a7aef1
python3-policycoreutils-2.9-19.el8.noarch.rpm
12e5e07af3908292fb33b74262f0af11ceea8f36aabe8ee535c1e66180a7aef1
RLBA-2022:2069
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
systemd-239-58.el8.i686.rpm
b2ceeabd47d571dd86f0aac853f5169e8683ce8599f2e0ab90207bd9c4c695d0
systemd-239-58.el8.x86_64.rpm
25d949f377d0d49ff18b62f980bf9b4f570731ec8b08520d153c100a8f033e10
systemd-container-239-58.el8.i686.rpm
d028d442199ed13e8a86f95daaed556be0bca5b25dfc2cbfff43bac0b9d81e83
systemd-container-239-58.el8.x86_64.rpm
1157f74cdd0cfd3d569390adf7abf57393107c0e05302e09ea8b6a907ffec84a
systemd-devel-239-58.el8.i686.rpm
b393622173a6fcfe66eae0b9b9e35221f57585b2a64560ef7acb8bc2c914c46e
systemd-devel-239-58.el8.x86_64.rpm
f7eeb4eb773acc8175df02bfb88b3066134b31930c3bffb62a942aa0dce0f973
systemd-journal-remote-239-58.el8.x86_64.rpm
18b541875221247e3857efe2c68d8aa388f46f759ddaea25e0ab4ed8e05ee106
systemd-libs-239-58.el8.i686.rpm
85b4aa000f31eac2d81b01416469be32c83c92aa7ba1ef26ace21f0eef8cd340
systemd-libs-239-58.el8.x86_64.rpm
e79712fa542b14614cf34e97267b9b3b3da8902e71ba0bbfed3d377c2e05f920
systemd-pam-239-58.el8.x86_64.rpm
a5dcdeac26153b6a70ba2107deabc0908b4b22f497fd6a47c14ffe684925cafc
systemd-tests-239-58.el8.x86_64.rpm
7dcd80e0f408a624e9dfb50cda1e44a09c51e423483709569c1d98082badb2c2
systemd-udev-239-58.el8.x86_64.rpm
3d965c0432fd0ef23507a8d5ce4598c2b09b3714272a84329a9fe2bce307223d
RLBA-2022:2071
dbus bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
dbus-1.12.8-18.el8.x86_64.rpm
cc7ad863b85ba6e6576c4eb7ae26eb903bb321b1b9262dddbe6991dbd2521146
dbus-common-1.12.8-18.el8.noarch.rpm
0554c08b1e43fe097efb482289d05d99ae942a3fc40b93a32637025e5bf1c787
dbus-common-1.12.8-18.el8.noarch.rpm
0554c08b1e43fe097efb482289d05d99ae942a3fc40b93a32637025e5bf1c787
dbus-daemon-1.12.8-18.el8.x86_64.rpm
34599297fee046ba32b3cb673e1ec843c7049abf528bf3407757aecbfa3a3b22
dbus-libs-1.12.8-18.el8.i686.rpm
dd0704d653e85da2c512349c8fbc7f95cc3d3fb2d5229c11b97016ad5bb43ba1
dbus-libs-1.12.8-18.el8.x86_64.rpm
0afef103d6adf23c1545b79bf1de0fc6697014f0cb19d1e3fd92c215235b2d22
dbus-tools-1.12.8-18.el8.x86_64.rpm
1209296e40832b6c1cb5477f69c66f7cfc31544211c6eb436251bc684aafe2d1
RLBA-2022:2075
libtalloc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libtalloc-2.3.3-1.el8.i686.rpm
4341b0282eb113305e771900283cb7f9650b0b7b05f2280dc00154096c3681b6
libtalloc-2.3.3-1.el8.x86_64.rpm
63cd3334b8eeec495180a2e303e281b4a7ebaceeac8cf2a1b1ed441986aae7ad
libtalloc-devel-2.3.3-1.el8.i686.rpm
cf01c116222c5f87a5614d22723a1b3cc2ee4ccf13485fb69d29f8c6d8d5805d
libtalloc-devel-2.3.3-1.el8.x86_64.rpm
91e600f26d77bac657f4f080e3b18cb54c03d2de2adcb1223fff112a7ace88fa
python3-talloc-2.3.3-1.el8.i686.rpm
13cebc64b047153090ee5daf85a6c889c649a2532ab13eed0166fde71af0acb0
python3-talloc-2.3.3-1.el8.x86_64.rpm
f4b7d2b6408bd54086fdee158b58e1d1611930f96293586f3af9c8cc718ae227
RLBA-2022:2076
libtdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libtdb-1.4.4-1.el8.i686.rpm
75aa3f83fea1b45bc5dc6ee96c23257462fe4e1d80cca92f3c77883aa8931f74
libtdb-1.4.4-1.el8.x86_64.rpm
4a65d96ac3c77775eb2fc2588c1678c357751585de0bb3759c7f547deeb9bf22
libtdb-devel-1.4.4-1.el8.i686.rpm
157349c84b50eae2d0bb659c483c5ade4f3440bbe7eef919f323f91cc2b4c90c
libtdb-devel-1.4.4-1.el8.x86_64.rpm
04251cbb2a2b92e0df36e8001bb8fee669be097ffe386622bf96ccba942198e7
python3-tdb-1.4.4-1.el8.i686.rpm
0c0ac7329659eccf12efe9f4f23de8f7bbf5776d20252a0ce81e57b0ec1bd965
python3-tdb-1.4.4-1.el8.x86_64.rpm
9b87fa8c1d4378ebb1ac2dedc7970ead4539453628ffb23f5789f9a29dda33b5
tdb-tools-1.4.4-1.el8.x86_64.rpm
ba733e8636805dcce3657e96d655aacd567f9301e13fe0dd201273c93cba067a
RLBA-2022:2077
libldb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
ldb-tools-2.4.1-1.el8.x86_64.rpm
53aab71c4a7a3a1e036572846e2cb1292a23bccc2b488e0d218c1606c78df304
libldb-2.4.1-1.el8.i686.rpm
5db3f58c8800730796903d16d389caa42e5fbe291a70e868adcf96d064d47ddb
libldb-2.4.1-1.el8.x86_64.rpm
265b6c8dab70e0855abd0508ae206a5745a5ef3a38e0ff647cbec10b062cdd2e
libldb-devel-2.4.1-1.el8.i686.rpm
89aaf7f321f0d3ee04824942282599f79973ed3232610339fb4a5c9fb9fba1b9
libldb-devel-2.4.1-1.el8.x86_64.rpm
af182132542330197243fe9fc8a606d0b5f2d1064bc9297b635591465f3b14a9
python3-ldb-2.4.1-1.el8.i686.rpm
6483158dc9147651a5bee8a259cc4c57a3620027f61599ee6f77d3525fdf625e
python3-ldb-2.4.1-1.el8.x86_64.rpm
1baeda807396f45f604ca78b65244c238b8193d26a5a565bf84dbe24f482e1fd
RLSA-2022:2081
Low: bluez security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files.
Security Fix(es):
* bluez: memory leak in the SDP protocol (CVE-2021-41229)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
bluez-5.56-3.el8.x86_64.rpm
1ad887b092cea4d5f497d47c0e20e41ea6f0a94df3e69a689b8708de2047465f
bluez-hid2hci-5.56-3.el8.x86_64.rpm
1cc0c8cbbc6cd93452da85022aa0b27bcb4ae12164caf26b9df27562d554563a
bluez-libs-5.56-3.el8.i686.rpm
177e300b60d612b0c19defd0dd6ad2a8b462c4bc9bf79a129336729ed8128bd9
bluez-libs-5.56-3.el8.x86_64.rpm
3abbf5a2891af34c3a5090d9883a3b64317c57542f535b2682914f6b39ee5403
bluez-obexd-5.56-3.el8.x86_64.rpm
aacea87f09cb3f99ce71136f497a7e7d72d9a937c64d7f2bbc37206acc5a1546
RLBA-2022:2084
autofs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
autofs-5.1.4-82.el8.x86_64.rpm
bd05970213888bfcc9bae04e87b8802085577030cae25b0170d8bb2c84620cc9
RLSA-2022:2092
Moderate: bind security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
The following packages have been upgraded to a later upstream version: bind (9.11.36). (BZ#2013993)
Security Fix(es):
* bind: Lame cache can be abused to severely degrade resolver performance (CVE-2021-25219)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
bind-export-devel-9.11.36-3.el8.i686.rpm
d427d4267594e905ce7111757a6bfae6f78a5f43f7e5bca43c513f924e7826a0
bind-export-devel-9.11.36-3.el8.x86_64.rpm
8993549066c41deb021449bb3c35a3cf27a5bbfcad4731d30a2729fbe7f9f9cb
bind-export-libs-9.11.36-3.el8.i686.rpm
53881d4802c4689db7eed32440f099f4eda02782df2e66522a4c682766784753
bind-export-libs-9.11.36-3.el8.x86_64.rpm
0fab2ceed4eccf67d3af30491f0274a0cf0d21d6c4cd0e89656074b07cb123fc
RLBA-2022:2096
audit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for audit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
audispd-plugins-3.0.7-2.el8.2.x86_64.rpm
b7a5fb40aa92ab59ddab7bbda824b46e791c99d8a539fdbf867a767a6ac858d6
audispd-plugins-zos-3.0.7-2.el8.2.x86_64.rpm
452c577e15a7d447063f7f42a5815de7bba422b032b4ec979603f335c7a96875
audit-3.0.7-2.el8.2.x86_64.rpm
97ab82e5b5e69f27cd542a16a329a4cb63332be3f517d4bf7492ae22bc41da71
audit-libs-3.0.7-2.el8.2.i686.rpm
4813e0f29687e232226bb70b39aa4fd86fbbc79a8cd7adf54a3115812f236610
audit-libs-3.0.7-2.el8.2.x86_64.rpm
4890f0e08dc687c440993f43b563b58c055705ea1230e996554a10bcd78b441f
audit-libs-devel-3.0.7-2.el8.2.i686.rpm
78b74548d4961cf900445daf9694134c7c33ca29ce7a2457fc435ae265acda48
audit-libs-devel-3.0.7-2.el8.2.x86_64.rpm
039ab530b1323272332c8aee00524e40f06324c46735e5456d92407614f6792b
python3-audit-3.0.7-2.el8.2.x86_64.rpm
75658d912518e1568d7d292b64c1d60fe6938d0fd23dcabe65b81c274a3bfb99
RLBA-2022:2102
pam bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
pam-1.3.1-16.el8.i686.rpm
8fd6669066365945673d9e957ebc0dd500a51c1af0408097e6f7a36f8a0e69d0
pam-1.3.1-16.el8.x86_64.rpm
bc046ff5775f55200382ffd6196313efc5373b1ef3cc0eac3a888c9fd4576eef
pam-devel-1.3.1-16.el8.i686.rpm
e7bdd38737d60be99e7a0714e975cc8685f3fa7a937d4fa0162e638b03f7e61a
pam-devel-1.3.1-16.el8.x86_64.rpm
ab1c18525f3de181516b1011f88ce072c8040907d817fed2702b7d8f8e7cdeae
RLBA-2022:2103
libcap bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libcap-2.48-2.el8.i686.rpm
0bc9e7a8b89bda00e043e713d71c05d16253b8b436cc9bfd49dc07bc855a004f
libcap-2.48-2.el8.x86_64.rpm
db7dc7696d38a0d87f671ce185d2d4fe2d8455b5d1c292efbd8088d489f40493
libcap-devel-2.48-2.el8.i686.rpm
3f92c226ed5472e280e883c735415a858e498a1def8c209aecee501d7b21e9bc
libcap-devel-2.48-2.el8.x86_64.rpm
2b8fcda7dc51f3819febcd338d0eb105d5119f5d1215fcf0ad9c0ec7009e477c
RLBA-2022:2104
e2fsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for e2fsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
e2fsprogs-1.45.6-4.el8.x86_64.rpm
f5fe709bed663f283e9b1d2b80639f29d652aea99d551b3079f576eb1132a2e7
e2fsprogs-devel-1.45.6-4.el8.i686.rpm
cdaa2380c40cb04e31708fd48761a8bb33da9a4139bede4c943af75294b73845
e2fsprogs-devel-1.45.6-4.el8.x86_64.rpm
9ad4b4a513f41c30af311379f7f0de84aa24340ed8522626c1fab0abd218266b
e2fsprogs-libs-1.45.6-4.el8.i686.rpm
9044ed1afc2279ffd97ab7ce368810576434eec81b263cfa3c696b2f0a6526ae
e2fsprogs-libs-1.45.6-4.el8.x86_64.rpm
026a8f8081844d0e8cef1530d556f2c263ad25bbd6c8298f6ed2dbdb183aa276
libcom_err-1.45.6-4.el8.i686.rpm
08418de04aa5a44dbc997023648ea5e8962e6ec13dc6219970af33f8a7c55c7c
libcom_err-1.45.6-4.el8.x86_64.rpm
a127914d5a098c23432d72d05a59592fffb01036a1b9d824503a1358d9b77611
libcom_err-devel-1.45.6-4.el8.i686.rpm
60d89da00bbcf5ef0fe399571098d7e059931b093b27719bde8876216905d362
libcom_err-devel-1.45.6-4.el8.x86_64.rpm
6d93fe99c3394821765a00bbf08ab3ce46bc1c7c5ca449fb83d468bdd873e880
libss-1.45.6-4.el8.i686.rpm
7f879141f9a1cfcf01fefde6abd8e9393df4d296af92bc2e92f6efd4270e1134
libss-1.45.6-4.el8.x86_64.rpm
e7be0c2cdb1b7c50536a413d405954b75a7b1888cc07e80505ab363f2d0cabf5
RLBA-2022:2105
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
dracut-049-201.git20220131.el8.x86_64.rpm
5ba247921d319f1ed87d2ddb37b09edc3498adb1666e84e158cf42028d4d6421
dracut-caps-049-201.git20220131.el8.x86_64.rpm
88649f59a2175d5956011d4476a41dca0244de8192c22e4fe4d3ffd264528e32
dracut-config-generic-049-201.git20220131.el8.x86_64.rpm
8276e0f8dfaaee9506f99253698e70f7444265bc542061f56cead74425f454f6
dracut-config-rescue-049-201.git20220131.el8.x86_64.rpm
38b0582bf2dac45e4d83a5a8715524007c0d667f838d5bf811a867493679ec63
dracut-live-049-201.git20220131.el8.x86_64.rpm
37ed7b33f5b03ba1f83f54e827ff2ad5a1cd1afd61dd207d933ae314e7a733dc
dracut-network-049-201.git20220131.el8.x86_64.rpm
0105bf88b189c5c55084bfb7c126487193511bd0539887e817fc541e3feb18a1
dracut-squash-049-201.git20220131.el8.x86_64.rpm
1e4031341dab0e79af4d689c3554c9f1228ca3c03fb642e5d1735bf77bb1908f
dracut-tools-049-201.git20220131.el8.x86_64.rpm
880a4e506d8d3ecdce2fff9d6a28437b5e97b13afa9b38ef69b7eff9140baaa8
RLBA-2022:2107
fuse bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
fuse-2.9.7-15.el8.x86_64.rpm
e0b357199810322e3aaaea253901de95ea07c1abbefc15cd965cb23f0548f2cd
fuse3-3.3.0-15.el8.x86_64.rpm
1ea10c8f464f67ecd0163322d9299853a7a90fb1913b12df19aa6995f379e457
fuse3-devel-3.3.0-15.el8.i686.rpm
d41666731ce02a24cb02b884724e25737b592fe682e78212cefa3c54c22201b2
fuse3-devel-3.3.0-15.el8.x86_64.rpm
96bc6c6cab63dd94f0d5008ed5192c3216f87e1d60e026a25b1ba27d5b9c9475
fuse3-libs-3.3.0-15.el8.i686.rpm
c2ac48cd8560aca9784c04a10755c8587dfca6661bc09c818bd8aa94eb05c71c
fuse3-libs-3.3.0-15.el8.x86_64.rpm
6c5f5397dbe1bda20cffc3fe7ae956b81f09bff33dde742620a00a28ffbe16d3
fuse-common-3.3.0-15.el8.x86_64.rpm
e64e6a70e19f8bf28628595d4502204fd819dad0b13f45a2d218350b2654bc2f
fuse-devel-2.9.7-15.el8.i686.rpm
7cdf96ef97b5d382833e609e111c09f2f0f75a471e3747d92bb8bf6664baa253
fuse-devel-2.9.7-15.el8.x86_64.rpm
aab30ee0cc8237a25614a7622325b7a085808006bd26f4a05e513f7fe9fdd21a
fuse-libs-2.9.7-15.el8.i686.rpm
4ae5afcaafdd7b779b926bb3d110b4d13c529dd95e43ed6e09f6f9e5a8ff6c82
fuse-libs-2.9.7-15.el8.x86_64.rpm
d247df2f5a145478c3378c96d04ee6f5cb60c5698c495de1d400d97a3a83b3c3
RLSA-2022:2120
Moderate: zsh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for zsh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell (the Korn shell), but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions (with autoloading), a history mechanism, and more.
Security Fix(es):
* zsh: Prompt expansion vulnerability (CVE-2021-45444)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
zsh-5.5.1-9.el8.x86_64.rpm
95d4a1837a13e91c833c4a76a20fc6b5f302b6e80093395689844bf57484fe8d
RLBA-2022:1987
kpatch bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kpatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
kpatch-0.9.4-2.el8.noarch.rpm
4138abc761e5203e31fe67101c5544caf3373e3112763cf40b99f5018e491651
kpatch-0.9.4-2.el8.noarch.rpm
4138abc761e5203e31fe67101c5544caf3373e3112763cf40b99f5018e491651
kpatch-dnf-0.4-2.el8.noarch.rpm
07bb0ee55a4ca638be72c37e8e61ff01627b3e955be7f989d8a281331b73a089
kpatch-dnf-0.4-2.el8.noarch.rpm
07bb0ee55a4ca638be72c37e8e61ff01627b3e955be7f989d8a281331b73a089
RLSA-2022:1988
Important: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)
* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)
* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)
* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)
* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)
* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)
* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)
* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)
* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)
* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)
* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)
* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)
* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)
* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)
* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)
* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)
* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)
* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)
* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)
* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)
* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)
* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)
* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)
* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)
* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)
* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)
* kernel: information leak in the IPv6 implementation (CVE-2021-45485)
* kernel: information leak in the IPv4 implementation (CVE-2021-45486)
* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)
* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)
* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)
* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)
* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)
* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
bpftool-4.18.0-372.9.1.el8.x86_64.rpm
9a0d8a8788fc9b7becbec619d9275e0618dc8e3806cbdb51bb2b90e1b7c3100d
kernel-4.18.0-372.9.1.el8.x86_64.rpm
026435c643b7f21240216edcd1f37435ad8c9b97124d4d97f224481df74ebfe0
kernel-abi-stablelists-4.18.0-372.9.1.el8.noarch.rpm
d0a485f27dfb1b00828894ef76f71bf086ba6f1189092e479b56798c45a2455b
kernel-abi-stablelists-4.18.0-372.9.1.el8.noarch.rpm
d0a485f27dfb1b00828894ef76f71bf086ba6f1189092e479b56798c45a2455b
kernel-core-4.18.0-372.9.1.el8.x86_64.rpm
15014d0a31af7a9985d683037d337b0a9141f634fe2a9c3bbb1379bebba747ee
kernel-cross-headers-4.18.0-372.9.1.el8.x86_64.rpm
e0762167fc49dce89bd31a884863fe51fe3f24c0b6be9225cf6b84f4c7c9aa8b
kernel-debug-4.18.0-372.9.1.el8.x86_64.rpm
9ec592fcfd42b7dfca9f836de3cd8f932e1de85e68d5b3bbfd5ab81c54c0227d
kernel-debug-core-4.18.0-372.9.1.el8.x86_64.rpm
64b3531483d37c1bdeeb4134c064b8548cad8874dd045a9a59ac75747244cb0e
kernel-debug-devel-4.18.0-372.9.1.el8.x86_64.rpm
86832a90c2c19d8dc93e16d51ac5b23cb51e7c9a96b198f239b2893c7a93ceb8
kernel-debuginfo-common-x86_64-4.18.0-372.9.1.el8.x86_64.rpm
c3040851994ab014eb6aa133ff1c8a62a612b9336614063348d5b45077b67545
kernel-debug-modules-4.18.0-372.9.1.el8.x86_64.rpm
081fa8729d1e8e0615709489c159d0cb80932a3dd19f958f9fb59a3e6bf28293
kernel-debug-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm
2cb72354601033f2e7fe709824df692a9cb9df0532f11e2795ae55132ab0db17
kernel-devel-4.18.0-372.9.1.el8.x86_64.rpm
b234aa57fdbb83ed5e3e143ee045353b8437df539a85791bb6df17328b813665
kernel-doc-4.18.0-372.9.1.el8.noarch.rpm
836b52707ef57189bbe89194a01b511dfb51ef74dc22db6120afcc457d7eb01a
kernel-doc-4.18.0-372.9.1.el8.noarch.rpm
836b52707ef57189bbe89194a01b511dfb51ef74dc22db6120afcc457d7eb01a
kernel-headers-4.18.0-372.9.1.el8.x86_64.rpm
afd0e30be1bd93526e587b10fe98123178970ddf4450dfed903b736015df9a2b
kernel-modules-4.18.0-372.9.1.el8.x86_64.rpm
b20075d37c305cff9572332f66e59e79019b8b36a22ed6643a1544d74aa2ad1c
kernel-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm
b357f737a916527cd02b0050164cba377bd4cdf67b56186abe874fff16d94ace
kernel-tools-4.18.0-372.9.1.el8.x86_64.rpm
2c8c2ef6469ae0b9143dce68285f5cb94b446b9a0aac4b49387e37748fd21f3c
kernel-tools-libs-4.18.0-372.9.1.el8.x86_64.rpm
509a2c15c6870142653003429a8e6120dfd70da731a9fb09ff7c407e9b5e5603
perf-4.18.0-372.9.1.el8.x86_64.rpm
03f5cdeec963d518f4e4f4cc07e30bfbab5d54980abf1ca8a2d1b3776f68d46a
python3-perf-4.18.0-372.9.1.el8.x86_64.rpm
8da50029bda296ce350187948af3aa213d0e2f8cd4444cf58fbe87966a77791a
RLBA-2022:1992
rsync bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
rsync-3.1.3-14.el8.x86_64.rpm
cf88bf32b007658b829b05ec346d310297d85a8d9139b6a3befeb18c7d88739c
rsync-daemon-3.1.3-14.el8.noarch.rpm
7ca7d967e5c9b8ef2326677520dbfdf82bce352f8b33b6bf0e2225db9dc19baa
rsync-daemon-3.1.3-14.el8.noarch.rpm
7ca7d967e5c9b8ef2326677520dbfdf82bce352f8b33b6bf0e2225db9dc19baa
RLBA-2022:1993
bash bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
bash-4.4.20-3.el8.x86_64.rpm
ecc5bff097cd1b30bf144290872a3add5d3f07ac438dcbe71709147aa0bf5803
bash-doc-4.4.20-3.el8.x86_64.rpm
f03815a86293ed3aa9eb44189a9c998ae9374d6554df144e7aecd028fefc4e1c
RLBA-2022:1995
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
selinux-policy-3.14.3-95.el8.noarch.rpm
6e85269404fcb3646db4adeb05b996fa3fb77b6ff33a0b9c9e8ef72cbaf555d4
selinux-policy-3.14.3-95.el8.noarch.rpm
6e85269404fcb3646db4adeb05b996fa3fb77b6ff33a0b9c9e8ef72cbaf555d4
selinux-policy-devel-3.14.3-95.el8.noarch.rpm
c7cebb847eaeecd3cd5726e73cd0103f86c7203f21f18df0beff6f40ab4327c3
selinux-policy-devel-3.14.3-95.el8.noarch.rpm
c7cebb847eaeecd3cd5726e73cd0103f86c7203f21f18df0beff6f40ab4327c3
selinux-policy-doc-3.14.3-95.el8.noarch.rpm
04ebd05f9696edbe4ef0fb15fabeca9b26df7f5ece236ce171cd1aa57b4164af
selinux-policy-doc-3.14.3-95.el8.noarch.rpm
04ebd05f9696edbe4ef0fb15fabeca9b26df7f5ece236ce171cd1aa57b4164af
selinux-policy-minimum-3.14.3-95.el8.noarch.rpm
e7af90f1a96e2ad0f27c0e5436262ff0f3b1d1804a8934e0099f8d288ef0330e
selinux-policy-minimum-3.14.3-95.el8.noarch.rpm
e7af90f1a96e2ad0f27c0e5436262ff0f3b1d1804a8934e0099f8d288ef0330e
selinux-policy-mls-3.14.3-95.el8.noarch.rpm
c944ffaad7ef33948d9b317a331112f1499b5869ba0b835c49248ea4fe896221
selinux-policy-mls-3.14.3-95.el8.noarch.rpm
c944ffaad7ef33948d9b317a331112f1499b5869ba0b835c49248ea4fe896221
selinux-policy-sandbox-3.14.3-95.el8.noarch.rpm
e4e31d5c82ed79c8ceaff25ce8228c963699167f6c63d33f2dac853f0662703c
selinux-policy-sandbox-3.14.3-95.el8.noarch.rpm
e4e31d5c82ed79c8ceaff25ce8228c963699167f6c63d33f2dac853f0662703c
selinux-policy-targeted-3.14.3-95.el8.noarch.rpm
f151753a94a0af303a91330e853c8170f69dbdc58c0dfeb5a6a6a576e9eebf60
selinux-policy-targeted-3.14.3-95.el8.noarch.rpm
f151753a94a0af303a91330e853c8170f69dbdc58c0dfeb5a6a6a576e9eebf60
RLBA-2022:2000
glib2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
glib2-2.56.4-158.el8.i686.rpm
98bfb5b5634553129a90cd3b30ca9f5eef3a1eb02243976f2cc97ca6a7aa1cba
glib2-2.56.4-158.el8.x86_64.rpm
57c431c4918f898caec1891d320ed6a2073777f5a624ee21af5f9f8c4c9ea873
glib2-devel-2.56.4-158.el8.i686.rpm
b29ce6eaaca1da10af0bec170bff5c60be7988a1889a4e3cec2902ce244d8ffc
glib2-devel-2.56.4-158.el8.x86_64.rpm
eac2a19ea313ba9ea4bc85bc9d2c70325b8a2e7cfaaa6edb36ad03d501792586
glib2-fam-2.56.4-158.el8.x86_64.rpm
4b5b34a5496d3faadee38e81331ab9492f369c1e281efb7e6c79874126437ef5
glib2-tests-2.56.4-158.el8.x86_64.rpm
e330f748c5097c44b40716e7ddf793b980e1f5aa9ad91ae5f9009773ff4ba482
glib2-2.56.4-158.el8_6.1.i686.rpm
bef700c133f585e0fa2ce357faba9c56004d45c4cf568a1b40ff1f3baa94bf27
glib2-2.56.4-158.el8_6.1.x86_64.rpm
61a796c05095a0c89ead008de79a522c0d50eff0d5870e7465fced706cf5d10b
glib2-devel-2.56.4-158.el8_6.1.i686.rpm
04fccbb85df9dc1a1bfdbd3c55856e87f8cd2e3fce9d9ebc38c2d057ef24d38e
glib2-devel-2.56.4-158.el8_6.1.x86_64.rpm
69c0db06fbc8f2d68cd970a4e245dd7a541cdfdd4cf44e68b13b833e207e685c
glib2-fam-2.56.4-158.el8_6.1.x86_64.rpm
4677c25392b7e27e30b0f125f412f6aac4266d9c5abe2ea35c276cd129389ebb
glib2-tests-2.56.4-158.el8_6.1.x86_64.rpm
688e3e378b0c12adbd0b4d5771e65fc15090ca07f6f5a4807e08728d9dea06fa
RLBA-2022:2004
nftables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
nftables-0.9.3-25.el8.i686.rpm
a218c2577666cc020cf61944334aca78abba433d26690be08112cda6e9798f20
nftables-0.9.3-25.el8.x86_64.rpm
e6e56b9b9a402c0e581e853350a6acec621cccf5040c61d28963b62704dcb221
python3-nftables-0.9.3-25.el8.x86_64.rpm
4b2406cbf7c364b261a1f4014e805511032ccaa7f282adc52869a5450d6f2982
RLBA-2022:2007
cronie bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cronie.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
cronie-1.5.2-6.el8.x86_64.rpm
cd2fd41a0654076807902a89913f09a69e2f2a04e3c464805e294097a694157c
cronie-anacron-1.5.2-6.el8.x86_64.rpm
b122f732696e5f423dd0ae634e5431893b49d30af0c23f2e17231b42d4883cfa
cronie-noanacron-1.5.2-6.el8.x86_64.rpm
a6779dbf77d0c76b1d11ab6e03be522f62ccd6c8174821ba559692d05d1cfd5d
RLEA-2022:2010
mcelog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
mcelog-179-1.el8.x86_64.rpm
fd76853c2c31a6203f0dc19ce174debf798ca3ec0c91a18a06e685c3a61fb9bc
RLBA-2022:2011
smc-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smc-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
smc-tools-1.6.1-1.git7202891.el8.i686.rpm
b33fd2fe6d9506fc491d2ef658d95e7cd547e5e296157be3a28c36d61108ca36
smc-tools-1.6.1-1.git7202891.el8.x86_64.rpm
5cd4b3ca91a8f02cc7aae254fd778839ab547d6fd86f2cf01fc31dec828d1807
RLBA-2022:2016
linux-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
iwl1000-firmware-39.31.5.1-107.el8.1.noarch.rpm
5a9e8cffc8d5caa868a1e591df46449b7b4d4ad816b318bdd244044ed9bd31f5
iwl1000-firmware-39.31.5.1-107.el8.1.noarch.rpm
5a9e8cffc8d5caa868a1e591df46449b7b4d4ad816b318bdd244044ed9bd31f5
iwl100-firmware-39.31.5.1-107.el8.1.noarch.rpm
703b8ca7a4c459cca55ffba7278612096a0aa4c199d670b344d882257f0142a5
iwl100-firmware-39.31.5.1-107.el8.1.noarch.rpm
703b8ca7a4c459cca55ffba7278612096a0aa4c199d670b344d882257f0142a5
iwl105-firmware-18.168.6.1-107.el8.1.noarch.rpm
d3967648b49c6da23af6f78a919aacf60811b741bff96a43e081e79b766e3cc6
iwl105-firmware-18.168.6.1-107.el8.1.noarch.rpm
d3967648b49c6da23af6f78a919aacf60811b741bff96a43e081e79b766e3cc6
iwl135-firmware-18.168.6.1-107.el8.1.noarch.rpm
dc5aca51d65bd8039919626a9ee726f137958cdaff1f7a0fbff4b291c0b4b839
iwl135-firmware-18.168.6.1-107.el8.1.noarch.rpm
dc5aca51d65bd8039919626a9ee726f137958cdaff1f7a0fbff4b291c0b4b839
iwl2000-firmware-18.168.6.1-107.el8.1.noarch.rpm
692ad62d00a784cebe708ce290e3fdf2e680bd69f236c407e2c0b114ed691195
iwl2000-firmware-18.168.6.1-107.el8.1.noarch.rpm
692ad62d00a784cebe708ce290e3fdf2e680bd69f236c407e2c0b114ed691195
iwl2030-firmware-18.168.6.1-107.el8.1.noarch.rpm
b64564978c29fd901a39be34ce752094e89adc837a094bfa913a6edfc3db2176
iwl2030-firmware-18.168.6.1-107.el8.1.noarch.rpm
b64564978c29fd901a39be34ce752094e89adc837a094bfa913a6edfc3db2176
iwl3160-firmware-25.30.13.0-107.el8.1.noarch.rpm
d18555ef932869fc6b6a4353e2b5f4ebb2396ede88d77da0832a557e73b62952
iwl3160-firmware-25.30.13.0-107.el8.1.noarch.rpm
d18555ef932869fc6b6a4353e2b5f4ebb2396ede88d77da0832a557e73b62952
iwl3945-firmware-15.32.2.9-107.el8.1.noarch.rpm
5762f53d98dda59bbd047d96f834fdf42f187abd97248a8f0462359bf7bbc7a8
iwl3945-firmware-15.32.2.9-107.el8.1.noarch.rpm
5762f53d98dda59bbd047d96f834fdf42f187abd97248a8f0462359bf7bbc7a8
iwl4965-firmware-228.61.2.24-107.el8.1.noarch.rpm
b9f47070beff0016f08e29baabd0e70da644c16e7af51d1cc0dc8c12be74c209
iwl4965-firmware-228.61.2.24-107.el8.1.noarch.rpm
b9f47070beff0016f08e29baabd0e70da644c16e7af51d1cc0dc8c12be74c209
iwl5000-firmware-8.83.5.1_1-107.el8.1.noarch.rpm
69af129de88684758740a23b8b6d3ff2b4cacde0b72f6dde85fd049c67994134
iwl5000-firmware-8.83.5.1_1-107.el8.1.noarch.rpm
69af129de88684758740a23b8b6d3ff2b4cacde0b72f6dde85fd049c67994134
iwl5150-firmware-8.24.2.2-107.el8.1.noarch.rpm
b993d2aee1b4a6783f95fa37685397750044d3c403ce43475c8024798e24267f
iwl5150-firmware-8.24.2.2-107.el8.1.noarch.rpm
b993d2aee1b4a6783f95fa37685397750044d3c403ce43475c8024798e24267f
iwl6000-firmware-9.221.4.1-107.el8.1.noarch.rpm
68bd74987bfb00165df6b999f9e387148e0bb71fec15066c214fb0b60dfdf6f3
iwl6000-firmware-9.221.4.1-107.el8.1.noarch.rpm
68bd74987bfb00165df6b999f9e387148e0bb71fec15066c214fb0b60dfdf6f3
iwl6000g2a-firmware-18.168.6.1-107.el8.1.noarch.rpm
f23987cb2d1779803e0abf6b42fa4912b90d6f7af912ab33715151889a80520b
iwl6000g2a-firmware-18.168.6.1-107.el8.1.noarch.rpm
f23987cb2d1779803e0abf6b42fa4912b90d6f7af912ab33715151889a80520b
iwl6000g2b-firmware-18.168.6.1-107.el8.1.noarch.rpm
5d062d2e1e49a3695b67cbc8189d9993a203e2327151e61ee83de92bc4d5911b
iwl6000g2b-firmware-18.168.6.1-107.el8.1.noarch.rpm
5d062d2e1e49a3695b67cbc8189d9993a203e2327151e61ee83de92bc4d5911b
iwl6050-firmware-41.28.5.1-107.el8.1.noarch.rpm
f4d8ac4c7406fe69982dd97df12dccf4cbdad232a1858e4ae604855451789e16
iwl6050-firmware-41.28.5.1-107.el8.1.noarch.rpm
f4d8ac4c7406fe69982dd97df12dccf4cbdad232a1858e4ae604855451789e16
iwl7260-firmware-25.30.13.0-107.el8.1.noarch.rpm
9b3cd6f401f5e31b18707f624630add624d22fb7887e8b5ce7f21415318c08c9
iwl7260-firmware-25.30.13.0-107.el8.1.noarch.rpm
9b3cd6f401f5e31b18707f624630add624d22fb7887e8b5ce7f21415318c08c9
libertas-sd8686-firmware-20220210-107.git6342082c.el8.noarch.rpm
648f28517485789671ff68814a43fa5b89b33d4151372c04c2d85d6e511a4cb4
libertas-sd8686-firmware-20220210-107.git6342082c.el8.noarch.rpm
648f28517485789671ff68814a43fa5b89b33d4151372c04c2d85d6e511a4cb4
libertas-sd8787-firmware-20220210-107.git6342082c.el8.noarch.rpm
fee3a4bc092f161cacfb3ce289aff4314ed7958f064a27d70e2d14ec39c4a6e5
libertas-sd8787-firmware-20220210-107.git6342082c.el8.noarch.rpm
fee3a4bc092f161cacfb3ce289aff4314ed7958f064a27d70e2d14ec39c4a6e5
libertas-usb8388-firmware-20220210-107.git6342082c.el8.noarch.rpm
39c5926e62ea36a9874b164b5573e4f3fecc7a8b390719ee2d3d7b3fd2f2c069
libertas-usb8388-firmware-20220210-107.git6342082c.el8.noarch.rpm
39c5926e62ea36a9874b164b5573e4f3fecc7a8b390719ee2d3d7b3fd2f2c069
libertas-usb8388-olpc-firmware-20220210-107.git6342082c.el8.noarch.rpm
0def1197d822d5ced7915640bdaaadd39c6be982257d0a39f5a9302e3c0edb93
libertas-usb8388-olpc-firmware-20220210-107.git6342082c.el8.noarch.rpm
0def1197d822d5ced7915640bdaaadd39c6be982257d0a39f5a9302e3c0edb93
linux-firmware-20220210-107.git6342082c.el8.noarch.rpm
f09df3b5436a6f583df95c1b41036746416867615d26edab82b5523193f5057f
linux-firmware-20220210-107.git6342082c.el8.noarch.rpm
f09df3b5436a6f583df95c1b41036746416867615d26edab82b5523193f5057f
RLBA-2022:2017
tuna bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
tuna-0.17-1.el8.noarch.rpm
fa323413f717e5da595afd181657019f6f33241178f213a9f7ff35ed3eb23e95
tuna-0.17-1.el8.noarch.rpm
fa323413f717e5da595afd181657019f6f33241178f213a9f7ff35ed3eb23e95
RLBA-2022:2020
accel-config bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for accel-config.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
accel-config-3.4.2-1.el8.i686.rpm
200a9fd0a1dcaf7ea0b50660849c7312523f8208897a12e7a4b3bec488bac482
accel-config-3.4.2-1.el8.x86_64.rpm
61ef1ef7e6177c429cf7071dedf3e0ae4453e9246f7875a5fcc3479d555b1f4e
accel-config-libs-3.4.2-1.el8.i686.rpm
454d576a8410dd419e29aeb364e5cd2b8e9f654491f6d09745f121f6234433a2
accel-config-libs-3.4.2-1.el8.x86_64.rpm
770cfd86045710f79bd2d6fb1fefb1ce55ebc3beb5ca249c2a857430cb0a89e5
RLBA-2022:2021
shadow-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shadow-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
shadow-utils-4.6-16.el8.x86_64.rpm
e622952be55fe44439e3c28799a16e6e42b99382e1329b813d14ab100c9f4ff5
shadow-utils-subid-4.6-16.el8.i686.rpm
d433327c28562c4deb14582cde399eeaca09dd286bd400b033814ba5ca51c657
shadow-utils-subid-4.6-16.el8.x86_64.rpm
ae95837aff56b385a63983312357261c8db70c12d1212e442ab6db6219d20d0a
RLBA-2022:2038
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-1.02.181-3.el8.x86_64.rpm
2863bbab1ff0b394b09c1f0c79c2e6006afcae59c1b79e65f60f038b8de8cc9e
device-mapper-event-1.02.181-3.el8.x86_64.rpm
471416630f1d9139e831cddfc0b9d146f6933c804759c43946bdfdfd4b81533e
device-mapper-event-libs-1.02.181-3.el8.i686.rpm
74a39d732ea8c2ffa4e42dbb36f8d85f2dd84b07e28f6eb832330e2798cb67d6
device-mapper-event-libs-1.02.181-3.el8.x86_64.rpm
5c57670ab4b9ea3c9964e57894b88f74435a49820b681e1d56c44cf505b564d9
device-mapper-libs-1.02.181-3.el8.i686.rpm
fc3ccaf9bf46b92592fbf21122307a99193a57c8dffa86486baff7e607f85f66
device-mapper-libs-1.02.181-3.el8.x86_64.rpm
3b79726a72197be7bfc6f16f63683fa61264e77d5bcfe1095cc497944a587d00
lvm2-2.03.14-3.el8.x86_64.rpm
f578a1286d56d0b421ecb99b916eb838030e7312014f01ffa82297b51f583277
lvm2-dbusd-2.03.14-3.el8.noarch.rpm
ce043b1f360c54518fe0ce889e98274f695d79f474f20777ed58d42392917bd2
lvm2-dbusd-2.03.14-3.el8.noarch.rpm
ce043b1f360c54518fe0ce889e98274f695d79f474f20777ed58d42392917bd2
lvm2-libs-2.03.14-3.el8.i686.rpm
ae9d1baa0ed183a66a48251c3c110520de48d07f77aa3b25f7127d7a9e10abe3
lvm2-libs-2.03.14-3.el8.x86_64.rpm
d8ead9d1ab8c10c94adf4ca86dbb7639ce897683c1bd48be21507611d15f416f
lvm2-lockd-2.03.14-3.el8.x86_64.rpm
08eb92542a040d3447c9696ead569c623592a2096119917f5f3d136a12b04584
RLBA-2022:2022
binutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
binutils-2.30-113.el8.x86_64.rpm
7a2e187e9b65c3160ad6ab9589b69b2ecece7f0df16005e9a304ddb679178822
RLBA-2022:2028
vdo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
vdo-6.2.6.14-14.el8.x86_64.rpm
7faa9bfaed2df8b63333d3b58d41058305c52570fdbd28901447abfefe52ab8d
vdo-support-6.2.6.14-14.el8.x86_64.rpm
e23b5daa2345f532318338792373ae8d3cf332ad2804594cf4b24604fb6db29c
RLBA-2022:2033
device-mapper-persistent-data bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-persistent-data.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-persistent-data-0.9.0-6.el8.x86_64.rpm
3f87f8e9c6acb701d6e91b327a30a5a99f437a73679e6a370c5036c3f5260cfe
RLBA-2022:2036
device-mapper-multipath bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-multipath-0.8.4-22.el8.x86_64.rpm
c38867eb25427f6d2449804b4173ed84fa73dee6c82c641a15fa36f640b2b96b
device-mapper-multipath-libs-0.8.4-22.el8.i686.rpm
c11c36d887e72bd47a541f5ab6b79daed3a1f487a29900fb82f9317655cfaf53
device-mapper-multipath-libs-0.8.4-22.el8.x86_64.rpm
480c1bede97a16622650a9fd525a4c74a089fce88dba7fd90017f179c945ea5e
kpartx-0.8.4-22.el8.x86_64.rpm
f850da78de5429c8660b744ec229897595bfbbeb5f5af4a26b650e41f669e267
libdmmp-0.8.4-22.el8.i686.rpm
2d8c99301f79b12b16a7e9f556033d4cbb5d82b9c7cc683d15ac5d0f8b117b8a
libdmmp-0.8.4-22.el8.x86_64.rpm
55b27fa49e7a1aaf44394185e39fe82963d79293ffb77f95ca98c2b3e1896638
RLBA-2022:2039
libbpf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libbpf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libbpf-0.4.0-3.el8.i686.rpm
4bacc72321d341b72f5a5471a9fb2a43d056abc64b01acbf8caaff5fd08bf80f
libbpf-0.4.0-3.el8.x86_64.rpm
0c82c1d2bc9be5f6885555db95bf70bdbea3c17116ab217461cf4885abc60a91
RLBA-2022:2042
ethtool bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ethtool.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
ethtool-5.13-1.el8.x86_64.rpm
56281599cd5175ea81ef5850258c7220f299e699bb9c12318ebaf8e73a0fc09f
RLBA-2022:2045
librepo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
librepo-1.14.2-1.el8.i686.rpm
7a1184883aa320f3449396a1523057112e0a06e3b77065a27918188b949e1272
librepo-1.14.2-1.el8.x86_64.rpm
04f441e38eae6abd5f006a4c50985217c92ec00f9673857d613ea01fb9787324
python3-librepo-1.14.2-1.el8.x86_64.rpm
7cbf7fab4e8f976ff2f82e2c7623877355001c38c843c14316deff652b7d5102
RLBA-2022:2048
libdnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libdnf-0.63.0-8.el8.i686.rpm
0733a9631a676bff28b71738639100a9ebf3b9bf919713c96db4d7e9243b331c
libdnf-0.63.0-8.el8.x86_64.rpm
893b13202dc98560f07bd50d2122c75cbad209d61aea71d5d4dad6422ccb8f1a
python3-hawkey-0.63.0-8.el8.x86_64.rpm
6b5ffa719c71d6fa32470ec7a0903e4eb3a280900197df831ae6387e3eb95a3a
python3-libdnf-0.63.0-8.el8.x86_64.rpm
0c88294928527cbcde13518dd98fc1e8d9e8a569c456cf05d5289bea0d6533c4
RLBA-2022:2049
iproute bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
iproute-5.15.0-4.el8.x86_64.rpm
a66c89733d537413c72a18de2b3baee497f0c7537e719f95e17236439c01acde
iproute-tc-5.15.0-4.el8.x86_64.rpm
e41fa597b1537041560768488caa31fa6057d14314bd299d889a3e6ea6956bab
RLBA-2022:2050
libsolv bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsolv.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libsolv-0.7.20-1.el8.i686.rpm
1a7b47e475977590da8ac5d216f0ce527bd5b68fd3e3c3f1e72b72a0996ac419
libsolv-0.7.20-1.el8.x86_64.rpm
4c0365bc7f58042a433bb9fce2347ad10a12296ac2e85d382513a0bb55ea9c40
python3-solv-0.7.20-1.el8.x86_64.rpm
fbd258e02b47efba98be3fdad6f7cb082e5563ce3ba4178edadca0875b002eb6
RLBA-2022:2051
dnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
dnf-4.7.0-8.el8.noarch.rpm
85a2a1480c183f1863f1c2af82c2ff9e0851a6c253acffbb49750bb38d87e74a
dnf-4.7.0-8.el8.noarch.rpm
85a2a1480c183f1863f1c2af82c2ff9e0851a6c253acffbb49750bb38d87e74a
dnf-automatic-4.7.0-8.el8.noarch.rpm
2ce7fa9b10fce3fff3afd2773c757ecd8e62eadf9b829e9d8617b85dd8ab3983
dnf-automatic-4.7.0-8.el8.noarch.rpm
2ce7fa9b10fce3fff3afd2773c757ecd8e62eadf9b829e9d8617b85dd8ab3983
dnf-data-4.7.0-8.el8.noarch.rpm
2322c0b93a344d0ddbf28e464528c28ab66f18e7aea431b7f191f09ce44f9095
dnf-data-4.7.0-8.el8.noarch.rpm
2322c0b93a344d0ddbf28e464528c28ab66f18e7aea431b7f191f09ce44f9095
python3-dnf-4.7.0-8.el8.noarch.rpm
84abe628d7376d6cb2a5937242a32f1680631b26a254ad3b3b77f72e9d48acf6
python3-dnf-4.7.0-8.el8.noarch.rpm
84abe628d7376d6cb2a5937242a32f1680631b26a254ad3b3b77f72e9d48acf6
yum-4.7.0-8.el8.noarch.rpm
c665cd526e1ca704ef264546692ccd6ddf956abfaa97a5582e3fdd5f2cbb35b6
yum-4.7.0-8.el8.noarch.rpm
c665cd526e1ca704ef264546692ccd6ddf956abfaa97a5582e3fdd5f2cbb35b6
RLBA-2022:2052
dnf-plugins-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugins-core-4.0.21-11.el8.noarch.rpm
c4ad6b6149d0b7ba661f93fe2d24bd5c2333ee0fdfb942eb5b498b88a704ae8d
dnf-plugins-core-4.0.21-11.el8.noarch.rpm
c4ad6b6149d0b7ba661f93fe2d24bd5c2333ee0fdfb942eb5b498b88a704ae8d
python3-dnf-plugin-post-transaction-actions-4.0.21-11.el8.noarch.rpm
baef7fc3a1e99f70199ecfcadc6959e4ed12635ae519fbeaedb074e0a1c0d95e
python3-dnf-plugin-post-transaction-actions-4.0.21-11.el8.noarch.rpm
baef7fc3a1e99f70199ecfcadc6959e4ed12635ae519fbeaedb074e0a1c0d95e
python3-dnf-plugins-core-4.0.21-11.el8.noarch.rpm
4fe691697f5c2682e7575c95266f3f44934b2d3b7b8e4b154769709526238a98
python3-dnf-plugins-core-4.0.21-11.el8.noarch.rpm
4fe691697f5c2682e7575c95266f3f44934b2d3b7b8e4b154769709526238a98
python3-dnf-plugin-versionlock-4.0.21-11.el8.noarch.rpm
638b7b64f9c9a2865ab8acd4dcb13940d119bfe98b3f27f392ef8778d615bdbe
python3-dnf-plugin-versionlock-4.0.21-11.el8.noarch.rpm
638b7b64f9c9a2865ab8acd4dcb13940d119bfe98b3f27f392ef8778d615bdbe
yum-utils-4.0.21-11.el8.noarch.rpm
38875399e7f84ef3ed2c966ba4d6c4e835760a4d6b7daf379aa69f9c9de3bd00
yum-utils-4.0.21-11.el8.noarch.rpm
38875399e7f84ef3ed2c966ba4d6c4e835760a4d6b7daf379aa69f9c9de3bd00
RLBA-2022:2053
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
kexec-tools-2.0.20-68.el8.x86_64.rpm
4b571112cca2bcd9ba604054d3ed5bbd7fe21431ada20618b82ee2c0a07fc463
RLBA-2022:2056
fwupd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
fwupd-1.7.4-2.el8.x86_64.rpm
8d22cc9651df00892cd5cd39f817aa4c0255b4d79837b8c1cff6d2cf1fe6b1b7
RLBA-2022:2057
rng-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rng-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
rng-tools-6.14-4.git.b2b7934e.el8.x86_64.rpm
187f4d2a787bcaeda9765d06ec8d1b58cc075a618fb9883968dda92a8efb3912
RLBA-2022:2058
ndctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ndctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
daxctl-71.1-3.el8.x86_64.rpm
cbe7b363d6ac8bb668decb494e4fc81e640d614c80683f2380bcbb8add2c07e5
daxctl-libs-71.1-3.el8.i686.rpm
2e1732136b11823c3b87fab25a8193fabd6172386628b676f7a3f9aa752a0f52
daxctl-libs-71.1-3.el8.x86_64.rpm
4a551a5ec4b641dc5ea4857b47b600cb4b0a4710a593a1b0543bb23ed5bd5225
ndctl-71.1-3.el8.x86_64.rpm
02f3a683dacc07734aaef8fce66859107465bfb5766f0a20a50e06aba7fdad75
ndctl-libs-71.1-3.el8.i686.rpm
5d4dede4afb8c481687e7a64dbe49475169dd1c5247cfbae0b537fe874449c99
ndctl-libs-71.1-3.el8.x86_64.rpm
b87d2ac8928fdc36319faab55c3066e4a35cb507bec1fb81edfc4a8a9c4f0af2
RLBA-2022:2059
nvme-cli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nvme-cli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
nvme-cli-1.16-3.el8.x86_64.rpm
6081d7e058f5c6cbaabc72f6573eb39f26383c65355186af6d8ef69f75f70ee3
RLBA-2022:2065
libtirpc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtirpc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libtirpc-1.1.4-6.el8.i686.rpm
733c6c42c00a5a6144c6926cebc5a2cd055dd55f2fa7376580036b8d99ed2ef6
libtirpc-1.1.4-6.el8.x86_64.rpm
b5c1202625eb51df018e38f228429c2b69bf9a5839bd5fd2e9b21ba41d1eb509
libtirpc-devel-1.1.4-6.el8.i686.rpm
20aaa64c4d771412d6d492970ed21803d243fd1c34e33574fb32acdc8a01ce76
libtirpc-devel-1.1.4-6.el8.x86_64.rpm
d139ed005ccb82cec74bc76550ded0f5930f95f8f38d7fa76d5823731c615e78
RLBA-2022:2067
which bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for which.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
which-2.21-17.el8.x86_64.rpm
695a361e69d84e14defcc1967b22b9f5933faee4f80ecdc6e7a1df057e824b9f
RLBA-2022:2070
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libipa_hbac-2.6.2-3.el8.i686.rpm
06a0e2816132384ebdce996d5d79ae67c7bce46d35efc60bbec206e755b670d9
libipa_hbac-2.6.2-3.el8.x86_64.rpm
62e99fdddd2aa781ff99dea68b489d2eed81c41f59c2d0e41b4830e9965f9865
libsss_autofs-2.6.2-3.el8.x86_64.rpm
cc80daf67a293e2b936cbcbe1c0c6d0d6fc31923db11445fc891458e81aee4f6
libsss_certmap-2.6.2-3.el8.i686.rpm
67ae04741e46fd31385f93db7e847983f3b46369b67a54f3ed5a2d2cd9c63bab
libsss_certmap-2.6.2-3.el8.x86_64.rpm
d673f7d1a7da81f4addaa6d0a82107d9fecce72daa8d0d628b1fcadccd75de6e
libsss_idmap-2.6.2-3.el8.i686.rpm
bf5ade8a7d06f76bf7118ad98094d25c003ff063a268d406ee502a1600657b91
libsss_idmap-2.6.2-3.el8.x86_64.rpm
cf85f989c2b9c3137ac2752c203297dd16a5ab6708b12296f01b09a7c5bbb1bc
libsss_nss_idmap-2.6.2-3.el8.i686.rpm
b8d0d2f524885adc55cb1e38d823499f2676f6eaa4c2c40cf32243a731f79fff
libsss_nss_idmap-2.6.2-3.el8.x86_64.rpm
6218770ad81d4a38aed65c4411249f1a2026216115af7535897ad6ace678486a
libsss_simpleifp-2.6.2-3.el8.i686.rpm
d0d2da514b221b1679f7fa6dd7911352a395e566bd625d3ab462cfae08a99364
libsss_simpleifp-2.6.2-3.el8.x86_64.rpm
b89371bee3d31a60a8494ade44bd2c4dae2f9631dc986fc5da027370fae7839a
libsss_sudo-2.6.2-3.el8.x86_64.rpm
3f377e3d6b465715ab4285c7698762db45881c5dd646a07d7b36c2bf774e243c
python3-libipa_hbac-2.6.2-3.el8.x86_64.rpm
dbd2ff62d4b300586b3cad8dedfee808b40050a9e406e07e671d2c873d006f1d
python3-libsss_nss_idmap-2.6.2-3.el8.x86_64.rpm
c0d55f558118fd233c221068c523bbdebbe92b3cdb3ecea85d8cdd2fabbefa7a
python3-sss-2.6.2-3.el8.x86_64.rpm
bb6adadd336dcaff0ef3f384a2e029dd64a12f2d23f0b978644223041134caae
python3-sssdconfig-2.6.2-3.el8.noarch.rpm
00f27a2f462e7dddb75ebe2881a7ec464f8e14a2274b9d4a17a99c3231c71b14
python3-sssdconfig-2.6.2-3.el8.noarch.rpm
00f27a2f462e7dddb75ebe2881a7ec464f8e14a2274b9d4a17a99c3231c71b14
python3-sss-murmur-2.6.2-3.el8.x86_64.rpm
e6de0fef6f948df2ee152d4f95a057d68aa77e76aab5dd517096cc17393fe26e
sssd-2.6.2-3.el8.x86_64.rpm
07f787790f2b7e30bb523de0939fca77bf9d10dc84967bcf7202fd3626a2548d
sssd-ad-2.6.2-3.el8.x86_64.rpm
df150f21dffa127c1ed4fea548e9cbc79f1d9078ac3a1fd4f783b6652146b520
sssd-client-2.6.2-3.el8.i686.rpm
9c0b6f5dbb3351a254bcc2c9d0baed3c726591fed16b4f1991d4cdb955beeb47
sssd-client-2.6.2-3.el8.x86_64.rpm
7adb9eff5a60df83187673d37f3693a9dad65acfc71c2977e868d844d90822c3
sssd-common-2.6.2-3.el8.x86_64.rpm
d9ad5b4f14b93db345058f0f7cc3b0cbf2a978b5825932e555deab653d36707e
sssd-common-pac-2.6.2-3.el8.x86_64.rpm
f3e4c61ae5fadeb23ea1d9b3012461e8d9dd79d48ac85a301e45706669045c44
sssd-dbus-2.6.2-3.el8.x86_64.rpm
487bae037c4211d74b5620c9884d951a1e55f7c91fd8dc58837e1c3a40b801cf
sssd-ipa-2.6.2-3.el8.x86_64.rpm
0f56c43d6936bcdcd961e6ff8d4bbb38abf4fd2dc02ff3120057edb89147acc3
sssd-kcm-2.6.2-3.el8.x86_64.rpm
6d1e3a41249d648c843ae2e17d4b211fee2ef65a0596e16c97fa49bdc68a71eb
sssd-krb5-2.6.2-3.el8.x86_64.rpm
58f466a803d9589b0c49e7277890e7edb923b98ccc5f1b7666c466f4e096e81f
sssd-krb5-common-2.6.2-3.el8.x86_64.rpm
de73b3941a937936301493907322742be8d0898f15a6aa80ccd963c1c9a19b0c
sssd-ldap-2.6.2-3.el8.x86_64.rpm
80cce934e8868de7fc237511e71596fcfb31d5d82019604f7862184fb7227d3e
sssd-nfs-idmap-2.6.2-3.el8.x86_64.rpm
027b0c8f18d385e8cccc846213f9a6a5e74223f1d2469c4920a039d73c62c4e8
sssd-polkit-rules-2.6.2-3.el8.x86_64.rpm
477950e87aa9a735db980e1247ab8e499d9541106f125292097c9b912d871c61
sssd-proxy-2.6.2-3.el8.x86_64.rpm
09e69399be63b6215fed509a1a50075fd618e337a486228fa4250d9e1a49efb2
sssd-tools-2.6.2-3.el8.x86_64.rpm
ac79007862a28ce673e0e23db19f3c3d67ca832267b4a69e1f3909526476c843
sssd-winbind-idmap-2.6.2-3.el8.x86_64.rpm
aead003abbe2d18919b5358baac40c31e2822ea8aa049a5c388eca17cb89b506
RLBA-2022:2072
gcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libasan-8.5.0-10.el8.i686.rpm
a48530feb10dff1a7edc49aa4707c4190a0060005d825996b9ca66d3f37404bf
libasan-8.5.0-10.el8.x86_64.rpm
1d4175c484c3e01cb31e248264bdce23738db7d8f5272976e80adef086811c20
libatomic-8.5.0-10.el8.i686.rpm
535e20546291e0472e6a65a82e7fb23ea631f5caed6c446ccc64d3bfe65b037d
libatomic-8.5.0-10.el8.x86_64.rpm
2640bbd53465f6bda03a08064355b5ecc0f5fa51f5b95657433fa46b69695eb2
libatomic-static-8.5.0-10.el8.i686.rpm
3d5d7c628961c00868718aaf0e4bbca7ebdf992b0fa36f3240e29abaea8a9df2
libatomic-static-8.5.0-10.el8.x86_64.rpm
6ca3b23740d67301951db79f6ddd73afddc90f0cd588fee75b8f4e857343f085
libgcc-8.5.0-10.el8.i686.rpm
fbedb20458c53288509a1ee0830c68710e5a956d408179c4c8d88e2ac6ced64f
libgcc-8.5.0-10.el8.x86_64.rpm
427ff8d7c074b6881596e0f4cb01d22007aa373ea2ed887fe72fbcb7bce0a033
libgfortran-8.5.0-10.el8.i686.rpm
123cda491a73a4c052f17bfd369059ed9e77b0042145d6bba2948594f4030ef1
libgfortran-8.5.0-10.el8.x86_64.rpm
1183b0553cdf2aa432a9194ec3d1c5afc01a24618033b1a62c59b41081796485
libgomp-8.5.0-10.el8.i686.rpm
0c7842a76eae223dba4e2dc706a756c69478d72a219c7e72094f113b42a4848e
libgomp-8.5.0-10.el8.x86_64.rpm
9c548dbf72cb68a2d9c6b3e524c52f56a03f0c363ccb569ba65dcc8631598ddb
libgomp-offload-nvptx-8.5.0-10.el8.x86_64.rpm
f2163d7bbe585375240d358946c2efc46c705f7e4fa002522cb74261a1af2f51
libitm-8.5.0-10.el8.i686.rpm
5737f33c4d4abaa340d887e80769ca4ab82ad2add4c08e3e2b95deba9d2aca5b
libitm-8.5.0-10.el8.x86_64.rpm
86f361a502b7e56521e8b89d3ef567f11ada47076049d0723715bc24f99b9e76
liblsan-8.5.0-10.el8.x86_64.rpm
271af0682e30f3713dc427c0db231a13802e1a268105ade4cde5db963c3f4558
libquadmath-8.5.0-10.el8.i686.rpm
13f8e0389af3f128e27598d56572a24714283c1a46ea2366df624f297964e69a
libquadmath-8.5.0-10.el8.x86_64.rpm
d90e4d88e43832e12996b4773180f87557e06fc9fdbe649c0411fca62d783525
libstdc++-8.5.0-10.el8.i686.rpm
b1d0cfd329c8cbfb912c7b7ebbaca58ba77d43dab5928f9cb3f53a4b2ef50082
libstdc++-8.5.0-10.el8.x86_64.rpm
a6d7700ca83a265e91a4ff6341d52dff524c16a3d472b7386e25e8433e8428ea
libtsan-8.5.0-10.el8.x86_64.rpm
0a9262339f1ebab156ea25abf0452cdff81663c74b61aa757c27feb690244da6
libubsan-8.5.0-10.el8.i686.rpm
2ec9319b3fd3e962b76b4fb4b9e5dababc115f6b2f5ee9e9f7b1a130f4e54136
libubsan-8.5.0-10.el8.x86_64.rpm
7799168ea500e260d028bb4b884454f31fcb1dfb44e6d44b29861e208ebed5b8
RLSA-2022:2074
Moderate: samba security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
The following packages have been upgraded to a later upstream version: samba (4.15.5). (BZ#2013596)
Security Fix(es):
* samba: Symlink race error can allow metadata read and modify outside of the exported share (CVE-2021-20316)
* samba: Information leak via symlinks of existance of files or directories outside of the exported share (CVE-2021-44141)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
ctdb-4.15.5-5.el8.x86_64.rpm
da586e2142bc174bc8d9fb0af8884ec6cd32618ba237186c4dbb0fae26099336
libsmbclient-4.15.5-5.el8.i686.rpm
14f838523490cfe68930867311864bee2675960105e41b6513fca466716c51c5
libsmbclient-4.15.5-5.el8.x86_64.rpm
47461eb9a8939b9a43c17fb00743b58a60d759b19716aeb2f1ef21a09acac5dd
libwbclient-4.15.5-5.el8.i686.rpm
0328f309d17d6b0640b99033ce115cf76459dea6e35ed044cf139efe8bfe02b0
libwbclient-4.15.5-5.el8.x86_64.rpm
26257fed2ccf09b9f3c988437fdf7b1e81f0f6894569c47f3ba9b2cf1e17931c
python3-samba-4.15.5-5.el8.i686.rpm
cd636ee0aa6aa139920d0f1b2c865f53d9321069b6c493489b2d862a7577a09f
python3-samba-4.15.5-5.el8.x86_64.rpm
6383335a85e6602d9d4dad53664b7535254ce0aba3529e51a8b458520500be69
python3-samba-test-4.15.5-5.el8.x86_64.rpm
8a7c317c1855e21c6a5e5b754056a094bd8236da9cf089197d2d94d9eaa09ebe
samba-4.15.5-5.el8.x86_64.rpm
b829d6620aa040917d2a61648eb409d2f484fa8ff2d5e4a91f79fb8f3dd493af
samba-client-4.15.5-5.el8.x86_64.rpm
c3794f23d2cb69e8e8ad7196d57488d00d0e68b81999491894cf88b91a7e752d
samba-client-libs-4.15.5-5.el8.i686.rpm
007677a602615ec8b8c0fbb1d8a56961aef62ae4300bee9f2407fdb4a066e7d9
samba-client-libs-4.15.5-5.el8.x86_64.rpm
6f01673c6e02ac8a452108f75dff62d71c95472ac62e4e5c5e26d582393429e2
samba-common-4.15.5-5.el8.noarch.rpm
df25895da73528a50ab474f9c2a3c9f450484bba78970c4033d83782f2f75656
samba-common-4.15.5-5.el8.noarch.rpm
df25895da73528a50ab474f9c2a3c9f450484bba78970c4033d83782f2f75656
samba-common-libs-4.15.5-5.el8.x86_64.rpm
913ddc06aceaa8fea9cd8ea387d6f99058837eb29317ec3a6f5360e590801d69
samba-common-tools-4.15.5-5.el8.x86_64.rpm
15eb9655da893883ae533be67974cc4aaa15b6f3c7ff9d73ef495e298b9b9e42
samba-krb5-printing-4.15.5-5.el8.x86_64.rpm
f94dbc1f8e7fb041b4524353baf2d77817a66d2b883e805b16f14b6c5b417b89
samba-libs-4.15.5-5.el8.i686.rpm
f215f8628775b745a44c9272bad27254254227521d2f5539bbf6e7491f4f72f5
samba-libs-4.15.5-5.el8.x86_64.rpm
114ebac44a4d855b970d83a1d4d97b007c9bf0b6f8e2f744bad1cc09839fdafd
samba-pidl-4.15.5-5.el8.noarch.rpm
e9b9b16cddf61a1613e3a4abe1199082a8d1b9979bcd54e3797b88e7cc4c4b16
samba-pidl-4.15.5-5.el8.noarch.rpm
e9b9b16cddf61a1613e3a4abe1199082a8d1b9979bcd54e3797b88e7cc4c4b16
samba-test-4.15.5-5.el8.x86_64.rpm
f6a3d23784505c4fb3944fcdebdffe982777f551cbe0b0ba284b6e270b1ad760
samba-test-libs-4.15.5-5.el8.x86_64.rpm
505a6ca561e0b62a0bf49de9f3afdecc4833b539a3c74793ffd1a8bfd5d50824
samba-winbind-4.15.5-5.el8.x86_64.rpm
11f94e5a44892d74ac3abf327141756d317feb7aee66b86e4498ea3bed064789
samba-winbind-clients-4.15.5-5.el8.x86_64.rpm
41e63e0d530641df8693a54078f908e128fb202c10bbb65f2cfe67cfd8473ef9
samba-winbind-krb5-locator-4.15.5-5.el8.x86_64.rpm
667cf218350b1ee569734eb659314a50d0e3d3030557a2b20f17d552d0fc132a
samba-winbind-modules-4.15.5-5.el8.i686.rpm
e0a749122a54e6a8730f5e6b25497b51c56cf2391b0ce778a06f1ff9d5ddf57b
samba-winbind-modules-4.15.5-5.el8.x86_64.rpm
d4c08a2ab302b443534f321897c96f49e7295e49721cf1b801e6206de6429e89
samba-winexe-4.15.5-5.el8.x86_64.rpm
79d2b5f176259059f40c0fcddc8cdd7e460f95bc5ca04a75d9c73e4feb752fdf
RLBA-2022:2082
rpm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
python3-rpm-4.14.3-23.el8.x86_64.rpm
b34f90e0fc18eb2120b630fdab0c3b57713c3658578804bfc37afa683bf384fa
rpm-4.14.3-23.el8.x86_64.rpm
350c7921c4b2e7d159d546a0c01f4ad43747619c9bbb1250df748583e2863467
rpm-apidocs-4.14.3-23.el8.noarch.rpm
70f1d847d839573338c44dfe3b048f734e3cf31291e92d4c5835e4be4b0ba03e
rpm-apidocs-4.14.3-23.el8.noarch.rpm
70f1d847d839573338c44dfe3b048f734e3cf31291e92d4c5835e4be4b0ba03e
rpm-build-libs-4.14.3-23.el8.i686.rpm
fa17705b94bfe3932c726634427b7fab6825459b59459175d1416205b02dffcf
rpm-build-libs-4.14.3-23.el8.x86_64.rpm
8d5489a4527086f56c3c1e16780974de9ed2ef802d57fcd4cff3f6fee83fcae4
rpm-cron-4.14.3-23.el8.noarch.rpm
fb54bacd21f525423773e2e0eeb401832381b392905338ec076c5d5d5cd78cf9
rpm-cron-4.14.3-23.el8.noarch.rpm
fb54bacd21f525423773e2e0eeb401832381b392905338ec076c5d5d5cd78cf9
rpm-devel-4.14.3-23.el8.i686.rpm
05a96bb01dabaa0769f7a6ea52383b636427b70caf7ed3153dca7e011cd3d4fb
rpm-devel-4.14.3-23.el8.x86_64.rpm
0b558d26bad77137b275a087c621ec7c7ac9fc9c5dc9564189ab247d34371c17
rpm-libs-4.14.3-23.el8.i686.rpm
4f343913c461ec27bd6eaf876654465a5fd3f1c0f33d3c4827a7b0bbdc2509df
rpm-libs-4.14.3-23.el8.x86_64.rpm
5516f2430fd857e42c18eae6b19d2d253c94769f51f31bf328df3e5ab899f9df
rpm-plugin-ima-4.14.3-23.el8.x86_64.rpm
b042abda50ca6762e2561df20eca0ee2b747fb65b5bc4b40deab35912cc47c93
rpm-plugin-prioreset-4.14.3-23.el8.x86_64.rpm
b3a3cb11b9cb3f6c7440c909ca2391010136ea73e4f04f26ff0e340cac196923
rpm-plugin-selinux-4.14.3-23.el8.x86_64.rpm
51087ca46a18144a3dc53a743a856093f9bad3d776ddefceb2dbd3c83fceab30
rpm-plugin-syslog-4.14.3-23.el8.x86_64.rpm
27fc08e7a07cea6e470150eca313b62cd4202e53f3ddb9d84198ed2b7a9f7c6e
rpm-plugin-systemd-inhibit-4.14.3-23.el8.x86_64.rpm
3dbb096d5dda3e939bff5b6d41319c966cd9339ab0305f4879f45cfdfcde790e
rpm-sign-4.14.3-23.el8.x86_64.rpm
bce63158c5c7a381856a8a5f697249ab20ee00ae7deb2ce0424ad6dd11993d09
RLBA-2022:2083
gssproxy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gssproxy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
gssproxy-0.8.0-20.el8.x86_64.rpm
6fd8ab6a3ec62d222fe3744b2ccd089acefde765d7ff68f35e22b25082c47480
RLBA-2022:2086
iputils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iputils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
iputils-20180629-9.el8.x86_64.rpm
b50c895dc6aa69adb67edc0393a6cda790d50cc1fdf2f02ebbb366bd97f10546
iputils-ninfod-20180629-9.el8.x86_64.rpm
7e59572711de78049c349a99d335452b43ff9e89ca2cce2d329fcf3074d0406b
RLBA-2022:2085
hwdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
hwdata-0.314-8.12.el8.noarch.rpm
bfb214fde7b4e0e5c026623ea001d646086e95ab747d14efbf062f9500a9bcfd
hwdata-0.314-8.12.el8.noarch.rpm
bfb214fde7b4e0e5c026623ea001d646086e95ab747d14efbf062f9500a9bcfd
RLBA-2022:2087
mdadm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
mdadm-4.2-2.el8.x86_64.rpm
4e30d38e5206b402f9647eb66b9aa603c8f63fc48d65e63bf6fde9501fb587c4
RLBA-2022:2090
virt-what bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for virt-what.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
virt-what-1.18-13.el8.x86_64.rpm
c1b19568d579bb1ce54405ad5d46755d1ce2a4c52c4ce4974b9545ce846f9d7a
RLEA-2022:2093
dhcp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dhcp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
dhcp-client-4.3.6-47.el8.x86_64.rpm
86fe027d88ef8f8a34f5c12e07a4c5973e959bf09b07aebce25e96f11396c3ac
dhcp-common-4.3.6-47.el8.noarch.rpm
47ff85a86490c4a51d90e92d7dec1afbe6a04a6d5b51112f87ece2d3091460c1
dhcp-common-4.3.6-47.el8.noarch.rpm
47ff85a86490c4a51d90e92d7dec1afbe6a04a6d5b51112f87ece2d3091460c1
dhcp-libs-4.3.6-47.el8.i686.rpm
2168a156e2072e100e703c01552f00c62ace5d668c61cda912502de129f96e90
dhcp-libs-4.3.6-47.el8.x86_64.rpm
9791803c232db70951ec558edc0ef54ccfdd9dbc557055ffa3ec7f1a97875572
dhcp-relay-4.3.6-47.el8.x86_64.rpm
db7ef2bd2b2be817efa3c46d3f432bf04027a50cfa85f5b5414ade1caf8aab3c
dhcp-server-4.3.6-47.el8.x86_64.rpm
ff93a864ada1d822158387cd8b151e3e0d01b28b036f3f6862fc5a851f43d044
RLBA-2022:2100
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libblkid-2.32.1-35.el8.i686.rpm
d6cdda5cfc56f2b71a2086884fd3672719ec18e2ca0373255863b0bb7269ee9d
libblkid-2.32.1-35.el8.x86_64.rpm
5b93353d35e8438724960d14f86e4fbf70dc4afa2eeef7dc9feebbb24cfcc173
libblkid-devel-2.32.1-35.el8.i686.rpm
950eaae62e0cb211dd9a784cdfd618761156c868ab4de2ca7ecd6b19b8256899
libblkid-devel-2.32.1-35.el8.x86_64.rpm
5f0a4819e1939dd4e4a3dcc7d5ff124ef9ddabf384304673e00158dfaf587005
libfdisk-2.32.1-35.el8.i686.rpm
30127697d79001193e4416730997681d3ac50a6a5108a0744bf590c02c84b59b
libfdisk-2.32.1-35.el8.x86_64.rpm
bd6d600cd9d4293deec06f62e1f895b63f1c00dc3e0e2b3f9b2ecd4cefd8197e
libfdisk-devel-2.32.1-35.el8.i686.rpm
c84478f716363f9ffe341051a62cd21a4104f305c06f531a5aec976ca4fd159d
libfdisk-devel-2.32.1-35.el8.x86_64.rpm
bfe44a08b891e070ea7b97c6250afa79240d4d6635084b7f3578eb8e69e4171d
libmount-2.32.1-35.el8.i686.rpm
594e30bb82cafbae6f0ac3901835c0d62d2ac4d9beb8d0efdfa1e845950ee6f5
libmount-2.32.1-35.el8.x86_64.rpm
bd3e5751cab6297bd5e8aa3436a08840e2759b29177c2b89eab766dbafcd2a3c
libsmartcols-2.32.1-35.el8.i686.rpm
aa78c1e1f9309e2eb0dccb77dfaaced0fcf5ccd757d3f2da4b2ed67dcf9f8884
libsmartcols-2.32.1-35.el8.x86_64.rpm
c0ffeaac17536e4cfc427075ba685cdcdcd07924b9216c30040ae9809cba92e3
libsmartcols-devel-2.32.1-35.el8.i686.rpm
879f0a2f5b106105dea571ee55f209011ff66f4c3bea730ef4fe0cdc4cdddbb1
libsmartcols-devel-2.32.1-35.el8.x86_64.rpm
52b626e1620658b4027e10300725af53cc6cb8e0802b835a38f41cb87d2cbb5d
libuuid-2.32.1-35.el8.i686.rpm
94c4f159581b9e07e5f2c53a2aede1a4e598d8e3594dd6233406095716fb20d7
libuuid-2.32.1-35.el8.x86_64.rpm
60907c9926f21112aacc8b3f744b5ccc3b01b22f7926b429de41adc5f028ffec
libuuid-devel-2.32.1-35.el8.i686.rpm
f88faf2ef9acb9581e94a106860e08165368ed0c00e321a8fb830eb3163ca143
libuuid-devel-2.32.1-35.el8.x86_64.rpm
0af317de6d99b7aa80abe19f2881e7bcef7957da330ce9f42464dcad0a6493e9
util-linux-2.32.1-35.el8.x86_64.rpm
4f0204aaac907c88791f5b60d48479e24092c8eadc57f3091c8955d6db6b5095
util-linux-user-2.32.1-35.el8.x86_64.rpm
5815218ef28190f761f24797835aa339933ba494aca2c34f3199703138b405e9
uuidd-2.32.1-35.el8.x86_64.rpm
c241f4180f7201601b4367bc5ffab100425e641d18a7338484aca845254907ac
RLBA-2022:2106
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
tuned-2.18.0-2.el8.noarch.rpm
5fce0e7edf3d92b66410dc34428420823fe1902d5739bb83344aa3a8ad15598e
tuned-2.18.0-2.el8.noarch.rpm
5fce0e7edf3d92b66410dc34428420823fe1902d5739bb83344aa3a8ad15598e
tuned-profiles-atomic-2.18.0-2.el8.noarch.rpm
a1ee441a4d142c573f24276ce3588522453f1a35d7f8e0d44cd76df97d082eab
tuned-profiles-atomic-2.18.0-2.el8.noarch.rpm
a1ee441a4d142c573f24276ce3588522453f1a35d7f8e0d44cd76df97d082eab
tuned-profiles-compat-2.18.0-2.el8.noarch.rpm
41a9b955a0dbcd156a46cc8bae4c9d43aa7206dde34237d7fc9626017f956f4c
tuned-profiles-compat-2.18.0-2.el8.noarch.rpm
41a9b955a0dbcd156a46cc8bae4c9d43aa7206dde34237d7fc9626017f956f4c
tuned-profiles-cpu-partitioning-2.18.0-2.el8.noarch.rpm
26df8653cfaaa6f126c052d1caf19d81ea139c8538228b6d2766d24f95ccb670
tuned-profiles-cpu-partitioning-2.18.0-2.el8.noarch.rpm
26df8653cfaaa6f126c052d1caf19d81ea139c8538228b6d2766d24f95ccb670
tuned-profiles-mssql-2.18.0-2.el8.noarch.rpm
1ed6ebd24ab570019ec7eaaf0b3f79352b3bc99df4b85d076ee04a23f36b31a7
tuned-profiles-mssql-2.18.0-2.el8.noarch.rpm
1ed6ebd24ab570019ec7eaaf0b3f79352b3bc99df4b85d076ee04a23f36b31a7
tuned-profiles-oracle-2.18.0-2.el8.noarch.rpm
fc0ceffeba0fdf03da856c5d4378ecb92aac76190635ddd08af563db5768d8b1
tuned-profiles-oracle-2.18.0-2.el8.noarch.rpm
fc0ceffeba0fdf03da856c5d4378ecb92aac76190635ddd08af563db5768d8b1
RLSA-2022:2110
Low: grub2 security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: Incorrect permission in grub.cfg allow unprivileged user to read the file content (CVE-2021-3981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
grub2-common-2.02-123.el8.noarch.rpm
70e1b43a725f859c1f7458e7a5a6e2221e1b773a92b3ec953821d043ac515f44
grub2-common-2.02-123.el8.noarch.rpm
70e1b43a725f859c1f7458e7a5a6e2221e1b773a92b3ec953821d043ac515f44
grub2-efi-aa64-modules-2.02-123.el8.noarch.rpm
39caba50f51089470ca9eea93de6c215e54b3b0b6690eb967344483d82f9ffa3
grub2-efi-aa64-modules-2.02-123.el8.noarch.rpm
39caba50f51089470ca9eea93de6c215e54b3b0b6690eb967344483d82f9ffa3
grub2-efi-ia32-2.02-123.el8.x86_64.rpm
a6010e27ca04317791a4c4817cde985545c7ca6181204fcf5745380a8c1531e7
grub2-efi-ia32-cdboot-2.02-123.el8.x86_64.rpm
ebdd70b943b7658de866af9ec8bcbccf345691027118763b4d2109b5b37f2786
grub2-efi-ia32-modules-2.02-123.el8.noarch.rpm
54d02b7097fbbf27377dce910c2f56f2585ea6dc6a210173ddbd6ab2e03d529c
grub2-efi-ia32-modules-2.02-123.el8.noarch.rpm
54d02b7097fbbf27377dce910c2f56f2585ea6dc6a210173ddbd6ab2e03d529c
grub2-efi-x64-2.02-123.el8.x86_64.rpm
3f783b3d2763b8896e838a1b9dbc34b5fef04c24c689d9bfed2285de5076a27d
grub2-efi-x64-cdboot-2.02-123.el8.x86_64.rpm
dae93ec9318af8b6ca5a72433a3f419c1e8d12512604894518cf2c331be51973
grub2-efi-x64-modules-2.02-123.el8.noarch.rpm
a64ef405184b7ee49015ae9590de588303833326fc1b8fd472c560dbc6ad3128
grub2-efi-x64-modules-2.02-123.el8.noarch.rpm
a64ef405184b7ee49015ae9590de588303833326fc1b8fd472c560dbc6ad3128
grub2-pc-2.02-123.el8.x86_64.rpm
819921c439d1c08263adb74bfb6a5f3cd6d1417fb1dd190295e6d1e77c84f7aa
grub2-pc-modules-2.02-123.el8.noarch.rpm
44c9c3844abbbe0df5fa598a2ea1cfd525fd422ffa80cdabb3573631c88791c5
grub2-pc-modules-2.02-123.el8.noarch.rpm
44c9c3844abbbe0df5fa598a2ea1cfd525fd422ffa80cdabb3573631c88791c5
grub2-tools-2.02-123.el8.x86_64.rpm
386cf249df21ffdbf8103470c1e39ee2d1593ceb28f4b609d316effe7f05bff2
grub2-tools-efi-2.02-123.el8.x86_64.rpm
172af75ebb1705f161c10e21f062a2070604ba3975d4e2eeb9db46215d305f50
grub2-tools-extra-2.02-123.el8.x86_64.rpm
df6af39051771d8c5d5c2d5efa854e54f10c76314ba6459f0fdc2e3804b325d9
grub2-tools-minimal-2.02-123.el8.x86_64.rpm
2c90313295686eb855bd51d36436482d5f0bf21d564aa8ec59e4883a6c4066e0
RLBA-2022:2112
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
microcode_ctl-20220207-1.el8.x86_64.rpm
5566dfddadf8aa7fd6389a5dfc3375f3c2759d458311423013d7f7c270fc92d1
RLBA-2022:2113
expat update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
expat-2.2.5-8.el8.i686.rpm
7e5d0e3df51d42085a664a9aa4ba8e2a71bcbd470c0830d859c451d50ec18357
expat-2.2.5-8.el8.x86_64.rpm
7ce56f3de49147032bc897884ad2ffa24c2148b57b0a085b9b4f850a042d65a3
expat-devel-2.2.5-8.el8.i686.rpm
f8d29ee40715f114bc6d87d2afb45be8a47bb8065094a8fcb8b8fe15673161cf
expat-devel-2.2.5-8.el8.x86_64.rpm
4ea5841918674ab9835d4f427673115393bac63909e52aeea0c52382c481e9c6
RLBA-2022:2119
libsemanage bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libsemanage-2.9-8.el8.i686.rpm
8d9fcaba04fcc487669d045aa5d2d5db7a98f74d5fe27d6a22a039a46d99db57
libsemanage-2.9-8.el8.x86_64.rpm
ac7b636a3464d9fd1b3495a7941598fbe9a85c212ca1d0328729531498b44e22
python3-libsemanage-2.9-8.el8.x86_64.rpm
b17cd0a513f56753ee41d2bae80e10d8255ddf7e270fec95065127208cbf87d9
RLBA-2022:2121
libxml2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
libxml2-2.9.7-13.el8.i686.rpm
97549e27bf5bb556df5eafed25a0a371591fa95e09670a1c6019d8109e7e1f25
libxml2-2.9.7-13.el8.x86_64.rpm
fa53f0fa2e9cc9097762119ac519738d56507037255d3c3281d6aa9f24183343
python3-libxml2-2.9.7-13.el8.x86_64.rpm
6d29765870964d044dfffbcdac4c039c7e11facafd612343bbfeab0930a43448
RLBA-2022:2124
xmlrpc-c bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
xmlrpc-c-1.51.0-6.el8.i686.rpm
a99c57a777600afe6b56e83f1483338b7c94d6ab89aae2960db71e0043136a99
xmlrpc-c-1.51.0-6.el8.x86_64.rpm
4559b3ed016971aef595b9d3ed49ac7b1a805fcb9199479b9a0ae1a6b7281a0a
xmlrpc-c-client-1.51.0-6.el8.i686.rpm
83ff3aff7c59dd85e11ae2426e4ffbdfb2c6b237eda09a9892d17b891dd165fc
xmlrpc-c-client-1.51.0-6.el8.x86_64.rpm
8cfd6c921946ea070048384cf88f6758f63f6c70631c6d700f1589a26c3d900d
RLBA-2022:2125
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
sanlock-lib-3.8.4-3.el8.i686.rpm
54d350e7e6c8906ea78a3dbf42c7b762f06c668968dbe82d54b0594693f27e52
sanlock-lib-3.8.4-3.el8.x86_64.rpm
6465ed35a0f79905e6a7e58078c839573c2bb378199ee31d530e09a47450c016
RLBA-2022:2147
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of
daemons to manage access to remote directories and authentication
mechanisms. It also provides the Name Service Switch (NSS) and the
Pluggable Authentication Modules (PAM) interfaces toward the system, and a
pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* sssd_nss exiting (due to missing 'sssd' local user) making SSSD service to restart in a loop (BZ#2074648)
none-baseos-rpms
libipa_hbac-2.6.2-4.el8_6.i686.rpm
95b7904544bf4f63280a986361f46e58d23d3985cd5bf0f0a591127c24f1a9a0
libipa_hbac-2.6.2-4.el8_6.x86_64.rpm
f48a536cfac6479aac43df2355c5aaf3abd695ab63711e0e6b996b014883d88a
libsss_autofs-2.6.2-4.el8_6.x86_64.rpm
f972fcb563969224adcbb87164d09ced68de5104371283ac3290535be5942a24
libsss_certmap-2.6.2-4.el8_6.i686.rpm
547778429ea6fd5254248d0771f1313c34e0f55d06cb0e4f6d2d995fd6627297
libsss_certmap-2.6.2-4.el8_6.x86_64.rpm
310f6017d630f242f36d90a357b525d1cc007409ef0900e105d2b6d4c0daeb06
libsss_idmap-2.6.2-4.el8_6.i686.rpm
fbc2d677496522df66e44e1b740bc8af17bcc2a2250911721a002f0614f22845
libsss_idmap-2.6.2-4.el8_6.x86_64.rpm
ba83b1697f4874df5793f33005395ed91dea06b12a37944110b4331ffd232d96
libsss_nss_idmap-2.6.2-4.el8_6.i686.rpm
be0f4da4ff264d1e03fde51286f8c07f6bd4482571a942c2280c04e8f24f9480
libsss_nss_idmap-2.6.2-4.el8_6.x86_64.rpm
df8410a00bb35e692e3a84078514cbd04631e999e8ecb334a64debc714612b0a
libsss_simpleifp-2.6.2-4.el8_6.i686.rpm
428457e931f1a449bc466e495e1d666751513313508961d3e83a7275621cbb80
libsss_simpleifp-2.6.2-4.el8_6.x86_64.rpm
a2fa0f6a41ac1cc744405e816d7305eef24950376473e9743c6a4f33503b7248
libsss_sudo-2.6.2-4.el8_6.x86_64.rpm
1caba6c2ef56d6a3ec4100d0525f9e99e74be072ec1b834f770f9c77c0a9eb84
python3-libipa_hbac-2.6.2-4.el8_6.x86_64.rpm
d08edc7c9dd1f6ef536ad4050eb5da37e33ac24f9f764309f311515db5c01050
python3-libsss_nss_idmap-2.6.2-4.el8_6.x86_64.rpm
2ade705bae9fe6502628fdd7d062a1f19428aad48ee3796d58f221e586cae5d0
python3-sss-2.6.2-4.el8_6.x86_64.rpm
d4c0a75d3980d3ff38aca408b06da9a7ccf234ee93c2ad0817540b6d48b710d7
python3-sssdconfig-2.6.2-4.el8_6.noarch.rpm
6cd3e9a13d33c43d67c9abd0446b0afc23deb9b8952d6b1abffe140119bbc4ab
python3-sssdconfig-2.6.2-4.el8_6.noarch.rpm
6cd3e9a13d33c43d67c9abd0446b0afc23deb9b8952d6b1abffe140119bbc4ab
python3-sss-murmur-2.6.2-4.el8_6.x86_64.rpm
3243ee25c0d3af45db28a2b2f9d46475a1889ce20837050c3a2229fbdbe2ded0
sssd-2.6.2-4.el8_6.x86_64.rpm
d50985e4bf4868f7a9fc9bb869c01506cae03e705bb3172c16f106865f105cce
sssd-ad-2.6.2-4.el8_6.x86_64.rpm
09c55d645e87d7c3f9ef8c01b92d8890ba719db9f6e00e16fc843e7c2dcaf1ec
sssd-client-2.6.2-4.el8_6.i686.rpm
51e8deca9f1d21b5e62fb5305ff4cd01eecb8230a48c808bcfa6df04d6b8d2ac
sssd-client-2.6.2-4.el8_6.x86_64.rpm
c5cfff9ae226fe9257769d513e8466f7a2a92e4f842b05d217249c77daa96bc0
sssd-common-2.6.2-4.el8_6.x86_64.rpm
d559143cb45805df1fa6df8a0a8449372221a484428d292767a230d375d39963
sssd-common-pac-2.6.2-4.el8_6.x86_64.rpm
bf59cf12c76e33d73989ab92e0370f616ec08a2e2c54b999df56a5fa324a7767
sssd-dbus-2.6.2-4.el8_6.x86_64.rpm
d2979653eb1f351270eca0c5f6f991fc5255f9fc896011fdce91470e97be514f
sssd-ipa-2.6.2-4.el8_6.x86_64.rpm
6b4a84da29f003bcc6922565a3ffeaae0bf5ca8e45c3e42d3cfe09deacb598f4
sssd-kcm-2.6.2-4.el8_6.x86_64.rpm
37f5714fc732e6420f726be30e280e65ce5eec7b4897d58f17e1a888288d28fb
sssd-krb5-2.6.2-4.el8_6.x86_64.rpm
74658d88f8d99e03b0f3288de0ed41d2e2f2731b5d8905dd8836b1560164251c
sssd-krb5-common-2.6.2-4.el8_6.x86_64.rpm
8f3b1b6ce4668cf1ac17a8107554a1deffb91d75eeba7aaaa897163aa9ddd9b0
sssd-ldap-2.6.2-4.el8_6.x86_64.rpm
e565dba493568c17a2bde409dea0cd46ffe9eba8487379678ace045be5f0c3c4
sssd-nfs-idmap-2.6.2-4.el8_6.x86_64.rpm
521e04ae4250d51ee8abbbab1b034954d55142205bf89efcac75096132419607
sssd-polkit-rules-2.6.2-4.el8_6.x86_64.rpm
58b37d58d9f9847ee7e7ed54d75544299c06ecaed550cb0592c392acd8c462cf
sssd-proxy-2.6.2-4.el8_6.x86_64.rpm
ef942786bb74cb417b3fa7cf7479d47d46371d94c51543b6640078863eb42abb
sssd-tools-2.6.2-4.el8_6.x86_64.rpm
91c7b4373035f03e1866a68e324e824226a88b989af31709948f07129a6461d5
sssd-winbind-idmap-2.6.2-4.el8_6.x86_64.rpm
5e80a3646cd4ec4ecd7b630f9a5d9b9e2bca10eaa64c8f8bbaadc34c6155e939
RLSA-2022:2201
Important: rsync security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
rsync-3.1.3-14.el8_6.2.x86_64.rpm
6b37c35bfd44e2cb5f42bbaeb4608bfb008d7d7a733b0e88813a936a9f0105b5
rsync-daemon-3.1.3-14.el8_6.2.noarch.rpm
a56bbdfb5353a1121d1825f7cffc5090b881620d18b49ba057cd151a184633e1
rsync-daemon-3.1.3-14.el8_6.2.noarch.rpm
a56bbdfb5353a1121d1825f7cffc5090b881620d18b49ba057cd151a184633e1
RLBA-2022:4744
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* sos collect fails to get node list from a pacemaker cluster (BZ#2071695)
* Tracker for 8.6 sos OCP focused async release (BZ#2071824)
* sosreport causes out-of-memory with excessive memory usage (BZ#2071825)
none-baseos-rpms
sos-4.2-19.el8_6.noarch.rpm
b2ad02840888c772908d9baceb5d54c30fb803ff219953cb7ec342c71131c4f6
sos-4.2-19.el8_6.noarch.rpm
b2ad02840888c772908d9baceb5d54c30fb803ff219953cb7ec342c71131c4f6
sos-audit-4.2-19.el8_6.noarch.rpm
b455d95fde5e963234ea732fb6f1748a59571b883e8931c97c23f849d59a4fd3
sos-audit-4.2-19.el8_6.noarch.rpm
b455d95fde5e963234ea732fb6f1748a59571b883e8931c97c23f849d59a4fd3
RLSA-2022:5056
Important: cups security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: authorization bypass when using "local" authorization (CVE-2022-26691)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* 30-second delays printing to Windows 2016 server via HTTPS (BZ#2073531)
none-baseos-rpms
cups-libs-2.2.6-45.el8_6.2.i686.rpm
557819c6fca3e5fc811b3db4ac7d0d516de29f62195d20847cce139f109b39df
cups-libs-2.2.6-45.el8_6.2.x86_64.rpm
dfec97dfab969adbc68aa59962eea8d68096e0bfeb9eeb532de274bdd34e4a43
RLBA-2022:5081
glibc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Bug Fix(es):
* glibc: build occasionally fails due to test timezone/testdata/gen-XT5 missing a Makefile dependency (BZ#2073432)
* glibc: iconv: missing macron (unicode 0xAF) in EBCDIC-CP-ES (IBM284) (BZ#2084564)
* glibc: tempnam() regression in glibc (BZ#2093457)
* glibc: Incorrect results of POWER9-optimized strncpy (BZ#2094540)
none-baseos-rpms
glibc-2.28-189.5.el8_6.i686.rpm
b24c13dc3c84f8708ada540e914ec45e64602177e4d8685512c9a482530eea5a
glibc-2.28-189.5.el8_6.x86_64.rpm
6c2927504f17f786d0f65dbfd109acbf8ff0ef0df7eeaf242fafb01d8d1df77c
glibc-all-langpacks-2.28-189.5.el8_6.x86_64.rpm
d963ad61f4b3af7da786afa91b76b645b472078a6cee20b3c02b18010665d765
glibc-common-2.28-189.5.el8_6.x86_64.rpm
fc21ec2cfdfc141bee859b9e64cbe5429c9c09e29c70167428b3de7be942ca12
glibc-devel-2.28-189.5.el8_6.i686.rpm
bab02cf95fbaef6944fcd504df32a39bd6d7aaa14fc1bbd9eeb3ab647c8cb97a
glibc-devel-2.28-189.5.el8_6.x86_64.rpm
71b72040bb96f8a003fdcb0ed8ef36301bd3bc6a1a023f10c4151335e4b46ec5
glibc-gconv-extra-2.28-189.5.el8_6.x86_64.rpm
71c26d0614ad910f5cf0a42be15e539daaa777bee5fa41c1436ffcafce3d763d
glibc-headers-2.28-189.5.el8_6.i686.rpm
6704611519fc3eb4fb7218a7a83dc12b2dda3a4688853b6cf88583248a40dcf8
glibc-headers-2.28-189.5.el8_6.x86_64.rpm
b652f9142489171829636c62cc825ec1786fc347a26abfa15b5867a6b646068a
glibc-langpack-aa-2.28-189.5.el8_6.x86_64.rpm
f34f009b474d4db9a194d51346cdcef07bc23ef80722381b2adce6fdc9b601de
glibc-langpack-af-2.28-189.5.el8_6.x86_64.rpm
605b1e53fc365bd4498a1921c6a78545f804e3437b5fe3c2f9b0a1d8d43ef405
glibc-langpack-agr-2.28-189.5.el8_6.x86_64.rpm
018e7b66d1cd4189aaa17ce9b7b62fcb20c6ca0d05e501b70d28ed88b105bb3b
glibc-langpack-ak-2.28-189.5.el8_6.x86_64.rpm
f05b0539c285bf611d5563d3adc635d9e7a01e076f185b581181d870de77e54b
glibc-langpack-am-2.28-189.5.el8_6.x86_64.rpm
8c9cfeee07e1b907446de76c7635fa47a4cd50a5b8226c9398ea65c58f6007a7
glibc-langpack-an-2.28-189.5.el8_6.x86_64.rpm
1a5b5c66672015db5cd32f468181734cf25d545b2996bf481ec52cb7fbadf998
glibc-langpack-anp-2.28-189.5.el8_6.x86_64.rpm
018fa9321221ab96b5bfb4a12b7d9dfe984f293568afcd47010897c6765da1d5
glibc-langpack-ar-2.28-189.5.el8_6.x86_64.rpm
1fcc2cbe5a50fe5b1bb29fbb306f169c04fd457b892ce1d3ae9aabbd023fb160
glibc-langpack-as-2.28-189.5.el8_6.x86_64.rpm
55b0b7fa1a86e54d60af9302daec26226be942b199af605f213b3f640eb363ef
glibc-langpack-ast-2.28-189.5.el8_6.x86_64.rpm
419afa19c7cfc151cd2e53f3b675a8de019ba23a944547654ad9fc337acb7332
glibc-langpack-ayc-2.28-189.5.el8_6.x86_64.rpm
56e4dba00a7451a6950fbd6b3739c5ed21e78ab16c45f9894c4404f782269225
glibc-langpack-az-2.28-189.5.el8_6.x86_64.rpm
d69772b43530e3c6363275bab0e8c3654856072fc0ee32a8a288f5c29d77fd10
glibc-langpack-be-2.28-189.5.el8_6.x86_64.rpm
26e4a8df6eb2a1c8782f0ee9669ca96c7843139379b0e4b8b6f774fa60901806
glibc-langpack-bem-2.28-189.5.el8_6.x86_64.rpm
abf295fb13b3bcc867840e164ef07186235a754ed60af95c83b5b7c9a367f997
glibc-langpack-ber-2.28-189.5.el8_6.x86_64.rpm
4c696c00db173e14855d21778ce8b9a205d675abad15ff8d2fab4693922ceb9a
glibc-langpack-bg-2.28-189.5.el8_6.x86_64.rpm
ef72ad4a4eddc579368eb0b6273c985cf4e90ac8cb2528cd4c5cea3cdffbd3ab
glibc-langpack-bhb-2.28-189.5.el8_6.x86_64.rpm
47e509d8c536270ab64d0d3389a0c0e0f1def750e0f1b7b82079c45e31118d39
glibc-langpack-bho-2.28-189.5.el8_6.x86_64.rpm
804920a91c79a6402d35bbadaa27a957c2dd35e593281f1e38f5250420ad7f91
glibc-langpack-bi-2.28-189.5.el8_6.x86_64.rpm
49a45d8d16b2b39a7964c3404a3c83ed4a90b88c0215713ce36ca44fc3e5ccb6
glibc-langpack-bn-2.28-189.5.el8_6.x86_64.rpm
31ba0a4ff2a56d8e487158e51a94bb92105102a466df1bd526cf9fc7b3809670
glibc-langpack-bo-2.28-189.5.el8_6.x86_64.rpm
1def56f73d8a709028802c61855e384333ec77c807d97550a1b47f665ff23a13
glibc-langpack-br-2.28-189.5.el8_6.x86_64.rpm
b9cfc8a11b979c81d2b955b22843339c3fcc7f5e9b737894f603a7c5e5fa5d57
glibc-langpack-brx-2.28-189.5.el8_6.x86_64.rpm
8b651e850a4937e3e867841b317490510f2c8404cd09837e1c47a40d10975144
glibc-langpack-bs-2.28-189.5.el8_6.x86_64.rpm
8992d3a3ab04f58a2c06655f2b8729efd1dfb1a67f0d56e3be987cb51f9fe102
glibc-langpack-byn-2.28-189.5.el8_6.x86_64.rpm
ee3ce98fac6bea39d3d4552ead631fce5680818fb14947b5ec49872bce33dbe2
glibc-langpack-ca-2.28-189.5.el8_6.x86_64.rpm
bd3365cb5cb143582dd288db1eac7831f2a458a76e23ddf36b99a77711995f0d
glibc-langpack-ce-2.28-189.5.el8_6.x86_64.rpm
e1918ba13b973c04af4b5a05c603c04e50481d71adb523dbe4b646d1c241c270
glibc-langpack-chr-2.28-189.5.el8_6.x86_64.rpm
ab9e128f86dc434ca1934b0a44cfbb32256cd212ecbab8878f99be3025e05a9e
glibc-langpack-cmn-2.28-189.5.el8_6.x86_64.rpm
56e6fcf7fdef50cb55be5eebf4e75a0840d02c8d89ef686cb4abd952c72666b3
glibc-langpack-crh-2.28-189.5.el8_6.x86_64.rpm
fb70d279123537d4a4bd89c666b92ab505d9cb6262b68ffb36ce362e9beb2eae
glibc-langpack-cs-2.28-189.5.el8_6.x86_64.rpm
f20ec10010828c3268f66d1d6c274bade3bbfeee9fa52001ce37fd7b2e1733ec
glibc-langpack-csb-2.28-189.5.el8_6.x86_64.rpm
b2c6bb4262471237408689b58f63489b5eba8abac0d62e4a8ee44df75145abee
glibc-langpack-cv-2.28-189.5.el8_6.x86_64.rpm
da187292d95541c260b9fc2b8dcff8c701d8cde7c40c1a52fa746abb81f4bb51
glibc-langpack-cy-2.28-189.5.el8_6.x86_64.rpm
c73b05b067c9a04347f8039397df59dfe0ab224c8c6e90e4174533920d7f5ecc
glibc-langpack-da-2.28-189.5.el8_6.x86_64.rpm
f137c92a605ca56c60623b2da3f5f0ac14ee2d517d637068aaab783fb5ff7924
glibc-langpack-de-2.28-189.5.el8_6.x86_64.rpm
0022e51fd04a174c137c575ee64ba898bd495cde7671e14a09a4d7d14c80d5a7
glibc-langpack-doi-2.28-189.5.el8_6.x86_64.rpm
749b3a3c9fc53de3e0083fdc88131fbeb2fad2e66873655c97c0cb8f66acc1d5
glibc-langpack-dsb-2.28-189.5.el8_6.x86_64.rpm
dbda1126940676269f7c743645c14158aa4a573cfe58ca5ef341161046ee3225
glibc-langpack-dv-2.28-189.5.el8_6.x86_64.rpm
c80785d2c431cc28d36257318eaf39ff562ef335a792c97919d43befb24381b6
glibc-langpack-dz-2.28-189.5.el8_6.x86_64.rpm
1f58ab39b91bb82e30356e977807f981972c423c3a5b3ddc0460dfbc5e2a810a
glibc-langpack-el-2.28-189.5.el8_6.x86_64.rpm
7c0749b44c84d087a96eab393a461228bb898dc3924aa3d3073eb04510ad3218
glibc-langpack-en-2.28-189.5.el8_6.x86_64.rpm
77261afc0f7c325b5473792ca18cb1b5e3c4182a57d7f56ef41a36146564666f
glibc-langpack-eo-2.28-189.5.el8_6.x86_64.rpm
6ce72788b7535c5a9362954eafe339238da739826a78c16d7dffbd928c118a3f
glibc-langpack-es-2.28-189.5.el8_6.x86_64.rpm
f097ded03cc78aba20ecd8d4895b95c9cc799914829168a5b77a08ad7335f73b
glibc-langpack-et-2.28-189.5.el8_6.x86_64.rpm
1cb8008dfcaa92f2a11b48419530a85dccdb66c5c89ed7877f3ea6761833a47a
glibc-langpack-eu-2.28-189.5.el8_6.x86_64.rpm
cd23edf48974dd9a9d0686442333fbe39edeb692b817b7ffe6bb7d96ad413213
glibc-langpack-fa-2.28-189.5.el8_6.x86_64.rpm
73897f8ac07836574255f3d96bc5f95bcf7c050a779ad3b021b2a971c9ee46ad
glibc-langpack-ff-2.28-189.5.el8_6.x86_64.rpm
af210a52fd61c314628598400434f4004b8e6228228b9db5848d0cb5cea6d09e
glibc-langpack-fi-2.28-189.5.el8_6.x86_64.rpm
be0561240868c688574bacf007b0793c85b642328c4e0ec8aca00ca5b331e47d
glibc-langpack-fil-2.28-189.5.el8_6.x86_64.rpm
9139392db87910c6a20b12d3c77e4938dd276fad83939f28872a826e8cbfbfcd
glibc-langpack-fo-2.28-189.5.el8_6.x86_64.rpm
b1b1c69240d45325bee9108b1eaee03fec4c0b952b3e04f56aff3dbc3a0115ed
glibc-langpack-fr-2.28-189.5.el8_6.x86_64.rpm
c89262c6a634fb2200db8af5d56f56c5e39b7db88fcc64340bf643e00f807b4b
glibc-langpack-fur-2.28-189.5.el8_6.x86_64.rpm
0fd39fa244ee1e12b612ba00debc322d13dfde4b3b9f52f4fbce5cc61dbc2630
glibc-langpack-fy-2.28-189.5.el8_6.x86_64.rpm
8a9347d41c9e51e737b04a32c6333d6778346049dee95443103a85e9e180fcb8
glibc-langpack-ga-2.28-189.5.el8_6.x86_64.rpm
3d0811093f4af847348b0d4d834989fa9d765ead3007581cc6c2f3e4a7932463
glibc-langpack-gd-2.28-189.5.el8_6.x86_64.rpm
6ce87778d75cfbc6c2ae0a4f2fbf4c2feaaeb0176dd5674c19efa965d90b24d9
glibc-langpack-gez-2.28-189.5.el8_6.x86_64.rpm
075f4d08c3ba11223af1921633473946a37852e9fe1612422105b14c400d31cb
glibc-langpack-gl-2.28-189.5.el8_6.x86_64.rpm
3edf796fb0be50e29503ecc07b5879ead68e7ad6ba9965572a7acd005033ea90
glibc-langpack-gu-2.28-189.5.el8_6.x86_64.rpm
f89268cb55d21c5187ddf1ce124b5ae6fca6b76618b655c85037b3a08322313a
glibc-langpack-gv-2.28-189.5.el8_6.x86_64.rpm
8351b703cd92b70503e9559915c7b876181bfa983abd219829b2ea3c15a47e12
glibc-langpack-ha-2.28-189.5.el8_6.x86_64.rpm
dda7ae36b1554baa887a42834c953cb877f820e455e66ee4a949b97a80bfba74
glibc-langpack-hak-2.28-189.5.el8_6.x86_64.rpm
27191be947db9d05375b74e32ed43227220132627571b629274b7ac673ee8479
glibc-langpack-he-2.28-189.5.el8_6.x86_64.rpm
7853198601bf87c59b3ea932baa6d7123e2bbdbc2ded7cf1faef6cc15cdad7ff
glibc-langpack-hi-2.28-189.5.el8_6.x86_64.rpm
4e0197301702444e17a82d98c8b50c068c4e08dbe7a266942ae3c74f5eed2e6b
glibc-langpack-hif-2.28-189.5.el8_6.x86_64.rpm
39be0f2350074e9e1ed3fa883feac9cde715023ff189e47e1f58f30ead8ead06
glibc-langpack-hne-2.28-189.5.el8_6.x86_64.rpm
45f12effac0847ec1b5ea0e39d2ea5bd9abf101fefc01195a7bd9130feb8b1da
glibc-langpack-hr-2.28-189.5.el8_6.x86_64.rpm
91568e146d81ff4246e3d9b6b111aa9a0d300a33a918b12fcc7611670ea9aa50
glibc-langpack-hsb-2.28-189.5.el8_6.x86_64.rpm
b6cb62eb9da2d321c6735ffb3dab4a1e4e861c557449251fdddaac656f46810f
glibc-langpack-ht-2.28-189.5.el8_6.x86_64.rpm
5cc61b34f549b06f79c7466d54a6be97064a98a2cb5258d53d556ccf10ba54f6
glibc-langpack-hu-2.28-189.5.el8_6.x86_64.rpm
d3f5d9ae1057e4d1b84bcd3a5f2738a4dca87f949b4c91231e6227b8c1063d4a
glibc-langpack-hy-2.28-189.5.el8_6.x86_64.rpm
b69790157cbfc473ad59012ea7e74c33eb2225afa1a4bda971d8ccac3ec85f94
glibc-langpack-ia-2.28-189.5.el8_6.x86_64.rpm
63449049558db0080772a8c44a586dc5f6731a57581eeb7662f4a23017aab248
glibc-langpack-id-2.28-189.5.el8_6.x86_64.rpm
a0ccd6c08d63469ada29428f9871dc23c0381f21ef3ac049cf0b0463fd730193
glibc-langpack-ig-2.28-189.5.el8_6.x86_64.rpm
2b23a6cfe16065816964af4f955b3731445440c1587435693370313c0d8bd2e4
glibc-langpack-ik-2.28-189.5.el8_6.x86_64.rpm
4032784490d4957d0b693a59b38d25d9add629a843bfc8f9c878f353a0c3abf4
glibc-langpack-is-2.28-189.5.el8_6.x86_64.rpm
3ff9cea53a1320c58c71cca13fc09b4a804e2a83d7ac39ab66fd23dcd59602ac
glibc-langpack-it-2.28-189.5.el8_6.x86_64.rpm
a6edaf059ad20a776ab7ca72c91091b92717dff097863a1223100b8b6d606c89
glibc-langpack-iu-2.28-189.5.el8_6.x86_64.rpm
77a937ae010e9276c84e5233c9c0a0522803a31a72839d468781e88b7c5964cf
glibc-langpack-ja-2.28-189.5.el8_6.x86_64.rpm
3248bea7d4713ccfc08234288df822105d6e68abde65654eb10d2b67654bbb24
glibc-langpack-ka-2.28-189.5.el8_6.x86_64.rpm
9d59e5b94a0b7f074bbd64654d237e4542c95da2395d36ed3606641776cbd719
glibc-langpack-kab-2.28-189.5.el8_6.x86_64.rpm
2208cff0a64c4630750a486a86fccd6b9c2e09be5f63effc27806c32070d52f2
glibc-langpack-kk-2.28-189.5.el8_6.x86_64.rpm
40e366efdeb2b4ef3521058950d4afc7ed26df7f73a3ead7f4fdef907f9f8762
glibc-langpack-kl-2.28-189.5.el8_6.x86_64.rpm
7c21783ef43a5bd2ba8a51f820f747e782e992a4f0a576b850fc850de13042ff
glibc-langpack-km-2.28-189.5.el8_6.x86_64.rpm
4e341e7221cea4d90e0036e5ba5b95d0ae530625f04fb5350f5f5c84c7d8fcb4
glibc-langpack-kn-2.28-189.5.el8_6.x86_64.rpm
157b328363ceeb51b281a7778e692d737e5a8eb78dca43d4a6c54832b1d18877
glibc-langpack-ko-2.28-189.5.el8_6.x86_64.rpm
7f0dfa4f111108d328409c6adb021f733e5b2448e5769f3cace0a3496c3ae1ce
glibc-langpack-kok-2.28-189.5.el8_6.x86_64.rpm
2ac7f527108ee43143e9807564b8be5db8124a7331b207fc5b042c3eb0049cc0
glibc-langpack-ks-2.28-189.5.el8_6.x86_64.rpm
96a570b1b9fbee76b78b40252781a5e22ef0a2f31f19a4747fcfe758d08b6863
glibc-langpack-ku-2.28-189.5.el8_6.x86_64.rpm
8f363f20898a10669716feb73c92291afc034d593367bcd028bb1c21fa738b60
glibc-langpack-kw-2.28-189.5.el8_6.x86_64.rpm
33224fe0448c63bff14a5c75a5cd286bedf08c6ec0f0f98fe9f61c6c3565c02e
glibc-langpack-ky-2.28-189.5.el8_6.x86_64.rpm
796c5683b3813e78766ce02fcd4225313850dea17e82019518084f5f47b5f142
glibc-langpack-lb-2.28-189.5.el8_6.x86_64.rpm
e9a3c4057d880d4b90ad2c93c7671e63a216112ff8cece1e2446f2e414e7409c
glibc-langpack-lg-2.28-189.5.el8_6.x86_64.rpm
53cce81f8815d8236f91fa8832d0fac3c6e82bf5b1eece02f717677124a832bd
glibc-langpack-li-2.28-189.5.el8_6.x86_64.rpm
a86a901c14b3e6bab99dbd6a7a428c0f1373b35b2fdc1b019c7aa10b9a7287ef
glibc-langpack-lij-2.28-189.5.el8_6.x86_64.rpm
e4d46ff17d71e0df3b8bc519f97deed65746966db8d943f89f9cd3573ae5cf69
glibc-langpack-ln-2.28-189.5.el8_6.x86_64.rpm
b1ad73673e4563e391b1f1eadf14660c449b114d3a088362ad14272741722bfa
glibc-langpack-lo-2.28-189.5.el8_6.x86_64.rpm
865b8fb8ecce0a544848597465678dfa6627d90d4cb7f2a8625b4e03bf30e434
glibc-langpack-lt-2.28-189.5.el8_6.x86_64.rpm
942b2d011eacb0a17d66798a45fb4138a35b96f4c1c3862f6049a1a3be5a1722
glibc-langpack-lv-2.28-189.5.el8_6.x86_64.rpm
9a4a9915d35a67bd98d320f670d1b73d5e07d31934e02158fa162372aa0999e1
glibc-langpack-lzh-2.28-189.5.el8_6.x86_64.rpm
cd8b109b06a090a3d646a7a7880b4f2c962c34e0d76da7239a1ada59bd718f62
glibc-langpack-mag-2.28-189.5.el8_6.x86_64.rpm
dd1c2e9c1d69be6a7e54279cb39f6981aacf358c694dd1de1dc48909a4c80505
glibc-langpack-mai-2.28-189.5.el8_6.x86_64.rpm
3f4df409654de829f63d66e935bf27d172a0d154b93014c4d2ed783a843c6a52
glibc-langpack-mfe-2.28-189.5.el8_6.x86_64.rpm
d3e8f5234078a19233ecb8b4141281297df7ea7fc187d3b096b2d1a78bc4382f
glibc-langpack-mg-2.28-189.5.el8_6.x86_64.rpm
309026f18fe6a9a5fc60e42be95a885ce8b21fd39fa62ec774a5443746aa846d
glibc-langpack-mhr-2.28-189.5.el8_6.x86_64.rpm
ba46fc9db6e592c52af68610f9eb26f922c86093ed4bb7ce2c3e58c0895d3ae8
glibc-langpack-mi-2.28-189.5.el8_6.x86_64.rpm
278fe509159043fb1f808b7ce371723894c575e5eab8c8887015022ddc60e4ef
glibc-langpack-miq-2.28-189.5.el8_6.x86_64.rpm
95fe1a30ab8b629b2cdd510e4a93a40d22db227ae90b211230ab11e803f02ec6
glibc-langpack-mjw-2.28-189.5.el8_6.x86_64.rpm
4f6f91c574c1b496dbe1aefc38f6cb2402ccf302a94631f538aa735515e92f61
glibc-langpack-mk-2.28-189.5.el8_6.x86_64.rpm
b3e8fbeb9c7b714d6061e7cf45848f4d7c0bdcae2458711ef12fd78625fd319d
glibc-langpack-ml-2.28-189.5.el8_6.x86_64.rpm
47bdce9c6e6d04ca6fb461fe2d6eacd54e9e39dbc3f811e97a63af7890327ec9
glibc-langpack-mn-2.28-189.5.el8_6.x86_64.rpm
b8402390545ae355f440a5ac80ac2e811d109c970a01b3a75b5ea6fa1414c551
glibc-langpack-mni-2.28-189.5.el8_6.x86_64.rpm
49ceb0c172dbdad1b9bef2a2a5dc0c8dfc1896134dcfc7e5cb8d0cfd70ba5a07
glibc-langpack-mr-2.28-189.5.el8_6.x86_64.rpm
44484c5574d951c5e5676a8c9849667aa339ba5be0eb38b96d3f45c67e9d0238
glibc-langpack-ms-2.28-189.5.el8_6.x86_64.rpm
b4fd629e5ab8c9ccfbff8bb57fb087058799bd5edc768f764d210bb25975a86f
glibc-langpack-mt-2.28-189.5.el8_6.x86_64.rpm
dc9a538079414c7033e6a49f8eea69d68897a2ce9160d25c46202375b75dddae
glibc-langpack-my-2.28-189.5.el8_6.x86_64.rpm
617bf9f50b0fff1e9254aa6d2ea855d3b6a795527dea9f041ebf1ab6828bb24f
glibc-langpack-nan-2.28-189.5.el8_6.x86_64.rpm
b22a756c34eeb7a753df5a0ab3e62067e093b73a038a3e1b6afb5e68e7e92182
glibc-langpack-nb-2.28-189.5.el8_6.x86_64.rpm
87fd55ce8eb80daea3d65fdec7b43ce7bfd502f4fa6861c07e91dbaf909a2451
glibc-langpack-nds-2.28-189.5.el8_6.x86_64.rpm
a1c83aed057216fcc87a81021dd99c381de2d29fbf020857c882f8822293cb03
glibc-langpack-ne-2.28-189.5.el8_6.x86_64.rpm
c4752151a431768377f7d36728dd7acd5b1796a24128c93a8632a834dcd7a209
glibc-langpack-nhn-2.28-189.5.el8_6.x86_64.rpm
866f1080f05081dac12b30ab38bfedf507a5f5101245a90c742af9ce8cdf027a
glibc-langpack-niu-2.28-189.5.el8_6.x86_64.rpm
a88f7c6cb39453ea9030f4373fb2c240c3d4bf0df25a4e99c6e7fbec82ddaa8f
glibc-langpack-nl-2.28-189.5.el8_6.x86_64.rpm
8ad89e566b858fbdcac76bb9844fcad7c69d0c8f067b5ef7919340866de55aea
glibc-langpack-nn-2.28-189.5.el8_6.x86_64.rpm
591b2aa377921a5444bd4b84656ca6af9d6b26e567b2bcb7570ec79b55f05bf9
glibc-langpack-nr-2.28-189.5.el8_6.x86_64.rpm
225051ea86601bf2542d7467166a25f7e8828970c91b55095c8e702e76d412bd
glibc-langpack-nso-2.28-189.5.el8_6.x86_64.rpm
1a5eeefdabff0fb1091d0fe618ac608a2cb074a2d49aaeb020097efe56040f78
glibc-langpack-oc-2.28-189.5.el8_6.x86_64.rpm
6e1eaf9cd56dc54e8cb6e564227787b2c698afe03a06d1ab904de75a394723ba
glibc-langpack-om-2.28-189.5.el8_6.x86_64.rpm
fe43f3e88e112a452cceabfd06e2f069e70a24ad995f0555f8606caab41655b3
glibc-langpack-or-2.28-189.5.el8_6.x86_64.rpm
b8b51fa2eb63c23dced82263c4d086fd3df116092837014bae3ec9ea12b776b3
glibc-langpack-os-2.28-189.5.el8_6.x86_64.rpm
34fd84d1c458683992dc301fc73553a6384c33ca7404222fe2e2af0cb576d626
glibc-langpack-pa-2.28-189.5.el8_6.x86_64.rpm
7373aaf4d507c6101607573d7b50d8d39dcacb4daab027e9d11c72d1fb4eac2c
glibc-langpack-pap-2.28-189.5.el8_6.x86_64.rpm
f169400ef95dfab2ecb3b93fe9c97b850c7009166c914272b76e76bb0e22cea9
glibc-langpack-pl-2.28-189.5.el8_6.x86_64.rpm
6e41b2b5ac9ef3315395554551423e10aba1a90a7b3ebb01b80ec9f43f7ed171
glibc-langpack-ps-2.28-189.5.el8_6.x86_64.rpm
6d7498ceb7e38baacaed8d0f570684f4190fe2a5d4111a8f0d88ae6f18daaece
glibc-langpack-pt-2.28-189.5.el8_6.x86_64.rpm
9257f5a62b48940a557becb345a4fbb511826ddd466f25aaee2970f3d5f8ffb0
glibc-langpack-quz-2.28-189.5.el8_6.x86_64.rpm
bb4b98a14bdd1c66208612aa444ea805280f0a4f121b8e011c44113b3dad22e4
glibc-langpack-raj-2.28-189.5.el8_6.x86_64.rpm
790a5f6687d358a4079a9385c2505739dc76fc220202eb5f2dea6b38918b31f9
glibc-langpack-ro-2.28-189.5.el8_6.x86_64.rpm
5bf326b2543a32ca62506a52e16154ecac2728d32265340915af0b7e170af351
glibc-langpack-ru-2.28-189.5.el8_6.x86_64.rpm
7684331dd1ac7ebed2578a2e3760455b541a74812248cd555bc9401e9cd7f591
glibc-langpack-rw-2.28-189.5.el8_6.x86_64.rpm
c0334e8c177833baa7af89986658cd407b5e2c66c48c71bb559a9001413d04bf
glibc-langpack-sa-2.28-189.5.el8_6.x86_64.rpm
772e11fba6c2266f6d47a0617e5c984355eb5dbe927c1ef519ceb276c50c0a7e
glibc-langpack-sah-2.28-189.5.el8_6.x86_64.rpm
4c213b76fbc40bca86ca4665ee6ae96357665d684c071f1f2e4c2d508bfea6c6
glibc-langpack-sat-2.28-189.5.el8_6.x86_64.rpm
092cd13a5dfd2cadad14e7126c0ef33a2152782c3912bb4749966ada7cf45c7c
glibc-langpack-sc-2.28-189.5.el8_6.x86_64.rpm
0dfcd453f2c6e3f90546fa72805cddb50b22d29dacf8cf08a5b12c43ab194653
glibc-langpack-sd-2.28-189.5.el8_6.x86_64.rpm
b298bf3365ff0250f14214522bbbb54bd3c9427858f8152479902d9dc2212842
glibc-langpack-se-2.28-189.5.el8_6.x86_64.rpm
8d4fdc0fa74ba1332e05395eb67e6b71a7994fd1d58da0cdb84d7639eb3cd645
glibc-langpack-sgs-2.28-189.5.el8_6.x86_64.rpm
a61c554d4092652376709f1d1d28bccbce4b50b4a949636621c7227015064cda
glibc-langpack-shn-2.28-189.5.el8_6.x86_64.rpm
fb69898654bd45b02b390e538ebca8daee5e5d869abe1a86b1201cfbc8d3b7dc
glibc-langpack-shs-2.28-189.5.el8_6.x86_64.rpm
375b2606d0db024e5d9f00fe9d73e671b0253ea893b90446e5b5bc3c4d50a6f8
glibc-langpack-si-2.28-189.5.el8_6.x86_64.rpm
5b5b6ad1dede44dacf8fb284ac7e32d7badeb1373745ec407032010566b1537e
glibc-langpack-sid-2.28-189.5.el8_6.x86_64.rpm
7490e824cd86fbb5577561ac9edfc580be263c38443485eacfa6ab64b61354d6
glibc-langpack-sk-2.28-189.5.el8_6.x86_64.rpm
9119924f936c206561ff7fffc39303bce3fbbbeacc55fd4145132e19638c224b
glibc-langpack-sl-2.28-189.5.el8_6.x86_64.rpm
c8eba94cc4b8b7af412780dcf07d087b7e9c1b5d06eb57101b9b01c555ac1e57
glibc-langpack-sm-2.28-189.5.el8_6.x86_64.rpm
33d4b1c79d54692ff4dc3fd0ab6cbc8fa188ebf95e5c5cdad224b81ea57e08c8
glibc-langpack-so-2.28-189.5.el8_6.x86_64.rpm
9efc47c86bf05dbe0c3886490f9ccf1ebaa90730de87294200382a99ee178f6c
glibc-langpack-sq-2.28-189.5.el8_6.x86_64.rpm
defdae94eb000c5d324aa6b98a8abf9947b1cdda62482db6b83d319c7c785570
glibc-langpack-sr-2.28-189.5.el8_6.x86_64.rpm
78c22a638af834c43dbe47a8ab40cac05a9242654d267f4c46eeeec990bb2bb3
glibc-langpack-ss-2.28-189.5.el8_6.x86_64.rpm
47588cfc28a73b10e1d8eb5c813b6bfa03b851c5e056ab8c34285129575f26c9
glibc-langpack-st-2.28-189.5.el8_6.x86_64.rpm
42fd2f33cccf54f59a6ed94520e016abe10852cd25e4bde09522d389fbfc8dee
glibc-langpack-sv-2.28-189.5.el8_6.x86_64.rpm
278390ceda1344a92c56335e2b762af15734b6d551a3bf5004172fa5095f8cf2
glibc-langpack-sw-2.28-189.5.el8_6.x86_64.rpm
cbcbf2f4be795e494863426db5534a5a59e44a0c6c9a7249fc38066fa06f3853
glibc-langpack-szl-2.28-189.5.el8_6.x86_64.rpm
d190d9a5fa2306c6f43e894a52e7f33367be4181ec1deefbeeceb8c6a45be710
glibc-langpack-ta-2.28-189.5.el8_6.x86_64.rpm
e3a621d507f02c617cd3d48ccd5d4bc273ad482652ec14a4c95d13c15e470c56
glibc-langpack-tcy-2.28-189.5.el8_6.x86_64.rpm
a41691d5b52eddcf9f5831a19bd97d0803f73d559657972027b33cab367ba9b9
glibc-langpack-te-2.28-189.5.el8_6.x86_64.rpm
2479d30baae3acebd5b225c95c7a02d0b3d574d598d20644efb35aeacd1a2415
glibc-langpack-tg-2.28-189.5.el8_6.x86_64.rpm
2ae334bd145b63b0d033282ef73fb96cf0ae826649cdc8fd2a134a9dea10f010
glibc-langpack-th-2.28-189.5.el8_6.x86_64.rpm
b9ab9af754354852285ec33cadfb736dcda0b0ea74d58ce685b74de784f2c08f
glibc-langpack-the-2.28-189.5.el8_6.x86_64.rpm
b2e9e6d007d41cba59a920a41c18a20385f52ad5e08c3adf0f77c7cc8c872cba
glibc-langpack-ti-2.28-189.5.el8_6.x86_64.rpm
67b55a7039b3681731cd99f5dd3e51e1683ebec27315fb1dc276dcad6a674bba
glibc-langpack-tig-2.28-189.5.el8_6.x86_64.rpm
08d9bf47825dab5449884f8c22526188f9eac01e8f033a378badd35113310c2e
glibc-langpack-tk-2.28-189.5.el8_6.x86_64.rpm
e8bcef333987e3f7e6da545c6db65970e35e6b1b06dc25f7e2ba7e9276fc4fac
glibc-langpack-tl-2.28-189.5.el8_6.x86_64.rpm
b5fd42a350d5decaa0024b7a9fd7f723b5c5ee0bb994a8ff7b337029fa9deaf6
glibc-langpack-tn-2.28-189.5.el8_6.x86_64.rpm
0e86159eac7b0783b9b6f3694e633fd5a0050519222832fad35461fda784c802
glibc-langpack-to-2.28-189.5.el8_6.x86_64.rpm
0fb8a6bf1812daf20d3e8f49356f80c1c6bff4ebc194047a16936a13bc1050e3
glibc-langpack-tpi-2.28-189.5.el8_6.x86_64.rpm
b7c2385d02c4b9f1b0a35272b3ffd20457d7bc22c7ab1414ab233fe2c4c7b24d
glibc-langpack-tr-2.28-189.5.el8_6.x86_64.rpm
932a0d0e9e00f46882ca8ce7d7bdbfbd440c2125ae822876c2027546f07ccfa8
glibc-langpack-ts-2.28-189.5.el8_6.x86_64.rpm
176719ad6517f6058297e6cccdb53335a449ead9fc290fcb40efbe95e47f5fff
glibc-langpack-tt-2.28-189.5.el8_6.x86_64.rpm
f6280464bfd6a5d2f87950b94a80e63da7b295f5d6d7739bbffc2ac2b21033b6
glibc-langpack-ug-2.28-189.5.el8_6.x86_64.rpm
296402d4474588f463f1f9f25cbd4437e79c5ea04fe08838267681820b4a6a7e
glibc-langpack-uk-2.28-189.5.el8_6.x86_64.rpm
3f22568c50025ba7fff43e4d0786f1e9aad8d009927074f3d1e15ffc6412aeb5
glibc-langpack-unm-2.28-189.5.el8_6.x86_64.rpm
803bf3e2e6d19443261b931caa7a81ca4357a04f5d478ee262605b5cfe559d31
glibc-langpack-ur-2.28-189.5.el8_6.x86_64.rpm
9df984018d6ab8b077984b40362195219d3bf1d5fbe7b929b5d1144d4c8fc16d
glibc-langpack-uz-2.28-189.5.el8_6.x86_64.rpm
8e0e898635f6e73c0f818a4f170099df87e145cbba7b14a687a56df8fa5c802d
glibc-langpack-ve-2.28-189.5.el8_6.x86_64.rpm
89ba3050ffdb06a59a3f7ebae3390f9c808c74946c9bd1569bb4e2e0a5fdec14
glibc-langpack-vi-2.28-189.5.el8_6.x86_64.rpm
51f9150bb12eda927c3c48215e48522a1437231cf50bfe7bffb9bfe5fb845734
glibc-langpack-wa-2.28-189.5.el8_6.x86_64.rpm
e35af8ece0c5fd6fb70687e4dfb90512591a56cf8fa9a7e8496681285381963f
glibc-langpack-wae-2.28-189.5.el8_6.x86_64.rpm
9ca7ff5001662b413c71db707a5e8f320bbdbd53278432abaaa3811810d994c6
glibc-langpack-wal-2.28-189.5.el8_6.x86_64.rpm
1a8490049df0070123f50116af8edad2a93b64194ad49a8e27d5c0168f156513
glibc-langpack-wo-2.28-189.5.el8_6.x86_64.rpm
2fcf9247e421904d85e9584d7a4ddca56a31890bd7de8f9e90bff02460d9a457
glibc-langpack-xh-2.28-189.5.el8_6.x86_64.rpm
68aabd48a470995f17b5d945802e7df745160209d96dff231124f35cf3707997
glibc-langpack-yi-2.28-189.5.el8_6.x86_64.rpm
783e96b968ba0f80608025d29a80650f3b84f898fa91832f8b3d2c72c4da2509
glibc-langpack-yo-2.28-189.5.el8_6.x86_64.rpm
c5bfb46089267218787ddc4d6c44e1009e379734b79301b40b73f9632ee95f3b
glibc-langpack-yue-2.28-189.5.el8_6.x86_64.rpm
29f1756e2274f0fbd36632e878855d8cf59488c8de836b558f3525685aa3f94b
glibc-langpack-yuw-2.28-189.5.el8_6.x86_64.rpm
44f320160e065f615f5d5869b730dcb9fd927146ef076cc243a75f19a65d282a
glibc-langpack-zh-2.28-189.5.el8_6.x86_64.rpm
4dd43d3da7ee657e6a74505e1d47cb995507302e1eb09901d22ffa176d565c03
glibc-langpack-zu-2.28-189.5.el8_6.x86_64.rpm
bf155370161536a8bf406ae08facf00a40f1943b573cbbbcca43067c8c564672
glibc-locale-source-2.28-189.5.el8_6.x86_64.rpm
28298ab488ac81122fca616309890c8aa5610802ea573a286173a82b2cfd7253
glibc-minimal-langpack-2.28-189.5.el8_6.x86_64.rpm
2b10060638e0a87a15ad1bd3a94b082a3821cb9b9da960d978db636b743feea8
libnsl-2.28-189.5.el8_6.i686.rpm
a3f0e571c62d9996f3bcea3a851e347c826b205ab4611678ed7e95a138f16871
libnsl-2.28-189.5.el8_6.x86_64.rpm
55080bb282064c9fe3bba4a86df7cc308437e2f2275962d33a2cbe07f657c731
nscd-2.28-189.5.el8_6.x86_64.rpm
2628cca44d4a5aff5ccab80aad67e13a00dcfe2cdf29744b217b222dff378543
nss_db-2.28-189.5.el8_6.i686.rpm
779973238f7ed3a654a21aa3f14ef90ef8fc1142bc8307ba024ca12153359cb2
nss_db-2.28-189.5.el8_6.x86_64.rpm
78c57c256326f1e99b14d10dfc5e47ca9d654193dc6d0deafa3ff32e48725c8c
RLBA-2022:5312
gcc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es) and Enhancement(s):
* Backport Default widths with -fdec-format-defaults patch. (BZ#2079578)
none-baseos-rpms
libasan-8.5.0-10.1.el8_6.i686.rpm
32ebe39c732f96bfb68c8795d10fc85c4635990d8963a2ca8b48b832f620d187
libasan-8.5.0-10.1.el8_6.x86_64.rpm
539493dc0179bb1c392f604de75ae60e883206fd69b4ba24ff5eca86647c964b
libatomic-8.5.0-10.1.el8_6.i686.rpm
6356f00a0a861be52bfa367cca35d3c07ed7f1e24164d9ee883df15aac5f8d03
libatomic-8.5.0-10.1.el8_6.x86_64.rpm
1de93d5675b8d4c6ede1f628165cffdea711b9754ddbceba3590f870bfef6409
libatomic-static-8.5.0-10.1.el8_6.i686.rpm
ff73f9a5dac7b40d6780c6f86afe96bcc6af1b7d0e1de2741b1f9d534e1ee1ea
libatomic-static-8.5.0-10.1.el8_6.x86_64.rpm
5a0d71ad137b0556313ad57419d142d9152fb0488fbfd77aa30b3eba8339f6c6
libgcc-8.5.0-10.1.el8_6.i686.rpm
144dbaf0c29107b038169ed8c112d40682f6831fd087c6a3c16a4abc03bcb18e
libgcc-8.5.0-10.1.el8_6.x86_64.rpm
ec4aac5d43fce706c28d551247fbc454913898246ded324aa78b55c37cb8f4d3
libgfortran-8.5.0-10.1.el8_6.i686.rpm
dd038d9069d49fd5c4c0ad43e0dc7470117140638f4827cc66db43332e1d682f
libgfortran-8.5.0-10.1.el8_6.x86_64.rpm
54712cfffd6c9b8bee20dc761b2df575083176fee9e9165f8ac4944d5210466a
libgomp-8.5.0-10.1.el8_6.i686.rpm
1eb5f9a5af980c00ac45078e5826bf4431a6d10ae2275b3a37ce927f3c670d01
libgomp-8.5.0-10.1.el8_6.x86_64.rpm
32c60343f45b66836a46aa102a3be7a1f4d851df805a341f2022432f28e339f5
libgomp-offload-nvptx-8.5.0-10.1.el8_6.x86_64.rpm
1578ef799246d7b807ce964907287bfb79474c3708c19f9bc5fb344b82548adf
libitm-8.5.0-10.1.el8_6.i686.rpm
1a49de94397ed0c80cdb7519ab859f47f4483059543001276b66ee9660d4621b
libitm-8.5.0-10.1.el8_6.x86_64.rpm
14ae0c673267d937d85eb0b4c646c8c668eb20cf8ad1ba06a10c9c657f27bb17
liblsan-8.5.0-10.1.el8_6.x86_64.rpm
73a9b02637e9983de97943c32611be2cd76cf637c460e105b40534d9ef12781d
libquadmath-8.5.0-10.1.el8_6.i686.rpm
da46e6e590e5e2c7066e59a54aee3918a581cd5e78df3dd69f8c32efc9ff2c78
libquadmath-8.5.0-10.1.el8_6.x86_64.rpm
37204e933846bba0598ee1f24e9f8fbc45d8de07c9c74d96cb45ee760ef4a34e
libstdc++-8.5.0-10.1.el8_6.i686.rpm
939792fec59f46516ff057888ee9d69c128605e11a7853546609ce84e8beb5ae
libstdc++-8.5.0-10.1.el8_6.x86_64.rpm
0958ed967a38a32e9538a7fdd0e9fe1f7cacb8a155ce59f62ebfb67f8e776e2e
libtsan-8.5.0-10.1.el8_6.x86_64.rpm
858b83554cb1a04fba15122948ebcf2eae6798ab439fdefbb9f0cb1a441ac595
libubsan-8.5.0-10.1.el8_6.i686.rpm
0b364e3029ba1e10d7c7eb9a20d6d664638320044218fa6fc10e1ab5b1af3d21
libubsan-8.5.0-10.1.el8_6.x86_64.rpm
d03a182e8d8093e3fd6ff260664e6d959920e7806d9421b6da325a3b32dbf0d1
RLBA-2022:5310
opencryptoki bug fixand enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 3.0 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages include support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Bug Fix(es) and Enhancement(s):
* openCryptoki version 3.13 or higher with upgraded EP11 host library does not have Dilithium support available.
none-baseos-rpms
opencryptoki-3.17.0-4.el8_6.x86_64.rpm
32b1683d245db56f78bdaa5fe52f38e4da8255a0efc8262867e723c517d9dbd5
opencryptoki-icsftok-3.17.0-4.el8_6.x86_64.rpm
27fd975eb7269053459fc0301edf88740fe4521ab7901c9fda689d8804235807
opencryptoki-libs-3.17.0-4.el8_6.i686.rpm
db4473d6e8529fbcc108e316db11df1873069f1d51c7096aa3b5da682100fc90
opencryptoki-libs-3.17.0-4.el8_6.x86_64.rpm
ff2dc15a706b6513e1902d159eb74448004ba3335484a395b0eeed1dc3a39436
opencryptoki-swtok-3.17.0-4.el8_6.x86_64.rpm
37f03737520cbd427ad3c164df59f7db04f5ab4a53cea5045101dbd790c297b9
opencryptoki-tpmtok-3.17.0-4.el8_6.x86_64.rpm
6fcd139cef01c1842575a60e4eddbd4453a1a357b220e1d3bd26c376f2109598
RLSA-2022:5313
Moderate: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: OAUTH2 bearer bypass in connection re-use (CVE-2022-22576)
* curl: credential leak on redirect (CVE-2022-27774)
* curl: auth/cookie leak on redirect (CVE-2022-27776)
* curl: TLS and SSH connection too eager reuse (CVE-2022-27782)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
curl-7.61.1-22.el8_6.3.x86_64.rpm
b15c5dd521e9da5df238a2d607522b067aa20d697d012bb5f0f795d302cc7a5d
libcurl-7.61.1-22.el8_6.3.i686.rpm
4457d84b15e29d42e2df85157ac2986beca9b3e59f533b0b3c56880df52d6896
libcurl-7.61.1-22.el8_6.3.x86_64.rpm
ff5f5862aa1dc83777c8c1f21d08099c0f4ac1f874d2e53295b9cff7f3a2cad7
libcurl-devel-7.61.1-22.el8_6.3.i686.rpm
a08e793cd98e1024f683316b08128f333de512a82707ba42eba5e6d6da5ed28f
libcurl-devel-7.61.1-22.el8_6.3.x86_64.rpm
5335b9d9da991f80a11d08a848eb2817d8f115f7529ccd4678f1ebdacf06cb01
libcurl-minimal-7.61.1-22.el8_6.3.i686.rpm
549d4d6a45dd433ac36389c4a2aae893d3195ac3bb09d2f28aacc3d7ef303048
libcurl-minimal-7.61.1-22.el8_6.3.x86_64.rpm
e8b9b1e7ce13ba80f5b480766a634c882543e6ceaa98dd3d8b0aab232f926d0d
RLSA-2022:5314
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: stack exhaustion in doctype parsing (CVE-2022-25313)
* expat: integer overflow in copyString() (CVE-2022-25314)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.2.5-8.el8_6.2.i686.rpm
a7f363b7030241a0df51402edae282e5098a7efef2002c2eab4e84156269b92c
expat-2.2.5-8.el8_6.2.x86_64.rpm
53f40bcd93655143a4005b564fc187ce05d4160f73a8912a08aae3bb61ef7649
expat-devel-2.2.5-8.el8_6.2.i686.rpm
61091e547c7e941ec15ab8c7fd16aa677dbb7bc7fee1498ac3f85580a8eaaf6a
expat-devel-2.2.5-8.el8_6.2.x86_64.rpm
c395c9131dc5943f89e1278809c5f52d935957ee9fa0f072eca800a7adba2ba3
RLBA-2022:5315
samba bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es) and Enhancement(s):
* PAM Kerberos authentication incorrectly fails with a clock skew error(BZ#2079299)
* /etc/samba/smbusers erroneously applies unix group memberships to user account entries (BZ#2079303)
* samba.conf's force user issue when the user only exist in the active directory and not locally (BZ#2079304)
none-baseos-rpms
ctdb-4.15.5-8.el8_6.x86_64.rpm
94003a4e27d1a792103f658837b703542a789030f838f9a3f1f0649c15e9e9e0
libsmbclient-4.15.5-8.el8_6.i686.rpm
7bfed6928a4c65420f422c0492d2e7ffeaa1c5d359cee130595e36d177a31a23
libsmbclient-4.15.5-8.el8_6.x86_64.rpm
972feb7bd559d5a4dba902685df01c2054fede1969f37ebaba3493eb53b47d1c
libwbclient-4.15.5-8.el8_6.i686.rpm
3ace1dea3bc4fb66c7726c927928e9749762c39fb5fd86d1170e87f2e281fc03
libwbclient-4.15.5-8.el8_6.x86_64.rpm
a5273062d36745830da87740f5697a73aab72bbef81af3780d1ddeba25b77017
python3-samba-4.15.5-8.el8_6.i686.rpm
ba7d4f5571edf9d0e074520bf102ce69f16fe8323fa4a0a02b3eaf83a45b49aa
python3-samba-4.15.5-8.el8_6.x86_64.rpm
549fc67124abaecba8ce7a3e70f0596824db00a5e9ec5f99c8f9270553b44042
python3-samba-test-4.15.5-8.el8_6.x86_64.rpm
616ad4c0c73918b3f8a3dd6c79db96198d3c3f6559e7b234d797224adc59bcd8
samba-4.15.5-8.el8_6.x86_64.rpm
713878f61d430731cf4a1bf3baba3060fd48041f1cd3876ac9dd47ebb589817d
samba-client-4.15.5-8.el8_6.x86_64.rpm
4801395ddc67bab20dc7029dc87299705a56ce68c0b4dd93088171a037b55256
samba-client-libs-4.15.5-8.el8_6.i686.rpm
aaa6201646cb44625f2e8811414b47ddc7478b8978546cbcb13361429ccff811
samba-client-libs-4.15.5-8.el8_6.x86_64.rpm
36b45a7e2f57ba7f7381a1a8723be20c2c4a7fb2fd980b3d85c20a4b2cab690f
samba-common-4.15.5-8.el8_6.noarch.rpm
25a4e01dd34ea53cb053800f8ffb0fd46f45283fc96d987c323f722e99e05c0d
samba-common-4.15.5-8.el8_6.noarch.rpm
25a4e01dd34ea53cb053800f8ffb0fd46f45283fc96d987c323f722e99e05c0d
samba-common-libs-4.15.5-8.el8_6.x86_64.rpm
035959c8ccb2c94cec6136974d90145217dbe78009e5ac25294a0681a4c1250c
samba-common-tools-4.15.5-8.el8_6.x86_64.rpm
de64e3e2b5a030313144649e55f5806a6e68e98cd4bb2f28e3c460660233436d
samba-krb5-printing-4.15.5-8.el8_6.x86_64.rpm
f5388a80e9bea1b8872429d7c653ca27d5799e3e5b252cecfe7d71facda10db8
samba-libs-4.15.5-8.el8_6.i686.rpm
dc4fc257434b9886651599a0bc5fd6ceef985459dc6bfcac58c0219402e067ce
samba-libs-4.15.5-8.el8_6.x86_64.rpm
b6209fbb97574a87523fb3d4c849d1e94ba2d05ca3eaaebedab1ed2fa392e947
samba-pidl-4.15.5-8.el8_6.noarch.rpm
8e81c605cc4ed91930d26f6f09bfd44775e1e9fc58b0e291df02982c92a5fea8
samba-pidl-4.15.5-8.el8_6.noarch.rpm
8e81c605cc4ed91930d26f6f09bfd44775e1e9fc58b0e291df02982c92a5fea8
samba-test-4.15.5-8.el8_6.x86_64.rpm
d9bdb23bbb9abde57ae395f4539c3c6f55dc2ab9a7304eb9f8c4d3288cbf7093
samba-test-libs-4.15.5-8.el8_6.x86_64.rpm
80b8d244c23254ba9dea934ac281e3dbbdc98b1a024b92e94abd9e0b71fa450c
samba-winbind-4.15.5-8.el8_6.x86_64.rpm
c79228ce9bdbb3316f46718cdd77b05f7bce0beb8e8e0d12ebbbe42d2bc45cb2
samba-winbind-clients-4.15.5-8.el8_6.x86_64.rpm
ecac31ac34d84a7915fc599f69d521585bb17b8b00ea756c0aaab738d185121f
samba-winbind-krb5-locator-4.15.5-8.el8_6.x86_64.rpm
4b0292aae86fa4128ea1c13562145bf92a2606b9685c388cb7a07888cc01f089
samba-winbind-modules-4.15.5-8.el8_6.i686.rpm
0cba8e67f69527859d87c8749cf814f5bf479cdb632daa3be728dad767eafccd
samba-winbind-modules-4.15.5-8.el8_6.x86_64.rpm
aee19203f750fc88c63c03ad3e56d42f789e7073260c2dda6496cb08b6a0e055
samba-winexe-4.15.5-8.el8_6.x86_64.rpm
d7fdec88b1acd94f4b732e539510d083addd32433887e96dbedda57ccc00d515
RLSA-2022:5316
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)
* kernel: out-of-bounds read in fbcon_get_font function (CVE-2020-28915)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* weird port mapping with asymmetric traffic (BZ#2065266)
* HBR3 is malfunction via MST HUB against Intel ADL-HX CPU (BZ#2066644)
* openvswitch connection tracking sends incorrect flow key for some upcalls (BZ#2068476)
* sctp connection abort unexpected. (BZ#2070959)
* soft quota cannot exceed more the 5 warns which breaks timer functionality (BZ#2071713)
* VirtIO Throughput for VM on host with OVS HW-Offload is very low (BZ#2074221)
* SR-IOV performance > 50% degradation (BZ#2074829)
* Call trace with parallel rules insertion and deletion (BZ#2075553)
* Enable nested virtualization (BZ#2079069)
* iscsi_ttx (iSERT) completions hung while waiting for mlx5_ib_drain_sq (BZ#2079433)
* WARNING: CPU: 2 PID: 969 at kernel/locking/lockdep.c:895 register_lock_class+0x234/0x1640 (BZ#2079856)
* mlx5: Some rule are not offloaded to HW in OVN K8s Pod 2 External use case (BZ#2079918)
* OCP node kernel crash due to ceph_fsync - unsafe_request_wait+0x143 (BZ#2080071)
* TCP doesn't retransmit if in reorder state and waits for RTO (BZ#2080972)
* pnfs NFSv4.1 IO causes a soft lockup (after a server reboot) and an unresponsive client (BZ#2080998)
* BlueField2: DPU can't switch to switchdev mode (BZ#2081011)
* Important ice bug fixes (BZ#2081794)
* For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084138)
* Host is getting crash/abrupt reboot while the guest has been assigned with more than 128 GB RAM while it is using NVIDIA proprietary module. (BZ#2085572)
* s_pf0vf2: hw csum failure for mlx5 (BZ#2086549)
* kernel memory leak while freeing nested actions (BZ#2086590)
* Regression: Bluetooth will not activate after 8.5 update (BZ#2087641)
* mlx5,Internal port - traffic not offloaded on tunnel interface rules on chain > 0 when internal port is the vtep device. (BZ#2088610)
* rule not offloaded on server side with syndrome(0x389e56) when direction is in (BZ#2088611)
* TTL decrease only on the first packet (BZ#2088638)
* TC HWOL of inbound traffic over geneve with ovs bridge as VTEP is not working (BZ#2088639)
* Audio No Function on Orchid Bay(Mini Config) (BZ#2090423)
none-baseos-rpms
bpftool-4.18.0-372.13.1.el8_6.x86_64.rpm
026168e5c325e6afe6e957f276a1adea597279d931df6810c5d53e3f3c35b5d6
kernel-4.18.0-372.13.1.el8_6.x86_64.rpm
c0b90a2e59b588120abbceaca7022ab82e59a5c89b49ea64205a363a1f013855
kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm
b4c1d00e1e0bfd61666267e14d354ac8c672d4be9eb5f97da15b757a937e058f
kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm
b4c1d00e1e0bfd61666267e14d354ac8c672d4be9eb5f97da15b757a937e058f
kernel-core-4.18.0-372.13.1.el8_6.x86_64.rpm
60316f1437739ec20d1874e3a609467e9c14a30e9942e8fa6f6eb5dad2619538
kernel-cross-headers-4.18.0-372.13.1.el8_6.x86_64.rpm
1a32053dd24c28638d7b2328b494e2d7b42201e527a686b2fa7c92f8fa0aa0d0
kernel-debug-4.18.0-372.13.1.el8_6.x86_64.rpm
5d2cd5b957a6a5ad95d2a4941451fc303a63b163e2d6a369f28f2e18226828f1
kernel-debug-core-4.18.0-372.13.1.el8_6.x86_64.rpm
55934468906cc312ed9968671b1cc744ab4c2ddbe1ae201ab0235be873c395db
kernel-debug-devel-4.18.0-372.13.1.el8_6.x86_64.rpm
f25ddd12ed1ab1ab8c57111c25b14568951eaadb9256bcc1c73fdcd6ac4f4047
kernel-debuginfo-common-x86_64-4.18.0-372.13.1.el8_6.x86_64.rpm
5f153b5d3301ced5e8a0617f78109bc9a02ccb1bf6687eec17cdcbeed61dd211
kernel-debug-modules-4.18.0-372.13.1.el8_6.x86_64.rpm
6b1df73030d6d2a9c41c76522029138882be18013d75a0cf3806e20c54c3d2cd
kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm
d414ebfa7a146c5f33487b1f4019dad438f32b521d229da2345249929190caf6
kernel-devel-4.18.0-372.13.1.el8_6.x86_64.rpm
7ff5ea3857abe320c574c2ba6856f1cf135aff47aa0e5281e8858279561352b7
kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm
77be784be5e0fd28ae20b42b387308211e9eaae3483a409141418380f85e8696
kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm
77be784be5e0fd28ae20b42b387308211e9eaae3483a409141418380f85e8696
kernel-headers-4.18.0-372.13.1.el8_6.x86_64.rpm
db285a33fcb1bf805a6315e20bcf4edf8ce11958034649a92b291de1695f2d27
kernel-modules-4.18.0-372.13.1.el8_6.x86_64.rpm
3ca28da8c0a8b60df09519649b3fb3a782cc14b59b27a5e1ff34667b322ff3ae
kernel-modules-extra-4.18.0-372.13.1.el8_6.x86_64.rpm
9c53974e07ddd88725f6315d5d4154b7b3d12c8895854320894e065f337133a3
kernel-tools-4.18.0-372.13.1.el8_6.x86_64.rpm
4d20b27e75fa503811cd604d21378dc71e28f352f5794aadce7a5ab436563a0b
kernel-tools-libs-4.18.0-372.13.1.el8_6.x86_64.rpm
f766269fbfb38be001399161339e83774ec40748ebd1e0a803352c8352d66705
perf-4.18.0-372.13.1.el8_6.x86_64.rpm
03ac5476768d86f5a7ab5bdf9f4744c11f07359fef54256ae73fd018fb77f257
python3-perf-4.18.0-372.13.1.el8_6.x86_64.rpm
cf6c658f65bf2a24f5d7da7ff2bb7f55c19f8f07916e34bad7abad7d8f298171
RLSA-2022:5317
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write (CVE-2022-29824)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-13.el8_6.1.i686.rpm
462b39e1df0296bdbbb7166475c0eedc8fbfa7db3e478b765f5b83086f3d593d
libxml2-2.9.7-13.el8_6.1.x86_64.rpm
62f2be3e8fe221d5ced55e7e8e2eb39cdf10e86fd8491a476308f8b1ad855c2c
python3-libxml2-2.9.7-13.el8_6.1.x86_64.rpm
785fa578a1e3fd8dc789238332617ca538f34db23a8574b737a607d1716a6a3a
RLBA-2022:5318
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition.
Bug Fix(es) and Enhancement(s):
* RHCOS 4.8: FIPS is not working (BZ#2086507)
none-baseos-rpms
dracut-049-202.git20220511.el8_6.x86_64.rpm
070abb01c637d0c9500b8dcc6d78ce7814779845c0ae75b0cceafb4e9b91a481
dracut-caps-049-202.git20220511.el8_6.x86_64.rpm
01117a558ba18d7b1d42457171f24f089439ec81e0993b25f2c6144693cf5f4d
dracut-config-generic-049-202.git20220511.el8_6.x86_64.rpm
6afa1ed0424f71220e1396d0a388338a6a930fdec8a871c6a234cd993cebe66a
dracut-config-rescue-049-202.git20220511.el8_6.x86_64.rpm
1755ce000736979e53dbcee5baebb76516029a34a9f6c0c88cc9c1412d7b2eec
dracut-live-049-202.git20220511.el8_6.x86_64.rpm
52ec63efdabc6bdadc2cf6c6ee54d29cce1f3a69f9306e914945b880752c0a7a
dracut-network-049-202.git20220511.el8_6.x86_64.rpm
72fa3d5394740b9013eddd36d0f8701a378d2092718b6b83624f40640e2efcaa
dracut-squash-049-202.git20220511.el8_6.x86_64.rpm
32f9886ce2f91ed0b114a786d42a101f9aea34f18b91f859ee852750fe439ff2
dracut-tools-049-202.git20220511.el8_6.x86_64.rpm
4623adc2a8de56098d52835cef1b98644e4e3d7999b17a835bdf7222739d1935
RLSA-2022:5319
Moderate: vim security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for vim.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: heap buffer overflow (CVE-2022-1621)
* vim: buffer over-read (CVE-2022-1629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm
f5bf34267c9354f2b9a76cb5e212bc62d54780b6a0997a180ef0e5e6a1ab8048
RLBA-2022:5320
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* NetworkManager 1.36.0 loses DHCP lease and doesn't try again (BZ#2090280)
* After NetworkManager update to 8.6, IP assigned through DHCP became secondary IP address (BZ#2092807)
none-baseos-rpms
NetworkManager-1.36.0-7.el8_6.x86_64.rpm
da3561c9fbf949a956ecb9121755791c0eb64b925558d9e6181e37be24b9ff2f
NetworkManager-adsl-1.36.0-7.el8_6.x86_64.rpm
d19743592affdf037821b0fec18ccd7a660d955f14bc529fcd8d34af14eb5c72
NetworkManager-bluetooth-1.36.0-7.el8_6.x86_64.rpm
a2bf0e35ea7162426900c3c08498184fc6e24606aeb5929e86e95d54fe7bdb92
NetworkManager-config-connectivity-redhat-1.36.0-7.el8_6.noarch.rpm
42ef2815d4a98cd57881143b2043e5c84ece1eb339b0b8d0b9fcf91f0fc14974
NetworkManager-config-connectivity-redhat-1.36.0-7.el8_6.noarch.rpm
42ef2815d4a98cd57881143b2043e5c84ece1eb339b0b8d0b9fcf91f0fc14974
NetworkManager-config-server-1.36.0-7.el8_6.noarch.rpm
814fc82752273efdf7cfcca9c48beb2ec622c6031ada71853650961db0287499
NetworkManager-config-server-1.36.0-7.el8_6.noarch.rpm
814fc82752273efdf7cfcca9c48beb2ec622c6031ada71853650961db0287499
NetworkManager-dispatcher-routing-rules-1.36.0-7.el8_6.noarch.rpm
a899eb0188fc461611204dc41289ff4f0c0c80f081a392b0f912697ce50eb7cd
NetworkManager-dispatcher-routing-rules-1.36.0-7.el8_6.noarch.rpm
a899eb0188fc461611204dc41289ff4f0c0c80f081a392b0f912697ce50eb7cd
NetworkManager-initscripts-updown-1.36.0-7.el8_6.noarch.rpm
4a67ec8084e995f232ce48146653dd63cba93a64e8b5f1064b04bd81160f7796
NetworkManager-initscripts-updown-1.36.0-7.el8_6.noarch.rpm
4a67ec8084e995f232ce48146653dd63cba93a64e8b5f1064b04bd81160f7796
NetworkManager-libnm-1.36.0-7.el8_6.i686.rpm
77bcaffc93ee5c6a4cf2eeac5d57d93285f4db9f072cae8ad54c3df157703f8c
NetworkManager-libnm-1.36.0-7.el8_6.x86_64.rpm
67ea7f9736bf1ca3768e5451a86dc4551f9b1e106797ae015bcd19d7bf011b41
NetworkManager-ovs-1.36.0-7.el8_6.x86_64.rpm
feaa0c76e38ce3fee7bace41b572d0cc9ce1c9691560c53e2ed6d719d23c4a63
NetworkManager-ppp-1.36.0-7.el8_6.x86_64.rpm
08baacc113dd9f2c733f7720d90d9f97b27067bcac80e5a2ab20a40cf3885098
NetworkManager-team-1.36.0-7.el8_6.x86_64.rpm
cca9e1a850dbc90348ef509e206806914f38b778bdb173b545d58f4858f7d025
NetworkManager-tui-1.36.0-7.el8_6.x86_64.rpm
832f7958e0726cb9e9ff9d2ca0801e7910b8bc317330d46b2125f893ba445701
NetworkManager-wifi-1.36.0-7.el8_6.x86_64.rpm
744627d97c359f1d702ec48bff89fc2d317e95b4230a737052d592428613227c
NetworkManager-wwan-1.36.0-7.el8_6.x86_64.rpm
571a63298f77c9e32eb622d71f27ef4ba5249cb62a8529d520dbfd07aac7941b
RLBA-2022:5321
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es) and Enhancement(s):
* Use right sdap_domain in ad_domain_info_send. (BZ#2072958)
* pam_sss_gss ceased to work after upgrade to 8.6. (BZ#2089244)
none-baseos-rpms
libipa_hbac-2.6.2-4.el8_6.1.i686.rpm
96d7e2bb7a6fbc4ba2a4f875142fe3c3e279f67b7a3bc96290c956c1c11e8ade
libipa_hbac-2.6.2-4.el8_6.1.x86_64.rpm
1b85ab5f9882455676565da986a6b7d0d816937dc990c7fcf3e8c45088903b34
libsss_autofs-2.6.2-4.el8_6.1.x86_64.rpm
301cd78ce58d09faca44001dc4c1397e00eba74d3489a57239f369c8b49ba0ea
libsss_certmap-2.6.2-4.el8_6.1.i686.rpm
25cbebe9ba7ee74ed13bc4558909fc47e9196c56a14e718af76b8a1d979d3f1d
libsss_certmap-2.6.2-4.el8_6.1.x86_64.rpm
ed56421d4b64736daaccf202d518c145e19aa07b62bd223162ad39f88d7bd837
libsss_idmap-2.6.2-4.el8_6.1.i686.rpm
4c549b95f70bca3db3eaba98545a4b58866ea2aa017c6179b2f0ec9d39a9cd5c
libsss_idmap-2.6.2-4.el8_6.1.x86_64.rpm
7b6c49cee526414ea24b4bc7258d201c764e4424fa74f3e5c705d9f764cb86ec
libsss_nss_idmap-2.6.2-4.el8_6.1.i686.rpm
4188659955b5dc866926b58c6a8ed9d3e79e798cf7219d521135c49f1add2506
libsss_nss_idmap-2.6.2-4.el8_6.1.x86_64.rpm
34c6f2bf11293a8f781f1a85374e932395fd6e75f480a13b6459f15e95d3e318
libsss_simpleifp-2.6.2-4.el8_6.1.i686.rpm
3905a7b2d2164ad0df8748acac4f7995f7a91012e7c51e160631af8584d8b0c9
libsss_simpleifp-2.6.2-4.el8_6.1.x86_64.rpm
afe49593bb1846d4c651cc5152d48963f21554da1e1fd67d4fe3aef901e7d81a
libsss_sudo-2.6.2-4.el8_6.1.x86_64.rpm
12cb7232d6a4037e8ff262cc00e5ce8c6699b56b6f91bfe0e4a8ec42622b6464
python3-libipa_hbac-2.6.2-4.el8_6.1.x86_64.rpm
4f31bf14851d38311dbe9ea7810a89d05dfc2b86217025de45d418ffabafae55
python3-libsss_nss_idmap-2.6.2-4.el8_6.1.x86_64.rpm
89a3c8127ca98df75e53e7a4cc363eed9f838bda02351e056e074a7a7d82c72d
python3-sss-2.6.2-4.el8_6.1.x86_64.rpm
6f225078b1993e2ef67ed7febe0b25a553bf33c6d8e6bed08af18daa2b8926b2
python3-sssdconfig-2.6.2-4.el8_6.1.noarch.rpm
be0ce675d193fe4112d527748c8495c423fe6602bdc598500a7b90de0d46812b
python3-sssdconfig-2.6.2-4.el8_6.1.noarch.rpm
be0ce675d193fe4112d527748c8495c423fe6602bdc598500a7b90de0d46812b
python3-sss-murmur-2.6.2-4.el8_6.1.x86_64.rpm
81d389833ea773114f9461ed20e614588e98f372a34702efe6cdf2fffc45e489
sssd-2.6.2-4.el8_6.1.x86_64.rpm
f5622a2954ed1694810ea2cab8eb0198f6b6b0f69707d764960395ead9fe7a88
sssd-ad-2.6.2-4.el8_6.1.x86_64.rpm
ce91ac09bea4b302a0f928507ace30fcf0185011f0488faf9df7d21668551663
sssd-client-2.6.2-4.el8_6.1.i686.rpm
d40574a15595b546a10f282e2cd03696d62f4a55ff617fa04579354b3176b452
sssd-client-2.6.2-4.el8_6.1.x86_64.rpm
bedd68b7a8d740f5db497a5949b76ba33de3d0ff856fa55b2c4a1726bd36b0cc
sssd-common-2.6.2-4.el8_6.1.x86_64.rpm
ac294222be308340fb8bf90b1ed1031d90eb4036ad4d2292684b13d71171667b
sssd-common-pac-2.6.2-4.el8_6.1.x86_64.rpm
1612a2151cf09755f1cddd2c809a37d63dbaef387fa69b715d7fe31f5ebe9eb7
sssd-dbus-2.6.2-4.el8_6.1.x86_64.rpm
65e3cd34e176a333fa266290fa5cf1e84ce6cbd12c3cd0adada02f802cefbebb
sssd-ipa-2.6.2-4.el8_6.1.x86_64.rpm
c19c88cac30bb5527c065595d34bc7e30f7d926eb98c535a4f30c2f4a0da3914
sssd-kcm-2.6.2-4.el8_6.1.x86_64.rpm
86242808758a21e3ef3ceb5452a66e098f1b4b11b92ad2f31cd27c692c6f2adb
sssd-krb5-2.6.2-4.el8_6.1.x86_64.rpm
cd5f44d5fd326f1c176ddb25e66bda8da11e16f75ddba05c070e9b9f9d256195
sssd-krb5-common-2.6.2-4.el8_6.1.x86_64.rpm
6e3a394b448f6eea7c6fe6994ea7cb0f56e46d6964f837d68882ea73eeb3dc4b
sssd-ldap-2.6.2-4.el8_6.1.x86_64.rpm
7799dbdda213ba593d50e365eccec161f8064660ac0792bb5d44b83c5188adf8
sssd-nfs-idmap-2.6.2-4.el8_6.1.x86_64.rpm
588bf782b7b5978e784f67a3965ac29416f2f50e1019d92faec4bb929f499d9f
sssd-polkit-rules-2.6.2-4.el8_6.1.x86_64.rpm
cd407005a38786dbe6cb2e5dab0709420c3c4f4ffc4a1c5afc6a059d2eb62386
sssd-proxy-2.6.2-4.el8_6.1.x86_64.rpm
a8559402a2788d39f85f08c5e9c9d40d3c9d73070c4ad764de1f07d527dc2c2c
sssd-tools-2.6.2-4.el8_6.1.x86_64.rpm
fb79a11c09aa5ebe0dce8287d7ec54e6a9d4759c9c09407e17ed22a70d9ad335
sssd-winbind-idmap-2.6.2-4.el8_6.1.x86_64.rpm
ed380cb7f12e555ae30dea8baa699dac7a0594557f91b95e854469bd6110faa9
RLBA-2022:5323
alsa-sof-firmware bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The alsa-sof-firmware package contains the firmware binaries for the Sound Open Firmware project.
Bug Fix(es) and Enhancement(s):
* alsa-sof-firmware Audio No Function on Orchid Bay(Mini Config) (BZ#2090787)
none-baseos-rpms
alsa-sof-firmware-1.9.3-4.el8_6.noarch.rpm
1ef41887f5a3b86f1a3d0230387527a013a4d5d9e734ad393125c1869ef7a17d
alsa-sof-firmware-debug-1.9.3-4.el8_6.noarch.rpm
023446cb88226350ad4720351e40e52920cab1ad545edd04891718fe327a9939
RLSA-2022:5564
Important: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* conntrack entries linger around after test (BZ#2066356)
* Any process performing I/O doesn't fail on degraded LVM RAID and IO process hangs (BZ#2075075)
* fix data corruption caused by dm-integrity (BZ#2082184)
* Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083308)
* SUT will flash once color screen during boot to OS. (BZ#2083384)
* Kernel Support Fixes for UV5 platform (BZ#2084645)
* i/o on initiator stuck when network is disrupted (4.18.0-372.9.1.el8.x86_64) (BZ#2091078)
* glock deadlock (using the dct tool) (BZ#2092073)
* Recursive locking in gfs2_fault (read/write + mmap) (BZ#2092074)
* 8.6.z backport of "vmxnet3: add support for 32 Tx/Rx queues" from BZ 2083561 (BZ#2094473)
* System freezes with callstack in dmesg: ret_from_fork (BZ#2096305)
* Need some changes in Rocky Linux8.x kernels. (BZ#2096931)
* Bad length in dpctl/dump-flows (BZ#2097796)
Enhancement(s):
* Elkhart Graphics - remove force_probe flag (BZ#2075567)
none-baseos-rpms
bpftool-4.18.0-372.16.1.el8_6.x86_64.rpm
e9029efe9d5dd348ae00ac11c8bbb16dec33db71e766a2e8a889109e7c06ad48
kernel-4.18.0-372.16.1.el8_6.x86_64.rpm
e673ac0caf8628d489e08176e48c7ca19956dd34fa96b1cef04c5dfd95db7558
kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm
fd8c1e4ac86304aa6e621630eb657466fdb49aca7963b7fbc2549465efb7e609
kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm
fd8c1e4ac86304aa6e621630eb657466fdb49aca7963b7fbc2549465efb7e609
kernel-core-4.18.0-372.16.1.el8_6.x86_64.rpm
39620b823c558be0d3ff173cf150eb945961f6cbbc530fda0c92fba149964347
kernel-cross-headers-4.18.0-372.16.1.el8_6.x86_64.rpm
9a07eb032648fa19fb9a356a91fd3fcc997952600dd40ef5368bdf25e573b2b5
kernel-debug-4.18.0-372.16.1.el8_6.x86_64.rpm
6b0307167476fea0df6f20809dd60ec855108f4e6cb09614b6067c3e32e8dae4
kernel-debug-core-4.18.0-372.16.1.el8_6.x86_64.rpm
d88eb22d636b6df61cb08577130962e63ab86bcd8dfa6ed9def8c3773660da74
kernel-debug-devel-4.18.0-372.16.1.el8_6.x86_64.rpm
d74246684aedd964599ed998b62975879030f51a2ef487d84918edadc87f0604
kernel-debuginfo-common-x86_64-4.18.0-372.16.1.el8_6.x86_64.rpm
bb0cbbd4061d8e57ba36ecbd53ece040312d87b353e0f4298b0cb200ac437c62
kernel-debug-modules-4.18.0-372.16.1.el8_6.x86_64.rpm
e5f7237d1db73122499b9e6049a0c7402990cfb5144c544b0de0e956f9c4e951
kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm
8ba93ddaab9754328101ddda8d8a31424b9fb1ef58db844dc23f24471601f543
kernel-devel-4.18.0-372.16.1.el8_6.x86_64.rpm
85c83340e0a17f4fdcc7a29d4fa0aa4f8ebdedb3748ed8bce36cb9c5d4f57f5d
kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm
3d6d09f4043634676712057ec9642685a5ea65221b091c255bebabca6df3d0aa
kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm
3d6d09f4043634676712057ec9642685a5ea65221b091c255bebabca6df3d0aa
kernel-headers-4.18.0-372.16.1.el8_6.x86_64.rpm
b1c7f8683bd33870cf753de280cad8452fbff7e8f38271dcea9298285791edef
kernel-modules-4.18.0-372.16.1.el8_6.x86_64.rpm
55485eea523580bfbf9195fd4ccd36d0cd4179448d6eb78b95faf96b88d2d2e5
kernel-modules-extra-4.18.0-372.16.1.el8_6.x86_64.rpm
cf8cb2b04756f6cc6b621d24b09ed89f9cb6441cfeb574c8f0b53448c907782f
kernel-tools-4.18.0-372.16.1.el8_6.x86_64.rpm
cc41967d6cec0f27819e73d6e7ef1c1268607264b75c86705712f49ce9c36310
kernel-tools-libs-4.18.0-372.16.1.el8_6.x86_64.rpm
ade7dfd6e8c85990fbe6355390ce233f11d1d8caa141e9125cc59d8f39854fa2
perf-4.18.0-372.16.1.el8_6.x86_64.rpm
859363319223c0701e925fd5e0905b49f544227c9a5f246b9d60a86fa50a48d4
python3-perf-4.18.0-372.16.1.el8_6.x86_64.rpm
197a689bf24976d02b813703f9322dd2f0ee0cc813b364a3802e67c553c9bb7d
RLBA-2022:5807
rng-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rng-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rng-tools packages contain random number generator user-space utilities, such as the rngd daemon.
Bug Fix(es) and Enhancement(s):
* recent rng-tools updates to run udevadm --settle hang in container (BZ#2077035)
none-baseos-rpms
rng-tools-6.14-6.git.b2b7934e.el8_6.x86_64.rpm
58438fd77b094aa77ffad8552d6680c4a2b3a82a1a063ed2d9b4aa1d5c7be229
RLBA-2022:5808
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux-8.4] systemd still crashes in version systemd-239-45.el8_4.6.x86_64 with coredump (BZ#2084052)
* systemd services fail to start (BZ#2086553)
* systemd may unnecessarily emit PropertiesChanged D-Bus signal when adding dependencies (BZ#2091590)
* Delay running mount start jobs when we are in ratelimited state (BZ#2097336)
none-baseos-rpms
systemd-239-58.el8_6.3.i686.rpm
4106b5b46fda00f0dbf6fa29f012c12ce6de859c9ab588b51fa8be47d445f3cc
systemd-239-58.el8_6.3.x86_64.rpm
f54467aebb4260783b125e19a2520bd72121470f842cebba4d7bef23d02664b8
systemd-container-239-58.el8_6.3.i686.rpm
6c9e3ba11e9467ff80f10056bdf52ee07e962f7d5503d9af8a9dfad686a9b422
systemd-container-239-58.el8_6.3.x86_64.rpm
cfa4b67cc2912c27fc614812da86d9fef193fa6124d3754595dbfedd463997b6
systemd-devel-239-58.el8_6.3.i686.rpm
000bfca4079d3b7df46bb784c7ba8f2ac16bdc752fb16c8174554bf54ac8e37b
systemd-devel-239-58.el8_6.3.x86_64.rpm
dd7a49f7d6062bfabe8c9bddb9c08e9dcc1178dc56ab14f6c74e4096ea3c727d
systemd-journal-remote-239-58.el8_6.3.x86_64.rpm
1b409bef680061af75d7844376ad91e217179750a39e0d8c5462b572d3fa1e1c
systemd-libs-239-58.el8_6.3.i686.rpm
0848b7c6286d7b777449276d2cc382c4759056abd9f75b68fff874a280beb4cb
systemd-libs-239-58.el8_6.3.x86_64.rpm
9942e7a418e28b87588820c54d1e7e6dff231f7dafd06faaf2a5917091291d92
systemd-pam-239-58.el8_6.3.x86_64.rpm
8f6d82ac1985a53fb86f0853211e728589c5e1b93f0774e4c6b60539722b757c
systemd-tests-239-58.el8_6.3.x86_64.rpm
f64718023f9e7f1a8f2e431beb5bd119f6f24c29b5f12b268f75c3a048546cad
systemd-udev-239-58.el8_6.3.x86_64.rpm
d3add25e4f9289baab4a7490d3bda4810539d2215637768f624659d6b39ebc92
RLBA-2022:6458
iproute bug fix and enhacement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel.
Bug Fix(es) and Enhancement(s):
* Fix buffer overflow on large labels (BZ#2099364)
none-baseos-rpms
iproute-tc-5.15.0-4.el8_6.1.x86_64.rpm
588d9a957ae251860499fb8ace22a0d246f1eaa08e50bc04c74e8f970890e155
iproute-5.15.0-4.el8_6.1.x86_64.rpm
e48f2af21a90dc14f2cadfd34a2207cfbb5ebdc554a24bce8025d3b213afd74d
RLBA-2022:5810
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Bug Fix(es) and Enhancement(s):
* Grub fails to boot the system when a disk renaming happens, due to tuned_initrd hardcoding the boot disk (BZ#2084643)
none-baseos-rpms
tuned-2.18.0-2.el8_6.1.noarch.rpm
f5a9fb27a0d5533076fc6775efc58509aab79ac2725624712debbf8d33e22844
tuned-2.18.0-2.el8_6.1.noarch.rpm
f5a9fb27a0d5533076fc6775efc58509aab79ac2725624712debbf8d33e22844
tuned-profiles-atomic-2.18.0-2.el8_6.1.noarch.rpm
87d8981c0afb3c212da77c1c8a665d8b2d75b00226bd1d8afcc273820fa97cb1
tuned-profiles-atomic-2.18.0-2.el8_6.1.noarch.rpm
87d8981c0afb3c212da77c1c8a665d8b2d75b00226bd1d8afcc273820fa97cb1
tuned-profiles-compat-2.18.0-2.el8_6.1.noarch.rpm
6a631778be6cc2941325c9ec55a26b8cda34938d0c4711f523ad9b985b9505b2
tuned-profiles-compat-2.18.0-2.el8_6.1.noarch.rpm
6a631778be6cc2941325c9ec55a26b8cda34938d0c4711f523ad9b985b9505b2
tuned-profiles-cpu-partitioning-2.18.0-2.el8_6.1.noarch.rpm
a92ad7decc01091ed862f9bb7d370dfbec5714a23d0117d5ff0be24be1ab88d7
tuned-profiles-cpu-partitioning-2.18.0-2.el8_6.1.noarch.rpm
a92ad7decc01091ed862f9bb7d370dfbec5714a23d0117d5ff0be24be1ab88d7
tuned-profiles-mssql-2.18.0-2.el8_6.1.noarch.rpm
244708cbea059f27f12ec10cc74264eba4fc7b5f30af2653cc56a57d66df9410
tuned-profiles-mssql-2.18.0-2.el8_6.1.noarch.rpm
244708cbea059f27f12ec10cc74264eba4fc7b5f30af2653cc56a57d66df9410
tuned-profiles-oracle-2.18.0-2.el8_6.1.noarch.rpm
0c91193c5756c903548bcea30d77843f5b317a63c3d7c9d390f5796b6846ac04
tuned-profiles-oracle-2.18.0-2.el8_6.1.noarch.rpm
0c91193c5756c903548bcea30d77843f5b317a63c3d7c9d390f5796b6846ac04
RLBA-2022:5811
device-mapper-multipath bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.
Bug Fix(es) and Enhancement(s):
* dm disk nodes do not pick up RO state from NVMe paths (BZ#2094472)
none-baseos-rpms
device-mapper-multipath-0.8.4-22.el8_6.1.x86_64.rpm
9f1a9173eb4ad67dcb2e46ac330a5209a84a5fed3c5cb41efc2cf438b3d0e145
device-mapper-multipath-libs-0.8.4-22.el8_6.1.i686.rpm
f171f7cb915950e021ffa8aee71cd79b9617edf02c6ebe8822f654b29e7acd18
device-mapper-multipath-libs-0.8.4-22.el8_6.1.x86_64.rpm
325dcb643c0f4e45f1da6d21efbcf9e5f0dda6edbc26491d59dc029b7e2d1827
kpartx-0.8.4-22.el8_6.1.x86_64.rpm
ffe9bbc54b03b4a2d8f686e703e49561badfec071f9ef670dae348ca2cb182bf
libdmmp-0.8.4-22.el8_6.1.i686.rpm
81538cdbe569cde954e3632b368ce1010a46c7b1f6d6b1dc4d05e6ff591a7cce
libdmmp-0.8.4-22.el8_6.1.x86_64.rpm
9d33fcf40d63beeb15e24c8cc73bd1175bedaefa552cb9601fa445f5fff68621
RLBA-2022:5812
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* AVC lldpad denied sendto scontext=system_u:system_r:lldpad_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=unix_dgram_socket (BZ#2095184)
none-baseos-rpms
selinux-policy-3.14.3-95.el8_6.1.noarch.rpm
ee4b10799ce679b18a5c3ecd27e377712aa699893c7ed0a01027d7972739684b
selinux-policy-3.14.3-95.el8_6.1.noarch.rpm
ee4b10799ce679b18a5c3ecd27e377712aa699893c7ed0a01027d7972739684b
selinux-policy-devel-3.14.3-95.el8_6.1.noarch.rpm
7e5e2ff71a5d78f79771b2849609566c892b21c9f5e3532f78a79b76ead61477
selinux-policy-devel-3.14.3-95.el8_6.1.noarch.rpm
7e5e2ff71a5d78f79771b2849609566c892b21c9f5e3532f78a79b76ead61477
selinux-policy-doc-3.14.3-95.el8_6.1.noarch.rpm
a2b6ee1a0476016a33ac0491cbc727d35fa4adf2839a21e0890af8f0f90442a9
selinux-policy-doc-3.14.3-95.el8_6.1.noarch.rpm
a2b6ee1a0476016a33ac0491cbc727d35fa4adf2839a21e0890af8f0f90442a9
selinux-policy-minimum-3.14.3-95.el8_6.1.noarch.rpm
e71ca0131e8a18eaa0f1624ebf03f898d2629b4931ac00bec8e6ff795ea3f4bf
selinux-policy-minimum-3.14.3-95.el8_6.1.noarch.rpm
e71ca0131e8a18eaa0f1624ebf03f898d2629b4931ac00bec8e6ff795ea3f4bf
selinux-policy-mls-3.14.3-95.el8_6.1.noarch.rpm
3ca789e4c1d04562357b5d0ae759d5b9c8265376fcf4f8de1dd97c345456bde5
selinux-policy-mls-3.14.3-95.el8_6.1.noarch.rpm
3ca789e4c1d04562357b5d0ae759d5b9c8265376fcf4f8de1dd97c345456bde5
selinux-policy-sandbox-3.14.3-95.el8_6.1.noarch.rpm
f301fa56c0cfab1fd03282c11ef2fa840ddeecf9d7ab3b901ca06422a431ce9a
selinux-policy-sandbox-3.14.3-95.el8_6.1.noarch.rpm
f301fa56c0cfab1fd03282c11ef2fa840ddeecf9d7ab3b901ca06422a431ce9a
selinux-policy-targeted-3.14.3-95.el8_6.1.noarch.rpm
6f2310fc5e5edf6cfd1aaccc75f3309bb6682c296943d87fe9d51186893764a8
selinux-policy-targeted-3.14.3-95.el8_6.1.noarch.rpm
6f2310fc5e5edf6cfd1aaccc75f3309bb6682c296943d87fe9d51186893764a8
RLBA-2022:5814
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
* CVE-2022-0005 CVE-2022-21131 CVE-2022-21136 CVE-2022-21151 microcode_ctl: various flaws (BZ#2086742)
none-baseos-rpms
microcode_ctl-20220207-1.20220510.1.el8_6.x86_64.rpm
874d3d5ef1ada4b9503f736a619ddd03d08ee20776f5135db7466442049ad372
RLBA-2022:5816
libdnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library providing simplified C and Python API to the libsolv package dependency solver.
Bug Fix(es) and Enhancement(s):
* Performing security update from Rocky Linux 8.5 to Rocky Linux 8.6 causes dependency errors. (BZ#2095764)
none-baseos-rpms
libdnf-0.63.0-8.1.el8_6.i686.rpm
94bda2bfc2d1a08fa539fa3d2fab82560d6c5d27415276dfd1b0465e49c573c2
libdnf-0.63.0-8.1.el8_6.x86_64.rpm
34ad3587c7f131ad99138a389d1505d34b492f519fe96585544950de09861ea7
python3-hawkey-0.63.0-8.1.el8_6.x86_64.rpm
d00b25f26447d9603d320d4da11a74dc9190922f3e67cc797fdd73f493321ade
python3-libdnf-0.63.0-8.1.el8_6.x86_64.rpm
c45e38e7f71f3896f68555322213e2a0e57dec5f927fc26814d71b8be982491b
RLBA-2022:5817
dbus bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Bug Fix(es) and Enhancement(s):
* gio process invoked from /usr/libexec/dbus-1/dbus-kill-process-with-session never quits (BZ#2097784)
none-baseos-rpms
dbus-1.12.8-18.el8_6.1.x86_64.rpm
bae70df5b389b023d6080ac8432ab0094ead8179c2c38763210fb148b6bbe720
dbus-common-1.12.8-18.el8_6.1.noarch.rpm
70a8d0d533fa7f20d536de76bf6d2dae5e8e7c0bb5a59d7b31b0aac5c5a7d30d
dbus-common-1.12.8-18.el8_6.1.noarch.rpm
70a8d0d533fa7f20d536de76bf6d2dae5e8e7c0bb5a59d7b31b0aac5c5a7d30d
dbus-daemon-1.12.8-18.el8_6.1.x86_64.rpm
5f25b631afe68318855b099aa65d03a5cc28a13bfaf735fcb1bcff937d5d2b12
dbus-libs-1.12.8-18.el8_6.1.i686.rpm
ec274f6461b2b5174cb4a4005b41d5c418c73d818a61a4d48127aeb03102c814
dbus-libs-1.12.8-18.el8_6.1.x86_64.rpm
040e689c140acb5f1b314fe787b5897200bdefe5f5e8002da1310a234224e673
dbus-tools-1.12.8-18.el8_6.1.x86_64.rpm
70fbd934bb9cf0b9a06dacafa1246ccdc4573bd64ed44c14c7b274fdfedc79f0
RLSA-2022:5819
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)
* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu’s. (BZ#2090484)
* enable/disable multiqueues repeatedly while ping local host, guest kernel panic (BZ#2093416)
* Backport kernel audit enhancements and fixes from v5.13-rc1 to v5.16-rc6 (BZ#2095434)
* blk_update_request: I/O error, dev nvme0n3, during xfs creation (BZ#2100150)
* SCSI updates for Rocky Linux 8.7 (BZ#2100254)
* Kernel bug on mm/slub.c:314 (BZ#2102251)
* Implement new tc action for check_pkt_len (BZ#2102333)
* too long timeout value with TIME_WAIT status of conntrack entry (BZ#2104002)
* Connectx6-DX, mlx5 , backport 087032ee7021 ("net/mlx5e: TC, Fix ct_clear overwriting ct action metadata") (BZ#2104012)
* mlx5: Software steering memory allocation failure, netperf TCP_CRR with ct(). (BZ#2104013)
* tcp: request_sock leak in Calico OCP (BZ#2104670)
none-baseos-rpms
bpftool-4.18.0-372.19.1.el8_6.x86_64.rpm
18c57e7ce3392674649b6f1067e089a7678b635c973650c348484811a9ab5604
kernel-4.18.0-372.19.1.el8_6.x86_64.rpm
b590977fda3f8b48c50323c7039957daeb0acd9774f36925de2d96764aef1a71
kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm
5d6bd7531716699ff3b1a5fa2e179a392c843f021397b3078db4c6f652570b2e
kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm
5d6bd7531716699ff3b1a5fa2e179a392c843f021397b3078db4c6f652570b2e
kernel-core-4.18.0-372.19.1.el8_6.x86_64.rpm
04a99d5ddccd9e455f57e282ab5d90f9033950eed3fbf65e1177c5b8c34843a5
kernel-cross-headers-4.18.0-372.19.1.el8_6.x86_64.rpm
de4c2d9b26a58d3ba319d2fde475de5fc143c9895221ceed2d3429f76bbc772a
kernel-debug-4.18.0-372.19.1.el8_6.x86_64.rpm
ad1745d165595e19db803f02899347e79bc9fb36ebfc50813b074c8df62e0d4c
kernel-debug-core-4.18.0-372.19.1.el8_6.x86_64.rpm
53661e33ff5eae493c3523b526653c38a466870289f3b00d88b59c18524ab8d7
kernel-debug-devel-4.18.0-372.19.1.el8_6.x86_64.rpm
755f43c2a6f09403e1b1a3e734e66ef7ffaa734fe11bfc88a6b4bd25816c3e29
kernel-debuginfo-common-x86_64-4.18.0-372.19.1.el8_6.x86_64.rpm
6508f4398078d22138f3140c3225d72322902f78f39ca14552bc8a4867c88c31
kernel-debug-modules-4.18.0-372.19.1.el8_6.x86_64.rpm
8e2acd5afeefd73518c1227e3384bff555e5661ecb65c6ad51c37b52a0d4ac15
kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm
b4c700aa0a59b36b119b66c145577107c2f21346a10be75275612b2e7530a700
kernel-devel-4.18.0-372.19.1.el8_6.x86_64.rpm
a2642db8a9a0e20be2e6f205da8e9512757642bebc4524407e80909884f1c119
kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm
c6fcda0d0a92a2d91f3564fe8226e289e1c48330ac3c81eb769172f2ce74e06f
kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm
c6fcda0d0a92a2d91f3564fe8226e289e1c48330ac3c81eb769172f2ce74e06f
kernel-headers-4.18.0-372.19.1.el8_6.x86_64.rpm
3a999342523fc2b059104e0b945d2795616496313f05c243a4a484c8b44eb8f1
kernel-modules-4.18.0-372.19.1.el8_6.x86_64.rpm
3c03356e31a24e662af66050d8521364cebe8d05261324c61b43bcd3e0429e54
kernel-modules-extra-4.18.0-372.19.1.el8_6.x86_64.rpm
bea7f66e07b080648b264124aba62f129359b2dc1f655a6bc4738103282c1cf4
kernel-tools-4.18.0-372.19.1.el8_6.x86_64.rpm
dd9121a1c0f956fa2292d47e9d77f2d4ae3a4560081588e6574be83ba91670fc
kernel-tools-libs-4.18.0-372.19.1.el8_6.x86_64.rpm
826f7d6d79c36c4786fa2073c87e8db989ed9ac218b7f1428ddac2b9df6bd5de
perf-4.18.0-372.19.1.el8_6.x86_64.rpm
d769dfdbd4eb62c2f1df6ef319b7e23fc1539f88c0932e6003d8ce44f9b99675
python3-perf-4.18.0-372.19.1.el8_6.x86_64.rpm
f64db2104e108307ff4ca4269b19a8549fcbb4430bd4766b08d011d5c16c9f65
RLBA-2022:5820
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lvm2 packages include complete support for handling read and write operations on physical volumes, creating volume groups from one or more physical volumes, and creating one or more logical volumes in volume groups.
Bug Fix(es) and Enhancement(s):
* lvm ignores multipath blacklist configuration (BZ#2100133)
none-baseos-rpms
device-mapper-1.02.181-3.el8_6.2.x86_64.rpm
062d92efa240d25724b3646eb964f7238f053345fafa4c27e813cb127c6f1275
device-mapper-event-1.02.181-3.el8_6.2.x86_64.rpm
9adfe6d624e2f742c70da1a765a5076259a13ae0da2e7b7bb98c08fb0a185cc9
device-mapper-event-libs-1.02.181-3.el8_6.2.i686.rpm
41b218be7abb1b736e136885120eda397b14c0a64ff99ac74603c0e07ee876e0
device-mapper-event-libs-1.02.181-3.el8_6.2.x86_64.rpm
faafdc767a9c158559bcda6cedc9d1861a91352eddff40f927203a2ccdf88d0d
device-mapper-libs-1.02.181-3.el8_6.2.i686.rpm
e31b7516b0fc54e44046ca16b92934e68b78093a166a401727296c4d6eb9834a
device-mapper-libs-1.02.181-3.el8_6.2.x86_64.rpm
635a534320361b11bd9c5bfa908ff75e713622768deae1e5e7599ea727dd3ac7
lvm2-2.03.14-3.el8_6.2.x86_64.rpm
88bfc7dbbaddee4978cbac6a617b30078bf4556a85d5d65c03b11645c1b20fb3
lvm2-dbusd-2.03.14-3.el8_6.2.noarch.rpm
6ae8b3bd0f5290da5bb08059fe534b162ab46ae3d2398b8b53d58362556757c5
lvm2-dbusd-2.03.14-3.el8_6.2.noarch.rpm
6ae8b3bd0f5290da5bb08059fe534b162ab46ae3d2398b8b53d58362556757c5
lvm2-libs-2.03.14-3.el8_6.2.i686.rpm
af8df65df87ce1a21cc9b76f2162f813b1225749f61958cd3f6a9835048b8bd6
lvm2-libs-2.03.14-3.el8_6.2.x86_64.rpm
480a8e41de137d03c48f509524445e55c9ce9d310e0b7bf5e4b2687b1a6bcc77
lvm2-lockd-2.03.14-3.el8_6.2.x86_64.rpm
9b252965247a0f5f0e800755e541d0560ee7955200ff84d05ded5421778aac81
RLBA-2022:5872
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Obfuscate all passwords from ovirt answer files (BZ#2098639)
* sos disables openshift_ovn plugin (BZ#2098643)
none-baseos-rpms
sos-4.2-20.el8_6.noarch.rpm
580809c0f0256c6168315e9c82beea64c602578b31ad17f0a2b63a584e92c0a1
sos-4.2-20.el8_6.noarch.rpm
580809c0f0256c6168315e9c82beea64c602578b31ad17f0a2b63a584e92c0a1
sos-audit-4.2-20.el8_6.noarch.rpm
f33a023afeb1babb7bc4580742cf7b195c26750f79d6c5c96d98819ac53f0c90
sos-audit-4.2-20.el8_6.noarch.rpm
f33a023afeb1babb7bc4580742cf7b195c26750f79d6c5c96d98819ac53f0c90
RLBA-2022:6138
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022c, which addresses recent
time zone changes. Notably:
* In Chile (the America/Santiago time zone), the daylight saving time (DST) starts on September 11, 2022 instead of September 4.
none-baseos-rpms
tzdata-2022c-1.el8.noarch.rpm
212a9156d1109e2aa3f0a644b756f6ff90670b4bbb68e9b1c0cbe1befdac4f53
tzdata-2022c-1.el8.noarch.rpm
212a9156d1109e2aa3f0a644b756f6ff90670b4bbb68e9b1c0cbe1befdac4f53
RLBA-2022:6151
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* After upgrading system to Rocky Linux 8.6, insights-client fails to run when it's triggered via systemd (BZ#2103606)
none-baseos-rpms
selinux-policy-3.14.3-95.el8_6.4.noarch.rpm
d046551333d94bcbc4691bc29280da00b71ff8741e43a20705b2dc5c3dd28809
selinux-policy-3.14.3-95.el8_6.4.noarch.rpm
d046551333d94bcbc4691bc29280da00b71ff8741e43a20705b2dc5c3dd28809
selinux-policy-devel-3.14.3-95.el8_6.4.noarch.rpm
bed1e1aaed952420ca96c3882cf682029d26002421c7bfe49c4ff3d61243189f
selinux-policy-devel-3.14.3-95.el8_6.4.noarch.rpm
bed1e1aaed952420ca96c3882cf682029d26002421c7bfe49c4ff3d61243189f
selinux-policy-doc-3.14.3-95.el8_6.4.noarch.rpm
e9faf8ebd49fd1db5bf7450a9c619778b07a70183d5c6bc2006d7c877c069fcb
selinux-policy-doc-3.14.3-95.el8_6.4.noarch.rpm
e9faf8ebd49fd1db5bf7450a9c619778b07a70183d5c6bc2006d7c877c069fcb
selinux-policy-minimum-3.14.3-95.el8_6.4.noarch.rpm
009b8e001da08e031721686912fdae0d656f383f8efae6f27da3f8e488b75af2
selinux-policy-minimum-3.14.3-95.el8_6.4.noarch.rpm
009b8e001da08e031721686912fdae0d656f383f8efae6f27da3f8e488b75af2
selinux-policy-mls-3.14.3-95.el8_6.4.noarch.rpm
b62ef1fff2ce13be32c667cb4c91556dab07e00480d190d613bad5670c8be871
selinux-policy-mls-3.14.3-95.el8_6.4.noarch.rpm
b62ef1fff2ce13be32c667cb4c91556dab07e00480d190d613bad5670c8be871
selinux-policy-sandbox-3.14.3-95.el8_6.4.noarch.rpm
4eb695f8c33fa2673e7496e78093d18f5f8c758b70e213ce237fce50a28b24f2
selinux-policy-sandbox-3.14.3-95.el8_6.4.noarch.rpm
4eb695f8c33fa2673e7496e78093d18f5f8c758b70e213ce237fce50a28b24f2
selinux-policy-targeted-3.14.3-95.el8_6.4.noarch.rpm
3ec86f880c28ab2eb16900c1985215448e13ca5bb58697f8b66019b19c8b6558
selinux-policy-targeted-3.14.3-95.el8_6.4.noarch.rpm
3ec86f880c28ab2eb16900c1985215448e13ca5bb58697f8b66019b19c8b6558
RLSA-2022:6159
Moderate: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP compression denial of service (CVE-2022-32206)
* curl: FTP-KRB bad message verification (CVE-2022-32208)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
curl-7.61.1-22.el8_6.4.x86_64.rpm
f9f6a5e8b843d77ced695d831a42905c057ab6524e7b37a5ce992c752181eb38
libcurl-7.61.1-22.el8_6.4.i686.rpm
e18275408ea98c4fbd519c4d18184094432a56c5b3035d0b990f8bd256d0144d
libcurl-7.61.1-22.el8_6.4.x86_64.rpm
039bc6fb8f21f106c3fdd0e0807b9da036982ba82322abac4bb39b6853780b7d
libcurl-devel-7.61.1-22.el8_6.4.i686.rpm
d9d82e55d27002ec32324fcfdbaa1b8eb4cb89de92061ce0c227edee3db4ef06
libcurl-devel-7.61.1-22.el8_6.4.x86_64.rpm
b3fcaa1a56e656d0ceccba9e47c0abf981bc8acbeb5fe05d65edfe45b3921f39
libcurl-minimal-7.61.1-22.el8_6.4.i686.rpm
2d45157aef4be87976b459975ebea5a3212b8bc23a38dd46f883dc7fdab31913
libcurl-minimal-7.61.1-22.el8_6.4.x86_64.rpm
1bd45bc1f980c5d0993a6c215d0fc64e7bf6b3c1c1ed8f0870b644fb28d831ce
RLSA-2022:6180
Important: rsync security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
rsync-3.1.3-14.el8_6.3.x86_64.rpm
653cf70feb3eb70f453d7e0a208104ee8b50d6f1c5df7f80cbf5f5a43e20de8c
rsync-daemon-3.1.3-14.el8_6.3.noarch.rpm
0a70d78744021e4be9a55e52c20fa71dded490766078aed7ded17c9cfbf3398b
rsync-daemon-3.1.3-14.el8_6.3.noarch.rpm
0a70d78744021e4be9a55e52c20fa71dded490766078aed7ded17c9cfbf3398b
RLSA-2022:6206
Important: systemd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
systemd-239-58.el8_6.4.i686.rpm
0629f0cd3dd4d21d4d5634262ee2a698101dda5c329fdb5bb081d99d32adc4f0
systemd-239-58.el8_6.4.x86_64.rpm
a10fcd66fd6dddeaee5cdeb9ef55aee6d6319a2b41b309bf38d855107e3610e5
systemd-container-239-58.el8_6.4.i686.rpm
e770d90d047d2c1aea9d12ebf2f51e39d251d64b98b1f6153b6a984818881a04
systemd-container-239-58.el8_6.4.x86_64.rpm
bb457e789eb75e8a16ad63d36a64b35358afca62eda597350db11e5d0fa7576c
systemd-devel-239-58.el8_6.4.i686.rpm
3e022c5dcac62f9cd68afbfd395c8a3dc79a02670516f35efad61792e378ec7c
systemd-devel-239-58.el8_6.4.x86_64.rpm
3e05ee8ab3b8621ff006e7b987ac725a06bc11aa2c3b0c40afde9391779a2756
systemd-journal-remote-239-58.el8_6.4.x86_64.rpm
ea6e7c054cd55f9b7f99c7e1f10f5db5037ae83fbb36abefe8a34b749c327060
systemd-libs-239-58.el8_6.4.i686.rpm
ba3f44923dc82ba85c87248535001abc6a6065bb321d19494dc7841abd6a5fba
systemd-libs-239-58.el8_6.4.x86_64.rpm
b6d89baea5bd7e8dd5dfb7448e00e022ac03a1c49f57b042bcd76ad86724def7
systemd-pam-239-58.el8_6.4.x86_64.rpm
43510af379f7a3487038b67f7db548e58325819b70fc474e17a6cf72f34d35eb
systemd-tests-239-58.el8_6.4.x86_64.rpm
eec7bf3d57d0c3eeb02430e5f52f1378e74d86feb10bafe4330a48473af087ac
systemd-udev-239-58.el8_6.4.x86_64.rpm
5e8cfbe5bd15a4c0d7ee2006834e71cdbe201bc4791100bbdc56226a0b061e3e
RLSA-2022:6460
Moderate: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123)
* Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125)
* Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Bad page state in process qemu-kvm pfn:68a74600 (BZ#2081013)
* slub corruption during LPM of hnv interface (BZ#2081250)
* Affinity broken due to vector space exhaustion (BZ#2084646)
* 'rmmod pmt_telemetry' panics on ADL-P IOTG (BZ#2091079)
* Unable to boot Rocky Linux-8.6 on Brazos max. config (Install is success) (BZ#2092241)
* kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095654)
* mt7921: free resources on pci_probe error path (BZ#2101684)
* NLM should be more defensive if underlying FS changes fl_owner (BZ#2102099)
* Rocky Linux8/async-pf Guest call trace when reboot after postcopy migration with high stress workload (BZ#2105340)
* execve exit tracepoint not called (BZ#2106662)
* QProcess dead lock on kernel-4.18.0-358 (BZ#2107643)
* KVM fix guest FPU uABI size to kvm_xsave (BZ#2107652)
* KVM selftests fail to compile (BZ#2107655)
* Some monitor have no display with AMD W6400 when boot into OS. (BZ#2109826)
* Percpu counter usage is gradually getting increasing during podman container recreation. (BZ#2110039)
* multipath failed to recover after EEH hit on flavafish adapter on Denali(qla2xxx/flavafish/Rocky Linux8.6/Denali) (BZ#2110768)
* soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110772)
* trouble re-assigning MACs to VFs, ice stricter than other drivers (BZ#2111936)
* Intel MPI 2019.0 - mpirun stuck on latest kernel (BZ#2112030)
* Multicast packets are not received by all VFs on the same port even though they have the same VLAN (BZ#2117026)
* Hyper-V 2019 Dynamic Memory Problem hv_balloon (BZ#2117050)
* kernel BUG at kernel/sched/deadline.c:1561! (BZ#2117410)
* ALSA (sound) driver - update Intel SOF kcontrol code (BZ#2117732)
* bridge over bond over ice ports has no connection (BZ#2118580)
* Fix max VLANs available for VF (BZ#2118581)
* offline selftest failed (BZ#2118582)
* INTEL NVMUpdate utility ver 3.20 is failing to update firmware on E810-XXVDA4T (WPC) (BZ#2118583)
* VM configured with failover interface will coredump after been migrating from source host to target host(only iavf driver) (BZ#2118705)
* Fix max VLANs available for untrusted VF (BZ#2118707)
* Softlockup on infinite loop in task_get_css() for a CSS_DYING cpuset (BZ#2120776)
Enhancement(s):
* KVM Sapphire Rapids (SPR) AMX Instructions (BZ#2088287)
* KVM Sapphire Rapids (SPR) AMX Instructions part2 (BZ#2088288)
* ice: Driver Update (BZ#2102359)
* iavf: Driver Update (BZ#2102360)
* iommu/vt-d: Make DMAR_UNITS_SUPPORTED a config setting (BZ#2112983)
none-baseos-rpms
bpftool-4.18.0-372.26.1.el8_6.x86_64.rpm
ea3c49295fa3ee03593700359cb06feeb5871accd04d02c3b4616da1b77e09a9
kernel-4.18.0-372.26.1.el8_6.x86_64.rpm
846ac607385c56ced9d659767d29a735783f4eb169f32a68d678dc5b6575cf0b
kernel-abi-stablelists-4.18.0-372.26.1.el8_6.noarch.rpm
b049506ca2f279ee9b9a7799a8db9b51a4eb2fa8adf9991318812d4bd9202f53
kernel-abi-stablelists-4.18.0-372.26.1.el8_6.noarch.rpm
b049506ca2f279ee9b9a7799a8db9b51a4eb2fa8adf9991318812d4bd9202f53
kernel-core-4.18.0-372.26.1.el8_6.x86_64.rpm
4ff73e57f2acf7c129f67a60062429406018a51d3bd8a9110d88ca55d94461d8
kernel-cross-headers-4.18.0-372.26.1.el8_6.x86_64.rpm
ae7d0f82d0984191cee71ffec02b52e5216a6673310a1139a9e5d09775b428e8
kernel-debug-4.18.0-372.26.1.el8_6.x86_64.rpm
ce89fa6078aa48cc120b3447dc25a70f43663706dbd193c862a8f71734b419b6
kernel-debug-core-4.18.0-372.26.1.el8_6.x86_64.rpm
c075028df30e50337bf4e862aad88eb13bdc8d6b33d9e099f4ec40083c59e55e
kernel-debug-devel-4.18.0-372.26.1.el8_6.x86_64.rpm
56fe36a3c375255ef010d4f2651fe18b5597eec9c4ba60c80b222b1f5fb42075
kernel-debuginfo-common-x86_64-4.18.0-372.26.1.el8_6.x86_64.rpm
c9383e795b908e6d7d33f7f9cfadc3de7457740b73422c9223bd7086c29ac8f0
kernel-debug-modules-4.18.0-372.26.1.el8_6.x86_64.rpm
71355a35cbe8e4bc958af5a49af6981535c14a6ad1974a7ade385818c7df7f93
kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.x86_64.rpm
5c75015d3d67bb20db31abae2559296dbd21fbab6e14cf2cb6328fcfacef1d0b
kernel-devel-4.18.0-372.26.1.el8_6.x86_64.rpm
33c82a16da3ff0b78512be50c16997381efc18dfd308fd964e027e9bf35eceb7
kernel-doc-4.18.0-372.26.1.el8_6.noarch.rpm
ea5b4449c556c60799ad95f87ec8e5a72bddbe2ae80c1f99139e0e98363df5ad
kernel-doc-4.18.0-372.26.1.el8_6.noarch.rpm
ea5b4449c556c60799ad95f87ec8e5a72bddbe2ae80c1f99139e0e98363df5ad
kernel-headers-4.18.0-372.26.1.el8_6.x86_64.rpm
f6d16bc9b9b8c92c1a8376467414a6ffb2b1dd12aec9d52ed18bfafb15c0ecfd
kernel-modules-4.18.0-372.26.1.el8_6.x86_64.rpm
8a8fd46259c32080cd2baae1a283a6efc25b83f3b03a72c34cc96cf51977dff9
kernel-modules-extra-4.18.0-372.26.1.el8_6.x86_64.rpm
baa71ed617a1de35889579a137ec8809c0a77faa4175f7e5582010c452a5de98
kernel-tools-4.18.0-372.26.1.el8_6.x86_64.rpm
b3756084e91b8bee880e390adfd8e2887e2eda9e7d067a7ab935ca7d992578d0
kernel-tools-libs-4.18.0-372.26.1.el8_6.x86_64.rpm
5d3844b5728c34e6d125d7a171bfa6d85fded7d347c815c86f343dd1744ff72a
perf-4.18.0-372.26.1.el8_6.x86_64.rpm
4eb268354e5b32318e4a546c59bb062416484c7f1abe857fc8146cfbd86f1adf
python3-perf-4.18.0-372.26.1.el8_6.x86_64.rpm
a0b37d6c1343cf1aec1556a08a0613ec4def91a2bf27bb3449123265be9182bc
RLBA-2022:6461
pam bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Bug Fix(es) and Enhancement(s):
* faillock command does not read faillock.conf option (BZ#2112889)
none-baseos-rpms
pam-1.3.1-16.el8_6.1.i686.rpm
2956ef238fa80cb439d5ce4baf26e6bc24490dd27141b47cfbd5193efa4802fd
pam-1.3.1-16.el8_6.1.x86_64.rpm
e830bf491afa5539f3dba31a9324517d8c4fae3f4a855cd20451b402ef9cd302
pam-devel-1.3.1-16.el8_6.1.i686.rpm
4c9e519dfbe98ad7e26ac16afa346a387fbdebce3f8e0b13afd2880176150da5
pam-devel-1.3.1-16.el8_6.1.x86_64.rpm
4a25b1f91e6bbc207c80f5c2c9ef16361a54730f1558e3aea1e3ef83e185d351
RLBA-2022:6462
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Bug Fix(es) and Enhancement(s):
* testcases/pkcs11/gen_purpose.c:258) C_GetMechanismList 2 rc=CKR_BUFFER_TOO_SMALL seen when running the gen_purpose tests on mixed CEX7P/8P card openCryptoki setup (BZ#2114806)
none-baseos-rpms
opencryptoki-3.17.0-5.el8_6.x86_64.rpm
3d331076f0f55c61e3ade603dad395afc6d6c277cf1cb812783b2fbba447c38c
opencryptoki-icsftok-3.17.0-5.el8_6.x86_64.rpm
06db5794732b123f72a5740779ed104b3f3994d9126b475c45286110874121b3
opencryptoki-libs-3.17.0-5.el8_6.i686.rpm
91c7ac38067dfa0c4ea0fd703e1bdc75a98fa502e7aac6d41afea7b6adf879dd
opencryptoki-libs-3.17.0-5.el8_6.x86_64.rpm
6f403e4410f6450e9d7762453be3f92f5e0b4a19e1412cdc5b6f5299618db39d
opencryptoki-swtok-3.17.0-5.el8_6.x86_64.rpm
b6dabaf417fd2a8007cc58eaafb7495a49320e63457836aaff34ce4334036a7f
opencryptoki-tpmtok-3.17.0-5.el8_6.x86_64.rpm
f28f89b70b5a2494a6c0445cc08101308a4d0b3f6110ab5ee45019f0f7f7b905
RLBA-2022:6464
initscripts bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for initscripts.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The initscripts packages contain basic system scripts that boot the system, change runlevels, activate and deactivate most network interfaces, and shut down the system cleanly.
Bug Fix(es) and Enhancement(s):
* IPv6 Default gateway fail to be configured when interface have both IPv4 and IPv6 address - IPv4 brings iface up, then IPv6 initilalization set accept_ra = 0. Since interface was already up default route was added upon receiving Router A. (BZ#2118274)
none-baseos-rpms
initscripts-10.00.17-1.el8_6.2.x86_64.rpm
7f16b2c9ab16b137a78a27a05c1aafbd63429d65f043933dd75c677fafc08985
netconsole-service-10.00.17-1.el8_6.2.noarch.rpm
4abe188afc35de1f4feec02cd319f248d58b1beb7135d2177ab3fd0dda085e5b
netconsole-service-10.00.17-1.el8_6.2.noarch.rpm
4abe188afc35de1f4feec02cd319f248d58b1beb7135d2177ab3fd0dda085e5b
network-scripts-10.00.17-1.el8_6.2.x86_64.rpm
a2fad289676520be61cf424f3ed3d5813583231ba968bc0e2227dec72bb4c01b
readonly-root-10.00.17-1.el8_6.2.noarch.rpm
1856d51cf591dea99b16090604fb17447d580d48ec6296b12dab95f6419524a7
readonly-root-10.00.17-1.el8_6.2.noarch.rpm
1856d51cf591dea99b16090604fb17447d580d48ec6296b12dab95f6419524a7
RLBA-2022:6465
libdnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library providing simplified C and Python API to the libsolv package dependency solver.
Bug Fix(es) and Enhancement(s):
* Additional fix for Performing security update from Rocky Linux 8.5 to Rocky Linux 8.6 causes dependency errors. (BZ#2116945)
none-baseos-rpms
libdnf-0.63.0-8.2.el8_6.i686.rpm
377de8f858769fc2ab3ec95388acb234fda18ce075a7cb156e179fc7396e6e93
libdnf-0.63.0-8.2.el8_6.x86_64.rpm
775386ad38bc75ac9b74cc85e329b8aae98162185c099de39f14dcb28ccdf6eb
python3-hawkey-0.63.0-8.2.el8_6.x86_64.rpm
d286b5377c6de3fd44692485db7f2d3711fe64f37f79e9b133fa8176aa007b2e
python3-libdnf-0.63.0-8.2.el8_6.x86_64.rpm
2fd834ea47494709642b36078bc3a0be1e9388b1809d81c80c210f1cbcd9aade
RLBA-2022:6466
systemd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* systemd leaks pipes when executing Type=exec services (BZ#2116892)
* imsm raid device hangs during reboot after mdmon is stopped (BZ#2120608)
none-baseos-rpms
systemd-239-58.el8_6.7.i686.rpm
ac842d5762639af66dd20f03847ec7dd649b7842e5775c8592434a56ff4d7147
systemd-239-58.el8_6.7.x86_64.rpm
7d98ce970e7a0c8eee79f497bfa0a9f03317dc19c37ce5ffaf1569a1b9ee7e1d
systemd-container-239-58.el8_6.7.i686.rpm
aad40282d98b2a0bf65b4634e638715f39cbb159cab11f8109eec3ea8cfb0b70
systemd-container-239-58.el8_6.7.x86_64.rpm
5a2ed129fb82a8e6a736779f5b8469da58b3733efd04a67a1a0f2eeb8800ce29
systemd-devel-239-58.el8_6.7.i686.rpm
631c272f74d1dd3bdc97cc1ae3a074720c4aa76a919a1f2e3c7fcbcd281101d0
systemd-devel-239-58.el8_6.7.x86_64.rpm
adf7fb4845aaec1adfcdbcd07c2caf1b1f51fa7d3fe42958b8ff2c2a79ecf4b4
systemd-journal-remote-239-58.el8_6.7.x86_64.rpm
020160f0d85ec59cca813e801c55c7333f0d21ccf786e4a40f871254c2c1852f
systemd-libs-239-58.el8_6.7.i686.rpm
2858553638369dd5978d303aef6f500980afee94a1084bb60ddb96b7d06ba653
systemd-libs-239-58.el8_6.7.x86_64.rpm
69095de7440e668d50bf22f5b51d59a9919f983b22a371d9aae2f280b4b5c8f9
systemd-pam-239-58.el8_6.7.x86_64.rpm
034dad20ccebaf79298cc371dd8a9e8e292fee77a4ce357961fe089bfe8eed31
systemd-tests-239-58.el8_6.7.x86_64.rpm
b93064c3e794e5e17a0b97a4adc164e26b0e561ee9c6efe413b1038960701f5d
systemd-udev-239-58.el8_6.7.x86_64.rpm
19d4293436af6ba3b1642fb02e36319316b2cefa1b9a514846a8fb3a46934ec5
RLSA-2022:6778
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177)
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bind-export-devel-9.11.36-3.el8_6.1.i686.rpm
7feb9c83e60a2c5acf37cbb91954fbc383ff389a557561d9db81adb239747d20
bind-export-devel-9.11.36-3.el8_6.1.x86_64.rpm
6e3857b2305e742ccdc340a1b929dc7a31992b4e6b59d2f75d1e2ed1301a683d
bind-export-libs-9.11.36-3.el8_6.1.i686.rpm
e084f8bbca75935fba3e755948e8a209c7e6397a42e555469f84eceec1e6f463
bind-export-libs-9.11.36-3.el8_6.1.x86_64.rpm
f3a0737808b6b7315f6e3df010897b9236b6d3c09abea6a443d0ec8fce722177
RLBA-2022:6827
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022d, which addresses recent
time zone changes. Notably:
* Palestine will transition to daylight saving time (DST) on October 29, 2022 instead of October 28, 2022.
* Europe/Uzhgorod and Europe/Zaporozhye are moved to the 'backzone' file.
none-baseos-rpms
tzdata-2022d-1.el8.noarch.rpm
6680de16e81ad6c87c848c5b04ee5b342503f1c7267cebc662d19dc5ec6c99f1
tzdata-2022d-1.el8.noarch.rpm
6680de16e81ad6c87c848c5b04ee5b342503f1c7267cebc662d19dc5ec6c99f1
RLSA-2022:6878
Important: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.2.5-8.el8_6.3.i686.rpm
1b5922b300cffa4719f8a498220cd0b50dfaaf99ae292f954edd072924873164
expat-2.2.5-8.el8_6.3.x86_64.rpm
3d41bc3fa0ec228c560109d6003a602c5eecaa2b5cdd9e0a6396950cb72a3e99
expat-devel-2.2.5-8.el8_6.3.i686.rpm
67b8d633f9dc3be64fb22fc65fba4b1f2726f2f0081539ca32c091c7e1c2c9f7
expat-devel-2.2.5-8.el8_6.3.x86_64.rpm
740442b45ab6c41babd0c4cb7d4127e50d655a233c15046ae40e9b2d683e2118
RLBA-2022:7067
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022e, which addresses recent
time zone changes. Notably:
* Jordan and Syria cancelled the daylight saving time (DST) transition planned for October 28 2022 and will remain at time offset of +03:00 from the coordinated universal time (UTC) permanently.
none-baseos-rpms
tzdata-2022e-1.el8.noarch.rpm
553f0c1bf2c66a9fb1567c723f9d48c1f10b842aec6927c4e04757bba20f888c
tzdata-2022e-1.el8.noarch.rpm
553f0c1bf2c66a9fb1567c723f9d48c1f10b842aec6927c4e04757bba20f888c
RLBA-2022:7104
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* [NMCI] stable_mem_consumption2 test fails (BZ#2107161)
* NetworkManager didn't automatically renew the lease on the VLAN interface configured using nmstate (BZ#2109411)
* NetworkManager does not update /var/run/NetworkManager/resolv.conf (BZ#2130417)
none-baseos-rpms
NetworkManager-1.36.0-9.el8_6.x86_64.rpm
c0bda8f03b1103cc4f6e5b083ef525a3b11075c52d1aa346b44b33cba5ada128
NetworkManager-adsl-1.36.0-9.el8_6.x86_64.rpm
835eba135f083c146aa006f2e51087e6fc54e9aad5090ac8cbb30c82e5608629
NetworkManager-bluetooth-1.36.0-9.el8_6.x86_64.rpm
0f487280cfd291e9c417ffb980f9ae4e2437592d3e0febfdb581237ebdec035b
NetworkManager-config-connectivity-redhat-1.36.0-9.el8_6.noarch.rpm
14d11f08b81fce0df4a8cf602c12a2c385aff0353626b0995d5b0be638baf1a3
NetworkManager-config-connectivity-redhat-1.36.0-9.el8_6.noarch.rpm
14d11f08b81fce0df4a8cf602c12a2c385aff0353626b0995d5b0be638baf1a3
NetworkManager-config-server-1.36.0-9.el8_6.noarch.rpm
09a09da9e37c59dd7ee1b35001b5e1c27c655bf751ac1295d39253405a8a771e
NetworkManager-config-server-1.36.0-9.el8_6.noarch.rpm
09a09da9e37c59dd7ee1b35001b5e1c27c655bf751ac1295d39253405a8a771e
NetworkManager-dispatcher-routing-rules-1.36.0-9.el8_6.noarch.rpm
4be1b22cf8add267ab4525292f13cd9daa34a565f8582a624c82cde016651d86
NetworkManager-dispatcher-routing-rules-1.36.0-9.el8_6.noarch.rpm
4be1b22cf8add267ab4525292f13cd9daa34a565f8582a624c82cde016651d86
NetworkManager-initscripts-updown-1.36.0-9.el8_6.noarch.rpm
ace840b348a1be52762d3971f1c08824aeaa218e20563a826a89e4c4aa04235d
NetworkManager-initscripts-updown-1.36.0-9.el8_6.noarch.rpm
ace840b348a1be52762d3971f1c08824aeaa218e20563a826a89e4c4aa04235d
NetworkManager-libnm-1.36.0-9.el8_6.i686.rpm
ee4dd4d4830e9eba7e61203d18e39729ddda77c5fd940fdc06f3b822b8b34b7a
NetworkManager-libnm-1.36.0-9.el8_6.x86_64.rpm
a7c5873002bcbf71c57262403378b0d02e310445b6065db7d82f3c6e27322d1e
NetworkManager-ovs-1.36.0-9.el8_6.x86_64.rpm
242e195f7bb09361b051ca8541c124e47a978a2a65279bfcc3d21acbca86c26f
NetworkManager-ppp-1.36.0-9.el8_6.x86_64.rpm
ce1f587627d0276acbdd944cc9265cc6ae9c103012d82859a41976a59fc8ef7b
NetworkManager-team-1.36.0-9.el8_6.x86_64.rpm
7187ccb0015933a9946e02daa98641a942df8ac02a92a2933bf2c46b996084a2
NetworkManager-tui-1.36.0-9.el8_6.x86_64.rpm
74d05254bc34b8246dadad7f0edb685164e08aa4dab58f2e5ebb98e45af5f40d
NetworkManager-wifi-1.36.0-9.el8_6.x86_64.rpm
039df25aee17a077c20f5f86079ceb50c9b4bacc4dcd12bfdf312f939083f34c
NetworkManager-wwan-1.36.0-9.el8_6.x86_64.rpm
e5e044342a7f2eddbc8613944f27037b992908f14b5438d48c64ba14058fcc91
RLSA-2022:7111
Moderate: samba security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: server memory information leak via SMB1 (CVE-2022-32742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* python3-samba requires samba and that is a bug (BZ#2126041)
none-baseos-rpms
samba-libs-4.15.5-10.el8_6.x86_64.rpm
dd2bf8e8e59a0ff2e486296660953944222172bb97a6faf67e19146a42bff05c
ctdb-4.15.5-10.el8_6.x86_64.rpm
3bdb9a56df16917e4b323d2178517a6399f64a6e52c4875bca04a376ba2b4ead
libsmbclient-4.15.5-10.el8_6.i686.rpm
b8c12369c6ed588136a999a44f638985636624fcef2f70b4b264be174850700f
libsmbclient-4.15.5-10.el8_6.x86_64.rpm
16fc0c84229cce3756edbaf38f252505727ea5a3943ea3bd8227395aae206fc8
libwbclient-4.15.5-10.el8_6.i686.rpm
ff28cdfa220a5c93926d869aa4fad1a71eb1bf6cb85aeddd166aa12158471111
libwbclient-4.15.5-10.el8_6.x86_64.rpm
ac32d4866bf9b449517595eaec5dd5c726790eb8287de1bec1dd2d886346930f
python3-samba-4.15.5-10.el8_6.i686.rpm
ac808c525b607026e05b9ff3c561d99ee9627ca792caae4e4ee05f9a788445c6
python3-samba-4.15.5-10.el8_6.x86_64.rpm
3868dc08fe8371f3ca60e010714656b32d3072d64e95b9fc5b764442b65c296a
python3-samba-test-4.15.5-10.el8_6.x86_64.rpm
79fd5804ceb4ab6d29083050d05a430fc665f1e307dcd19af083ff324079511a
samba-4.15.5-10.el8_6.x86_64.rpm
cc4de5897d756e99783f8fa6bc061b7b314533085dafb74c5185c1d72ab513d4
samba-client-4.15.5-10.el8_6.x86_64.rpm
10620fd7a9c933e951b02acb737ce974e99218a6c3e1ee551b872defc2a90a18
samba-client-libs-4.15.5-10.el8_6.i686.rpm
9bb472a6fa256cf43016ddc6a4a428822ff8ccbf6f79dce79c6767b8264d5d67
samba-client-libs-4.15.5-10.el8_6.x86_64.rpm
7fa6f1d33394d70408aa789bd1a556af5033857c8075b1915959121f36115a6e
samba-common-4.15.5-10.el8_6.noarch.rpm
b5225fc0c75a66a52e2edd23a72a2b4bb27a045aa651bdd5581e9e68abed2abe
samba-common-4.15.5-10.el8_6.noarch.rpm
b5225fc0c75a66a52e2edd23a72a2b4bb27a045aa651bdd5581e9e68abed2abe
samba-common-libs-4.15.5-10.el8_6.x86_64.rpm
14edbed21c3eadcdc847fc455c3aabeba74c5316e061e5b0cf2dc32f90b8af2b
samba-common-tools-4.15.5-10.el8_6.x86_64.rpm
5650fb8aaf82a770c58466e8dea97229f8cb1e0df34953cb9c997f4bc142e175
samba-krb5-printing-4.15.5-10.el8_6.x86_64.rpm
d538c6a5e937426ec3acdee20a4b50d249adac2462a366455c605014dc6fd457
samba-libs-4.15.5-10.el8_6.i686.rpm
258099bb14fe3ec05eb582cc5d366c6ec20c45fea9f38be4148bfa7715126873
samba-pidl-4.15.5-10.el8_6.noarch.rpm
394edb47ab7dec9f02df85812818cce064af58a2efbbc37dd00a9967ae8e65f4
samba-pidl-4.15.5-10.el8_6.noarch.rpm
394edb47ab7dec9f02df85812818cce064af58a2efbbc37dd00a9967ae8e65f4
samba-test-4.15.5-10.el8_6.x86_64.rpm
10b2d2d6afad1070b5c6ce005b4cf1a6c5e8cfccbad9ffcaba014ccc37f1c364
samba-test-libs-4.15.5-10.el8_6.x86_64.rpm
db5cbdb765deb88106dd65841b6c06d783f22d99fa1dc2983a324766066642b4
samba-winbind-4.15.5-10.el8_6.x86_64.rpm
1b09b7d2c3a83dbbd50c6d0af3954c1ea25557f345783a8f6ea10f21fc5eda16
samba-winbind-clients-4.15.5-10.el8_6.x86_64.rpm
51612918e97d8409dba49bce2a14c39cf6ecc1a23f413d6fc5a9c153cbfca749
samba-winbind-krb5-locator-4.15.5-10.el8_6.x86_64.rpm
c5fc20cea7c940b183e13117ce34eaee673fdd25efdc04efbe153c70bab895b7
samba-winbind-modules-4.15.5-10.el8_6.i686.rpm
8e32a579b202a87223f37adae32af402be3c89e290585c46a77a25f3c67642ba
samba-winbind-modules-4.15.5-10.el8_6.x86_64.rpm
4483f038d698c936bf4988e9f761c3517e05ad41222c62c91cf4728195aa566c
samba-winexe-4.15.5-10.el8_6.x86_64.rpm
fcf94d683295bb41e86ae13cdf24a2149790c9a03b076f2f3582b388bc599e42
RLSA-2022:7106
Moderate: zlib security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for zlib.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zlib packages provide a general-purpose lossless data compression library that is used by many different programs.
Security Fix(es):
* zlib: a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field (CVE-2022-37434)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
zlib-1.2.11-19.el8_6.i686.rpm
a4b2524892a8d12f86dd4491375eaa2accac135784b7b3bc4e04e2d1ab075661
zlib-1.2.11-19.el8_6.x86_64.rpm
0e0151b4eb23ed3ed5ef2593b6170908e5e413a20d5ed5c7badacc63d91eef0d
zlib-devel-1.2.11-19.el8_6.i686.rpm
04d03e04d58d513646060e0ea6539f5ebeebc9200caf785dd90e9eca8556cf7c
zlib-devel-1.2.11-19.el8_6.x86_64.rpm
3e31c51acd02850e5d157462202970a5f2096e05f3de5b0146ade831acc35906
RLBA-2022:7109
linux-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Bug Fix(es) and Enhancement(s):
* [Marvell 8.7 FEAT] qed - firmware update (BZ#2121415)
none-baseos-rpms
iwl1000-firmware-39.31.5.1-108.el8_6.1.noarch.rpm
57b5588ad8555e3425a8a6af759dedac912c2bd3c37a3673a2ba64499f9dbc18
iwl1000-firmware-39.31.5.1-108.el8_6.1.noarch.rpm
57b5588ad8555e3425a8a6af759dedac912c2bd3c37a3673a2ba64499f9dbc18
iwl100-firmware-39.31.5.1-108.el8_6.1.noarch.rpm
ed963196c89fb65c86ab99c3de3952e9405ff5ebbf205f4e4d08b72d18f5d086
iwl100-firmware-39.31.5.1-108.el8_6.1.noarch.rpm
ed963196c89fb65c86ab99c3de3952e9405ff5ebbf205f4e4d08b72d18f5d086
iwl105-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
dc1bc26d92d552baad8bcf7240bf393e8023dbc801d154d440096f98f37b9bf9
iwl105-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
dc1bc26d92d552baad8bcf7240bf393e8023dbc801d154d440096f98f37b9bf9
iwl135-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
9516323235639babd272ff5a1881c7e763bfa5d7a3e8125ecb507b353b368256
iwl135-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
9516323235639babd272ff5a1881c7e763bfa5d7a3e8125ecb507b353b368256
iwl2000-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
bb03690f60a56102980fcbe6fd7de3a93d8001744f052e94e1d9794ff336d487
iwl2000-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
bb03690f60a56102980fcbe6fd7de3a93d8001744f052e94e1d9794ff336d487
iwl2030-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
13072fee233b4f39ca621ddaf3c3b38dfdc0c144e4c63470e4c475272fb3d22a
iwl2030-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
13072fee233b4f39ca621ddaf3c3b38dfdc0c144e4c63470e4c475272fb3d22a
iwl3160-firmware-25.30.13.0-108.el8_6.1.noarch.rpm
0e0b9442e3311d7d8642ede764486664db50fa249e1f5a7372552ccbbc3ffc99
iwl3160-firmware-25.30.13.0-108.el8_6.1.noarch.rpm
0e0b9442e3311d7d8642ede764486664db50fa249e1f5a7372552ccbbc3ffc99
iwl3945-firmware-15.32.2.9-108.el8_6.1.noarch.rpm
9bc0dacb1160649f7d7164f977c2d945a0a3792515a334911840b80d89e5df74
iwl3945-firmware-15.32.2.9-108.el8_6.1.noarch.rpm
9bc0dacb1160649f7d7164f977c2d945a0a3792515a334911840b80d89e5df74
iwl4965-firmware-228.61.2.24-108.el8_6.1.noarch.rpm
cce0c2286afbfcce843c36f58acffd573aceefc0e38db0fd08fffaa0f11ed7d6
iwl4965-firmware-228.61.2.24-108.el8_6.1.noarch.rpm
cce0c2286afbfcce843c36f58acffd573aceefc0e38db0fd08fffaa0f11ed7d6
iwl5000-firmware-8.83.5.1_1-108.el8_6.1.noarch.rpm
8b4c5f05fea404289f565e36b8f4899f33cc3c2738fbedd501d00b0d6679ac3b
iwl5000-firmware-8.83.5.1_1-108.el8_6.1.noarch.rpm
8b4c5f05fea404289f565e36b8f4899f33cc3c2738fbedd501d00b0d6679ac3b
iwl5150-firmware-8.24.2.2-108.el8_6.1.noarch.rpm
5bc12319ee76bd70506ffc1fd2d35c6847000383cc0788a0362afb90e73bee58
iwl5150-firmware-8.24.2.2-108.el8_6.1.noarch.rpm
5bc12319ee76bd70506ffc1fd2d35c6847000383cc0788a0362afb90e73bee58
iwl6000-firmware-9.221.4.1-108.el8_6.1.noarch.rpm
ccff5daa832158fcd8ab6813d3370925714092aae2f84e4ffef4aa6816eed069
iwl6000-firmware-9.221.4.1-108.el8_6.1.noarch.rpm
ccff5daa832158fcd8ab6813d3370925714092aae2f84e4ffef4aa6816eed069
iwl6000g2a-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
b0baec60c0f3fbdebb4e98ad1cbc2ab5d5e91157227e4032cecf2b466c8ef653
iwl6000g2a-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
b0baec60c0f3fbdebb4e98ad1cbc2ab5d5e91157227e4032cecf2b466c8ef653
iwl6000g2b-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
298d1bd448814e6e036c36c2436e6d9b7023455f65ccef08705023512cd8fe29
iwl6000g2b-firmware-18.168.6.1-108.el8_6.1.noarch.rpm
298d1bd448814e6e036c36c2436e6d9b7023455f65ccef08705023512cd8fe29
iwl6050-firmware-41.28.5.1-108.el8_6.1.noarch.rpm
9b570c09ec258a99209d6ebbcc7540951cffc2f70a72cb92a016732ef9cb73e0
iwl6050-firmware-41.28.5.1-108.el8_6.1.noarch.rpm
9b570c09ec258a99209d6ebbcc7540951cffc2f70a72cb92a016732ef9cb73e0
iwl7260-firmware-25.30.13.0-108.el8_6.1.noarch.rpm
3a59383d8380f4505388744435c8b299a94bbb6430afd914b86b77bff6166e59
iwl7260-firmware-25.30.13.0-108.el8_6.1.noarch.rpm
3a59383d8380f4505388744435c8b299a94bbb6430afd914b86b77bff6166e59
libertas-sd8686-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
1a742befb2582f43cc720ce4630ac41925c29b3d47f12cf499e69f3755501a09
libertas-sd8686-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
1a742befb2582f43cc720ce4630ac41925c29b3d47f12cf499e69f3755501a09
libertas-sd8787-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
16068fd769c48c018bbe63a65575a69de56cc7857daa37a1058b7ab2de883b0e
libertas-sd8787-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
16068fd769c48c018bbe63a65575a69de56cc7857daa37a1058b7ab2de883b0e
libertas-usb8388-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
e52b9b85a24d083b6b691cd5c607cd8e20c882e998d75dcb8f978eb02d22491f
libertas-usb8388-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
e52b9b85a24d083b6b691cd5c607cd8e20c882e998d75dcb8f978eb02d22491f
libertas-usb8388-olpc-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
27736b2e49e2892fde9d372b34c7191b1fc50737727e333f223bbe59e5a06a4d
libertas-usb8388-olpc-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
27736b2e49e2892fde9d372b34c7191b1fc50737727e333f223bbe59e5a06a4d
linux-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
81e82045ef499606a99de2efa79b50adb5379f1a5500242c81ebf9363f92d894
linux-firmware-20220210-108.git6342082c.el8_6.noarch.rpm
81e82045ef499606a99de2efa79b50adb5379f1a5500242c81ebf9363f92d894
RLSA-2022:7110
Important: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)
* Information leak in scsi_ioctl() (CVE-2022-0494)
* A kernel-info-leak issue in pfkey_register (CVE-2022-1353)
* RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900)
* Branch Type Confusion (non-retbleed) (CVE-2022-23825)
* RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Add s390_iommu_aperture kernel parameter (BZ#2081324)
* Blackscreen and hangup after resume from hibernate or S3 with DFGX WX3200 (BZ#2091065)
* Update NVME subsystem with bug fixes and minor changes (BZ#2106017)
* Fix parsing of nw_proto for IPv6 fragments (BZ#2106703)
* "vmcore failed, _exitcode:139" error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured. (BZ#2107488)
* 'disable_policy' is ignored for addresses configured on a down interface (BZ#2109971)
* Backport request for new cpufreq.default_governor kernel command line parameter (BZ#2109996)
* Panics in mpt3sas mpt3sas_halt_firmware() if mpt3sas_fwfault_debug=1 enabled when poweroff issued to server (BZ#2111140)
* IOMMU/DMA update for 8.7 (BZ#2111692)
* Update Broadcom Emulex lpfc driver for Rocky Linux8.7 with bug fixes (14.0.0.13) (BZ#2112103)
* Incorrect Socket(s) & "Core(s) per socket" reported by lscpu command. (BZ#2112820)
* Panic in ch_release() due to NULL ch->device pointer, backport upstream fix (BZ#2115965)
* pyverbs-tests fail over qede IW HCAs on "test_query_rc_qp" (tests.test_qp.QPTest) (BZ#2119122)
* qedi shutdown handler hangs upon reboot (BZ#2119847)
* cache link_info for ethtool (BZ#2120197)
* Important iavf bug fixes (BZ#2120225)
* Hibernate crash with Aquantia 2.5/5 Gb LAN card (BZ#2124966)
* While using PTimekeeper the qede driver produces excessive log messages (BZ#2125477)
* general protection fault handling rpc_xprt.timer (BZ#2126184)
* Not enough device MSI-X vectors (BZ#2126482)
* Atlantic driver panic on wakeup after hybernate (BZ#2127845)
* Memory leak in vxlan_xmit_one (BZ#2131255)
* Missing hybernate/resume fixes (BZ#2131936)
Enhancement(s):
* Update smartpqi driver to latest upstream Second Set of Patches (BZ#2112354)
* qed/qede/qedr - driver updates to latest upstream (BZ#2120611)
* Update qedi driver to latest upstream (BZ#2120612)
* Update qedf driver to latest upstream (BZ#2120613)
* Include the support for new NVIDIA Mobile GFX GA103 on ADL Gen Laptops (BZ#2127122)
* Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129923)
none-baseos-rpms
bpftool-4.18.0-372.32.1.el8_6.x86_64.rpm
9f1cee51d213d6043c5e92fde4008d1ec7f0f5230b365e3cc2485d791cb90a27
kernel-4.18.0-372.32.1.el8_6.x86_64.rpm
c9d8856e672d68cfedf9fb5b60b398f3e62b70838b8d1751c4c3d8f49e2c32ae
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
3ae344f3c9f6ad791d0f3a6e1abcaa9941a55b3cf80600f486de061558eb6172
kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm
3ae344f3c9f6ad791d0f3a6e1abcaa9941a55b3cf80600f486de061558eb6172
kernel-core-4.18.0-372.32.1.el8_6.x86_64.rpm
5ef9248a42ebd38b9340286a1c8092996cc4b99461b68b388c268b8970fec08a
kernel-cross-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
e72b814f8b559326c4d4bdb88d30e1cf93bf860f8fbbb9390abfcd572e4b8314
kernel-debug-4.18.0-372.32.1.el8_6.x86_64.rpm
b8c84359c21a71f1bf8a6d053cd63917da3e461c41640d92dc7a5766227384b5
kernel-debug-core-4.18.0-372.32.1.el8_6.x86_64.rpm
6f919d366469b4495fe865ee14edf4d60824133de5e937be5038b0db6c36a0b4
kernel-debug-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
5584ad0dd3eeec8b1543c6b6d0d4c4d391baf68713f5429111deee800fb20047
kernel-debuginfo-common-x86_64-4.18.0-372.32.1.el8_6.x86_64.rpm
94f3964148ce99c74c876cd71cd5b3f3c02e0c690f7c6ecca2e71a557cd86dfa
kernel-debug-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
2dc710995b1003f09e7a661210e4afa66700c62210a810fa6c34575e89defa2a
kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
8c7b5f5dfe58b72d8229a35833aa4b0232bb0788a1484a1c13aa7000addc1ace
kernel-devel-4.18.0-372.32.1.el8_6.x86_64.rpm
befd61e904a3e98765b2b46215915476bbb033489dccb657fd35c09ce55572e6
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
2b05e4c5decb4e624aa0f39ace257684ada8f9cee1306f4d98f36c4aea75b54f
kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm
2b05e4c5decb4e624aa0f39ace257684ada8f9cee1306f4d98f36c4aea75b54f
kernel-headers-4.18.0-372.32.1.el8_6.x86_64.rpm
d623840c4d68167740fd4af1530d108ac98e5731c14086ad6ca1fee3ceaf2cc5
kernel-modules-4.18.0-372.32.1.el8_6.x86_64.rpm
29614ad257996c04d090209d007955c2c9d74604a4e2a12bd98e1f82955b656e
kernel-modules-extra-4.18.0-372.32.1.el8_6.x86_64.rpm
829a5a022a697ed5fad1b2d1980adf0c5f1a016873934718832bee5f555880c4
kernel-tools-4.18.0-372.32.1.el8_6.x86_64.rpm
3771c6402af942796b6583bfd8e7dc30b4e188d00abed5a1dd0dfdeadb45d77d
kernel-tools-libs-4.18.0-372.32.1.el8_6.x86_64.rpm
5e855e6881b7c1e8a80c4b516859aa263bc1f222d8896c0da4e890be0a42ed46
perf-4.18.0-372.32.1.el8_6.x86_64.rpm
34d3ed2a10406df8c220d36b606fe46da0af5189b2f8852af00d17af20d82d2a
python3-perf-4.18.0-372.32.1.el8_6.x86_64.rpm
9b3afc90d5f215d4de8b17c6bf96e8d7deda96129dc27fc873d092d3e21bb160
RLBA-2022:7112
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* vdsm plugin does not collect LVM information of RHV SDs if the host uses LVM devices. (BZ#2121774)
* Default plugin timeout doesn't works if block devices count up to 10K. (BZ#2125656)
* Add convert2Rocky Linux archived log collection. (BZ#2129105)
none-baseos-rpms
sos-4.2-22.el8_6.noarch.rpm
442a91a0c6e9911fd6969290216e2bc27fee26f5a49ed6d83a4b57a1ce1bb4ff
sos-4.2-22.el8_6.noarch.rpm
442a91a0c6e9911fd6969290216e2bc27fee26f5a49ed6d83a4b57a1ce1bb4ff
sos-audit-4.2-22.el8_6.noarch.rpm
9fe20eb5e1e34f4a2dca155f29116bdf601524099bd39b175d6fdb9c16e60301
sos-audit-4.2-22.el8_6.noarch.rpm
9fe20eb5e1e34f4a2dca155f29116bdf601524099bd39b175d6fdb9c16e60301
RLBA-2022:7113
cockpit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.
Bug Fix(es) and Enhancement(s):
* Login fails with "This web browser is too old" with upcoming Firefox and Chromium browsers (BZ#2129055)
* Cockpit locking out users with strict password policies (BZ#2129058)
none-baseos-rpms
cockpit-264.2-1.el8_6.x86_64.rpm
acabe0cbd49db69966207a681d3f9832622ee742d168b686cb0b33cd187ab5ff
cockpit-bridge-264.2-1.el8_6.x86_64.rpm
2b5449a753fa79268ec6594ac39a3159aa2febb999f3ae13c6cbec52beb00c00
cockpit-doc-264.2-1.el8_6.noarch.rpm
df1b868886f1c8b708ee9a322ce20659d1c0542272f73995f8a617910cbca1b9
cockpit-doc-264.2-1.el8_6.noarch.rpm
df1b868886f1c8b708ee9a322ce20659d1c0542272f73995f8a617910cbca1b9
cockpit-system-264.2-1.el8_6.noarch.rpm
238228edf42e2ad0636ceb84f9249583e1e16413a1c1d2f18846c2238233adc3
cockpit-system-264.2-1.el8_6.noarch.rpm
238228edf42e2ad0636ceb84f9249583e1e16413a1c1d2f18846c2238233adc3
cockpit-ws-264.2-1.el8_6.x86_64.rpm
c13f4b7d68d8b50f87452402d00efdd70aebcd9197159d8682556adf3cba6a52
RLBA-2022:7114
systemd update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es) and Enhancement(s):
* longer mount points cause systemd invalid argument messages (BZ#2094712)
* systemd path unit fails when triggered unit conditions not met (BZ#2123801)
* ShutdownWatchdogSec value is not taken into account on reboot (BZ#2127171)
none-baseos-rpms
systemd-239-58.el8_6.8.i686.rpm
16e0c6a64cb1940810603c93a526cd32def8504d463e208976f861345c0e0f72
systemd-239-58.el8_6.8.x86_64.rpm
931613b2fef6661f014e19d337660f203f6725e4789c9de35290757fb53b712d
systemd-container-239-58.el8_6.8.i686.rpm
b88096de516c6794db315649ef00336dab403d87e61ff17cf394d3d79ed43dbc
systemd-container-239-58.el8_6.8.x86_64.rpm
171467f87846d5c7038dd49b247499d8d71beb3915e01660345c128eb31e7a89
systemd-devel-239-58.el8_6.8.i686.rpm
227de99c73042a9fc1ae0f0a4960e2f66a66504bdd4b2b334926676c082389b7
systemd-devel-239-58.el8_6.8.x86_64.rpm
6f12b4ed3731dd1fc05295f53c99356f744c5403ccfc03af3dac60389ef4baeb
systemd-journal-remote-239-58.el8_6.8.x86_64.rpm
7c59a324ba1f28bb486a047ae8c05ac73ae126d20e8b57768e696b559377076d
systemd-libs-239-58.el8_6.8.i686.rpm
11b805a38e46e2cea7238d499ca99f29184640facd280fcdb1cd12b00fb24727
systemd-libs-239-58.el8_6.8.x86_64.rpm
a87a3e13a5b3bef5b0a72d8ffc373f22fe1ec794291696508a1f49bffa579dd3
systemd-pam-239-58.el8_6.8.x86_64.rpm
cea35adfb1fd42dcd66d1e663d79389d9a8c4a16499855e1d3e916f895a7a78b
systemd-tests-239-58.el8_6.8.x86_64.rpm
b79aa75b1fba790bd786ce497d1207c32e26a773bcb26b43ec12e678303dbab7
systemd-udev-239-58.el8_6.8.x86_64.rpm
084ebadfd1575185a542dcc9e018b979ce83effaa65f44c2df47039287f55d02
RLSA-2022:7192
Important: device-mapper-multipath security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices.
Security Fix(es):
* device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
device-mapper-multipath-0.8.4-22.el8_6.2.x86_64.rpm
1f570a657a5b4b47415fafdf5f4ca69acdde8a6089ff072323f73732ddd44a00
device-mapper-multipath-libs-0.8.4-22.el8_6.2.i686.rpm
81e59824cde5da3a81519cb81eb4203c95470680b6cdf107a527e602af6b2965
device-mapper-multipath-libs-0.8.4-22.el8_6.2.x86_64.rpm
ba892b8e5514aa8d9b37291d30163f923899f0720450f5bafd92cde20bc94c44
kpartx-0.8.4-22.el8_6.2.x86_64.rpm
62fd8712ac8f47aaaf47989ff7efa10702613f34b5b83c25771ab8bd5867123e
libdmmp-0.8.4-22.el8_6.2.i686.rpm
5e46209dd24963650f9680a6dc8c3e221b32f04fbfcab5c73a0d48b5ba145a5f
libdmmp-0.8.4-22.el8_6.2.x86_64.rpm
e0bdc6a428e7ea56926d115d286559a51cc6e234addc192d5343d93fd4334d52
RLEA-2022:7690
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
tzdata-2022d-1.el8.noarch.rpm
6680de16e81ad6c87c848c5b04ee5b342503f1c7267cebc662d19dc5ec6c99f1
tzdata-2022d-1.el8.noarch.rpm
6680de16e81ad6c87c848c5b04ee5b342503f1c7267cebc662d19dc5ec6c99f1
RLBA-2022:7824
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022e, which addresses recent time zone changes. Notably:
* Jordan and Syria cancelled the daylight saving time (DST) transition planned for October 28 2022 and will remain at time offset of +03:00 from the coordinated universal time (UTC) permanently.
none-baseos-rpms
tzdata-2022e-1.el8.noarch.rpm
553f0c1bf2c66a9fb1567c723f9d48c1f10b842aec6927c4e04757bba20f888c
tzdata-2022e-1.el8.noarch.rpm
553f0c1bf2c66a9fb1567c723f9d48c1f10b842aec6927c4e04757bba20f888c
RLBA-2020:4499
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for network-manager-applet.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
jimtcl-0.77-6.el8.1.x86_64.rpm
9425d08b19cba3fe5a237fa7eb581debd4858414fbd4d1e722f6575cbd957caa
jimtcl-0.77-6.el8.1.i686.rpm
fb8cf177be0c91d9f2cfbfe96eb0f3044069f0a5dc3fcc83440abb56995ef6ed
RLBA-2019:1957
python3 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756)
none-baseos-rpms
platform-python-3.6.8-48.el8_7.rocky.0.x86_64.rpm
61e1bb3936eb62653e41f51499554d594a3891078c16238f92f0a17ff119cd53
python3-libs-3.6.8-48.el8_7.rocky.0.i686.rpm
3ae63d223aa8ab3bf21b24e2f41e717af32c70a460db29447718dbdf6a89d9d5
python3-libs-3.6.8-48.el8_7.rocky.0.x86_64.rpm
f915967824e987568d9f023811caa9c4790487160a362438e9748f9bb5016531
python3-test-3.6.8-48.el8_7.rocky.0.x86_64.rpm
e278462c08b9ad22433a1af437384c718821f2f060aeecec9123c7a3346a1a7a
RLBA-2019:3596
hwdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
hwdata-0.314-8.14.el8.noarch.rpm
f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343
hwdata-0.314-8.14.el8.noarch.rpm
f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343
RLBA-2019:3628
xfsprogs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
xfsprogs-5.0.0-10.el8.i686.rpm
5c1bb425fcdb7da47bbe80ae44283c7c117fb09c2e9f03588a82980e1513df03
xfsprogs-5.0.0-10.el8.x86_64.rpm
7388b2eeaff6394491d86ee0437dee3d5bafba18a1c8a16746fe0fbedfa044a7
xfsprogs-devel-5.0.0-10.el8.i686.rpm
c56e186eae1ef51decf70f4463a71daf83652d3d4d49444ec18388ac96c4e5f5
xfsprogs-devel-5.0.0-10.el8.x86_64.rpm
cbdba1a641ea361706fd28907e65cf4b332ab79c9e42ebae3f4b3a1e1b29deb0
RLBA-2020:4435
abrt bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gnome-abrt, abrt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
libreport-filesystem-2.9.5-15.el8.rocky.6.3.x86_64.rpm
cc21df056d6c76f8b9e583b2de81e63f00203365ba633c9491666603a23920cd
RLEA-2020:4552
atlas bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for atlas.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Enterprise Software Foundation
Enterprise Linux 8.3 Release Notes linked from the References section.
none-baseos-rpms
atlas-3.10.3-8.el8.1.i686.rpm
68d96d3a9a03d9ae89b2165f0644fcfad619eaf9bce70af6d80d134c601fbee9
atlas-3.10.3-8.el8.1.x86_64.rpm
0174e214cab14f4afd0b932a736cc085660ef302d6509d6b33b9f7fa78c5dbaf
atlas-corei2-3.10.3-8.el8.1.x86_64.rpm
5f5209bbeea5dddd8354fc5ddf8464c2026dcc3c5fbc833fbd1dd7b993a638aa
atlas-corei2-devel-3.10.3-8.el8.1.x86_64.rpm
8fc720a1f0b8a1ca54fe5ba31c19c8ad8915ebe828375d68441a3cd53265d7b6
atlas-devel-3.10.3-8.el8.1.i686.rpm
c29dc4cd502da8fd89ce6b9c169b9512290353e7c25ea96f559e7d7cfcc21329
atlas-devel-3.10.3-8.el8.1.x86_64.rpm
cfe93542853ac688548b90523511264c84e7c7fcd49831b3f7d9e724a2aeab89
RLEA-2020:5587
new package: kmod-redhat-oracleasm
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-redhat-oracleasm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library.
The kernel modules delivered in this erratum have been made available as part of
the Rocky Enterprise Software Foundation Driver Update Program. This program provides updated kernel modules
that add support for selected devices in advance of the next Rocky Enterprise Software Foundation Enterprise
Linux minor release. We strongly recommend that these kernel modules are only
used to enable specific hardware, mentioned in this erratum. Partners and
customers should continue using the driver that is shipped in the latest Rocky Linux
kernel for all other devices that require this driver.
none-baseos-rpms
kmod-redhat-oracleasm-2.0.8-15.el8.x86_64.rpm
44ac298ff3dec860dfc4aec171bcc9773a2e7ccbd205eb52988df8242d048bda
RLBA-2022:0315
glusterfs bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glusterfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
Bug fix(es):
* Previously, granular entry self heal took more time than the full entry self heal when there were many entry self heals pending due to the creation and deletion heavy workloads. With this update, the extra lookup to delete the stale index is removed from the code path of the granular entry self heal, which improves the heal performance in the creation and deletion heavy workloads when the granular entry self heal is enabled. (BZ#1994593)
Users of glusterfs with Rocky Enterprise Software Foundation Gluster Storage are advised to upgrade to these updated packages.
none-baseos-rpms
glusterfs-6.0-61.3.el8.x86_64.rpm
7b4395ba08f669c0ea9647e26b8c88e845d2f2f31fdb8179f56c21da74fe747d
glusterfs-client-xlators-6.0-61.3.el8.x86_64.rpm
a85ff13669cc25ec58dfcda4a781c07ad781e68417182f9e9e7ab0edacb88793
glusterfs-fuse-6.0-61.3.el8.x86_64.rpm
706dccc4571910a954ea3d8dd10eee3a6ca07d4053269d54059d26a7cf72afc1
glusterfs-libs-6.0-61.3.el8.x86_64.rpm
1927c8a597133b446f0e3045d0afd5d190378254c3a6c723c4c467c4f0ffb93f
glusterfs-rdma-6.0-61.3.el8.x86_64.rpm
826edb740bc7ce2a2e531b04ca586d8be47ec0ec1968b8e43ca97a849e3b4746
RLBA-2022:2006
python-pip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.
none-baseos-rpms
platform-python-pip-9.0.3-22.el8.rocky.0.noarch.rpm
4dc82e21beb0c285c4a765dfe48f5df6d8ee15c38bb4d0cda37cc826a2c7e951
platform-python-pip-9.0.3-22.el8.rocky.0.noarch.rpm
4dc82e21beb0c285c4a765dfe48f5df6d8ee15c38bb4d0cda37cc826a2c7e951
python3-pip-wheel-9.0.3-22.el8.rocky.0.noarch.rpm
b2beb19f4cc4a7865bcc4394b24994f53c675d14865ad39bcf2bcb3ca67a2ad1
python3-pip-wheel-9.0.3-22.el8.rocky.0.noarch.rpm
b2beb19f4cc4a7865bcc4394b24994f53c675d14865ad39bcf2bcb3ca67a2ad1
RLBA-2022:7726
grub2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
grub2-common-2.02-142.el8.rocky.0.2.noarch.rpm
6175338b02c00922aae1c9241c84ea5c71cd59bb24bec6dd84981f9f6143f9e6
grub2-common-2.02-142.el8.rocky.0.2.noarch.rpm
6175338b02c00922aae1c9241c84ea5c71cd59bb24bec6dd84981f9f6143f9e6
grub2-efi-aa64-modules-2.02-142.el8.rocky.0.2.noarch.rpm
3963bf6faa29aaea861bc1a256d0423698ba885faee100d9dc9b6037dc296a75
grub2-efi-aa64-modules-2.02-142.el8.rocky.0.2.noarch.rpm
3963bf6faa29aaea861bc1a256d0423698ba885faee100d9dc9b6037dc296a75
grub2-efi-ia32-2.02-142.el8.rocky.0.2.x86_64.rpm
4ffa66853d75fa0d08da238d56a41e3b031823a2aefad3d2cf5f34aa3aef184e
grub2-efi-ia32-cdboot-2.02-142.el8.rocky.0.2.x86_64.rpm
1e9d6116e83e8ff9c9c7c4d49bb4d0a79db15cc3a933dd9f25a05d310e61c6ab
grub2-efi-ia32-modules-2.02-142.el8.rocky.0.2.noarch.rpm
b986ac569ebe723ae5bab0de5a3779a30f27752791db7cedcf71be257016768c
grub2-efi-ia32-modules-2.02-142.el8.rocky.0.2.noarch.rpm
b986ac569ebe723ae5bab0de5a3779a30f27752791db7cedcf71be257016768c
grub2-efi-x64-2.02-142.el8.rocky.0.2.x86_64.rpm
92d1b8fb83f820c58f5aab4c1ad3fef4bf7a8e9b91176121e15dfc4902293c32
grub2-efi-x64-cdboot-2.02-142.el8.rocky.0.2.x86_64.rpm
6b3c53665f157e46cbcc0f55065dbe3bc3b0eb86c48674373252a75b8ae8696a
grub2-efi-x64-modules-2.02-142.el8.rocky.0.2.noarch.rpm
0a51865aec1df2804e25f67978bbdd93278cd4f94641afe8304e0c948373d025
grub2-efi-x64-modules-2.02-142.el8.rocky.0.2.noarch.rpm
0a51865aec1df2804e25f67978bbdd93278cd4f94641afe8304e0c948373d025
grub2-pc-2.02-142.el8.rocky.0.2.x86_64.rpm
f95c3537c44601b217002f501bc263fcc38da9ecffa8d2eec3eb0ed8683a70b8
grub2-pc-modules-2.02-142.el8.rocky.0.2.noarch.rpm
c2374cad2069df6c2fbf3fe92b892c9bd04ebab2f8794cd38c2827b3b9c71ce6
grub2-pc-modules-2.02-142.el8.rocky.0.2.noarch.rpm
c2374cad2069df6c2fbf3fe92b892c9bd04ebab2f8794cd38c2827b3b9c71ce6
grub2-tools-2.02-142.el8.rocky.0.2.x86_64.rpm
57efaa38fa859bb8a51b688816d16ae1dd22f4dcdd051389a9132abf6e15e7be
grub2-tools-efi-2.02-142.el8.rocky.0.2.x86_64.rpm
1f3c1ed1644056fba727a2e4a58521879a0ce0c319181bf804e817e6409e5409
grub2-tools-extra-2.02-142.el8.rocky.0.2.x86_64.rpm
f60e420795a561dfeff8e0187d0f439f79a1266c790699caa0bf02db728152dd
grub2-tools-minimal-2.02-142.el8.rocky.0.2.x86_64.rpm
0aa50f6861020636fedae52d4df78b779d531775a30f64cb1259dd7f17fcc836
RLBA-2022:7739
sssd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
libipa_hbac-2.7.3-4.el8_7.1.i686.rpm
c49457eeaf2f024f73c50caceccf5b6d0142150439233fc0674d283ed3188a53
libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm
2b0a25c49789fba2c51fd9ec52452072f2e540dd9d7e108d85926da97fe53a68
libsss_autofs-2.7.3-4.el8_7.1.x86_64.rpm
9315acfb31602e68f3108bbcf3ae1ce2284754d71999f0ccce2f030da526cfaf
libsss_certmap-2.7.3-4.el8_7.1.i686.rpm
a774330de9fdae77fa86ddf3f43a8691cdc99b46442b63ff48c354f2a3406dd8
libsss_certmap-2.7.3-4.el8_7.1.x86_64.rpm
ef2188a436ca5e742b9c7ff1bb048ed51970131b1b1dd15ba66a8a6ddb50ee6d
libsss_idmap-2.7.3-4.el8_7.1.i686.rpm
28b8b855fe34bca01d7d4d26009343df7ee7e31f6ca1913f9a05971071ed69fd
libsss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
2a5b2632a44438e860792c637b000391aa266103fce05495b7b415845565c8a0
libsss_nss_idmap-2.7.3-4.el8_7.1.i686.rpm
ce71a66eb390dcf52630e60fd152db59a64e538f1062faf7b5ce6127eda12538
libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
d56c119593e8255294782593a8752917121626d8f451d239a41ccd79238e01da
libsss_simpleifp-2.7.3-4.el8_7.1.i686.rpm
81b0d7687b7d35c9c568ffc901884ec82d7428a58e16e690d92559e48885cb3b
libsss_simpleifp-2.7.3-4.el8_7.1.x86_64.rpm
1c961919f1a87b3314da8e29abbf24be253b6209946abd4570ff308f891f6ae0
libsss_sudo-2.7.3-4.el8_7.1.x86_64.rpm
8002f4af2b3014313e0e8b0be0e367a5870d8ff2662a86d55644c1cefbf18c45
python3-libipa_hbac-2.7.3-4.el8_7.1.x86_64.rpm
662f05c80a436c05eb93c64af5ec17a4cb40c5170887068289b4cac306d7b7fb
python3-libsss_nss_idmap-2.7.3-4.el8_7.1.x86_64.rpm
41b7414c44d384931919f598d0dccc3ebd3f354719f3394079255a88adc3561d
python3-sss-2.7.3-4.el8_7.1.x86_64.rpm
42f321023b133a14290644eeb23c93ecab5d51b3e59570d8b8162607b04ab085
python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm
6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c
python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm
6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c
python3-sss-murmur-2.7.3-4.el8_7.1.x86_64.rpm
01c7c36729533d921205ff7f39245aff781db0b5475fb4e672785819b9328bc2
sssd-2.7.3-4.el8_7.1.x86_64.rpm
5051d53ac5df96df4062b8004780b3134a770263c4add8e41a6361eaa7324e02
sssd-ad-2.7.3-4.el8_7.1.x86_64.rpm
d82edf19f57c16e16acb145dc7d29e65dd96d4921d7972903ae96bb5ce83f956
sssd-client-2.7.3-4.el8_7.1.i686.rpm
f81d34ec79b26872290694ddb65b6b1927f8f1957f9c9c40d0b857d5f8b464bc
sssd-client-2.7.3-4.el8_7.1.x86_64.rpm
ab6de7cd139f88513de8ca2f01db4017c8428fa663cc899f7252de8348206c8d
sssd-common-2.7.3-4.el8_7.1.x86_64.rpm
079034e36153d700d1373ad5c6d5936fe07c89cca587d2c2e04401bc7ad5954a
sssd-common-pac-2.7.3-4.el8_7.1.x86_64.rpm
70d338dfcf7642581fe77829964f801ace4dcb18559f3f714f01f61b313a000f
sssd-dbus-2.7.3-4.el8_7.1.x86_64.rpm
b4ca2da01eed9e540352acec3c3e8303ed6b8f90585935bc7205cf1612e8d733
sssd-ipa-2.7.3-4.el8_7.1.x86_64.rpm
a35fb89b88eabb04e165a074adffcc6114aec1c7ae9d85841ef31be1f0c9df83
sssd-kcm-2.7.3-4.el8_7.1.x86_64.rpm
2c2087677022939f952339173ec3f8f231ee56703df47518ccbaf46fd9f3baa7
sssd-krb5-2.7.3-4.el8_7.1.x86_64.rpm
cee94b872835bab3b869702f8e33ea8021415d5f85a4fdc04dd707f84341cbfe
sssd-krb5-common-2.7.3-4.el8_7.1.x86_64.rpm
71440d5c7e8f05e82c5c7fd3ee1bcf18d62670d9512d1b427fc2f10ef02d1e68
sssd-ldap-2.7.3-4.el8_7.1.x86_64.rpm
5112e64c8840bdaa795497a68b734439e12872ec5dbf16e0f0ab905268e1f6f6
sssd-nfs-idmap-2.7.3-4.el8_7.1.x86_64.rpm
ae8eb40f7de0b69aa91ae2b3d2e5168d426cbfbbd9ca97809ffc4c02b9ddd862
sssd-polkit-rules-2.7.3-4.el8_7.1.x86_64.rpm
8ead8ea9bf4c7f89adf140b89a890ee59744b626e06e58a9b5c9a27fb1ec88e1
sssd-proxy-2.7.3-4.el8_7.1.x86_64.rpm
80bf29198a06a20202a7b2cde28f75f0057fdb5825e552e7db07a52e6ececf17
sssd-tools-2.7.3-4.el8_7.1.x86_64.rpm
ea27ca6015d9115cd01c78560d6b36db6daf4338aeaf74879d704c5a93da1bae
sssd-winbind-idmap-2.7.3-4.el8_7.1.x86_64.rpm
885103316f6ef9796189d9b294a9db757c6a52dde27ba7fecb7d249ea889453b
RLBA-2022:7766
fwupd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
fwupd-1.7.8-1.el8.rocky.0.3.x86_64.rpm
0c9d197889ff8ef892c9764b459068350e40530311d1015a3b13ccd00d56febb
RLBA-2022:7784
chrony bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chrony.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
chrony-4.2-1.el8.rocky.0.1.x86_64.rpm
729f342794c6e5edd6229221abbd6bf3315491603a5715758df9bcac9272f9c6
RLSA-2022:7790
Moderate: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.
none-baseos-rpms
bind-export-devel-9.11.36-5.el8_7.2.i686.rpm
098df3bd3e982251717e78395d7eedf407ce5d93c81056e00f6520462625d963
bind-export-devel-9.11.36-5.el8_7.2.x86_64.rpm
9e7f239d97615ce9f2a312f081ef94b3e9ba9c9e4f987d22e298491506c0061c
bind-export-libs-9.11.36-5.el8_7.2.i686.rpm
e1f5a24c71de3711cb934478f7ee46e611311b86d214737249afc5a9be744cd2
bind-export-libs-9.11.36-5.el8_7.2.x86_64.rpm
35e6cd12f9d803bb60cfd7bf8a44ba73b8d0117432801d097d5851011ecd822a
RLBA-2022:7832
python3 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages.
Bug Fix(es) and Enhancement(s):
* python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436)
none-baseos-rpms
platform-python-3.6.8-48.el8_7.rocky.0.x86_64.rpm
61e1bb3936eb62653e41f51499554d594a3891078c16238f92f0a17ff119cd53
python3-libs-3.6.8-48.el8_7.rocky.0.i686.rpm
3ae63d223aa8ab3bf21b24e2f41e717af32c70a460db29447718dbdf6a89d9d5
python3-libs-3.6.8-48.el8_7.rocky.0.x86_64.rpm
f915967824e987568d9f023811caa9c4790487160a362438e9748f9bb5016531
python3-test-3.6.8-48.el8_7.rocky.0.x86_64.rpm
e278462c08b9ad22433a1af437384c718821f2f060aeecec9123c7a3346a1a7a
RLSA-2023:0049
Moderate: grub2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)
* grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
grub2-common-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
5b88d6f55060a730cf0f5b8688ae26c8eff68c853c842247a090d6e81c50a4b9
grub2-common-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
5b88d6f55060a730cf0f5b8688ae26c8eff68c853c842247a090d6e81c50a4b9
grub2-efi-aa64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
4f09a4d990d333e3265c18b4c0a5158e47d639596d85deecfd57a2abb8f5e31b
grub2-efi-aa64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
4f09a4d990d333e3265c18b4c0a5158e47d639596d85deecfd57a2abb8f5e31b
grub2-efi-ia32-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
5a1a04d6023f891035ec564e221f7d40cbb892f689b78d0d89bf1ef2432e8b52
grub2-efi-ia32-cdboot-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
9563d13dc10fb2721ffe79c5885629ab702aef3f38c9756f114d2e552c66132b
grub2-efi-ia32-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
defdae03ca69e0522d87a043586cf9d9935f951cb0e0ef419eaa2754992664e9
grub2-efi-ia32-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
defdae03ca69e0522d87a043586cf9d9935f951cb0e0ef419eaa2754992664e9
grub2-efi-x64-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
14512f77d67ac227ad3f707d924c50c4e15c65ee39292e01443e5c3c5bfd2dcd
grub2-efi-x64-cdboot-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
baaf19e256d5588739381e23c2907448b232b271cc8611c09f9a4244be1acd26
grub2-efi-x64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
96dbda0fb20996d949e00180be8c7abbb3d43e8ad2e6baf5ae0f80a16ef0aceb
grub2-efi-x64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
96dbda0fb20996d949e00180be8c7abbb3d43e8ad2e6baf5ae0f80a16ef0aceb
grub2-pc-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
96a1084510860d5ab4f67d65b7cc51db2dfd9d49d706c65b49ff3844d705a562
grub2-pc-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
ded04f98279737ee20b5f99c735b31ab66168490b763fff0d3670e8af01243da
grub2-pc-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm
ded04f98279737ee20b5f99c735b31ab66168490b763fff0d3670e8af01243da
grub2-tools-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
b0829b4f8a74457265f11cacecb25673bb0a5260d3154632c7cc58d5e4aafe89
grub2-tools-efi-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
58a681f3c7846c5402f870260b0afb756ec051f7896ca0e44f4d788a06ce90c3
grub2-tools-extra-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
b4209dcdb8a57e6e3d0d76fd3f84d7fa8cc10e1c49b8927e79650b4ff15db705
grub2-tools-minimal-2.02-142.el8_7.1.rocky.0.2.x86_64.rpm
34e839cf72b78f2bef2a1a9bf867b94eb11b2b0006f21cb0181cb3c2bb15238f
RLSA-2023:0625
Important: libksba security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libksba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.
Security Fix(es):
* libksba: integer overflow to code executiona (CVE-2022-47629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libksba-1.3.5-9.el8_7.i686.rpm
5517115ee0b784bff914a4c6e78411cfd0c5597b9bb2546429409ba5e2b04103
libksba-1.3.5-9.el8_7.x86_64.rpm
13b0d50a82d975654e0a1a83b81b33380ba77f84763885674de4bed7a4631ebd
RLBA-2023:0658
kmod-redhat-oracleasm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-redhat-oracleasm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kmod-redhat-oracleasm package contains the kernel driver backing the Generic Linux ASM Library.
Bug Fix(es) and Enhancement(s):
* Rebuild kmod-redhat-oracleasm against kernel version 4.18.0-425.10.1.el8_7 (BZ#2155759)
none-baseos-rpms
kmod-redhat-oracleasm-2.0.8-15.1.el8_7.x86_64.rpm
ea1058a1f05e8818d54a0ce3cf8b849760a242481f88b3e2c4c6f7f3e9a93891
kmod-redhat-oracleasm-kernel_4_18_0_425_10_1-2.0.8-15.1.el8_7.x86_64.rpm
76860217265725d828a4d399ba2825387472ff7bbdc04f9f3e94ac51d674626c
kmod-redhat-oracleasm-kernel_4_18_0_425_3_1-2.0.8-15.1.el8_7.x86_64.rpm
68272f11899af1eab903d3f733890ecc610f742ffc67166432c667182568ab13
RLBA-2023:0830
iptables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es) and Enhancement(s):
* Rocky Linux8.6 Packet drop in ebtables (BZ#2144922)
none-baseos-rpms
iptables-1.8.4-23.el8_7.1.i686.rpm
1a6c9de64fffc498d1830b3830e83fb173325d62dd0c9aae73a6be758b550652
iptables-1.8.4-23.el8_7.1.x86_64.rpm
97d31943ea173ebb9fa2b5389f246c4ea66ee007b6f997e0721a35f1b695f3a9
iptables-arptables-1.8.4-23.el8_7.1.x86_64.rpm
3f9b7a6f683a0fd775de7206283bdc38051fe5b7f85a54d87518d791dc4076df
iptables-devel-1.8.4-23.el8_7.1.i686.rpm
fc3aaa0436c587f0ffe01a5e744c2a01eec5bd551f84e4602e5982d399382d71
iptables-devel-1.8.4-23.el8_7.1.x86_64.rpm
9700ec49f7c06cca19941362b3c140259d303c91b91f442f9ed8076ae7602d1d
iptables-ebtables-1.8.4-23.el8_7.1.x86_64.rpm
073d34183b084194b6871db214b730af3ae7fa1bb69a32ee85b034c76051dc5e
iptables-libs-1.8.4-23.el8_7.1.i686.rpm
50bc0dab18d90dac9c6d9cd0c449d9f0e8c8b9e0c43530e042faf2929520116a
iptables-libs-1.8.4-23.el8_7.1.x86_64.rpm
be1946a383469ae5dc437589d216eea4f85842c9511ab9ab366b3a0b7c928d29
iptables-services-1.8.4-23.el8_7.1.x86_64.rpm
5ed063733d02daf590448d770d6ea0b6eb77cf9dffb6cd70c7e424e61a270c0c
iptables-utils-1.8.4-23.el8_7.1.x86_64.rpm
4e9871505d38d5c6d710d82ba0797a8d060e11a9e803022d38f64919afe9e901
RLBA-2023:0831
nfs-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nfs-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs.
Bug Fix(es) and Enhancement(s):
* Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899)
none-baseos-rpms
libnfsidmap-2.3.3-57.el8_7.1.i686.rpm
3aff67f96d3bad39eb10812fc51226cf0a380e15a8c756ea2d97c1ea85f97fd2
libnfsidmap-2.3.3-57.el8_7.1.x86_64.rpm
da85dfd1afa352bb9695310801b0b0ebd06bc6d8689c6ad3ad2da9b7ebe2c2ae
nfs-utils-2.3.3-57.el8_7.1.x86_64.rpm
b0979c15176774f349a8730d476ed50908d1e1b3211ddfce8e9a7fa661515a68
RLSA-2023:0832
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586)
* Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592)
* Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580)
* MEI support for Alder Lake-S (BZ#2141783)
* Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959)
* Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287)
* Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474)
* i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745)
* Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530)
* error 524 from seccomp(2) when trying to load filter (BZ#2152138)
* Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734)
* Connectivity issue with vDPA driver (BZ#2152912)
* High Load average due to cfs cpu throttling (BZ#2153108)
* The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230)
* Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653)
* kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460)
* Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272)
* Azure: VM Deployment Failures Patch Request (BZ#2155280)
* Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289)
* MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437)
* GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797)
* Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905)
* Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922)
* The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813)
* ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182)
* (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221)
* i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460)
* iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257)
none-baseos-rpms
bpftool-4.18.0-425.13.1.el8_7.x86_64.rpm
5a567569cedf4f7c6ea2e588487dc37c9c6f30a05b8bcca45da740c569b712ab
kernel-4.18.0-425.13.1.el8_7.x86_64.rpm
d4295895806bdc8fe95e5c95e7d9bab99bb044b9583b12d6373f50cfc7eb179c
kernel-abi-stablelists-4.18.0-425.13.1.el8_7.noarch.rpm
112fd585aeb8f69a65d5191dfb7710c00a2fa0818413eb730a52c519c9e798a6
kernel-abi-stablelists-4.18.0-425.13.1.el8_7.noarch.rpm
112fd585aeb8f69a65d5191dfb7710c00a2fa0818413eb730a52c519c9e798a6
kernel-core-4.18.0-425.13.1.el8_7.x86_64.rpm
6949643abed2c947735dffd559b972648fb2bdbc642a6bdcc7ef0f65e6b1895b
kernel-cross-headers-4.18.0-425.13.1.el8_7.x86_64.rpm
dbbd9d450eb4159387e8cdc7158a1005253732ec5850bf807c50775ebb263e1d
kernel-debug-4.18.0-425.13.1.el8_7.x86_64.rpm
bfed537ae29f64d93799ac20dc41198b707801f7f172e9cdd03179c33f712d8d
kernel-debug-core-4.18.0-425.13.1.el8_7.x86_64.rpm
b437d5e3e404ad466d8b63d0b57fdf27ed399ef995fc523585988cda3342b6d5
kernel-debug-devel-4.18.0-425.13.1.el8_7.x86_64.rpm
8e9e17c769a7577eed7207f3fa435c490b89796ce1234d9a8588dac48afb1420
kernel-debuginfo-common-x86_64-4.18.0-425.13.1.el8_7.x86_64.rpm
61abd26b67195663011c739beb2b224534a31d23eeb6b7cbde9b2c7b0aadf016
kernel-debug-modules-4.18.0-425.13.1.el8_7.x86_64.rpm
1b85f82a3b8c641695adf265030b153e0bb6692d51b93849cee1fb5bab912755
kernel-debug-modules-extra-4.18.0-425.13.1.el8_7.x86_64.rpm
308d75e14bf95409855d9f55d2ca96c33462a6048c363e6aa5ff105ba582b6eb
kernel-devel-4.18.0-425.13.1.el8_7.x86_64.rpm
21d5e8a2600b7fafcf68f8ffe6abacac9e110f6be8420b3af7270e106060ec83
kernel-doc-4.18.0-425.13.1.el8_7.noarch.rpm
d29d0316ba11bbbfb22ebf404f6aa18c7d6f67d1cb3d705b22918ebbe1e272a6
kernel-doc-4.18.0-425.13.1.el8_7.noarch.rpm
d29d0316ba11bbbfb22ebf404f6aa18c7d6f67d1cb3d705b22918ebbe1e272a6
kernel-headers-4.18.0-425.13.1.el8_7.x86_64.rpm
f72590eca43e899d3f62328eacaefc5e591a56c2a44fc9e122e16b7ff8661330
kernel-modules-4.18.0-425.13.1.el8_7.x86_64.rpm
9ddb6105eef3fc0d3dfdf76c0bf439327b7e1d6bbdd164cede97732c850329be
kernel-modules-extra-4.18.0-425.13.1.el8_7.x86_64.rpm
537b843f074cab438c0bbbd45825d54c5220dc94ab99b2c97edbc4b81dd7c737
kernel-tools-4.18.0-425.13.1.el8_7.x86_64.rpm
861fcf559d901ad8850fdbb30787c1e61811fea5493502c03b9cffbe2f1f8c7c
kernel-tools-libs-4.18.0-425.13.1.el8_7.x86_64.rpm
fc9d43339480cebd5769caada7387524658fca8a7e4662edafecf27a80510ce1
perf-4.18.0-425.13.1.el8_7.x86_64.rpm
7bb18c9edc571b4841ac5da0a8b9536fad0479bff26efd951b6e821457577400
python3-perf-4.18.0-425.13.1.el8_7.x86_64.rpm
8de4c04d6cece4fe8680c3c5e715486dc54ea723f67d9464d2a8d338aafce1b9
RLSA-2023:0833
Moderate: python3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
* python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861)
* Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
4eaf62a1cfd3e2a3236e34fa66f8f1086cabeb71040021a5ff79dca95f959f91
python3-libs-3.6.8-48.el8_7.1.rocky.0.i686.rpm
7241ae0b8fcd73578f20ac3768fab47642279a95cc73cf3417051a2cbc9afa98
python3-libs-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
c3d965c8baa421e4465ad92be8738482958c4ab55b285acd8db6b4d69fddfa8a
python3-test-3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
15e9d64277e97b66a6c0cf0ac581d985205d9587489b8bc37a25d747b0aa3247
RLBA-2023:0834
kmod-kvdo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage.
Bug Fix(es) and Enhancement(s):
* Rebuild kmod-kvdo against kernel version 4.18.0-425.10.1.el8_7 (BZ#2158783)
none-baseos-rpms
kmod-kvdo-6.2.7.17-88.el8_7.x86_64.rpm
5a80977949d46a8e5085491d43e28ef2d20519883b0ccccc8edc61139de66854
RLSA-2023:0835
Moderate: python-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages.
Security Fix(es):
* pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-setuptools-39.2.0-6.el8_7.1.noarch.rpm
79df645d4964ddd0977ff1df4c6eab07573681474107927e5c1a236a8db7682e
platform-python-setuptools-39.2.0-6.el8_7.1.noarch.rpm
79df645d4964ddd0977ff1df4c6eab07573681474107927e5c1a236a8db7682e
python3-setuptools-39.2.0-6.el8_7.1.noarch.rpm
086432d50e40817e2dc2c45c54f60802f4368f5bde2949757f65804f48c9120b
python3-setuptools-39.2.0-6.el8_7.1.noarch.rpm
086432d50e40817e2dc2c45c54f60802f4368f5bde2949757f65804f48c9120b
python3-setuptools-wheel-39.2.0-6.el8_7.1.noarch.rpm
a088f6171dec158f26bf60f942294f5ec8ba1f30f447f3828ff201b59a87a19e
python3-setuptools-wheel-39.2.0-6.el8_7.1.noarch.rpm
a088f6171dec158f26bf60f942294f5ec8ba1f30f447f3828ff201b59a87a19e
RLBA-2023:0836
OpenSSH bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix(es) and Enhancement(s):
* backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732)
none-baseos-rpms
openssh-8.0p1-17.el8_7.x86_64.rpm
05b6cb94628abfde46a888ff467ff895b72255e318d60b6e56cef934ccc6773c
openssh-cavs-8.0p1-17.el8_7.x86_64.rpm
5ed6a37b7db8503c7bdde856cf49904531d78878e5340e88d43528258d0ba463
openssh-clients-8.0p1-17.el8_7.x86_64.rpm
f99eb73f6f0e5bc0629e3d1a824d3706841ae98dbcff2b169e6b54b076b6db2e
openssh-keycat-8.0p1-17.el8_7.x86_64.rpm
c40243ec966f1e1bf36aa5f8d1529fbc8e6b64c70058f86c082fa45c54850079
openssh-ldap-8.0p1-17.el8_7.x86_64.rpm
594f3959565141e894a3dae7ad4a4d409e475c7bc4dc5c3ed786978c21994fc3
openssh-server-8.0p1-17.el8_7.x86_64.rpm
127c4130240a6295ec9699f0485fe4505f380fda8660bbee2e1625eca8e3e6e4
pam_ssh_agent_auth-0.10.3-7.17.el8_7.x86_64.rpm
5460a2de12107bf9e83e804bd667c9d329605f6ee44cb18bae68784bfada5972
RLSA-2023:0837
Moderate: systemd security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* systemd doesn't record messages to the journal during boot (BZ#2164049)
none-baseos-rpms
systemd-239-68.el8_7.4.i686.rpm
1a89950297d90efc2d53bc3a8ab67d2f1fa70e74db4c43dfa9540dc7735324e4
systemd-239-68.el8_7.4.x86_64.rpm
4570fb885df57f65d9e3840f60253f6eb96759ab9f7a890d85c1403a42e4059c
systemd-container-239-68.el8_7.4.i686.rpm
6b4e3a244a8efc97cf96bdb159ae6de82e3afe06a91748f0a06ae16b48d0223b
systemd-container-239-68.el8_7.4.x86_64.rpm
d27b57e269000afc18af1b2a1d0bda777406fbfd7f257a900d0d3e77d00138f6
systemd-devel-239-68.el8_7.4.i686.rpm
02b1ef810907a2730c469fc764cff674d81112d7647a33084e787f1e6c6f834d
systemd-devel-239-68.el8_7.4.x86_64.rpm
fd4044d117e6b6af19b9a27fe5a996cbe8da367c8165cd2c1a9527f32813ab6c
systemd-journal-remote-239-68.el8_7.4.x86_64.rpm
62145940f536b2c8ed3b4a5632df5b8385c36773148893c9071a60f74bf3bfc4
systemd-libs-239-68.el8_7.4.i686.rpm
093d459ba0a899fa11ea3535fa75e5cde868bc097a04a0a47f642b2a81349e74
systemd-libs-239-68.el8_7.4.x86_64.rpm
22e74ab19875536ea8ef5e8fb739c3dea8e3642b66cb77fa205e1398f48e8b2a
systemd-pam-239-68.el8_7.4.x86_64.rpm
356487ffaca88133d8e09a98dd2fcb9f5be0ddc74dd17c716671a3725a3e23b3
systemd-tests-239-68.el8_7.4.x86_64.rpm
2c4980c7f64f4fe56d392346f6884209b51dc94f7432c46df343ca76071eb0ed
systemd-udev-239-68.el8_7.4.x86_64.rpm
eb0fb3bbfdebe5c3de2e29ff21b817e2acaab13b979a4923236516ade3ed7bc6
RLSA-2023:0838
Important: samba security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
ctdb-4.16.4-4.el8_7.x86_64.rpm
3e323c101092468ae7da5a7b2a4839e4bf8ba285f3e2d0b1adb75e445da94d28
libsmbclient-4.16.4-4.el8_7.i686.rpm
56aad70922e9604f5df174c898eca9728c2c78d917c318c82c824b7904294aa0
libsmbclient-4.16.4-4.el8_7.x86_64.rpm
8481d62fa3336fc9c870eeb48aaaca4bc3b59bb62a3cba80ef29c0599f03ad87
libwbclient-4.16.4-4.el8_7.i686.rpm
652005e996bba417d3a666cab28280ef49f267a0c6412e03c1738705ce011fda
libwbclient-4.16.4-4.el8_7.x86_64.rpm
a34de817747f178da58fa3bffdbc220b4047e0ee72e61453506796a4274f96c8
python3-samba-4.16.4-4.el8_7.i686.rpm
5ef284ada19565f0cc367a57a6a88ad9269aa33a3d02e8a67c15d00aaa42ab69
python3-samba-4.16.4-4.el8_7.x86_64.rpm
7aac04965e10d8859dea3cefef5bd4da7316b9b1950809e6cbe8fd93267fce86
python3-samba-test-4.16.4-4.el8_7.x86_64.rpm
95e9014204cdcad709b4902e3032167d238e212e176fa232a7f8ae5e5d7db5ce
samba-4.16.4-4.el8_7.x86_64.rpm
d5b6a420c4230744222ae054e094738b57c6d2f18c3de5f019c7c19fe368e4bb
samba-client-4.16.4-4.el8_7.x86_64.rpm
37eb1a7e2428501ba9af75749751963cfa6418daf28cb2faabd636eec6da407b
samba-client-libs-4.16.4-4.el8_7.i686.rpm
b6aa22e0652e4bfd521a2552af682832f50ac03f8f8ef8782bb59f50ce5ce0d2
samba-client-libs-4.16.4-4.el8_7.x86_64.rpm
c15d47a95fac4795b0ac703e0ff3a0240c2f88c5e1142fd35f7c7f0d4744b5e1
samba-common-4.16.4-4.el8_7.noarch.rpm
920a53593c8fc91fbcb9b53fda376f997eaf9ebc446e682369e57001c749c535
samba-common-4.16.4-4.el8_7.noarch.rpm
920a53593c8fc91fbcb9b53fda376f997eaf9ebc446e682369e57001c749c535
samba-common-libs-4.16.4-4.el8_7.i686.rpm
aa3f737c703cbea69ccde5aed563acc1c8e835d194d008a081781a5512b863a0
samba-common-libs-4.16.4-4.el8_7.x86_64.rpm
49c9ba71012de2eaece7bdda88962595553ab0c9b0599530f4452da3fe8f89bd
samba-common-tools-4.16.4-4.el8_7.x86_64.rpm
021444294bfc84f1d7173cf14dd97a30a18e136593ed48ebe4009ae8e90ee5dc
samba-krb5-printing-4.16.4-4.el8_7.x86_64.rpm
2b9900678a6c53e6f306799c818fd002c74e608f7ba5b050728f7154bfff3889
samba-libs-4.16.4-4.el8_7.i686.rpm
908241ad05325164b15a604ace3db3b48c4abf431f4cf9e7901f0ba0ac43372f
samba-libs-4.16.4-4.el8_7.x86_64.rpm
48cca028d3bc571664202481e682720917382cb888a5205b77d85b53676bd25a
samba-pidl-4.16.4-4.el8_7.noarch.rpm
b4ed5fcbf7bb9802c768852c4a23821a354feb7440f5cc28df778882400c41d4
samba-pidl-4.16.4-4.el8_7.noarch.rpm
b4ed5fcbf7bb9802c768852c4a23821a354feb7440f5cc28df778882400c41d4
samba-test-4.16.4-4.el8_7.x86_64.rpm
936dd3c596eb9003bcd0dde0132c4619b6f782688b4e649ba10cee26087e1858
samba-test-libs-4.16.4-4.el8_7.x86_64.rpm
c36c0b08a4b893b28daeb9f30196113eafe23be4d9942bc747e5142434248943
samba-winbind-4.16.4-4.el8_7.x86_64.rpm
18ff309fc462b70631a5564bed68044625271e95f3865ef3462d8be880218235
samba-winbind-clients-4.16.4-4.el8_7.x86_64.rpm
a4f11fa8b60046bf49bb7888f83190d44fd0e83e1655ffc387c9df693898052b
samba-winbind-krb5-locator-4.16.4-4.el8_7.x86_64.rpm
4a31984bca3d407d5dace83534452dfa9bc2513c9816929011a355eabdeeb531
samba-winbind-modules-4.16.4-4.el8_7.i686.rpm
a61c9110981844f535300223ddad7c1aa12de6cb00878c5b12077fa73bbdb5cc
samba-winbind-modules-4.16.4-4.el8_7.x86_64.rpm
d735e5573c44d8fe4963eb6d97ec17ef083a3c4cad9cb991ed0de6e38a0d92d3
samba-winexe-4.16.4-4.el8_7.x86_64.rpm
cbbe1ae079685316ab452cd62f9c3b17ae3e64c20d8d914a5829c8bceaf56113
RLBA-2023:0840
curl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Bug Fix(es) and Enhancement(s):
* curl fails large file downloads for some http2 server (BZ#2167825)
none-baseos-rpms
curl-7.61.1-25.el8_7.2.x86_64.rpm
b7bfb42bf7e2ad81c14a5942f31cf59d1fd4eb32f20b7448e9872dc7543e45bb
libcurl-7.61.1-25.el8_7.2.i686.rpm
e92979995b8fb79f8e923adaa40090801ba43f2555e8145b6d233acb80e09f92
libcurl-7.61.1-25.el8_7.2.x86_64.rpm
65c3664a0bda934c2c04cc258896c4d7c0493245eae19fd311942142e5c61f7a
libcurl-devel-7.61.1-25.el8_7.2.i686.rpm
813b28392806ad47a2b6ae1339323fccd1e6d562d070313ea3343fbcea34b485
libcurl-devel-7.61.1-25.el8_7.2.x86_64.rpm
3231b00cd2b2bc5dc0c3467355c26f971e512a8610c34fa288bc64df1b6a05b7
libcurl-minimal-7.61.1-25.el8_7.2.i686.rpm
fe662525fa6f6b0568ff5ce1e7ed2a38228ce38ee29acce13a2c2b7e1fb5bae1
libcurl-minimal-7.61.1-25.el8_7.2.x86_64.rpm
9ce59b8aa7261966e7ee3ec1c4097dd6fee2eab0fac635d1dd6a4151545fcce1
RLBA-2023:0841
grub2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es) and Enhancement(s):
* HOT:ISST-LTE:[P10]:LPAR is not booting up after inactive LPM (BZ#2162411)
none-baseos-rpms
grub2-common-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
d9144ef96e60849f7499704dccc1769bf2e202b10c020e8e60e990a94073c7a5
grub2-common-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
d9144ef96e60849f7499704dccc1769bf2e202b10c020e8e60e990a94073c7a5
grub2-efi-aa64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
c35195531f6ad155e0bbb19a5cbdb30ea89aa1088eb0aec40af8cc31c4753f4b
grub2-efi-aa64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
c35195531f6ad155e0bbb19a5cbdb30ea89aa1088eb0aec40af8cc31c4753f4b
grub2-efi-ia32-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
e95fc32333e2b638bde9bb5a36759cac44d9921c2db9ea3cd6362998ced2d8fb
grub2-efi-ia32-cdboot-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
d69659825041b8b7b50bbceb0c3f676279c66414857fe7a048342e71b9bc4d36
grub2-efi-ia32-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
0a31dfc5494ba26886bb20882418e884a2f4fc51ecf2cc3bbf33c51e86b05571
grub2-efi-ia32-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
0a31dfc5494ba26886bb20882418e884a2f4fc51ecf2cc3bbf33c51e86b05571
grub2-efi-x64-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
cb7cf6e87fc670dcaaef3cd38f1775c573f711ca22b319ca5cc6583fe2f5ba0a
grub2-efi-x64-cdboot-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
9d0c14ffce7ff4348e1bb9206318d4611643458b45b72adaeb8e76c9835402b3
grub2-efi-x64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
53b84245064eb9a42bae0cc85e1fa43b7871085446b813bcf71dfd0c734acb29
grub2-efi-x64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
53b84245064eb9a42bae0cc85e1fa43b7871085446b813bcf71dfd0c734acb29
grub2-pc-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
a9ecba58f77bc8b2fce92074e73e4ba8be1631c105c6d2f1f1e7c86ee43b1f70
grub2-pc-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
8d96bea14500c3f01fc24e2c37ae18dfa8f92c27c0b0721ff923d568b6ed8400
grub2-pc-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm
8d96bea14500c3f01fc24e2c37ae18dfa8f92c27c0b0721ff923d568b6ed8400
grub2-tools-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
fd20cd0d63526cce1f68aa695939040bc9b0cec43291d49eb5c5f6f3ef97f4fa
grub2-tools-efi-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
d1cfaaf2baf92e6a090d6fc77e9c043050844e3167653e2b82c367e57ee7122c
grub2-tools-extra-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
6a0296766622f44cc914c9457a9150b4aaf54445f36eb04998bba5d0f0bb3a24
grub2-tools-minimal-2.02-142.el8_7.3.rocky.0.2.x86_64.rpm
3ce72ed30d0b5260da067abf546246ea7a73525f0b0798a873aab7c5dd0e6071
RLSA-2023:0842
Moderate: tar security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for tar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The GNU tar program can save multiple files in an archive and restore files from an archive.
Security Fix(es):
* tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
tar-1.30-6.el8_7.1.x86_64.rpm
7957bc9ed49b36674b462b2d20b0d1522070cb789d767d420a2672fcec79e798
RLSA-2023:1140
Moderate: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP multi-header compression denial of service (CVE-2023-23916)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
curl-7.61.1-25.el8_7.3.x86_64.rpm
e94b29f4ccaa93bf67f376cb08e065688d42f1f65d1561df1563fb9bff92c077
libcurl-7.61.1-25.el8_7.3.i686.rpm
dcb495f14424b351d3f171a835dc9ec988fabfb7477dae0e97869ef9ce3022e8
libcurl-7.61.1-25.el8_7.3.x86_64.rpm
3bf6e412d40b46ac4b2f757fc5b1b25375a6dba10e6e75df84565cc03a0d4ab3
libcurl-devel-7.61.1-25.el8_7.3.i686.rpm
08873ce82d7c5caa0e1c4c2c2c39e48ecf62300013a85eb683d51225826c0624
libcurl-devel-7.61.1-25.el8_7.3.x86_64.rpm
3c3b544ddbbd6b700ee7cecdd2970aa2ea5dc8f61cc1faad75931e5d9c288dec
libcurl-minimal-7.61.1-25.el8_7.3.i686.rpm
3e7fff43a6f0f6f3a70e3795d50384c50d49866876f99e57e186a14ecd27155d
libcurl-minimal-7.61.1-25.el8_7.3.x86_64.rpm
5fcf3360382094bf6267481626e021acf15b8c89a2f8a71f11a09dbbdb4aac63
RLBA-2023:1300
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* The sos tool has been upgraded to the latest 4.5.0 upstream release, which includes a lot of underlying improvements and fixes. (BZ#2166655)
none-baseos-rpms
sos-4.5.0-1.el8.noarch.rpm
09cecb873d49432c060f6a8e741833a7cbe0ddae4d2cee238694b9c3dd7eaed4
sos-4.5.0-1.el8.noarch.rpm
09cecb873d49432c060f6a8e741833a7cbe0ddae4d2cee238694b9c3dd7eaed4
sos-audit-4.5.0-1.el8.noarch.rpm
d11f01fb828ef8de3e04bcc64f976a61fe0955eec21da53e379a03263f9254bf
sos-audit-4.5.0-1.el8.noarch.rpm
d11f01fb828ef8de3e04bcc64f976a61fe0955eec21da53e379a03263f9254bf
RLSA-2023:1405
Important: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286)
* openssl: timing attack in RSA Decryption implementation (CVE-2022-4304)
* openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450)
* openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-1.1.1k-9.el8_7.x86_64.rpm
9a938d81016ef3c3e733e4769e188999fbbfcdec71318a4698e1040d28867770
openssl-devel-1.1.1k-9.el8_7.i686.rpm
3e08be7239a8cc5a70c6798766d90ad8a42e2fdedf57e807f93523431912a0ed
openssl-devel-1.1.1k-9.el8_7.x86_64.rpm
7b1d407a69745004f56fa33cd2d345f1a84f9e8710ded5e0265dacbd4cc4e150
openssl-libs-1.1.1k-9.el8_7.i686.rpm
6fa9d2fbf75d81021e679830c07a75ce4f1dc5eaba229c9c3e316a09de8adffd
openssl-libs-1.1.1k-9.el8_7.x86_64.rpm
1773916c99960d474e56f6ee2e7f2b94a3fa536a5fe12e4445bea0e34ea6ba01
openssl-perl-1.1.1k-9.el8_7.x86_64.rpm
aac00ecf8f661033d59a38fa9944b36780c0e5bc64fb7f00c1ae2a249b8840ab
RLBA-2023:1565
device-mapper-multipath bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The device-mapper-multipath packages provide tools that use the device-mapper
multipath kernel module to manage multipath devices.
Bug Fix(es):
*Multipath segfault after running newest patched version (BZ#2161393)
none-baseos-rpms
device-mapper-multipath-0.8.4-28.el8_7.3.x86_64.rpm
64703fc5ab66132cbecd8fee01cb99e47478e03e59d6734a03f7ff03d0597164
device-mapper-multipath-libs-0.8.4-28.el8_7.3.i686.rpm
28b7fe47e3b4987d5168ab7b4d0f15a4bda27e89372bb3c157633aabd14b6c47
device-mapper-multipath-libs-0.8.4-28.el8_7.3.x86_64.rpm
815c4941b909fb5eaba3b8969dadfb11754ad19831b040aef95c5e200545fd48
kpartx-0.8.4-28.el8_7.3.x86_64.rpm
aaa18469140d1383e3f2eafbcdaa0e4961a58e0a347626e12556df1ab96f5a9f
libdmmp-0.8.4-28.el8_7.3.i686.rpm
910fdd5ef7cea0cb2349741c6321f82e93e2e574e43dfea3f19d9c770af3e8a0
libdmmp-0.8.4-28.el8_7.3.x86_64.rpm
982d0163a217206f174f5614881430114ccbdfd8dbd6538a0edc493241632c27
RLSA-2023:1566
Important: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770)
* Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170)
* AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275)
* Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750)
* Kernel panic observed during VxFS module unload (BZ#2162763)
* Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587)
* Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296)
* kvm-unit-test reports unhandled exception on AMD (BZ#2166362)
* Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368)
* Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665)
* panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602)
* net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640)
* Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645)
* mlx5: lag and sriov fixes (BZ#2167647)
* Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776)
* GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896)
* Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228)
* fast_isolate_freepages scans out of target zone (BZ#2170576)
* Backport Request for locking/rwsem commits (BZ#2170939)
* ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550)
* Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103)
Enhancement(s):
* Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384)
none-baseos-rpms
bpftool-4.18.0-425.19.2.el8_7.x86_64.rpm
e7c94ef18c138d559ca2f22e646a903384b385dec32d59f254cc7d26ffbdadf5
kernel-4.18.0-425.19.2.el8_7.x86_64.rpm
c729ed610919c93f864208abaa01415b4c97921850ccbb6b4ef71f0a5c65ba28
kernel-abi-stablelists-4.18.0-425.19.2.el8_7.noarch.rpm
42e95052460987534f500f7d2475155e2253339a854c66081b660da0e93a2963
kernel-abi-stablelists-4.18.0-425.19.2.el8_7.noarch.rpm
42e95052460987534f500f7d2475155e2253339a854c66081b660da0e93a2963
kernel-core-4.18.0-425.19.2.el8_7.x86_64.rpm
b8f62457ce99fde135ee6def380c4087ee6abde840cadb9536e978e6560e6884
kernel-cross-headers-4.18.0-425.19.2.el8_7.x86_64.rpm
436a50f7193328f9628475eaaf3535dd1b490666236146a1dbe988e734b62501
kernel-debug-4.18.0-425.19.2.el8_7.x86_64.rpm
4857ba6f6b3e89da3f42d9cc3e8dd97f4439ea3533d06c21d45d631ff6f02291
kernel-debug-core-4.18.0-425.19.2.el8_7.x86_64.rpm
83617a3330cbd93a214fc74ba4b656cdf4916540a71e8c54fcac3a755b29008f
kernel-debug-devel-4.18.0-425.19.2.el8_7.x86_64.rpm
ddb9c75682453f0dac4bd37540dcb37b9fa367ea2f7889dcff18dee2ca22838a
kernel-debuginfo-common-x86_64-4.18.0-425.19.2.el8_7.x86_64.rpm
ab5fbe04e87180e71b07fdd51cbc0b71763f0b67d26e799064b59de5f24bd51a
kernel-debug-modules-4.18.0-425.19.2.el8_7.x86_64.rpm
efba853ecfd14e7c271c0353ff9eb84ba7ab9f882d6775b7f48c7c88cb8f4706
kernel-debug-modules-extra-4.18.0-425.19.2.el8_7.x86_64.rpm
f82fda6617bda86ac0494f7e743a56c6163a4806eb8a25dfcb88663a1a1cca1a
kernel-devel-4.18.0-425.19.2.el8_7.x86_64.rpm
050e1c1323bf319aa4617b94675464ad77a07e3f54cc7b8550adc30242e24009
kernel-doc-4.18.0-425.19.2.el8_7.noarch.rpm
c72d6e283b89b4330922b34ba4cf3dbda58d9e847fd00d75d963d139ea2c53c9
kernel-doc-4.18.0-425.19.2.el8_7.noarch.rpm
c72d6e283b89b4330922b34ba4cf3dbda58d9e847fd00d75d963d139ea2c53c9
kernel-headers-4.18.0-425.19.2.el8_7.x86_64.rpm
d0eb4977e942db3d6a07f1e0797ec243af1a7e2fd72fc10308f0fe1a13f227b5
kernel-modules-4.18.0-425.19.2.el8_7.x86_64.rpm
42db8452c0ce91d2bdb279e1015405a109d2171373fad1a2de04ad6871df86cd
kernel-modules-extra-4.18.0-425.19.2.el8_7.x86_64.rpm
15c24631eaf525ae241b2bbf0d1183e0a737cb4b715e8c6902a291d661fc0ffe
kernel-tools-4.18.0-425.19.2.el8_7.x86_64.rpm
a6fef183dbd6a420193cb8dc890990fa0aab12a5d0b198f8afb55db0b4c9d4f2
kernel-tools-libs-4.18.0-425.19.2.el8_7.x86_64.rpm
3df2788f8b1f651eedb5491ff8cd1ef2402cef90c822d0317f6dbebdc9bacdcc
perf-4.18.0-425.19.2.el8_7.x86_64.rpm
f54d6c1e1310c6cc5ba83f34f53307939bf500a1621cdc04ce3b7b84efdd36c8
python3-perf-4.18.0-425.19.2.el8_7.x86_64.rpm
e0324a5dbce6e51ce6939c628f2c21858e6c39fdd3fbc4693062ccad3ceea47b
RLBA-2023:1567
samba bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es) and Enhancement(s):
* Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394)
* ctdb should have dependency for package samba-winbind-clients (BZ#2170467)
* Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468)
* samba-tool reports an uncaught exception (BZ#2170469)
* Ship new samba subpackages (BZ#2173975)
none-baseos-rpms
ctdb-4.16.4-6.el8_7.x86_64.rpm
54f2020578129c0ca43e3d985e5f3c8ac0ab65dfa1d89767de4b46c5981dbdca
libsmbclient-4.16.4-6.el8_7.i686.rpm
ad22e96a0ee0af3ec2cac58a0f00118d6a25aa68af9c15cc3d4a72956a98ef63
libsmbclient-4.16.4-6.el8_7.x86_64.rpm
8c6745dc30e7a7801106f434a6fd1143e71384bf66b6cb9a9b9b967c4d53f67e
libwbclient-4.16.4-6.el8_7.i686.rpm
635792e5bec11bf8d7d880213da4cb4725b64d94e1156553f73246f89f202e9b
libwbclient-4.16.4-6.el8_7.x86_64.rpm
d08718f1efe3bb47cd8cf79f886d43bef3acb1ee0663a12c75fdaf1344241b8b
python3-samba-4.16.4-6.el8_7.i686.rpm
2b81efc02c56408f4f5fa570ee90621b7d187b3783ed402ccc387694f956a427
python3-samba-4.16.4-6.el8_7.x86_64.rpm
720204669b1b1344cd65c448adac9b214195990f664b98b85b6a1fe1aafd06b8
python3-samba-test-4.16.4-6.el8_7.x86_64.rpm
1f36b8adc3e669b48061b0f7a822c82ab0dc7f1c3631b76eb5fa8a2627426d6e
samba-4.16.4-6.el8_7.x86_64.rpm
1a4b0e2ba34cbf6c5eb92bfa0a35c5e8a8e9fdbb1ed4bad33a10c4b650655c71
samba-client-4.16.4-6.el8_7.x86_64.rpm
64ed2e3c5fd7e0397d7261707fef9250f86b4664e088c5316ff318f674946ff9
samba-client-libs-4.16.4-6.el8_7.i686.rpm
48747c9c9e3953e03a687e1dd067ff33d4cef609a41c6d4379b5ba188b4b0c5f
samba-client-libs-4.16.4-6.el8_7.x86_64.rpm
f4d61ef915fd2a98c42989fe8c179af770a5476706d615391df5a47fdcb41029
samba-common-4.16.4-6.el8_7.noarch.rpm
97d51a6b773106001a616d443beb10dc4f2720de02c2cdebe92cc6fb33289395
samba-common-4.16.4-6.el8_7.noarch.rpm
97d51a6b773106001a616d443beb10dc4f2720de02c2cdebe92cc6fb33289395
samba-common-libs-4.16.4-6.el8_7.i686.rpm
ca2f66e7fe35f910dbac9aa441beb7a3311e72da6224bad2e87d85b20794cbd4
samba-common-libs-4.16.4-6.el8_7.x86_64.rpm
668543d5621f4f993b0e6375025e643b1d722e96e8b55d83be6e4238ffa436bc
samba-common-tools-4.16.4-6.el8_7.x86_64.rpm
5f3e679a20ef595027602860be82819b5bc8e58d02b6fd18773113de900cf42c
samba-dcerpc-4.16.4-6.el8_7.x86_64.rpm
88edcf0b0f6651cdc68b6a44cb98302a5bb87a4154fb27f7bc7335d2260d3d54
samba-dc-libs-4.16.4-6.el8_7.i686.rpm
8dcd1ba414112f6a821922b0aa982a978fedd62c97ab5f2ae8982ee627157f11
samba-dc-libs-4.16.4-6.el8_7.x86_64.rpm
ff10faaf34f2f9964121596baee51482ed51822207d146329b64b0d0cb1621d0
samba-krb5-printing-4.16.4-6.el8_7.x86_64.rpm
bd02588ef1bb9c8af4a84463287ee027b12e0316d73d3760e9215452fe06ad6e
samba-libs-4.16.4-6.el8_7.i686.rpm
2f16445dbbfb8eabc0305270231b281f17e6922ed010474b09b891b2de8614a2
samba-libs-4.16.4-6.el8_7.x86_64.rpm
6363a01eb86d79b822b41ae4f25daef4e941fc20aa9555b89abd2dd565972ee6
samba-pidl-4.16.4-6.el8_7.noarch.rpm
934707d614ffd5c2222c70f953a539bc8b92ffc4b75414a8ad034e53d82ea84e
samba-pidl-4.16.4-6.el8_7.noarch.rpm
934707d614ffd5c2222c70f953a539bc8b92ffc4b75414a8ad034e53d82ea84e
samba-test-4.16.4-6.el8_7.x86_64.rpm
cc33da8640765be111af1d8cd12d473b834c51505ab94f9d9e3c0f10d64c9a9f
samba-test-libs-4.16.4-6.el8_7.x86_64.rpm
d809aba8393fc812674446ce75e6c332bfe27fab66234d2e3e1587dc5d6d3e46
samba-winbind-4.16.4-6.el8_7.x86_64.rpm
1275eb113fd8a64b465b20965447009c911faa38fa1ea5d93e6a7d5ae141dafa
samba-winbind-clients-4.16.4-6.el8_7.x86_64.rpm
1967de4b51f9579817bb82ec702fa6888fd8b6f7895b67a77fad8bc2fe7262d5
samba-winbind-krb5-locator-4.16.4-6.el8_7.x86_64.rpm
20c145f5cb4a59941b3537f858dc8a3ecb771d4ab6c4a912527496aae1615a91
samba-winbind-modules-4.16.4-6.el8_7.i686.rpm
9c8b4548dbee6e8d3df232601074c70c72361a19ffc9a72d516dfbca038dd289
samba-winbind-modules-4.16.4-6.el8_7.x86_64.rpm
273edf803ccaadf53b7e4c422f0d5cdbee3f1fa29200e3a2605359f3f697d050
samba-winexe-4.16.4-6.el8_7.x86_64.rpm
b84b22b41da3615d30d04f00c4a56306ee3fc82b45fa962171121ba59671903e
RLBA-2023:1568
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es) and Enhancement(s):
* [Rocky Linux8/Insights/Bug] SELinux violations insights client SAPHostAgent (BZ#2170510)
none-baseos-rpms
selinux-policy-3.14.3-108.el8_7.2.noarch.rpm
2013aed46a43d0a5dc40c88703d4d87f417fac5e30b5fc4a0aa22f971e85839c
selinux-policy-3.14.3-108.el8_7.2.noarch.rpm
2013aed46a43d0a5dc40c88703d4d87f417fac5e30b5fc4a0aa22f971e85839c
selinux-policy-devel-3.14.3-108.el8_7.2.noarch.rpm
862b21fb9d39d528ba3c4706401063f5cd769ddd246aeb2784f0bc204833d5cb
selinux-policy-devel-3.14.3-108.el8_7.2.noarch.rpm
862b21fb9d39d528ba3c4706401063f5cd769ddd246aeb2784f0bc204833d5cb
selinux-policy-doc-3.14.3-108.el8_7.2.noarch.rpm
c7960959abe31333dbdfc42cf004e54bec43c5b82816d0efe13f3c5dc65c3e16
selinux-policy-doc-3.14.3-108.el8_7.2.noarch.rpm
c7960959abe31333dbdfc42cf004e54bec43c5b82816d0efe13f3c5dc65c3e16
selinux-policy-minimum-3.14.3-108.el8_7.2.noarch.rpm
59ba05d47369d385080c7601f5a0f110ed043454bc2f8a2442b90f1450e5dccc
selinux-policy-minimum-3.14.3-108.el8_7.2.noarch.rpm
59ba05d47369d385080c7601f5a0f110ed043454bc2f8a2442b90f1450e5dccc
selinux-policy-mls-3.14.3-108.el8_7.2.noarch.rpm
9644f8b01fa6ff683ab447ce29d6433db26f6516bb67e147a87bc50d603876f4
selinux-policy-mls-3.14.3-108.el8_7.2.noarch.rpm
9644f8b01fa6ff683ab447ce29d6433db26f6516bb67e147a87bc50d603876f4
selinux-policy-sandbox-3.14.3-108.el8_7.2.noarch.rpm
800716bd8afd4b143ad5d2da713ce0c9c27b5775f7ee840ea6e1f27e6264f8f7
selinux-policy-sandbox-3.14.3-108.el8_7.2.noarch.rpm
800716bd8afd4b143ad5d2da713ce0c9c27b5775f7ee840ea6e1f27e6264f8f7
selinux-policy-targeted-3.14.3-108.el8_7.2.noarch.rpm
edca9f783ee64438467aab41236f4d68bf0cc390c4b6975cdaad10d04b5d5591
selinux-policy-targeted-3.14.3-108.el8_7.2.noarch.rpm
edca9f783ee64438467aab41236f4d68bf0cc390c4b6975cdaad10d04b5d5591
RLSA-2023:1569
Moderate: gnutls security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152)
none-baseos-rpms
gnutls-3.6.16-6.el8_7.i686.rpm
7ab085d23e53853e89f4b9f7a653c5e03d9a73b728b9a8b6b81fc43d3c1b3993
gnutls-3.6.16-6.el8_7.x86_64.rpm
5e4ed69fec2da582fb01f7d4ab5f6024ade26cba9af6ddc1b65c8702850520a1
RLBA-2023:1570
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* NetworkManager hostname lookup fails with IPv6 (BZ#2174362)
none-baseos-rpms
NetworkManager-1.40.0-6.el8_7.x86_64.rpm
82c3c779d3241fbc7bef8dd6d670a4484eb93939a084365e922971dad6169d8b
NetworkManager-adsl-1.40.0-6.el8_7.x86_64.rpm
5b46ac90f769aad6603f50210a7b57e89ca802e8e8bc28852a375fdcafcc02f9
NetworkManager-bluetooth-1.40.0-6.el8_7.x86_64.rpm
727184d6fc4555e0babe5b42b2142073dd729147a0d51ba16755ec6cf73652cb
NetworkManager-config-connectivity-redhat-1.40.0-6.el8_7.noarch.rpm
6cbb3a4599412d4f9532c78c37a25a7fc1d13c3db025c56ca81b018ceb4474b8
NetworkManager-config-connectivity-redhat-1.40.0-6.el8_7.noarch.rpm
6cbb3a4599412d4f9532c78c37a25a7fc1d13c3db025c56ca81b018ceb4474b8
NetworkManager-config-server-1.40.0-6.el8_7.noarch.rpm
c19ab8732408c8519100a185a29a88f6552b6c13f88179999a3478c61a98fa0a
NetworkManager-config-server-1.40.0-6.el8_7.noarch.rpm
c19ab8732408c8519100a185a29a88f6552b6c13f88179999a3478c61a98fa0a
NetworkManager-dispatcher-routing-rules-1.40.0-6.el8_7.noarch.rpm
f5b804bb2124b9760066f570061afcedb5c51ac16c6fb7d78c8d987a4472d69a
NetworkManager-dispatcher-routing-rules-1.40.0-6.el8_7.noarch.rpm
f5b804bb2124b9760066f570061afcedb5c51ac16c6fb7d78c8d987a4472d69a
NetworkManager-initscripts-updown-1.40.0-6.el8_7.noarch.rpm
bd3bb61ec99c1b671a3cd14b349cf56bd38d4951dc63bdc5d5c33b964df64731
NetworkManager-initscripts-updown-1.40.0-6.el8_7.noarch.rpm
bd3bb61ec99c1b671a3cd14b349cf56bd38d4951dc63bdc5d5c33b964df64731
NetworkManager-libnm-1.40.0-6.el8_7.i686.rpm
937c071ceae5f2cf87fa4f2393888c66d88724427f2154ba97b1a6cff229e789
NetworkManager-libnm-1.40.0-6.el8_7.x86_64.rpm
d0766561c8a07b70b6d8516810a9d7221db09688669bc7743167a202552e5d2b
NetworkManager-ovs-1.40.0-6.el8_7.x86_64.rpm
bc85b3d875caf318530dcdcdcedaff8f417fe087f2907d3f11ea40ca5c81c3c8
NetworkManager-ppp-1.40.0-6.el8_7.x86_64.rpm
3f0e9224417156c113778f5ec8b98922607ff115a6585c17ca1e9bc082bfbd54
NetworkManager-team-1.40.0-6.el8_7.x86_64.rpm
43d0a26d8f8e7ce97d49fdb52265d82dbeeee6034295f7cacc1227b0d81a8f2b
NetworkManager-tui-1.40.0-6.el8_7.x86_64.rpm
a13cd9f9a90a3b38859a1bb35fa0778bc8b1b777a0e20fd899a9223cedea8474
NetworkManager-wifi-1.40.0-6.el8_7.x86_64.rpm
8d0d510f9ed82c8af25cc939a9c1c26dfe36fb52657ebae7f983dbf05518ae1e
NetworkManager-wwan-1.40.0-6.el8_7.x86_64.rpm
8210252ef33a531c119dacfafe833fe2d1a3398f24a87548618d87fa0a51a8a4
RLBA-2023:1571
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* [rebase] rebase sos to 4.5.1 (BZ#2175806)
none-baseos-rpms
sos-4.5.1-3.el8.noarch.rpm
6b7406d995defe6c7158fd2342a79920920c06c94b0ed3670423892afb782297
sos-4.5.1-3.el8.noarch.rpm
6b7406d995defe6c7158fd2342a79920920c06c94b0ed3670423892afb782297
sos-audit-4.5.1-3.el8.noarch.rpm
43723ff3f321f3847b20a5162268aace1d60dbb7812534ae808add2d3ba93133
sos-audit-4.5.1-3.el8.noarch.rpm
43723ff3f321f3847b20a5162268aace1d60dbb7812534ae808add2d3ba93133
RLSA-2023:1930
Important: emacs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: command injection vulnerability in org-mode (CVE-2023-28617)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
emacs-filesystem-26.1-7.el8_7.1.noarch.rpm
e818eac7fc25269dec708905b869d866a00355e16ca5524cacb291d1f6d383f0
emacs-filesystem-26.1-7.el8_7.1.noarch.rpm
e818eac7fc25269dec708905b869d866a00355e16ca5524cacb291d1f6d383f0
RLBA-2023:3103
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2023c, which addresses recent
time zone changes. Notably:
* The changes added for Lebanon in tzdata-2023b have been reversed. This update
reinstates the DST change for Lebanon effective March 25.
* This update also includes changes for Egypt, Morocco, and Palestine that shipped with tzdata-2023a.
none-baseos-rpms
tzdata-2023c-1.el8.noarch.rpm
172d38efe4e48e867246cfc57b33d60043c4b31cd7787e9a2b2567e89753c9d0
tzdata-2023c-1.el8.noarch.rpm
172d38efe4e48e867246cfc57b33d60043c4b31cd7787e9a2b2567e89753c9d0
RLBA-2023:2953
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
kexec-tools-2.0.25-5.el8.x86_64.rpm
ff0d34cb1d06749935cbfa3d3adb39f96d177015202c1c0da6a280e60febd51b
RLBA-2023:2956
libteam bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libteam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
libteam-1.31-4.el8.i686.rpm
ee143216b9732ddc835c8be8584decb270721fac7d882aa81403e41d1d3bfb87
libteam-1.31-4.el8.x86_64.rpm
64f333907f546ff886323153cdc0dd959ce6ebb985f1cd920030be950ae9e54c
libteam-doc-1.31-4.el8.x86_64.rpm
3aa1092f416fe39a097978cf89dee19b3704048179ae90bcb7fb2c673a74f821
network-scripts-team-1.31-4.el8.x86_64.rpm
885998bd1c974ce43667925df1d18e7f13a71213d9606ba660810eb8529f83f2
teamd-1.31-4.el8.i686.rpm
c949e7878816c40a21ec172428fe5ed24a807a7426d39f907d7bc01244ea65f6
teamd-1.31-4.el8.x86_64.rpm
33fcc14545bd22703123fc1cfd88aa133b40f4d28a7bacc73a7cfa409d8a8220
RLBA-2023:2957
kmod-kvdo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
kmod-kvdo-6.2.8.7-88.el8.x86_64.rpm
197c3c5ef31137418aaf63d5ce71b265c4e75285ca0a635f81a52cadace977ae
RLBA-2023:2966
tboot bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tboot.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
tboot-1.10.5-2.el8.x86_64.rpm
eea21199d9c98020c453d12f3f386919fb953106940bed8498dba3dccb46599d
RLBA-2023:2978
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
opencryptoki-3.19.0-2.el8.x86_64.rpm
c65d3f6ad175cc50e19966e6e5b2fa24eea85156fbafd565c80bed8d6e63e564
opencryptoki-icsftok-3.19.0-2.el8.x86_64.rpm
817c1e72eb9dc3e33fc2ecb085e4feaa888473bb6f3fb8db9c0c3620d532dbdf
opencryptoki-libs-3.19.0-2.el8.i686.rpm
c4d9be634df920e8a0b99ed692a99c40061adee0acca7d1c05c31fe00b1790f5
opencryptoki-libs-3.19.0-2.el8.x86_64.rpm
b8d4dbc6ac59f32f9b8f1f56c1a40409aa5aeb1270102caf8528fa3c2084e6a8
opencryptoki-swtok-3.19.0-2.el8.x86_64.rpm
d01970d3b73208993142d4560cbcf0a23cbfd150736f191685700366f1682c41
opencryptoki-tpmtok-3.19.0-2.el8.x86_64.rpm
4109780b43ec7dd122305563b21835e0764e249e8a46234a45ed806f1e5665c5
RLBA-2023:2979
libdnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
libdnf-0.63.0-14.el8_8.i686.rpm
544576dff5c85c98ba50cc2dca66e71c9b7fdbd02ca3996aa491dbd845fe9681
libdnf-0.63.0-14.el8_8.x86_64.rpm
fb0348039a81e4052b2e688472f60060e1a932f7b155e811d2bd0641606f79c4
python3-hawkey-0.63.0-14.el8_8.x86_64.rpm
eb382fddc65c6f263ee4237d6daaa8848ef6ef054d64b85ad3f95a0a212a6680
python3-libdnf-0.63.0-14.el8_8.x86_64.rpm
b4a834bd1e7a60d46f4d0fcc86af98e6c4d6465db9755b8cd1c6bd5473fa4d40
RLBA-2023:2984
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.36-2.el8.x86_64.rpm
5a4e1612c5401c9ef0820c807c695075ba8237946b6a62d6e9027ed7b723c5a4
python3-cloud-what-1.28.36-2.el8.x86_64.rpm
bf355bc70c3bfaabea69624c326d0ae83668988ef48a952e9043c6cbe5bc6b3d
python3-subscription-manager-rhsm-1.28.36-2.el8.x86_64.rpm
984161b00205948430c3605ac03b1d350c0734e0636b1ba0f9eb0ec2a0661978
python3-syspurpose-1.28.36-2.el8.x86_64.rpm
9cfa1c641e310f35225653f570dcffcfad7b1f1eb735ffaf711f92cf7164f00d
rhsm-icons-1.28.36-2.el8.noarch.rpm
cd7db5da1b82708148a5720eed115437564328817ef9c61cb33c4c140f70da1f
rhsm-icons-1.28.36-2.el8.noarch.rpm
cd7db5da1b82708148a5720eed115437564328817ef9c61cb33c4c140f70da1f
subscription-manager-1.28.36-2.el8.x86_64.rpm
69d337f9765c73e4e5609fe8f8aaa4d037c8a483b6da474784cfc2b560ae57a8
subscription-manager-cockpit-1.28.36-2.el8.noarch.rpm
d82b6f2e75b756e034caacd882e52fc8378568e89b82a82a60c11ef9ed8af904
subscription-manager-cockpit-1.28.36-2.el8.noarch.rpm
d82b6f2e75b756e034caacd882e52fc8378568e89b82a82a60c11ef9ed8af904
subscription-manager-plugin-ostree-1.28.36-2.el8.x86_64.rpm
19ad9b4556224d165aada066b719f222a6a0653651323f969f3b7902d2126fd7
subscription-manager-rhsm-certificates-1.28.36-2.el8.x86_64.rpm
51e7a83b5774db248a1c53afcd66bb17f9a4873ebdbeccc0169a966b52cd3951
RLBA-2023:2991
libtalloc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
libtalloc-2.3.4-1.el8.i686.rpm
698f29347a6f732c85d6a7f359fe6bc1aaae2364f468ebd1d1c79912f63f52fb
libtalloc-2.3.4-1.el8.x86_64.rpm
5a76e05740878a475b22069e56e0cd5658273f415a8dcf22137ab97c1ef5e471
libtalloc-devel-2.3.4-1.el8.i686.rpm
210e545cdc00648fb9ca24b1a4b10eedca87c187dc92419e67c6b4ad05132d6c
libtalloc-devel-2.3.4-1.el8.x86_64.rpm
b489ed308b647b8272adf23bfd268178da065768c979677910a7bbc2b3d9b9be
python3-talloc-2.3.4-1.el8.i686.rpm
198df142251bac78a98cff99ac7d0169c8ab6897fbe96aacfb525728eb517302
python3-talloc-2.3.4-1.el8.x86_64.rpm
d4974b83af1da8f7b4511271242b170bfda42e7d58b08cc7f8d15114341f11bb
RLBA-2023:2996
cryptsetup bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cryptsetup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
cryptsetup-2.3.7-5.el8.x86_64.rpm
48ff177cf87a4bc384963f3db9f9308ae97c2113ab36b15ffa07918135daba48
cryptsetup-libs-2.3.7-5.el8.i686.rpm
07cac51e2897de3bca41df8acf785c7d9117ea5000e14364701e9a636619326c
cryptsetup-libs-2.3.7-5.el8.x86_64.rpm
727a71268220f90692b99060b244d15a32906eb71c02c0b7121e10e51a03088a
cryptsetup-reencrypt-2.3.7-5.el8.x86_64.rpm
78f6928db7a58643dfff852bd5c1fd8d596193b4f535e3b6b3c1af42f0d3374d
integritysetup-2.3.7-5.el8.x86_64.rpm
87288f867b5afb9608693460ff26886a957e9f0e12f8a5567fe81ae3606a0e58
veritysetup-2.3.7-5.el8.x86_64.rpm
a0dc83c3b451a0e84951abaff1a2d681bb01153b6ea69e66478ec67b8ec6a56b
RLBA-2023:2997
adcli bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for adcli.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
adcli-0.9.2-1.el8.x86_64.rpm
8fa9afb4c9365b4695f4a112fd15e842549fcd79dc60af517dcc948a8faa0ad1
adcli-doc-0.9.2-1.el8.noarch.rpm
15217133c085f89b79dc4b20a9e14b0e0b0f0f1884f3aef111327d47fa8df53e
adcli-doc-0.9.2-1.el8.noarch.rpm
15217133c085f89b79dc4b20a9e14b0e0b0f0f1884f3aef111327d47fa8df53e
RLBA-2023:3007
libtraceevent bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtraceevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
libtraceevent-1.5.3-1.el8.i686.rpm
c69a8256acbada1cb52f95826c07787a862eaf9802346d2956a558199d7c0452
libtraceevent-1.5.3-1.el8.x86_64.rpm
1e70b0b15e9be88354705f0462b8422a020978bacc3e36d72e2f02aafcb76d65
RLBA-2023:3010
libtracefs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtracefs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
libtracefs-1.3.1-2.el8.i686.rpm
bbf458b2e60c8692faf967437fc2eaacbb61f0eb0ef5c010bdba26fddbcce908
libtracefs-1.3.1-2.el8.x86_64.rpm
eda6968b4b591db0a3aedc9555073cc1c1b4fa496fbe92ab465c604e73a4166a
RLBA-2023:3016
tar bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tar.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
tar-1.30-9.el8.x86_64.rpm
55e2cb6a1e29746ae59fcd1138bcbfcd372362e5cae0c3483ce643711a7a7707
RLBA-2023:3036
librhsm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librhsm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
librhsm-0.0.3-5.el8.i686.rpm
1ea5a2191d8eb6436d38c2ed05ea0599780b9969030f9d30981975d40c3ba6d7
librhsm-0.0.3-5.el8.x86_64.rpm
b3eaa310cf4d75e640dc31ebd7083777f9d17cc162bb8763f6032a3691855eb8
RLBA-2023:3043
perl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
perl-Errno-1.28-422.el8.x86_64.rpm
46bf5e2b26133ae96a22feaf62d5993f3a7054f03090cd8348ba4bd4eab8380c
perl-interpreter-5.26.3-422.el8.x86_64.rpm
65d93d0fb4f022a6882da3632b83a6eae700d54a236d819669b1b998f6adb6dc
perl-IO-1.38-422.el8.x86_64.rpm
baf711875b0dbabd8eb852cd28928c452d220f3976bd61853c3a77e8d66ff62d
perl-IO-Zlib-1.10-422.el8.noarch.rpm
0d3e1c768da883fe6c7f9c2b889eb0f6b2d0618d3897dac5e9db54cac1b396c0
perl-IO-Zlib-1.10-422.el8.noarch.rpm
0d3e1c768da883fe6c7f9c2b889eb0f6b2d0618d3897dac5e9db54cac1b396c0
perl-libs-5.26.3-422.el8.i686.rpm
97b5dcb0cb1e0cf5b0d3ce53b6a99dcfd644bf94741b8796133dbb40dd05ecab
perl-libs-5.26.3-422.el8.x86_64.rpm
724c620ac247ade5056b4d0d22b1617140bac8cac9fcfdfefdd6a70791191b0d
perl-macros-5.26.3-422.el8.x86_64.rpm
2d9267fa70dbfd0c7104d4897cd35c07d4fd33bd224dcace515209dc2e49fa52
perl-Math-Complex-1.59-422.el8.noarch.rpm
39ea34de65b999e9d930e330d681f41de8e33867cc8b21f81ecd8c3a2983c40a
perl-Math-Complex-1.59-422.el8.noarch.rpm
39ea34de65b999e9d930e330d681f41de8e33867cc8b21f81ecd8c3a2983c40a
RLBA-2023:3048
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-1.02.181-9.el8.x86_64.rpm
11e5cd7404833170c8573d516ea0171bea9f18151939c2d2705e1126bea1208c
device-mapper-event-1.02.181-9.el8.x86_64.rpm
e2b5eba79c16bfa99fa725c014ab7b5a2855fed8330306a0fb3e30e334cfff6f
device-mapper-event-libs-1.02.181-9.el8.i686.rpm
46cc1045222d0039655e877e92d2150202b15083c356a73e40e2f95537776736
device-mapper-event-libs-1.02.181-9.el8.x86_64.rpm
ef19aa1980349b3dff9ec3ec441d6410622219093d3a24fd49d882433bf995f5
device-mapper-libs-1.02.181-9.el8.i686.rpm
6f7f1dc94185dcea5ff8ac88eaadf2531f1e9bac8edf5cdfd16cf1d144a7c6f2
device-mapper-libs-1.02.181-9.el8.x86_64.rpm
868ade12b74be5a492450f1a8f0b1438a4de5663045eee9c9e122dd5df0a3c92
lvm2-2.03.14-9.el8.x86_64.rpm
8af03a650690a6ba53887e1945d87ebe5b63dafa3893396410b2807a48051ebc
lvm2-dbusd-2.03.14-9.el8.noarch.rpm
9009cba46706d0f596478343943c8c4d13896b61ccb641a836658735f8d51277
lvm2-dbusd-2.03.14-9.el8.noarch.rpm
9009cba46706d0f596478343943c8c4d13896b61ccb641a836658735f8d51277
lvm2-libs-2.03.14-9.el8.i686.rpm
41de1f77005aed167dfd5395e1586e2508cb9350d1836815ff4b37f6bd966989
lvm2-libs-2.03.14-9.el8.x86_64.rpm
dc7216c4f307233236ad5cfcf7f6e99854d8b894814eeaeaf0e5d8474ab93982
lvm2-lockd-2.03.14-9.el8.x86_64.rpm
cdc638e5ea27106ce1e3dc1a123387ffc64f43fda95fb64c2cf24ffdb3becc3d
RLBA-2023:3060
opa-ff bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opa-ff.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
opa-address-resolution-10.11.1.3.1-1.el8.x86_64.rpm
05f3293d8e913e1d65d92617b1a98b3baec19dc72db4d247bb12b23e04d86aec
opa-basic-tools-10.11.1.3.1-1.el8.x86_64.rpm
2b65d40d5a27432c8cbb67e05827b1580b6cf4fde4fd5457ff6c0cdc6a59f9db
opa-fastfabric-10.11.1.3.1-1.el8.x86_64.rpm
72f4c536e7e8d602a8a135380060fab1aae1f7c8a7d58e2b99ef39b00a557ef0
opa-libopamgt-10.11.1.3.1-1.el8.x86_64.rpm
dd726541bdfe6083f81f44420a09ce75833765e7d76a9a770f88e990c9d183ed
RLBA-2023:3063
file bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
file-5.33-24.el8.x86_64.rpm
07e9e94435e1226ff099a260124525a6f36daaf6d8f33c8cc5803b83755f3c5e
file-libs-5.33-24.el8.i686.rpm
df54ce585fce5ba1c7fdb8798a3302b68a65329e286bc1695540a4dde3b2dc10
file-libs-5.33-24.el8.x86_64.rpm
1ca5c1c361c443e560e29c436e1ccf3d8a0adb870102156b5d538d18fadc24b2
python3-magic-5.33-24.el8.noarch.rpm
e1561599f12135b7b36a64fe32ccea7c919aaf5ec469b42f42a6acfee796673d
python3-magic-5.33-24.el8.noarch.rpm
e1561599f12135b7b36a64fe32ccea7c919aaf5ec469b42f42a6acfee796673d
RLBA-2023:3064
python-dmidecode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
python3-dmidecode-3.12.3-2.el8.x86_64.rpm
dc57ae4b97be2dac9b4c4e1fb87ffe3470d3591ead288f883ea34e994db9d0a8
RLBA-2023:3066
mcelog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section.
none-baseos-rpms
mcelog-189-0.el8.x86_64.rpm
6896e93cc63ef2a0326cc753bea02b962298cfedf11f8d1d769eb897d2312edb
RLBA-2023:3102
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es) and Enhancement(s):
* Backport hint about systemd daemon-reload. (BZ#2180442)
none-baseos-rpms
libblkid-2.32.1-42.el8_8.i686.rpm
4ce75489c589ae0d14a937a9e199a74fb7e768e879932e34b3f63ec3dc7a7be2
libblkid-2.32.1-42.el8_8.x86_64.rpm
6466a92b77ef0cec7ccb122de0d172bd4d2993df5d6dfcd1b917b97d2cf5b03c
libblkid-devel-2.32.1-42.el8_8.i686.rpm
04891494988dccbe374ea4d16371bb7ae117172965d39d4ed240476c024569ce
libblkid-devel-2.32.1-42.el8_8.x86_64.rpm
6ff60e7036e6c18b03df263fc32475122bfdd90c8b539cdee024d14089505839
libfdisk-2.32.1-42.el8_8.i686.rpm
7633b3eabc223f2ee85c001a7c3cc0854d9f4dbc27a3cdc6bbecae85f9236bdc
libfdisk-2.32.1-42.el8_8.x86_64.rpm
85d52e13ec46bf12854732d25ff172a490426ba7775d4ede89b1961ac3ab08aa
libfdisk-devel-2.32.1-42.el8_8.i686.rpm
71bfa1d8c8188e4ecbc9a3f40925a62aa3bf6c5035f325f882abc172c2e59a63
libfdisk-devel-2.32.1-42.el8_8.x86_64.rpm
5c54d72aac0b7ffec31827af808e40db7e33e1c81c1d8923c6ad15ae379d09fb
libmount-2.32.1-42.el8_8.i686.rpm
863f81df5ec791921af4e2c3da6004ecbe58addaf5f8c5dfe4d73f3decbb4dd9
libmount-2.32.1-42.el8_8.x86_64.rpm
a342297a82824e38c8c99738fac77a6c1f6606620998c7758689680497c246c7
libsmartcols-2.32.1-42.el8_8.i686.rpm
52297e6f13a6c1ef4d3df1f37d576b2b32d02da6602709534c1b922a034aadff
libsmartcols-2.32.1-42.el8_8.x86_64.rpm
01c742e55f7e8dc55dc6b6841912046327dd742025d9ee055b0c829435b9e5c8
libsmartcols-devel-2.32.1-42.el8_8.i686.rpm
f8cc9aa56dc0a7989a71d8076c8cefb0c04d1db65e003fdce97f49a6c388dfe9
libsmartcols-devel-2.32.1-42.el8_8.x86_64.rpm
98874102c383c79d0bff5ea0c5050e9b3e2fd1d6199d9161de50094b543a6822
libuuid-2.32.1-42.el8_8.i686.rpm
ebad4f763eaca14d92311d436849f7961dd268640c4648782e798c755add7886
libuuid-2.32.1-42.el8_8.x86_64.rpm
9b9783cd011bc75e083378897f906a6d1310afa2487ebd22f05c1a5ce4cdd99d
libuuid-devel-2.32.1-42.el8_8.i686.rpm
0f0684f266e6507963f716de25fbe9326cdedaecc150e41a680300bda17eae25
libuuid-devel-2.32.1-42.el8_8.x86_64.rpm
bf5f3184a6875ec0c666fea2f30bb04d8c8ac595abc6800232a97c40123fd085
util-linux-2.32.1-42.el8_8.x86_64.rpm
846287e4f0b071cdf1d7ea79300ed5a129e2046b1ed78ce9d0c3331e8838b166
util-linux-user-2.32.1-42.el8_8.x86_64.rpm
6be8ddfa7592c194399ac6767aa53babd790f65ac1c1b9f583040c8a6196883a
uuidd-2.32.1-42.el8_8.x86_64.rpm
59ec3ad02024f82775f0d74966afef43ac551989375389b9f2ae6808272f5b4b
RLSA-2023:3106
Moderate: curl security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: FTP too eager connection reuse (CVE-2023-27535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Cannot upload files to Jscape SFTP server: file gets created empty (BZ#2188029)
none-baseos-rpms
curl-7.61.1-30.el8_8.2.x86_64.rpm
acc48a589455977d27eed5c9bdfc121d79e281566bb8b830fcd04055e801fdc6
libcurl-7.61.1-30.el8_8.2.i686.rpm
f3ecf662f73d9f7f4c67d780ddce2ab915179700d0a2aad4ab8fd41dfff5adb1
libcurl-7.61.1-30.el8_8.2.x86_64.rpm
60631ad8be454c5cdc9951a25ffc23c4ddbb7abfadb1743e42bebc4f1a2746c3
libcurl-devel-7.61.1-30.el8_8.2.i686.rpm
8ce07bbdb98d268177fb85284944aa6304bebb9a8cc146c030362808f3fc0c10
libcurl-devel-7.61.1-30.el8_8.2.x86_64.rpm
ebd163d53585a97281389ea65fe1adb6f03c1f9d86b7c55bb4466483191826c9
libcurl-minimal-7.61.1-30.el8_8.2.i686.rpm
4a098a38d44da07b7ffc45aa0817d4ff089e9e3cea63c5345fa9796139699d8b
libcurl-minimal-7.61.1-30.el8_8.2.x86_64.rpm
479730498fefe7003900ae47f44ade768b97ab46c0acfaefc3349db7022aa1ca
RLBA-2023:3414
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* unpackaged gives false positive about /usr/lib/jvm/java-*-openjdk-*.x86_64/bin/jfr (BZ#2169684)
* [Rocky Linux9] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2174254)
* [cee/sd][RFE]sosreport is not capturing ceph Orchestrator CLI outputs. (BZ#2116602)
* [Rocky Linux8] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2143272)
* sos subscription_manager plugin may collect proxy passwords (BZ#2177282)
* [virsh] may collect SPICE passwords in virt-manager logs (BZ#2184062)
* sosreport collect configs that contain plaintext passwords - /var/lib/iscsi/nodes/<IQN>/<PortalIP>/default (BZ#2187859)
* [powerpc]: This patch updates powerpc plugin to collect the slots and active memory sharing information (lsslot, amsstat) (BZ#2190176)
* Collecting logs for lparnumascore in IBM Power Systems (sos/sosreport) (BZ#2177984)
none-baseos-rpms
sos-4.5.3-1.el8.noarch.rpm
7f0a8ece1f9aef2b5284bb694100b677b74d6fa26017d106cc1d6d5e66be5b3f
sos-audit-4.5.3-1.el8.noarch.rpm
775fe1c26d95e93cb646eb46b0f9b89b9322f55e1be3e39a360e9d816165248f
sos-4.5.3-1.el8.noarch.rpm
7f0a8ece1f9aef2b5284bb694100b677b74d6fa26017d106cc1d6d5e66be5b3f
sos-audit-4.5.3-1.el8.noarch.rpm
775fe1c26d95e93cb646eb46b0f9b89b9322f55e1be3e39a360e9d816165248f
RLSA-2023:3584
Important: c-ares security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
c-ares-1.13.0-6.el8_8.2.i686.rpm
7206fa2dfd7a9759ede24b997d40b034705f677966d8573d9c4e65256abdd05f
c-ares-1.13.0-6.el8_8.2.x86_64.rpm
234a646e09c0d5ed88fcc961ecd0c16d8629310e4dd8faf726ba2ab8e9a696cf
c-ares-devel-1.13.0-6.el8_8.2.i686.rpm
e05cdf58ac82e2d8b1b03b2896409bc3efb528727eb03d7321aad107e05c7de5
c-ares-devel-1.13.0-6.el8_8.2.x86_64.rpm
664c60afd63cb17dce9fb651a024afb7bf0696a0e7e36d3983f87e2ac4205586
RLSA-2023:3591
Important: python3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm
7cef4e886c0a8034c2063b1e1ed8b1302164ae22b23b3d7a2c7ef50cea8904a4
python3-libs-3.6.8-51.el8_8.1.rocky.0.i686.rpm
24b9a67aa39d8611af7b4166413a0b7c19abe8b3227787e584a2f5e6119f6d35
python3-libs-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm
5ed2aa94bda97267c4aab0244dbdc08116625d29ff262dd171f850801fb77b43
python3-test-3.6.8-51.el8_8.1.rocky.0.x86_64.rpm
6a357f80622a93af11df32fdb2a21bfb9e978705cebe6ad29a74820922f1faec
RLEA-2023:3843
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-21216, CVE-2022-33196, CVE-2022-33972, and CVE-2022-38090. (BZ#2171233, BZ#2171258)
none-baseos-rpms
microcode_ctl-20220809-2.20230214.1.el8_8.x86_64.rpm
b7321f00c2334aa8d946906ba153fe1335c5db02e813ae5e034ecc588d25be22
RLBA-2023:3845
NetworkManager bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and
connections, attempting to keep active network connectivity when available. Its
capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and
PPPoE devices, as well as providing VPN integration with a variety of different
VPN services.
Bug Fix(es):
* NetworkManager brings down connection when the IPv6 link-local address is
removed (BZ#2209355)
* ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975)
none-baseos-rpms
NetworkManager-1.40.16-3.el8_8.x86_64.rpm
3c3387a026b5cefa5f308c00c3d4c10228123feceb3d1764d34f599e489dc8e1
NetworkManager-adsl-1.40.16-3.el8_8.x86_64.rpm
cd3c4a6b4203f3799c4af50991051f7f04a05b5f934454c63a27a666bb7b26aa
NetworkManager-bluetooth-1.40.16-3.el8_8.x86_64.rpm
13f1c87db578364f28fa3df071bb7e4320ad3a39b5649cbf7a0d81fa6551e7cd
NetworkManager-config-connectivity-redhat-1.40.16-3.el8_8.noarch.rpm
f555a68b7f7a51585c2e2292d108862b31b85209d3668c0e9c1678007cb79e34
NetworkManager-config-connectivity-redhat-1.40.16-3.el8_8.noarch.rpm
f555a68b7f7a51585c2e2292d108862b31b85209d3668c0e9c1678007cb79e34
NetworkManager-config-server-1.40.16-3.el8_8.noarch.rpm
eb4c373898ee5ffaffb55512fa494558d19a0dcfd937431cdb402178a6bf9fd8
NetworkManager-config-server-1.40.16-3.el8_8.noarch.rpm
eb4c373898ee5ffaffb55512fa494558d19a0dcfd937431cdb402178a6bf9fd8
NetworkManager-dispatcher-routing-rules-1.40.16-3.el8_8.noarch.rpm
157c9fa8363f772c6097d63fa65cc10ed18314dd5f2315835acc256916fece26
NetworkManager-dispatcher-routing-rules-1.40.16-3.el8_8.noarch.rpm
157c9fa8363f772c6097d63fa65cc10ed18314dd5f2315835acc256916fece26
NetworkManager-initscripts-updown-1.40.16-3.el8_8.noarch.rpm
7e6e14dc80f29ab22894c3f854fedd4973546c1713d98c6897b25b7d728f50fa
NetworkManager-initscripts-updown-1.40.16-3.el8_8.noarch.rpm
7e6e14dc80f29ab22894c3f854fedd4973546c1713d98c6897b25b7d728f50fa
NetworkManager-libnm-1.40.16-3.el8_8.i686.rpm
1d07f64f92977bc3ccae08459dc02fb8aebf2d7c63bb5f87d32aba2d88af8850
NetworkManager-libnm-1.40.16-3.el8_8.x86_64.rpm
93180594fc3bb3b9feabcf0868e3280913e6d892beab0da515697025441508d1
NetworkManager-ovs-1.40.16-3.el8_8.x86_64.rpm
aaf8acaf3476f548cfe9c19a34849a5f03eda60915d728a1d7665e876e63626c
NetworkManager-ppp-1.40.16-3.el8_8.x86_64.rpm
0f59747a4bbf59173431620ccb858f731a0449e6b73017048ad609d3d01b632d
NetworkManager-team-1.40.16-3.el8_8.x86_64.rpm
42eb2e62e209453022acf5a29a7f1a4af074b15218882718e9abfe2f10e64f81
NetworkManager-tui-1.40.16-3.el8_8.x86_64.rpm
3f2681ab79e4911cace0b71ddc5b37dd2c08dcb1b22cca7298c9a0935dcc01f2
NetworkManager-wifi-1.40.16-3.el8_8.x86_64.rpm
f4efaca57de9b22d34a82dcf802576aa4977345693fa63c8476ec2cef97e95af
NetworkManager-wwan-1.40.16-3.el8_8.x86_64.rpm
93f9f541352232ff80455168876a2c1f8df4024d50c449bb74b888ddd4686a80
RLBA-2023:3846
selinux-policy bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined
processes run on the system.
Bug Fix(es):
* systemd-pstore fails to start due to avc denial (BZ#2188268)
* Relabeling of /run/fsck (BZ#2212328)
none-baseos-rpms
selinux-policy-3.14.3-117.el8_8.2.noarch.rpm
7f6ad0f813879d1a51baaef4745c48cd432c147db3b72dcee814cb671635f3a3
selinux-policy-3.14.3-117.el8_8.2.noarch.rpm
7f6ad0f813879d1a51baaef4745c48cd432c147db3b72dcee814cb671635f3a3
selinux-policy-devel-3.14.3-117.el8_8.2.noarch.rpm
dd9e5f89926683ec01278f6f61f08ceadfd5041833c4220e1c7b265619515e20
selinux-policy-devel-3.14.3-117.el8_8.2.noarch.rpm
dd9e5f89926683ec01278f6f61f08ceadfd5041833c4220e1c7b265619515e20
selinux-policy-doc-3.14.3-117.el8_8.2.noarch.rpm
26d11647b989995b16ece5dedc1b58881c25019c88b1b48e895dc0f9c4d84451
selinux-policy-doc-3.14.3-117.el8_8.2.noarch.rpm
26d11647b989995b16ece5dedc1b58881c25019c88b1b48e895dc0f9c4d84451
selinux-policy-minimum-3.14.3-117.el8_8.2.noarch.rpm
42709415e373b719dd05d16041fd82b5dc5e90c9d8243e742b4bfeef9f76685a
selinux-policy-minimum-3.14.3-117.el8_8.2.noarch.rpm
42709415e373b719dd05d16041fd82b5dc5e90c9d8243e742b4bfeef9f76685a
selinux-policy-mls-3.14.3-117.el8_8.2.noarch.rpm
6762f3e25f7f9474012da46063831e81b81fcf1c0d9cc6e36b0845c7f79b3032
selinux-policy-mls-3.14.3-117.el8_8.2.noarch.rpm
6762f3e25f7f9474012da46063831e81b81fcf1c0d9cc6e36b0845c7f79b3032
selinux-policy-sandbox-3.14.3-117.el8_8.2.noarch.rpm
cc9920876bf370315c6b7646f5c547d6b2bf53a4bb3242550bd30b02199fe540
selinux-policy-sandbox-3.14.3-117.el8_8.2.noarch.rpm
cc9920876bf370315c6b7646f5c547d6b2bf53a4bb3242550bd30b02199fe540
selinux-policy-targeted-3.14.3-117.el8_8.2.noarch.rpm
609cffecdf4eb34c9f6fbf929c027afa97b9af645d911a1c60335c1a412bcf70
selinux-policy-targeted-3.14.3-117.el8_8.2.noarch.rpm
609cffecdf4eb34c9f6fbf929c027afa97b9af645d911a1c60335c1a412bcf70
RLSA-2023:3839
Moderate: libssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667)
* libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libssh-config-0.9.6-10.el8_8.noarch.rpm
3e5d27decdf556d137d933343df069c27646eddc24424daf0a955d734d0a9087
libssh-0.9.6-10.el8_8.i686.rpm
74b104452d737a90e9511976a70db9aa57d0587ea9fd205feeea5f8eaaf6af8b
libssh-0.9.6-10.el8_8.x86_64.rpm
32e82d5635e5334428b3aecec431cffc9bbca157e076d50b7fe74a4f62b0ae30
libssh-config-0.9.6-10.el8_8.noarch.rpm
3e5d27decdf556d137d933343df069c27646eddc24424daf0a955d734d0a9087
RLSA-2023:4102
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bind-export-devel-9.11.36-8.el8_8.1.i686.rpm
a2a7da7c00f99e7d9be809df39319bb22de7dcb0d418d077d0b8f2c59da5f340
bind-export-devel-9.11.36-8.el8_8.1.x86_64.rpm
6dad0c90d1cf3714e0db79138ca352e04f4c14035680e20f2b7f4481ca83f727
bind-export-libs-9.11.36-8.el8_8.1.i686.rpm
3f137110539884f3effd4dc6b63f2118d4e2856d8ea5fd25d9ed39ebac499f9d
bind-export-libs-9.11.36-8.el8_8.1.x86_64.rpm
407b106e5ceada938404e6aa0ef039de0e7b3eba1462d760b552270fada49a21
RLBA-2023:4279
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from
system hardware, logs, and configuration files. The information can then be
used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* sos report collects data from container instead of host due to symlinks  Triaged (BZ#2075720)
* sos report --clean doesn't obfuscate all MAC addresses. (BZ#2207562)
* RFE: embed Grub's "custom.cfg" and "user.cfg" in the sosreport (BZ#2213951)
* Exception raised by hpssm plugin in plug.setup(). (BZ#2216608)
* rebase sos to 4.5.5 in rhel8.8 and 9.2Â (BZ#2217943)
* sos clean - Respect permissions of sanitised files (BZ#2218279)
none-baseos-rpms
sos-4.5.5-2.el8.noarch.rpm
5cd5a9aef2b3a62a5e1a27c419b5113af2b62c3f8323aa8875eedad8343727a0
sos-4.5.5-2.el8.noarch.rpm
5cd5a9aef2b3a62a5e1a27c419b5113af2b62c3f8323aa8875eedad8343727a0
sos-audit-4.5.5-2.el8.noarch.rpm
d0f18c4d5e5b388aac649b277d7313885af6bbdc61b5ae7d62c3c56d2f487e98
sos-audit-4.5.5-2.el8.noarch.rpm
d0f18c4d5e5b388aac649b277d7313885af6bbdc61b5ae7d62c3c56d2f487e98
RLSA-2023:4419
Important: openssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssh-8.0p1-19.el8_8.x86_64.rpm
2c58374f216094e48f1bbdc133da6aa319be6b7167716a73c31c3da4bc9be8e0
openssh-cavs-8.0p1-19.el8_8.x86_64.rpm
b5aa8acc3e3ce9e4daffb80915c2952fd4e18e4ce216c1f2be7a161afd2d0845
openssh-clients-8.0p1-19.el8_8.x86_64.rpm
90251af532a5d669ade3fcbf7ff056f973d875eadcb72f09dd5872992f0217ba
openssh-keycat-8.0p1-19.el8_8.x86_64.rpm
5c41c4fbecacedf7f6de31200ec18377dcabd3d2cb46155a97b3ed556e4fad52
openssh-ldap-8.0p1-19.el8_8.x86_64.rpm
f70ca5500dd837422161084a4079e7b7a56a5f9f388b5d978b2e07a7b3b02139
openssh-server-8.0p1-19.el8_8.x86_64.rpm
1bc8eedaa97f533b2d1d111880ef0ad0b5f781690221f139e7307f3f3bc1ea0b
pam_ssh_agent_auth-0.10.3-7.19.el8_8.x86_64.rpm
8f8317833a6587acd89d4eb33a02787a7d3761edcd875845e2dc9771937fd3f7
RLSA-2023:4498
Moderate: dbus security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for dbus.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility.
Security Fix(es):
* dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
dbus-1.12.8-24.el8_8.1.x86_64.rpm
38407d4952fe8ad950c9bbae15503e654cd70db8541ad363a4863d32a520aafb
dbus-common-1.12.8-24.el8_8.1.noarch.rpm
51ab0fbbd3337ca006d0b4febe7f4b916195538845c87a8bbf1dddd9f9962f9c
dbus-common-1.12.8-24.el8_8.1.noarch.rpm
51ab0fbbd3337ca006d0b4febe7f4b916195538845c87a8bbf1dddd9f9962f9c
dbus-daemon-1.12.8-24.el8_8.1.x86_64.rpm
6b34fb72c2040d12c830919b778b55632d6dd89920fb679840bb8b97cfedc9e3
dbus-libs-1.12.8-24.el8_8.1.i686.rpm
ef1026cb8494b51704a01e6bf1f8415cafaa6dde906f2b917a09c479a8248c8c
dbus-libs-1.12.8-24.el8_8.1.x86_64.rpm
8922139e41914d3e70f3d16ca1014ea5c0c0da1e8e56f8a86cc2e539578f46cc
dbus-tools-1.12.8-24.el8_8.1.x86_64.rpm
6fc0218d86028b406b33a80335167b034369fb21d97127e8a747435e77b282f7
RLSA-2023:4524
Moderate: libcap security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities.
Security Fix(es):
* libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603)
* libcap: Memory Leak on pthread_create() Error (CVE-2023-2602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libcap-2.48-5.el8_8.i686.rpm
d257aae22a759dec9a6507b7d197c78693607aac9db41c6c1970fd3500046215
libcap-2.48-5.el8_8.x86_64.rpm
03346a85df04d758f3ac53715fc17ff5c1c448f8c9261b25b6de50c4c1d40a90
libcap-devel-2.48-5.el8_8.i686.rpm
2709321f880da88efa54577c2aac4358e7b71027bcc70e787d6b3dda0a47cda2
libcap-devel-2.48-5.el8_8.x86_64.rpm
0fa9ad15ae590cbb87a701154206a6c033f68595f79ffb9b6ce10162d199f1f9
RLSA-2023:4520
Moderate: python-requests security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-requests package contains a library designed to make HTTP requests easy for developers.
Security Fix(es):
* python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-requests-2.20.0-3.el8_8.noarch.rpm
b9245956faa62d6e4dd443679dd3aefd437c2510a3558a4a8772e50c6b5abeb0
python3-requests-2.20.0-3.el8_8.noarch.rpm
b9245956faa62d6e4dd443679dd3aefd437c2510a3558a4a8772e50c6b5abeb0
RLSA-2023:4706
Important: subscription-manager security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform.
Security Fix(es):
* subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
rhsm-icons-1.28.36-3.el8_8.rocky.0.1.noarch.rpm
7424b2d3e9d10f0a1c2c18bfe80b60f635d4dc924a8ac942a67f0574e041692f
subscription-manager-cockpit-1.28.36-3.el8_8.rocky.0.1.noarch.rpm
6c04f3fc34a4cc4a8ad23a5ec1f19f496cd4974266d4540e1e17d520f77457e2
dnf-plugin-subscription-manager-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
5ce9406a1a2a01c737fc3c758a62afb9907d5ddff6586bd761457ffd3007902d
python3-cloud-what-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
368136a4320e82eed9faf7523627fde7d50169876d4b22d24f27cb7950f41a9d
python3-subscription-manager-rhsm-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
35d4c9375dcd2c5019ea89b60b6e19fd97e074f607e44687182f80b5ea8cce7b
python3-syspurpose-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
7c2168df6cc6c20a530f181e57ec820e64871e065afd6ff52bb5c77e1b7dc11d
rhsm-icons-1.28.36-3.el8_8.rocky.0.1.noarch.rpm
7424b2d3e9d10f0a1c2c18bfe80b60f635d4dc924a8ac942a67f0574e041692f
subscription-manager-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
7df41f6733196406fdffe000de2f286d74254b0c9282a9ef6bcf3807f04856d9
subscription-manager-cockpit-1.28.36-3.el8_8.rocky.0.1.noarch.rpm
6c04f3fc34a4cc4a8ad23a5ec1f19f496cd4974266d4540e1e17d520f77457e2
subscription-manager-plugin-ostree-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
c91841fc3658813f9e60923051d75dc125f42606b8ef4750541e5da37d388d41
subscription-manager-rhsm-certificates-1.28.36-3.el8_8.rocky.0.1.x86_64.rpm
2fc6611d6fef46747eb6550403477c9bbdb842e45b7a922fc2b1caabf032e4a9
RLSA-2023:3837
Moderate: systemd security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd: privilege escalation via the less pager (CVE-2023-26604)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153)
none-baseos-rpms
systemd-239-74.el8_8.2.i686.rpm
40869c6516ba471e408bd9294b02dad770750aae0ae76332ff6e897222583968
systemd-239-74.el8_8.2.x86_64.rpm
f5c0c0bb29c22dd20464c1a0a82281b8a527049451c622dea7bfd5178385ab44
systemd-container-239-74.el8_8.2.i686.rpm
aead60e559af8890b0c4bbb484cd8f18185077feb265e15cc0d6811769d655c3
systemd-container-239-74.el8_8.2.x86_64.rpm
ce9ae4c06744939d95a82cfd9aa11e3f06b34b395077ab8f33db586abf60f9d4
systemd-devel-239-74.el8_8.2.i686.rpm
b0b3e905868ae78f7f7bcb3927adb35ee28069793fc04e27f101e3b51defc4be
systemd-devel-239-74.el8_8.2.x86_64.rpm
9d9df9dba19c3b54d01cfa3e8af2f85b085c4adbdbb10cff86e1a309b10aef3a
systemd-journal-remote-239-74.el8_8.2.x86_64.rpm
11988db91850a7327f3594c9015803fd5d43dbf9e589a14159126aeb49a772de
systemd-libs-239-74.el8_8.2.i686.rpm
59333157053f2ee8f36b25771a741880e18a46168201cff1ad5f974861a18092
systemd-libs-239-74.el8_8.2.x86_64.rpm
a2404adcb2093e95175347d6dba5adb9dc3f238d59b05bc2446808c3a81d2990
systemd-pam-239-74.el8_8.2.x86_64.rpm
b9de5be50e984974c931af5e5573acb9362ed6cc03eb9ef54d18217728fb0281
systemd-tests-239-74.el8_8.2.x86_64.rpm
4274fbfefcc4a02924abdd8563d7f8a89e143f41d3e3a069d785765c6894a9d1
systemd-udev-239-74.el8_8.2.x86_64.rpm
1d178c05c674ef26b989acb60351e17209cd6268f9b971889900ee2d14419c7f
RLSA-2023:3840
Moderate: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Crash due to misuse of window functions. (CVE-2020-24736)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sqlite-3.26.0-18.el8_8.i686.rpm
0a19cd54f42e55a5221cb5878cc7bdbde49f04e69df8ec2af7569306d31a0938
sqlite-3.26.0-18.el8_8.x86_64.rpm
4d18fd348ad2f74837b4a374944be867bfcec5032712a1f6e19bc452c011b5c5
sqlite-devel-3.26.0-18.el8_8.i686.rpm
378a5b558f76cd548904baaafe484d98a48f1451a1a1dd96faf8214fc43aab03
sqlite-devel-3.26.0-18.el8_8.x86_64.rpm
65f8be498216141278088dc39b92bdc6bb6d2aaff11c213e56fb3689ff7a62ec
sqlite-doc-3.26.0-18.el8_8.noarch.rpm
37bf72b866e31176a58ad1187061e3ce2ade2a2829677ca7d15a2ee3f5b7d4de
sqlite-doc-3.26.0-18.el8_8.noarch.rpm
37bf72b866e31176a58ad1187061e3ce2ade2a2829677ca7d15a2ee3f5b7d4de
sqlite-libs-3.26.0-18.el8_8.i686.rpm
9d3c2e91d46ed833f4794e67a848e3654335060b28255c9fb4bfdbd049346d21
sqlite-libs-3.26.0-18.el8_8.x86_64.rpm
c7e863ac7809aca4a4333168ce561a35f1fd0af67814a30b1f34e5bed2cd786b
RLBA-2023:3841
kexec-tools bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec
feature either on a normal or a panic reboot. The kexec fastboot mechanism
allows booting a Linux kernel from the context of an already running kernel.
Bug Fix(es):
* [FJ8.6 Bug]: makedumpfile fails for crash dumps collected by Fujitsu's
firmware dump tool when 5-level paging is enabled (BZ#2189377)
none-baseos-rpms
kexec-tools-2.0.25-5.el8_8.1.x86_64.rpm
a9143d1ec54df01b7403a0868f283447b519694c789616d92cafc2274494c718
RLBA-2023:3844
xfsprogs bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsprogs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xfsprogs packages contain a set of utilities to administer the XFS file
system, including the mkfs.xfs utility to construct an XFS file system.
Bug Fix(es):
* xfsprogs: ignore autofs mount table entries (BZ#2208391)
none-baseos-rpms
xfsprogs-5.0.0-11.el8_8.i686.rpm
52c7004a98be744a36dcded0805c6f48707c632cf0521c61a5d848775bed05ce
xfsprogs-5.0.0-11.el8_8.x86_64.rpm
c7b665830ac3b6dda773a184d3e50a6ff7ef653ec7e8e0374e4aa7b62197401f
xfsprogs-devel-5.0.0-11.el8_8.i686.rpm
21fc51b3e1af4a012114ee66093d5a98009ede4f72a365c164c762d3bf33aad4
xfsprogs-devel-5.0.0-11.el8_8.x86_64.rpm
fa8169513174f354ea5363aabf835bd081a591b11aab7f6b9d931887c609f89c
RLSA-2023:3847
Moderate: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332)
* iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092)
* HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305)
* kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623)
* Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595)
* block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236)
* xfs: deadlock in xfs_btree_split_worker (BZ#2196390)
* Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665)
* Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214)
* mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564)
* Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284)
Enhancement(s):
* Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604)
none-baseos-rpms
bpftool-4.18.0-477.15.1.el8_8.x86_64.rpm
31f0bab3bc56411a29d2c29406f77d56bbe45da5aab525cc37e392b54b18661d
kernel-4.18.0-477.15.1.el8_8.x86_64.rpm
f65cbf162d9da3705e0c1fc153a9f9ce9b2f18eb16e8df810addf0caf7d084ed
kernel-abi-stablelists-4.18.0-477.15.1.el8_8.noarch.rpm
4b57da1f93ac79480252481b3447f34b1ff62e9d62d2a0c2d11b691fdd871ed1
kernel-abi-stablelists-4.18.0-477.15.1.el8_8.noarch.rpm
4b57da1f93ac79480252481b3447f34b1ff62e9d62d2a0c2d11b691fdd871ed1
kernel-core-4.18.0-477.15.1.el8_8.x86_64.rpm
4bd3872fa3e92f0c061e42c0555e33c42fe058625cde325a4c6920e31af33f3b
kernel-cross-headers-4.18.0-477.15.1.el8_8.x86_64.rpm
7f7a03e72e88a2080da54f26014a387cd0fba7066342a32c892fb96a43267817
kernel-debug-4.18.0-477.15.1.el8_8.x86_64.rpm
b6f107e61eab93ced3b569e83da69a5b661e380849d7467c5792ae9b653557f8
kernel-debug-core-4.18.0-477.15.1.el8_8.x86_64.rpm
2d1ed30002c7a7375e409c3f0c2a5d1ea705e53c9247d2cd0a3c091738030567
kernel-debug-devel-4.18.0-477.15.1.el8_8.x86_64.rpm
d14f0db6c35d5390266bccd7b85d4aac8669718962f1446c43c4421a8282fcf0
kernel-debuginfo-common-x86_64-4.18.0-477.15.1.el8_8.x86_64.rpm
bcfd7f5177e05136b91eb411f922e7ce7233774647561ce138aa7abcc4f07586
kernel-debug-modules-4.18.0-477.15.1.el8_8.x86_64.rpm
857dac18b8fb83df9a79a4e2df40747a4794c59f5cac48fce4dcbe206147fe77
kernel-debug-modules-extra-4.18.0-477.15.1.el8_8.x86_64.rpm
ad39cfb35b841bf8e99cc09348632b6446cba9bafc32b19557c178539b81601d
kernel-devel-4.18.0-477.15.1.el8_8.x86_64.rpm
93ac0fcd613a08cfa60944ce68b29446d72ed221b1963fde10a1804a35d83921
kernel-doc-4.18.0-477.15.1.el8_8.noarch.rpm
043697866fe6d669b7208572774446c3534f6783578414487bf872ee7ecb10bd
kernel-doc-4.18.0-477.15.1.el8_8.noarch.rpm
043697866fe6d669b7208572774446c3534f6783578414487bf872ee7ecb10bd
kernel-headers-4.18.0-477.15.1.el8_8.x86_64.rpm
1d11184442c5e39e462eefd22528ff73e9a35f5f7b7dd6c768147c3b9f19f216
kernel-modules-4.18.0-477.15.1.el8_8.x86_64.rpm
9ec60a5e0b22b35ef6630aec0e9dcaee0ff0dcb5ff9c67758e48bf37c54e6631
kernel-modules-extra-4.18.0-477.15.1.el8_8.x86_64.rpm
0418bd721377d0cc73956ee0a35ded8912b08ce2f0618f064840ff3debf5d8b5
kernel-tools-4.18.0-477.15.1.el8_8.x86_64.rpm
381be8353d2f9cf60bae9c45ba94d8fa78bc87557286c645177cd5e072e4b965
kernel-tools-libs-4.18.0-477.15.1.el8_8.x86_64.rpm
8acd0b35d1101bb1c65e7b3b2a1ac0ba28629d1f1bd83720e948421b11c1522a
perf-4.18.0-477.15.1.el8_8.x86_64.rpm
9529f411f361c081e264b0b58f01488e8390dc77e9dba18eddd710ef056240cb
python3-perf-4.18.0-477.15.1.el8_8.x86_64.rpm
38928b9b3fa33b1ea0add71a9dd05d25c8398653df5a9cbd7784c9d8bf5e4f52
RLBA-2023:3848
autofs bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The autofs utility controls the operation of the automount daemon. The daemon
automatically mounts file systems when in use and unmounts them when they are
not busy.
Bug Fix(es):
* autofs fails to start with combination of +auto.master and local direct map
lookups after upgrading to 5.1.4-93.el8 (BZ#2212588)
none-baseos-rpms
autofs-5.1.4-102.el8_8.2.x86_64.rpm
a2b81c1c0ede5325f5bd6846335659938493b8a6c71ff5799d664ffbabdc2456
RLEA-2023:3849
iproute bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iproute packages contain networking utilities, such as ip and rtmon,
designed to use the advanced networking capabilities of the Linux kernel.
Bug Fix(es):
* macvlan: Add bclim parameter (BZ#2209687)
none-baseos-rpms
iproute-5.18.0-1.1.el8_8.x86_64.rpm
9f857d270bc15d9081991e4b2b05aa90536212d1e722a4412fe84ca393697c76
iproute-tc-5.18.0-1.1.el8_8.x86_64.rpm
8708f0a4803cd55b0bf5545d3011bcca84b841006fc02774d2adb0231eeec5c8
RLEA-2023:3850
krb5 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Bug Fix(es):
* CVE-2022-37967: MS-PAC extended KDC signature (BZ#2211390)
none-baseos-rpms
krb5-devel-1.18.2-25.el8_8.i686.rpm
03c1ccd57eb9c18ca8cee7c684aeac5e7004455ef08099b732eb318bb665c89a
krb5-devel-1.18.2-25.el8_8.x86_64.rpm
b593c9ff18319e6bfa529dab8cacd18adf570af83a7b9d1b84f30bed7f201b37
krb5-libs-1.18.2-25.el8_8.i686.rpm
bf5ed1d0012dea4c390aceb4f24614e1026263e01e056c7ecab6901414ec14b1
krb5-libs-1.18.2-25.el8_8.x86_64.rpm
da59dccea54a76ec61593956a17270d6167157e13853571475b78ecc55b797dd
krb5-pkinit-1.18.2-25.el8_8.i686.rpm
ac89bb2d0f39cfb5b1707093585be1e9fd10d1d3508a0a8aa0222cb12b7316a4
krb5-pkinit-1.18.2-25.el8_8.x86_64.rpm
47b1726fd7869fe2ef0f8c68d796411484edb306137884d2a59bc8556fbe9516
krb5-server-1.18.2-25.el8_8.i686.rpm
8161830b21537b2d27384b3d70ece33d84c40dfd7a920cea517347cb3a2fa3dd
krb5-server-1.18.2-25.el8_8.x86_64.rpm
677c6f39dae4dfc0feca4d46326ecdc1104f782f1f8330dfbb9fcd8bf4f1cbf6
krb5-server-ldap-1.18.2-25.el8_8.i686.rpm
9ae83aa260394039acb447bab1ec0bd84ef529c9f61416e8eb9751cc4bbf3f25
krb5-server-ldap-1.18.2-25.el8_8.x86_64.rpm
00ebd45b1a2223546ba8b3af006a80e1e4f8ac4bb7eae925d3add5446c78c202
krb5-workstation-1.18.2-25.el8_8.x86_64.rpm
e2ab12b140fb394d6e89895e4d86404bff9955ad884a1c4731597c458f3a7a4c
libkadm5-1.18.2-25.el8_8.i686.rpm
ecb572fcf461ce5c9dbfaf11dcdfb32b4e5df78a0d7acbe297991983c0f4fccc
libkadm5-1.18.2-25.el8_8.x86_64.rpm
04038f0aec588ba6ea7b0f458699aa8bac736d31ebd6978342421a1d50c579c7
RLSA-2023:4864
Important: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Information leak through Cups-Get-Document operation (CVE-2023-32360)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
cups-libs-2.2.6-51.el8_8.1.i686.rpm
32a644db5dade8172035a292d71898bbe373e30d67602b2e0a1128b02c4c64d7
cups-libs-2.2.6-51.el8_8.1.x86_64.rpm
5543d528c6c9a2b3593455fa400bb95e88980a71e271460f157d4612a0dac927
RLBA-2023:4880
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* The sos report does not gather /etc/grub2-efi.cfg when present. (BZ#2218563)
* Add ovn-ic related changes for OCP 4.14. (BZ#2226682)
* [rebase] Release sos-4.5.6 to 8.8 and 9.2. (BZ#2226724)
none-baseos-rpms
sos-4.5.6-1.el9.noarch.rpm
6e76ee567dfe8338aeeaf096ae871f8a2e4974fe59dd5f2337d666e2df8cb7e3
sos-4.5.6-1.el9.noarch.rpm
6e76ee567dfe8338aeeaf096ae871f8a2e4974fe59dd5f2337d666e2df8cb7e3
sos-4.5.6-1.el9.noarch.rpm
6e76ee567dfe8338aeeaf096ae871f8a2e4974fe59dd5f2337d666e2df8cb7e3
sos-4.5.6-1.el9.noarch.rpm
6e76ee567dfe8338aeeaf096ae871f8a2e4974fe59dd5f2337d666e2df8cb7e3
sos-audit-4.5.6-1.el9.noarch.rpm
c800188c02fe91f1ac8f5596cbd8a6dc404b21b737acdc628891f16692956310
sos-audit-4.5.6-1.el9.noarch.rpm
c800188c02fe91f1ac8f5596cbd8a6dc404b21b737acdc628891f16692956310
sos-audit-4.5.6-1.el9.noarch.rpm
c800188c02fe91f1ac8f5596cbd8a6dc404b21b737acdc628891f16692956310
sos-audit-4.5.6-1.el9.noarch.rpm
c800188c02fe91f1ac8f5596cbd8a6dc404b21b737acdc628891f16692956310
sos-4.5.6-1.el8.noarch.rpm
f47f98ca59d2b49077d1894cd6e92df557dbfc2edcd8d3f66dddfc8652e7f0f7
sos-4.5.6-1.el8.noarch.rpm
f47f98ca59d2b49077d1894cd6e92df557dbfc2edcd8d3f66dddfc8652e7f0f7
sos-audit-4.5.6-1.el8.noarch.rpm
56078dba10109b53639db2f7da13d8fdb2ef539f9b609f1ee496b714ffeb2987
sos-audit-4.5.6-1.el8.noarch.rpm
56078dba10109b53639db2f7da13d8fdb2ef539f9b609f1ee496b714ffeb2987
RLEA-2023:4995
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20230214 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2229733)
none-baseos-rpms
microcode_ctl-20220809-2.20230808.2.el8_8.x86_64.rpm
654d83a81df8bb19c4272895188b860a23551bb0fbc5f5828d672ffab68ddbaf
RLBA-2023:5354
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Adding Huawei UltraPath commands to sos package (BZ#2187407)
* sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2217906)
* sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2218873)
* Discovery plugin no longer captures data. (BZ#2222134)
none-baseos-rpms
sos-4.6.0-2.el8.noarch.rpm
9217d56c722350a4c2fcf26c9ddeec2a08b2bef49c2c5263bc7c0970508bae9f
sos-4.6.0-2.el8.noarch.rpm
9217d56c722350a4c2fcf26c9ddeec2a08b2bef49c2c5263bc7c0970508bae9f
sos-audit-4.6.0-2.el8.noarch.rpm
67423124c974cf93feee2d9371a89ecfd17ca923daecb0889b9d6b297dfc4c4c
sos-audit-4.6.0-2.el8.noarch.rpm
67423124c974cf93feee2d9371a89ecfd17ca923daecb0889b9d6b297dfc4c4c
RLSA-2023:5455
Important: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911)
* glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527)
* glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806)
* glibc: potential use-after-free in gaih_inet() (CVE-2023-4813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-2.28-225.el8_8.6.i686.rpm
a530d5caa3f5ea5cee0979271424cf41a3b2be85254ea1f544a71eedaa4ad0ee
glibc-2.28-225.el8_8.6.x86_64.rpm
a96bcc58d06d8d334a76c319f13838fef91076fa67f6604a14b4efa262e053ad
glibc-all-langpacks-2.28-225.el8_8.6.x86_64.rpm
f336846f49001b0f0edfd220019bde0e0b311eed177fd9d2d9991b1372101604
glibc-common-2.28-225.el8_8.6.x86_64.rpm
eb85418d717b3bbab49967a29ea6db2b92295825343e37cb27e0b41cf4f95177
glibc-devel-2.28-225.el8_8.6.i686.rpm
98c7cdba7125a5f0c51609c5237c057ae71df123d4c6c2740a6fdc2f2f349cd0
glibc-devel-2.28-225.el8_8.6.x86_64.rpm
85257bd86b8947ac1f81844580dce18f6edea550815c1b60a0345dfe72621eb2
glibc-doc-2.28-225.el8_8.6.noarch.rpm
0d2c33d3ad73b6049df6396e1691aa379ded166ada58801e971528be28ab0529
glibc-doc-2.28-225.el8_8.6.noarch.rpm
0d2c33d3ad73b6049df6396e1691aa379ded166ada58801e971528be28ab0529
glibc-gconv-extra-2.28-225.el8_8.6.i686.rpm
52ea7824fd0536585c1983fa4580acd804ea30092b2d74d48f215e532333ba5b
glibc-gconv-extra-2.28-225.el8_8.6.x86_64.rpm
909561e9ef8aa5934ba851f703343f0800a8baedd58d6422fb9103062c1d314e
glibc-headers-2.28-225.el8_8.6.i686.rpm
15390a798c2fc10371bf985df5ac86b6e149772a6c2cd2ed8d283569ba3968ac
glibc-headers-2.28-225.el8_8.6.x86_64.rpm
6c7eb8e719d9ddddea4ecdfbdb8998f07fa49bf7312e23327c427abc6fa6829a
glibc-langpack-aa-2.28-225.el8_8.6.x86_64.rpm
a8193c0429573de931e2eb36b14498905920bd3dc463b7d46a1abefa62e787a3
glibc-langpack-af-2.28-225.el8_8.6.x86_64.rpm
fce7bda507e02c956533783846da125fc6a917760f0f59822de34be01800f84d
glibc-langpack-agr-2.28-225.el8_8.6.x86_64.rpm
574462a933893023670b5fd6630ebd42d7117700953b13f06d8bbee892b3c86f
glibc-langpack-ak-2.28-225.el8_8.6.x86_64.rpm
78b9f2cbfb413130a25a4e11068c70a11d444b8c8791f3a6139c8f639aa648b1
glibc-langpack-am-2.28-225.el8_8.6.x86_64.rpm
380d974ee68f5a663d24b5d42eeb613972e8d702d49cb2c82d86605f59b75096
glibc-langpack-an-2.28-225.el8_8.6.x86_64.rpm
27e0f3fc5cb57c10a71fed6143645ddc7bd061bc766e4350968d63cce5441a43
glibc-langpack-anp-2.28-225.el8_8.6.x86_64.rpm
68d4083ebfde5dcf11c689961535ab0d46abe7614df7d324bc0720cbae6071bb
glibc-langpack-ar-2.28-225.el8_8.6.x86_64.rpm
6bc5d8024b5c85347d7a4893d4d2ea5afcf2e3b471abdae21d1b97e406ac5fc0
glibc-langpack-as-2.28-225.el8_8.6.x86_64.rpm
c051144e5e66792899cc3aa1de2e2b857b3eddabfe01480019381fed7576c983
glibc-langpack-ast-2.28-225.el8_8.6.x86_64.rpm
85e903dbfc791a5e5f028b8861ca4dfe342ab76cd93ec15c946ad5179b71d597
glibc-langpack-ayc-2.28-225.el8_8.6.x86_64.rpm
dc98a4aa741cba5a6424c59bc6142560dd6da68480847f2bbc2bb75c90e4dee0
glibc-langpack-az-2.28-225.el8_8.6.x86_64.rpm
c4f1d791937898719fc53bd18f1642a915f929c810ebb7b1e1a7ca546c382246
glibc-langpack-be-2.28-225.el8_8.6.x86_64.rpm
44999b5c6fdcd67d9c09e7bb62cfceddd72d673fbbd92916aefdd3e80c42ec2e
glibc-langpack-bem-2.28-225.el8_8.6.x86_64.rpm
48f369f261149b15082c92a410ebae968473c83670c3f9a8a5f1b61e4a4ed0c4
glibc-langpack-ber-2.28-225.el8_8.6.x86_64.rpm
842c37f6a452cad775f80cd3d3e1a6c4b6963197a63e48336c1688c5c9dd664b
glibc-langpack-bg-2.28-225.el8_8.6.x86_64.rpm
c76cced954390504099b13e6c7e482b3841974a2b50d8f10f065f92d0aba1296
glibc-langpack-bhb-2.28-225.el8_8.6.x86_64.rpm
06e76903e067a2c53951b72235daa3b3d01066e5c45e7bea58190248ef030c94
glibc-langpack-bho-2.28-225.el8_8.6.x86_64.rpm
b35ad53943f31d3ee9d3f8d3a4d75e1b3dfa657873adfe2da94e17a6a52f6884
glibc-langpack-bi-2.28-225.el8_8.6.x86_64.rpm
925c94822a5b2cfa80d317a74f1abd2d11c7ad110428a3b2e979001ff406bede
glibc-langpack-bn-2.28-225.el8_8.6.x86_64.rpm
d292406fd5403de1446b55fded0bca33000e221775ec8fa1433a9ca2302e547d
glibc-langpack-bo-2.28-225.el8_8.6.x86_64.rpm
2c6fd690439f449ae5e51e7960ebd2e8f4fdba4e38144325d0c3fe62b8696d7b
glibc-langpack-br-2.28-225.el8_8.6.x86_64.rpm
088353552915adc50b7088e79e0d378c1018877da925fe17477afefdaed2f95b
glibc-langpack-brx-2.28-225.el8_8.6.x86_64.rpm
4653be2f7c81111e117144f42d8e3731cc8836ba5d31f2c2201e35d2781c5215
glibc-langpack-bs-2.28-225.el8_8.6.x86_64.rpm
494af6fe4f6ef1b13daf51f3f4f94878cd7adb6749636ca375b485e0f6a7efb9
glibc-langpack-byn-2.28-225.el8_8.6.x86_64.rpm
5f8c7d1a062e8dc61ecd24cd4f8ca020e134570f055e587dca95f605e9aca205
glibc-langpack-ca-2.28-225.el8_8.6.x86_64.rpm
6183b8a8c9f0bd4e89490cfc46b48a12f0a804271ccc00e06a763b5224cc26b3
glibc-langpack-ce-2.28-225.el8_8.6.x86_64.rpm
b54c5cb9adebfe3ce351c9954f16d5e46f3ab7d033f662c707409c02195a718c
glibc-langpack-chr-2.28-225.el8_8.6.x86_64.rpm
e301b500c0b5a31d92a8fa39101f3232b2736c206887b0f9ae45e02c314be423
glibc-langpack-cmn-2.28-225.el8_8.6.x86_64.rpm
40c8b072ac800b25f7fa00f2304ae7b55ffb89fea625f9f180d6ad837c8dab57
glibc-langpack-crh-2.28-225.el8_8.6.x86_64.rpm
3659180fd6d16ddb241f891694942f1350dd02a170d1545dfa4a9ff3f8d28b9d
glibc-langpack-cs-2.28-225.el8_8.6.x86_64.rpm
c3910be8ce5505c68e063f4f9271d38f707081d8ae13f6b13e7ede0acef657e7
glibc-langpack-csb-2.28-225.el8_8.6.x86_64.rpm
dda0b66d04173a89e18ead0ec97cb442168ff0ffc34c624f9331d16d685ecf9b
glibc-langpack-cv-2.28-225.el8_8.6.x86_64.rpm
15762f58b3f8577311cdfc43fdf07c3b7121367d7d414b501d3d9d27695b79e9
glibc-langpack-cy-2.28-225.el8_8.6.x86_64.rpm
7a2e6928d67c8a4d9b5ac03379efbe824910de0b0dd3c1dc8c1de2162477fd51
glibc-langpack-da-2.28-225.el8_8.6.x86_64.rpm
47104d79af0b336a813c23e2c8a0f1e978c8751013c7241c64b31487f0b6e5e7
glibc-langpack-de-2.28-225.el8_8.6.x86_64.rpm
372efdc3f332b71d39946a366cd7b134453fbdce82b3dbb3f4fd99be425db878
glibc-langpack-doi-2.28-225.el8_8.6.x86_64.rpm
00fe2db6fb22c3d104e3d8c26e8b1328f7fc04c5859830017fd109a56e7719c8
glibc-langpack-dsb-2.28-225.el8_8.6.x86_64.rpm
d3172bdfefb28621c81b15fe37f3e647145a345ce3920d28c573c7058f2d4dbe
glibc-langpack-dv-2.28-225.el8_8.6.x86_64.rpm
4ab842a38363d0e08e662a506628660028781280102d994c17618137d079c18d
glibc-langpack-dz-2.28-225.el8_8.6.x86_64.rpm
fdc498c441ba844df6972fa6d4e8663e693185ee7ff45924b5184746c00efd1b
glibc-langpack-el-2.28-225.el8_8.6.x86_64.rpm
643d70da5ea5aea17b29c1a70d281a9f2bf4e75f891bab186e7d5fe2d1119164
glibc-langpack-en-2.28-225.el8_8.6.x86_64.rpm
e50c5b78013f885b3aa03820452e89f5a201ec6de7c4acdb92ce2c50b95f5b92
glibc-langpack-eo-2.28-225.el8_8.6.x86_64.rpm
7bb756e4ea2550f91e0b7d472b46bdb6f6ae9416f0f1711a049a5a511b946389
glibc-langpack-es-2.28-225.el8_8.6.x86_64.rpm
87a859d740bade85ac5aebbf2d84ace9a59710b7443fb932e9fe66d23a2c2d77
glibc-langpack-et-2.28-225.el8_8.6.x86_64.rpm
f7bfac3de6c6a874d74e4ae1f3cf41175a7916b569d4a66d3e7bb1a38be48378
glibc-langpack-eu-2.28-225.el8_8.6.x86_64.rpm
48e521e1f9ca62e8639ed98895e0169c38b904b78669cc43a9c0c1ee2898ed06
glibc-langpack-fa-2.28-225.el8_8.6.x86_64.rpm
b8fc96437342d00097a350b41e09f9891bc0e0200d25fe831fe7676bf2ca686c
glibc-langpack-ff-2.28-225.el8_8.6.x86_64.rpm
4a0fc41ac90db32be7b8c49ba911f199ef2da3ce686e4f3717504e518e99a538
glibc-langpack-fi-2.28-225.el8_8.6.x86_64.rpm
e740cafffcdbafc99ffaf1116749b66684ac52184d75d27896b0bbc2a2d1d335
glibc-langpack-fil-2.28-225.el8_8.6.x86_64.rpm
653315ebd636c695236b8f1b79ae038262fe34476b1830e1533430632702522a
glibc-langpack-fo-2.28-225.el8_8.6.x86_64.rpm
ddc297c140b53043c2a444e66a8e82980b168a79405d2765d5e9040bd52313c7
glibc-langpack-fr-2.28-225.el8_8.6.x86_64.rpm
f19dc077c0190091631b5fd1a54a2bbddb03345fbb47294f3aaadf5aa1248677
glibc-langpack-fur-2.28-225.el8_8.6.x86_64.rpm
bde45f7976769fa1e560867a68d26cde4d34e4e534d69766e12b520965f99eef
glibc-langpack-fy-2.28-225.el8_8.6.x86_64.rpm
65a69b21dcf8e0bd1751520cc6d62c9c9414fdd05fa1ee76889e7e4cb2cab9c8
glibc-langpack-ga-2.28-225.el8_8.6.x86_64.rpm
4b5b37d47ded462e9e3436fc38efc25ebf922e274dd1397b340ea4be225a0b29
glibc-langpack-gd-2.28-225.el8_8.6.x86_64.rpm
f449869bdc7dde79ce5573aebaa3b9d7d66acd914e17aecf1c19ea3aff075ca5
glibc-langpack-gez-2.28-225.el8_8.6.x86_64.rpm
511f24a52b63296a6fafe018837865bd09b30f87e2db6ea93308c889566c9bd1
glibc-langpack-gl-2.28-225.el8_8.6.x86_64.rpm
9b4e49dec97ba1c17aec753b36719155d16dafeff7a21e3623cac883132d41e9
glibc-langpack-gu-2.28-225.el8_8.6.x86_64.rpm
e187de2c8f650ebbfe724cf39b44aa3f0f5030eff34ab9f1e4da69d44a8940c5
glibc-langpack-gv-2.28-225.el8_8.6.x86_64.rpm
d2455fcd0f92ed1d86f950d39755138675863c5d82874b22a2c1b1f2f3d8f18a
glibc-langpack-ha-2.28-225.el8_8.6.x86_64.rpm
cb149145050048eaf3aca36b6f1e7e3280e37b36cc8205371215a1e96ecc8a51
glibc-langpack-hak-2.28-225.el8_8.6.x86_64.rpm
3f1028cc04926d4c1920be522ecbfd58e462f57b01342aa997c8658b2a81aac9
glibc-langpack-he-2.28-225.el8_8.6.x86_64.rpm
9a59df052e3b9b3648cbd1eb9e4a9ac1c9619cfdf55b756b8a678b5b2d39c647
glibc-langpack-hi-2.28-225.el8_8.6.x86_64.rpm
36060c1484746bfe7ce4d7096bc291cf3bd21fda02f8168cc2edb8f71be315c0
glibc-langpack-hif-2.28-225.el8_8.6.x86_64.rpm
3b641b1ced439107c32cb2594689995e50a97bc362140e255566ba13cbaffd9e
glibc-langpack-hne-2.28-225.el8_8.6.x86_64.rpm
e0a4a41bb8fe2081e789a829a2139b4167014b62117d0cf9dfb733d01fef3d54
glibc-langpack-hr-2.28-225.el8_8.6.x86_64.rpm
fce670984e7dd4fb61eaad3d5ac012ed960802e472d68cead204e745be2b5435
glibc-langpack-hsb-2.28-225.el8_8.6.x86_64.rpm
f193ecc94675a6778c046dd3ca0a4fa5656e7827fe0b1900f044cff670fd4382
glibc-langpack-ht-2.28-225.el8_8.6.x86_64.rpm
e763c063306b93ab7e550d022bd0bee70d458e715d006992426367a3d2dd0a3a
glibc-langpack-hu-2.28-225.el8_8.6.x86_64.rpm
4ce68dedb9c832d1a005fbc297a0868d7ad3ec1f87818fc2efe8c91cfd772096
glibc-langpack-hy-2.28-225.el8_8.6.x86_64.rpm
576927b5e5f9915ebfef801f59aabe7a0b39fda36531b8fc246cc993c389d773
glibc-langpack-ia-2.28-225.el8_8.6.x86_64.rpm
0beeb985725bf0ae8092bd9c9bf5050811123831e95419b717e6420444fda36b
glibc-langpack-id-2.28-225.el8_8.6.x86_64.rpm
7cd6f1fc4ba92a2d3fa609fe4c984cef5519baf25a6e36d1cb32c13a51fd8e82
glibc-langpack-ig-2.28-225.el8_8.6.x86_64.rpm
8692525352ee73151963c8d499723348695ff97fdc8deaa4919a0b090a09420a
glibc-langpack-ik-2.28-225.el8_8.6.x86_64.rpm
3f5a3c55fbed82e172f3360e59b22629da787705a0999a5c58ded3e151f29d73
glibc-langpack-is-2.28-225.el8_8.6.x86_64.rpm
ea498f6d6be76a4c31049ff4cc0bf5b839535356693c7a568621863abaa156d1
glibc-langpack-it-2.28-225.el8_8.6.x86_64.rpm
5b0228bb27296f3ee1151c66a9e4191ad277b5cc5a7df4c9d9e54195b74ad472
glibc-langpack-iu-2.28-225.el8_8.6.x86_64.rpm
4b41dec8d1d10a91c1aa84758fb0ba0fecc68bdd58682ffdf578810047813bcc
glibc-langpack-ja-2.28-225.el8_8.6.x86_64.rpm
f6c923ef32fcce81ec8ed69febd319e83f458dd2da95118daef0753030549649
glibc-langpack-ka-2.28-225.el8_8.6.x86_64.rpm
4bb45a30e023e4bfcddcdbbea6ba96817e52c823c3b8f315b9e4c037b4e53bfe
glibc-langpack-kab-2.28-225.el8_8.6.x86_64.rpm
7c68fc66682c4c342594adf47567b258677554c105ea5277e366acc6ebd110b3
glibc-langpack-kk-2.28-225.el8_8.6.x86_64.rpm
b18a06d90e14868c29f5e6b79cd67e38cc25a27ebe8cee03e510d95280a0925b
glibc-langpack-kl-2.28-225.el8_8.6.x86_64.rpm
07fab5d54710ae9b56d1f1b1202f190b4e34cdb58ac32679a18177be06088ec6
glibc-langpack-km-2.28-225.el8_8.6.x86_64.rpm
1fcfe8b21bf3f7c8f6d0624a0ff212294053ae91812d17319d13bf0272176918
glibc-langpack-kn-2.28-225.el8_8.6.x86_64.rpm
164d4c9d5a290e46ff18550c56aadb7f330f7ddc5ad7978b28392874339c80d9
glibc-langpack-ko-2.28-225.el8_8.6.x86_64.rpm
4354cc4ac2c9463e15042fe9aea44e53757e7b88a53fbf614d0897abea8e9269
glibc-langpack-kok-2.28-225.el8_8.6.x86_64.rpm
99c30b1f16fc8d312f03dab4233434636c63d7fed061a22cd2b8170bbc9236ac
glibc-langpack-ks-2.28-225.el8_8.6.x86_64.rpm
14fb3b6cf1eb8db0ba95cc3cd06bbeaeeaca87bce3d947f72b0b67acc799facc
glibc-langpack-ku-2.28-225.el8_8.6.x86_64.rpm
5b10db154f4aa5f9a319acd5c10f4cc6c398c209337849da13389d1c065532dc
glibc-langpack-kw-2.28-225.el8_8.6.x86_64.rpm
bf0c3bce31ebfde1f3cafd2d1351493d7f2ad55366bdfb13476c1f85e79b480b
glibc-langpack-ky-2.28-225.el8_8.6.x86_64.rpm
2f557c8b992b6091ace8112b0269875d23d53eb7b00233ad809be6d7a44e796a
glibc-langpack-lb-2.28-225.el8_8.6.x86_64.rpm
4342b171a2ca7cd66b19b9739f8570f6b416258cbef07c82510739ef2942e0fb
glibc-langpack-lg-2.28-225.el8_8.6.x86_64.rpm
0c9199cfd88e2d75934e7a0c4c9151c6e1efb2d2efc3c063169a078157110b8d
glibc-langpack-li-2.28-225.el8_8.6.x86_64.rpm
f3ad4bcee4ad7e8b0be15db63f737904474c11deed27cd624ac399a429755342
glibc-langpack-lij-2.28-225.el8_8.6.x86_64.rpm
2b63511a575b09cc787af563c47807efe615c10e6a5f03a6172c37daa9155467
glibc-langpack-ln-2.28-225.el8_8.6.x86_64.rpm
20f19d53ac639025b897f6ad5697de6f1356e4c6e2cb4adfa595c3afa05515d6
glibc-langpack-lo-2.28-225.el8_8.6.x86_64.rpm
e3ada919bab425fdc188cd150ea9d5623ff7b054e3665d9443484f099be77ac8
glibc-langpack-lt-2.28-225.el8_8.6.x86_64.rpm
44799624e1f795d60c042b94160148f6cb6d56b706155e0143bdbbed6e489f47
glibc-langpack-lv-2.28-225.el8_8.6.x86_64.rpm
087ddae7196c9b45d5ef0cba0c964bb679d22eb89011bcc0ae4fb41df098d687
glibc-langpack-lzh-2.28-225.el8_8.6.x86_64.rpm
742760100f4c20e084d130d2b996b60bc4427386ed127d90ffc9712f8edcd61a
glibc-langpack-mag-2.28-225.el8_8.6.x86_64.rpm
d1620b1f3feedb5b32c9bac6c07b8a51e2efe7858b020cb3e1419d7743a7b4b2
glibc-langpack-mai-2.28-225.el8_8.6.x86_64.rpm
1e44fc5603a7547f9a4a56c469184f1b68bf4c91272090cc2267b8012f5c6d52
glibc-langpack-mfe-2.28-225.el8_8.6.x86_64.rpm
31067fc4bfbf3bb89ca0ab973ed807971afc4c7e354147d02ea0fa57394d3cec
glibc-langpack-mg-2.28-225.el8_8.6.x86_64.rpm
0051663124e8b2cfb0bfa63a18a8f309dc841aba7b66524ececbdf1d10e011fd
glibc-langpack-mhr-2.28-225.el8_8.6.x86_64.rpm
53a98611f8f8b6cb84c3db923a3678ab255f8873c042266bd7d9f9a412e100ba
glibc-langpack-mi-2.28-225.el8_8.6.x86_64.rpm
cad4c35698b57e1492c3d31560b542cedb6b94ee7731c0666cd4b9b256eddce6
glibc-langpack-miq-2.28-225.el8_8.6.x86_64.rpm
756a5dcbdfd4c26a8692fab0716b1a762ac1886bf0889cf0406a36a675c37ab9
glibc-langpack-mjw-2.28-225.el8_8.6.x86_64.rpm
67346f681cdcfd9ffb017852bc43db2cf272678fcff77163a87bef3d874de0dc
glibc-langpack-mk-2.28-225.el8_8.6.x86_64.rpm
f3c8d7fec374cfe19423141786e3e185784bf0848e2011e9ce8ca29f00bda770
glibc-langpack-ml-2.28-225.el8_8.6.x86_64.rpm
1ec720fb6cd199ff544d437d5abb664b552f9fee982f828f584b82ccfe1594e0
glibc-langpack-mn-2.28-225.el8_8.6.x86_64.rpm
94b6797a1c444ed0823d03fa74614479b40a75d60cd9b3c6dbb09b4238d34cdc
glibc-langpack-mni-2.28-225.el8_8.6.x86_64.rpm
2800bbfbe644ec4e5f56182026610bc65c91caba1cbae0258ba6d331c1d78156
glibc-langpack-mr-2.28-225.el8_8.6.x86_64.rpm
43a13514ede6dbd496171150448afebb2c885b39fe753ec9bf82212707507c75
glibc-langpack-ms-2.28-225.el8_8.6.x86_64.rpm
0a94e1d5886d5c32c0a8e71ff9a4daad6f1870907c0b71a9e8af1fc48c8d80e8
glibc-langpack-mt-2.28-225.el8_8.6.x86_64.rpm
d717aa500d3eee02cb0e8b4ef313a831574c47d26a2c56511b409b43a2afbf55
glibc-langpack-my-2.28-225.el8_8.6.x86_64.rpm
7113fff7ec5bd899fc582ce98cc62c8321bec8a1e5d41a8ce4c37c83ccebc294
glibc-langpack-nan-2.28-225.el8_8.6.x86_64.rpm
9844f3f957b4aba464f9582b0bc93f38d520081cf2ea3f3ade0999551f11b291
glibc-langpack-nb-2.28-225.el8_8.6.x86_64.rpm
ab5ca1d55202bde4170f920bbcc81bcd921bb3b841dc9e8d24ebcf9bf2c18bf3
glibc-langpack-nds-2.28-225.el8_8.6.x86_64.rpm
1bb920716ecee524aa0a42e37fc6a8f39e636161bb6a94c3226ad63144cb1d19
glibc-langpack-ne-2.28-225.el8_8.6.x86_64.rpm
8a9d797e5256bcdb27064289fa34ad3f7272416786fde8316fc057e76b60212a
glibc-langpack-nhn-2.28-225.el8_8.6.x86_64.rpm
bf1e7e41937d9fea34f3a28d3e9278019392ed51960d45bb7a8c00e7dfcd2813
glibc-langpack-niu-2.28-225.el8_8.6.x86_64.rpm
b1211a9cc01e159b452a2506451db8eb52d3227c78b73dfbda89506dc1d21133
glibc-langpack-nl-2.28-225.el8_8.6.x86_64.rpm
e8930cfad5f2a0de76973f794c1721e294b7d3a85fa507d5de8be4eee4b59227
glibc-langpack-nn-2.28-225.el8_8.6.x86_64.rpm
99d8fdfbbf9170f969faca0f7cd24e0fba5387aae8b520bd61614a2b6f32c12a
glibc-langpack-nr-2.28-225.el8_8.6.x86_64.rpm
65403ecc25d5644980e86bac5cc48d7194f60481aa954c059a40e0914d6775be
glibc-langpack-nso-2.28-225.el8_8.6.x86_64.rpm
6517f009fc6098c13955216832ab683421f7370979fab737cf252c0bffe1ac37
glibc-langpack-oc-2.28-225.el8_8.6.x86_64.rpm
48c451d2491820dc3b464d2207b11b040d27bd07b0ff699d503879df3fd383c0
glibc-langpack-om-2.28-225.el8_8.6.x86_64.rpm
c85c9b10abc5f10bf25cf1b00840fbaef901992650eb43b0b0d361b1de1530a8
glibc-langpack-or-2.28-225.el8_8.6.x86_64.rpm
0b447e08580e8f91c8a71dab03d71438e3d0d86986aeb4a779e7b138d091bbd4
glibc-langpack-os-2.28-225.el8_8.6.x86_64.rpm
c0ec891b7f65da69bae5962132d82305e8a886864e936a2f406c68b1109e3343
glibc-langpack-pa-2.28-225.el8_8.6.x86_64.rpm
a7bc31dd3e4711fde348f17a015618e9c405da1196cf30ffeef84cf30fede538
glibc-langpack-pap-2.28-225.el8_8.6.x86_64.rpm
383707e003cf12acc1373786f51572ab68515aebbf86a7bc24e8012be8a6f9df
glibc-langpack-pl-2.28-225.el8_8.6.x86_64.rpm
b9128ba5a2b06e951d4700477dacfaccedd0afad09c0fa8a2779cfe9492ffaba
glibc-langpack-ps-2.28-225.el8_8.6.x86_64.rpm
a96b498022f261186b0c65524ad20114e433548eab4c531f895e2248bf56a46c
glibc-langpack-pt-2.28-225.el8_8.6.x86_64.rpm
51ab34daac3e7b043acef093b5e82de0eda21943bac831ebb55f1b7a8faf025a
glibc-langpack-quz-2.28-225.el8_8.6.x86_64.rpm
1f96f9b6f9700b41f71c2c060a0e3ce6c726a25ec4b3ef5cdcdbbe0055538e6b
glibc-langpack-raj-2.28-225.el8_8.6.x86_64.rpm
0ee1c185f689d6512bd432d22aa48fb1793e1bcd676aff1a449d1003cfec32df
glibc-langpack-ro-2.28-225.el8_8.6.x86_64.rpm
99462f9e1fc96210f6b23de4cd20eeaaecf7d1cccd4698a99fdf2bdb1c4281cf
glibc-langpack-ru-2.28-225.el8_8.6.x86_64.rpm
a07d6ac3e9ff116a5adc2fbecd5dc242106187393949f913c9be44239f20b94a
glibc-langpack-rw-2.28-225.el8_8.6.x86_64.rpm
9ff46d171cca07fd7df6566114bca15335d1d8f22986930e4ac04ca704a668fe
glibc-langpack-sa-2.28-225.el8_8.6.x86_64.rpm
4934fbaa1d74bb7da2c962fb59f3c73e0bda043c9fefd0293113573d1f36389d
glibc-langpack-sah-2.28-225.el8_8.6.x86_64.rpm
15e12cf2e97db5fc5d4f9aa6790e70aea5778b9682f27407c9856ed4e8cc379d
glibc-langpack-sat-2.28-225.el8_8.6.x86_64.rpm
2fbb5d50453b60b237c1bf680392109b9bf491379aea423c7d3e1413e062fb1c
glibc-langpack-sc-2.28-225.el8_8.6.x86_64.rpm
cb67e5d776c197f436121d841b7b16d0dbb0f1942fa88fa2f31cd1112aa926ee
glibc-langpack-sd-2.28-225.el8_8.6.x86_64.rpm
1158f73ad54e4c2ec8df3edd92a010c447404d3c76c2f12f6d7f6844d9628c63
glibc-langpack-se-2.28-225.el8_8.6.x86_64.rpm
394a170ba0ff0555ec4d5905fd3fec581a6b2d27324cc153e9d7c8177760e7e0
glibc-langpack-sgs-2.28-225.el8_8.6.x86_64.rpm
1cd7029b298a4b42693783c965a6a2e5dfd518c0c5e69a2116b4d2e74357872e
glibc-langpack-shn-2.28-225.el8_8.6.x86_64.rpm
234329e061c2bbaade5db5a05a540c5fcdabde20ef8049236985fabc94d3e548
glibc-langpack-shs-2.28-225.el8_8.6.x86_64.rpm
5aeb489130fe8dd956e55bec77d5f9cb99829725ad022178cc5a3d48ca233037
glibc-langpack-si-2.28-225.el8_8.6.x86_64.rpm
18c5a1a6b3e064d5d7c5b04199002e5f37c40baf136e73d0a1830965c034d715
glibc-langpack-sid-2.28-225.el8_8.6.x86_64.rpm
2628b24eecde483c0022e1fa4dea95fb785347b5b3896b20e95110c8213a70e9
glibc-langpack-sk-2.28-225.el8_8.6.x86_64.rpm
ec54d5f336c72a3212778f1c0fd0be1c873bafa12e20c26f5b0ce1a3225e4a98
glibc-langpack-sl-2.28-225.el8_8.6.x86_64.rpm
2e574a37e5d61722e1ed06e844e1a0f774bc1a3b4f5340acd1569ab477b861f7
glibc-langpack-sm-2.28-225.el8_8.6.x86_64.rpm
9ff5ffa3df950fe98c7eb54aafa47d8af2c555709cb31bfd872452337166637e
glibc-langpack-so-2.28-225.el8_8.6.x86_64.rpm
c50d8dc9cfef9fccbb32624bd609452c2e214d9b4b5b7d8c292bc7fb4cb59386
glibc-langpack-sq-2.28-225.el8_8.6.x86_64.rpm
e425391e7ada79c289672aa295c7b0c66a88829c2b64ceb5ec70ca982f19dc42
glibc-langpack-sr-2.28-225.el8_8.6.x86_64.rpm
093b07e99c6308899ca01a538eb49e5b89730b153a1f8960ae3270788e753af1
glibc-langpack-ss-2.28-225.el8_8.6.x86_64.rpm
3b5a166cbb39d96f09f775fae61b85d37f6d5140250156a742fdb677eaee6c0f
glibc-langpack-st-2.28-225.el8_8.6.x86_64.rpm
68a8ff35796cc5d8cd00c4963b813e81ace2c43ad2533f4940053f2f7ccda447
glibc-langpack-sv-2.28-225.el8_8.6.x86_64.rpm
f2b12471ac7825ce1fdb460dbf5da3f6f03958c120e3570c31f39c47ff62297f
glibc-langpack-sw-2.28-225.el8_8.6.x86_64.rpm
cdc89efb4bab48069f5b2fadb64a643fc4cd50863b1163d05e84405a86439f73
glibc-langpack-szl-2.28-225.el8_8.6.x86_64.rpm
5e2c703e9f45cbeebdc46098e948316e6ebe674360e240b6806a7958c5e6cb0b
glibc-langpack-ta-2.28-225.el8_8.6.x86_64.rpm
ee10adb0b2854a41c16ebd3d9f336d69a21aedd96a3a839353e2cf5a80de08a9
glibc-langpack-tcy-2.28-225.el8_8.6.x86_64.rpm
f8d10280f6208e30368dc0f2d8dbe45ea7adbcfd421762c6610c15484354f0af
glibc-langpack-te-2.28-225.el8_8.6.x86_64.rpm
a8ff5e31d7cf192c9b4694dedb86417f757214b3bf1f9355d2dac825f8825b84
glibc-langpack-tg-2.28-225.el8_8.6.x86_64.rpm
137922a2530d414a3d303af77e1ea1b5496de024a612bfd12a0419df9a4a9f51
glibc-langpack-th-2.28-225.el8_8.6.x86_64.rpm
b66b6a20c479be1c59baa96adf9815019c32fc9836a2334a2f4a7891e9dbec3d
glibc-langpack-the-2.28-225.el8_8.6.x86_64.rpm
513ec9c727146da4a606644ac58114f9bee9056a1b00512258bbc59467fffd22
glibc-langpack-ti-2.28-225.el8_8.6.x86_64.rpm
f4425b7857b14fe8a2426d8ba5860ada374bb0c5444654f6fe05cdd59fe3096c
glibc-langpack-tig-2.28-225.el8_8.6.x86_64.rpm
376aaaafc05b607e79e546b2f95f1c12ebf2f8e8ae75072c945ef9b24a63b501
glibc-langpack-tk-2.28-225.el8_8.6.x86_64.rpm
0808373a62453114d9727285b8b11ebfb1053c944a0a03e43d28617d9cdac77f
glibc-langpack-tl-2.28-225.el8_8.6.x86_64.rpm
4b33fedb514a607a392fd2211ea0b818bff8fae5c15245af5c69ddc976b87f1a
glibc-langpack-tn-2.28-225.el8_8.6.x86_64.rpm
450de7f33f254f049bdacac877a007d1c6bd95b0bcebb2767bc09490462522d3
glibc-langpack-to-2.28-225.el8_8.6.x86_64.rpm
5d0809d12b8a497b309b6d9892a9c77d4cfcc2e01cff64f291d7063ec2b5eca2
glibc-langpack-tpi-2.28-225.el8_8.6.x86_64.rpm
b910838f46e6da6fc3cf2cc1303139d1f1fe122e0342a5f3aa8657a13acc9c01
glibc-langpack-tr-2.28-225.el8_8.6.x86_64.rpm
c27302bd149b126e86a44598af501ca8917fe25375bc50b14cdea6cbb9d28a3c
glibc-langpack-ts-2.28-225.el8_8.6.x86_64.rpm
85458f3b7161db62bc62960f7fde9310033547c1cec1c3ed8de739d20373fdc6
glibc-langpack-tt-2.28-225.el8_8.6.x86_64.rpm
56cfdbab52c5f680bec3f8251250fbf10c91818402578d3d0471ea0518b73c8d
glibc-langpack-ug-2.28-225.el8_8.6.x86_64.rpm
e84f8470ff5e176f1d72922d159916a8d5f83cce22beb93cf674db33a2f7a584
glibc-langpack-uk-2.28-225.el8_8.6.x86_64.rpm
5b768dc582dcfb417637ca078907c1e8aacee9774fce9332a66600f8928b2299
glibc-langpack-unm-2.28-225.el8_8.6.x86_64.rpm
06867a95668799ebc998eb3c030c516c29f1d55dd33bc33ed7cd02d505d9e2fb
glibc-langpack-ur-2.28-225.el8_8.6.x86_64.rpm
5871a229f4ad30c66ff5cc8fb1353e0a21bc9c4b5a503e3a861cff9de9536992
glibc-langpack-uz-2.28-225.el8_8.6.x86_64.rpm
ce8bdb18fb3ddeb2ab68e4b9d7228b6ce98748835d58e03bd6805bb6d7b9cd4c
glibc-langpack-ve-2.28-225.el8_8.6.x86_64.rpm
0c364019cca11e4d1d95da1fd4523d82dd22a62e3047e85c89b5b6b081fb1b88
glibc-langpack-vi-2.28-225.el8_8.6.x86_64.rpm
0b811802c153293cb9203d8826fa034ba67c51e4e6f0b4b0e1cead795fe08854
glibc-langpack-wa-2.28-225.el8_8.6.x86_64.rpm
e5703646937fa25b1b259f0325ee35be6eb00e0ccb7e8de12ef804417c1a2642
glibc-langpack-wae-2.28-225.el8_8.6.x86_64.rpm
607844db76d90573256716efcdb0812d75716ad4135e39a7474f5d7cf5c63ff0
glibc-langpack-wal-2.28-225.el8_8.6.x86_64.rpm
17f5fe27c1e19cfacf06ec25471732f8751df19383f8d303d7a2dcce5ecd9f24
glibc-langpack-wo-2.28-225.el8_8.6.x86_64.rpm
cd64e58fef883026c110cd329c7ccce5528da97c1757ad5e2177428e1019c986
glibc-langpack-xh-2.28-225.el8_8.6.x86_64.rpm
9d3feb744f5bdacd6062f73fe3bc0438e9afd346a5b50b31a508336ed98d8c90
glibc-langpack-yi-2.28-225.el8_8.6.x86_64.rpm
b3c55c76660db4d3e7ccb6c7969379dadb1e81909f70e1aca2fa267c666ebe53
glibc-langpack-yo-2.28-225.el8_8.6.x86_64.rpm
fe5144b5d523ce82f91fe0733a7f59c5162f44ba853fea898d91d2a59acb5d46
glibc-langpack-yue-2.28-225.el8_8.6.x86_64.rpm
5590c7c3177755374481c2f4592593b425bb1b64fef78892a5c89dc3053389af
glibc-langpack-yuw-2.28-225.el8_8.6.x86_64.rpm
2e4ce6c7d625d7a66e18bf59e4081255dc0125ddc6bace4ce281d376003a5312
glibc-langpack-zh-2.28-225.el8_8.6.x86_64.rpm
247e7a8a1b9b256418ee017012b6ab664d008c02d124e9533a5d5767159b1498
glibc-langpack-zu-2.28-225.el8_8.6.x86_64.rpm
21751537d8714c7195fe09018200f070413aa1bebc35abbe3c464c8d7352d201
glibc-locale-source-2.28-225.el8_8.6.x86_64.rpm
655d9df89cf4823f6078fa3cac5c8f4ae7fad3c4a865845ec234ec0bb3103ead
glibc-minimal-langpack-2.28-225.el8_8.6.x86_64.rpm
55c8f5ce51f0d74af05b0c12cc83c2646d23cbc7375006f03b3075a8816a0a3e
libnsl-2.28-225.el8_8.6.i686.rpm
67863d93157f171a291f3de99da393678b8cafbd2f9611442f8c6f1569f0c981
libnsl-2.28-225.el8_8.6.x86_64.rpm
a50434242a8f7f3343484bd6946a30d45e887850ef8c81ca325b4f5b4f8b1e53
nscd-2.28-225.el8_8.6.x86_64.rpm
174fc5c70faf26e0b0d5a0eacb53b3a5fb1490f5391e17d3c05a514cb9588d9f
nss_db-2.28-225.el8_8.6.i686.rpm
0a11b67ed889fff9e791416aa9d1c1de662f65c80e9e6601a87f674c447b4ad9
nss_db-2.28-225.el8_8.6.x86_64.rpm
4516b0bfa07e8d93e4898a8153a3674fb18c6a323ea185a1289b910c84fb8deb
RLSA-2023:4517
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896)
* kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281)
* kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829)
* kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235)
* kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124)
* kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101)
* Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602)
* LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375)
* ice: ptp4l cpu usage spikes (BZ#2203285)
* Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127)
* macvlan: backports from upstream (BZ#2209686)
* Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198)
* Incorrect target abort handling causes iscsi deadlock (BZ#2211494)
* swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513)
* BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658)
* Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667)
* Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373)
* Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451)
* Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189)
* ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366)
* xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281)
* jitter: Fix RCT/APT health test during initialization (BZ#2215079)
* aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498)
* Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543)
* rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769)
* Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810)
none-baseos-rpms
kernel-abi-stablelists-4.18.0-477.21.1.el8_8.noarch.rpm
46309ee4d8b9fc44ee2081582b47047f0a93384f1caacd47500761d3d10d5989
kernel-doc-4.18.0-477.21.1.el8_8.noarch.rpm
cdabad6a0fe918b3c9e54ab73b1565b64b75531e8b0141603cf529c46ece982f
bpftool-4.18.0-477.21.1.el8_8.x86_64.rpm
55345b73e889ac316da109b4a88a1b72aec91de0c80690a851f0e4e4d07e8003
kernel-4.18.0-477.21.1.el8_8.x86_64.rpm
cf1102c68ce85a07d48c96945356e1ab2e55783d9cd0b2e6cfc753e261559fee
kernel-abi-stablelists-4.18.0-477.21.1.el8_8.noarch.rpm
46309ee4d8b9fc44ee2081582b47047f0a93384f1caacd47500761d3d10d5989
kernel-core-4.18.0-477.21.1.el8_8.x86_64.rpm
75cf4feb88db98f52e91dcb4c5df6496e31b4ed56e3d23df748379d911d17f88
kernel-cross-headers-4.18.0-477.21.1.el8_8.x86_64.rpm
98bce3ed3733138f3f97c8a520a729acec8c7d9bd4b38268c5c197e789b4294c
kernel-debug-4.18.0-477.21.1.el8_8.x86_64.rpm
48e4e3c4dae74640dbf9e27daa2b856d221dc6eecc9985818f543f497ba0c1be
kernel-debug-core-4.18.0-477.21.1.el8_8.x86_64.rpm
6e22930c356eba7e942415f9c6186481e1d17913859a37898a9c3b63cff0e2a8
kernel-debug-devel-4.18.0-477.21.1.el8_8.x86_64.rpm
e849119aaa97f48c41e1c0ec65694f03de86269d07b81af5797fdde2ed07a76c
kernel-debuginfo-common-x86_64-4.18.0-477.21.1.el8_8.x86_64.rpm
06a4004f5bfe11fcba09b69cc403f96eb15151cc1204c8cb6e52c15b9d23f566
kernel-debug-modules-4.18.0-477.21.1.el8_8.x86_64.rpm
145b0b05912a5c49fc3dfb6bf0f0de05301e3642bacbd4925d1a7ab5e062c940
kernel-debug-modules-extra-4.18.0-477.21.1.el8_8.x86_64.rpm
2041cfc0e9a34287b8bac637c1ca97725499516f537220c2d9b6ff859ad48f06
kernel-devel-4.18.0-477.21.1.el8_8.x86_64.rpm
97df4be04c2ce5144abaf4d889f939b712292848ee25bce3b1c0727c61c98aaa
kernel-doc-4.18.0-477.21.1.el8_8.noarch.rpm
cdabad6a0fe918b3c9e54ab73b1565b64b75531e8b0141603cf529c46ece982f
kernel-headers-4.18.0-477.21.1.el8_8.x86_64.rpm
373d9be1ce3d412b5686c1bbc217c1c3b126a00cfb3c0ceae1beaa4045e46eed
kernel-modules-4.18.0-477.21.1.el8_8.x86_64.rpm
a285055b3088ea7cfcf211232ddfb3bbaf1e2fa5aa98e9f985e2f99a2f12781a
kernel-modules-extra-4.18.0-477.21.1.el8_8.x86_64.rpm
dfedb6684255aa891c0ec1964bdeb64d6cbb40033f35dc211e11774e27910c30
kernel-tools-4.18.0-477.21.1.el8_8.x86_64.rpm
57d60403751f5ba65429921f45e805ac6c87f3f1734c73c0acf8ca0ac3f80772
kernel-tools-libs-4.18.0-477.21.1.el8_8.x86_64.rpm
2d9b5cd526720670c2df470380037b6ec4e316d983884f1a013f2158e52440f9
perf-4.18.0-477.21.1.el8_8.x86_64.rpm
4ba1bafa870db7ee3ef8d44a359f83cf0107f19c56e6bb3a19f7c50d5dd01ae4
python3-perf-4.18.0-477.21.1.el8_8.x86_64.rpm
e701712a22ba072efcaa6d4ebfdbcc381ede0abac56f24dec7322fd94cff326b
RLBA-2023:4518
iscsi-initiator-utils bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iscsi-initiator-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iscsi-initiator-utils packages provide the server daemon for the Internet
Small Computer System Interface (iSCSI) protocol, as well as the utility
programs used to manage it. The iSCSI protocol is a protocol for distributed
disk access using SCSI commands sent over Internet Protocol (IP) networks.
Bug Fix(es):
* Patch3 reverts a patch merged upstream (BZ#2215111)
none-baseos-rpms
iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.i686.rpm
cea331c3d19a4c91e59859ae845028d3c5265f93ff49531df6e7d1a8bee5f02c
iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm
dc229689429dbfaaf1ea2509abe3728388c22acacec3e26a67167ed624e55013
iscsi-initiator-utils-iscsiuio-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm
74fb0e3dc4275d9055d6498112b8c2fe0d4150993c183232edfe6872130ccedd
python3-iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.x86_64.rpm
f10fda331d9ddec5cce76dde9443b6c58dc57de9b593a9d4d74ea03c6e1d670e
RLBA-2023:4521
NetworkManager bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es):
* VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899)
none-baseos-rpms
NetworkManager-config-connectivity-redhat-1.40.16-4.el8_8.noarch.rpm
3fa816eb686a631eaf6dba0a376d071c52b04973b1a0a3fc863ece672f573c52
NetworkManager-config-server-1.40.16-4.el8_8.noarch.rpm
56e20b73c67df24520b3f71346b1151167269bb65cdceef53588df7fc8955432
NetworkManager-dispatcher-routing-rules-1.40.16-4.el8_8.noarch.rpm
861ccc3c0b0ec2b7714971e08282120aef53e31e667a3d23ac9b7013c0de1038
NetworkManager-initscripts-updown-1.40.16-4.el8_8.noarch.rpm
0cf9f96f80808ca6ce9804779d9efc64cc564c8b7cbb98afc5c5f1315e7340cd
NetworkManager-1.40.16-4.el8_8.x86_64.rpm
dd6fe956eb9f152efd8ba9f4452cfe345012846b67f37016667e28e5529c6dc1
NetworkManager-adsl-1.40.16-4.el8_8.x86_64.rpm
c230e50306c7a5dd850e88caf026b6684b352598597fb7e0ac913cf4d380c570
NetworkManager-bluetooth-1.40.16-4.el8_8.x86_64.rpm
4b05e6da83dc34c9c100be5787fe0fc85ce33b7d6345e2af72454c56a2f35f14
NetworkManager-config-connectivity-redhat-1.40.16-4.el8_8.noarch.rpm
3fa816eb686a631eaf6dba0a376d071c52b04973b1a0a3fc863ece672f573c52
NetworkManager-config-server-1.40.16-4.el8_8.noarch.rpm
56e20b73c67df24520b3f71346b1151167269bb65cdceef53588df7fc8955432
NetworkManager-dispatcher-routing-rules-1.40.16-4.el8_8.noarch.rpm
861ccc3c0b0ec2b7714971e08282120aef53e31e667a3d23ac9b7013c0de1038
NetworkManager-initscripts-updown-1.40.16-4.el8_8.noarch.rpm
0cf9f96f80808ca6ce9804779d9efc64cc564c8b7cbb98afc5c5f1315e7340cd
NetworkManager-libnm-1.40.16-4.el8_8.i686.rpm
dd4ed0e89d5b5fb03745bb62405f99d52d879a167978e5576190ef7ae61ba32e
NetworkManager-libnm-1.40.16-4.el8_8.x86_64.rpm
7d77e3830f82d731e46d8e58925f506c7dae25a7e5047bce61280b3285bda092
NetworkManager-ovs-1.40.16-4.el8_8.x86_64.rpm
0050dd48b556365092151ad021dc55fee60bc96feef716742fc734abe2459f7f
NetworkManager-ppp-1.40.16-4.el8_8.x86_64.rpm
83b4e6a4ba32dbd01b11ad673fcfd3d94eb2a3e3d479c44275f9f1d8df663d80
NetworkManager-team-1.40.16-4.el8_8.x86_64.rpm
7f7445900f0bc4d37d06fa80488fdf85ca0a4a89615822648883201cbcb267d4
NetworkManager-tui-1.40.16-4.el8_8.x86_64.rpm
f1e707a71f55065e501451e0fc94c873e1cdf4e7d0786ba5472160310af779b0
NetworkManager-wifi-1.40.16-4.el8_8.x86_64.rpm
1d6e45df32aee940e3a207823a8490286b141fd3a7215ec456099427979e655a
NetworkManager-wwan-1.40.16-4.el8_8.x86_64.rpm
b4dc38fd5c8553cd8902317e6ae5c494c9c39966fdf875716cc08c3e6cb44af8
RLSA-2023:4523
Moderate: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: GSS delegation too eager connection re-use (CVE-2023-27536)
* curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
curl-7.61.1-30.el8_8.3.x86_64.rpm
ed2fd88c5440ecca9540d7dab76ebbc3fcea69e9f773128c8c719f0b61ae9627
libcurl-7.61.1-30.el8_8.3.i686.rpm
0e8d53ee79846b093de581c5cfde759091090a51b353f45381b925182ae869b7
libcurl-7.61.1-30.el8_8.3.x86_64.rpm
8140b42a09de333a2a8534b8386f7a4fe9b1ea727543c1dea381f7575e90539c
libcurl-devel-7.61.1-30.el8_8.3.i686.rpm
892419fc04542d6a6ec1907085c6c8fba15ba1ef2ac7f0bee26515701b7b9bea
libcurl-devel-7.61.1-30.el8_8.3.x86_64.rpm
22cf4d9837c5de50a0925964af93e80104776f32bd891e77fd5dc1c90f3212a7
libcurl-minimal-7.61.1-30.el8_8.3.i686.rpm
683b4a8bbe3c3cb11f60ae6f9ac7d982e510514c88e93ed55db19a87060e96bf
libcurl-minimal-7.61.1-30.el8_8.3.x86_64.rpm
e2755e4f7816cce3e652dd3dfcb98480ef83724ea5033b6242186c0ab4d64d66
RLBA-2023:4522
grub2 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es):
* HTTP boot issue on RL300 (BZ#2221202)
* Not able to activate SAP VM deployed with SAP Large Profile mh1-90x16200 (BZ#2207972)
none-baseos-rpms
grub2-common-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
a419f460ebd079f4838ee8b3f35e862106c969e5530702380e708ecba8047992
grub2-efi-aa64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
f88cc3e63d47e8eb411a43fd713c961c90f355f4056cfbfb70d3145155c273c0
grub2-efi-ia32-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
4d033cf7ef4c6deb674888486a6eeef5bc976f23e3aec92db83a759a71e430bb
grub2-efi-x64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
ea5673584ba5557b92e950255c9746c4925a1ce4557a54993955e9dcbc11444e
grub2-pc-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
a177c63e0f25d5da4afafc7ffacbf31c76f6a1105321cce74d755682d3811c17
grub2-common-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
a419f460ebd079f4838ee8b3f35e862106c969e5530702380e708ecba8047992
grub2-efi-aa64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
f88cc3e63d47e8eb411a43fd713c961c90f355f4056cfbfb70d3145155c273c0
grub2-efi-ia32-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
b1552265ce9c6812688d394a2fdf9c93c2a729d4a3049363540d38cd72eb3245
grub2-efi-ia32-cdboot-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
88a1c8d600e0889db45977df024a9c15953dae2bc1f31e38334a606b393df488
grub2-efi-ia32-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
4d033cf7ef4c6deb674888486a6eeef5bc976f23e3aec92db83a759a71e430bb
grub2-efi-x64-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
d1942f696fb2761c54eb34fa66e64ee9233e89cd882c96c3d2914204a09d6070
grub2-efi-x64-cdboot-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
ab446b51edb4bb7cb089efbc14522a7a941f7cf8610eac701105aea150db197d
grub2-efi-x64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
ea5673584ba5557b92e950255c9746c4925a1ce4557a54993955e9dcbc11444e
grub2-pc-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
8f94bb2c9dfb1465fa0c8163ab641b2f581ab250735c319f80ffa26ba878a061
grub2-pc-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm
a177c63e0f25d5da4afafc7ffacbf31c76f6a1105321cce74d755682d3811c17
grub2-tools-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
7c724479d906b9606037eef80e0039e0fae8d8d5ae5716687bd2f04496089a4f
grub2-tools-efi-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
ae1f4704b0c6bc82e779c572a3d6469e35e03279cb4a65bfc66cf3302d18d3a3
grub2-tools-extra-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
e039fe406ff0c98f589da5326bf3370c20ded57ff6b75e87077eea4130375747
grub2-tools-minimal-2.02-148.el8_8.1.rocky.0.3.x86_64.rpm
ce1fb9f8e0d85fcc36a3a54f5cf82489049ddb512afa09b75820a287d35056ce
RLBA-2023:4525
sssd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838)
* SSSD enters failed state after heavy load in the system. (BZ#2219351)
none-baseos-rpms
python3-sssdconfig-2.8.2-3.el8_8.noarch.rpm
a5f0f60d75de585d424896b1228fcfb9d99c3514e69ac32931a7b926d77eb49d
libipa_hbac-2.8.2-3.el8_8.i686.rpm
25342844deed9097c95d58863f9a1545b0d995f41567485adfcfc5d1f1fcf2b1
libipa_hbac-2.8.2-3.el8_8.x86_64.rpm
70766413d5a52c92e3bb224459f8184c02518f8630d1073b63b593cb28b7b37d
libsss_autofs-2.8.2-3.el8_8.x86_64.rpm
8edee8b77c8b3bf56e7ec9a011505114055ab8b7f5a31a436182e80ea297785f
libsss_certmap-2.8.2-3.el8_8.i686.rpm
a1c7dad1a0a607a4e5e9528be008cd0f9562afce6eea94a7109a717b78c9d814
libsss_certmap-2.8.2-3.el8_8.x86_64.rpm
1d48fe634b4c5d4069677150595ce30f17d4e0c9716e613126e829550ecc187f
libsss_idmap-2.8.2-3.el8_8.i686.rpm
4a0c2cfa32d1828b49d4fdef010264f97012b8d5c12dc5d86935b01b8f24890a
libsss_idmap-2.8.2-3.el8_8.x86_64.rpm
66dc16e4d6a65e569d2a6ffcba6c64936bcbd8a3e1fa65d8ea34d044269a5aab
libsss_nss_idmap-2.8.2-3.el8_8.i686.rpm
258a3cdde9e5bd46f8d8cb52e447fdfe41d4777a6eab0d196ddbc2415e54a43b
libsss_nss_idmap-2.8.2-3.el8_8.x86_64.rpm
71c3f8b5a754793861fc5ba41c1f1ee9507f526522ac5f4cca3b01577ec4234e
libsss_simpleifp-2.8.2-3.el8_8.i686.rpm
565d6e53bcc5e379ebd60858876fe9810090fc2a65f4508361d8a66756d9701f
libsss_simpleifp-2.8.2-3.el8_8.x86_64.rpm
f2608aa7f0de0e59272baf812a973432cf633da9a41b3f1cd3e0d6f65c7f501b
libsss_sudo-2.8.2-3.el8_8.x86_64.rpm
4f470f35ba8acc9385ae63a95583a8c82d2acfeaa0b6773b19b797736dfd94d6
python3-libipa_hbac-2.8.2-3.el8_8.x86_64.rpm
06012e2efb30f8a70e2646433d3b1126ec476e6ca53b426bd4c0c4346f2580e1
python3-libsss_nss_idmap-2.8.2-3.el8_8.x86_64.rpm
4dda9c68f5ee0fedd47a6197c62754e85eb6bf1601b38934623a6b13c1fd5228
python3-sss-2.8.2-3.el8_8.x86_64.rpm
a213d7e10a526fbf5eec531ae3b6c670889459b3a114a1bf103011203434ac1d
python3-sssdconfig-2.8.2-3.el8_8.noarch.rpm
a5f0f60d75de585d424896b1228fcfb9d99c3514e69ac32931a7b926d77eb49d
python3-sss-murmur-2.8.2-3.el8_8.x86_64.rpm
4717eacd40c9038e56c756578e29c4fe13f7186040a85a9fc0043867a6de941e
sssd-2.8.2-3.el8_8.x86_64.rpm
7b9dbf4fd5869bdd1cd44387a8fc71117a178c38ec0c150c2d4bf4e3051c67e7
sssd-ad-2.8.2-3.el8_8.x86_64.rpm
9db0f73f65cd73beebb4de4fa717fad97ed60999d3dbf6a2bc170c12030d62e8
sssd-client-2.8.2-3.el8_8.i686.rpm
9b25d1d97643c04680372ca79844ed5617b34f5ad05292beb2420a26c056d4b9
sssd-client-2.8.2-3.el8_8.x86_64.rpm
d926b55209f8bbaf4db84b629adf3d314abbd6e8116f7319976428fdf3591280
sssd-common-2.8.2-3.el8_8.x86_64.rpm
a2d4bc97be471d65ddbb5297c7fc80e2aee8230e9c126aa3c7849012aae1b35f
sssd-common-pac-2.8.2-3.el8_8.x86_64.rpm
41e550c5b5ba11583faa82b89757786ad8c536698f4a4db6e9589474da9729f3
sssd-dbus-2.8.2-3.el8_8.x86_64.rpm
c964249621dbbc788cef2b5489dffad152f80aab220bfdf9f6c5a3e244d8d022
sssd-ipa-2.8.2-3.el8_8.x86_64.rpm
21341643762afa65d3cea2f97d21b4c14331b7ee8536a4a35a0af9b96464272d
sssd-kcm-2.8.2-3.el8_8.x86_64.rpm
139984608f31a9c073f8538c447636c92f9e682f277654a76d36a8ac0350d06b
sssd-krb5-2.8.2-3.el8_8.x86_64.rpm
60d2b12e295096dc2eea423028955460243b93cfb9149d0458a75fb629664a76
sssd-krb5-common-2.8.2-3.el8_8.x86_64.rpm
b68513cd3f38df8e748e1815c95234537f4c23e21ca12f2417a39a1135eccab8
sssd-ldap-2.8.2-3.el8_8.x86_64.rpm
0f7fdda9309f544793fbfde4576c4f3c40ef600b1d5fdabce2c1270e9fa66cf6
sssd-nfs-idmap-2.8.2-3.el8_8.x86_64.rpm
81fb82f432216f562a6864310c775e86b7ea3376ab615550362bfabe6b23d2be
sssd-polkit-rules-2.8.2-3.el8_8.x86_64.rpm
e219019be7072c8adb77048527522a276bb8521220361294c9ed56319c00050d
sssd-proxy-2.8.2-3.el8_8.x86_64.rpm
79680b5e0c1ac8430cb2c442c96e5a8e4d2dcd963430675d39a55d9e62afc63d
sssd-tools-2.8.2-3.el8_8.x86_64.rpm
2ba37a5bfc294b077df409d870c48a8e414dc6e1f89b09030c6c0731f157284c
sssd-winbind-idmap-2.8.2-3.el8_8.x86_64.rpm
6a34af96ec51fcef77da677b1403f4436d87c5fd9ac8c2746d436c9ef44fff57
RLBA-2023:4526
systemd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* systemd-logind: Assertion 'pid > 1' failed at ../src/login/logind-dbus.c:3332, function manager_start_scope() (BZ#2223602)
none-baseos-rpms
systemd-239-74.el8_8.3.i686.rpm
a9b43a656eb0b9b2820f94a116c8e1476abcb5c1e67fb64fe9b4489e705d9452
systemd-239-74.el8_8.3.x86_64.rpm
d3a7490b43fe7177e2527ce158382812fb2432efbe60e9157d386e8675685fc3
systemd-container-239-74.el8_8.3.i686.rpm
09b9deb0dd8f657d874a1d669bc8b628209a20453811e69e6394af38a0da7386
systemd-container-239-74.el8_8.3.x86_64.rpm
43c10ceb96682d069179c98f88f4fed1310b8cfd4fa1bcfd45625ee0ba01c4bd
systemd-devel-239-74.el8_8.3.i686.rpm
ee8a03b5c69a1aa5c8b6df0ab3204a29658c459f5d69922aa1005a05f568cb40
systemd-devel-239-74.el8_8.3.x86_64.rpm
16cbde9776616e5d7e62f9100fb4d21ff84657b1c85d9beda6a2b01806d138c9
systemd-journal-remote-239-74.el8_8.3.x86_64.rpm
4d2b0275d3104dfc528af376f7c77a0f947eddf5b16574c690e0ab6a3d4ee7e1
systemd-libs-239-74.el8_8.3.i686.rpm
6491fc8f4e8bee0d2a778c9617ab8ba7b59e883ce1872f1d6ffd71a3d725ca7a
systemd-libs-239-74.el8_8.3.x86_64.rpm
bb8302d0082c3d3c6025e151f347dda507476135ef10ac16726d6969493d3997
systemd-pam-239-74.el8_8.3.x86_64.rpm
81495002cd02850cb9a9b8c9b07b18e1b4e0281fa59bd7e57c034be165f3a763
systemd-tests-239-74.el8_8.3.x86_64.rpm
d3d56b9ec25c1f5529080d356d201829feb4d2c4244ba3f19a535e2b981c46bd
systemd-udev-239-74.el8_8.3.x86_64.rpm
b7a741f10f900f6d093560ab546508a8e61a12ddeb0f15c6060553e33e0e321b
RLSA-2023:4529
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484)
* libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-16.el8_8.1.i686.rpm
2700b3542e4e0a2aa636f1415d87173f13938b49698c40e9a3c249e1ef3a2fd7
libxml2-2.9.7-16.el8_8.1.x86_64.rpm
74abab4edeffd38c30737de94a392346d245af9b30bd1b298fb456af50de721e
python3-libxml2-2.9.7-16.el8_8.1.x86_64.rpm
5daf6a85973edba5c14a07cefac1e2579728c79b8e9be640869f4d6b0bcd47ca
RLSA-2023:5837
Important: nghttp2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for nghttp2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nghttp2 contains the Hypertext Transfer Protocol version 2 (HTTP/2) client, server, and proxy programs as well as a library implementing the HTTP/2 protocol in C.
Security Fix(es):
* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libnghttp2-1.33.0-5.el8_8.i686.rpm
f41632c74ba6a1fe20cc6ff57af4adb10b2dd9d8bf076820953819dcc56f624b
libnghttp2-1.33.0-5.el8_8.x86_64.rpm
c1773b75bd8d4ae0f598b501bd7fd4a615c592432d7d597eb207158768a11db7
RLBA-2023:6797
xfsdump bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems.
Bug Fix(es) and Enhancement(s):
* xfsdump/xfsrestore: Suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14493)
* xfsrestore: Files from the backup go to orphanage dir because of xfsdump issue.(BZ#2245344)
* xfsdump: Restoring inventory prevents non-directory files being restored from tape (BZ#2245677)
none-baseos-rpms
xfsdump-3.1.8-5.el8_8.x86_64.rpm
832a4dc59a3ad9e62a2e8d594b6eda910d712ea2e822a8b4fbc7ed7ef2f0c4c8
RLEA-2019:3448
perl-Net-SSLeay and perl-IO-Socket-SSL bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-Net-SSLeay.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
perl-Net-SSLeay-1.88-1.el8.x86_64.rpm
fbb313568b089de5d9ff74e54e509dc806e49d56bdcf1fd554dbe01ca5032ad4
RLBA-2023:7080
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
kexec-tools-2.0.26-8.el8.x86_64.rpm
9ae81e7de390624533ad29cd87f19744783e988cf66af60faf7e2af8d14244e2
RLBA-2023:7182
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
tuned-2.21.0-1.el8_9.noarch.rpm
ef47db5a44f0baf742d952864f77eb147a5f08e31b46a9e5d8882fa0990187b6
tuned-profiles-atomic-2.21.0-1.el8_9.noarch.rpm
98a338f12a63020fcdf807492e79f6ed8d4076da7c2c3b82a35012634f5a8477
tuned-profiles-compat-2.21.0-1.el8_9.noarch.rpm
37181c66d77dba3580bb77f2ea8938ade58f363239abbd5a6968f04baadc28c5
tuned-profiles-cpu-partitioning-2.21.0-1.el8_9.noarch.rpm
cb9a5795f21ab5e4507f69cb4db2f33a02096f205036d669930cc1fe2a5abe6e
tuned-profiles-mssql-2.21.0-1.el8_9.noarch.rpm
13487cb712d7a39c5f61b9f63001683d8ef43a66336b819154c9d0ababcdffe7
tuned-profiles-oracle-2.21.0-1.el8_9.noarch.rpm
fd5ed5219eaf524c75e2fe142df87fcca0b86c4c5faafda6229c0e92f24cbef6
RLBA-2023:7185
nftables bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
nftables-1.0.4-3.el8_9.i686.rpm
3d2eafc09abb50c921783db1204fa66d9de3b752310153eb6c299ca389fe996c
nftables-1.0.4-3.el8_9.x86_64.rpm
5054bf9eab20fdbc97bc47f1d30a3fd1e80cefa915d0e634c865b4fd8095996f
python3-nftables-1.0.4-3.el8_9.x86_64.rpm
19ac6c94f37f8224301db112ecabc9fe3c1e123630c91ad1e8df500956db9eb5
RLBA-2023:7186
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
libblkid-2.32.1-43.el8.i686.rpm
1a4fd284e6a581d4cce567473a2b99040837802dffb1ae704aaf3a49cce73389
libblkid-2.32.1-43.el8.x86_64.rpm
ea6bbe1d9b8b42e1ba582cf1c67a8a9e95b2a7bea96751576d1a32f324f5fcdf
libblkid-devel-2.32.1-43.el8.i686.rpm
e3870c046255f8b5242775e7e00361aaf8b0b78c38a6b21ba5dc7167b6fe1152
libblkid-devel-2.32.1-43.el8.x86_64.rpm
43053d38b46a6a5aa1d9087b939109a265c1816deadc9916ac3d464ff6ecd490
libfdisk-2.32.1-43.el8.i686.rpm
3cc9b93a029d535d6a0404a66012678eac29b182601c0100983eb39c6ec5e9f6
libfdisk-2.32.1-43.el8.x86_64.rpm
25a410dd430b16e2269f55c6036c7e4946f81d932fe5a98e072a61c48f947ef7
libfdisk-devel-2.32.1-43.el8.i686.rpm
20ded3fd57776e833ccc51e50d1505cdcbebe6533a8b92f6d320c6362cf931f9
libfdisk-devel-2.32.1-43.el8.x86_64.rpm
2ed6acd763040b750875464f8560ee078b22546cd7d1701176355499b30fd237
libmount-2.32.1-43.el8.i686.rpm
72edc72916f08d6718f2233c778492047410bc51b8ae3f662b8db0073ef47463
libmount-2.32.1-43.el8.x86_64.rpm
043db826bf4e77a522b64bea03fc63dbd5ae29c23fdd4ddfcb527742afc5700e
libsmartcols-2.32.1-43.el8.i686.rpm
27b8e024ef908555be7d58fbaa7488c48b5007400bc1fb88d9dc0941c925fd3e
libsmartcols-2.32.1-43.el8.x86_64.rpm
28a333ebe4ecaa606c1a67726afafc3db9ce46be48bd832f6c0ec59bc7f6e82b
libsmartcols-devel-2.32.1-43.el8.i686.rpm
a0d9fd1dd7b1821f9699843ee3c884d043398d3f6d56ffdf47ee8a31f4901648
libsmartcols-devel-2.32.1-43.el8.x86_64.rpm
53f0f834cdc59c7fa61b21eab0ed656b69c4454f5300eb46645c7f6b16a87ca6
libuuid-2.32.1-43.el8.i686.rpm
04053bc04ba37904759bfc6d0d3de0f384e7dcd913df34903184342f59be042d
libuuid-2.32.1-43.el8.x86_64.rpm
99e83acda94db42e74928e773ea02dcd59143baf7d8412c445a0fe3d2cedfd79
libuuid-devel-2.32.1-43.el8.i686.rpm
7fd2d10c2e654918eb1419a7f30818ac40064cdde29907672b2eb5e6ee56c808
libuuid-devel-2.32.1-43.el8.x86_64.rpm
8b23849fceb27df7dffe78f209151e7536ef38d98253afbde350e1a0bf1e4c25
util-linux-2.32.1-43.el8.x86_64.rpm
9bd12357e95be98bfc51645ddea9724521b4bb0aaba87d107b308d0225059465
util-linux-user-2.32.1-43.el8.x86_64.rpm
bfb7ad5153c88e3ef6440af9b8d17574973a4348b78960f64ff850ba7eacb6d3
uuidd-2.32.1-43.el8.x86_64.rpm
8bf822c883b4547e8b53c2c6cd39aa4fc4d051935dd22881ae504d600df75805
RLBA-2023:7188
dmidecode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
dmidecode-3.3-5.el8.x86_64.rpm
b7149e0e49e75548a936ad601c0b87936a0b60d5e8e8537d7f5666ade450dc56
RLSA-2023:7187
Low: procps-ng security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for procps-ng.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx.
Security Fix(es):
* procps: ps buffer overflow (CVE-2023-4016)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
procps-ng-3.3.15-14.el8.i686.rpm
ac32a04d965e61206b289a25a06f20829d8cd05375febdc764c4e4925bb1c75f
procps-ng-3.3.15-14.el8.x86_64.rpm
cbbd805508836bbc260c452a30a534c89e41863a3c129bb863448732f8cd6e1e
procps-ng-i18n-3.3.15-14.el8.noarch.rpm
821a3db12b38137553beaab052f93c3223d3952bf1db6458042609122e967dbd
procps-ng-i18n-3.3.15-14.el8.noarch.rpm
821a3db12b38137553beaab052f93c3223d3952bf1db6458042609122e967dbd
RLSA-2023:7189
Moderate: fwupd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for fwupd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fwupd packages provide a service that allows session software to update device firmware.
Security Fix(es):
* fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
fwupd-1.7.8-2.el8.rocky.0.1.x86_64.rpm
f0ac61cc2555853e24b8be27f65ce062ffb61f5445164b7a83083f2cabbe1232
RLSA-2023:7190
Moderate: avahi security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
avahi-0.7-21.el8.i686.rpm
01057cce520b0da3eff2253ed842b270eb1121854f8036ad03f9de9cfc37f74f
avahi-0.7-21.el8.x86_64.rpm
f8f0eec1cc1075ba639588cd28af6b9cb89df6fd29279271037190b836eefa9a
avahi-autoipd-0.7-21.el8.x86_64.rpm
a27aac9bc18aeb6e011d0a4847e989724c51b7bd6818912c896049e9ce31156b
avahi-glib-0.7-21.el8.i686.rpm
5f4bea1a1f6531600f9f9dce2975c7185a4643678c1e3505872c100002286a70
avahi-glib-0.7-21.el8.x86_64.rpm
212054d8ab063917f7a442e251c61a1b7628ed59fdda6346ff191e41cf2bc34d
avahi-gobject-0.7-21.el8.i686.rpm
9736ca98de0f325499c4ea59ceb546ab37cd0f4bb4a02b084a0f62e2bbf48635
avahi-gobject-0.7-21.el8.x86_64.rpm
27941dc85d64a04023074171f346fe87e2422656318e0c8385221a962cb3c155
avahi-libs-0.7-21.el8.i686.rpm
f7b0b532441b1f6d57b1365b68c50526faeba76b7049bf62e55810a88a87054e
avahi-libs-0.7-21.el8.x86_64.rpm
5f2fa3639ff92a250a251d5b3bbf8487cdccc1fd70abddeca9a2f39ce20bffb5
python3-avahi-0.7-21.el8.x86_64.rpm
483f92f1f8f393fac6d7ac81e04c13b7d3bb30d7179d445fcec45fa006d94b8e
RLBA-2023:7191
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-1.02.181-13.el8_9.x86_64.rpm
529004b1bfd6befc13b3105df4c991ce80b6c660d3dc63819b347029773092ff
device-mapper-event-1.02.181-13.el8_9.x86_64.rpm
0343b170f441a5d3a8a33ed1e1653d14fe321bba186f108a1573cf814f5b3fe3
device-mapper-event-libs-1.02.181-13.el8_9.i686.rpm
824a37e998a9b845ab5a72b7ce811544a94a5926b241e1d143cf8dc30388db95
device-mapper-event-libs-1.02.181-13.el8_9.x86_64.rpm
b88ef7e099f9a3f4ad6ffed923f9179b1a705ba8075e61ec93ed55a249013c04
device-mapper-libs-1.02.181-13.el8_9.i686.rpm
32e82739a923b9bb4e84b283d36defba0fa250897a87e05f4aa10c1ac180db8a
device-mapper-libs-1.02.181-13.el8_9.x86_64.rpm
081444cffaf1a52e81caa4fed8a655a4e53ff84fadd33d6eb27627ee8201bfb1
lvm2-2.03.14-13.el8_9.x86_64.rpm
5c31188a205a414e8334462fcfc8432522d7a7df35dddf016c0c2a4478320c66
lvm2-dbusd-2.03.14-13.el8_9.noarch.rpm
a8519cf7f02e592e61b33dbda1b53c5467356db8be66948b81b0ff9ec49ce711
lvm2-dbusd-2.03.14-13.el8_9.noarch.rpm
a8519cf7f02e592e61b33dbda1b53c5467356db8be66948b81b0ff9ec49ce711
lvm2-libs-2.03.14-13.el8_9.i686.rpm
4dbba3ac3ec2bed64b36ec5bc4bd7be73cd37bfa81d6700633bdff5e8c8951f5
lvm2-libs-2.03.14-13.el8_9.x86_64.rpm
706102f2a090bb435e1161e30b3347274ac7c8199d252579207d1b095e7905c3
lvm2-lockd-2.03.14-13.el8_9.x86_64.rpm
8fca5e0cf94f1cd227a08673fc59f571a04a5dc3f28d065cce937c75628f0166
RLBA-2023:7192
numactl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numactl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section.
none-baseos-rpms
numactl-2.0.16-1.el8.x86_64.rpm
60ea415c6376e01845cfd49758b44ac0841ed035bc5183260aa3322922b1e1f0
numactl-devel-2.0.16-1.el8.i686.rpm
0420210fa9f1d1fdaddfe210eaed4f61f57321817b05bdbe18a15b144206a4d6
numactl-devel-2.0.16-1.el8.x86_64.rpm
c9ce8a9ff18efe9bf5e69b1cb9fcb128d8bf89f34749cd9d05d03d5c7bd8b0f5
numactl-libs-2.0.16-1.el8.i686.rpm
f20f4081b5cfa786ff0a2d3840b03fe834eac81a77ecbb0b79ab1985d5947c55
numactl-libs-2.0.16-1.el8.x86_64.rpm
fc54a273a43348ded02eb1966b9607447d5cf527669250c67c21c18762966860
RLSA-2023:7207
Moderate: c-ares security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API.
Security Fix(es):
* c-ares: Heap buffer over read in ares_parse_soa_reply (CVE-2020-22217)
* c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
c-ares-1.13.0-9.el8_9.1.i686.rpm
c7e6a60e6a82066f2f129c100213aca209c4a68a9ff98e08b077b749f507d0b4
c-ares-1.13.0-9.el8_9.1.x86_64.rpm
405c835c82f99de95b80bccd85a90e821d67204ca13036968c85cda20d0830b2
c-ares-devel-1.13.0-9.el8_9.1.i686.rpm
5fbae5d3c794701d9ba096f4bdecd808751ca116cfefc0399ff7e3f5f571c35d
c-ares-devel-1.13.0-9.el8_9.1.x86_64.rpm
fa74fa0269e0e94dbb8c0cd07df0da96094049e88b51e64e2022a5f1cf55785b
RLBA-2023:7210
sssd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414)
* SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302)
none-baseos-rpms
libipa_hbac-2.9.1-4.el8_9.i686.rpm
0ebefcb78095b550744ce37a8024a18e4de4e37ad81f17d0f3eb461c578c39a0
libipa_hbac-2.9.1-4.el8_9.x86_64.rpm
073fcab34ee74a862843e1186c6c469304c6ea96dd960639ad7e655e2f7d866a
libsss_autofs-2.9.1-4.el8_9.x86_64.rpm
fe30cb8c8c429d5eae9c2b0ecd21fe6e1999284d574658fd1bfce7f8152fe7b4
libsss_certmap-2.9.1-4.el8_9.i686.rpm
49f3b42595dabf20df9fd65fd895c871d8f8e6087270a06a712bc32a08a7f34b
libsss_certmap-2.9.1-4.el8_9.x86_64.rpm
72e1960b515f57e8aa01be969c75def7d14bb1c208eb5f9cac8c9f96f3276332
libsss_idmap-2.9.1-4.el8_9.i686.rpm
9411a5c02bc1e4acc5b37c8ea3b05215cb87bfa8013b0d33241fd93b3703d7e4
libsss_idmap-2.9.1-4.el8_9.x86_64.rpm
29512c90e2b57634c5b7f1afaaf9819777e6bf91e1c87f9c7663b520f31d5edd
libsss_nss_idmap-2.9.1-4.el8_9.i686.rpm
31f12e547eee238fbbd5278cc831b263399373a8a95f7b721721f4bdf817a359
libsss_nss_idmap-2.9.1-4.el8_9.x86_64.rpm
8492e5783fbcd71072b998aef57d61fae9215a3f1f6a6353559790ee77317198
libsss_simpleifp-2.9.1-4.el8_9.i686.rpm
13079cdfb6e66f518618354c9b1d245fbf2cd12db9a4bbdc30332d2c8b919505
libsss_simpleifp-2.9.1-4.el8_9.x86_64.rpm
3fe441649687d6bf3991b3288eb19742fcb9f476bac1f34368a4952a39a26c71
libsss_sudo-2.9.1-4.el8_9.x86_64.rpm
a5f9f3cbab2721a11fe241f0ffe8a6e7d5bfd7fa70f9f05bbf7cacd6c8252d95
python3-libipa_hbac-2.9.1-4.el8_9.x86_64.rpm
ce3f2e441b967cc4324e5dc5f9591f4803a6e2e06efd6f46de32a3bffd9f78fd
python3-libsss_nss_idmap-2.9.1-4.el8_9.x86_64.rpm
a0fc3ae4e61f08f667e97c01df71decb833448357a583266ee044865f7e491f1
python3-sss-2.9.1-4.el8_9.x86_64.rpm
5591af507fd55def3ecf1896b2bb132116440fb1ffed9b3eeaa2952ef791e424
python3-sssdconfig-2.9.1-4.el8_9.noarch.rpm
b148427ebe8ec952f6cafa76baaa0c3d10cea8d467e4da4c60b3907c08fdfa3a
python3-sssdconfig-2.9.1-4.el8_9.noarch.rpm
b148427ebe8ec952f6cafa76baaa0c3d10cea8d467e4da4c60b3907c08fdfa3a
python3-sss-murmur-2.9.1-4.el8_9.x86_64.rpm
a171db8ded3d0aa02acf774add36da10dccab762d9019c26354a9954ea7fb268
sssd-2.9.1-4.el8_9.x86_64.rpm
a38bd72377448d7883ad701cfa9ba68d873667a78ad3c508f433bdd3c0b4b62c
sssd-ad-2.9.1-4.el8_9.x86_64.rpm
f1597c9b264e87903e49cf8bd678848c7dec60aa89cdd144c09f187b0813fbc2
sssd-client-2.9.1-4.el8_9.i686.rpm
030c3ae2266255bd5c3a954ad62a7af76639d44cd7c7db694e96d5f6d4e23bce
sssd-client-2.9.1-4.el8_9.x86_64.rpm
e5fccf67b0feafc4487c487e5253926790ad8d3c021ed46f3011d79c709cbfba
sssd-common-2.9.1-4.el8_9.x86_64.rpm
f59dbd72a22aa9d1adc39b656b675dd3f93488ed4159a5eff27b9b2c3d7ca183
sssd-common-pac-2.9.1-4.el8_9.x86_64.rpm
37c0d94f9f09f3734a5a7a813da47de043aaf5e46f80f198c0fdeb9a17bbe792
sssd-dbus-2.9.1-4.el8_9.x86_64.rpm
6093c7927cbbd6c21091d70afefe59b988475036590ae42ca60d616dfaadc91c
sssd-ipa-2.9.1-4.el8_9.x86_64.rpm
f06c63e4bd1bd4ce087618360e5b442f9f6a33bb3e9de1c410cd8e802a3ddea3
sssd-kcm-2.9.1-4.el8_9.x86_64.rpm
daf0145eb64ea43ac2c9f9d2d1ed0f8c4d7bd7bccf70cc512bdde7482cfe0eb2
sssd-krb5-2.9.1-4.el8_9.x86_64.rpm
7e0b92f6ac339d63a2ed8b8a10ac008c8963bc2d5aaa9f459a726367b9798d1d
sssd-krb5-common-2.9.1-4.el8_9.x86_64.rpm
245d72a2ca2153cc215493e5902e4aaf3b623d119036dea5fea1311bb6b629b5
sssd-ldap-2.9.1-4.el8_9.x86_64.rpm
5541cd682ad7602ed72f7f59caa2fcd6b4fc63730596c0d0cfbf2ac9f28f7943
sssd-nfs-idmap-2.9.1-4.el8_9.x86_64.rpm
e4f04e49a04e87160ce729d3035ac7abd3ac329068d8d4481f0c9974555817e9
sssd-polkit-rules-2.9.1-4.el8_9.x86_64.rpm
8de4c0d6022279dbfe6bfac633ab8b74ca9c552006f1caa208217f25ab3feafd
sssd-proxy-2.9.1-4.el8_9.x86_64.rpm
fc04e93bd4c9f2770e0f8eaf75ef78a5067cc59831da2a3909478bb8ed89e67d
sssd-tools-2.9.1-4.el8_9.x86_64.rpm
53aa6aba3d4bdcc837ef408c6ea5615b4a07138a18063936067540b82e8af295
sssd-winbind-idmap-2.9.1-4.el8_9.x86_64.rpm
da00ac04183957743400e0ab305053b6c107e3c423bfabe98ddd2959dba1bb29
RLBA-2023:7211
krb5 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Bug Fix(es):
* Allow to make AD-SIGNEDPATH optional (JIRA:Rocky Linux-10514)
none-baseos-rpms
krb5-devel-1.18.2-26.el8.i686.rpm
a74efa99b6e7da167c1c611c6a1d635d1910ce22359c0db2d8c0b5c76307e7b1
krb5-devel-1.18.2-26.el8.x86_64.rpm
7a45a46f6debb2f19c95c3a9a6399edfb10210cd0762fe672f6cb270359e03a7
krb5-libs-1.18.2-26.el8.i686.rpm
770cbb514580e2e5dbcd95e76bea0fb6b7c43cd164f9fe68e50bc727915f511c
krb5-libs-1.18.2-26.el8.x86_64.rpm
bea60f99cd8adc50dc741aa911ed1a38c89e2a6d5bedcb763e32f10b045bc319
krb5-pkinit-1.18.2-26.el8.i686.rpm
442e18bcd328e4191229c83e4806d1a24360a1b65ed8aeb90fd98f1b52f2a562
krb5-pkinit-1.18.2-26.el8.x86_64.rpm
e8f4443cc49a23c23d4408c6fe53f345fe08400c16b48499c7e266f62c7866d1
krb5-server-1.18.2-26.el8.i686.rpm
d2bb9f7614f762c2d94869c739069328707d5977eeed4fd6e3468b6d4a656f0f
krb5-server-1.18.2-26.el8.x86_64.rpm
3d1b472e1dfa1a02a082e983757db1f36aca29811923d52fe6b93f628a81c777
krb5-server-ldap-1.18.2-26.el8.i686.rpm
d9df21f74a561470fae0706e12581df42f9e36e09545dd18d99acbabea1bc3e9
krb5-server-ldap-1.18.2-26.el8.x86_64.rpm
885d066ddb7462d36c8cfa6e9ae0f0bace3cbaf67399016ebec2889fdd09c02d
krb5-workstation-1.18.2-26.el8.x86_64.rpm
a6e5e4a0d9afc85aac2d3fd7d3caff64942dc9e530b8c1dfe922bafce0238c46
libkadm5-1.18.2-26.el8.i686.rpm
3670cf30010c4199a62e4bc206341c5e9f9c128678bb854be1cb11bc3dcc5e9e
libkadm5-1.18.2-26.el8.x86_64.rpm
bcf270ea041d0e9bf071b3fad421121cbd1d006acaec202d9e551d8562d2b1cc
RLEA-2023:7250
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (Rocky Linux-15864)
none-baseos-rpms
microcode_ctl-20230808-2.20231009.1.el8_9.x86_64.rpm
ed6bd8bb64fd669ce22c878f610109bb5cd4c31ba64821593ebbeb463da4318e
RLBA-2024:0111
selinux-policy bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The selinux-policy packages contain the rules that govern how confined processes run on the system.
Bug Fix(es):
* Allow selinux transition from ifconfig_t to httpd_t and sshd_t [rhel-8.9.0.z] (JIRA:Rocky Linux-15427)
* AVCs with samba-dcerpcd and samba_export_all_rw [rhel-8.9.0.z] (JIRA:Rocky Linux-16274)
none-baseos-rpms
selinux-policy-3.14.3-128.el8_9.1.noarch.rpm
c7433d674d6f5d9a7a8bf0ea180d467e6f68f113ad23a099be84b71ca8a56c03
selinux-policy-3.14.3-128.el8_9.1.noarch.rpm
c7433d674d6f5d9a7a8bf0ea180d467e6f68f113ad23a099be84b71ca8a56c03
selinux-policy-devel-3.14.3-128.el8_9.1.noarch.rpm
7fe0299de89fcebcf37a86be62b57736b0c5557f4d182a664a3ec58d16989d1a
selinux-policy-devel-3.14.3-128.el8_9.1.noarch.rpm
7fe0299de89fcebcf37a86be62b57736b0c5557f4d182a664a3ec58d16989d1a
selinux-policy-doc-3.14.3-128.el8_9.1.noarch.rpm
9471f6adb2710ed4bfcc6695e4bd72e84b0f4c79d9717d554a585ff319b63eff
selinux-policy-doc-3.14.3-128.el8_9.1.noarch.rpm
9471f6adb2710ed4bfcc6695e4bd72e84b0f4c79d9717d554a585ff319b63eff
selinux-policy-minimum-3.14.3-128.el8_9.1.noarch.rpm
072fc4d0e4315817acb5b0ce0f1bc930e81f9c22c604e2870c133ff77f74ef3b
selinux-policy-minimum-3.14.3-128.el8_9.1.noarch.rpm
072fc4d0e4315817acb5b0ce0f1bc930e81f9c22c604e2870c133ff77f74ef3b
selinux-policy-mls-3.14.3-128.el8_9.1.noarch.rpm
0d1ad8a88f168fb39c385ab5e4da73b2c458a9b4b06dff84896f688f2ecf1c6e
selinux-policy-mls-3.14.3-128.el8_9.1.noarch.rpm
0d1ad8a88f168fb39c385ab5e4da73b2c458a9b4b06dff84896f688f2ecf1c6e
selinux-policy-sandbox-3.14.3-128.el8_9.1.noarch.rpm
3e3c5e2e37404331b64f013dd313d08444612b6bffa1114de993772973492762
selinux-policy-sandbox-3.14.3-128.el8_9.1.noarch.rpm
3e3c5e2e37404331b64f013dd313d08444612b6bffa1114de993772973492762
selinux-policy-targeted-3.14.3-128.el8_9.1.noarch.rpm
7e06389eb99b9c66b0cf8e3459816672d2603a5b87094c6ba8bb7e56c95c5dd2
selinux-policy-targeted-3.14.3-128.el8_9.1.noarch.rpm
7e06389eb99b9c66b0cf8e3459816672d2603a5b87094c6ba8bb7e56c95c5dd2
RLBA-2024:0117
libcap bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libcap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities.
Bug Fix(es):
* libcap NVR in Rocky Linux-8.9.0 is lower than the package from Rocky Linux-8.8.z [rhel-8.9.0.z] (JIRA:Rocky Linux-19362)
none-baseos-rpms
libcap-2.48-6.el8_9.i686.rpm
8d1521ed6ad241c5e69e219bf032a7d8c8353b1fb2d152e1aaf32def473ca69e
libcap-2.48-6.el8_9.x86_64.rpm
1d7e73484f9be2f94802516786c5218d01d7c8c297369e6b7c9fac4d7e9b67a8
libcap-devel-2.48-6.el8_9.i686.rpm
7c5bf53d07cda5c6ecec3328debae012412853c66a381687cec72e37227a8e9e
libcap-devel-2.48-6.el8_9.x86_64.rpm
64a4046e694c5b4ce148de9caad17b8d331b3f708c23b2365a86f7af99b64a83
RLBA-2024:0118
xfsdump bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems.
Bug Fix(es):
* xfsdump/xfsrestore: suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14494)
none-baseos-rpms
xfsdump-3.1.8-7.el8_9.x86_64.rpm
80d43fca687ae6c8d19200488d42b0a93f616b240c30d70001dfcf9c81169366
RLSA-2024:0155
Moderate: gnutls security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gnutls-3.6.16-8.el8_9.i686.rpm
90328b30b1e77fe3a09469a4e4708c9e1750328a9e11f385381e8c09b97ac6b5
gnutls-3.6.16-8.el8_9.x86_64.rpm
a6c6051da918f40eb7f4952645a2ad12f9143f254336f9a982349b2bb1a3502c
RLSA-2025:11850
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (CVE-2022-49977)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.64.1.el8_10.x86_64.rpm
91dd80525b31a2bc1d56af5333c83363b6b8ea2d18195d655bed33a0f9f2a5c0
kernel-4.18.0-553.64.1.el8_10.x86_64.rpm
e9b2991f56e651c88908f2c66e6ea1ec458838b7033b1608bf1c4057315c7354
kernel-abi-stablelists-4.18.0-553.64.1.el8_10.noarch.rpm
d1dfcf9ed736ebfe6700693a5d3b54fa3fdc2fda4aa88d47dc6ea21d5326493c
kernel-abi-stablelists-4.18.0-553.64.1.el8_10.noarch.rpm
d1dfcf9ed736ebfe6700693a5d3b54fa3fdc2fda4aa88d47dc6ea21d5326493c
kernel-core-4.18.0-553.64.1.el8_10.x86_64.rpm
14aa079fab669ac1711bba075f3180ac6aa86cb1280c3bc04b4ca3a7dd790472
kernel-cross-headers-4.18.0-553.64.1.el8_10.x86_64.rpm
c8f4aaa79e0b50ff1c8d5fdda91a40efb959c658ae8103b20e6664340c612e00
kernel-debug-4.18.0-553.64.1.el8_10.x86_64.rpm
1674a748477e586345035ab48ef59283f5ed1c3661c009caa2842bb8d711e87c
kernel-debug-core-4.18.0-553.64.1.el8_10.x86_64.rpm
9964dbf0f736800e2ae102b6408e79013c76daa3568f956d217c7bc651c0b02a
kernel-debug-devel-4.18.0-553.64.1.el8_10.x86_64.rpm
628d04734f4c34cf5458b7f79dee1903095552d66ffab2cc2e37efb3f6dfff6d
kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64.rpm
e59d46454b50be0f6fdc522a0ad11d8fc2dddfa16aeb5c74559c313735591728
kernel-debug-modules-4.18.0-553.64.1.el8_10.x86_64.rpm
00920dbcefd34969b7d611b9346a069e1946bcf626cd87f1cdb344a602029328
kernel-debug-modules-extra-4.18.0-553.64.1.el8_10.x86_64.rpm
048df3f34ecacceaa2fe04aaf7d05c2bfede7a3d80f323dc9465c89d11b5837f
kernel-devel-4.18.0-553.64.1.el8_10.x86_64.rpm
c61c7b24089c0582c41cc555c89a0759c004f5cf5ca59866ccb60a373f08719c
kernel-doc-4.18.0-553.64.1.el8_10.noarch.rpm
985470b9e39595b464001dacaf22c3e6e266075e57c375449ca7032ed4478ed5
kernel-doc-4.18.0-553.64.1.el8_10.noarch.rpm
985470b9e39595b464001dacaf22c3e6e266075e57c375449ca7032ed4478ed5
kernel-headers-4.18.0-553.64.1.el8_10.x86_64.rpm
439d9aa095b82754e011da8946d1fa901e3035a9ab5d0c3577f0ad1487103eb7
kernel-modules-4.18.0-553.64.1.el8_10.x86_64.rpm
7cc4684e03797dc849563c55f2b0d468287da211c697fcaf3f507ce7092583d4
kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64.rpm
abf4009bd9f3e3e6ac781f86da9d69eca4f260545a57d7d07131f21d180be189
kernel-tools-4.18.0-553.64.1.el8_10.x86_64.rpm
050ab10583fd4a191a9c5234df8408c0516bb03e975e7ecf7035c9ea162b7e41
kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64.rpm
fe17986896599153377edbe56987c2687dfec55d2e54174225bad52679fb4c7a
perf-4.18.0-553.64.1.el8_10.x86_64.rpm
4bcc44109a81ae5cc07908e98f8b908c72d89efd860bb691c62108fdf3a5cae5
python3-perf-4.18.0-553.64.1.el8_10.x86_64.rpm
a31e4e651bb3098b6cb9ece5d0232fababd33b8334b1e28bf02fdd947dd85412
RLSA-2024:0253
Moderate: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sqlite-3.26.0-19.el8_9.i686.rpm
397d4122e5aba0182dd9b3517da0ec3a79e56200bfc4f0d799b453fd7db6638c
sqlite-3.26.0-19.el8_9.x86_64.rpm
88da14af450d5762afe0edb15216ea2738a217793475ecb5d2993123c0538556
sqlite-devel-3.26.0-19.el8_9.i686.rpm
38665d627ba38d104e64771d6d1b00478e4c2fc1b98467caf13aa05a8bcfa869
sqlite-devel-3.26.0-19.el8_9.x86_64.rpm
1350a240e67a80c082b21a799a1a368ef0f4c355950bad72a71ab55b9a6bc258
sqlite-doc-3.26.0-19.el8_9.noarch.rpm
062df3cfd98abe04f209e6412438476e99f396b73ff1308ba4ec9c799a482e79
sqlite-doc-3.26.0-19.el8_9.noarch.rpm
062df3cfd98abe04f209e6412438476e99f396b73ff1308ba4ec9c799a482e79
sqlite-libs-3.26.0-19.el8_9.i686.rpm
ced154a4fa2e5d314da3c67b2aebbe21783bd730b0f3d4082eb2b0dca1d8218c
sqlite-libs-3.26.0-19.el8_9.x86_64.rpm
9ee554eb9a65df5f5295a37c860bb32dbddc4731223a980f849d2068c6fb33ed
RLSA-2024:0256
Moderate: python3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm
00c6d17ed20bf8f01d7375497ac5ba77990dbbc45c02e37bdc097a095e44f541
python3-libs-3.6.8-56.el8_9.3.rocky.0.i686.rpm
20b0a783001476c458a5fdb9d9720dbbd6629f17bf773e24744b48a7289fc88a
python3-libs-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm
3117a3990aa7596483a4a3b62a0d4f5d7e83a21c4a690cd2b0b8bcd9231173cc
python3-test-3.6.8-56.el8_9.3.rocky.0.x86_64.rpm
906e37f205f0a62cf9770261f01a465fbeedc68f553709248debc71f03dae300
RLSA-2025:12752
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.66.1.el8_10.x86_64.rpm
bac3b4adde364d73386ce64cbe11023af6a620758bdd7e55387cdc230b1abef7
kernel-4.18.0-553.66.1.el8_10.x86_64.rpm
addd7d2bf5331718bf9131d22497beaa9037775826077c0ba0966846cf654e5c
kernel-abi-stablelists-4.18.0-553.66.1.el8_10.noarch.rpm
c88b86850a18b29453b36e5a6c7a0cbf376853c9842b28b13b8fe4d42bc320db
kernel-abi-stablelists-4.18.0-553.66.1.el8_10.noarch.rpm
c88b86850a18b29453b36e5a6c7a0cbf376853c9842b28b13b8fe4d42bc320db
kernel-core-4.18.0-553.66.1.el8_10.x86_64.rpm
11c545102dd456ad47fc8d3d24d237b7475ed71d979e29ed0169bc74acc06900
kernel-cross-headers-4.18.0-553.66.1.el8_10.x86_64.rpm
a329e6318636be17cd919cb20c5918f467a65ad2a157fff35ae1169b74377a70
kernel-debug-4.18.0-553.66.1.el8_10.x86_64.rpm
7f600c5a4e1c257f68b87b07a5c6b24d3e1795f0f92a69d6d9b609268fc812ef
kernel-debug-core-4.18.0-553.66.1.el8_10.x86_64.rpm
d3871c1c03bd58329aedd4ad119d9fe401256d743bde71bdf50bcccadbae0e70
kernel-debug-devel-4.18.0-553.66.1.el8_10.x86_64.rpm
3c67ad19269866723bb65e8396d2c937452027a661d1b815c0899bdd0db31130
kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64.rpm
63aea140bad76a11ec2500ae3695e394dad10e1a09bd9be6f5e645caffdacd27
kernel-debug-modules-4.18.0-553.66.1.el8_10.x86_64.rpm
7d7b834d16b3349a8232795a28dcba65f848e4a4a2eb1be306207cd87a3d0984
kernel-debug-modules-extra-4.18.0-553.66.1.el8_10.x86_64.rpm
3d3b2000c7097f23cc9a1578e9731e3e16279bf22cbaef958329dab3df1ac594
kernel-devel-4.18.0-553.66.1.el8_10.x86_64.rpm
d1db5acc2cd8df669c7a8a5ede9efbc5e3105f4e0e055b87faba02a23c37d398
kernel-doc-4.18.0-553.66.1.el8_10.noarch.rpm
092de3840aa67e17772e7a6363cb5f36ad216acec7630fe398accff61b138a81
kernel-doc-4.18.0-553.66.1.el8_10.noarch.rpm
092de3840aa67e17772e7a6363cb5f36ad216acec7630fe398accff61b138a81
kernel-headers-4.18.0-553.66.1.el8_10.x86_64.rpm
d33f837bd652a01b6c7de5e1b6cd5492512627ff5ae531a20a6dd25679a7f2b5
kernel-modules-4.18.0-553.66.1.el8_10.x86_64.rpm
12fa9d2262bed51ffa1f4319611b6a5093c5fbca2a1744226cf7a4eafa549249
kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64.rpm
37f9ecfa6740d8416b3257cdd409307b6be598a3550b580002f31d2a753dbcd9
kernel-tools-4.18.0-553.66.1.el8_10.x86_64.rpm
12d43a32b39ae47f4d02adcd81eab226ebf2b2ad5853e947c58bd1de86fdb3bd
kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64.rpm
ae6f95a9a60044ab26a0deabcfab332b94bb69392b439c2a27623f83d1fa0be7
perf-4.18.0-553.66.1.el8_10.x86_64.rpm
dd94703098421f6530c2a688bd396fcff28518f4a82e111dcca8044c3749cb41
python3-perf-4.18.0-553.66.1.el8_10.x86_64.rpm
a27c849caef8c38528338af269770293221ca6767fde7a9ec40ed893d3b2e48a
RLSA-2025:12980
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Double free in glibc (CVE-2025-8058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-2.28-251.el8_10.25.i686.rpm
569c02983e092bed058160c0497de8c006d3a3cd0021faa79ad0177f38cf3d5a
glibc-2.28-251.el8_10.25.x86_64.rpm
d2a079666708c288fe8a68a9e88ef1f71d83f1587d08fa386504700824f21505
glibc-all-langpacks-2.28-251.el8_10.25.x86_64.rpm
fb6ecaab929b07fd4bfb77651a4fbac6cc4f70466e96049945ad7d58d9a88b12
glibc-common-2.28-251.el8_10.25.x86_64.rpm
4a4be8778e894cea7374e358af1e44462f86284cc2fd8bba9a2ea37a307392d0
glibc-devel-2.28-251.el8_10.25.i686.rpm
363f5067d76d468d5a370728522da51fd57798e952ec7fa911c4fcb689950b64
glibc-devel-2.28-251.el8_10.25.x86_64.rpm
b9508da26faedf3788e948a7cab7fa6d76592dbcb6a8c353bd624578cc77314b
glibc-doc-2.28-251.el8_10.25.noarch.rpm
c90ea9438a557de8d2e9e2df0c86ba31917c9a8d58784db64ba11b4dd6a9f750
glibc-doc-2.28-251.el8_10.25.noarch.rpm
c90ea9438a557de8d2e9e2df0c86ba31917c9a8d58784db64ba11b4dd6a9f750
glibc-gconv-extra-2.28-251.el8_10.25.i686.rpm
11e3b1efa58b17898d05e7d217caa01319019683505905fcd8aa838c624d53e6
glibc-gconv-extra-2.28-251.el8_10.25.x86_64.rpm
66d4f868ffc0b230e33c915e3929c82f628562a074ab015069d038e9020b30f6
glibc-headers-2.28-251.el8_10.25.i686.rpm
fe5a498b9c2ed52d18db9cc3753ed004ebbc0fda75bb3e9efb24765364a4a52b
glibc-headers-2.28-251.el8_10.25.x86_64.rpm
21717421ae42b027a10295b6bfd2a637f2a11839591575f27024126e3f72efe4
glibc-langpack-aa-2.28-251.el8_10.25.x86_64.rpm
1d46cceb3798087701393d063d3014d3d22f2f2d96958dc846fa77521feb12f9
glibc-langpack-af-2.28-251.el8_10.25.x86_64.rpm
25e2083f363263d510acc4e319ac2e53d98fa67dbad6237b8b14f0dfe175846d
glibc-langpack-agr-2.28-251.el8_10.25.x86_64.rpm
c04c1515865e3aa7832334ea54d22de5b27597591b1969077c9fe0eec2dc059d
glibc-langpack-ak-2.28-251.el8_10.25.x86_64.rpm
33bfda21717409b3a8aa44ed22c74ffc9cb2de30f9b88d23eef51f2f973d808a
glibc-langpack-am-2.28-251.el8_10.25.x86_64.rpm
48b540d303e18533284660c6a323be7c41c518bac6e46c9674e284a1646c1416
glibc-langpack-an-2.28-251.el8_10.25.x86_64.rpm
377c8a6a903b2fe02e228725d27cff38702d7d8891c0c53ecb52ade3672a4599
glibc-langpack-anp-2.28-251.el8_10.25.x86_64.rpm
bb563059afeb28de4755a2a87d6874bc95e378145e69537047b6018f4c0c39a0
glibc-langpack-ar-2.28-251.el8_10.25.x86_64.rpm
fd1a8061b5ff6f6a492027f326066d0a773a5f2b58889e2acbccb3d295489778
glibc-langpack-as-2.28-251.el8_10.25.x86_64.rpm
90e4336ca879307951f5eebb5908b068850367348910a28a03a92b0450f3e5ec
glibc-langpack-ast-2.28-251.el8_10.25.x86_64.rpm
42296061f67204cc20c0eb17630aee8f71ae9dd3d4bc792a4f4b14b9ecc268cb
glibc-langpack-ayc-2.28-251.el8_10.25.x86_64.rpm
5f2ce102b36fb9edc706741152b5b3b7f8f7e3620a96f0277f65c3e7240bbb77
glibc-langpack-az-2.28-251.el8_10.25.x86_64.rpm
e8d6517e0f29fac2e9c736be98a1804c2145136c051c9f4cdb0d528b3ed6b1dd
glibc-langpack-be-2.28-251.el8_10.25.x86_64.rpm
01e486c88ac3e3d1ef015bf2408fbc82af79199e351e0b1fcea610967b975000
glibc-langpack-bem-2.28-251.el8_10.25.x86_64.rpm
c60cb3e7708645b3c3258fb2a9f260e8d15e26d9d2637a26cf6a550715730e9a
glibc-langpack-ber-2.28-251.el8_10.25.x86_64.rpm
b627bf38c60d8a7b872b8c7c13de70b09ee3e0cfba901dc16afb59a7d6db3b9d
glibc-langpack-bg-2.28-251.el8_10.25.x86_64.rpm
76c69c464a84422ce3dbbf6ad87009d63f904bc6c0d72fd56c6bf113d2f282c3
glibc-langpack-bhb-2.28-251.el8_10.25.x86_64.rpm
2e2115422a623c5743e49bd65367bef07f531bcdb5f0284740267893b6d81cfa
glibc-langpack-bho-2.28-251.el8_10.25.x86_64.rpm
a124e92e438efc6786bead3261ea718c3007fa5aa34aca61b270940c9f4cb159
glibc-langpack-bi-2.28-251.el8_10.25.x86_64.rpm
61dadefc30db9d42269c9d94681b1faebfe7603ff779ef96086f612eb90edb3e
glibc-langpack-bn-2.28-251.el8_10.25.x86_64.rpm
7be7d0f508ccd9333ff35e6f3b72da8cc55ce953586d9d873eff57e4d4c0e32b
glibc-langpack-bo-2.28-251.el8_10.25.x86_64.rpm
c922ea592a60c2e5a6ed43dc872e9d8ea25282e9e730c6bbe05feccb0b54b0a2
glibc-langpack-br-2.28-251.el8_10.25.x86_64.rpm
8db38e436f091827ca7206cd35907eb588f1a0e9e14741b2ebd31c231ad70b87
glibc-langpack-brx-2.28-251.el8_10.25.x86_64.rpm
be19e92b517cb2fc6e7fb9e1f252a756e369712cee06e44eb79f22feeca0c787
glibc-langpack-bs-2.28-251.el8_10.25.x86_64.rpm
b58ab21648055d87a46f752c3f4ebccdd50241f5b654cbfd7a2bb4e0b5f900f9
glibc-langpack-byn-2.28-251.el8_10.25.x86_64.rpm
44a294b165a952db65ed713e1d49469837ced35fc898b97a034d4f862f73644d
glibc-langpack-ca-2.28-251.el8_10.25.x86_64.rpm
4e370b6f43c214350ece60f379daff6dd5e67224b1740c5ec9bb6d5e91ee8ec6
glibc-langpack-ce-2.28-251.el8_10.25.x86_64.rpm
31ec36c4590fa8f85db996b883d01472bde5c85112de8bb8ed8a639cea488a36
glibc-langpack-chr-2.28-251.el8_10.25.x86_64.rpm
d030cfc56a1f98016a9f9facd5907f59415c27fe91dd55529d6d0aef57fe74b3
glibc-langpack-cmn-2.28-251.el8_10.25.x86_64.rpm
d588b147ea8bfe3dec2fa1650981e19ffd5ed4724c9586d1776e3c8c550083b5
glibc-langpack-crh-2.28-251.el8_10.25.x86_64.rpm
6ef1dabef319db242a1475dcf30e4601756a834dec34e8a0f71faf1eb9f76b54
glibc-langpack-cs-2.28-251.el8_10.25.x86_64.rpm
99b442048f04265f6fc3f2fbafac22dc49d80b26ab2b7756873e49f7b58a9b9d
glibc-langpack-csb-2.28-251.el8_10.25.x86_64.rpm
d8d49560fe51c6a9fa525ea3a1dd35ca6e8abdb882566174f9cbb930c25558f0
glibc-langpack-cv-2.28-251.el8_10.25.x86_64.rpm
5f18e132985a96a4e5ce32b473c26edc8d46f0199608c57001488c1f8df8ba5c
glibc-langpack-cy-2.28-251.el8_10.25.x86_64.rpm
1c12e0647e6acc733b731de2700929919d1c3266d06a423b8e49d6f4539babb0
glibc-langpack-da-2.28-251.el8_10.25.x86_64.rpm
5a097c5ce524c6a549c74a40e9419cf50ad6344cc45f8ed973b031df60caf00f
glibc-langpack-de-2.28-251.el8_10.25.x86_64.rpm
6e40adbb3b5b39fa796ee83e794e056108b6edd66b3bb4d3571202265d9a7ab3
glibc-langpack-doi-2.28-251.el8_10.25.x86_64.rpm
4411707e425a1a21b8b3a8c0aa35562ff7610d307a6dd7f3a4076bd4c57d68f1
glibc-langpack-dsb-2.28-251.el8_10.25.x86_64.rpm
ac9327f6e578319762399fc4771b028199f072590d4b300743b05a5aac3e796b
glibc-langpack-dv-2.28-251.el8_10.25.x86_64.rpm
2375aee9f8aed30f6a22ae8732a5714162b5c1621b7e9e19e577342e5f26da8f
glibc-langpack-dz-2.28-251.el8_10.25.x86_64.rpm
e27b37bb7f57c7a62a4edd8497b2a03dc52e6a81be69eb6eb3d7c0e07c5943a4
glibc-langpack-el-2.28-251.el8_10.25.x86_64.rpm
765554c8df6d39d956884520de374d3418ac77d9dc766f78a767a973fecf3945
glibc-langpack-en-2.28-251.el8_10.25.x86_64.rpm
9060a6bada1f767f9693df305dcd8b761aef17891c0ffe5066573f4ca48f2247
glibc-langpack-eo-2.28-251.el8_10.25.x86_64.rpm
9a95ae0916197d0b2b1c04898fd010024011052b9e48bcfb756906d3ad58bba4
glibc-langpack-es-2.28-251.el8_10.25.x86_64.rpm
77ad89caddd172982036435f275d1fe02d8206e546c8ba951fe90b78cf26db1c
glibc-langpack-et-2.28-251.el8_10.25.x86_64.rpm
d6a7b8106cdf0ea0a348e1911b7b5eaa54b4f89bdc842d7fa36e1d9e6c2a0ee4
glibc-langpack-eu-2.28-251.el8_10.25.x86_64.rpm
b129aaf936e4d636535229ae3d876aafe2feac4bf98f99b9bb93d0761ada6883
glibc-langpack-fa-2.28-251.el8_10.25.x86_64.rpm
9a582baf9f0ff7fd33e5c6409e859cdfc3770f6b4c74524b4bced5f9983733df
glibc-langpack-ff-2.28-251.el8_10.25.x86_64.rpm
58eb8d4bec40ce53884ff47a9cb9436dc02663ebedf2a51269041bedef3a5806
glibc-langpack-fi-2.28-251.el8_10.25.x86_64.rpm
a0894fd3ac624a67d06fd16be17a29e59bd7d4d5aee5bc58a652750079c0d8df
glibc-langpack-fil-2.28-251.el8_10.25.x86_64.rpm
0464fe5920535ce9d3d25974abd62c5fc6e4d544cb4af832f9f5e4706503eaab
glibc-langpack-fo-2.28-251.el8_10.25.x86_64.rpm
10f0ddfb69fff7c798c8e61f86825691aeb13980b06ef01959715cf7e70567de
glibc-langpack-fr-2.28-251.el8_10.25.x86_64.rpm
0b85215d98619d8ffead4be1bc3058f37b8d3ce7a7447ac3c4c8f1896ca07d93
glibc-langpack-fur-2.28-251.el8_10.25.x86_64.rpm
c1e9b4823e308b5c02d8c2c74f21b3114055142146b0c3e75238aef38d8482b1
glibc-langpack-fy-2.28-251.el8_10.25.x86_64.rpm
658817f6874dd3c9b0914f23d584ad036c97834da65ed51d6bab0dbce359401b
glibc-langpack-ga-2.28-251.el8_10.25.x86_64.rpm
ad8ff68a09a2783d2fca1fce789072671e3fc5ec2f0f97858651805b094dcc75
glibc-langpack-gd-2.28-251.el8_10.25.x86_64.rpm
393d0519603dd5e3ae1300e7f4a9816f570d161597d7c34c53d8344e92ba148f
glibc-langpack-gez-2.28-251.el8_10.25.x86_64.rpm
92c21d11c22085074e47c1c83a006d005ec522f1169332199ef4a0de7388c2fd
glibc-langpack-gl-2.28-251.el8_10.25.x86_64.rpm
8a4564ef23929aed356400c7b46d4dad123d1392b7f308f0a7b845eebf1276e2
glibc-langpack-gu-2.28-251.el8_10.25.x86_64.rpm
634212d7dba04001792fc2d78e2045e79940aece06c84e73a7574a296c65a346
glibc-langpack-gv-2.28-251.el8_10.25.x86_64.rpm
983ddaceea087c715cfe69d511cd1761a35f16e0da9dfa4af5da96a78d1eae98
glibc-langpack-ha-2.28-251.el8_10.25.x86_64.rpm
6f149e09118d64f2922852843d748d8c3bcbab7ba3c94b190017d78d6bc8bccb
glibc-langpack-hak-2.28-251.el8_10.25.x86_64.rpm
9d3cf9be7ab45a5e6268b0cf0e59d89f03b2f889890515e9421061f50edb99fa
glibc-langpack-he-2.28-251.el8_10.25.x86_64.rpm
7d808547cbdb7c86b0e00b72c1b4cd60a4795d9407759a23b8d803570fefca8c
glibc-langpack-hi-2.28-251.el8_10.25.x86_64.rpm
8036def7234f8cadadd0119a3a823af0203133bdcbb22376e50f3dc79136096b
glibc-langpack-hif-2.28-251.el8_10.25.x86_64.rpm
1c7b2cb61db503f513e42cd3d3bb92f11aca7a30f0a12f8937e19f7e7fc23689
glibc-langpack-hne-2.28-251.el8_10.25.x86_64.rpm
829699f07fef157d3c7675ec19f11854ca38d7127dd3aacf86bc74a17cd592e7
glibc-langpack-hr-2.28-251.el8_10.25.x86_64.rpm
2989fef5dde9cc3aae956b848df4d4d905224fc9dfa92686da9d48c7c508aa87
glibc-langpack-hsb-2.28-251.el8_10.25.x86_64.rpm
f2c3c164f071c9676392ff10f1e7688d4036b4ed674048478494e9e73c5a150c
glibc-langpack-ht-2.28-251.el8_10.25.x86_64.rpm
867ffb81fa1da9dc061863f564becad56cf6637d3168e23ceed9624a2859c3a7
glibc-langpack-hu-2.28-251.el8_10.25.x86_64.rpm
938f1b285f5fb6439fa28740e247e4a9e9d39a9e04fb9306e06c74669b215fdd
glibc-langpack-hy-2.28-251.el8_10.25.x86_64.rpm
8e9dbf8d33dc129494063257aff71940395f9e988567fe68a54044970eaa5aef
glibc-langpack-ia-2.28-251.el8_10.25.x86_64.rpm
696e8d5bb8288f5d810c55b8df40202499846ec951f83d0509ec9b1c601321ae
glibc-langpack-id-2.28-251.el8_10.25.x86_64.rpm
31061d71a5c8bae8e393a845a8099c1ab56e6ceb76601268dcf3e49112ce5f6e
glibc-langpack-ig-2.28-251.el8_10.25.x86_64.rpm
2de9402b17b0ba11f12b3ef833d3d998115267edadd69a545f9454e80d1e03d8
glibc-langpack-ik-2.28-251.el8_10.25.x86_64.rpm
64ebc72a9fcddeb534c1c9195a5689d191ef81fb732c403746e2252f1fb433bb
glibc-langpack-is-2.28-251.el8_10.25.x86_64.rpm
b8311acd7141647266e0994c5e740279921937239e71c9d0798112c280391b36
glibc-langpack-it-2.28-251.el8_10.25.x86_64.rpm
6d1f7f5b4892cda3f91421e572154ce1a79690ba22469b6b2182333ea7eeb2d2
glibc-langpack-iu-2.28-251.el8_10.25.x86_64.rpm
8e7bea1c7169dd1da9e7f139ff331ea921dc0c55ae070830b459e6ea42a8ad6e
glibc-langpack-ja-2.28-251.el8_10.25.x86_64.rpm
09fa5d9457f7c99251008150566d816c57ef73930007056a5b7d1d2c219af9f8
glibc-langpack-ka-2.28-251.el8_10.25.x86_64.rpm
7a54a54115ceb6de29bfdf15d1495a79e6a15b2d0a1cb3087cb1e294c6ad0356
glibc-langpack-kab-2.28-251.el8_10.25.x86_64.rpm
a5e2268b4ca9c0e03a91e2e2ca273a67149ac4891047416808135186fe9b253e
glibc-langpack-kk-2.28-251.el8_10.25.x86_64.rpm
bfa8dae35e382907da4455c9227790d6587fce430968f740e13a8cf605affefb
glibc-langpack-kl-2.28-251.el8_10.25.x86_64.rpm
ab5e140b2a4ee11e962ab8d366fb2a1da1f29066ba0ac6f5380cd025b5448ff4
glibc-langpack-km-2.28-251.el8_10.25.x86_64.rpm
fab115ba694d9649e38d34fe5919994affe119127077b8dab6d87887a930636b
glibc-langpack-kn-2.28-251.el8_10.25.x86_64.rpm
b6c9e7c92ca25918699d687380c51a51520caa82dfdbd7ad7475ea295651b137
glibc-langpack-ko-2.28-251.el8_10.25.x86_64.rpm
ae497491370a2ced0a22afc0261ad0aaa2123219bef18bfbdee383bafbab45d1
glibc-langpack-kok-2.28-251.el8_10.25.x86_64.rpm
9eee6a2d5c525e40c5d3f86e22b3dbb1d74cc788167281649ff74c94465bfd5e
glibc-langpack-ks-2.28-251.el8_10.25.x86_64.rpm
129ca943143f0e74b480805043bdb753c00ed877a95f0e994b805351c1300791
glibc-langpack-ku-2.28-251.el8_10.25.x86_64.rpm
eb8574758b1a436cb4164d9ec2d167e40d23853cbdf5c7d7b6b7ac2b2d9eecf5
glibc-langpack-kw-2.28-251.el8_10.25.x86_64.rpm
3a0c1a836a135533076a615429847e46bb2aacb0c52204b0d06bd6076e8c106f
glibc-langpack-ky-2.28-251.el8_10.25.x86_64.rpm
a2231c78fd37abe5e0ad1e5dfe467fec26f4ead1c82d5310818310e3d5c97422
glibc-langpack-lb-2.28-251.el8_10.25.x86_64.rpm
040c4ab65cf6fbd75d8b67113d73dedb7419d1a4a5b5c18deaf236d8a5f87151
glibc-langpack-lg-2.28-251.el8_10.25.x86_64.rpm
04f073a635abe29b6883c19a0a6e9e3e332d1630ffd4310b3be3991d00839426
glibc-langpack-li-2.28-251.el8_10.25.x86_64.rpm
2d2168101656550edefb9ac42ae86c5788a692f5d343b143c46c0db452a71490
glibc-langpack-lij-2.28-251.el8_10.25.x86_64.rpm
85b51b52b7d24169877a778c8ca16ebafb46ddec23ce361eda88c53df8ba1785
glibc-langpack-ln-2.28-251.el8_10.25.x86_64.rpm
343abe0f512e8ca544b9553731364226c6825209cc2c89f8965599c4fd4fae4a
glibc-langpack-lo-2.28-251.el8_10.25.x86_64.rpm
a731ee013a540d72e29b69ba3b6c534341f22e72b162777b8b95825f2e8c2d16
glibc-langpack-lt-2.28-251.el8_10.25.x86_64.rpm
f117d2df907a997c636e08be9ca37ff40f1a147cc0b2792f57996120d397ab2d
glibc-langpack-lv-2.28-251.el8_10.25.x86_64.rpm
cb4f70d7f886ce0dbdc2e8d8499468b5f5e24a9b8a5a33341cf842a29f07baf9
glibc-langpack-lzh-2.28-251.el8_10.25.x86_64.rpm
7b54f1e2491ac448f30be603d7ed09b6405675262be9398fddec4f3ac189dde3
glibc-langpack-mag-2.28-251.el8_10.25.x86_64.rpm
f5e6906b50627beb49561c31c60949fe23ec50d5807ee8fa66e065ff62cf4895
glibc-langpack-mai-2.28-251.el8_10.25.x86_64.rpm
3a5ed4abe3e0c8947b4dfb20edba02d4c8d7640cb27d8cc8d00d697f987c5011
glibc-langpack-mfe-2.28-251.el8_10.25.x86_64.rpm
ee690a371e9852cd0c538093e2db1907575f4f83f4bf173dfaaae213039c45dc
glibc-langpack-mg-2.28-251.el8_10.25.x86_64.rpm
b8c853963cd96b7ebad6fb7c4ae984153ac6d00e1815dc4d18758b544cd378ae
glibc-langpack-mhr-2.28-251.el8_10.25.x86_64.rpm
26879d6cd335edc92538cd2f801d2bc5b33ace59bbd63055ba4fcd7c50d31ad5
glibc-langpack-mi-2.28-251.el8_10.25.x86_64.rpm
e679cd807a71a411cbd4335e1f588cf42a6c299bdaccd729c225b4c50c12524e
glibc-langpack-miq-2.28-251.el8_10.25.x86_64.rpm
10a1b84dad3d1d799d7a2b2194ee7cebf91d3665cf7935cc35be03a5913f563a
glibc-langpack-mjw-2.28-251.el8_10.25.x86_64.rpm
3924126829924ffa0a2e1e1ab400f28234f62bbae9f0ad01029ac429ddae94f0
glibc-langpack-mk-2.28-251.el8_10.25.x86_64.rpm
96d0ce916dddb1749e6b3c6dd96918e6871be787fecbdcde38e40489056bef94
glibc-langpack-ml-2.28-251.el8_10.25.x86_64.rpm
e74b728f709b3065a3b875937d49b23f1672f3709435ffb0646fa72d6ac06dce
glibc-langpack-mn-2.28-251.el8_10.25.x86_64.rpm
4e79601fe5fdd3b286188b84e740bb2a067ea4f8919d3222e1bd00fc3f8f571a
glibc-langpack-mni-2.28-251.el8_10.25.x86_64.rpm
268fedb0c8d64350c3ae6409f19673f30c7f76ce755a76bfc449188ebfc33c76
glibc-langpack-mr-2.28-251.el8_10.25.x86_64.rpm
4b86db0d005e3d17773bdbc910cf5292060841c141fc6e6d044bcc4f0e49ce26
glibc-langpack-ms-2.28-251.el8_10.25.x86_64.rpm
559af3a62e31357807030d2116177dde9f912aebb65fc77f8a118bb3639bd48b
glibc-langpack-mt-2.28-251.el8_10.25.x86_64.rpm
13818002f3463c767299607d51d962a3c26c1ad0a8edb47a61cfeae03db2be16
glibc-langpack-my-2.28-251.el8_10.25.x86_64.rpm
4355a915c3b122b93b8dc70f74ef9031b027c570edcd0517d97a116ea67e398c
glibc-langpack-nan-2.28-251.el8_10.25.x86_64.rpm
1db1e8e4071772d785fa79a0ca1f66f352dda780329f766be72cd9c714983c50
glibc-langpack-nb-2.28-251.el8_10.25.x86_64.rpm
b6609cb5cd090fcd1e9c8c2392303e984e795006a6192bd550bd5d368dd4b000
glibc-langpack-nds-2.28-251.el8_10.25.x86_64.rpm
d7b9d4ab886882021c4ebf1c9d22103285f20811723fabe12ca50d7d4e1a4ebd
glibc-langpack-ne-2.28-251.el8_10.25.x86_64.rpm
3a30c2bee503911cd42a7ee9c1ac13e82d632afff12da536e184243e4813716a
glibc-langpack-nhn-2.28-251.el8_10.25.x86_64.rpm
4d684f093077a0950e1acffb22bd5e6acd51f19b07381749e4124f3b1fe78531
glibc-langpack-niu-2.28-251.el8_10.25.x86_64.rpm
9748f4ee4303b5a7f4a01624146d2609f5138b6e411a516637518f3c9761cac0
glibc-langpack-nl-2.28-251.el8_10.25.x86_64.rpm
554857d592a8ebb6aa70ce62fe6dd78e1d926a45db2514591078e1713e649a8b
glibc-langpack-nn-2.28-251.el8_10.25.x86_64.rpm
d3c3d9ade2c6f8faa1ff304d17dfee7fd1e2d2c36ad8372ff5be9ac73c723cdb
glibc-langpack-nr-2.28-251.el8_10.25.x86_64.rpm
c4f9cf12b78442067881d41e8b195d2f5263a754dc7172a36ce4b984652ad69a
glibc-langpack-nso-2.28-251.el8_10.25.x86_64.rpm
566413680a9c056fd0a792168883b1e09473b7a5246624cddc000145c7380efe
glibc-langpack-oc-2.28-251.el8_10.25.x86_64.rpm
337dd2b3c6559ccacdf87d110fed957a2f932ff62a54c094c2d4473bfca941a3
glibc-langpack-om-2.28-251.el8_10.25.x86_64.rpm
87672cd7f10e608dd6ada6bc75eacb13426c357df7555d7f10ec2008e97c22fb
glibc-langpack-or-2.28-251.el8_10.25.x86_64.rpm
e7e0245f455a082ab56a991a5cf5be1f7c8e4961cd1accfc3907198276753e35
glibc-langpack-os-2.28-251.el8_10.25.x86_64.rpm
2cea59fc583344957b034e1abc586fb7b7c00bac58025a4cdfd5f5abf8ca1404
glibc-langpack-pa-2.28-251.el8_10.25.x86_64.rpm
2d8d4f99d15eb616c99469e073c19b170367415d0241b7487a28bb5ed5d54148
glibc-langpack-pap-2.28-251.el8_10.25.x86_64.rpm
71f69700a112a893c26e4d635d08708262b43f20645ee8e4e7b64553dad2b6db
glibc-langpack-pl-2.28-251.el8_10.25.x86_64.rpm
3a192847b2745cbfc7182be7d957aae2c1ba1c27748a80189674792650456b19
glibc-langpack-ps-2.28-251.el8_10.25.x86_64.rpm
e1d69d77aed5323f6008e79aba98d2b8b2e06bec7901123b4bcf0d63e05e5b5c
glibc-langpack-pt-2.28-251.el8_10.25.x86_64.rpm
d17930f9836264928115a449d58c2be41a70135edd1b5a31c359153b30569bc1
glibc-langpack-quz-2.28-251.el8_10.25.x86_64.rpm
aec37f3a6b5eac2d17f19dc60263313a22e354dfc7f3ac28e8ee8ae3fabac291
glibc-langpack-raj-2.28-251.el8_10.25.x86_64.rpm
ca6cc7210bb1b304a5277b60838d40b7cf1e58b6b39a54aa5d45534081aa4c5d
glibc-langpack-ro-2.28-251.el8_10.25.x86_64.rpm
63ecee8566387f05da9a06e5c7c08c3da4c3fd7f614f42e392061e69602d6de9
glibc-langpack-ru-2.28-251.el8_10.25.x86_64.rpm
f66ebb08e2a918af1c82908daa626851d621db14e7435efab24224d7e683ea69
glibc-langpack-rw-2.28-251.el8_10.25.x86_64.rpm
a874cd90bee0b324a2bae2e36a91f323aa2185a5b516380d7407e4e8af709e1c
glibc-langpack-sa-2.28-251.el8_10.25.x86_64.rpm
361a12110749bdabde56d44280dfb1bebe848f1076e20441c8edfacbaba840c5
glibc-langpack-sah-2.28-251.el8_10.25.x86_64.rpm
67fd87a4deda9d6f3a77df11bc6c42bf7f4688b39b06533419a086ef3d7803ed
glibc-langpack-sat-2.28-251.el8_10.25.x86_64.rpm
f04d5f537b95b4b2012d56d7b288c55e4f8c5624064fb3987c1b63a60a58384b
glibc-langpack-sc-2.28-251.el8_10.25.x86_64.rpm
4b5600ddc2558fc0344df4aff5ac2ff08d9e10039cafe7314b648c85571f7a8a
glibc-langpack-sd-2.28-251.el8_10.25.x86_64.rpm
8344664f7cb4a5f246d63f63dc30d1c3babd12fba25ab66acd696dc52b332aeb
glibc-langpack-se-2.28-251.el8_10.25.x86_64.rpm
21bc6e264263c6ec7eb6b50fe363ce8ab0b8e904f788aae51b0b09e6fa7f0fd6
glibc-langpack-sgs-2.28-251.el8_10.25.x86_64.rpm
d8b31aab6f5b7a3e1776edf964cd3ed47dc42499681dd3d9a22494e9d989ef8e
glibc-langpack-shn-2.28-251.el8_10.25.x86_64.rpm
df59e2cb23425a7b33d69c98390016a3041ae1604800019d7bdfa4dde0cf7815
glibc-langpack-shs-2.28-251.el8_10.25.x86_64.rpm
5b434ae4153d46e995cfdb10b36b0089916cff2edb0697bd75f3cdca2d622ec5
glibc-langpack-si-2.28-251.el8_10.25.x86_64.rpm
540baf9d485b401c1acfc648c0357d19c1fc7ec031004bd8b71e7c5dc54c67f0
glibc-langpack-sid-2.28-251.el8_10.25.x86_64.rpm
c09737b4c6a8910c75d9c909cce78871eec3c483252fcaf8df494500a551e0c9
glibc-langpack-sk-2.28-251.el8_10.25.x86_64.rpm
7f9660590d010ae3afd9e26d5bb17c906f4ccf283a4d726c9f403818b332e783
glibc-langpack-sl-2.28-251.el8_10.25.x86_64.rpm
aac823d70f52ff956a8df67fab739dd004df460e69ddfed0ea1df802d6bb8b42
glibc-langpack-sm-2.28-251.el8_10.25.x86_64.rpm
79804ee11b8d2cc79e215852e94d8d8f02a244778fb33542b10cc6706df082c1
glibc-langpack-so-2.28-251.el8_10.25.x86_64.rpm
724a1b20d138ff71ed748179cab38d2b99c2a1b77dfc63e8ffac243d2077eea0
glibc-langpack-sq-2.28-251.el8_10.25.x86_64.rpm
2c8e30ce5537e7700fc3275e987a9e98cdf2a4941da4beb8c681ac39b019f758
glibc-langpack-sr-2.28-251.el8_10.25.x86_64.rpm
6025a205733b2096fffce5c01ee7ca7b38a453e2e3918b8f50cba33a2abd7ef7
glibc-langpack-ss-2.28-251.el8_10.25.x86_64.rpm
6d943b9a318110283b34bb88acf7120d22829ea4a78b3b56672515932490d6be
glibc-langpack-st-2.28-251.el8_10.25.x86_64.rpm
57134923fad4897f323085dc32bc127d05abfcdff8ceb97d22f3703df18ff812
glibc-langpack-sv-2.28-251.el8_10.25.x86_64.rpm
8569cb1ce168c1a651ad176ca734a76c342fd822baa164227091bfa3bed47059
glibc-langpack-sw-2.28-251.el8_10.25.x86_64.rpm
07bf26b2d7196b6b372b7d2b0f244d8fd71c57e364e685a45351ab26d4c1f9cd
glibc-langpack-szl-2.28-251.el8_10.25.x86_64.rpm
d4487c1357c348b90aa3ca54351d5ffaa96cc44ddf053b432d3255e604256479
glibc-langpack-ta-2.28-251.el8_10.25.x86_64.rpm
06f8c99f4b97c1ede6cb082b9b893a634c53d7b58f8464a814ddb23db46b4807
glibc-langpack-tcy-2.28-251.el8_10.25.x86_64.rpm
f5b7e1839153aab4ba7b5b065215fdeb28642c191f94aee084d7da93b9c045e3
glibc-langpack-te-2.28-251.el8_10.25.x86_64.rpm
35beb2d7f0fb455ec0ce21e8a2ceecb849b1e3c8a6b414648ae0c82e3a3e02bb
glibc-langpack-tg-2.28-251.el8_10.25.x86_64.rpm
03c4c9973156eb1beaedc54cee77c9eb57ee240e2163ae06ecb059a71a34daf9
glibc-langpack-th-2.28-251.el8_10.25.x86_64.rpm
5bbe4fafd04d81e036e57922a441e0fdaad82d1abc8c6ae7a7c2a0204edad1a4
glibc-langpack-the-2.28-251.el8_10.25.x86_64.rpm
34ca2370696ac5cf388ddce1e95342edbf47686f37c654f92ecbce98f869544e
glibc-langpack-ti-2.28-251.el8_10.25.x86_64.rpm
2ae7014f3024250e2d19398d5cc5a851840d53df57995c23e6fc518dc1977c09
glibc-langpack-tig-2.28-251.el8_10.25.x86_64.rpm
59db7d0dbad2a0faa70b0c81c7aa6523fc235b1799e1b5ebe0cc18f08c7eefce
glibc-langpack-tk-2.28-251.el8_10.25.x86_64.rpm
f7c388b821ab2ba5c6247aba9d78bb6fbdd2b59271ef0fab4c457490b02c0ae9
glibc-langpack-tl-2.28-251.el8_10.25.x86_64.rpm
a45e1973686fba0325a0202345112994bdff64ee866434c5029af560d31200d7
glibc-langpack-tn-2.28-251.el8_10.25.x86_64.rpm
0180ce11788a92098a242c0222955934aa09d6e7fdbfa4baf5d3168fe04f7096
glibc-langpack-to-2.28-251.el8_10.25.x86_64.rpm
a426b0d8b617ee92ed1119c9b0d5de4bdea88e9872947c12d1aca7ba0ed2669d
glibc-langpack-tpi-2.28-251.el8_10.25.x86_64.rpm
d7b7067d7bbff354e9bdc137abb9376e26309301be2fcf45d3820f8a55f49099
glibc-langpack-tr-2.28-251.el8_10.25.x86_64.rpm
03c033b2ebd8877716da014b8b16d8587637bcd3290a1ff6c3fc70c4f461c00e
glibc-langpack-ts-2.28-251.el8_10.25.x86_64.rpm
ea0c2301b9f095286f80b5a76e76feb96df26665214cbe048881840df768829d
glibc-langpack-tt-2.28-251.el8_10.25.x86_64.rpm
5c7056f157abfb897b8134ab8920bb6852ee60a67b0052cd4cd2f1b67ed46c51
glibc-langpack-ug-2.28-251.el8_10.25.x86_64.rpm
ebfb58b149216be93e6fc40ee935333223dcdd220ed7e4bad1f9510a48b2720b
glibc-langpack-uk-2.28-251.el8_10.25.x86_64.rpm
a2fa4bf313534b6891fd313c9f3779e44e0960d5f77a309d48f8ae9a346aac46
glibc-langpack-unm-2.28-251.el8_10.25.x86_64.rpm
0ea8494a5722c21ff5b2bef50be7ec9c75efdb8986fd256e1ba711d4028f6659
glibc-langpack-ur-2.28-251.el8_10.25.x86_64.rpm
8a81444c398bc61313a623da7cef25b89220ede956dc2026d31f816c1b1b7c75
glibc-langpack-uz-2.28-251.el8_10.25.x86_64.rpm
f091a72112a7b9563e2642a0789c77f344fba0a2494d0c2126c700c1aa4eca77
glibc-langpack-ve-2.28-251.el8_10.25.x86_64.rpm
22167fa45cacd4c5cfd5fef7e7a706f27c5e60da091ce08f60905f7480affa17
glibc-langpack-vi-2.28-251.el8_10.25.x86_64.rpm
bcf8f18c2a3ea20a4cb0fd02fc1c47a6d523067f7957ce67d17745a726bf784a
glibc-langpack-wa-2.28-251.el8_10.25.x86_64.rpm
9cb92360d3c39e83ec05c54ded6cb271bb3a94e201d06c25eacc4fbdeec05f98
glibc-langpack-wae-2.28-251.el8_10.25.x86_64.rpm
e60825717b8707373e78e52eadb70a7dbe7018c4e2d2eb8c939bed06e2ac255e
glibc-langpack-wal-2.28-251.el8_10.25.x86_64.rpm
7fd65bf97574a599951154eb338ccbdfb0e25f0d9e5809f7d05beec30d63c421
glibc-langpack-wo-2.28-251.el8_10.25.x86_64.rpm
3e520e83268c61055daebaba12eb65d2e24dda1a6071738aadee55112a814d73
glibc-langpack-xh-2.28-251.el8_10.25.x86_64.rpm
67ad5d3a8877770ab36e8de887ba2817361f71015efb53cb54709149a27e094a
glibc-langpack-yi-2.28-251.el8_10.25.x86_64.rpm
2956beda549fbe96ec32f839902cabc1eef13aafb833324fb518c27f3fad4c1b
glibc-langpack-yo-2.28-251.el8_10.25.x86_64.rpm
fa6eb550870dc763b1f4e94d67507f5d003bb7b8e928be0f843346194bdcfd59
glibc-langpack-yue-2.28-251.el8_10.25.x86_64.rpm
0740d4346770d72cc479058f091aca67e4471766fdc6eb8d4f2a67bfb228eaec
glibc-langpack-yuw-2.28-251.el8_10.25.x86_64.rpm
1e2aa6a841b1192cbbe299950ec0cba64dcd0ad1010c72b40026c83313fae441
glibc-langpack-zh-2.28-251.el8_10.25.x86_64.rpm
f704c31e8e8633dd897b46422e8fc1fe15bc29827f7f16bc2c3b41a9162bfa35
glibc-langpack-zu-2.28-251.el8_10.25.x86_64.rpm
76a9dd3539ca781e38a3b6f9fbebd6c43b1785a38ef6bc956594f28c7fd26a21
glibc-locale-source-2.28-251.el8_10.25.x86_64.rpm
9c93261f11860447664f146e3228353977827318e571186cd788121883bab52e
glibc-minimal-langpack-2.28-251.el8_10.25.x86_64.rpm
0052d1bd316d8ac7c5efc541e3f4e92954b6bdb75ed6ac0c793879259434b2f3
libnsl-2.28-251.el8_10.25.i686.rpm
48c374283a1da13bddbe5da472d4ad28e81d6083ca10a3c19f0d6428a3210595
libnsl-2.28-251.el8_10.25.x86_64.rpm
973d160052d822e76051deda5b5c1c04b5c105af94574050a4810076d5c22ec4
nscd-2.28-251.el8_10.25.x86_64.rpm
42f03d4e00ad29935ca20069283068807ccaa03ecaf4228f49111abe087f2cd7
nss_db-2.28-251.el8_10.25.i686.rpm
f1759007059b45e9aa98f8bb3fc57d7dfe14276dccec1761ded080d24bc87b7a
nss_db-2.28-251.el8_10.25.x86_64.rpm
e90422acdca72e9d753a5dcf5cdcbbfb56b46851d75cf634d1e2384735fc4de0
RLBA-2024:0898
python-cryptography bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-cryptography.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers.
Bug Fix(es):
* [FTBFS] rsa_pkcs1_implicit_rejection breaks test_decrypt_invalid_decrypt (JIRA:Rocky Linux-17873)
none-baseos-rpms
python3-cryptography-3.2.1-7.el8_9.x86_64.rpm
43ee033b549f4a2b862edd008cbf41374882c0cbabf5d4143f7a02b661bfcc83
RLSA-2024:1601
Moderate: curl security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218)
* curl: more POST-after-PUT confusion (CVE-2023-28322)
* curl: cookie injection with none file (CVE-2023-38546)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* libssh (curl sftp) not trying password auth (BZ#2240033)
* libssh: cap SFTP packet size sent (Rocky Linux-5485)
none-baseos-rpms
curl-7.61.1-33.el8_9.5.x86_64.rpm
c395c8f0f93726d40b0a7ddd835bd54477172d80b3d9217b59e19028d471c213
libcurl-7.61.1-33.el8_9.5.i686.rpm
e782eb3128514f8fb52ae9acb17c0e4d99a7368e445248518fdaf4b21d80bf8e
libcurl-7.61.1-33.el8_9.5.x86_64.rpm
c1d0f1fd52c2ebad2365531a42e91d79af21d34b173c41e0ca19827e072f2a6f
libcurl-devel-7.61.1-33.el8_9.5.i686.rpm
6e6a572f03f4150f0e9ad793c103b7c2cfbb32c10a12ddfefd7101be674fd18f
libcurl-devel-7.61.1-33.el8_9.5.x86_64.rpm
11131122c4f29bf3e9d143faae3efd008e2bd1f4d96993150bd1947af21b83e2
libcurl-minimal-7.61.1-33.el8_9.5.i686.rpm
598f41f5fef29245d6ebdd0bdd2193f68c77b8f78cf2ca6c70efbe029350f8da
libcurl-minimal-7.61.1-33.el8_9.5.x86_64.rpm
151ab6c706d7aa8eaade81a63585ae421ac91f12d179a7891cd6935f6ea18a61
RLBA-2024:1604
NetworkManager bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es):
* Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600)
* [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968)
none-baseos-rpms
NetworkManager-1.40.16-15.el8_9.x86_64.rpm
48da1b81cce6b3b83a482cfb8e6d7676a1bff7f7674b87631e9def6a7e30e073
NetworkManager-adsl-1.40.16-15.el8_9.x86_64.rpm
474a026ab535777c7264755efa9d776bc877d443d6ff3fcae81c487c12105885
NetworkManager-bluetooth-1.40.16-15.el8_9.x86_64.rpm
86d13c3405afe0f1610e384a47de5ce6055704395ce5e837d6dadcd9892bfb81
NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm
7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44
NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm
7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44
NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm
b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f
NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm
b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f
NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm
705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30
NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm
705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30
NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm
6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93
NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm
6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93
NetworkManager-libnm-1.40.16-15.el8_9.i686.rpm
24502121a202c342dd9dcc97ee116c7537d0f8950b73150740385ca4556cb42d
NetworkManager-libnm-1.40.16-15.el8_9.x86_64.rpm
3911b290a4f36569df75674b8a959d9771972ceba5c9e0d067c4af3305c462d2
NetworkManager-ovs-1.40.16-15.el8_9.x86_64.rpm
c79c415939f051f3bad78797a287a0531e131e8ebc1c166ca7abcf381c669965
NetworkManager-ppp-1.40.16-15.el8_9.x86_64.rpm
02bc73184d084a76dfaa8e7144f883e96067b501c9b09186a5231fb42047c483
NetworkManager-team-1.40.16-15.el8_9.x86_64.rpm
3f4960bf57e6c4264125b181b3f3a236431616f4e8f7c820ea34906c2c296f94
NetworkManager-tui-1.40.16-15.el8_9.x86_64.rpm
ee87c160b59aa7ac7c0bf3e3cc1a5850f2aa2c72a75a6d20b6521ad8fcf9659d
NetworkManager-wifi-1.40.16-15.el8_9.x86_64.rpm
93ecdf508147d0b081549133a71ed7f7a84240caa32ca3373a8dd8a13269ba4b
NetworkManager-wwan-1.40.16-15.el8_9.x86_64.rpm
ed422416d4b53e93ddf51a50af1ff3aef9271d3870e391aae0dd958845ab6fa5
RLBA-2024:1605
perl-HTTP-Tiny bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-HTTP-Tiny.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HTTP::Tiny is a small and simple HTTP/1.1 client written in Perl.
Bug Fix(es):
* perl-HTTP-Tiny: man page not updated to reflect fix for CVE-2023-31486 [rhel-8.9.z] (JIRA:Rocky Linux-21793)
none-baseos-rpms
perl-HTTP-Tiny-0.074-2.el8_9.1.noarch.rpm
2a2106eb7e08a0bfd8a6daf5770cd4616b46dc037a2e5f569fedfc8922c84596
perl-HTTP-Tiny-0.074-2.el8_9.1.noarch.rpm
2a2106eb7e08a0bfd8a6daf5770cd4616b46dc037a2e5f569fedfc8922c84596
RLBA-2024:1606
util-linux bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon.
Bug Fix(es):
* lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562)
none-baseos-rpms
libblkid-2.32.1-44.el8_9.1.i686.rpm
ecbc11d4d5864bd6609a8243831a2c7a2bf8cb25a969294fa93c405dae5a9917
libblkid-2.32.1-44.el8_9.1.x86_64.rpm
75e36e64085e7ef1030f34cb77824e43c3980ff69d8a9447f4398a6d10a5f8c7
libblkid-devel-2.32.1-44.el8_9.1.i686.rpm
d0b46c05083cdf1d7b4494f757dc9bed59fd7606c52ef185e2a80be571e21953
libblkid-devel-2.32.1-44.el8_9.1.x86_64.rpm
d3ea95e9094c9dad5f3c9e52a0a2eafac2d4cae03b2e3f145ba5ce6b1172e807
libfdisk-2.32.1-44.el8_9.1.i686.rpm
dbfb62d525982f6d458117db75b0b2ce36eadb58bbf290e8e667e8aeb46ec230
libfdisk-2.32.1-44.el8_9.1.x86_64.rpm
3f9cf40332bb1f3636e5aafe19c2adb4a920f31124a8aa2df186fdc81a5e1255
libfdisk-devel-2.32.1-44.el8_9.1.i686.rpm
b91de68c1b9a95f256aebc004738ef0863d4d011b5e2269d19ca59f626627539
libfdisk-devel-2.32.1-44.el8_9.1.x86_64.rpm
95ace0357b40f2f91f631baed0c648a54738a19975473243f6fa826e496eec41
libmount-2.32.1-44.el8_9.1.i686.rpm
7f143b1f10a7e826789c53aa5bdff5019cdb8d8fd1ba90463534f7815e8a51a4
libmount-2.32.1-44.el8_9.1.x86_64.rpm
09e47337447004b28c4bdf8e96c72930128b30a1b730aa05c36c85852ff00c21
libsmartcols-2.32.1-44.el8_9.1.i686.rpm
0b8ebf152a95ca86d2d696f750ef48856ac173775097d8f104b033830c8ece8f
libsmartcols-2.32.1-44.el8_9.1.x86_64.rpm
4ac9720b77ceea7c95d65ef2756240b04d6bcff5dc26971b2cd51c15b2546310
libsmartcols-devel-2.32.1-44.el8_9.1.i686.rpm
42dda13387c045a57dfb3588459a8e6b4510e9a93f5a7440fc738a96846c6e9f
libsmartcols-devel-2.32.1-44.el8_9.1.x86_64.rpm
7f2b1bfb7d548e86626c314aa75576a4db786d5783dded08cce474b0409b6901
libuuid-2.32.1-44.el8_9.1.i686.rpm
99a180160587f3cd17e3c72583e7afe2178abe75a847a7dd9918cfa3c12fb024
libuuid-2.32.1-44.el8_9.1.x86_64.rpm
a1feb216c0b358b382ff1c3283741a82cf4c065a152058bf890118dc2ce103e8
libuuid-devel-2.32.1-44.el8_9.1.i686.rpm
12db954b819ca7212b71942257ed7ee9f92e5a61a482c11c83875eca7d6565f2
libuuid-devel-2.32.1-44.el8_9.1.x86_64.rpm
18b0479bd96a5f7045b649f8e037a38fed5f96e619af9cc399540231c5382f71
util-linux-2.32.1-44.el8_9.1.x86_64.rpm
e9938cc50d0923e2add2a538494e9d7d6a7bc6f9c302d8705a50b74b1f8f8452
util-linux-user-2.32.1-44.el8_9.1.x86_64.rpm
b9aa2e15a4e2b81f04af9d7b9a2dd8a0f491a9e93830c9243a99a2f42dcfa37b
uuidd-2.32.1-44.el8_9.1.x86_64.rpm
6d301026ed318849fd0980838bf5e00f93c75d4c865eb4e7a74aac81fb176f09
RLSA-2024:1607
Important: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096)
* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931)
* kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527)
* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565)
* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042)
* kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631)
* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)
Bug Fix(es):
* OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394)
* kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010)
* Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055)
* kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766)
* tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822)
* kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077)
* kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930)
* rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204)
* kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479)
* ceph: several cap and snap fixes (JIRA:Rocky Linux-20909)
* [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063)
* unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719)
* [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101)
* kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954)
* backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139)
* kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331)
* ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496)
Enhancement(s):
* [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811)
none-baseos-rpms
bpftool-4.18.0-513.24.1.el8_9.x86_64.rpm
d4c3aa2b5cb6771de2282f947915ff82aa641a1cf2478581a9f9bd8af7820ed9
kernel-4.18.0-513.24.1.el8_9.x86_64.rpm
02ccdba68d5aaf2cf21d222efe4dd271df62ff682b3de81f49f4b4ceafb63efa
kernel-abi-stablelists-4.18.0-513.24.1.el8_9.noarch.rpm
9dc4f48648f746ab7608ac9c020aaa0ba2c223bc5a53d56be0b1d2e25784e753
kernel-abi-stablelists-4.18.0-513.24.1.el8_9.noarch.rpm
9dc4f48648f746ab7608ac9c020aaa0ba2c223bc5a53d56be0b1d2e25784e753
kernel-core-4.18.0-513.24.1.el8_9.x86_64.rpm
28241862f2cbc97ada16325e526c686a65cdcaa1ddac75e7cd4be45290b4f4d9
kernel-cross-headers-4.18.0-513.24.1.el8_9.x86_64.rpm
79c421cd229fc5728be38c237622e344cb4d4e690bd1ee2c425d190d8e7d8cdf
kernel-debug-4.18.0-513.24.1.el8_9.x86_64.rpm
02bab9449a913729101739764d3391c0bb56e6b16d2f623c4a8748c9ec1af9da
kernel-debug-core-4.18.0-513.24.1.el8_9.x86_64.rpm
b34a032e2b0dcb9c0e7b032bffe5bcf00a76aceb1727d6d7a0feacf4e43fba32
kernel-debug-devel-4.18.0-513.24.1.el8_9.x86_64.rpm
0d8fb2c1644b7e46c48198d6b59af7f9c1e70059ba264be9fe5086e397f9d23e
kernel-debuginfo-common-x86_64-4.18.0-513.24.1.el8_9.x86_64.rpm
ba19285eb7930dc197c012f368ab070c9b48295b5e7e19e4c47367cbde48c79e
kernel-debug-modules-4.18.0-513.24.1.el8_9.x86_64.rpm
cca2de059383f24b5bb7c0803b63aa0327e950598ca79f90d3cf4d9a7ef8f6b4
kernel-debug-modules-extra-4.18.0-513.24.1.el8_9.x86_64.rpm
f3b9cab2d7e6c9647e57d400e1ff6d01cffc5a5f5519809084dbcfd3435e1c22
kernel-devel-4.18.0-513.24.1.el8_9.x86_64.rpm
36a38a8fb290219442d34450e1e4b78d8b9819295f2d41d2fdf168c1adfcc15e
kernel-doc-4.18.0-513.24.1.el8_9.noarch.rpm
0def6c11404ddde26d393bca3efa0981d5813ee1745c7e4a2b15c86c98b86937
kernel-doc-4.18.0-513.24.1.el8_9.noarch.rpm
0def6c11404ddde26d393bca3efa0981d5813ee1745c7e4a2b15c86c98b86937
kernel-headers-4.18.0-513.24.1.el8_9.x86_64.rpm
9e6b11688073157daa2b14868002d890f4adc3d6afe11e95cf3ee22d128c611a
kernel-modules-4.18.0-513.24.1.el8_9.x86_64.rpm
d93967af2c3647e0839ab50f0780c97fb3686268eaeffd7dda92c77966a9c533
kernel-modules-extra-4.18.0-513.24.1.el8_9.x86_64.rpm
e33e30c9ed2c74979ba27686808a1b28d266971c15a56851c1777b447da305a1
kernel-tools-4.18.0-513.24.1.el8_9.x86_64.rpm
24f4146ec22f66c0885f93ab9b693b644f36ada46e900494f84a8c04fbaba23f
kernel-tools-libs-4.18.0-513.24.1.el8_9.x86_64.rpm
d737ad1b21a2c43c3f3cd1a9c08f5dc7cb7b0270b551e8834d906975bde5e7c0
perf-4.18.0-513.24.1.el8_9.x86_64.rpm
b851bf91fb2a6ab4a19a866ed1e8241a9ee6765b034450a2fbd4c271cbab9c90
python3-perf-4.18.0-513.24.1.el8_9.x86_64.rpm
fad3b87238e26daaef95060e4367aad5856760729b3c3664a61f61a436eaebc9
RLSA-2024:1608
Moderate: opencryptoki security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities.
Security Fix(es):
* opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
opencryptoki-3.21.0-10.el8_9.x86_64.rpm
90cba074c678b9ea77314650012b8f9ffe11c0a3d895ac8e1c4fda4323d55c46
opencryptoki-icsftok-3.21.0-10.el8_9.x86_64.rpm
a72b241eabe73089ecc2e68b50919f5edec77a24824d2104ff1e471318f97a25
opencryptoki-libs-3.21.0-10.el8_9.i686.rpm
efcecf4464c0ab6e279674bcc813ad2e7cba7d8d768281fc2e80965fed6761c8
opencryptoki-libs-3.21.0-10.el8_9.x86_64.rpm
a1f9973f52e9c3ca03d6169408c96499c01eced26b4546efa1323f853c1b37b4
opencryptoki-swtok-3.21.0-10.el8_9.x86_64.rpm
559d3aaa09dae4d99fe6db8d8b022bed871d7802cb42a7a0e93cc7b93883012d
opencryptoki-tpmtok-3.21.0-10.el8_9.x86_64.rpm
f50f088d470ad128adabf15c4752d34236ac831947533fda3d2448e2c8fbad8c
RLBA-2024:1609
python-pip bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Bug Fix(es):
* python-pip - require Python with tarfile filters [rhel-8.9.0.z] (JIRA:Rocky Linux-25449)
none-baseos-rpms
platform-python-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm
5fc0d2372285ab4b67ce22df0e339dc53f7cf961a7d4304f870a4d03c7719a74
platform-python-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm
5fc0d2372285ab4b67ce22df0e339dc53f7cf961a7d4304f870a4d03c7719a74
python3-pip-wheel-9.0.3-23.el8_9.1.rocky.0.noarch.rpm
c35cfde3728fbeb84e395247089088c87a9750091950213631435e86f86ec07d
python3-pip-wheel-9.0.3-23.el8_9.1.rocky.0.noarch.rpm
c35cfde3728fbeb84e395247089088c87a9750091950213631435e86f86ec07d
RLSA-2024:1610
Moderate: less security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for less.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors.
Security Fix(es):
* less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
less-530-2.el8_9.x86_64.rpm
dfdb3e447001de813ae20024990c3a434f8f76e96ba8ea3f14a86f833318e66c
RLSA-2024:1615
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: parsing large tokens can trigger a denial of service (CVE-2023-52425)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.2.5-11.el8_9.1.i686.rpm
c882782b30b295de120618eabf31df4b95d974fa78cd8bec61ccaf3dba81b7c3
expat-2.2.5-11.el8_9.1.x86_64.rpm
9cb51fd81d64f5ca0e846689f45e447d445d58091fec8558e044f71cd74c2401
expat-devel-2.2.5-11.el8_9.1.i686.rpm
47dc683c808d1dc77eef3ab103533cf9c0fdcdaf48dcd816c918f2b224ded395
expat-devel-2.2.5-11.el8_9.1.x86_64.rpm
50e800064f774d3973414ad9996012bfb7f2c4cf5df983a4cc5600db706628a4
RLBA-2024:1739
sos bugfix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Update reference to sphinx in upstream wiki. (JIRA:Rocky Linux-17924)
* Capture information for pre-conversion in convert2rhel. (JIRA:Rocky Linux-21331)
* presets test failure on sos-4.6.1-1 (JIRA:Rocky Linux-22395)
* The "#wbinfo -t" and "#net ads testjoin" outputs should be available in sosreport. (JIRA:Rocky Linux-23665)
* Entries "epo" and "map" in hostname_map section of default_mappings change the "sosreport" file name. (JIRA:Rocky Linux-2399)
* fwupd starts to run during sosreport and it continues to run after sosreport (JIRA:Rocky Linux-24342)
none-baseos-rpms
sos-4.7.0-1.el8.noarch.rpm
021f3d73e9f1e3880d66db3b3e4d5ec3a86bf4895f050c942672c97b438dd2b4
sos-4.7.0-1.el8.noarch.rpm
021f3d73e9f1e3880d66db3b3e4d5ec3a86bf4895f050c942672c97b438dd2b4
sos-audit-4.7.0-1.el8.noarch.rpm
8e362a542e2317f6987396591278c1f33f9c987f0579b9392b0fd0c608e53796
sos-audit-4.7.0-1.el8.noarch.rpm
8e362a542e2317f6987396591278c1f33f9c987f0579b9392b0fd0c608e53796
sos-4.7.0-1.el9.noarch.rpm
629e3df2472f0cf3cfec97a4ae8218cce1e8a246430c0c8baa95d150d3fd1960
sos-4.7.0-1.el9.noarch.rpm
629e3df2472f0cf3cfec97a4ae8218cce1e8a246430c0c8baa95d150d3fd1960
sos-4.7.0-1.el9.noarch.rpm
629e3df2472f0cf3cfec97a4ae8218cce1e8a246430c0c8baa95d150d3fd1960
sos-4.7.0-1.el9.noarch.rpm
629e3df2472f0cf3cfec97a4ae8218cce1e8a246430c0c8baa95d150d3fd1960
sos-audit-4.7.0-1.el9.noarch.rpm
300a907fc0a90691127639ad6cf25b13bcefc8356ed6bc8c8924b69e329d8c0d
sos-audit-4.7.0-1.el9.noarch.rpm
300a907fc0a90691127639ad6cf25b13bcefc8356ed6bc8c8924b69e329d8c0d
sos-audit-4.7.0-1.el9.noarch.rpm
300a907fc0a90691127639ad6cf25b13bcefc8356ed6bc8c8924b69e329d8c0d
sos-audit-4.7.0-1.el9.noarch.rpm
300a907fc0a90691127639ad6cf25b13bcefc8356ed6bc8c8924b69e329d8c0d
RLSA-2024:1782
Important: bind and dhcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dhcp, bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
* bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bind-export-devel-9.11.36-11.el8_9.1.i686.rpm
56c80162707b8ce85422dc913e61af31acecc50e3427369b12c5c86d220a676e
bind-export-devel-9.11.36-11.el8_9.1.x86_64.rpm
c66537ce7400c499a576b548512e99ebcff413c50c2b9bbcff02e9cf2bfbb888
bind-export-libs-9.11.36-11.el8_9.1.i686.rpm
9dd66a4d7ad32a243b86ee496fe5b073a16fc3b4c242e8c626242187f0667e55
bind-export-libs-9.11.36-11.el8_9.1.x86_64.rpm
577947d4cfc79bb631bf1b0c4e9b085e83f0797709018bed189af646b21862a2
dhcp-client-4.3.6-49.el8_9.1.x86_64.rpm
79b3ca75904a2d842279b9abb00f22ebad11282548dcbfdb4c67fe24833270b3
dhcp-common-4.3.6-49.el8_9.1.noarch.rpm
1172e129dc346143f495e27267dca4e708fb70a055ae13dcdbaea140db37033e
dhcp-common-4.3.6-49.el8_9.1.noarch.rpm
1172e129dc346143f495e27267dca4e708fb70a055ae13dcdbaea140db37033e
dhcp-libs-4.3.6-49.el8_9.1.i686.rpm
f4ba8aad76e3eba77d1498b59a400a797bcd01c1cd8c037a5aeaf7b248b1fb3b
dhcp-libs-4.3.6-49.el8_9.1.x86_64.rpm
9bf7c84811668f6f5bf6a646ef0346711e6b9993f3bbbba7f91fe68d6fcde0a7
dhcp-relay-4.3.6-49.el8_9.1.x86_64.rpm
13083bf2ac3225b434cee8b9c23f8cc9045b13c0e4a2e6143c928b31eca0fc34
dhcp-server-4.3.6-49.el8_9.1.x86_64.rpm
7d98cfb9fe6a31b87c11365adb200e2047f859f853c65aad6e579224c21cc25a
RLSA-2024:1784
Moderate: gnutls security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls package provide the GNU Transport Layer Security (GnuTLS) library,
which implements cryptographic algorithms and protocols such as SSL, TLS, and
DTLS.
This package update fixes a timing side-channel in deterministic ECDSA.
Security Fix(es):
* gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
none-baseos-rpms
gnutls-3.6.16-8.el8_9.3.i686.rpm
118cd596f9228150063cab97f3d5bd0c8b3aecc294ec5cbe3cfabe6c641d498a
gnutls-3.6.16-8.el8_9.3.x86_64.rpm
38d3c886f42444a732d015f89b6809a26b08c176529ae5051d5c4d30c19e16de
RLSA-2024:2722
Important: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-common-2.28-236.el8_9.13.x86_64.rpm
0717831be3893442ee3433f30ce9af15789b20a91ddbad0cefa3f76707365d59
glibc-langpack-anp-2.28-236.el8_9.13.x86_64.rpm
1b26c21071910c0ffe237c9b557c7c21ac02ef03237aafb59ebd48bd21c972f9
glibc-2.28-236.el8_9.13.i686.rpm
c9bc89319165e92249fe9f28fcf3678788fbd679a14528080e788581773c1de4
glibc-2.28-236.el8_9.13.x86_64.rpm
b245492a8d830a9e2f8ee1a6d24333559bf80f885c511a7643749ce35045a1b0
glibc-all-langpacks-2.28-236.el8_9.13.x86_64.rpm
6b5d8154e5879cd6b72bb39ac155f01945e31ed0f24658077984c80569062691
glibc-devel-2.28-236.el8_9.13.i686.rpm
15db90a3f5990052d756375d55f0c430538876af43570d8958d60fd0817197b2
glibc-devel-2.28-236.el8_9.13.x86_64.rpm
f12426894a073245c0e159747edd2e43c062b1402bc6871dc8bdf6efbb564b4c
glibc-doc-2.28-236.el8_9.13.noarch.rpm
ce65550a6e53d9dfdef6627470f4adec0fee717f2339624386ebee7c95e5e5aa
glibc-doc-2.28-236.el8_9.13.noarch.rpm
ce65550a6e53d9dfdef6627470f4adec0fee717f2339624386ebee7c95e5e5aa
glibc-gconv-extra-2.28-236.el8_9.13.i686.rpm
54d66d9b7d0face6961123aea344faa09cb1b1849b98df42874a7b3489ff1296
glibc-gconv-extra-2.28-236.el8_9.13.x86_64.rpm
4c71893e437e55c14020d6843a91cd33c0691c330fe9c7ce8991b839fd7b4137
glibc-headers-2.28-236.el8_9.13.i686.rpm
8c089f3094f93ed835260bc744b7fdb80c9c3b251b008228b6940abebc330971
glibc-headers-2.28-236.el8_9.13.x86_64.rpm
8169525314b2c212da60c3f10a7515debd883fef7e056070fbc6cc4ff63eaefc
glibc-langpack-aa-2.28-236.el8_9.13.x86_64.rpm
3061f2cf074623fce3ed32a77b57369f56c30f75d9eb164f80c46077fbf6df47
glibc-langpack-af-2.28-236.el8_9.13.x86_64.rpm
7b29629781ccf57fc0eaf1701c0e7545f962adc572dd249ae5f4c05151fb81b3
glibc-langpack-agr-2.28-236.el8_9.13.x86_64.rpm
b3542dc7b3adf6690b77dc10ebe4d3e83aa03f4aab762e41ec43d1c1fad91c10
glibc-langpack-ak-2.28-236.el8_9.13.x86_64.rpm
07d374354e18d97c2de26b7c9289c5a9e0bc990dce1c3b1a0e38c697b4738ff3
glibc-langpack-am-2.28-236.el8_9.13.x86_64.rpm
b042f0c6244d7694e04ae692b89dcc58125d3da480b8ff67f723d8ac979b951b
glibc-langpack-an-2.28-236.el8_9.13.x86_64.rpm
a336b41fd692bff0dbf8cf8b655873acc0fa892f66b25e17568dcb92afada0a8
glibc-langpack-ar-2.28-236.el8_9.13.x86_64.rpm
eb8e4636d30046a26297e105fbff0ab5065ff5da7b608a583059a3aa11970314
glibc-langpack-as-2.28-236.el8_9.13.x86_64.rpm
605fbdc6fd58a4f94e79fd04e7f2994d440ecc30d806714c9a6b2fc9d7e2c62f
glibc-langpack-ast-2.28-236.el8_9.13.x86_64.rpm
8825df8ee4f7ba032a50e2a0e3242a8919a8704735e3b35a5d810a187ce27d09
glibc-langpack-ayc-2.28-236.el8_9.13.x86_64.rpm
c42b64c4b7a794c09dea71d23a7b07e86f6fa64357d21e78a07e1090acb99508
glibc-langpack-az-2.28-236.el8_9.13.x86_64.rpm
affaa2fddaf10dff40b052b45ab016d1560da04f4baaf09f5f5ad275f67eab39
glibc-langpack-be-2.28-236.el8_9.13.x86_64.rpm
e31f217ca67be4474215e29d85d99b5299f0af0d6504719ba2a7324f76d49c90
glibc-langpack-bem-2.28-236.el8_9.13.x86_64.rpm
34d681b3d407e723179e4332c363d710614466dd6888c585894475bbea85faa4
glibc-langpack-ber-2.28-236.el8_9.13.x86_64.rpm
f7bc51fd26157073c19468afe832e1b629af4766f66a824a626e2ff8fff5d143
glibc-langpack-bg-2.28-236.el8_9.13.x86_64.rpm
042682116c694951a734fd38a7cad5e6f537559a516a8b89eb9278f985d2809c
glibc-langpack-bhb-2.28-236.el8_9.13.x86_64.rpm
2425bffda8178a163ec412bf41c110c53e950afa8656cd49a4ffac183ad71bbb
glibc-langpack-bho-2.28-236.el8_9.13.x86_64.rpm
87ed6e8f960a7a4083fbfd88110750e260456d39f4b7f2fe15ada2c52a244940
glibc-langpack-bi-2.28-236.el8_9.13.x86_64.rpm
9d24c6225201642a5a2799df87a961cb9befac2a76c857222fedb788bad5367a
glibc-langpack-bn-2.28-236.el8_9.13.x86_64.rpm
74411e3eb15346071a632cb857cd4b95d584f25d8d0329ff56febc86f3f1bb91
glibc-langpack-bo-2.28-236.el8_9.13.x86_64.rpm
303d1b0d7d93cd5a8d244e6e7d06fe5c5db5da547b6e346a919c0b9d3587d837
glibc-langpack-br-2.28-236.el8_9.13.x86_64.rpm
e36d9652ab90b84346db8627deeff645ec1f5bdec57ce3a762738984ad503f80
glibc-langpack-brx-2.28-236.el8_9.13.x86_64.rpm
726750ff34dadef4c8f0d2627b36c5807271032c3eb744574ae694d35b0ce8a6
glibc-langpack-bs-2.28-236.el8_9.13.x86_64.rpm
629d6c6953344e5609985ad2d1fb4f83fd3c154eeb472a2bf3b2e292681a8a52
glibc-langpack-byn-2.28-236.el8_9.13.x86_64.rpm
5d5d6ca78fb98eb6ba054d7ec825cae9ac9018278f2c1e8ac1d5367cd6fd9d3b
glibc-langpack-ca-2.28-236.el8_9.13.x86_64.rpm
5f51176badd28a076cd4c2233fc769e81991cebf8496b5338a3f5bdc2c8218d9
glibc-langpack-ce-2.28-236.el8_9.13.x86_64.rpm
e25c7e85188d172bf559db02bc68407b3ee8f8789226373e5dbdceb90f9607d8
glibc-langpack-chr-2.28-236.el8_9.13.x86_64.rpm
6a2189bd20900c651532c4d0b319937ba8ab64f9d9152dd5f48bf658ae18aae4
glibc-langpack-cmn-2.28-236.el8_9.13.x86_64.rpm
a90830fc9d0829cbe352464a8034aa3c573f0e6651abdb198e748aac63632773
glibc-langpack-crh-2.28-236.el8_9.13.x86_64.rpm
d6d71dcead3cd207e72412c7d2f9e54d01b5cb0d8257f4d9907caac15e3affd2
glibc-langpack-cs-2.28-236.el8_9.13.x86_64.rpm
660801246e80aca515d0da9fa5ec29cfe7633a12f2271418ca18fab1dcb3d40d
glibc-langpack-csb-2.28-236.el8_9.13.x86_64.rpm
2b77807cedd7e0d0a5644e370826fd4c2b25b4349a534494ce997a5dd4efd727
glibc-langpack-cv-2.28-236.el8_9.13.x86_64.rpm
231fddc7d10a7210d4314317fe2b2c3c1cca0e79dcca4066302ece745469e802
glibc-langpack-cy-2.28-236.el8_9.13.x86_64.rpm
302c950f955e745a68161e741df1cd919511f399f777fa71d8f9b87079fc9366
glibc-langpack-da-2.28-236.el8_9.13.x86_64.rpm
fdd5f9335ad2f85153ba525e53b55f77ece7fa9b1caafc74bc209715d852f7e6
glibc-langpack-de-2.28-236.el8_9.13.x86_64.rpm
4d927007de849378428b094330adb9fdf97b07249a0841a0ce4e43064168444e
glibc-langpack-doi-2.28-236.el8_9.13.x86_64.rpm
70a680e24c0f044837a1b8b488d3f8931d3672bd9d9abf8503a27604e98e210a
glibc-langpack-dsb-2.28-236.el8_9.13.x86_64.rpm
2804bbd43583ab74430738ed7a2d95041262ae456cea8fa148e16281db0bb74c
glibc-langpack-dv-2.28-236.el8_9.13.x86_64.rpm
f67b7386bea0521fd974d01ec9fa5a0fd578c0c055a1b072707a26a76b19c135
glibc-langpack-dz-2.28-236.el8_9.13.x86_64.rpm
ea4678e70c79b80bfd863448f0aef5ac63f1a195e81cf99535b618b5603ebc35
glibc-langpack-el-2.28-236.el8_9.13.x86_64.rpm
def2bfe81cd98e090314fe2622b6589f4b73dd46ac5d486345d858e6948ef155
glibc-langpack-en-2.28-236.el8_9.13.x86_64.rpm
5ab7cab35edc471322659ffffd2419202fe2bf49f1335170f2696676eb0bc5a4
glibc-langpack-eo-2.28-236.el8_9.13.x86_64.rpm
cebfcef26a0b5e4edcffd8104bb8be2a6509cd0b9fe42ff07da042c97234c1c0
glibc-langpack-es-2.28-236.el8_9.13.x86_64.rpm
4671e6cdfb9515f5de9bfca7e594fe2a1c17776080b09f688e83bf7e1a32c9d2
glibc-langpack-et-2.28-236.el8_9.13.x86_64.rpm
632807ab3092a421d87253cbe73aac53241bf58b10c0d1e4b2d6cfe29e2aa46f
glibc-langpack-eu-2.28-236.el8_9.13.x86_64.rpm
905eeceb999fd56190a9ec431db041935a54047f169408b748f8d7da0c253059
glibc-langpack-fa-2.28-236.el8_9.13.x86_64.rpm
e93832ccd520b69ca8da8adeee68479e6c505b0d3b6988a7cc13f9b876d0e592
glibc-langpack-ff-2.28-236.el8_9.13.x86_64.rpm
79d3020cff536877b09142498fbfe3ac59d23399269857cad868d8828efe228d
glibc-langpack-fi-2.28-236.el8_9.13.x86_64.rpm
2a2212d77daecc03457a32e00d4f1161834fc3d4d322d57311870bd2bb96c185
glibc-langpack-fil-2.28-236.el8_9.13.x86_64.rpm
72b73e8fd9fbc82c7863db9ccc4a8995866486ee83f107cefdaaf153a4c45774
glibc-langpack-fo-2.28-236.el8_9.13.x86_64.rpm
bab6a9c8d41de7455481a52ecb152c51238beded8ecf19d8d9742fbc109589cc
glibc-langpack-fr-2.28-236.el8_9.13.x86_64.rpm
ede31ce4bce93dfb756da12f3678f9f3ce8a7d871b29190b6fa1285b0bf5dd6d
glibc-langpack-fur-2.28-236.el8_9.13.x86_64.rpm
235b309b0ed095ce9b3762f51ab3cbd5717cc59b7cce8bdb8860e7a0bdcc1bb3
glibc-langpack-fy-2.28-236.el8_9.13.x86_64.rpm
47097d76f050e8e3fb9e333346116a8a7291256ff1c2c0081fc6a814037ae301
glibc-langpack-ga-2.28-236.el8_9.13.x86_64.rpm
970802e3ec703883d153b3f99a89164456659d7b512824844fd17f8d1d237026
glibc-langpack-gd-2.28-236.el8_9.13.x86_64.rpm
62868ca1e5ee82b61a9beb7baf38d6e8a836b9190eaf6686ea80831bd692317c
glibc-langpack-gez-2.28-236.el8_9.13.x86_64.rpm
763b936238ba0a18baa366a82ac10f14de88ed07b861c58924865995f88c58ef
glibc-langpack-gl-2.28-236.el8_9.13.x86_64.rpm
01bbeff77fa444939b1ebe60d444c2321fd15190d2fa83eba46ed828381749d4
glibc-langpack-gu-2.28-236.el8_9.13.x86_64.rpm
812b6ed682f6fc38c693859743341980044a289343bfe6c0a6f2a38f56e0fda8
glibc-langpack-gv-2.28-236.el8_9.13.x86_64.rpm
f9b18a274781bd4fc44bf1b9d671df85f0ebceade61932bc010224579cea0a5d
glibc-langpack-ha-2.28-236.el8_9.13.x86_64.rpm
5b2567ac8c80ec90fd2bb032d8cb750f76e8b9cc945997c7005ace0b58bfe39f
glibc-langpack-hak-2.28-236.el8_9.13.x86_64.rpm
4473b5cedac13e41e30b17e63750007696b2270b093330f2d1f1b379635f6239
glibc-langpack-he-2.28-236.el8_9.13.x86_64.rpm
a6ea3ba828150ed9e63eabcf3b9b5528e4d854ccef1e837e07555c0fb25a2fc5
glibc-langpack-hi-2.28-236.el8_9.13.x86_64.rpm
2f73f03f5c267d87944a50a90edbce706065f5dbd70d8ae2902c76758d2c438c
glibc-langpack-hif-2.28-236.el8_9.13.x86_64.rpm
9bdbfa7c56b33a30b196f067b790f1267dad85dbae666131066df62b70b256bd
glibc-langpack-hne-2.28-236.el8_9.13.x86_64.rpm
3c113a570628db80e08a56f07af2daa7c2acf2e3558cc6755f046f631c55ed14
glibc-langpack-hr-2.28-236.el8_9.13.x86_64.rpm
ba9503194d747e20609661d8b31a0d7ee2a621dbec6cb72c48e3d6a5173092a8
glibc-langpack-hsb-2.28-236.el8_9.13.x86_64.rpm
8060a9a6dcdd47f95b8be46d0f37637729b4eada0d1aeea6b3442d53b98bc6c8
glibc-langpack-ht-2.28-236.el8_9.13.x86_64.rpm
a2d8134cf64f33b3ef101019381108eab554f53d7fa42ecae20d6f8b0c2b2518
glibc-langpack-hu-2.28-236.el8_9.13.x86_64.rpm
d857986a3e051850b1b73bc2978774b678eaa4588d3c23ced0433a6e620a987c
glibc-langpack-hy-2.28-236.el8_9.13.x86_64.rpm
bffded529eca35060712443c52ca8dc38dcdd2bcfd9d47422b0969460dc53a09
glibc-langpack-ia-2.28-236.el8_9.13.x86_64.rpm
6a09fecc9f250bc6b1e5a7fda241e283fac934c322b518e2a353de837e7aa7a2
glibc-langpack-id-2.28-236.el8_9.13.x86_64.rpm
c39f5bc8e07616e8f08c2f3efcbe8172b42aadf4dd2e9bb583be4127f087181e
glibc-langpack-ig-2.28-236.el8_9.13.x86_64.rpm
0c6843536730adf98819d9a81818de6fd2dfee7ab58fe3324133f52aa7b5a192
glibc-langpack-ik-2.28-236.el8_9.13.x86_64.rpm
06cfb73b562de6e536e34432b0a2c017c06448280bac3b5f8e28aa76972e09a0
glibc-langpack-is-2.28-236.el8_9.13.x86_64.rpm
5e8bda3b8dd916d2579eb476c66aa66df9ad978a19081bedbd9394e8db712835
glibc-langpack-it-2.28-236.el8_9.13.x86_64.rpm
092e6cdca651a790d7c6e67b13e40c9ba987b39ae38e6eae14a7825c93bbbd5c
glibc-langpack-iu-2.28-236.el8_9.13.x86_64.rpm
3146c25cedce5442392e7062be9a720efd830d5afc8865b1ee12a85405071627
glibc-langpack-ja-2.28-236.el8_9.13.x86_64.rpm
20133066711b33c324b2c462dc50124484dec2be3facf978de1dae136a159f11
glibc-langpack-ka-2.28-236.el8_9.13.x86_64.rpm
922e8c9ebe8ec58ec3ce3d8807d9ff2fad87ebd64c55bc428b0c702d0fc1092a
glibc-langpack-kab-2.28-236.el8_9.13.x86_64.rpm
d7ce564f426df7f397ec2bf076675da130f3cc8a4cef9c978d3a542cc1dd51c4
glibc-langpack-kk-2.28-236.el8_9.13.x86_64.rpm
c7d64d86d962ed793fe464c44a8a3e3f98c35f93b7fbc977bb713081c42c10c0
glibc-langpack-kl-2.28-236.el8_9.13.x86_64.rpm
af2049d54061eb124e18b6a4214cdb3eaf993052bb77ff20aece46d30b1fa9b3
glibc-langpack-km-2.28-236.el8_9.13.x86_64.rpm
8f03bd1cbd1a7b1f9edc65f3f5ddca7654f127c2eff46237d1a2b437c24fb8bf
glibc-langpack-kn-2.28-236.el8_9.13.x86_64.rpm
02114135d2eb946bc642c02a640c4901b803d08c8261db8c8deb33433013be7e
glibc-langpack-ko-2.28-236.el8_9.13.x86_64.rpm
36505c88f532e91c4ce49923b9ab1c1f2f904849a1a90e3afa194d24346fdc32
glibc-langpack-kok-2.28-236.el8_9.13.x86_64.rpm
9ff846f8f5a0a4388be3202775cbafa02797da77aa5c098b4bd2ccba6de20295
glibc-langpack-ks-2.28-236.el8_9.13.x86_64.rpm
6b7c9b63f2d8fd7bc5dada8eced13e0d6afc238dc9e2b63d2c2047cdd9d86f83
glibc-langpack-ku-2.28-236.el8_9.13.x86_64.rpm
37bd6537a5fde7f8edf94ce6389a249c9cb36d296cdc5271d3b50c4b73b4d448
glibc-langpack-kw-2.28-236.el8_9.13.x86_64.rpm
8a7fe4175ca0eb2bed91fb156e5122b7300f5bccb2ea474f16587ec95273c7ea
glibc-langpack-ky-2.28-236.el8_9.13.x86_64.rpm
d854cad27a22b3d15c2d875612ace7ccfd54d3d684b083d6673a3917b3d60de5
glibc-langpack-lb-2.28-236.el8_9.13.x86_64.rpm
31528fa50063ccd429f832edbba60e2f1904c8a72564bfc72964c177651226be
glibc-langpack-lg-2.28-236.el8_9.13.x86_64.rpm
28462e92b552c88224a04541a182490a692288253dcb0ec6eddfc77448338527
glibc-langpack-li-2.28-236.el8_9.13.x86_64.rpm
7b54eb4c035417fefa528c675d30e3b89bc9fb46e9e978073a97787b8ecde715
glibc-langpack-lij-2.28-236.el8_9.13.x86_64.rpm
83194ee2041411219ad57bb618ce5363510db18ce9f03d8f978048ee6d275e9a
glibc-langpack-ln-2.28-236.el8_9.13.x86_64.rpm
62564bff52f80743e5464da68b788f853f94d4dcdc4b5ceb1b1766c5ec848a4c
glibc-langpack-lo-2.28-236.el8_9.13.x86_64.rpm
b76061944ed61d44e72a5a2b73f773f8ab0d4c1cab16330017e418495a489825
glibc-langpack-lt-2.28-236.el8_9.13.x86_64.rpm
0891358ed038492f916c391745c01f52d9840e2a436c06ba92b9cfda4bd29e1c
glibc-langpack-lv-2.28-236.el8_9.13.x86_64.rpm
ff6b1dc7497b4e63044ee643a8d513fdb166734102ddbc0c7f9f1a3353553be3
glibc-langpack-lzh-2.28-236.el8_9.13.x86_64.rpm
2ff0c287f82bb63fa05cf9ed2953f5b76b6967e5236c405d9972174a68962d64
glibc-langpack-mag-2.28-236.el8_9.13.x86_64.rpm
bb6048af20dfecc54ffd521ec9978cb7d64eb7815d32cdef4e839899e7024430
glibc-langpack-mai-2.28-236.el8_9.13.x86_64.rpm
040eadc84f69ad5f1f370b1b7cd55cf74b323ed544a93b26528606f3224db7ff
glibc-langpack-mfe-2.28-236.el8_9.13.x86_64.rpm
6662b756c90a6141031068ce8e55636cec1b51fa73fe2ec67868b56be6eb2020
glibc-langpack-mg-2.28-236.el8_9.13.x86_64.rpm
ce07f4d5563120a7d602b738e3ad12420de65ae7a6af05bcfcef2fae18ef9fa5
glibc-langpack-mhr-2.28-236.el8_9.13.x86_64.rpm
ccce85db48c55a5621e6bc5d93e1f9997f1960b531fd8fe700684238b8488e48
glibc-langpack-mi-2.28-236.el8_9.13.x86_64.rpm
6fa9b7507de6b6fcc8e45b3a6d88850e82c2df15494dd1b4b2816fab852a5362
glibc-langpack-miq-2.28-236.el8_9.13.x86_64.rpm
bb98aa37c28a68192b7452bbe1ee69c2f7b7e5167da9b9c735cee522bd8c2873
glibc-langpack-mjw-2.28-236.el8_9.13.x86_64.rpm
9adb4d57e1e8b2429f5edf89e665759aa49c979fa7bbe131b2e0dcb023cf7fdf
glibc-langpack-mk-2.28-236.el8_9.13.x86_64.rpm
74d2341a6363e8aede6a6bea500b1b06379a761490ff40709be35d987a249afa
glibc-langpack-ml-2.28-236.el8_9.13.x86_64.rpm
b4d7645dfd98e329283c7b75c36ed0a09292ca2bf938f6c9f26fa35fcf2710c9
glibc-langpack-mn-2.28-236.el8_9.13.x86_64.rpm
c1d64fbb61e5f644763f40360e552c04a91e23cd9b30edc3e000b2ca75939f67
glibc-langpack-mni-2.28-236.el8_9.13.x86_64.rpm
aa6bf16aa7a414cabfb6647b47c1ed3dd9c6ce3751f3f99288346d92bbf8afe7
glibc-langpack-mr-2.28-236.el8_9.13.x86_64.rpm
c65c09fdf7516240079052ea11028ce0a0f8bddea328766d71c383a1bf419a28
glibc-langpack-ms-2.28-236.el8_9.13.x86_64.rpm
5fed3d39f68a1bc6b5727ab89d38f29c08b813da71b0f8f81cc1221a686aa4de
glibc-langpack-mt-2.28-236.el8_9.13.x86_64.rpm
4d5a83d6fa6f915980e4277abea7df136e08d405a3de20f4aa3b83e42b855faa
glibc-langpack-my-2.28-236.el8_9.13.x86_64.rpm
82f1daad723ce02745414096be10c157bb6c0d766e0655c5fea0b1690e77c628
glibc-langpack-nan-2.28-236.el8_9.13.x86_64.rpm
d514fd60445f66291115e5686f1a0abe7df109e97cc4b83fa5e1e6d0d8025920
glibc-langpack-nb-2.28-236.el8_9.13.x86_64.rpm
9d9514a59e5e8dec6b7d05daaff39325584c477db04cadada23613e6acd01592
glibc-langpack-nds-2.28-236.el8_9.13.x86_64.rpm
59ef4c3b500711238b84e1f4ec2ff58a3cdf773d14ace3579245e0d2f8faf8b1
glibc-langpack-ne-2.28-236.el8_9.13.x86_64.rpm
e6f432c57e64ca82ab46ebe1d4348ca62de1184bf9208c5f621dc786497003d2
glibc-langpack-nhn-2.28-236.el8_9.13.x86_64.rpm
96d1c902ed6fbd509d3fc3b76ed4db6bec659b2591347a341eb62652599e81f9
glibc-langpack-niu-2.28-236.el8_9.13.x86_64.rpm
e392882214641e7feca970a1d79984c2ab1f9764f6203e584ac23e88234b54be
glibc-langpack-nl-2.28-236.el8_9.13.x86_64.rpm
6b430f0bf24ab9d23a35dd6dd7e7c9bee80dbfe8ff5893ad9079ac6975919715
glibc-langpack-nn-2.28-236.el8_9.13.x86_64.rpm
b62719dff997216d93e335902d8e1c1c7d4d59a1ec76c62282d7580fde876780
glibc-langpack-nr-2.28-236.el8_9.13.x86_64.rpm
8d08154d995e18260fe5c7921caf923eb3d31da1f6232dd1901ea376bdb200e8
glibc-langpack-nso-2.28-236.el8_9.13.x86_64.rpm
8a2d37c674a164349cf26adc592567938571f1b6a58df62e8b2e0988d8145dd3
glibc-langpack-oc-2.28-236.el8_9.13.x86_64.rpm
7b6d420666ecbf9aa6ab6de34da1ae40ae0b740043c9e0b0b0301392318be0dd
glibc-langpack-om-2.28-236.el8_9.13.x86_64.rpm
e2ae157221cf4b2ece1fced16b040677b130a04361ef2134200b9a5520ecbae8
glibc-langpack-or-2.28-236.el8_9.13.x86_64.rpm
445cf2c678918e691279c83df9a384af79adcf228850b13d3997338274847a1c
glibc-langpack-os-2.28-236.el8_9.13.x86_64.rpm
4c71a50d824111483b202ebb0d42ee2c8c3dbeb549c7ec10daf0bef56eef025a
glibc-langpack-pa-2.28-236.el8_9.13.x86_64.rpm
a6e344b48b774a44cbfd29fb5318dd947cd5260d80295a393f59afce3299f66f
glibc-langpack-pap-2.28-236.el8_9.13.x86_64.rpm
3416997ff8dbc523e26ff89434b82316cd7521a595ec6790071f6ad2335fc0c6
glibc-langpack-pl-2.28-236.el8_9.13.x86_64.rpm
aea9c8750c8ef9cdc5dad501ee73ba63cd4357073296cc8fd9a9bbcb598e18ae
glibc-langpack-ps-2.28-236.el8_9.13.x86_64.rpm
be4d60e3aef5b89ec5c563eb5bdffeaf76a456eda8803944335ca5ad692b6324
glibc-langpack-pt-2.28-236.el8_9.13.x86_64.rpm
1c7e49b6f971786dcce5113e85cedb7febb6b42ae4cfb34cc0cbd0f41e3bbe77
glibc-langpack-quz-2.28-236.el8_9.13.x86_64.rpm
c0271122a788d78a293f287daf4478fb56014c225ba84437f67a6f3eee494785
glibc-langpack-raj-2.28-236.el8_9.13.x86_64.rpm
379e7b1006e601d8722ea7f231b8df86e7c48974e9506de57ce98c8e28630ccb
glibc-langpack-ro-2.28-236.el8_9.13.x86_64.rpm
3f3c08c589f89387d6342d96d8d09388ecde4271a8d59969b7866cadb6546499
glibc-langpack-ru-2.28-236.el8_9.13.x86_64.rpm
c52954ea432e61e103a16393d3814a50d40d46f1281bc1f0b4746a8ec793c637
glibc-langpack-rw-2.28-236.el8_9.13.x86_64.rpm
da5d3cbc1e3fb76c42c6839c86a6f9d5507ffb6fbd3cba2acd3b2a3e8da23627
glibc-langpack-sa-2.28-236.el8_9.13.x86_64.rpm
25bba3d36f660bc9bc8bf2197add8192c393d82b9af3abe8bd893cc12bdcb58e
glibc-langpack-sah-2.28-236.el8_9.13.x86_64.rpm
996ec994d8d8acbcaff860b83fdc2ef407af94ddccba7e6569a7e79db49bf250
glibc-langpack-sat-2.28-236.el8_9.13.x86_64.rpm
83302a490282225ae6b0b95b725e20e8f92e9de339a14e6c58985f9e4804ba18
glibc-langpack-sc-2.28-236.el8_9.13.x86_64.rpm
eeb841ceb91290ad04f04b85f1292ac3b6a0dbdb032aabf65d6e72371148a5b5
glibc-langpack-sd-2.28-236.el8_9.13.x86_64.rpm
1543ddca865ce626ac04c87b0d357614072fb72f08775daa04591a3c59b8a67d
glibc-langpack-se-2.28-236.el8_9.13.x86_64.rpm
1cf9f4af244dbf66f21e28b3bb208b09581708583e9c312a72ce50aeee571714
glibc-langpack-sgs-2.28-236.el8_9.13.x86_64.rpm
e245a57d09fbeb8e47e0556464c4bc571cea558269faa4d65d666cf3ac469f6f
glibc-langpack-shn-2.28-236.el8_9.13.x86_64.rpm
86d3ea6aa840d554097c928d773c71c89cc7014dc9d6f05d9fb3f53b4a28e881
glibc-langpack-shs-2.28-236.el8_9.13.x86_64.rpm
fd75b8cb8e3cb5d2c627254a23ce68d231da45f8fed01eaf1052b33edf88b7c4
glibc-langpack-si-2.28-236.el8_9.13.x86_64.rpm
0261a15ba0c7d7c67b7c46f3b971f5587be35a0b60c7cff36fdcc175f257df38
glibc-langpack-sid-2.28-236.el8_9.13.x86_64.rpm
d2f239225178bcbdfb8fa5e7d56221e3b382f853caa115ad07532a4a1b9f2401
glibc-langpack-sk-2.28-236.el8_9.13.x86_64.rpm
617decd78d2c674b0fe5eac8641f97fe41f1a97d334e519fda1f0df05187db0f
glibc-langpack-sl-2.28-236.el8_9.13.x86_64.rpm
917687a15d5a93408d08232da1388712cc32ca74b1d63e59b83b95471f86d3e4
glibc-langpack-sm-2.28-236.el8_9.13.x86_64.rpm
ae920408c496f721f10713bdafe79145644a303335e63634ddb6c5ce3957f165
glibc-langpack-so-2.28-236.el8_9.13.x86_64.rpm
c915b576495d9a0cb360c6c842972b92888cf38943e6aa7ae234f5be60f92b33
glibc-langpack-sq-2.28-236.el8_9.13.x86_64.rpm
b22b2be0e81b207281e30a4f6615c8eb410594b4ee6a745873ac730dac2e9895
glibc-langpack-sr-2.28-236.el8_9.13.x86_64.rpm
366746c852cba45f2668c899fc7d8ea7302e50f021110dc2ef860248c04934da
glibc-langpack-ss-2.28-236.el8_9.13.x86_64.rpm
f65f816b46c9a184abf9386131494f924735d5b6fd0221dcf3f47ed12cc10abe
glibc-langpack-st-2.28-236.el8_9.13.x86_64.rpm
5e5ec253aa258ea0d6e2de35378250156e413273ad07baab886734ca2b0530a8
glibc-langpack-sv-2.28-236.el8_9.13.x86_64.rpm
3965b20dce86abc5c2705ed7453afb6180eea80869979406e8cbb769e93dd1ae
glibc-langpack-sw-2.28-236.el8_9.13.x86_64.rpm
8a2333168b8bbcb8b766804b01e5121450418f4da4325d2e6bb9f01b7832d291
glibc-langpack-szl-2.28-236.el8_9.13.x86_64.rpm
026ff0ad625dee5bb1c125f4deac588d392e503c5bc869685bd79d4614eefd7e
glibc-langpack-ta-2.28-236.el8_9.13.x86_64.rpm
030caaae9959f73e83fc256ac480834d88b42cc8932c7ce88c63487fc5289c24
glibc-langpack-tcy-2.28-236.el8_9.13.x86_64.rpm
c9e27adc9557e316d4e03af5abcfa8655d4c5f07dc51279a2ce74e8645e09f62
glibc-langpack-te-2.28-236.el8_9.13.x86_64.rpm
9b0031e8d620a38e97f4b78f9287d204d381d267052a84dd41ae978bff3364cb
glibc-langpack-tg-2.28-236.el8_9.13.x86_64.rpm
10515e760b09d187d7c626f7527e829e8689dc2697a894ad6e2058e967d3683a
glibc-langpack-th-2.28-236.el8_9.13.x86_64.rpm
03bf3205b4237300d4c3e3d15abc90f37810c010fcf67332fb14430d0047959f
glibc-langpack-the-2.28-236.el8_9.13.x86_64.rpm
137a03ef7ec0a88c47aa7b6f76acf30632fc927156f052df9a9a0691c2bab382
glibc-langpack-ti-2.28-236.el8_9.13.x86_64.rpm
cdf67071ce7ab36b4144b57caa746776a2d13237aaf89d1f951621b65606b6d5
glibc-langpack-tig-2.28-236.el8_9.13.x86_64.rpm
546b0774b05ce1802af9856f5d8fcee8f8d519defddc3bf72ff80f0edcdeb593
glibc-langpack-tk-2.28-236.el8_9.13.x86_64.rpm
f7cf59dece07e630fa5a09e0572d1570c1281aaf3f4f3090bcc67ff92e1ea908
glibc-langpack-tl-2.28-236.el8_9.13.x86_64.rpm
7e10ca3c0d982f46366f3a7b918b886eea6472b7674874f5ab8afc8b64aec49e
glibc-langpack-tn-2.28-236.el8_9.13.x86_64.rpm
08b13b9353f3fdeac8f8ae4d816e8f21b4a48c0de3b9a3c91847c87d2234294d
glibc-langpack-to-2.28-236.el8_9.13.x86_64.rpm
57add976b7d582430e61ad43c2114f03c98918c9f1db65afb896d2a127f03031
glibc-langpack-tpi-2.28-236.el8_9.13.x86_64.rpm
c70380eda8845e327a7c66a8e718873ccda2dc08af6433c03e902f43ed1e9ed8
glibc-langpack-tr-2.28-236.el8_9.13.x86_64.rpm
72e2f88d516349872c28234bc087ea025018579b2e6762fdfd12d10b452e6ad9
glibc-langpack-ts-2.28-236.el8_9.13.x86_64.rpm
d6c316469c3267d15c645de00b3b3cacbd892071ca27d92050820b44834a1363
glibc-langpack-tt-2.28-236.el8_9.13.x86_64.rpm
43a44beb877e6f6082f7818df022b08c74c36a2d7ca5300161253448e199c72e
glibc-langpack-ug-2.28-236.el8_9.13.x86_64.rpm
373a6723e7f4db02bb76cae83df78edb9d846982137e33b06d479ec026c1ef89
glibc-langpack-uk-2.28-236.el8_9.13.x86_64.rpm
f8ad07a5d975150f27fe2ac72ba4d1eed7ce2abe19d5018a73dd182652e035de
glibc-langpack-unm-2.28-236.el8_9.13.x86_64.rpm
e5a2fd459269035512c63652210a39584f9779c178b24cf32ecde0653b362fe6
glibc-langpack-ur-2.28-236.el8_9.13.x86_64.rpm
99f91e0bffde017fe5c58f48d380cafde42e403136414dacb7c67c6c2b37f232
glibc-langpack-uz-2.28-236.el8_9.13.x86_64.rpm
75088e9f35c584871b9c0be0768c3d75d467873112aee3dcaca8bd5b8d6aec4b
glibc-langpack-ve-2.28-236.el8_9.13.x86_64.rpm
f3a18793bcbf94fcb3d2f15ea47b928c07676081e9a49043ce8105fa704d388b
glibc-langpack-vi-2.28-236.el8_9.13.x86_64.rpm
df75d81a96dc79200e7742cf7e4c01c7dc29b8f3401cb8b0c343e6d3f19b7fcb
glibc-langpack-wa-2.28-236.el8_9.13.x86_64.rpm
8fbc9ccf973660158c0edc8ef6cfe330204f1fe4f3310c9da0684d012fedb862
glibc-langpack-wae-2.28-236.el8_9.13.x86_64.rpm
958966a7fd749058e2a54b46ca2e978dd220ece5d04742d75c61a41abdf16017
glibc-langpack-wal-2.28-236.el8_9.13.x86_64.rpm
49017c18b0dd4845dd08cfaa5cfca378a48fc39dcde885ca23f545f0702f74c8
glibc-langpack-wo-2.28-236.el8_9.13.x86_64.rpm
d467deda914184ce458d6d001043c65c5d56d775b390fd191e3654f2e67b1e8c
glibc-langpack-xh-2.28-236.el8_9.13.x86_64.rpm
d21f8c44d898d1df8d32ab52e58cadb09d6d6c760e642fe8071b26c5ccbb3e1f
glibc-langpack-yi-2.28-236.el8_9.13.x86_64.rpm
eee54a5be79eaa45387e9a662ecde6779a325afa4638b7499e568fc2db6979a3
glibc-langpack-yo-2.28-236.el8_9.13.x86_64.rpm
93cf46095cfe009ae5b3c878e46476580c22ecf938d69500da954c491c2b423d
glibc-langpack-yue-2.28-236.el8_9.13.x86_64.rpm
63f545f6cfe69e220d86c3ab826155776a31b4c87794b85b5e44fe686fdc4fde
glibc-langpack-yuw-2.28-236.el8_9.13.x86_64.rpm
057d990fb47c81641901028fd3d6382241ff1bd80e6a2758817b6e82c5513b43
glibc-langpack-zh-2.28-236.el8_9.13.x86_64.rpm
8bb2a8472e28f2a54e166b48f4bc6df4b84b6cde3d7a9068ea47dccc22e58d03
glibc-langpack-zu-2.28-236.el8_9.13.x86_64.rpm
d64b62299ece755a66d8e35382457c1ce96a946aa96be271ba49723c34dafcec
glibc-locale-source-2.28-236.el8_9.13.x86_64.rpm
02e80032c741cb712301b811717c60a505277162144adacfea082c6d4cdc3e86
glibc-minimal-langpack-2.28-236.el8_9.13.x86_64.rpm
f022542ecba747dcf3bb77eb1be7fcb10de98fa53f0e3cd0eee26cbc4cbc0b69
libnsl-2.28-236.el8_9.13.i686.rpm
8407f2d561f62f0a4f1a766394324b209448054e3eef9793ebfd8a16f752277d
libnsl-2.28-236.el8_9.13.x86_64.rpm
a1cfaeeea4bd49bfa7011f951cfce157046d1e17da4adfb0bdc144a89fed8051
nscd-2.28-236.el8_9.13.x86_64.rpm
a3849b50e239b101f7b58f38c81689534eb89694c12ab1e4cbb8843a9560542b
nss_db-2.28-236.el8_9.13.i686.rpm
6289a2a0ab81b5cdb8a97dc68c311953877a4a90bec247036197167fb2e2f8dd
nss_db-2.28-236.el8_9.13.x86_64.rpm
a9295073b1fbfa55b4a8c976a82f28bdc13a4717990dd112ff612aaf9da82ac1
RLBA-2019:3778
hwdata bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* Pull PCI/USB IDs for 8.1.0.z (BZ#1767717)
none-baseos-rpms
hwdata-0.314-8.22.el8.noarch.rpm
08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69
hwdata-0.314-8.22.el8.noarch.rpm
08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69
RLBA-2024:1602
nftables bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables.
Bug Fix(es):
* nftables counter (JIRA:Rocky Linux-2596)
none-baseos-rpms
nftables-1.0.4-4.el8.i686.rpm
b0945688cff17c971adce35eeddffa0971ae64bba04cba0ff889ba1148dcf595
nftables-1.0.4-4.el8.x86_64.rpm
5d6d61c1319ab8464e5f2f739cf1d06aa777cef25147fec64e6359ffd63de913
python3-nftables-1.0.4-4.el8.x86_64.rpm
617132927c4ef0244f34fce882a95fc89ec14cf6195354d0de7570840aed4d45
RLBA-2024:1603
iptables bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iptables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iptables utility controls the network packet filtering code in the Linux kernel.
Bug Fix(es):
* ebtables core dumped when set unsupport table (JIRA:Rocky Linux-12350)
* New defects found in iptables-1.8.5-8.el8 [rhel-8.9.0.z] (JIRA:Rocky Linux-16654)
none-baseos-rpms
iptables-1.8.5-11.el8.i686.rpm
044f234d572d9b54685beb86b5d0f2d1ec66d430eb592e31bfa2a89a323e42e7
iptables-1.8.5-11.el8.x86_64.rpm
fdb50c8f3f5e6e412de4aad0bd0ad80cc83b16eba7564539438e844379140553
iptables-arptables-1.8.5-11.el8.x86_64.rpm
7350d4e1036f858de69fe807e431a924b7120e0cf0f91a3903d6b516bb61af11
iptables-devel-1.8.5-11.el8.i686.rpm
2d4d43b743ce0a40ee8bd48310cc7f4455aacb7fbe7804231bd44a7a714ea991
iptables-devel-1.8.5-11.el8.x86_64.rpm
165c169cf0e3f53f2935cbdba2d091d5440eed47c9493148d692b8af49bbf230
iptables-ebtables-1.8.5-11.el8.x86_64.rpm
843755dcce2d76edfb1ecac2ee18e50c523f2de9e4f2723d0925975d001e37d8
iptables-libs-1.8.5-11.el8.i686.rpm
7202467c048a56519ed5a078a88a3cce14387150d80a5be5825a7c59a1a3507a
iptables-libs-1.8.5-11.el8.x86_64.rpm
a377b20131a9a962d4832390c54c5e4901d71fd9dbc5a87c4c94129cbd95d1c7
iptables-services-1.8.5-11.el8.x86_64.rpm
cbff9551af131bdcdc16f37f374478ad42d8f98ad44fce4ae85d7bdec1260213
iptables-utils-1.8.5-11.el8.x86_64.rpm
f4e3710af660e958a79c2f473a439409889170f9e237bff79cbf6f477f595a70
RLBA-2024:3136
libsoup bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsoup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libsoup-2.62.3-5.el8.i686.rpm
1e86b054f0127f299ce5df410953476ceb62471cba63d388c58a481db1881188
libsoup-2.62.3-5.el8.x86_64.rpm
886459733d2e4eb826c7d88be8ae35d83980d45fa3b6031d105797e83f5e8308
RLBA-2024:3142
numactl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numactl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
numactl-2.0.16-4.el8.x86_64.rpm
cd75e2e9d59e1d464b40ae6c3ab9cf6cd159231dbecb6efede7ae4db62480a4a
numactl-devel-2.0.16-4.el8.i686.rpm
e5523985584e05b19ae8055d0608c4970216cd6fb7d3eda6f361c9b2937e2578
numactl-devel-2.0.16-4.el8.x86_64.rpm
445a1887b9c4ac80bd8bb654d32c266e3809767e862e6450124f5010d03b16c5
numactl-libs-2.0.16-4.el8.i686.rpm
3e7d7213e0209039af4583173700f4000c1b5e266dd8b38a80e3ac0aa513acee
numactl-libs-2.0.16-4.el8.x86_64.rpm
08d156324fa101363d0559c9558d3df70e25b7033170ada0c5bfca9608a94fd6
RLBA-2024:3140
kexec-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
kexec-tools-2.0.26-14.el8.x86_64.rpm
22188ccf09e91ff1f5d96c67a44054b252b6878718411cc4324bd11cae265dfb
RLBA-2024:3141
c-ares bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
c-ares-1.13.0-10.el8.i686.rpm
5a75881ad761843e13b2844e00725af97da33ec182ec136535fa18f6ea4b61cf
c-ares-1.13.0-10.el8.x86_64.rpm
445b151877a4d8cfc25b3207b207be15cddb452cf3c6964526e275a018dbc12b
c-ares-devel-1.13.0-10.el8.i686.rpm
7759e6ad116850fcb5173612cf93d4839bb2532ac6f58f062ac7471212698148
c-ares-devel-1.13.0-10.el8.x86_64.rpm
80b2752fd37e51a07f19b6c39584236cead5fbd7e07f71033f9828020f9f6deb
RLBA-2024:3137
libtracefs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtracefs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libtracefs-1.3.1-3.el8.i686.rpm
7a1bd9349e5777dbaaced2e829524f3e52f622d6cbe24691f92e3b0ba824184e
libtracefs-1.3.1-3.el8.x86_64.rpm
c9a3f81883dc8f92eb930fa35cd71f6186ff4ea6d88b0912aa6e099d60373a94
RLSA-2024:3139
Moderate: squashfs-tools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for squashfs-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SquashFS is a highly compressed read-only file system for Linux. These packages contain the utilities for manipulating squashfs file systems.
Security Fix(es):
* squashfs-tools: unvalidated filepaths allow writing outside of destination (CVE-2021-40153)
* squashfs-tools: possible Directory Traversal via symbolic link (CVE-2021-41072)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
squashfs-tools-4.3-21.el8.x86_64.rpm
590e7d25b06d6838f680a9381911f859ff36104da9c522179a169f6528f03b94
RLSA-2024:3138
Moderate: kernel security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
bpftool-4.18.0-553.el8_10.x86_64.rpm
1c31c30d1f10e9c122cd45a4d07f5e80d5abd372ad7c5116fe9ef1cf0aaa9730
kernel-4.18.0-553.el8_10.x86_64.rpm
67e494f803fffb643c81cbfadcdc6978065c16d81e72b22206e0a8f8baaf4456
kernel-abi-stablelists-4.18.0-553.el8_10.noarch.rpm
4a654bf1f356dc3c1db0c813b00868d3d3f3dc5633e85ffe6507aec53c3652a8
kernel-abi-stablelists-4.18.0-553.el8_10.noarch.rpm
4a654bf1f356dc3c1db0c813b00868d3d3f3dc5633e85ffe6507aec53c3652a8
kernel-core-4.18.0-553.el8_10.x86_64.rpm
b8c3e03882cc219c69392acd3badd8df5f0cef327f539f06ddebfe01d41a1fc6
kernel-cross-headers-4.18.0-553.el8_10.x86_64.rpm
4a8162648a73f870905191360f7b75ebe4bb0bf7ba15ce1d4b677410fb8be44a
kernel-debug-4.18.0-553.el8_10.x86_64.rpm
ebb8dcd1a61691e2f5688035d3776076f4faaf5705f8ecea2b88eaf5d31d006f
kernel-debug-core-4.18.0-553.el8_10.x86_64.rpm
a912a135204d7214b67ef3ff3f6c26a4c8a325547c2ddebf7d2290725cf5cc71
kernel-debug-devel-4.18.0-553.el8_10.x86_64.rpm
8be7e9c7cc1f3ebec82d2a4b4b02c0b508a6bfd430e83aa4f898d33e93c8b53c
kernel-debuginfo-common-x86_64-4.18.0-553.el8_10.x86_64.rpm
25a70156deeb2f58d48ff2215e0baa5f9738a686e48be5172a7f54684d539a50
kernel-debug-modules-4.18.0-553.el8_10.x86_64.rpm
01405d5c347819ede6142a0bc3cf966fc41d5b816f6e2e31ecdbe0ef45999a27
kernel-debug-modules-extra-4.18.0-553.el8_10.x86_64.rpm
1ec0b3630abff7bd7649aeec81ae11dfa741e2c070b7d82e7052f90b19f77d3c
kernel-devel-4.18.0-553.el8_10.x86_64.rpm
269c046c07549943137d6a6d6316a0f217eb7d2c229e8a32972a915a50060e6c
kernel-doc-4.18.0-553.el8_10.noarch.rpm
2b50aa89af6bc25639ebd05ec71ac66e0bc9f5b550f8173e4dbdf278084d8292
kernel-doc-4.18.0-553.el8_10.noarch.rpm
2b50aa89af6bc25639ebd05ec71ac66e0bc9f5b550f8173e4dbdf278084d8292
kernel-headers-4.18.0-553.el8_10.x86_64.rpm
63c006d4afd10c77e0505b01bbef7cd1aa7f4250dac9abc84edc4c7ba71445f0
kernel-modules-4.18.0-553.el8_10.x86_64.rpm
1303a1948bfc61d71b1826f052feb1dc9cd3bdf9b1b5f24c8e5365ff9032f5be
kernel-modules-extra-4.18.0-553.el8_10.x86_64.rpm
dc20a5ce0d99514409ec5e28de30ad492032745e9765b9dc317353b0cb763fd8
kernel-tools-4.18.0-553.el8_10.x86_64.rpm
c5ad1795a8c00cd888e4119c52831892f931012c95424cc6e3af5a8e867d7fc2
kernel-tools-libs-4.18.0-553.el8_10.x86_64.rpm
2782734ac038af61d45a469895422c7982b8239cde56f3fa93ce253f7059a9bf
perf-4.18.0-553.el8_10.x86_64.rpm
67c3d582a6c873e5f8d889e4903176e4e0c708c502bc030ccf70b79f7c905c76
python3-perf-4.18.0-553.el8_10.x86_64.rpm
ea354037627efd887adb7bd8faad98dd0c445557026f1a2b573b11c4e4f71929
RLBA-2024:3152
glibc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
glibc-2.28-251.el8_10.2.i686.rpm
363682c24bd402be461a1ac3028778378c55344da0e63ba53ea0292b0d773ec0
glibc-2.28-251.el8_10.2.x86_64.rpm
5f9dee73acb40bc44f9e30c9798549fe58aa76aed614a844187b5075e4db4304
glibc-all-langpacks-2.28-251.el8_10.2.x86_64.rpm
2b7dfafee58b2672940b0e4ddaaf319f5797a06ed407a8c1f28e8420a065badb
glibc-common-2.28-251.el8_10.2.x86_64.rpm
51acbbeb9f97dbc9afeae0f8fe51f5e41c91ef33441a5a1d31410638c34fa657
glibc-devel-2.28-251.el8_10.2.i686.rpm
5b071eb492ec09cbbafde5a3dcd641574a2e9b5a488c2200164ae15f111fa99a
glibc-devel-2.28-251.el8_10.2.x86_64.rpm
93c3eac9db417548298b90449dc69be3410136d8ccef59ffa996ad690ebd2b16
glibc-doc-2.28-251.el8_10.2.noarch.rpm
8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53
glibc-doc-2.28-251.el8_10.2.noarch.rpm
8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53
glibc-gconv-extra-2.28-251.el8_10.2.i686.rpm
548f8083c8711eb94a8adadc2bfaaf7516114fe1b3d5780f22a4e02e94774182
glibc-gconv-extra-2.28-251.el8_10.2.x86_64.rpm
890e73820ba5355f7d55020f63fe11d3dde628eaf4227dee344f2c3b6e857e5a
glibc-headers-2.28-251.el8_10.2.i686.rpm
880a70001b132cc026f68e4efd7610f0cc924ce1f32f33a039a4ef796a218a56
glibc-headers-2.28-251.el8_10.2.x86_64.rpm
7d6743a8dbbea1181218ef247608124d77dee6cac82031bb7fe3ec4f5e04a28a
glibc-langpack-aa-2.28-251.el8_10.2.x86_64.rpm
678bc555973e19d3ea769af140a21f0a7576458dc02c48a3b64ed72da1dd7e32
glibc-langpack-af-2.28-251.el8_10.2.x86_64.rpm
00c1d27d1a5749eea68a51e0f67602496fa5f3f442b85f6a1a826a6c46f64807
glibc-langpack-agr-2.28-251.el8_10.2.x86_64.rpm
7d575d87e04d8f22de7daf7824efb5d1163d5f0fccaddd10975736df9b76d878
glibc-langpack-ak-2.28-251.el8_10.2.x86_64.rpm
731d5b965205efb67eb1e48b7e76b84202c88874e2cdad1d66f66a8fbc497a2e
glibc-langpack-am-2.28-251.el8_10.2.x86_64.rpm
358d6731c5b4dbd2764782afb3cd7ff56a6854d700e8d6a985c93f6732f73f66
glibc-langpack-an-2.28-251.el8_10.2.x86_64.rpm
69954eb1ffb5fe5db98e053287b3c013ea88948eb7da52c8d11675b849c919cf
glibc-langpack-anp-2.28-251.el8_10.2.x86_64.rpm
7e429c3e27157fa104f7186f9b103117d48dc325cff420f2a7a490eda09f9064
glibc-langpack-ar-2.28-251.el8_10.2.x86_64.rpm
4cdcd6389a4b7a0c102b44787846eba902740f90d1eb93b771045c2f76f36063
glibc-langpack-as-2.28-251.el8_10.2.x86_64.rpm
22dd94c0ad3bba6f082d1519c25af6e81494751e11c9699cdca083bc20a2ad51
glibc-langpack-ast-2.28-251.el8_10.2.x86_64.rpm
792a7394d99296b91ea7f57eca97c2677708022e25be9a7c449e7ed44ab98472
glibc-langpack-ayc-2.28-251.el8_10.2.x86_64.rpm
e5e2695a09b5ddd925caff590df6d514920c30e5ba0b513bc2ee549b0f8910ec
glibc-langpack-az-2.28-251.el8_10.2.x86_64.rpm
c8d7fb8b1c43ed290cdf420627db251fa9aaf10bf737676aadf7d76bb02ca7b0
glibc-langpack-be-2.28-251.el8_10.2.x86_64.rpm
82386a29f77623edb58f17e8e205eab173dd83d0efbdf10dcc724f18a142a46c
glibc-langpack-bem-2.28-251.el8_10.2.x86_64.rpm
03cf8e781a5715aa80dc6d7a124f83267baf70b47066f1a63b50c2792fe147be
glibc-langpack-ber-2.28-251.el8_10.2.x86_64.rpm
073287b7918809d1d3c68f8c973aba66f535c93e5d46ca183399d4f679b7a7df
glibc-langpack-bg-2.28-251.el8_10.2.x86_64.rpm
8635f78096f91103fe6ff0e76791477ae615fda3947b9cdec41d01b418fac802
glibc-langpack-bhb-2.28-251.el8_10.2.x86_64.rpm
2dfde722f24cd75029ffd26bba8223a330224849985ef2ec3318d6629793ad24
glibc-langpack-bho-2.28-251.el8_10.2.x86_64.rpm
d0be0055537fa1ac40d80b887a49323d8319669912589e6f4aa2b2d1f1f80823
glibc-langpack-bi-2.28-251.el8_10.2.x86_64.rpm
d7af1f7358f59daa54cb63c026d155d089af7002bff539e8338428a577910a50
glibc-langpack-bn-2.28-251.el8_10.2.x86_64.rpm
e71c0edab89074f318267dd37591fef8fa8d7d30236db5fc1642b8b591066ff2
glibc-langpack-bo-2.28-251.el8_10.2.x86_64.rpm
0c379783e6d387f8590f339d799288a8fb67b08d9493ae2616ebb3297b1fe8ac
glibc-langpack-br-2.28-251.el8_10.2.x86_64.rpm
31c0c28bd287ebbc4b5d4d1fbb1d302cd9a471161717efc6fc3b01a7664287d9
glibc-langpack-brx-2.28-251.el8_10.2.x86_64.rpm
c568de193c0807af757d835d91a988a89e44b3e04bef73a82073d5934727979e
glibc-langpack-bs-2.28-251.el8_10.2.x86_64.rpm
f543df498a7e63c8f8b55025aaa8b3b3aa0af098eeeb49fa151e899be622f5a0
glibc-langpack-byn-2.28-251.el8_10.2.x86_64.rpm
f8fce0af3e0eb179f7341420495a18749d2443c9e8c11aae500d1e5ed70224f4
glibc-langpack-ca-2.28-251.el8_10.2.x86_64.rpm
745ba708a40f5a93d603a60fb50fc194f4fcd115fb4df2df10b5b6a638293c58
glibc-langpack-ce-2.28-251.el8_10.2.x86_64.rpm
59aad0c3adbaca6433df9e570b0f3bf5206592abb8a2fdf006e4407f952563b6
glibc-langpack-chr-2.28-251.el8_10.2.x86_64.rpm
67201e83a0ade666dc3c35f8de0ac8a8b7cff06820533a7840b62a282f08f7f9
glibc-langpack-cmn-2.28-251.el8_10.2.x86_64.rpm
976dcbb8cb8c547ffa0eaaae09e5f6e126748900d29a46f9e34a4073fb7c19ab
glibc-langpack-crh-2.28-251.el8_10.2.x86_64.rpm
d41a8e229513b1648336206fdfcae7fa14b37aaa35157ddc21f6e2fb56c7e74b
glibc-langpack-cs-2.28-251.el8_10.2.x86_64.rpm
e0ad588a5059b295dc0b0db39289392b8c4b0bf989dc535f63cec515923795d0
glibc-langpack-csb-2.28-251.el8_10.2.x86_64.rpm
079c408e016d0af342385c701fa580640254847378955ae2b64b42eea579adbd
glibc-langpack-cv-2.28-251.el8_10.2.x86_64.rpm
6924b4bf9edfad8bb713820e79b5ae6b7d430fe33fc45970b7d7757e3279c108
glibc-langpack-cy-2.28-251.el8_10.2.x86_64.rpm
7ae8033e698f778a161eadf9ccfa3824667b8937aa6599320229288171d412cc
glibc-langpack-da-2.28-251.el8_10.2.x86_64.rpm
12fddd526e7c4b62bbb30080fd2717d33e2a8039d44618a652f7623db4b438b6
glibc-langpack-de-2.28-251.el8_10.2.x86_64.rpm
1c2f533771c3be155b96e49458e3d693283c714a26a9adbdc2f83fa7fe50495d
glibc-langpack-doi-2.28-251.el8_10.2.x86_64.rpm
e45c09f4b6721fa3315f5d8cbfa0ecc1a50fe02b1c32a0a71f9ed4b32e865693
glibc-langpack-dsb-2.28-251.el8_10.2.x86_64.rpm
3221219511d9ac4cb4972bb02d0a7bc0a93b1356db0dd9c4c00e91bc8fcfd682
glibc-langpack-dv-2.28-251.el8_10.2.x86_64.rpm
a0cfc8bc067cc623dc27f017e991bf6c31faca8f72ec42afbd0b3e4c0af184f6
glibc-langpack-dz-2.28-251.el8_10.2.x86_64.rpm
6b3ceaf5682dbe292ca517f0bf9ff783b6c8724555a6bf00e2794c54ec2c70b9
glibc-langpack-el-2.28-251.el8_10.2.x86_64.rpm
28ed38e7008b49ea51ae74cc8d32d6f7dde6bd1b40dcde55e6f7785e901c595c
glibc-langpack-en-2.28-251.el8_10.2.x86_64.rpm
2d15d11ef45e5ae103a7948524f6b4e1d72fc4c161e375078ff3e501526aecf2
glibc-langpack-eo-2.28-251.el8_10.2.x86_64.rpm
43745e09ad545ce9f092b3f07c5402640d7bc11a28739d914e01685740d9a19b
glibc-langpack-es-2.28-251.el8_10.2.x86_64.rpm
507f3944dc331feba8d74073fff597dc504c4bb849cb585bb8dc50b946fddb85
glibc-langpack-et-2.28-251.el8_10.2.x86_64.rpm
095ec54ceb7c017acf18b54b8b609beccc6d3944801f4fc20b928550cc08b450
glibc-langpack-eu-2.28-251.el8_10.2.x86_64.rpm
02aa6f19a5f096e8ddc4a722e9987f1168e6a8d7f4b42b63eae647ca835b1986
glibc-langpack-fa-2.28-251.el8_10.2.x86_64.rpm
26ef1cfa3bb7f6fad5e1088a725d6cb5c538ab9e006d7560980a9ae6b0ec8438
glibc-langpack-ff-2.28-251.el8_10.2.x86_64.rpm
fa21c2030dfa13ee5e30f48487e0486f981d1340c45463eb27644296334d39f4
glibc-langpack-fi-2.28-251.el8_10.2.x86_64.rpm
8c26534ea2ecb803528fac360d1294be94de958453ea863dd672dacb996bdabb
glibc-langpack-fil-2.28-251.el8_10.2.x86_64.rpm
c57e1b144c9b970b7d28a90446c14b533cb61f2bc3ea19844a3970300b55a74b
glibc-langpack-fo-2.28-251.el8_10.2.x86_64.rpm
383cb74c20f5e1cdcecbe5725dfe78323f7748e246b63e054a0cbc9580bcc5ad
glibc-langpack-fr-2.28-251.el8_10.2.x86_64.rpm
a79b4b5505b207a61cd8fa563d0c394e526dcaf6f177d03bd3efaeaf75f72440
glibc-langpack-fur-2.28-251.el8_10.2.x86_64.rpm
b023bb3b1192a392df3af3ac7c34e325f45e7b762d74ef6e155761bbca182513
glibc-langpack-fy-2.28-251.el8_10.2.x86_64.rpm
e9b37a499075c3f497f5fe468434be09988b78bd7bb1275be33438058f719487
glibc-langpack-ga-2.28-251.el8_10.2.x86_64.rpm
8f79881c318edc8d8426dab4952afa71fa0ee913334523c6a138019d18050e7a
glibc-langpack-gd-2.28-251.el8_10.2.x86_64.rpm
ddb954464578a1ab08c11839fdc87729b64e77d98825972610c5b5c8258ba757
glibc-langpack-gez-2.28-251.el8_10.2.x86_64.rpm
bf61c5ed8af642d9c80d12b812eb28d9cbaccf646b8258bc1dff077728718ad6
glibc-langpack-gl-2.28-251.el8_10.2.x86_64.rpm
1f0b879a2c932a69dae68f2afa3fad4b86edf0e9bd20d89e6b4b1fd1b7700c8f
glibc-langpack-gu-2.28-251.el8_10.2.x86_64.rpm
369146fec93a8a699df6b6e7d88cabdb991583120372beafe5516423c4033cc8
glibc-langpack-gv-2.28-251.el8_10.2.x86_64.rpm
d87bbfd46e3a837e15f72b3145d67312e4ffae9ff02df42bdbed293ba5cdf33c
glibc-langpack-ha-2.28-251.el8_10.2.x86_64.rpm
bb8a77700d4f63b38c9f1cfa03c3eb266d14bdb4983e00297c1a6eba7e78e085
glibc-langpack-hak-2.28-251.el8_10.2.x86_64.rpm
028a64ab550a554f13f2d4e7d5a48ea42e2f49e30062fd71c7d61e5e0df44cd9
glibc-langpack-he-2.28-251.el8_10.2.x86_64.rpm
924332927be6eb3123f138b46eda5d4e75f3813e6628612e9f374f8e3576d5d0
glibc-langpack-hi-2.28-251.el8_10.2.x86_64.rpm
28f9b191b3b92423a451692415347392719f05b940be94a63ed1ccf82c0a113e
glibc-langpack-hif-2.28-251.el8_10.2.x86_64.rpm
4ac49b39ed556f2dc105bcf9fc70dda391d188367959da36dd041ff51e35f5a1
glibc-langpack-hne-2.28-251.el8_10.2.x86_64.rpm
fe41b322e41f6325fd333c603dbbf2eb145749682632f826da3a427e1c429461
glibc-langpack-hr-2.28-251.el8_10.2.x86_64.rpm
549f4fe7a53b40b3db020cce43ea4f690b9095ceaabb91e45da9d029aa5061a2
glibc-langpack-hsb-2.28-251.el8_10.2.x86_64.rpm
f8ec8fe3247b2f76e8dcc84adb53921bf18b188c4a5255e308ca5c0c4b2938c3
glibc-langpack-ht-2.28-251.el8_10.2.x86_64.rpm
d76573de02f63b3cfd96219b403fe3a9bc2ebe797fc9b30d3e5f70ee157fe32f
glibc-langpack-hu-2.28-251.el8_10.2.x86_64.rpm
791f4e4d1bf95ac28599dfa0842bb0630b99365eecd72f11ce49adb9ed848d17
glibc-langpack-hy-2.28-251.el8_10.2.x86_64.rpm
3e9faa93e76752b1d0244b39b902053e449a1f5b483bfca04a29b367b0eed21b
glibc-langpack-ia-2.28-251.el8_10.2.x86_64.rpm
427a67943c925935bf9ffb426883377be8b729e6f9e6475208e8887d998c0379
glibc-langpack-id-2.28-251.el8_10.2.x86_64.rpm
48dd4063c79eca75c2f9a711ca45c836b9711cc1be2c2a5f376ea25b19dc7ef7
glibc-langpack-ig-2.28-251.el8_10.2.x86_64.rpm
5420ec348dcee5c18d891dbdcd01c7d2f40688cffb683451b28f94c575925a3e
glibc-langpack-ik-2.28-251.el8_10.2.x86_64.rpm
8f934a1b52b23274a0c853329d472e5b77a5f817cea22a1c9efd39355f15a573
glibc-langpack-is-2.28-251.el8_10.2.x86_64.rpm
1ae21ae2d5b2168231ad17fdfbc08b0aa86ad723fb8b82c08112a742e1651989
glibc-langpack-it-2.28-251.el8_10.2.x86_64.rpm
bce92f3ce30bbaf64a75164925a72e36389189e33d24fd3dfb06ca676eb73a05
glibc-langpack-iu-2.28-251.el8_10.2.x86_64.rpm
71957c7cc4ea58595ac87d27580b648f86763cc3dee3b91734cc64ac1f99d615
glibc-langpack-ja-2.28-251.el8_10.2.x86_64.rpm
a6b35ef657575f0a61514151fda570f57d8350b151bdde6068453366367a1e48
glibc-langpack-ka-2.28-251.el8_10.2.x86_64.rpm
147b685b5a179f7a4b603d8b9f69f3c88f4c6b843e969981dc6e4e4b4dc5c4b0
glibc-langpack-kab-2.28-251.el8_10.2.x86_64.rpm
74e142ad4472575466c86360fbf98cab1a29667320fb45bc7ed2296fadc3df6f
glibc-langpack-kk-2.28-251.el8_10.2.x86_64.rpm
c065f705098b0a3ce5d55a8fa124d11d8bd427f8bb31385bf141334d5c5e943d
glibc-langpack-kl-2.28-251.el8_10.2.x86_64.rpm
b9981fbb4a6665c60f39c8d89b88644f2c9e8f6ad77f9e634cd19e7d523853e8
glibc-langpack-km-2.28-251.el8_10.2.x86_64.rpm
1f33abafceb005944e31668ccc3cc544398d90a2db773a04ebd143a9484c428a
glibc-langpack-kn-2.28-251.el8_10.2.x86_64.rpm
0493e45cbd6a68e333280e2b1c348a19c98d4e28c07f51062b620c60aa52d8ae
glibc-langpack-ko-2.28-251.el8_10.2.x86_64.rpm
e7542e277eb757c903478e7068cd46d097ed1446ae58a9f9e885f66d5d389c0b
glibc-langpack-kok-2.28-251.el8_10.2.x86_64.rpm
d8cd920473e775b6e38b0777cdad67529b57ddec011218ed8c57285427c68b99
glibc-langpack-ks-2.28-251.el8_10.2.x86_64.rpm
768eb82bece5f0f9533c00e8be8a4a4c460045d2383c9a07536d1230fabde4a7
glibc-langpack-ku-2.28-251.el8_10.2.x86_64.rpm
d35d19485a25a327253ecbf5f418e20657062f4c8140e3ef3735a482c276ff3f
glibc-langpack-kw-2.28-251.el8_10.2.x86_64.rpm
0d3248dfa96b3d88a43086819dc84cb4379cda8a37f770914e905c075ee4b2e5
glibc-langpack-ky-2.28-251.el8_10.2.x86_64.rpm
bdb1ed35128dd6a2fc990940ed0dcae5540f292a3250eb23c01b684b2dd0e907
glibc-langpack-lb-2.28-251.el8_10.2.x86_64.rpm
9d05032ac9c74261cd90944f02365803b97bf04306ec829ca1fe55547a6687af
glibc-langpack-lg-2.28-251.el8_10.2.x86_64.rpm
908b6d437e06bf9ec8cae71481b76cdcb40749ed20d81dbe8077d71ecd0ce8e5
glibc-langpack-li-2.28-251.el8_10.2.x86_64.rpm
5a615049259be94a6246a29cfbf60dbce5af334a291cca2793dae1ac43ee11b8
glibc-langpack-lij-2.28-251.el8_10.2.x86_64.rpm
2220b48243ffc0a49abf8642794f8a80640632b7ced4b8f4aea4d0618578afb2
glibc-langpack-ln-2.28-251.el8_10.2.x86_64.rpm
28758e4fc60ba8f68e0201fa1057224d6edc80b37e53b73c956859da08a2c800
glibc-langpack-lo-2.28-251.el8_10.2.x86_64.rpm
68e4d975e599253241f04d8508ed822e4301d355a7fcd95ceea90227b35f5600
glibc-langpack-lt-2.28-251.el8_10.2.x86_64.rpm
b6e01840a3ec6c9cbd2b42acf3328f76b16851abd5668ef6d08ed70e6e28e27e
glibc-langpack-lv-2.28-251.el8_10.2.x86_64.rpm
23a80868f5904e8a5a42f5b60f5bc6de5e8776a13a58b286242a35f8b4daf2b0
glibc-langpack-lzh-2.28-251.el8_10.2.x86_64.rpm
8173e2480d780004e440c9d8b0934f3c170a9798b9d002ab19361d6b0b2f7144
glibc-langpack-mag-2.28-251.el8_10.2.x86_64.rpm
33d91e0b6e075cc5d51c7c1070d6c477e058f481b9a3db4fa359aabe6ed6f1de
glibc-langpack-mai-2.28-251.el8_10.2.x86_64.rpm
ae10f7b683c3e62248e9d9ea5b9b2b7a704886e1c807223f62f67e71605f5809
glibc-langpack-mfe-2.28-251.el8_10.2.x86_64.rpm
2e4fc18ac17c9f1689fba44dbb41aadc8af1bc37b4ef807e9a9f9dd4fce865bb
glibc-langpack-mg-2.28-251.el8_10.2.x86_64.rpm
950d1e478a3607869b6dfbd588a5bdbdf9dce443bc916f3e9a1338f00067e482
glibc-langpack-mhr-2.28-251.el8_10.2.x86_64.rpm
aac7bd2bfc6caf7185ba1873caed149ceeffd5a88eb95ec5a6afba1e10131edf
glibc-langpack-mi-2.28-251.el8_10.2.x86_64.rpm
af890640054113ecb1df7854eebff20077fcaf6acc6408e79de92a74d1377672
glibc-langpack-miq-2.28-251.el8_10.2.x86_64.rpm
bd491484308b3a1c098888de25cdb8f96f29221c45abd462a0616f1245cf3a45
glibc-langpack-mjw-2.28-251.el8_10.2.x86_64.rpm
b86fdbe41d7966607aad754e19d044f9fec3b28a0f6c439958856ffebe7e26b0
glibc-langpack-mk-2.28-251.el8_10.2.x86_64.rpm
43471447f330f092544c2fd1e11536369a700dadee7ff3bf0824cdeb66354b26
glibc-langpack-ml-2.28-251.el8_10.2.x86_64.rpm
5dcac47b2ca52d9f1ca08aa3ff55eb1524365ddfcb1390a356470eac3963cf71
glibc-langpack-mn-2.28-251.el8_10.2.x86_64.rpm
b1b20399368b8bb11c26de6e29a0c5b990be5d4c68e20ff12095b00e1b3f886b
glibc-langpack-mni-2.28-251.el8_10.2.x86_64.rpm
b175b810548d2bad4dbcd951e75363c24dfc1a36da7399d09f80a873f5514402
glibc-langpack-mr-2.28-251.el8_10.2.x86_64.rpm
d0a50ded1e2a03c8db17e6a3c83bb642f0e36d6d052465ed0b8f4aafdbcf0cf6
glibc-langpack-ms-2.28-251.el8_10.2.x86_64.rpm
e5012c8946248d344ac414ccf22cdfc0086face7c295d0550eda4bb87d91de49
glibc-langpack-mt-2.28-251.el8_10.2.x86_64.rpm
747aae2236f92e24e11dc0662cc289bfc826fa5fbdbe57bae811ed27ff525106
glibc-langpack-my-2.28-251.el8_10.2.x86_64.rpm
7296d88c18ac9dc14a0773e4bfcb09039170661047b5058e852eb13bee31c392
glibc-langpack-nan-2.28-251.el8_10.2.x86_64.rpm
705dfb5c56df42f641db33559cf7eaa871986c198b84b975d2656adada02c771
glibc-langpack-nb-2.28-251.el8_10.2.x86_64.rpm
7527c8dd4e8f8202525b8f69c32c234152d779311278beaea60b8ae0cb9d4e27
glibc-langpack-nds-2.28-251.el8_10.2.x86_64.rpm
295b9a3eae9f74a63cc09a68c0ca5bf866ca78612d8cd106b619d24560d65932
glibc-langpack-ne-2.28-251.el8_10.2.x86_64.rpm
4ceaf4ba8f06752c9fb33a16054589d08838bfca9568c29056799d2ef48d29dd
glibc-langpack-nhn-2.28-251.el8_10.2.x86_64.rpm
0ccae1034dd3394c31e5033dbeea15d414f2c07bbf47f2586c1faf9941c0a64f
glibc-langpack-niu-2.28-251.el8_10.2.x86_64.rpm
cb506ea508e9968608a08f6bc5538cad4914971a42dd53600c129796867923e3
glibc-langpack-nl-2.28-251.el8_10.2.x86_64.rpm
b4fc5a8c24652b6670e5d3f4fc0b721de4ca99979efc4101775bb75acd683277
glibc-langpack-nn-2.28-251.el8_10.2.x86_64.rpm
28e75248ab4d44967378052d7f0da6da0ba786dfc81248c93a034d2a44b9cd5b
glibc-langpack-nr-2.28-251.el8_10.2.x86_64.rpm
d23b7a51a276159f15bc561b5568b0bc74add4ac784a9dfd16ef7c8ca4b0dac4
glibc-langpack-nso-2.28-251.el8_10.2.x86_64.rpm
781f4c439a106d3de8afba100e4cbb0b03116e14edd249d9ebc6a0d30cc81b9a
glibc-langpack-oc-2.28-251.el8_10.2.x86_64.rpm
bbdd72bf1dd2900e66b026ee7dda7282e32fee9e42960e5f3098fa2af22f658b
glibc-langpack-om-2.28-251.el8_10.2.x86_64.rpm
46f273d10c54a975804a977a3602d6d9dc49e7a11c44b3cee8cf68ed9e8a0294
glibc-langpack-or-2.28-251.el8_10.2.x86_64.rpm
5ab828d0723654fe62457a52ed057d9de53b111cf0146dc411c2be822815cfec
glibc-langpack-os-2.28-251.el8_10.2.x86_64.rpm
c423ae35666d1280e8873492fad823eb0c146f528090e59987b40b28392a3531
glibc-langpack-pa-2.28-251.el8_10.2.x86_64.rpm
8c13af6c2019bc154aa7679a599171812fe72e18db51e159504772228147d472
glibc-langpack-pap-2.28-251.el8_10.2.x86_64.rpm
c9d37e8b81880578fdf608730daa29a687fe8f66e6e2519a3d38ae6776a6fcc9
glibc-langpack-pl-2.28-251.el8_10.2.x86_64.rpm
a98cc53b07a295c4583a78456bae37805117ba2b123a748c90b5b06e1c5452f4
glibc-langpack-ps-2.28-251.el8_10.2.x86_64.rpm
4b1093e6b97cb5d52931ad525cd6694b178f2e6c11d35208240c6a9bd6b02ca4
glibc-langpack-pt-2.28-251.el8_10.2.x86_64.rpm
011e482a92769ed7d041fc53d0ab9bf282a7b4892d56281fc3cc66aee5155edc
glibc-langpack-quz-2.28-251.el8_10.2.x86_64.rpm
e773879e393de3e44eccc55c92634557fddc85d4d69006e4b53a573df1223116
glibc-langpack-raj-2.28-251.el8_10.2.x86_64.rpm
8b762be9b70dcc76596d64c5959df48e66acdc21eccd05a0ab0736c614f46132
glibc-langpack-ro-2.28-251.el8_10.2.x86_64.rpm
c47a02e24700a7f94b7364a23d86b1214b56ebd2f77f74348f95ea11ae3a8777
glibc-langpack-ru-2.28-251.el8_10.2.x86_64.rpm
3396b099397b6b5bdc6437275f95359a842c60806606ae7146687c18ab813342
glibc-langpack-rw-2.28-251.el8_10.2.x86_64.rpm
d8ac12464cd4489adfbd0a794068f4af607738e94011f9b8da606f2bdac2ed56
glibc-langpack-sa-2.28-251.el8_10.2.x86_64.rpm
d70ac66e8bddde59b4994554d41a885d037333c188ad7b99a2f3a388ec32be1e
glibc-langpack-sah-2.28-251.el8_10.2.x86_64.rpm
3d32ae6eb8a62b770ccffac7cdbf35bf28dbd109c0d377f2623a040dc041afe8
glibc-langpack-sat-2.28-251.el8_10.2.x86_64.rpm
2c133dd023815b8c8d2d6583a94cb1095e1113a3ffb6156f4d4ecedee4fb1e13
glibc-langpack-sc-2.28-251.el8_10.2.x86_64.rpm
4cd1c112acb51acff3f9def497dabdf51576c542321a8ee1d9c30e4da3f08a4f
glibc-langpack-sd-2.28-251.el8_10.2.x86_64.rpm
05d1b601387c54908d417c435b4ae51e294eac8b5ac0fc0c7087a7fae4f766ea
glibc-langpack-se-2.28-251.el8_10.2.x86_64.rpm
e92ed74284674a50b700bcf5e6cb01b0d65559e43f3930d2152149e7b161ce62
glibc-langpack-sgs-2.28-251.el8_10.2.x86_64.rpm
c38cf7e2973e3853fb6399fbd350f79e886dae2809c02dbdc3361644bf58421d
glibc-langpack-shn-2.28-251.el8_10.2.x86_64.rpm
d673a586e4b58cacde8334b4e6a76eb47682181f834c8c0d28a3707d53356b12
glibc-langpack-shs-2.28-251.el8_10.2.x86_64.rpm
db693e329a857f455666d50df5a4b9de37a89126da8eb57af0d40b4c58ab9450
glibc-langpack-si-2.28-251.el8_10.2.x86_64.rpm
f7b33c8c4f2a4cf6997da629f9914ccb3648440a836f04c46b1ba93dcc3ac179
glibc-langpack-sid-2.28-251.el8_10.2.x86_64.rpm
d9aba5d855e06fb4dc36686085aefa78b3fd4a9c93056fdd6dd7075b69101488
glibc-langpack-sk-2.28-251.el8_10.2.x86_64.rpm
8c5e06362fc0eaabfc5471faae972c2a529c8f0ecdb9d990de4c8a55e948f121
glibc-langpack-sl-2.28-251.el8_10.2.x86_64.rpm
ab104744522496c3de9ca19e8de5ad83bb42b62e13a05f7a3551c1615d3b858e
glibc-langpack-sm-2.28-251.el8_10.2.x86_64.rpm
c02ea9b2c9be0e6147d85316575e9f3431992de58850c556e0fb4e2acde662f9
glibc-langpack-so-2.28-251.el8_10.2.x86_64.rpm
29215a4a5e972a549301f0bc220b886e3df90c09302820198e01e94b9f6b4be0
glibc-langpack-sq-2.28-251.el8_10.2.x86_64.rpm
62c500e321ab48620d8adaa0bca22deb1de0e0714b7e9578261c1acadfce46aa
glibc-langpack-sr-2.28-251.el8_10.2.x86_64.rpm
deea0caaeb473645b5d271a396d93be600993e9a7a08a3701a0a3441c46e0117
glibc-langpack-ss-2.28-251.el8_10.2.x86_64.rpm
537059d5672e5eac8f3da47b65fffdb09adce3a4722d027bbdc29d3f4ce95687
glibc-langpack-st-2.28-251.el8_10.2.x86_64.rpm
aee36035bde544c10eb8e76a70a7f7b35071827eb6ced0a2b8d9d1a157c1d4f5
glibc-langpack-sv-2.28-251.el8_10.2.x86_64.rpm
8521e9fbaa659cbec4ba16807bb8d2390016a6db6b412163f5b404bf8113eae6
glibc-langpack-sw-2.28-251.el8_10.2.x86_64.rpm
630948481031095547ccc8350f4f1d5c637e548981eae0c21069de1b17af7255
glibc-langpack-szl-2.28-251.el8_10.2.x86_64.rpm
f071a52d156069b162b9aaddf515c6811ef36192d11b48d87df62b4f6f4912bc
glibc-langpack-ta-2.28-251.el8_10.2.x86_64.rpm
1d2c33dc8bae67ac2c92a635165b4f58f3ec1f60fa5ab6e3f23c0f3f7626df3a
glibc-langpack-tcy-2.28-251.el8_10.2.x86_64.rpm
66de27da791d3cd480a6a4e2a502bec8e5d19ec24070681129dc5d67b4add03b
glibc-langpack-te-2.28-251.el8_10.2.x86_64.rpm
00a0baee255c77d91758370b7b4b5287334ca66234ef7d16f4687b86723cbb1c
glibc-langpack-tg-2.28-251.el8_10.2.x86_64.rpm
a50b77000337ed72da1264b1c161c5ceb74807511cac386aa3dfa314e194780d
glibc-langpack-th-2.28-251.el8_10.2.x86_64.rpm
f0529acbed431c935e36c46e7f14d769ff4c804e1d9e8f7acd5eb526cc5a891e
glibc-langpack-the-2.28-251.el8_10.2.x86_64.rpm
1517674368390397f426f0ea3c67fd7a8b251e79131b93d034f60739b30eb315
glibc-langpack-ti-2.28-251.el8_10.2.x86_64.rpm
25dc398ef197302d27eadf28d6339752ea8bb6ed237f71fcca8e03f335af294b
glibc-langpack-tig-2.28-251.el8_10.2.x86_64.rpm
77b0c9e8df2fd1b7cdd85fe0271064940d0711f097edbf057d1c6b1e09127ff0
glibc-langpack-tk-2.28-251.el8_10.2.x86_64.rpm
10319835967e2381b17bb23f132cd09df070aff64b6ccf42c3e1511a346474c0
glibc-langpack-tl-2.28-251.el8_10.2.x86_64.rpm
e633cb27568417dea243f96fce7531acb2a057e5eb461cb5c589e493181fb609
glibc-langpack-tn-2.28-251.el8_10.2.x86_64.rpm
f14e289acb068e8fb14afe956b665e7a78efedc3c3a79390b7af72570aec69b5
glibc-langpack-to-2.28-251.el8_10.2.x86_64.rpm
4c303c213849884535e6b24d3a5944b52b16f505325520eb01870848907532eb
glibc-langpack-tpi-2.28-251.el8_10.2.x86_64.rpm
f07271a40f66f69a5c0b9bddbdae234b16044bfa42413e5497d62b24d330732e
glibc-langpack-tr-2.28-251.el8_10.2.x86_64.rpm
4f9f044d198b92e22e7aae0d90f4f65d2b5417a9271b7517bb7e3674363eb79f
glibc-langpack-ts-2.28-251.el8_10.2.x86_64.rpm
0a9fba890241d5b086f896cdaa8bc0f2d0dc1da87caa812b2664a84f130e45cf
glibc-langpack-tt-2.28-251.el8_10.2.x86_64.rpm
f9c99dc8fa89d297fdec0ae9b5d60602fa65271883c15382e270c240d6a0c13e
glibc-langpack-ug-2.28-251.el8_10.2.x86_64.rpm
cd11199feb747051a9ea0aeeb2629262ef1f965b8915686edf2973b69593f793
glibc-langpack-uk-2.28-251.el8_10.2.x86_64.rpm
92f51fabd69cf01d3b696b78388944263cd9f2fd6d5062b1f16db67c5b5ae94c
glibc-langpack-unm-2.28-251.el8_10.2.x86_64.rpm
fabeb82cba4a63dff23e3a7e1083c3372843fa2e4fb2534cdc6a2c8e90822b8f
glibc-langpack-ur-2.28-251.el8_10.2.x86_64.rpm
af9f61592cdeb78896cf3e95c20d7eea922b8d092c725532b44dfbc7ee582529
glibc-langpack-uz-2.28-251.el8_10.2.x86_64.rpm
50dfea55cab019da3dc21168467a19ab6d1b8d976c0e220a3da929299808550a
glibc-langpack-ve-2.28-251.el8_10.2.x86_64.rpm
12b6e812b0c0c796f3f8ff8194a9df5677664da25c19163591153844a72290b5
glibc-langpack-vi-2.28-251.el8_10.2.x86_64.rpm
20146d89efcf2a36e21fef1e628ddb0cd2ff33082b07259bad40a7db3fae3392
glibc-langpack-wa-2.28-251.el8_10.2.x86_64.rpm
f2ee3a8091f0189a52546dc5cadc1cb1efc899f543a787955ba1733395444752
glibc-langpack-wae-2.28-251.el8_10.2.x86_64.rpm
946d7b57c6e4f7f4e3ae73fc20376596fc94b18129cb5073e9c4f90f8caacfcf
glibc-langpack-wal-2.28-251.el8_10.2.x86_64.rpm
1eb5b6015736980bb1f4ae258e16c2f55ffef01ca8209b80120f2ec653f2f2cd
glibc-langpack-wo-2.28-251.el8_10.2.x86_64.rpm
9ef3aa0b287da6d7259426c1bfaf02c6f9877d9e7161bdd39cade8fa35ea2926
glibc-langpack-xh-2.28-251.el8_10.2.x86_64.rpm
e72906723e1db0f1925e77902a0bcb24201dda197cb61ce56fa706402195048a
glibc-langpack-yi-2.28-251.el8_10.2.x86_64.rpm
de41a93b98e40d1490c146487ca67c35341eb1bda3d3eb2ed48d5c34a02ea4e8
glibc-langpack-yo-2.28-251.el8_10.2.x86_64.rpm
84640a518171eac4f3238500a63d21e8afe41b2cb9ef39cd5f81d50bc65290b3
glibc-langpack-yue-2.28-251.el8_10.2.x86_64.rpm
3647320bcaa3ecdb308852d5eae3c2a58ce346d4706ed05315245bdcbb1041cb
glibc-langpack-yuw-2.28-251.el8_10.2.x86_64.rpm
15f5c0455c5ebc565b1b55903b897664b04af020a06a0f04a5af9fe9933db2d0
glibc-langpack-zh-2.28-251.el8_10.2.x86_64.rpm
9b95cf02bfe604019d0e89a00bcd87b0545dc3d939674e928ca8e1f79b40b58c
glibc-langpack-zu-2.28-251.el8_10.2.x86_64.rpm
35575ee72fe54d0dafb11b2110cc9a081d2a1ffa2959f8480894ba8845495112
glibc-locale-source-2.28-251.el8_10.2.x86_64.rpm
19a07e625196363d6ba81eea384357f812b4c2b73d194cff47d8cdacb5920909
glibc-minimal-langpack-2.28-251.el8_10.2.x86_64.rpm
90510c6fcf5524985073971cf42c731b0b3bf2f6680e26cad763d8711df9e63b
libnsl-2.28-251.el8_10.2.i686.rpm
9357ea2d45e7db9d6b91ade82183521b5649d0d1f5a8db35df2b0ba565f2663c
libnsl-2.28-251.el8_10.2.x86_64.rpm
d2d8fb740919f57a31c5777162d24756bfc1c9012d83473f9272155bbb974dc3
nscd-2.28-251.el8_10.2.x86_64.rpm
2d16aa6ff80372dbfd8061b0e5e243d04d64c1309f5b0362a27438fc9f01254b
nss_db-2.28-251.el8_10.2.i686.rpm
94d721dcce61a95b7e3dfd8a5382b1296a0e98b3a5d528028d66cde26dd18318
nss_db-2.28-251.el8_10.2.x86_64.rpm
042c11844b92847f0e672eb3902f56577e075dd8b286597b2769b4bf701e1deb
RLBA-2024:3151
acl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for acl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
acl-2.2.53-3.el8.x86_64.rpm
2667ccc2ac3114b73508e2c614502cb629a573b92a49dc0260c685951b0222a5
libacl-2.2.53-3.el8.i686.rpm
32d45f67867a648eea326493b895e2761cd5529e583096cb4c28f2c062478118
libacl-2.2.53-3.el8.x86_64.rpm
c991ac32e6016a1e7a149f8bfe7600d831c2db2a2db2299d7e09710785c789f5
libacl-devel-2.2.53-3.el8.i686.rpm
30b58a83f111d86b031e4940f3c6fb50e66f5f7c654efca85543d43d80ed38c1
libacl-devel-2.2.53-3.el8.x86_64.rpm
8c4e9c634f13e89d78d6049fcf8c18ff36d848197cb57a9bc8a3a76de72e5379
RLBA-2024:3150
python-urllib3 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-urllib3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
python3-urllib3-1.24.2-7.el8.noarch.rpm
9b2db8ee6315e4ce5bfa1224dae9cd74ee4807b04b4911368193d3982875fd5c
python3-urllib3-1.24.2-7.el8.noarch.rpm
9b2db8ee6315e4ce5bfa1224dae9cd74ee4807b04b4911368193d3982875fd5c
RLBA-2024:3149
autofs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
autofs-5.1.4-113.el8.x86_64.rpm
803a8b37bdac877dedd9c9fdb5ad7b2e1163285beb40d515b7a53a70143cf3ee
RLBA-2024:3159
python-linux-procfs bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-linux-procfs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
python3-linux-procfs-0.7.3-1.el8.noarch.rpm
c726c1c16d23294bcc9d933f2a146650cf699f96d2e78da4a30b24643bbcf211
python3-linux-procfs-0.7.3-1.el8.noarch.rpm
c726c1c16d23294bcc9d933f2a146650cf699f96d2e78da4a30b24643bbcf211
RLBA-2024:3158
mcelog bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mcelog.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
mcelog-195-0.el8.x86_64.rpm
82a0883eb3bc726ed30776b086b5be95d1dc2e61199cd7b019e2ab74cc23309f
RLBA-2024:3157
cockpit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
cockpit-310.3-1.el8_10.x86_64.rpm
7554f03a83578a9dd806f208b9ace264a85d6924a09c918d1d888c4439f05cb0
cockpit-bridge-310.3-1.el8_10.x86_64.rpm
05923f07753ee5bbc67b2e54e5d9be36cbe939d710c8238ea4f1b9acfdb60766
cockpit-doc-310.3-1.el8_10.noarch.rpm
09d0260587da36d67475c95ae593e4eab984d050065fec136f63724601599339
cockpit-doc-310.3-1.el8_10.noarch.rpm
09d0260587da36d67475c95ae593e4eab984d050065fec136f63724601599339
cockpit-system-310.3-1.el8_10.noarch.rpm
39da3e77b24c240578a3603b653963535da509fe39873db0dc313ba300eb465d
cockpit-system-310.3-1.el8_10.noarch.rpm
39da3e77b24c240578a3603b653963535da509fe39873db0dc313ba300eb465d
cockpit-ws-310.3-1.el8_10.x86_64.rpm
8d94bcedc0a679a787de1b4cbda77cdb1866392a3325174b04e7127059b95990
RLBA-2024:3165
cups bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
cups-libs-2.2.6-57.el8.i686.rpm
e8c1ecedd5e46301e998710437f82a17929f25ab5231deadb4d55777b2708c85
cups-libs-2.2.6-57.el8.x86_64.rpm
aa9e53a2f40bbfcd9a4c653d70fce21cb7470d078f80067661c0b0c4d81059af
RLBA-2024:3164
dnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
dnf-4.7.0-20.el8.noarch.rpm
fa9560a29d68f159a8f9db7fd874c5be638e9a19d83af1dc50c2c49c7895e425
dnf-4.7.0-20.el8.noarch.rpm
fa9560a29d68f159a8f9db7fd874c5be638e9a19d83af1dc50c2c49c7895e425
dnf-automatic-4.7.0-20.el8.noarch.rpm
59a202af22c1d767d75fef1277304393f2bed7134666b6c69eb820579bf830c6
dnf-automatic-4.7.0-20.el8.noarch.rpm
59a202af22c1d767d75fef1277304393f2bed7134666b6c69eb820579bf830c6
dnf-data-4.7.0-20.el8.noarch.rpm
d2c0ba2bdb3d72d558a4467afea5923c27cdcda5b41f0c23e0d3b9a0881a1e7f
dnf-data-4.7.0-20.el8.noarch.rpm
d2c0ba2bdb3d72d558a4467afea5923c27cdcda5b41f0c23e0d3b9a0881a1e7f
python3-dnf-4.7.0-20.el8.noarch.rpm
8195a2a40afcaef2c3c0d9b288bde41ab71847cc2fe2ba24f113a4ae980ca99a
python3-dnf-4.7.0-20.el8.noarch.rpm
8195a2a40afcaef2c3c0d9b288bde41ab71847cc2fe2ba24f113a4ae980ca99a
yum-4.7.0-20.el8.noarch.rpm
2793583cffdb76e783f1f58fc0f6a19469ac49e7e54726240774257df95e745b
yum-4.7.0-20.el8.noarch.rpm
2793583cffdb76e783f1f58fc0f6a19469ac49e7e54726240774257df95e745b
RLSA-2024:3163
Moderate: pam security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* pam: allowing unprivileged user to block another user namespace (CVE-2024-22365)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
pam-1.3.1-33.el8.i686.rpm
bd2ad53f050abbe96e40b5fd1946f7b261603f06af3d50ef24b0a7b8eb39e862
pam-1.3.1-33.el8.x86_64.rpm
9f463d7bebe3e53f46a8170d9b2a2b2d89d99827dd8407e589320de20c532ccb
pam-devel-1.3.1-33.el8.i686.rpm
a2d20334866b61ce3a47e235d7a1e75f592bcb8f24b37ee0c494706e7b25a4b7
pam-devel-1.3.1-33.el8.x86_64.rpm
1c969bdb0d9fc2f2047519754560ca30218da64d822c2d08df1cce1830e99d8b
RLBA-2024:3167
rdma-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rdma-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
ibacm-48.0-1.el8.i686.rpm
0e4a0ac92e92a4be12d16f690d0f25107b2080825b83f418aef3542717980f33
ibacm-48.0-1.el8.x86_64.rpm
1265c29400c9e2a2befa7c7f10463048de849e2a6be7ac3f1c4b72058fa5ea18
infiniband-diags-48.0-1.el8.i686.rpm
3d4b373e20fb6baadf0ad9748c035af60ec4d6b6954024521b9d6a14b73db5ba
infiniband-diags-48.0-1.el8.x86_64.rpm
abb2e5b1eaa18c632eb947f93c13b9267d85bc8cf15b714a1c099eb62c66b9b4
iwpmd-48.0-1.el8.x86_64.rpm
96ffde37f3048734f6346e193d493f71f33a9c7093a1f83d2aeb9178984163f9
libibumad-48.0-1.el8.i686.rpm
cbf0a9eec60f4a54ef0e101719fdfee6a1200aea19e02e9274f4057463def50f
libibumad-48.0-1.el8.x86_64.rpm
2810d615e91a15c1e435bae6afbc46917a04573b93aa439eec113c93a71b08a5
libibverbs-48.0-1.el8.i686.rpm
3b346246e758b236133db92011635de30b4610aadc30f73eb06f14775bbd98a0
libibverbs-48.0-1.el8.x86_64.rpm
5fa3a8658b9788f0e5fa01feb6ef7e827b3b9d0b85df1d8d83d048c26fde30d0
libibverbs-utils-48.0-1.el8.x86_64.rpm
80b18d5eba6a596981955a6351922a15d9c122a9d601a25863881aa892d7472b
librdmacm-48.0-1.el8.i686.rpm
118c6044258ed86bde268ff29c2cb575d6c6bccda910eb5221b17ca37df025c5
librdmacm-48.0-1.el8.x86_64.rpm
dda55f350f3f8f873ceb4b792c00480db4bc98b470c143e54126b793f34f705d
librdmacm-utils-48.0-1.el8.x86_64.rpm
98635409f67fbc52ce8dd90d64c8ab7b778560a8009e3818db7ce4b2aa9f5f49
python3-pyverbs-48.0-1.el8.x86_64.rpm
7bc308339ab8e0eec6082f6143c791ab5b6fc26a61286e3a155db782d0e52284
rdma-core-48.0-1.el8.i686.rpm
4bffab2d27f63f6efc078e1159f0001c06d2fd98a2751031e7feee517ac2d232
rdma-core-48.0-1.el8.x86_64.rpm
3d49ff969a5c2f7e165150d5e320d21b9f1bf7371e9e51b8534d806438d6dad0
rdma-core-devel-48.0-1.el8.i686.rpm
f3f3abca154ec5fc840d6adc3c456d676947e51bec8e8c22a17fb1f33d4d825e
rdma-core-devel-48.0-1.el8.x86_64.rpm
334e283a95c7b29458c43c403a1efa6730e09f6d8d50759fa65dd588b9f5968e
srp_daemon-48.0-1.el8.x86_64.rpm
aeb848d8665c1a92e4ad45afa8b6d3bab105f2f217500e75261076eabff5d3bc
RLBA-2024:3169
dnf-plugins-core bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf-plugins-core.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugins-core-4.0.21-25.el8.noarch.rpm
069c1e02fbed2d9fdee08d1b9bfb09f590d27b88da3b273f33cd9314a7f803a4
dnf-plugins-core-4.0.21-25.el8.noarch.rpm
069c1e02fbed2d9fdee08d1b9bfb09f590d27b88da3b273f33cd9314a7f803a4
python3-dnf-plugin-post-transaction-actions-4.0.21-25.el8.noarch.rpm
8e9283d4362cea2328da7f8e203a93ca9adf6df29da1ee210c573439b4ecb399
python3-dnf-plugin-post-transaction-actions-4.0.21-25.el8.noarch.rpm
8e9283d4362cea2328da7f8e203a93ca9adf6df29da1ee210c573439b4ecb399
python3-dnf-plugins-core-4.0.21-25.el8.noarch.rpm
236c8eff4747c7391433cc2a447ac03ea95c39307de117a45a4d7bba298a20a9
python3-dnf-plugins-core-4.0.21-25.el8.noarch.rpm
236c8eff4747c7391433cc2a447ac03ea95c39307de117a45a4d7bba298a20a9
python3-dnf-plugin-versionlock-4.0.21-25.el8.noarch.rpm
5c5078cbf684d477d9b77e31b8bc227d14f3b2fbc6a8b591ba72a7f8681e2e77
python3-dnf-plugin-versionlock-4.0.21-25.el8.noarch.rpm
5c5078cbf684d477d9b77e31b8bc227d14f3b2fbc6a8b591ba72a7f8681e2e77
yum-utils-4.0.21-25.el8.noarch.rpm
7ccf9325c27dcbb50eba6ebeada3bef286c402e7edc866d73933099fb50fddac
yum-utils-4.0.21-25.el8.noarch.rpm
7ccf9325c27dcbb50eba6ebeada3bef286c402e7edc866d73933099fb50fddac
RLEA-2024:3168
libkcapi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libkcapi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
libkcapi-1.4.0-2.el8.i686.rpm
27b3983304db02a5caeede2a9b0f4d4cf4c117cf85eefd03ac734ccea7d0d6bf
libkcapi-1.4.0-2.el8.x86_64.rpm
662a680bb74d3039604e1b27b61b2df2c43bceaa2eae50cf06b0fefacbd7516b
libkcapi-hmaccalc-1.4.0-2.el8.x86_64.rpm
df58365d7ff391c3fbe7d69738778a7f2800f1cbcfa18110043619581550e323
RLBA-2024:3173
audit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for audit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
audispd-plugins-3.1.2-1.el8.x86_64.rpm
94a78ef2115b063d8c2f983eab93692d09fb333028d2f1d7ff7ca9fa86278775
audispd-plugins-zos-3.1.2-1.el8.x86_64.rpm
7596a8d67b4aabb85ed8f3d0e13c803cbe5599ec5b93a80dac029410442df85a
audit-3.1.2-1.el8.x86_64.rpm
c94e3b589da8d66aa24bc19d41c199c0b400ac47a583baa7de57d92820f3a915
audit-libs-3.1.2-1.el8.i686.rpm
5787b53ebb2cd1e4b3b1858e6a1bbcf5e9c36ba34d441e60abeb375103a3d849
audit-libs-3.1.2-1.el8.x86_64.rpm
6225888056c3fa4df635f03c45ac6cd21c8e3219ed93d4591c7fb69dae42a701
audit-libs-devel-3.1.2-1.el8.i686.rpm
31ebb09dcd4a4d686b6045a80a77f7a6b45f020fb5b888949bd880ee18c4027e
audit-libs-devel-3.1.2-1.el8.x86_64.rpm
5b6f139b07fc7c6da6db32c9ab8dd8e3702613332c2d4ba83e2b88a3d5739052
python3-audit-3.1.2-1.el8.x86_64.rpm
1931f2508ff87f5d31318b265a5e45475e807cd6e8904e32776903eac6e0e4e9
RLBA-2024:3171
mdadm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
mdadm-4.2-14.el8_10.x86_64.rpm
bd2596d518b4053803b15650f22cde7d20de90e33527149b6b106e20ad39421b
RLBA-2024:3177
numad bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numad.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
numad-0.5-27.20150602git.el8.x86_64.rpm
1496b6e93fb2ff201a5760d3bcab32b2482f3c3e2c81cb019a31cbdf8c287dbc
RLBA-2024:3174
findutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for findutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
findutils-4.6.0-22.el8.x86_64.rpm
e0905d9dbe378412c421ad73ab8729a434f9dc27f0debf1ac7b568cfeedfe98c
RLBA-2024:3179
avahi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
avahi-0.7-27.el8.i686.rpm
1929c1fef1ad0bc3b73122ec46c06162e1a2933d3813557a93cc733da12274b9
avahi-0.7-27.el8.x86_64.rpm
86380ee0d93e20ecc84f449605412f9285f1133e8806cb935a40b40e064f28ae
avahi-autoipd-0.7-27.el8.x86_64.rpm
66b19f8c25baaa7115ce7cbbd99dda714ec17f88f5b3c6bd4f209fb9cee84937
avahi-glib-0.7-27.el8.i686.rpm
becbe327e146008031d1c4f97faad49fc5f19fa6956fc61bb38a95c5844bef1e
avahi-glib-0.7-27.el8.x86_64.rpm
cec2bf18b824521afc4dcabf315f457e09d326b76c2dc74ca8e0358419666fea
avahi-gobject-0.7-27.el8.i686.rpm
f8876f81489a077038b6cf9c0ac887c6715097137c539dd214a0a1dbcb5689a4
avahi-gobject-0.7-27.el8.x86_64.rpm
5e20ad80353555298fc5a3e6e2e783f44284bac6f55f6342561cc2120a967152
avahi-libs-0.7-27.el8.i686.rpm
5dc53f3da4ed0af830b22d3ec58e05ea7a7672f41f1cbf6d82dc59e181ba5907
avahi-libs-0.7-27.el8.x86_64.rpm
cc891b32a2d955dabade372d294ca4e41f5cf075ff32fde0d7720a413de6d07a
python3-avahi-0.7-27.el8.x86_64.rpm
7353bddff8fd908a396505622d6f1b5084805597387d15f0e11f6bafae419e2b
RLBA-2024:3182
smartmontools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smartmontools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
smartmontools-7.1-3.el8.x86_64.rpm
7885727656e745420bdb87b569978ea99ba025def417b1598152b84abbcbbfb4
RLBA-2024:3180
dracut bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dracut.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
dracut-049-233.git20240115.el8.x86_64.rpm
8d62ebbfedde9e790f73c2a5fb1c7f94afdebe83f4b0c19fd2e72a285b2d52de
dracut-caps-049-233.git20240115.el8.x86_64.rpm
8b47766711f7b0c1291a3f3ac52d52179a849ddd899937a6efb2449d3d35a588
dracut-config-generic-049-233.git20240115.el8.x86_64.rpm
5450cdf4149cd959ed92252e4edccb188149ee06067f6bae2abfb194823b97c0
dracut-config-rescue-049-233.git20240115.el8.x86_64.rpm
729aecd3990f0a5659fe497d82f3e3b834c3041078217dd1fa163bb401bf6abd
dracut-live-049-233.git20240115.el8.x86_64.rpm
1101c60660ba1b9287b94dffa27dbd05c207d9cebacaa73cdcb0e679c71a9e00
dracut-network-049-233.git20240115.el8.x86_64.rpm
258d3af5fc6a90a9f43d8efaf3ff9aeafb2220fcd9334271bc62964c412bab24
dracut-squash-049-233.git20240115.el8.x86_64.rpm
94c217da0075819d60dfb2d70f3fe48f0d810c81f985f3414946be475ec5b688
dracut-tools-049-233.git20240115.el8.x86_64.rpm
8d579b132cd47814b9e3e03b2bc541d10e7bf17d80841bc01e1af705e96a83eb
RLBA-2024:3181
tpm2-tss bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tpm2-tss.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
tpm2-tss-2.3.2-6.el8.i686.rpm
4eac4d676144d647df2a7666388ee882cb48293263989ed383cd8f99673e2038
tpm2-tss-2.3.2-6.el8.x86_64.rpm
b1e62af9f2b0b18cbf06a5e6f6e874700b293bbcc8596d6970a9c00d2df2df0e
tpm2-tss-devel-2.3.2-6.el8.i686.rpm
bf46a5fb6d18461a7e36f877065c77d6630d6573cb7f511cabde9a1ea32e0c4c
tpm2-tss-devel-2.3.2-6.el8.x86_64.rpm
9a575b1bddd6ce89b3ddfb2f2f6c05c1ef430970b73d82580d87a9bee526b4ae
RLBA-2024:3186
libldb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
ldb-tools-2.8.0-0.el8.x86_64.rpm
0e83dd304e9de8868fc2bbe1d73e59a4ae7d0933e2232ee1b1a15c409bf803b2
libldb-2.8.0-0.el8.i686.rpm
0f4539da004cbf5ffa8228460bc58dcae7e357368f92683f9316a7dbf428c1a1
libldb-2.8.0-0.el8.x86_64.rpm
a43740feaacb50156412dcf9deac677fdc72e785998b0abe8d5de9ec9d94494c
libldb-devel-2.8.0-0.el8.i686.rpm
534c61018b492fde14454f2264c47ee46766fef2e2bbc62b6361e6c8e9bb3e7d
libldb-devel-2.8.0-0.el8.x86_64.rpm
5215e65b5dcc917f77a5ea56a46ee4c4b4ae1ce4160a996367be0ff0e53292ce
python3-ldb-2.8.0-0.el8.i686.rpm
49c28ab233d1e75616f61c81003301ccfb9298196f14585a5e30797599abd6e0
python3-ldb-2.8.0-0.el8.x86_64.rpm
fabd47906c0dc2bbbdbae77fa57916eaf2090e9ba335272728205658fcc53ee7
RLSA-2024:3184
Moderate: grub2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048)
* grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692)
* grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
grub2-common-2.02-156.el8.rocky.0.1.noarch.rpm
8672438a84f9c0ea80fa80d375557bd1965460bfc0e24f4ab27705f85b4f467c
grub2-common-2.02-156.el8.rocky.0.1.noarch.rpm
8672438a84f9c0ea80fa80d375557bd1965460bfc0e24f4ab27705f85b4f467c
grub2-efi-aa64-modules-2.02-156.el8.rocky.0.1.noarch.rpm
21a7a7b661d4f5176b5ddb73a171660a0b90f741ba19e5a986864b5d697623b0
grub2-efi-aa64-modules-2.02-156.el8.rocky.0.1.noarch.rpm
21a7a7b661d4f5176b5ddb73a171660a0b90f741ba19e5a986864b5d697623b0
grub2-efi-ia32-2.02-156.el8.rocky.0.1.x86_64.rpm
1b2e15ba1c12783aafec60e0d114d4c0a88f1ce9f0732797bf57cc612e6799e0
grub2-efi-ia32-cdboot-2.02-156.el8.rocky.0.1.x86_64.rpm
bcb13327e41ff23e3b2be6db0de2e265a40e1c2b8f3ec85a71d53d1913363893
grub2-efi-ia32-modules-2.02-156.el8.rocky.0.1.noarch.rpm
6a055a026ac4cf272378b45157641031445cc6c7008eb177a1e9bf1e4e188003
grub2-efi-ia32-modules-2.02-156.el8.rocky.0.1.noarch.rpm
6a055a026ac4cf272378b45157641031445cc6c7008eb177a1e9bf1e4e188003
grub2-efi-x64-2.02-156.el8.rocky.0.1.x86_64.rpm
285f67755d57f5cb4c1ac136ab3bc7574f73dd988cd9f47ff970a08435caa599
grub2-efi-x64-cdboot-2.02-156.el8.rocky.0.1.x86_64.rpm
254e87a15a5bc68421590213ea69b8b609befaea10ae77abd91b0dea06a48127
grub2-efi-x64-modules-2.02-156.el8.rocky.0.1.noarch.rpm
27b17a886367eed378864d93b9e159725162596131c95d588196e86ad37e301d
grub2-efi-x64-modules-2.02-156.el8.rocky.0.1.noarch.rpm
27b17a886367eed378864d93b9e159725162596131c95d588196e86ad37e301d
grub2-pc-2.02-156.el8.rocky.0.1.x86_64.rpm
a0b58780d04d9b7bbc7575b0206aa1afa6a8d771d4f2d616cf725aa7a06c0ee8
grub2-pc-modules-2.02-156.el8.rocky.0.1.noarch.rpm
c376d6bd24f24eb4869a4305c6ab2ef98a59f352996d45357cac4b2a1b7e2781
grub2-pc-modules-2.02-156.el8.rocky.0.1.noarch.rpm
c376d6bd24f24eb4869a4305c6ab2ef98a59f352996d45357cac4b2a1b7e2781
grub2-tools-2.02-156.el8.rocky.0.1.x86_64.rpm
638cee01d00640e8238ed9f9f62caf14a05b2483d3a4af8c11d01dfe25b14dd4
grub2-tools-efi-2.02-156.el8.rocky.0.1.x86_64.rpm
dcf9b82ddef8fdf1b8ba337deb85cc5ec9445519be959b973d5d5f951e1f5145
grub2-tools-extra-2.02-156.el8.rocky.0.1.x86_64.rpm
586444677a7bb8e51d1e524d19b67d6a698469fdb314019dfa8f4fc188d31ced
grub2-tools-minimal-2.02-156.el8.rocky.0.1.x86_64.rpm
21d31f89766504976089a4dd05f29cf60a2dc4c8b20c230a8dbdb090d12f2d0e
RLBA-2024:3187
libtevent bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtevent.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
libtevent-0.16.0-0.el8.i686.rpm
704f655304b4475ecf626bf31e704229e2d170afd346414f5d6c7a833dc11901
libtevent-0.16.0-0.el8.x86_64.rpm
da7ad69c30733423d56a7e62cb6f120cdfae0ffafddc3b1d7afcaa1c2de81480
libtevent-devel-0.16.0-0.el8.i686.rpm
52493e7301b2d84ba9d056e56de751a0d4cd35fdec7fa2350684d52beba6bccb
libtevent-devel-0.16.0-0.el8.x86_64.rpm
59add89dcf3f92e285e526e2489e6b42ccd23e01df88108ef00d75819d09f969
python3-tevent-0.16.0-0.el8.x86_64.rpm
930aecaee8c07c8e2f84f9bd692c5d7fd6171f335a3e4fe0caf74fef23fa0dd3
RLBA-2024:3190
trousers bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for trousers.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
trousers-0.3.15-2.el8.x86_64.rpm
5b2013e3caed8ec7d711d20171328599927401c5e2ed02b030071d786aa889db
trousers-lib-0.3.15-2.el8.i686.rpm
63727a6be42d16e05a64ae584aefcabaaeba01ae8f53cc32547eca8e46becfa4
trousers-lib-0.3.15-2.el8.x86_64.rpm
32da7eb0aaa584cab9637509b9b1bb5b8ef23654968c578db90eb966008dd565
RLBA-2024:3197
librepo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librepo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
librepo-1.14.2-5.el8.i686.rpm
2fba92ab9a41fbaa46766f8e09729b787fba3692dafcaea4dc50e95caa34b0bc
librepo-1.14.2-5.el8.x86_64.rpm
f881cdfd57a260828d4e4aa1119b87de01ba14b3305759b171008a6189bd3094
python3-librepo-1.14.2-5.el8.x86_64.rpm
6302524b08407755ab7b7eb9d83b6d2661b086732cf4a501b97c3c8df40e5b3f
RLBA-2024:3195
subscription-manager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for subscription-manager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
dnf-plugin-subscription-manager-1.28.42-1.el8.rocky.0.2.x86_64.rpm
c2ca2e3445b4921c1a565aefc049dbb28bdb05082f858793e42d969c74830862
python3-cloud-what-1.28.42-1.el8.rocky.0.2.x86_64.rpm
d34b407e6ef82436392704a4ed21755eafa8671f658521c3840e930ff4ab156a
python3-subscription-manager-rhsm-1.28.42-1.el8.rocky.0.2.x86_64.rpm
274a221a3c89a4d35ab97efaac8438e79cae0e19ab54796e2bad764f83cccf42
python3-syspurpose-1.28.42-1.el8.rocky.0.2.x86_64.rpm
b7c34bdf0c51b04a7881d335991dd3f6fcdfc99a05543591efe0ac19719b61b3
rhsm-icons-1.28.42-1.el8.rocky.0.2.noarch.rpm
d65e834f65e012f7d86c832024ad0aed7f47cf0d1fa8f17cfdf08d33c986b76d
rhsm-icons-1.28.42-1.el8.rocky.0.2.noarch.rpm
d65e834f65e012f7d86c832024ad0aed7f47cf0d1fa8f17cfdf08d33c986b76d
subscription-manager-1.28.42-1.el8.rocky.0.2.x86_64.rpm
c011e97749c24bf9862768f89c2af31db3c5fa30c5394a36a88eade61744b63a
subscription-manager-cockpit-1.28.42-1.el8.rocky.0.2.noarch.rpm
65db90606dffb188dec079966e58bd4d21a51a41852008b594d0f79b84e0a4a2
subscription-manager-cockpit-1.28.42-1.el8.rocky.0.2.noarch.rpm
65db90606dffb188dec079966e58bd4d21a51a41852008b594d0f79b84e0a4a2
subscription-manager-plugin-ostree-1.28.42-1.el8.rocky.0.2.x86_64.rpm
9c9aa52defddef00ed802d4365c98bfd51b0cf40b9e6312cdaa31058fcab3326
RLBA-2024:3196
alsa-sof-firmware bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for alsa-sof-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
alsa-sof-firmware-2023.09.2-1.el8.noarch.rpm
0434bca02fec77f340b26be7279df7d88f1d33ae4a236e4cecb1df5210f2511b
alsa-sof-firmware-debug-2023.09.2-1.el8.noarch.rpm
52838109eb8dae18f5d10ab3bc623311bd41c533599734d7146e6840a7dd259b
RLBA-2024:3198
shared-mime-info bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shared-mime-info.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
shared-mime-info-1.9-4.el8.x86_64.rpm
3d6018477c7c8089f49b2276821c43659470f67b569c670d2f2d30ca5e308ac5
RLBA-2024:3200
smc-tools bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for smc-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
smc-tools-1.8.3-1.el8.i686.rpm
acd4025c8b58e47078dac7d636a6114ffa77698c8838ee0086b6b18950d68b20
smc-tools-1.8.3-1.el8.x86_64.rpm
998f30d545fc7c0035ac0eb8a7cde1f57ef195a066b70259b5dead59d02859b3
RLBA-2024:3199
opencryptoki bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for opencryptoki.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
opencryptoki-3.22.0-3.el8.x86_64.rpm
4e54a2719a230304786c654935f1989621d0afaf4b1dde67ed82094eff274f58
opencryptoki-icsftok-3.22.0-3.el8.x86_64.rpm
12505a8c21081c544dc643cdeee426c58580088f9a747891159354eb6a49e7b4
opencryptoki-libs-3.22.0-3.el8.i686.rpm
fc5aa15cf239664942e4a6c8c893d1af0af741326675d1ee6149e641a6785fd3
opencryptoki-libs-3.22.0-3.el8.x86_64.rpm
f1b28805c63b5987bd615d59df47609a4703bec8e8ce0ee862819119621001c9
opencryptoki-swtok-3.22.0-3.el8.x86_64.rpm
3e2f4f8b4c630b373bc34319108b340981ea93a1425a2a5b8377c1ba19f1b226
opencryptoki-tpmtok-3.22.0-3.el8.x86_64.rpm
5befadd48289b06ac7dab72f7edf2a169f37825989eb333930abfaa25cab9036
RLBA-2024:3201
numatop bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for numatop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
numatop-2.4-1.el8.x86_64.rpm
2b8c93f2946670f62c21031a6107ee6084d18906269a70408b6c78fe07e6da98
RLBA-2024:3205
iotop bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iotop.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
iotop-0.6-18.el8.noarch.rpm
6b9def672669de10601625eefd3fb0277e1f327e33a12a85bd06881129081010
iotop-0.6-18.el8.noarch.rpm
6b9def672669de10601625eefd3fb0277e1f327e33a12a85bd06881129081010
RLBA-2024:3206
perl-HTTP-Tiny bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perl-HTTP-Tiny.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
perl-HTTP-Tiny-0.074-3.el8.noarch.rpm
ce9e9ec3f33a863a4821fb6fdc872c1cef1f1fae0b63ded1bee3ea25bdd25e7f
perl-HTTP-Tiny-0.074-3.el8.noarch.rpm
ce9e9ec3f33a863a4821fb6fdc872c1cef1f1fae0b63ded1bee3ea25bdd25e7f
RLSA-2024:3211
Moderate: traceroute security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for traceroute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host.
Security Fix(es):
* traceroute: improper command line parsing (CVE-2023-46316)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
traceroute-2.1.0-8.el8.x86_64.rpm
d12d2e374bf70524db0c077b8a8fced43cd16fb68f7af569a11f2a352a90f460
RLEA-2024:3209
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
tzdata-2024a-1.el8.noarch.rpm
cce3fd2ca0fc64023c22f9a242d92bbfe3685429daa64b0ce7956de025dde066
tzdata-2024a-1.el8.noarch.rpm
cce3fd2ca0fc64023c22f9a242d92bbfe3685429daa64b0ce7956de025dde066
RLBA-2024:3216
net-snmp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for net-snmp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
net-snmp-libs-5.8-30.el8.i686.rpm
4ed73a182ecc47f6dfbdff4852b9a067f07bf5c1f537410fbfbb3ff4812ba544
net-snmp-libs-5.8-30.el8.x86_64.rpm
679cc421ef98607407549bd74f7a9fe1ff598b46cc23719b3cecbf2ebed2022c
RLBA-2024:3220
python-pip bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for python-pip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
platform-python-pip-9.0.3-24.el8.rocky.0.noarch.rpm
48027ea5f805c0edb218fe0f241d2b0c34e9f1be8e828997516766dbfe7f96e6
platform-python-pip-9.0.3-24.el8.rocky.0.noarch.rpm
48027ea5f805c0edb218fe0f241d2b0c34e9f1be8e828997516766dbfe7f96e6
python3-pip-wheel-9.0.3-24.el8.rocky.0.noarch.rpm
ccc41a042fbfc423e7cac48dbf161f94d6da6196e1770d2e6bb00232bdfef2c0
python3-pip-wheel-9.0.3-24.el8.rocky.0.noarch.rpm
ccc41a042fbfc423e7cac48dbf161f94d6da6196e1770d2e6bb00232bdfef2c0
RLBA-2024:3225
sgpio bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sgpio.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
sgpio-1.2.0.10-23.el8.x86_64.rpm
368ce9cf01848509694dbfff771b04f2ebe60b0bd22101c2965497a346b2655c
RLBA-2024:3223
fuse bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for fuse.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
fuse-2.9.7-19.el8.x86_64.rpm
57de797128217bc9094edd4305428ce2ef7323e1fffac4bd0b8382481c8b5aca
fuse3-3.3.0-19.el8.x86_64.rpm
b0d579580a44bcce22ba6b613d4e152f3c0589e6a5eb600b8e1da6458433fffc
fuse3-devel-3.3.0-19.el8.i686.rpm
939d4c15acfd7479d63eebe84fee028334fe9c93b72bea14f2b659f5680dc8f5
fuse3-devel-3.3.0-19.el8.x86_64.rpm
803b51c723b4f72389089bc517ce2a0b9f627feadf86c36c6851b995ba72f626
fuse3-libs-3.3.0-19.el8.i686.rpm
bf70f8cb0f1ef82784b7fc1c8a4a9ffc809639c04e80fd61de64e4bd2e1933bb
fuse3-libs-3.3.0-19.el8.x86_64.rpm
e3d7a931410bdd4a0c1339332e30a06699da1d2f2daf56145e70b229492d4c81
fuse-common-3.3.0-19.el8.x86_64.rpm
2a3bcd2392254f550f19059dac945e67e18ba8705f2d0f2057609142fefd48b2
fuse-devel-2.9.7-19.el8.i686.rpm
ec47e2ceb6502eb51e5ff802279eb51e917ba0a9ca2b7631700cd8e51c39d584
fuse-devel-2.9.7-19.el8.x86_64.rpm
5e1ca22a2aeb6de60daa91eb68af1da88ea4fb753f9b0f02a199bbcb24bfa4b4
fuse-libs-2.9.7-19.el8.i686.rpm
36f022da2a7f35b277660940ad60877ddecec3730d95046e84b582d06641014e
fuse-libs-2.9.7-19.el8.x86_64.rpm
bdea8cce8155d059af4b5f88ac89f21e61bd1dee1ea1c4849524a96f08e8731f
RLBA-2024:3221
tuned bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
tuned-2.22.1-4.el8_10.noarch.rpm
98d42bb16c8dd7ebc21b8b2619c6de04db2ef88b8308c6cbc61d5be4138e7785
tuned-2.22.1-4.el8_10.noarch.rpm
98d42bb16c8dd7ebc21b8b2619c6de04db2ef88b8308c6cbc61d5be4138e7785
tuned-profiles-atomic-2.22.1-4.el8_10.noarch.rpm
ce9584475dd7a313f00d838b5f680bf9107b4315336d87af55f2760091a5430b
tuned-profiles-atomic-2.22.1-4.el8_10.noarch.rpm
ce9584475dd7a313f00d838b5f680bf9107b4315336d87af55f2760091a5430b
tuned-profiles-compat-2.22.1-4.el8_10.noarch.rpm
b0f063d48939f443ec742495e02a9b975fd37fa20245f2c2ee19441b9935508c
tuned-profiles-compat-2.22.1-4.el8_10.noarch.rpm
b0f063d48939f443ec742495e02a9b975fd37fa20245f2c2ee19441b9935508c
tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.noarch.rpm
549ab06fd76f805bdcc0f610f089c47e04db2413433309be863bd25da4ffeafd
tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.noarch.rpm
549ab06fd76f805bdcc0f610f089c47e04db2413433309be863bd25da4ffeafd
tuned-profiles-mssql-2.22.1-4.el8_10.noarch.rpm
6a4de3754851d2f7503d683655933e59b541b97c01ac98de306c7959477137dc
tuned-profiles-mssql-2.22.1-4.el8_10.noarch.rpm
6a4de3754851d2f7503d683655933e59b541b97c01ac98de306c7959477137dc
tuned-profiles-oracle-2.22.1-4.el8_10.noarch.rpm
534208b9e8f20cff79150b8a9895af71b1c3414847d02970062037baf3235459
tuned-profiles-oracle-2.22.1-4.el8_10.noarch.rpm
534208b9e8f20cff79150b8a9895af71b1c3414847d02970062037baf3235459
RLEA-2024:3227
intel-cmt-cat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for intel-cmt-cat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
intel-cmt-cat-23.11-1.el8.i686.rpm
f6d47404a7270233a5dd6d028b889d33df1c35752524f4ee8bd57eeaa5557486
intel-cmt-cat-23.11-1.el8.x86_64.rpm
bc736cc1a92f75e4c32601a4462e1d891459c7b3791a01ba597977b60b895a85
RLBA-2024:3231
realmd bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for realmd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
realmd-0.17.1-2.el8.x86_64.rpm
46ca49cd546df2738a84ea6f1437644b60ef2e4ac9f772c0071a7e4ce3fca073
RLBA-2024:3230
file bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for file.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
file-5.33-26.el8.x86_64.rpm
1391537ab59f4423693611d9afb72a18a8d5574c8b09900dc0c1d8aaa6d6983d
file-libs-5.33-26.el8.i686.rpm
ae5b1b9ce91200efbe2148cb5df058f6476ef18516dc042f768b6f8421e30f0d
file-libs-5.33-26.el8.x86_64.rpm
27178435ffb2835e5a2ed27c89db8ca176d9495c38e1ab1bb46b8f06c6b2f480
python3-magic-5.33-26.el8.noarch.rpm
83c0b04c8f15ca79012c86a0915dcf0fc5026dc22bebe3de26806cf614fdfbe0
python3-magic-5.33-26.el8.noarch.rpm
83c0b04c8f15ca79012c86a0915dcf0fc5026dc22bebe3de26806cf614fdfbe0
RLBA-2024:3237
bash bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for bash.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
bash-4.4.20-5.el8.x86_64.rpm
572aa2bfce0cc39f9ddbb695f17edf5bb5c766a8e2a4c72591694de467dbfe49
bash-doc-4.4.20-5.el8.x86_64.rpm
4f2b4838dcd441a61bce489da3b481a5209e01e1b78afb6455d0ae80f57dd97b
RLBA-2024:3236
expat bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
expat-2.2.5-13.el8_10.i686.rpm
8402180efdffa93ddd36dc29c5ac80cf4aecee5720416b6fcc9eff28dcae2e21
expat-2.2.5-13.el8_10.x86_64.rpm
c97b00315444ad9c8f95de3485e98f324848edc2ec470e2a42689512ebc9300c
expat-devel-2.2.5-13.el8_10.i686.rpm
2cad206ee8a833981a147ed155bef77d2a65633b8873d6130e017a34c8ddcc93
expat-devel-2.2.5-13.el8_10.x86_64.rpm
211e33bcc5e3fe3e2e5d4191e83047784ff7f87f825938424109a476d6c80a4b
RLSA-2024:3233
Low: libssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004)
* libssh: Missing checks for return values for digests (CVE-2023-6918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
libssh-0.9.6-14.el8.i686.rpm
a16fb728005574f7a3467454ce1f397451e06af70ed9e90a7edb7bd06f4487a0
libssh-0.9.6-14.el8.x86_64.rpm
7a5e3ecd7deaec39a87dcdc6728e29aff4d690c4400c24848da23e1bf262f02b
libssh-config-0.9.6-14.el8.noarch.rpm
802ffb16ca31193afc400d9f057f8bcb04224a85a3452fd878cb4a088823dfe5
libssh-config-0.9.6-14.el8.noarch.rpm
802ffb16ca31193afc400d9f057f8bcb04224a85a3452fd878cb4a088823dfe5
RLBA-2024:3232
freeipmi bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for freeipmi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
freeipmi-1.6.14-2.el8.i686.rpm
08f611a8383bb500a94a5c6baa863cb1f5b08185d0d6d5ab6e28ffdfc28ed7fc
freeipmi-1.6.14-2.el8.x86_64.rpm
4454067a327a516ad5ec421d4276c6b26b669cf1b34492ce14ff790d2455ed2d
freeipmi-bmc-watchdog-1.6.14-2.el8.x86_64.rpm
b817f9dc081f08db237f2747ecc04a928ddb164cbf29ef044a79d1bba758750d
freeipmi-ipmidetectd-1.6.14-2.el8.x86_64.rpm
c9abe01d444c666c88d44b249ce056c31b76aa71b3aa37c7513833bf2f66a92b
freeipmi-ipmiseld-1.6.14-2.el8.x86_64.rpm
fbcdd7446af52160bb0f8a0b4812ebd7e13aaf9bbfb216aab53e7063658c8f54
RLEA-2024:3235
iproute bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for iproute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
iproute-6.2.0-6.el8_10.x86_64.rpm
f41e8aa9042f3db1d45a98cdd7317f770aaf6f3a734cba6a4f439094b31550b7
iproute-tc-6.2.0-6.el8_10.x86_64.rpm
14f36fe3ae67abf016936643c0d21e89a125f0a2fe083f60f9593b6421c428a7
RLSA-2024:3268
Low: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458)
* krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
krb5-devel-1.18.2-27.el8_10.i686.rpm
284af07d763bd82aa721440cbaee63608cfc15eb28e50b7dae5cb30cd6dbc4e5
krb5-devel-1.18.2-27.el8_10.x86_64.rpm
1239c701de29f5199962fd28759a84edbfdffed48187b2edc701e392d9f9317f
krb5-libs-1.18.2-27.el8_10.i686.rpm
acc0c0b0f291577e569a85518e270a2bea9a2a1241e9602689a62188ab99f848
krb5-libs-1.18.2-27.el8_10.x86_64.rpm
ddf88e97fb20aa3df6585c929637a8e2300fdf3c53a9789c484e2b53bfbeb1dd
krb5-pkinit-1.18.2-27.el8_10.i686.rpm
f37af5ac088cb3f2c68cf074e300cbbbf9f900c4eaaf7b7a31d541861a8fa0e6
krb5-pkinit-1.18.2-27.el8_10.x86_64.rpm
33becdaca5a49807681e04c8ad1017e4040367ff6e608b79b89ce48dfa78acc7
krb5-server-1.18.2-27.el8_10.i686.rpm
3f8f1d8abd2cc9096bb3b97adfab7e9b735a8f6a11dac602091f43b2fe881a19
krb5-server-1.18.2-27.el8_10.x86_64.rpm
5c557272e00b0f649775219233b99f6e5743dac738b1506d04692f6f3e0dee74
krb5-server-ldap-1.18.2-27.el8_10.i686.rpm
20699fd1a59d186402f8f0dcd00cbcd8bb773e93d26d3728d745dc77950e88da
krb5-server-ldap-1.18.2-27.el8_10.x86_64.rpm
0e9b4cc361baaad86cdb982a60545e4f6df1dfe1ffef5c83500b10fa1a3b5f71
krb5-workstation-1.18.2-27.el8_10.x86_64.rpm
6314d2e8f927049ef10775e37a7cf2221bb0931c0c0e67e023d7bc1adc346935
libkadm5-1.18.2-27.el8_10.i686.rpm
8a481c642bf6bfb23b1f0530d139850b0cba1d8ecb5c83eca0bbb5111c393352
libkadm5-1.18.2-27.el8_10.x86_64.rpm
1ca34d92e288eb08f7435c5782c50e1682346759299c1472ca22c8bffe834f5b
RLSA-2024:3270
Moderate: sssd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libipa_hbac-2.9.4-3.el8_10.i686.rpm
bee37b2b4831d7000c27af2af9bed972f6a82f0d3fea136783429b655d16ab4e
libipa_hbac-2.9.4-3.el8_10.x86_64.rpm
fa30bdada92eb662984a77fac2b25c08435523da160b059280c735f9572085fa
libsss_autofs-2.9.4-3.el8_10.x86_64.rpm
7f7720daea270e162cfd68e82f12020ab6c8758e741d33863e022ad90afec109
libsss_certmap-2.9.4-3.el8_10.i686.rpm
49ec5e95c7e9c8833957f861ce578baa5291c27c9c30bffc50f9e1a0a60d7319
libsss_certmap-2.9.4-3.el8_10.x86_64.rpm
92a35f896709e628f476e8d68b961528e168bd7e441bf1b96f716261616f7f9f
libsss_idmap-2.9.4-3.el8_10.i686.rpm
d5856e6c79de390deb1bd5b428e4b92550b716104f8ed6f88d78f7fbe83ec89e
libsss_idmap-2.9.4-3.el8_10.x86_64.rpm
62821d16042a67f2930a11085bab80380bcd147b73bc3efa96dc84d112691048
libsss_nss_idmap-2.9.4-3.el8_10.i686.rpm
f0af80a798e3b913762ffd38de2af016f7aac9ee874ca2222c075894cfc86306
libsss_nss_idmap-2.9.4-3.el8_10.x86_64.rpm
8d1e90a2f14765e6a88c69c5db7e6abcbeff8da62b164f12d36410173780f434
libsss_simpleifp-2.9.4-3.el8_10.i686.rpm
f8bd0326d9085a67f38f8d38881a32b1d08fdc38db32848e0420c6f7f35f7405
libsss_simpleifp-2.9.4-3.el8_10.x86_64.rpm
db0c4b8027976edf1ccb8540540cb3ec2344e6ff4c7c0c499d951ac21b4e9aaa
libsss_sudo-2.9.4-3.el8_10.x86_64.rpm
5be624b3fedd8b76d2e72f8337c062dc6145dda214f60b3bdeef30a3ada73da5
python3-libipa_hbac-2.9.4-3.el8_10.x86_64.rpm
c4dfefa67d31b8609ec921f2212b87136a1a3d8f810af73440ad0e9909182625
python3-libsss_nss_idmap-2.9.4-3.el8_10.x86_64.rpm
77b080c1f4219e3a1821d057380839b421c0a848c2a41568202e295f3fe90603
python3-sss-2.9.4-3.el8_10.x86_64.rpm
f5b5886a2e64e82d20e7aa2e566d6205be366c5b5b93f29a385ff965bcf26424
python3-sssdconfig-2.9.4-3.el8_10.noarch.rpm
f298ff9bf27268b86d01be28afeafd0ebc50b830ea4f338f8c222950c7feae15
python3-sssdconfig-2.9.4-3.el8_10.noarch.rpm
f298ff9bf27268b86d01be28afeafd0ebc50b830ea4f338f8c222950c7feae15
python3-sss-murmur-2.9.4-3.el8_10.x86_64.rpm
8eed0e2f48a16fb3da1f79a10f8fdc3d79f4b77f1cb918980f5e04e7274af88f
sssd-2.9.4-3.el8_10.x86_64.rpm
c398ea23cfce0275fdc9e773f2e4999cfd2425ad5752197b5209274cb98bb2fc
sssd-ad-2.9.4-3.el8_10.x86_64.rpm
db4dc747049e824dce2a2bc4db9c8d765ffda107ad82484f6d94ca2a3e36556b
sssd-client-2.9.4-3.el8_10.i686.rpm
425dc4522e9da9dfd3a2fc79834f53f0ec0270a7d5f6dbffeb4b7627f31f787b
sssd-client-2.9.4-3.el8_10.x86_64.rpm
32a033e4e941ef4dd9deaaf1269a489993a3b061714fa3f8d9bb69da6c30c8e7
sssd-common-2.9.4-3.el8_10.x86_64.rpm
5b00446afb108093a7f6d33bd7a427f2b25806ec98bc92953e58faff6d4c39dc
sssd-common-pac-2.9.4-3.el8_10.x86_64.rpm
baec6bd8f9847ce5a3c0e978e3cd4ee3408df6b1b4abcc26de98ad9487c38d08
sssd-dbus-2.9.4-3.el8_10.x86_64.rpm
c57f75dfe9d5c11449ffd71cc42cce0123923b9b2f29966861163fb191aa8231
sssd-ipa-2.9.4-3.el8_10.x86_64.rpm
f7c92d95b0576ff2d72ae6c2145c210fbff60e8f49290154fdc5f06a4079a99c
sssd-kcm-2.9.4-3.el8_10.x86_64.rpm
489988c74b69564cf568924e2a70a7ce191f529872e76235b048f03e36ca8aa8
sssd-krb5-2.9.4-3.el8_10.x86_64.rpm
78c3d161b79cfa3fea66d874b66d7a607a4ea0a74945e738ecd74128487ab140
sssd-krb5-common-2.9.4-3.el8_10.x86_64.rpm
e977b775085913a671dd7c9ca6e8cc8009bcc656e2a10ac2a3364e46a876585c
sssd-ldap-2.9.4-3.el8_10.x86_64.rpm
2df6b99f746c5668cc5d31e7dbe87acc15e3c6f4bc5f352484dcf3697261d4ba
sssd-nfs-idmap-2.9.4-3.el8_10.x86_64.rpm
301c7ac8698f140b363afd0d34d9ef07f39ba58ab89650bea0d2c6071d290b6f
sssd-polkit-rules-2.9.4-3.el8_10.x86_64.rpm
cbe769d77925a9be210ccc58be3e251eff3f109844fb692c2456793194bcfc99
sssd-proxy-2.9.4-3.el8_10.x86_64.rpm
d1149c5f80a226319c782041317e772c880578c0a81e38214f1c774c76d60f83
sssd-tools-2.9.4-3.el8_10.x86_64.rpm
b43db3ea5e47d033ff76ce4ce286b0f5968e020323c08726aac5f1942166fcf4
sssd-winbind-idmap-2.9.4-3.el8_10.x86_64.rpm
be9f207bc3d487042e05431c7746ef040c5670ba03374ffd4dfbdd4f953bcb52
RLSA-2024:3271
Important: bind and dhcp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for dhcp, bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
* bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
* bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
Bug Fix:
* dhcp rebuilt after API change of bind-export-libs
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bind-export-devel-9.11.36-14.el8_10.i686.rpm
e3a6579655f114fb1110b8f684f8fa109da0bba5964e8510df7c362f4fbafddf
bind-export-devel-9.11.36-14.el8_10.x86_64.rpm
4d50c99ea9bfc1f02fb0a58e0041547c5a0f14569c17e92842cad1f2a4444508
bind-export-libs-9.11.36-14.el8_10.i686.rpm
c22a78057da9b831ea44f022927c92cd75ab4871b7895c15cd6c8937051ebc04
bind-export-libs-9.11.36-14.el8_10.x86_64.rpm
d1a3cac5a8608be38a84fa8247a9d773ec0e8c8f9336255a8d370cbe0c777fb4
dhcp-client-4.3.6-50.el8_10.x86_64.rpm
4dd3a73a37194f7c98114316746ee293e97cb67343812c6027933bac7b95af50
dhcp-common-4.3.6-50.el8_10.noarch.rpm
8c253b3afeaff236bdb93edc0a90444a1c27ad8c2bf70b950edacc1a0fdd2ed2
dhcp-common-4.3.6-50.el8_10.noarch.rpm
8c253b3afeaff236bdb93edc0a90444a1c27ad8c2bf70b950edacc1a0fdd2ed2
dhcp-libs-4.3.6-50.el8_10.i686.rpm
391288bf999953286e10ec44c0dde4df6263367919de73e28369661c67f4a9cd
dhcp-libs-4.3.6-50.el8_10.x86_64.rpm
921a9549260868d455383141f654bf8c8004c38cf55c11c3977d1284f14c6128
dhcp-relay-4.3.6-50.el8_10.x86_64.rpm
22902c3ab149dcab32a0116f5b53d811decfe7e4a78092078f26e25c78c4c536
dhcp-server-4.3.6-50.el8_10.x86_64.rpm
6c4e704ad59a50bda662125ca4cc2aa634c2204edf17b28823646826953f1fb0
RLBA-2024:3272
gcc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es):
* Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426)
none-baseos-rpms
libasan-8.5.0-22.el8_10.i686.rpm
1be5ee0b46882cff5d4d10083fe529254faf6fda3537580f1e615f7342670f77
libasan-8.5.0-22.el8_10.x86_64.rpm
2372b311e2c2c7d05b31acf222d31b482f5f03c2d2fbb343c78dd42eb7b3b8b2
libatomic-8.5.0-22.el8_10.i686.rpm
1a907193f3f626efdbd78c554fd43468765d6202861887f5e530a6597d43e1f4
libatomic-8.5.0-22.el8_10.x86_64.rpm
b360b7a09fd21ce658b2a58a6cdb97207b1652cd0fe4b65978522e9a3fbf3aa2
libatomic-static-8.5.0-22.el8_10.i686.rpm
032ce3a0e8f049af2a7a5fce978d0a3451fdfd869740cfd2d1170a00c7417d65
libatomic-static-8.5.0-22.el8_10.x86_64.rpm
9ebfe3c86cf5b42d3ec1ca9909bba725e14e0237a250a1ae9241c7c9e4aefc53
libgcc-8.5.0-22.el8_10.i686.rpm
dd2190667eb124441d47487351faa25c750af769369b78d86153e684fd9753a3
libgcc-8.5.0-22.el8_10.x86_64.rpm
76e67564d1525df82a1cf9b3a586af925e5b2f42a301efbffeeae11603d8653b
libgfortran-8.5.0-22.el8_10.i686.rpm
313b4f7e72ae4d9b1f01824573852a2051c984f3b465f18b863bff6bfc32dc6f
libgfortran-8.5.0-22.el8_10.x86_64.rpm
f51baa831faa755587661163522a901ba1a930ff4b056141e96fbafc64b427ba
libgomp-8.5.0-22.el8_10.i686.rpm
9feed94dff5b0833294372fdc95b6ab95354f9884012ca2b5921e1c2fa473b93
libgomp-8.5.0-22.el8_10.x86_64.rpm
b3e258c82abe4fbd2dc16abd1787b48aedae765db431873841eb1271beff99cb
libgomp-offload-nvptx-8.5.0-22.el8_10.x86_64.rpm
6f1f55e3e67b44480abf4d7af86c9b1a7aaa20604b7ea18bb299edd358f36967
libitm-8.5.0-22.el8_10.i686.rpm
9d2d78de0039b4ddd0629ad6bca5c70eac049bc7157972ac17c5cfc5bcacc4ad
libitm-8.5.0-22.el8_10.x86_64.rpm
8a1899a53e0d7e2c68965ad55f4e10f26477189f69ca95a62531db4f1316d779
liblsan-8.5.0-22.el8_10.x86_64.rpm
589acae8c67bec6bbf3debe7d8bc669c1e572a33d7f45a02d7755d75b0cba796
libquadmath-8.5.0-22.el8_10.i686.rpm
d09d21e30d6fe36dab89c86475974d4deebc7a768944e12a84eb632e3a9139f1
libquadmath-8.5.0-22.el8_10.x86_64.rpm
3e7a03604c72a0f3a1aae5945f1df09b713de2a8468f3b15c5fb176507243f88
libstdc++-8.5.0-22.el8_10.i686.rpm
6c0af0e7ebb486fd1e6c0d36b455bcea0ab76f1fee3feaba5f904f5759531e25
libstdc++-8.5.0-22.el8_10.x86_64.rpm
8c492a58370c114af1cd4fa71f8ba3b833e1e6bc2090dce47aacfac8f39e7a58
libtsan-8.5.0-22.el8_10.x86_64.rpm
2bde02f76dad739bf8d8ef4a176411963500999fc557b2760f22a02a2cdceb23
libubsan-8.5.0-22.el8_10.i686.rpm
f36aa5b0ea9aee344828e1e06ccbeea8d1394895ccb5902fadfcf3e8be23ee86
libubsan-8.5.0-22.el8_10.x86_64.rpm
5bbb3b681a72576cae5cf61bce8aee8b7c2edabd72512367dfc167aa7afd32df
RLBA-2024:3274
sos update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Please update
none-baseos-rpms
sos-4.7.1-2.el8_10.noarch.rpm
abd068e760a11dfa4968b09a736df74a1a67510cb8190dde5dad95474f021197
sos-4.7.1-2.el8_10.noarch.rpm
abd068e760a11dfa4968b09a736df74a1a67510cb8190dde5dad95474f021197
sos-audit-4.7.1-2.el8_10.noarch.rpm
bd4ed92df408c921494faacbcbe20eab0af05319266eeea393440ec623e767d7
sos-audit-4.7.1-2.el8_10.noarch.rpm
bd4ed92df408c921494faacbcbe20eab0af05319266eeea393440ec623e767d7
RLSA-2024:3275
Moderate: python-dns security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-dns.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode.
Security Fix(es):
* dnspython: denial of service in stub resolver (CVE-2023-29483)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-dns-1.15.0-12.el8_10.noarch.rpm
952b915ac9bf76ace65688631e26438c6d7fde8ea327b12aa7aebdf3ca6767b8
python3-dns-1.15.0-12.el8_10.noarch.rpm
952b915ac9bf76ace65688631e26438c6d7fde8ea327b12aa7aebdf3ca6767b8
RLSA-2024:3341
Moderate: gdk-pixbuf2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdk-pixbuf2 packages provide an image loading library that can be extended
by loadable modules for new image formats. It is used by toolkits such as GTK+
or clutter.
Security Fix(es):
* gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gdk-pixbuf2-2.36.12-6.el8_10.i686.rpm
6c7a80bf9f50d085c0754a5c522aae8b2198639330d19cf4695c81402b933712
gdk-pixbuf2-2.36.12-6.el8_10.x86_64.rpm
e7cbc96f901e71e76e6b55ad5fc30c1ce83f7af855d41ad983237acf75c502c5
RLSA-2024:3344
Important: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread
libraries (libpthread), standard math libraries (libm), and the name service
cache daemon (nscd) used by multiple programs on the system. Without these
libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599)
* glibc: null pointer dereferences after failed netgroup cache insertion
(CVE-2024-33600)
* glibc: netgroup cache may terminate daemon on memory allocation failure
(CVE-2024-33601)
* glibc: netgroup cache assumes NSS callback uses in-buffer strings
(CVE-2024-33602)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
none-baseos-rpms
glibc-2.28-251.el8_10.2.i686.rpm
363682c24bd402be461a1ac3028778378c55344da0e63ba53ea0292b0d773ec0
glibc-2.28-251.el8_10.2.x86_64.rpm
5f9dee73acb40bc44f9e30c9798549fe58aa76aed614a844187b5075e4db4304
glibc-all-langpacks-2.28-251.el8_10.2.x86_64.rpm
2b7dfafee58b2672940b0e4ddaaf319f5797a06ed407a8c1f28e8420a065badb
glibc-common-2.28-251.el8_10.2.x86_64.rpm
51acbbeb9f97dbc9afeae0f8fe51f5e41c91ef33441a5a1d31410638c34fa657
glibc-devel-2.28-251.el8_10.2.i686.rpm
5b071eb492ec09cbbafde5a3dcd641574a2e9b5a488c2200164ae15f111fa99a
glibc-devel-2.28-251.el8_10.2.x86_64.rpm
93c3eac9db417548298b90449dc69be3410136d8ccef59ffa996ad690ebd2b16
glibc-doc-2.28-251.el8_10.2.noarch.rpm
8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53
glibc-doc-2.28-251.el8_10.2.noarch.rpm
8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53
glibc-gconv-extra-2.28-251.el8_10.2.i686.rpm
548f8083c8711eb94a8adadc2bfaaf7516114fe1b3d5780f22a4e02e94774182
glibc-gconv-extra-2.28-251.el8_10.2.x86_64.rpm
890e73820ba5355f7d55020f63fe11d3dde628eaf4227dee344f2c3b6e857e5a
glibc-headers-2.28-251.el8_10.2.i686.rpm
880a70001b132cc026f68e4efd7610f0cc924ce1f32f33a039a4ef796a218a56
glibc-headers-2.28-251.el8_10.2.x86_64.rpm
7d6743a8dbbea1181218ef247608124d77dee6cac82031bb7fe3ec4f5e04a28a
glibc-langpack-aa-2.28-251.el8_10.2.x86_64.rpm
678bc555973e19d3ea769af140a21f0a7576458dc02c48a3b64ed72da1dd7e32
glibc-langpack-af-2.28-251.el8_10.2.x86_64.rpm
00c1d27d1a5749eea68a51e0f67602496fa5f3f442b85f6a1a826a6c46f64807
glibc-langpack-agr-2.28-251.el8_10.2.x86_64.rpm
7d575d87e04d8f22de7daf7824efb5d1163d5f0fccaddd10975736df9b76d878
glibc-langpack-ak-2.28-251.el8_10.2.x86_64.rpm
731d5b965205efb67eb1e48b7e76b84202c88874e2cdad1d66f66a8fbc497a2e
glibc-langpack-am-2.28-251.el8_10.2.x86_64.rpm
358d6731c5b4dbd2764782afb3cd7ff56a6854d700e8d6a985c93f6732f73f66
glibc-langpack-an-2.28-251.el8_10.2.x86_64.rpm
69954eb1ffb5fe5db98e053287b3c013ea88948eb7da52c8d11675b849c919cf
glibc-langpack-anp-2.28-251.el8_10.2.x86_64.rpm
7e429c3e27157fa104f7186f9b103117d48dc325cff420f2a7a490eda09f9064
glibc-langpack-ar-2.28-251.el8_10.2.x86_64.rpm
4cdcd6389a4b7a0c102b44787846eba902740f90d1eb93b771045c2f76f36063
glibc-langpack-as-2.28-251.el8_10.2.x86_64.rpm
22dd94c0ad3bba6f082d1519c25af6e81494751e11c9699cdca083bc20a2ad51
glibc-langpack-ast-2.28-251.el8_10.2.x86_64.rpm
792a7394d99296b91ea7f57eca97c2677708022e25be9a7c449e7ed44ab98472
glibc-langpack-ayc-2.28-251.el8_10.2.x86_64.rpm
e5e2695a09b5ddd925caff590df6d514920c30e5ba0b513bc2ee549b0f8910ec
glibc-langpack-az-2.28-251.el8_10.2.x86_64.rpm
c8d7fb8b1c43ed290cdf420627db251fa9aaf10bf737676aadf7d76bb02ca7b0
glibc-langpack-be-2.28-251.el8_10.2.x86_64.rpm
82386a29f77623edb58f17e8e205eab173dd83d0efbdf10dcc724f18a142a46c
glibc-langpack-bem-2.28-251.el8_10.2.x86_64.rpm
03cf8e781a5715aa80dc6d7a124f83267baf70b47066f1a63b50c2792fe147be
glibc-langpack-ber-2.28-251.el8_10.2.x86_64.rpm
073287b7918809d1d3c68f8c973aba66f535c93e5d46ca183399d4f679b7a7df
glibc-langpack-bg-2.28-251.el8_10.2.x86_64.rpm
8635f78096f91103fe6ff0e76791477ae615fda3947b9cdec41d01b418fac802
glibc-langpack-bhb-2.28-251.el8_10.2.x86_64.rpm
2dfde722f24cd75029ffd26bba8223a330224849985ef2ec3318d6629793ad24
glibc-langpack-bho-2.28-251.el8_10.2.x86_64.rpm
d0be0055537fa1ac40d80b887a49323d8319669912589e6f4aa2b2d1f1f80823
glibc-langpack-bi-2.28-251.el8_10.2.x86_64.rpm
d7af1f7358f59daa54cb63c026d155d089af7002bff539e8338428a577910a50
glibc-langpack-bn-2.28-251.el8_10.2.x86_64.rpm
e71c0edab89074f318267dd37591fef8fa8d7d30236db5fc1642b8b591066ff2
glibc-langpack-bo-2.28-251.el8_10.2.x86_64.rpm
0c379783e6d387f8590f339d799288a8fb67b08d9493ae2616ebb3297b1fe8ac
glibc-langpack-br-2.28-251.el8_10.2.x86_64.rpm
31c0c28bd287ebbc4b5d4d1fbb1d302cd9a471161717efc6fc3b01a7664287d9
glibc-langpack-brx-2.28-251.el8_10.2.x86_64.rpm
c568de193c0807af757d835d91a988a89e44b3e04bef73a82073d5934727979e
glibc-langpack-bs-2.28-251.el8_10.2.x86_64.rpm
f543df498a7e63c8f8b55025aaa8b3b3aa0af098eeeb49fa151e899be622f5a0
glibc-langpack-byn-2.28-251.el8_10.2.x86_64.rpm
f8fce0af3e0eb179f7341420495a18749d2443c9e8c11aae500d1e5ed70224f4
glibc-langpack-ca-2.28-251.el8_10.2.x86_64.rpm
745ba708a40f5a93d603a60fb50fc194f4fcd115fb4df2df10b5b6a638293c58
glibc-langpack-ce-2.28-251.el8_10.2.x86_64.rpm
59aad0c3adbaca6433df9e570b0f3bf5206592abb8a2fdf006e4407f952563b6
glibc-langpack-chr-2.28-251.el8_10.2.x86_64.rpm
67201e83a0ade666dc3c35f8de0ac8a8b7cff06820533a7840b62a282f08f7f9
glibc-langpack-cmn-2.28-251.el8_10.2.x86_64.rpm
976dcbb8cb8c547ffa0eaaae09e5f6e126748900d29a46f9e34a4073fb7c19ab
glibc-langpack-crh-2.28-251.el8_10.2.x86_64.rpm
d41a8e229513b1648336206fdfcae7fa14b37aaa35157ddc21f6e2fb56c7e74b
glibc-langpack-cs-2.28-251.el8_10.2.x86_64.rpm
e0ad588a5059b295dc0b0db39289392b8c4b0bf989dc535f63cec515923795d0
glibc-langpack-csb-2.28-251.el8_10.2.x86_64.rpm
079c408e016d0af342385c701fa580640254847378955ae2b64b42eea579adbd
glibc-langpack-cv-2.28-251.el8_10.2.x86_64.rpm
6924b4bf9edfad8bb713820e79b5ae6b7d430fe33fc45970b7d7757e3279c108
glibc-langpack-cy-2.28-251.el8_10.2.x86_64.rpm
7ae8033e698f778a161eadf9ccfa3824667b8937aa6599320229288171d412cc
glibc-langpack-da-2.28-251.el8_10.2.x86_64.rpm
12fddd526e7c4b62bbb30080fd2717d33e2a8039d44618a652f7623db4b438b6
glibc-langpack-de-2.28-251.el8_10.2.x86_64.rpm
1c2f533771c3be155b96e49458e3d693283c714a26a9adbdc2f83fa7fe50495d
glibc-langpack-doi-2.28-251.el8_10.2.x86_64.rpm
e45c09f4b6721fa3315f5d8cbfa0ecc1a50fe02b1c32a0a71f9ed4b32e865693
glibc-langpack-dsb-2.28-251.el8_10.2.x86_64.rpm
3221219511d9ac4cb4972bb02d0a7bc0a93b1356db0dd9c4c00e91bc8fcfd682
glibc-langpack-dv-2.28-251.el8_10.2.x86_64.rpm
a0cfc8bc067cc623dc27f017e991bf6c31faca8f72ec42afbd0b3e4c0af184f6
glibc-langpack-dz-2.28-251.el8_10.2.x86_64.rpm
6b3ceaf5682dbe292ca517f0bf9ff783b6c8724555a6bf00e2794c54ec2c70b9
glibc-langpack-el-2.28-251.el8_10.2.x86_64.rpm
28ed38e7008b49ea51ae74cc8d32d6f7dde6bd1b40dcde55e6f7785e901c595c
glibc-langpack-en-2.28-251.el8_10.2.x86_64.rpm
2d15d11ef45e5ae103a7948524f6b4e1d72fc4c161e375078ff3e501526aecf2
glibc-langpack-eo-2.28-251.el8_10.2.x86_64.rpm
43745e09ad545ce9f092b3f07c5402640d7bc11a28739d914e01685740d9a19b
glibc-langpack-es-2.28-251.el8_10.2.x86_64.rpm
507f3944dc331feba8d74073fff597dc504c4bb849cb585bb8dc50b946fddb85
glibc-langpack-et-2.28-251.el8_10.2.x86_64.rpm
095ec54ceb7c017acf18b54b8b609beccc6d3944801f4fc20b928550cc08b450
glibc-langpack-eu-2.28-251.el8_10.2.x86_64.rpm
02aa6f19a5f096e8ddc4a722e9987f1168e6a8d7f4b42b63eae647ca835b1986
glibc-langpack-fa-2.28-251.el8_10.2.x86_64.rpm
26ef1cfa3bb7f6fad5e1088a725d6cb5c538ab9e006d7560980a9ae6b0ec8438
glibc-langpack-ff-2.28-251.el8_10.2.x86_64.rpm
fa21c2030dfa13ee5e30f48487e0486f981d1340c45463eb27644296334d39f4
glibc-langpack-fi-2.28-251.el8_10.2.x86_64.rpm
8c26534ea2ecb803528fac360d1294be94de958453ea863dd672dacb996bdabb
glibc-langpack-fil-2.28-251.el8_10.2.x86_64.rpm
c57e1b144c9b970b7d28a90446c14b533cb61f2bc3ea19844a3970300b55a74b
glibc-langpack-fo-2.28-251.el8_10.2.x86_64.rpm
383cb74c20f5e1cdcecbe5725dfe78323f7748e246b63e054a0cbc9580bcc5ad
glibc-langpack-fr-2.28-251.el8_10.2.x86_64.rpm
a79b4b5505b207a61cd8fa563d0c394e526dcaf6f177d03bd3efaeaf75f72440
glibc-langpack-fur-2.28-251.el8_10.2.x86_64.rpm
b023bb3b1192a392df3af3ac7c34e325f45e7b762d74ef6e155761bbca182513
glibc-langpack-fy-2.28-251.el8_10.2.x86_64.rpm
e9b37a499075c3f497f5fe468434be09988b78bd7bb1275be33438058f719487
glibc-langpack-ga-2.28-251.el8_10.2.x86_64.rpm
8f79881c318edc8d8426dab4952afa71fa0ee913334523c6a138019d18050e7a
glibc-langpack-gd-2.28-251.el8_10.2.x86_64.rpm
ddb954464578a1ab08c11839fdc87729b64e77d98825972610c5b5c8258ba757
glibc-langpack-gez-2.28-251.el8_10.2.x86_64.rpm
bf61c5ed8af642d9c80d12b812eb28d9cbaccf646b8258bc1dff077728718ad6
glibc-langpack-gl-2.28-251.el8_10.2.x86_64.rpm
1f0b879a2c932a69dae68f2afa3fad4b86edf0e9bd20d89e6b4b1fd1b7700c8f
glibc-langpack-gu-2.28-251.el8_10.2.x86_64.rpm
369146fec93a8a699df6b6e7d88cabdb991583120372beafe5516423c4033cc8
glibc-langpack-gv-2.28-251.el8_10.2.x86_64.rpm
d87bbfd46e3a837e15f72b3145d67312e4ffae9ff02df42bdbed293ba5cdf33c
glibc-langpack-ha-2.28-251.el8_10.2.x86_64.rpm
bb8a77700d4f63b38c9f1cfa03c3eb266d14bdb4983e00297c1a6eba7e78e085
glibc-langpack-hak-2.28-251.el8_10.2.x86_64.rpm
028a64ab550a554f13f2d4e7d5a48ea42e2f49e30062fd71c7d61e5e0df44cd9
glibc-langpack-he-2.28-251.el8_10.2.x86_64.rpm
924332927be6eb3123f138b46eda5d4e75f3813e6628612e9f374f8e3576d5d0
glibc-langpack-hi-2.28-251.el8_10.2.x86_64.rpm
28f9b191b3b92423a451692415347392719f05b940be94a63ed1ccf82c0a113e
glibc-langpack-hif-2.28-251.el8_10.2.x86_64.rpm
4ac49b39ed556f2dc105bcf9fc70dda391d188367959da36dd041ff51e35f5a1
glibc-langpack-hne-2.28-251.el8_10.2.x86_64.rpm
fe41b322e41f6325fd333c603dbbf2eb145749682632f826da3a427e1c429461
glibc-langpack-hr-2.28-251.el8_10.2.x86_64.rpm
549f4fe7a53b40b3db020cce43ea4f690b9095ceaabb91e45da9d029aa5061a2
glibc-langpack-hsb-2.28-251.el8_10.2.x86_64.rpm
f8ec8fe3247b2f76e8dcc84adb53921bf18b188c4a5255e308ca5c0c4b2938c3
glibc-langpack-ht-2.28-251.el8_10.2.x86_64.rpm
d76573de02f63b3cfd96219b403fe3a9bc2ebe797fc9b30d3e5f70ee157fe32f
glibc-langpack-hu-2.28-251.el8_10.2.x86_64.rpm
791f4e4d1bf95ac28599dfa0842bb0630b99365eecd72f11ce49adb9ed848d17
glibc-langpack-hy-2.28-251.el8_10.2.x86_64.rpm
3e9faa93e76752b1d0244b39b902053e449a1f5b483bfca04a29b367b0eed21b
glibc-langpack-ia-2.28-251.el8_10.2.x86_64.rpm
427a67943c925935bf9ffb426883377be8b729e6f9e6475208e8887d998c0379
glibc-langpack-id-2.28-251.el8_10.2.x86_64.rpm
48dd4063c79eca75c2f9a711ca45c836b9711cc1be2c2a5f376ea25b19dc7ef7
glibc-langpack-ig-2.28-251.el8_10.2.x86_64.rpm
5420ec348dcee5c18d891dbdcd01c7d2f40688cffb683451b28f94c575925a3e
glibc-langpack-ik-2.28-251.el8_10.2.x86_64.rpm
8f934a1b52b23274a0c853329d472e5b77a5f817cea22a1c9efd39355f15a573
glibc-langpack-is-2.28-251.el8_10.2.x86_64.rpm
1ae21ae2d5b2168231ad17fdfbc08b0aa86ad723fb8b82c08112a742e1651989
glibc-langpack-it-2.28-251.el8_10.2.x86_64.rpm
bce92f3ce30bbaf64a75164925a72e36389189e33d24fd3dfb06ca676eb73a05
glibc-langpack-iu-2.28-251.el8_10.2.x86_64.rpm
71957c7cc4ea58595ac87d27580b648f86763cc3dee3b91734cc64ac1f99d615
glibc-langpack-ja-2.28-251.el8_10.2.x86_64.rpm
a6b35ef657575f0a61514151fda570f57d8350b151bdde6068453366367a1e48
glibc-langpack-ka-2.28-251.el8_10.2.x86_64.rpm
147b685b5a179f7a4b603d8b9f69f3c88f4c6b843e969981dc6e4e4b4dc5c4b0
glibc-langpack-kab-2.28-251.el8_10.2.x86_64.rpm
74e142ad4472575466c86360fbf98cab1a29667320fb45bc7ed2296fadc3df6f
glibc-langpack-kk-2.28-251.el8_10.2.x86_64.rpm
c065f705098b0a3ce5d55a8fa124d11d8bd427f8bb31385bf141334d5c5e943d
glibc-langpack-kl-2.28-251.el8_10.2.x86_64.rpm
b9981fbb4a6665c60f39c8d89b88644f2c9e8f6ad77f9e634cd19e7d523853e8
glibc-langpack-km-2.28-251.el8_10.2.x86_64.rpm
1f33abafceb005944e31668ccc3cc544398d90a2db773a04ebd143a9484c428a
glibc-langpack-kn-2.28-251.el8_10.2.x86_64.rpm
0493e45cbd6a68e333280e2b1c348a19c98d4e28c07f51062b620c60aa52d8ae
glibc-langpack-ko-2.28-251.el8_10.2.x86_64.rpm
e7542e277eb757c903478e7068cd46d097ed1446ae58a9f9e885f66d5d389c0b
glibc-langpack-kok-2.28-251.el8_10.2.x86_64.rpm
d8cd920473e775b6e38b0777cdad67529b57ddec011218ed8c57285427c68b99
glibc-langpack-ks-2.28-251.el8_10.2.x86_64.rpm
768eb82bece5f0f9533c00e8be8a4a4c460045d2383c9a07536d1230fabde4a7
glibc-langpack-ku-2.28-251.el8_10.2.x86_64.rpm
d35d19485a25a327253ecbf5f418e20657062f4c8140e3ef3735a482c276ff3f
glibc-langpack-kw-2.28-251.el8_10.2.x86_64.rpm
0d3248dfa96b3d88a43086819dc84cb4379cda8a37f770914e905c075ee4b2e5
glibc-langpack-ky-2.28-251.el8_10.2.x86_64.rpm
bdb1ed35128dd6a2fc990940ed0dcae5540f292a3250eb23c01b684b2dd0e907
glibc-langpack-lb-2.28-251.el8_10.2.x86_64.rpm
9d05032ac9c74261cd90944f02365803b97bf04306ec829ca1fe55547a6687af
glibc-langpack-lg-2.28-251.el8_10.2.x86_64.rpm
908b6d437e06bf9ec8cae71481b76cdcb40749ed20d81dbe8077d71ecd0ce8e5
glibc-langpack-li-2.28-251.el8_10.2.x86_64.rpm
5a615049259be94a6246a29cfbf60dbce5af334a291cca2793dae1ac43ee11b8
glibc-langpack-lij-2.28-251.el8_10.2.x86_64.rpm
2220b48243ffc0a49abf8642794f8a80640632b7ced4b8f4aea4d0618578afb2
glibc-langpack-ln-2.28-251.el8_10.2.x86_64.rpm
28758e4fc60ba8f68e0201fa1057224d6edc80b37e53b73c956859da08a2c800
glibc-langpack-lo-2.28-251.el8_10.2.x86_64.rpm
68e4d975e599253241f04d8508ed822e4301d355a7fcd95ceea90227b35f5600
glibc-langpack-lt-2.28-251.el8_10.2.x86_64.rpm
b6e01840a3ec6c9cbd2b42acf3328f76b16851abd5668ef6d08ed70e6e28e27e
glibc-langpack-lv-2.28-251.el8_10.2.x86_64.rpm
23a80868f5904e8a5a42f5b60f5bc6de5e8776a13a58b286242a35f8b4daf2b0
glibc-langpack-lzh-2.28-251.el8_10.2.x86_64.rpm
8173e2480d780004e440c9d8b0934f3c170a9798b9d002ab19361d6b0b2f7144
glibc-langpack-mag-2.28-251.el8_10.2.x86_64.rpm
33d91e0b6e075cc5d51c7c1070d6c477e058f481b9a3db4fa359aabe6ed6f1de
glibc-langpack-mai-2.28-251.el8_10.2.x86_64.rpm
ae10f7b683c3e62248e9d9ea5b9b2b7a704886e1c807223f62f67e71605f5809
glibc-langpack-mfe-2.28-251.el8_10.2.x86_64.rpm
2e4fc18ac17c9f1689fba44dbb41aadc8af1bc37b4ef807e9a9f9dd4fce865bb
glibc-langpack-mg-2.28-251.el8_10.2.x86_64.rpm
950d1e478a3607869b6dfbd588a5bdbdf9dce443bc916f3e9a1338f00067e482
glibc-langpack-mhr-2.28-251.el8_10.2.x86_64.rpm
aac7bd2bfc6caf7185ba1873caed149ceeffd5a88eb95ec5a6afba1e10131edf
glibc-langpack-mi-2.28-251.el8_10.2.x86_64.rpm
af890640054113ecb1df7854eebff20077fcaf6acc6408e79de92a74d1377672
glibc-langpack-miq-2.28-251.el8_10.2.x86_64.rpm
bd491484308b3a1c098888de25cdb8f96f29221c45abd462a0616f1245cf3a45
glibc-langpack-mjw-2.28-251.el8_10.2.x86_64.rpm
b86fdbe41d7966607aad754e19d044f9fec3b28a0f6c439958856ffebe7e26b0
glibc-langpack-mk-2.28-251.el8_10.2.x86_64.rpm
43471447f330f092544c2fd1e11536369a700dadee7ff3bf0824cdeb66354b26
glibc-langpack-ml-2.28-251.el8_10.2.x86_64.rpm
5dcac47b2ca52d9f1ca08aa3ff55eb1524365ddfcb1390a356470eac3963cf71
glibc-langpack-mn-2.28-251.el8_10.2.x86_64.rpm
b1b20399368b8bb11c26de6e29a0c5b990be5d4c68e20ff12095b00e1b3f886b
glibc-langpack-mni-2.28-251.el8_10.2.x86_64.rpm
b175b810548d2bad4dbcd951e75363c24dfc1a36da7399d09f80a873f5514402
glibc-langpack-mr-2.28-251.el8_10.2.x86_64.rpm
d0a50ded1e2a03c8db17e6a3c83bb642f0e36d6d052465ed0b8f4aafdbcf0cf6
glibc-langpack-ms-2.28-251.el8_10.2.x86_64.rpm
e5012c8946248d344ac414ccf22cdfc0086face7c295d0550eda4bb87d91de49
glibc-langpack-mt-2.28-251.el8_10.2.x86_64.rpm
747aae2236f92e24e11dc0662cc289bfc826fa5fbdbe57bae811ed27ff525106
glibc-langpack-my-2.28-251.el8_10.2.x86_64.rpm
7296d88c18ac9dc14a0773e4bfcb09039170661047b5058e852eb13bee31c392
glibc-langpack-nan-2.28-251.el8_10.2.x86_64.rpm
705dfb5c56df42f641db33559cf7eaa871986c198b84b975d2656adada02c771
glibc-langpack-nb-2.28-251.el8_10.2.x86_64.rpm
7527c8dd4e8f8202525b8f69c32c234152d779311278beaea60b8ae0cb9d4e27
glibc-langpack-nds-2.28-251.el8_10.2.x86_64.rpm
295b9a3eae9f74a63cc09a68c0ca5bf866ca78612d8cd106b619d24560d65932
glibc-langpack-ne-2.28-251.el8_10.2.x86_64.rpm
4ceaf4ba8f06752c9fb33a16054589d08838bfca9568c29056799d2ef48d29dd
glibc-langpack-nhn-2.28-251.el8_10.2.x86_64.rpm
0ccae1034dd3394c31e5033dbeea15d414f2c07bbf47f2586c1faf9941c0a64f
glibc-langpack-niu-2.28-251.el8_10.2.x86_64.rpm
cb506ea508e9968608a08f6bc5538cad4914971a42dd53600c129796867923e3
glibc-langpack-nl-2.28-251.el8_10.2.x86_64.rpm
b4fc5a8c24652b6670e5d3f4fc0b721de4ca99979efc4101775bb75acd683277
glibc-langpack-nn-2.28-251.el8_10.2.x86_64.rpm
28e75248ab4d44967378052d7f0da6da0ba786dfc81248c93a034d2a44b9cd5b
glibc-langpack-nr-2.28-251.el8_10.2.x86_64.rpm
d23b7a51a276159f15bc561b5568b0bc74add4ac784a9dfd16ef7c8ca4b0dac4
glibc-langpack-nso-2.28-251.el8_10.2.x86_64.rpm
781f4c439a106d3de8afba100e4cbb0b03116e14edd249d9ebc6a0d30cc81b9a
glibc-langpack-oc-2.28-251.el8_10.2.x86_64.rpm
bbdd72bf1dd2900e66b026ee7dda7282e32fee9e42960e5f3098fa2af22f658b
glibc-langpack-om-2.28-251.el8_10.2.x86_64.rpm
46f273d10c54a975804a977a3602d6d9dc49e7a11c44b3cee8cf68ed9e8a0294
glibc-langpack-or-2.28-251.el8_10.2.x86_64.rpm
5ab828d0723654fe62457a52ed057d9de53b111cf0146dc411c2be822815cfec
glibc-langpack-os-2.28-251.el8_10.2.x86_64.rpm
c423ae35666d1280e8873492fad823eb0c146f528090e59987b40b28392a3531
glibc-langpack-pa-2.28-251.el8_10.2.x86_64.rpm
8c13af6c2019bc154aa7679a599171812fe72e18db51e159504772228147d472
glibc-langpack-pap-2.28-251.el8_10.2.x86_64.rpm
c9d37e8b81880578fdf608730daa29a687fe8f66e6e2519a3d38ae6776a6fcc9
glibc-langpack-pl-2.28-251.el8_10.2.x86_64.rpm
a98cc53b07a295c4583a78456bae37805117ba2b123a748c90b5b06e1c5452f4
glibc-langpack-ps-2.28-251.el8_10.2.x86_64.rpm
4b1093e6b97cb5d52931ad525cd6694b178f2e6c11d35208240c6a9bd6b02ca4
glibc-langpack-pt-2.28-251.el8_10.2.x86_64.rpm
011e482a92769ed7d041fc53d0ab9bf282a7b4892d56281fc3cc66aee5155edc
glibc-langpack-quz-2.28-251.el8_10.2.x86_64.rpm
e773879e393de3e44eccc55c92634557fddc85d4d69006e4b53a573df1223116
glibc-langpack-raj-2.28-251.el8_10.2.x86_64.rpm
8b762be9b70dcc76596d64c5959df48e66acdc21eccd05a0ab0736c614f46132
glibc-langpack-ro-2.28-251.el8_10.2.x86_64.rpm
c47a02e24700a7f94b7364a23d86b1214b56ebd2f77f74348f95ea11ae3a8777
glibc-langpack-ru-2.28-251.el8_10.2.x86_64.rpm
3396b099397b6b5bdc6437275f95359a842c60806606ae7146687c18ab813342
glibc-langpack-rw-2.28-251.el8_10.2.x86_64.rpm
d8ac12464cd4489adfbd0a794068f4af607738e94011f9b8da606f2bdac2ed56
glibc-langpack-sa-2.28-251.el8_10.2.x86_64.rpm
d70ac66e8bddde59b4994554d41a885d037333c188ad7b99a2f3a388ec32be1e
glibc-langpack-sah-2.28-251.el8_10.2.x86_64.rpm
3d32ae6eb8a62b770ccffac7cdbf35bf28dbd109c0d377f2623a040dc041afe8
glibc-langpack-sat-2.28-251.el8_10.2.x86_64.rpm
2c133dd023815b8c8d2d6583a94cb1095e1113a3ffb6156f4d4ecedee4fb1e13
glibc-langpack-sc-2.28-251.el8_10.2.x86_64.rpm
4cd1c112acb51acff3f9def497dabdf51576c542321a8ee1d9c30e4da3f08a4f
glibc-langpack-sd-2.28-251.el8_10.2.x86_64.rpm
05d1b601387c54908d417c435b4ae51e294eac8b5ac0fc0c7087a7fae4f766ea
glibc-langpack-se-2.28-251.el8_10.2.x86_64.rpm
e92ed74284674a50b700bcf5e6cb01b0d65559e43f3930d2152149e7b161ce62
glibc-langpack-sgs-2.28-251.el8_10.2.x86_64.rpm
c38cf7e2973e3853fb6399fbd350f79e886dae2809c02dbdc3361644bf58421d
glibc-langpack-shn-2.28-251.el8_10.2.x86_64.rpm
d673a586e4b58cacde8334b4e6a76eb47682181f834c8c0d28a3707d53356b12
glibc-langpack-shs-2.28-251.el8_10.2.x86_64.rpm
db693e329a857f455666d50df5a4b9de37a89126da8eb57af0d40b4c58ab9450
glibc-langpack-si-2.28-251.el8_10.2.x86_64.rpm
f7b33c8c4f2a4cf6997da629f9914ccb3648440a836f04c46b1ba93dcc3ac179
glibc-langpack-sid-2.28-251.el8_10.2.x86_64.rpm
d9aba5d855e06fb4dc36686085aefa78b3fd4a9c93056fdd6dd7075b69101488
glibc-langpack-sk-2.28-251.el8_10.2.x86_64.rpm
8c5e06362fc0eaabfc5471faae972c2a529c8f0ecdb9d990de4c8a55e948f121
glibc-langpack-sl-2.28-251.el8_10.2.x86_64.rpm
ab104744522496c3de9ca19e8de5ad83bb42b62e13a05f7a3551c1615d3b858e
glibc-langpack-sm-2.28-251.el8_10.2.x86_64.rpm
c02ea9b2c9be0e6147d85316575e9f3431992de58850c556e0fb4e2acde662f9
glibc-langpack-so-2.28-251.el8_10.2.x86_64.rpm
29215a4a5e972a549301f0bc220b886e3df90c09302820198e01e94b9f6b4be0
glibc-langpack-sq-2.28-251.el8_10.2.x86_64.rpm
62c500e321ab48620d8adaa0bca22deb1de0e0714b7e9578261c1acadfce46aa
glibc-langpack-sr-2.28-251.el8_10.2.x86_64.rpm
deea0caaeb473645b5d271a396d93be600993e9a7a08a3701a0a3441c46e0117
glibc-langpack-ss-2.28-251.el8_10.2.x86_64.rpm
537059d5672e5eac8f3da47b65fffdb09adce3a4722d027bbdc29d3f4ce95687
glibc-langpack-st-2.28-251.el8_10.2.x86_64.rpm
aee36035bde544c10eb8e76a70a7f7b35071827eb6ced0a2b8d9d1a157c1d4f5
glibc-langpack-sv-2.28-251.el8_10.2.x86_64.rpm
8521e9fbaa659cbec4ba16807bb8d2390016a6db6b412163f5b404bf8113eae6
glibc-langpack-sw-2.28-251.el8_10.2.x86_64.rpm
630948481031095547ccc8350f4f1d5c637e548981eae0c21069de1b17af7255
glibc-langpack-szl-2.28-251.el8_10.2.x86_64.rpm
f071a52d156069b162b9aaddf515c6811ef36192d11b48d87df62b4f6f4912bc
glibc-langpack-ta-2.28-251.el8_10.2.x86_64.rpm
1d2c33dc8bae67ac2c92a635165b4f58f3ec1f60fa5ab6e3f23c0f3f7626df3a
glibc-langpack-tcy-2.28-251.el8_10.2.x86_64.rpm
66de27da791d3cd480a6a4e2a502bec8e5d19ec24070681129dc5d67b4add03b
glibc-langpack-te-2.28-251.el8_10.2.x86_64.rpm
00a0baee255c77d91758370b7b4b5287334ca66234ef7d16f4687b86723cbb1c
glibc-langpack-tg-2.28-251.el8_10.2.x86_64.rpm
a50b77000337ed72da1264b1c161c5ceb74807511cac386aa3dfa314e194780d
glibc-langpack-th-2.28-251.el8_10.2.x86_64.rpm
f0529acbed431c935e36c46e7f14d769ff4c804e1d9e8f7acd5eb526cc5a891e
glibc-langpack-the-2.28-251.el8_10.2.x86_64.rpm
1517674368390397f426f0ea3c67fd7a8b251e79131b93d034f60739b30eb315
glibc-langpack-ti-2.28-251.el8_10.2.x86_64.rpm
25dc398ef197302d27eadf28d6339752ea8bb6ed237f71fcca8e03f335af294b
glibc-langpack-tig-2.28-251.el8_10.2.x86_64.rpm
77b0c9e8df2fd1b7cdd85fe0271064940d0711f097edbf057d1c6b1e09127ff0
glibc-langpack-tk-2.28-251.el8_10.2.x86_64.rpm
10319835967e2381b17bb23f132cd09df070aff64b6ccf42c3e1511a346474c0
glibc-langpack-tl-2.28-251.el8_10.2.x86_64.rpm
e633cb27568417dea243f96fce7531acb2a057e5eb461cb5c589e493181fb609
glibc-langpack-tn-2.28-251.el8_10.2.x86_64.rpm
f14e289acb068e8fb14afe956b665e7a78efedc3c3a79390b7af72570aec69b5
glibc-langpack-to-2.28-251.el8_10.2.x86_64.rpm
4c303c213849884535e6b24d3a5944b52b16f505325520eb01870848907532eb
glibc-langpack-tpi-2.28-251.el8_10.2.x86_64.rpm
f07271a40f66f69a5c0b9bddbdae234b16044bfa42413e5497d62b24d330732e
glibc-langpack-tr-2.28-251.el8_10.2.x86_64.rpm
4f9f044d198b92e22e7aae0d90f4f65d2b5417a9271b7517bb7e3674363eb79f
glibc-langpack-ts-2.28-251.el8_10.2.x86_64.rpm
0a9fba890241d5b086f896cdaa8bc0f2d0dc1da87caa812b2664a84f130e45cf
glibc-langpack-tt-2.28-251.el8_10.2.x86_64.rpm
f9c99dc8fa89d297fdec0ae9b5d60602fa65271883c15382e270c240d6a0c13e
glibc-langpack-ug-2.28-251.el8_10.2.x86_64.rpm
cd11199feb747051a9ea0aeeb2629262ef1f965b8915686edf2973b69593f793
glibc-langpack-uk-2.28-251.el8_10.2.x86_64.rpm
92f51fabd69cf01d3b696b78388944263cd9f2fd6d5062b1f16db67c5b5ae94c
glibc-langpack-unm-2.28-251.el8_10.2.x86_64.rpm
fabeb82cba4a63dff23e3a7e1083c3372843fa2e4fb2534cdc6a2c8e90822b8f
glibc-langpack-ur-2.28-251.el8_10.2.x86_64.rpm
af9f61592cdeb78896cf3e95c20d7eea922b8d092c725532b44dfbc7ee582529
glibc-langpack-uz-2.28-251.el8_10.2.x86_64.rpm
50dfea55cab019da3dc21168467a19ab6d1b8d976c0e220a3da929299808550a
glibc-langpack-ve-2.28-251.el8_10.2.x86_64.rpm
12b6e812b0c0c796f3f8ff8194a9df5677664da25c19163591153844a72290b5
glibc-langpack-vi-2.28-251.el8_10.2.x86_64.rpm
20146d89efcf2a36e21fef1e628ddb0cd2ff33082b07259bad40a7db3fae3392
glibc-langpack-wa-2.28-251.el8_10.2.x86_64.rpm
f2ee3a8091f0189a52546dc5cadc1cb1efc899f543a787955ba1733395444752
glibc-langpack-wae-2.28-251.el8_10.2.x86_64.rpm
946d7b57c6e4f7f4e3ae73fc20376596fc94b18129cb5073e9c4f90f8caacfcf
glibc-langpack-wal-2.28-251.el8_10.2.x86_64.rpm
1eb5b6015736980bb1f4ae258e16c2f55ffef01ca8209b80120f2ec653f2f2cd
glibc-langpack-wo-2.28-251.el8_10.2.x86_64.rpm
9ef3aa0b287da6d7259426c1bfaf02c6f9877d9e7161bdd39cade8fa35ea2926
glibc-langpack-xh-2.28-251.el8_10.2.x86_64.rpm
e72906723e1db0f1925e77902a0bcb24201dda197cb61ce56fa706402195048a
glibc-langpack-yi-2.28-251.el8_10.2.x86_64.rpm
de41a93b98e40d1490c146487ca67c35341eb1bda3d3eb2ed48d5c34a02ea4e8
glibc-langpack-yo-2.28-251.el8_10.2.x86_64.rpm
84640a518171eac4f3238500a63d21e8afe41b2cb9ef39cd5f81d50bc65290b3
glibc-langpack-yue-2.28-251.el8_10.2.x86_64.rpm
3647320bcaa3ecdb308852d5eae3c2a58ce346d4706ed05315245bdcbb1041cb
glibc-langpack-yuw-2.28-251.el8_10.2.x86_64.rpm
15f5c0455c5ebc565b1b55903b897664b04af020a06a0f04a5af9fe9933db2d0
glibc-langpack-zh-2.28-251.el8_10.2.x86_64.rpm
9b95cf02bfe604019d0e89a00bcd87b0545dc3d939674e928ca8e1f79b40b58c
glibc-langpack-zu-2.28-251.el8_10.2.x86_64.rpm
35575ee72fe54d0dafb11b2110cc9a081d2a1ffa2959f8480894ba8845495112
glibc-locale-source-2.28-251.el8_10.2.x86_64.rpm
19a07e625196363d6ba81eea384357f812b4c2b73d194cff47d8cdacb5920909
glibc-minimal-langpack-2.28-251.el8_10.2.x86_64.rpm
90510c6fcf5524985073971cf42c731b0b3bf2f6680e26cad763d8711df9e63b
libnsl-2.28-251.el8_10.2.i686.rpm
9357ea2d45e7db9d6b91ade82183521b5649d0d1f5a8db35df2b0ba565f2663c
libnsl-2.28-251.el8_10.2.x86_64.rpm
d2d8fb740919f57a31c5777162d24756bfc1c9012d83473f9272155bbb974dc3
nscd-2.28-251.el8_10.2.x86_64.rpm
2d16aa6ff80372dbfd8061b0e5e243d04d64c1309f5b0362a27438fc9f01254b
nss_db-2.28-251.el8_10.2.i686.rpm
94d721dcce61a95b7e3dfd8a5382b1296a0e98b3a5d528028d66cde26dd18318
nss_db-2.28-251.el8_10.2.x86_64.rpm
042c11844b92847f0e672eb3902f56577e075dd8b286597b2769b4bf701e1deb
RLSA-2024:3347
Important: python3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597)
* python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-3.6.8-62.el8_10.rocky.0.x86_64.rpm
3ea554540aaa32f04d37c1b0a29689bdcfefaa1c9e7aef0ad1a05e7eea463219
python3-libs-3.6.8-62.el8_10.rocky.0.i686.rpm
7a939f7302567add5a8d7d24d61bff5e62575d02e85c6254ec3108916c34edf8
python3-libs-3.6.8-62.el8_10.rocky.0.x86_64.rpm
2cfea010988b1951785cd484bf3f68df04cdd9f3a8a9c81dd23cc9a47057da0b
python3-test-3.6.8-62.el8_10.rocky.0.x86_64.rpm
d6f24fc049141ddaebe1ff4fefa44a731c3014f36628ffae0b94dd9eb6f25100
RLBA-2024:3358
polkit bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for polkit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones.
Bug Fix(es):
* polkit woken on every logind-session-monitor, executes pkla-compat every time [rhel-8.10.z] (JIRA:Rocky Linux-34029)
none-baseos-rpms
polkit-0.115-15.el8_10.2.x86_64.rpm
1e822fbe657459ab3ecd59f75e64d5c6ea24704fd7449ac5d16eee7b02e263ff
polkit-devel-0.115-15.el8_10.2.i686.rpm
b88f4664d10e2f1f4eb2d823d215db1b33f9a2d4496e086dfea36da9824bb75f
polkit-devel-0.115-15.el8_10.2.x86_64.rpm
ab702408ac9d8700f7abc9022fcf648df1db54b3362ee819855e6e0f3c70679d
polkit-docs-0.115-15.el8_10.2.noarch.rpm
24198bd5b8ce86b4b06e4f7d605ff3f65ed8d00ee21643881b35af87ee6428dc
polkit-docs-0.115-15.el8_10.2.noarch.rpm
24198bd5b8ce86b4b06e4f7d605ff3f65ed8d00ee21643881b35af87ee6428dc
polkit-libs-0.115-15.el8_10.2.i686.rpm
c92308d325e0204eb3d9e54fd5a037af12188a5eca98d9c7a7fa91d499bd9984
polkit-libs-0.115-15.el8_10.2.x86_64.rpm
b8f2c1c148f056e78a0a7c2b34a26205fa0715bfe041a694fcb28c74f0837f12
RLBA-2024:3381
tuned bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Bug Fix(es):
* tuned-profiles-sap needs an update for vm.max_map_count [Rocky Linux 8] (JIRA:Rocky Linux-32124)
none-baseos-rpms
tuned-2.22.1-4.el8_10.1.noarch.rpm
f900b6cd20f9e14d8364dd0dd82db34a638762d469423dd02ab633d238997e13
tuned-2.22.1-4.el8_10.1.noarch.rpm
f900b6cd20f9e14d8364dd0dd82db34a638762d469423dd02ab633d238997e13
tuned-profiles-atomic-2.22.1-4.el8_10.1.noarch.rpm
9b1b3d5f313c2af1ad180eeaa9e964444e4059a143cea35964fe88319a4b0ad5
tuned-profiles-atomic-2.22.1-4.el8_10.1.noarch.rpm
9b1b3d5f313c2af1ad180eeaa9e964444e4059a143cea35964fe88319a4b0ad5
tuned-profiles-compat-2.22.1-4.el8_10.1.noarch.rpm
66d03ce05980bd92d0890ffbcc1220685127addd1b3e24fd73535313ce362201
tuned-profiles-compat-2.22.1-4.el8_10.1.noarch.rpm
66d03ce05980bd92d0890ffbcc1220685127addd1b3e24fd73535313ce362201
tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.1.noarch.rpm
0166597a16e1976563c2ee53be27ba16649091e3ab92d4b24160e1c8a841c403
tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.1.noarch.rpm
0166597a16e1976563c2ee53be27ba16649091e3ab92d4b24160e1c8a841c403
tuned-profiles-mssql-2.22.1-4.el8_10.1.noarch.rpm
e0e075ee3e7fd6c871837aa34482590021f94735cee4a1e8d872dec24fbdb777
tuned-profiles-mssql-2.22.1-4.el8_10.1.noarch.rpm
e0e075ee3e7fd6c871837aa34482590021f94735cee4a1e8d872dec24fbdb777
tuned-profiles-oracle-2.22.1-4.el8_10.1.noarch.rpm
2e949f7758e994826f506e1889ed2caf38be6f24692aa982591be3f15c015c02
tuned-profiles-oracle-2.22.1-4.el8_10.1.noarch.rpm
2e949f7758e994826f506e1889ed2caf38be6f24692aa982591be3f15c015c02
RLSA-2024:3618
Moderate: kernel update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Marvin vulnerability side-channel leakage in the RSA decryption
operation (CVE-2023-6240)
* kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()
(CVE-2024-0340)
* kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744)
* kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593)
* kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)
* kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer
that cause loop forever (CVE-2024-26603)
* kernel: use after free in i2c (CVE-2019-25162)
* kernel: i2c: validate user data in compat ioctl (CVE-2021-46934)
* kernel: media: dvbdev: Fix memory leak in dvb_media_device_free()
(CVE-2020-36777)
* kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors
(CVE-2023-52477)
* kernel: mtd: require write permissions for locking and badblock ioctls
(CVE-2021-47055)
* kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump
(CVE-2024-26615)
* kernel: vt: fix memory overlapping when deleting chars in the buffer
(CVE-2022-48627)
* kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)
* kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()
(CVE-2023-52565)
* kernel: net: bridge: data races indata-races in br_handle_frame_finish()
(CVE-2023-52578)
* kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
(CVE-2023-52528)
* kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)
* kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)
* kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118)
* kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
(CVE-2023-52610)
* kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set
with timeout (CVE-2024-26643)
* kernel: netfilter: nf_tables: disallow anonymous set with timeout flag
(CVE-2024-26642)
* kernel: i2c: i801: Don't generate an interrupt on bus reset
(CVE-2021-47153)
* kernel: xhci: handle isoc Babble and Buffer Overrun events properly
(CVE-2024-26659)
* kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)
* kernel: wifi: mac80211: fix race condition on enabling fast-xmit
(CVE-2024-26779)
* kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter
(CVE-2024-26744)
* kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)
* kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
(CVE-2021-47185)
* kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
(CVE-2024-26901)
* kernel: RDMA/srpt: Do not register event handler until srpt device is fully
setup (CVE-2024-26872)
* kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919)
* kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)
* kernel: USB: core: Fix deadlock in usb_deauthorize_interface()
(CVE-2024-26934)
* kernel: USB: core: Fix deadlock in port "disable" sysfs attribute
(CVE-2024-26933)
* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()
(CVE-2024-26993)
* kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)
* kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
(CVE-2024-27059)
* kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013)
* kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171)
* kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)
* kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439)
* kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)
* kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)
none-baseos-rpms
bpftool-4.18.0-553.5.1.el8_10.x86_64.rpm
9283c359eae84658351912b95138141f95cac98791ef5a5a476c5515ff49c110
kernel-4.18.0-553.5.1.el8_10.x86_64.rpm
f6f49c9b37c1010d12232ba0697602a4d9fe6d1e32a3b7099aeaecf225f46229
kernel-abi-stablelists-4.18.0-553.5.1.el8_10.noarch.rpm
90980b327ea205a51346967228b957b96581042d62de488c25b7240cfa923a96
kernel-abi-stablelists-4.18.0-553.5.1.el8_10.noarch.rpm
90980b327ea205a51346967228b957b96581042d62de488c25b7240cfa923a96
kernel-core-4.18.0-553.5.1.el8_10.x86_64.rpm
11563d5171f288fe5e2a93127248ca91f1ee2fdb55d300df7d6b136f50f78f12
kernel-cross-headers-4.18.0-553.5.1.el8_10.x86_64.rpm
b1ed97e3c044f4b7d9a33555eea683075efac8f5afc02861de7760331e7ac2d4
kernel-debug-4.18.0-553.5.1.el8_10.x86_64.rpm
7332fb9229723be35718a21c209ed616a2c1a189033d332d58f3eee993b69de7
kernel-debug-core-4.18.0-553.5.1.el8_10.x86_64.rpm
63bd8d0724d28256040c2af5dabc8a89494202b5e7ebf490acf83191a58ba2eb
kernel-debug-devel-4.18.0-553.5.1.el8_10.x86_64.rpm
2c746e6daa9b093dab3e90739815664c2903f3509b15a1d97c1cf80c8f8f8bbc
kernel-debuginfo-common-x86_64-4.18.0-553.5.1.el8_10.x86_64.rpm
a278a4df77e52d53ec6a99af7472162c4a243b162675cb7b144ccc5c164a94d4
kernel-debug-modules-4.18.0-553.5.1.el8_10.x86_64.rpm
4d9c24fef0cec49e0529eea8134c1123c80c9d3be9fa636c5db69ab1a0de963b
kernel-debug-modules-extra-4.18.0-553.5.1.el8_10.x86_64.rpm
e1443da56289af938308f2f7f562698b79066fbfb0dcf80dd10a7b60c3ec528e
kernel-devel-4.18.0-553.5.1.el8_10.x86_64.rpm
e55f2c2c82b790bc174fd247cd19c54737531d8d7374db91b43968c1311f5c35
kernel-doc-4.18.0-553.5.1.el8_10.noarch.rpm
cd20284242d611eb16894f2de6b0f29b145993ccfea76de1ace9805be0a1390f
kernel-doc-4.18.0-553.5.1.el8_10.noarch.rpm
cd20284242d611eb16894f2de6b0f29b145993ccfea76de1ace9805be0a1390f
kernel-headers-4.18.0-553.5.1.el8_10.x86_64.rpm
d786a322b35ac66d366c76073d2d280b6371cb7288fe71485fb42cf00f3aff73
kernel-modules-4.18.0-553.5.1.el8_10.x86_64.rpm
f25c9913e68bed6807842021ef72ec61747db11e954239e95ea7c8aa4eb4a55a
kernel-modules-extra-4.18.0-553.5.1.el8_10.x86_64.rpm
1ae707f7bdd1baba5370ace933c52e22fb65b2f696635b8a5943d62f22267b69
kernel-tools-4.18.0-553.5.1.el8_10.x86_64.rpm
126b122fef8e81effb46592af76ce729bc533412c3e156e9793edd0f115095ba
kernel-tools-libs-4.18.0-553.5.1.el8_10.x86_64.rpm
89a7f9106d54ce83ca73aea0853d9b404b1887df447cf796b4e6db88aefa2e5b
perf-4.18.0-553.5.1.el8_10.x86_64.rpm
1a856e4547083da670bca6b657608e7230ab87a50f4f4cebf588cc32fd4cb58f
python3-perf-4.18.0-553.5.1.el8_10.x86_64.rpm
e79fc6e975a8cf125815490c0f66d4232fce3509d8b3fa01ef231446d5f805ec
RLSA-2024:3626
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of
various XML standards.
Security Fix(es):
* libxml2: use-after-free in XMLReader (CVE-2024-25062)
For more details about the security issue(s), including the impact,
a CVSS score, acknowledgments, and other related information, refer
to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-18.el8_10.1.i686.rpm
b6b8563af6678ac21232dd6dca8380f4ae25e1239f1977abca7564c53f013d83
libxml2-2.9.7-18.el8_10.1.x86_64.rpm
4571f01fdfd33cf1dff725e05e325511f5cf276db1310ff9d93c8f2b7ed35903
python3-libxml2-2.9.7-18.el8_10.1.x86_64.rpm
9f56269fc7cf026e298a1b28e2aeb772de6ffa045815c0c2fb49dbbc8619aca6
RLSA-2024:3667
Moderate: cockpit security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cockpit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more.
Security Fix(es):
* cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
cockpit-310.4-1.el8_10.x86_64.rpm
868bf89adef0927f699d23c17268a52f4bb060724b156bc632acecdf2df592a6
cockpit-bridge-310.4-1.el8_10.x86_64.rpm
982caf942ac116095a13666930047fa39f2be073af650cd8397f8af7549420c0
cockpit-doc-310.4-1.el8_10.noarch.rpm
2fc98216866ffe728743849c8bd1e9e876b32579f57c9b8e172bf2da30594393
cockpit-doc-310.4-1.el8_10.noarch.rpm
2fc98216866ffe728743849c8bd1e9e876b32579f57c9b8e172bf2da30594393
cockpit-system-310.4-1.el8_10.noarch.rpm
342a2a051327d592f2fcd641aa4ab0426d1b1fa7bd74297208f5ee64a017fa31
cockpit-system-310.4-1.el8_10.noarch.rpm
342a2a051327d592f2fcd641aa4ab0426d1b1fa7bd74297208f5ee64a017fa31
cockpit-ws-310.4-1.el8_10.x86_64.rpm
7b3b3078757fcebc9c1c48eb6d98cf1e4afa3b4501cc735fb30277e854e99cd4
RLBA-2024:4049
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* rebase sos to 4.7.1 in Rocky Linux8.10 (Rocky Linux-32104)
* rebase sos to 4.7.1 in Rocky Linux9.4 (Rocky Linux-32106)
* sos clean on an existing archive fails to clean anything (Rocky Linux-35945)
none-baseos-rpms
sos-4.7.1-3.el9.noarch.rpm
0017839676c619ba81051a15af40cf5bf19915464a6c0b5bf29fa1e1f438d5d3
sos-4.7.1-3.el9.noarch.rpm
0017839676c619ba81051a15af40cf5bf19915464a6c0b5bf29fa1e1f438d5d3
sos-4.7.1-3.el9.noarch.rpm
0017839676c619ba81051a15af40cf5bf19915464a6c0b5bf29fa1e1f438d5d3
sos-4.7.1-3.el9.noarch.rpm
0017839676c619ba81051a15af40cf5bf19915464a6c0b5bf29fa1e1f438d5d3
sos-audit-4.7.1-3.el9.noarch.rpm
5446802a36b18781fb4b298f6a4fab23a1c8484a9ed21f192e70cb93b71b4238
sos-audit-4.7.1-3.el9.noarch.rpm
5446802a36b18781fb4b298f6a4fab23a1c8484a9ed21f192e70cb93b71b4238
sos-audit-4.7.1-3.el9.noarch.rpm
5446802a36b18781fb4b298f6a4fab23a1c8484a9ed21f192e70cb93b71b4238
sos-audit-4.7.1-3.el9.noarch.rpm
5446802a36b18781fb4b298f6a4fab23a1c8484a9ed21f192e70cb93b71b4238
sos-4.7.1-3.el8_10.noarch.rpm
9f99fa4998fc4a7fd86109cbf7352835dd81177932336ce2ef4083c4b21369d4
sos-4.7.1-3.el8_10.noarch.rpm
9f99fa4998fc4a7fd86109cbf7352835dd81177932336ce2ef4083c4b21369d4
sos-audit-4.7.1-3.el8_10.noarch.rpm
caf87c9a2a6b3179bb70ed0cdc2fe7b38eafd183aa5a37624644c663cf9f1cfc
sos-audit-4.7.1-3.el8_10.noarch.rpm
caf87c9a2a6b3179bb70ed0cdc2fe7b38eafd183aa5a37624644c663cf9f1cfc
RLSA-2024:4211
Important: kernel security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555)
* kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001)
* kernel: ovl: fix leaked entry (CVE-2021-46972)
* kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073)
* kernel: gro: fix ownership transfer (CVE-2024-35890)
* kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585)
* kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845)
* kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007)
* kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909)
* kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069)
* kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615)
* kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959)
* kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)
* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801)
* kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)
* kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397)
* kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)
* kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)
* kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906)
* kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700)
* kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)
* kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)
* kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686)
* kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090)
* kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)
* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
* kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813)
* kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703)
* kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004)
* kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835)
* kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495)
* kernel: can: (CVE-2023-52878, CVE-2021-47456)
* kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356)
* kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353)
Bug Fix(es):
* Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783)
* Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361)
* Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048)
* [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130)
* Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195)
* Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.8.1.el8_10.x86_64.rpm
606375b21c32f4e07c75b7d9714ef47765e90b4af8ed613e97c218c18185a2d6
kernel-4.18.0-553.8.1.el8_10.x86_64.rpm
f61e09f7b600996dfafbe97623881f96fd0e73b3bbfce5d458eb474fc48c963d
kernel-abi-stablelists-4.18.0-553.8.1.el8_10.noarch.rpm
ce28a833ec84dd9475cf080053603a0d7ee70408d9b343ecb7798f1d8f45c4ef
kernel-abi-stablelists-4.18.0-553.8.1.el8_10.noarch.rpm
ce28a833ec84dd9475cf080053603a0d7ee70408d9b343ecb7798f1d8f45c4ef
kernel-core-4.18.0-553.8.1.el8_10.x86_64.rpm
3bfa44404b018d4f85dbc3697900826e7bacdfcffd6f4b6d8ae322c37dd78ccb
kernel-cross-headers-4.18.0-553.8.1.el8_10.x86_64.rpm
b3d4c8e4b1fa4aabaae13d7c3006576cf5da6e238b8c073cdbcdd8897d7d290e
kernel-debug-4.18.0-553.8.1.el8_10.x86_64.rpm
24fd8e1dbbc095085276a8af3255543a213b8f9cda4a19d3a70410343d3554d8
kernel-debug-core-4.18.0-553.8.1.el8_10.x86_64.rpm
01974ace84deedd0b1f46698194a250f8e765585818f3c1819b607ee810d0e5c
kernel-debug-devel-4.18.0-553.8.1.el8_10.x86_64.rpm
174aaa862669df5120578f762e2f2812bd9985726f54bfdb9d1a2c171a1f9621
kernel-debuginfo-common-x86_64-4.18.0-553.8.1.el8_10.x86_64.rpm
58a7b4ba99a7e28658d5a1bf884d94ad1e2bc3731b6043197fb658a9c5650e39
kernel-debug-modules-4.18.0-553.8.1.el8_10.x86_64.rpm
50b55b72c05b6b75029c555ce30c6547610184fab684f56c68fcfe75b38737f9
kernel-debug-modules-extra-4.18.0-553.8.1.el8_10.x86_64.rpm
aedef7cee239cab7d13522cb2afa6dd09e28283d362f626488db3136a5047e4d
kernel-devel-4.18.0-553.8.1.el8_10.x86_64.rpm
9547eb97b7a62dc25943b8d00f0eb34c3c660522c5a3d7b886b2a3170ea3297a
kernel-doc-4.18.0-553.8.1.el8_10.noarch.rpm
a8717793a235f885bcc55160aa46c8e0b5897f0a3928d19927ceabfefd3b2fb3
kernel-doc-4.18.0-553.8.1.el8_10.noarch.rpm
a8717793a235f885bcc55160aa46c8e0b5897f0a3928d19927ceabfefd3b2fb3
kernel-headers-4.18.0-553.8.1.el8_10.x86_64.rpm
02eb8ba976663158f56ef5dc52b0db92dc9419cd02d353621fae3f83e5c20e1f
kernel-modules-4.18.0-553.8.1.el8_10.x86_64.rpm
fc682d78b214cab8b704bc6198e32ae30dfec43816ad54ff575ea3a1dc07b299
kernel-modules-extra-4.18.0-553.8.1.el8_10.x86_64.rpm
192fb778d7f8ada7dac7720e8ee5d8f9f25ed810278f18a3b963ccfd6310cc48
kernel-tools-4.18.0-553.8.1.el8_10.x86_64.rpm
f2b8ec0828f61e5c58d84a07970f58ee358a017854ad6d54c2e5fe18b8c1a644
kernel-tools-libs-4.18.0-553.8.1.el8_10.x86_64.rpm
f03cbbd4ab4270d683189441e22c910085ce6a6624b410838828cbde51ba6dbf
perf-4.18.0-553.8.1.el8_10.x86_64.rpm
bf2d61b09257ac646615360832ab9c0eac016eb1efb6ad91ac5b91e00bd75a42
python3-perf-4.18.0-553.8.1.el8_10.x86_64.rpm
89731e7753b4d52e508102bf4195c82cbd82808b2ad96f0a3d1c3ba82412e247
RLSA-2024:4620
Important: libndp security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libndp.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libndp is a library (used by NetworkManager) that provides a wrapper for the IPv6 Neighbor Discovery Protocol. It also provides a tool named ndptool for sending and receiving NDP messages.
Security Fix(es):
* libndp: buffer overflow in route information length field (CVE-2024-5564)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
none-baseos-rpms
libndp-1.7-7.el8_10.i686.rpm
7adcde3fe0719e35a93f128e7d76e780132b592a4cb4584a4f1019edf544095e
libndp-1.7-7.el8_10.x86_64.rpm
5fada82ce2a48ba83fe7f140b56ccc3c264fd0ac2409728f03a847692517be2a
RLSA-2024:5101
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)
* kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
* kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939)
* kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)
* kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)
* kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802)
* kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)
* kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)
* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
* kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653)
* kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823)
* kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)
* kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)
* kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)
* kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)
* kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893)
* kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)
* kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864)
* kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845)
* (CVE-2023-28746)
* (CVE-2023-52847)
* (CVE-2021-47548)
* (CVE-2024-36921)
* (CVE-2024-26921)
* (CVE-2021-47579)
* (CVE-2024-36927)
* (CVE-2024-39276)
* (CVE-2024-33621)
* (CVE-2024-27010)
* (CVE-2024-26960)
* (CVE-2024-38596)
* (CVE-2022-48743)
* (CVE-2024-26733)
* (CVE-2024-26586)
* (CVE-2024-26698)
* (CVE-2023-52619)
Bug Fix(es):
* Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678)
* [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841)
* [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941)
* lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437)
* [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074)
* Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167)
* blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939)
* (JIRA:Rocky Linux-31798)
* (JIRA:Rocky Linux-10263)
* (JIRA:Rocky Linux-40901)
* (JIRA:Rocky Linux-43547)
* (JIRA:Rocky Linux-34876)
Enhancement(s):
* [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.16.1.el8_10.x86_64.rpm
88c5629b6dcb87552b5d1dcb9a2b6cf734ed252f060d76a8bc5c83ab93bd8bd0
kernel-4.18.0-553.16.1.el8_10.x86_64.rpm
dd95da27c8c913c9609bc92aea741dd20255b6c44b4629e817da5c5260c04652
kernel-abi-stablelists-4.18.0-553.16.1.el8_10.noarch.rpm
dda1de03cb73fb30ba5e07ebf6e6545abaec396b191e59181a82393c773a5b90
kernel-abi-stablelists-4.18.0-553.16.1.el8_10.noarch.rpm
dda1de03cb73fb30ba5e07ebf6e6545abaec396b191e59181a82393c773a5b90
kernel-core-4.18.0-553.16.1.el8_10.x86_64.rpm
a5df23f528185f2645d8af7a9476553b2bd08519ce89953ab56316f14b102015
kernel-cross-headers-4.18.0-553.16.1.el8_10.x86_64.rpm
aaab879f8a41d5e02d2552acff8edfa6ca9eb417ddd04d02e0e2394987c5cff4
kernel-debug-4.18.0-553.16.1.el8_10.x86_64.rpm
4ac66a75e1e4a06d3f9bf0393a5807aa42564fb25515558e42c2f468365f11fa
kernel-debug-core-4.18.0-553.16.1.el8_10.x86_64.rpm
8b1212ce372d7254c8eede750eb14b40f40da1b52e5307291a5911ca72b36fdb
kernel-debug-devel-4.18.0-553.16.1.el8_10.x86_64.rpm
7f7ce4dec417e31920f827fedffd5007f9dd27b2eb2751c780653edbb72095e3
kernel-debuginfo-common-x86_64-4.18.0-553.16.1.el8_10.x86_64.rpm
160102db22b007ad0cef1902b756075546aceff75028d3116114ea64310bc6d2
kernel-debug-modules-4.18.0-553.16.1.el8_10.x86_64.rpm
56307b98c9a2e2258fce487c4e9085bee977719928438090a7cca9925d74cbca
kernel-debug-modules-extra-4.18.0-553.16.1.el8_10.x86_64.rpm
4ec620c0dee99307e769a7d18625010941984bcd64e2200465702abbc5cf4fc5
kernel-devel-4.18.0-553.16.1.el8_10.x86_64.rpm
7a52fd72d31935c571b0e4c6bb9763ef2267c234f16848ce5a093cbcd7a16692
kernel-doc-4.18.0-553.16.1.el8_10.noarch.rpm
8fb650a74d20d34146b9a685185018288e5afb32478ff15368b5d1336207ce4a
kernel-doc-4.18.0-553.16.1.el8_10.noarch.rpm
8fb650a74d20d34146b9a685185018288e5afb32478ff15368b5d1336207ce4a
kernel-headers-4.18.0-553.16.1.el8_10.x86_64.rpm
d4d6c494899ef37f9c9f2ce678f97ea1b8590ec8db8f17d5181e3d53d1446a5c
kernel-modules-4.18.0-553.16.1.el8_10.x86_64.rpm
d5ee283085de022d9bc248a1a5584a8838b4b6d18f84a945954592f47c8c990a
kernel-modules-extra-4.18.0-553.16.1.el8_10.x86_64.rpm
acb93dd835e10e39f109bcf3a3ec692dcf049bd5bd963f4c0824afa05f69baf4
kernel-tools-4.18.0-553.16.1.el8_10.x86_64.rpm
41929c71e5547b0241d6017a6904c1efe4c9f4d2157c6a20e2ab0bb995da104b
kernel-tools-libs-4.18.0-553.16.1.el8_10.x86_64.rpm
6b0538aaed36f7509bcd9b54e184fd940a0885170b54e5707b74bb7abb1c7fb9
perf-4.18.0-553.16.1.el8_10.x86_64.rpm
4c7c3d45526372f400f3acbaf9d3eac34672ccf1c56147d02f5e96cc68b45f2b
python3-perf-4.18.0-553.16.1.el8_10.x86_64.rpm
2fe4228c21c03477c61905c69d557ed34421c3117546576ea683e359ba2c099c
RLSA-2024:5530
Important: python-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for python-setuptools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages.
Security Fix(es):
* pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-setuptools-39.2.0-8.el8_10.noarch.rpm
1d939bb64adcd70c11c2dba4da66d123036ba303719fab3d2e6b0b1f742efd7e
platform-python-setuptools-39.2.0-8.el8_10.noarch.rpm
1d939bb64adcd70c11c2dba4da66d123036ba303719fab3d2e6b0b1f742efd7e
python3-setuptools-39.2.0-8.el8_10.noarch.rpm
bcb685f02a8d2bfeed90454e42b001cffae87ef80c1572822cbb769fe8092bbc
python3-setuptools-39.2.0-8.el8_10.noarch.rpm
bcb685f02a8d2bfeed90454e42b001cffae87ef80c1572822cbb769fe8092bbc
python3-setuptools-wheel-39.2.0-8.el8_10.noarch.rpm
bac06e301b93b49d498016a0cf652ee297826f034db5ddb288df1834b48a5b9a
python3-setuptools-wheel-39.2.0-8.el8_10.noarch.rpm
bac06e301b93b49d498016a0cf652ee297826f034db5ddb288df1834b48a5b9a
RLBA-2024:5915
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* [rebase] rebase sos to 4.7.2 in Rocky Linux8.10 (JIRA:Rocky Linux-49779)
* sos report dracut module takes 100s when using rpm-ostree (JIRA:Rocky Linux-33703)
* Capture the output of 'tunegfs2' for GFS2 filesystems. (JIRA:Rocky Linux-40871)
* [rebase] rebase sos to 4.7.2 in Rocky Linux9.4 (JIRA:Rocky Linux-49781)
none-baseos-rpms
sos-4.7.2-2.el8_10.noarch.rpm
0526fdfbcaf20373a0925fbe826d750203c0ea7cb6fbdc894a3e519c8f7e20ec
sos-4.7.2-2.el8_10.noarch.rpm
0526fdfbcaf20373a0925fbe826d750203c0ea7cb6fbdc894a3e519c8f7e20ec
sos-4.7.2-3.el9.noarch.rpm
d5a92e0ff408d38efbaeb8c4314eb74794be55bb479ad6b69b7ba3ca9fa5ad1f
sos-4.7.2-3.el9.noarch.rpm
d5a92e0ff408d38efbaeb8c4314eb74794be55bb479ad6b69b7ba3ca9fa5ad1f
sos-4.7.2-3.el9.noarch.rpm
d5a92e0ff408d38efbaeb8c4314eb74794be55bb479ad6b69b7ba3ca9fa5ad1f
sos-4.7.2-3.el9.noarch.rpm
d5a92e0ff408d38efbaeb8c4314eb74794be55bb479ad6b69b7ba3ca9fa5ad1f
sos-audit-4.7.2-2.el8_10.noarch.rpm
602d86eca0007b964acc1593de700af8757d63fd018fc37a405d8c5bbb95f69a
sos-audit-4.7.2-2.el8_10.noarch.rpm
602d86eca0007b964acc1593de700af8757d63fd018fc37a405d8c5bbb95f69a
sos-audit-4.7.2-3.el9.noarch.rpm
978cb330d2b881a280afcae0ffaabd9caa0266ed987a1a3048c7d82b26cd3c55
sos-audit-4.7.2-3.el9.noarch.rpm
978cb330d2b881a280afcae0ffaabd9caa0266ed987a1a3048c7d82b26cd3c55
sos-audit-4.7.2-3.el9.noarch.rpm
978cb330d2b881a280afcae0ffaabd9caa0266ed987a1a3048c7d82b26cd3c55
sos-audit-4.7.2-3.el9.noarch.rpm
978cb330d2b881a280afcae0ffaabd9caa0266ed987a1a3048c7d82b26cd3c55
RLSA-2024:6422
Important: bubblewrap and flatpak security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for flatpak, bubblewrap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces.
Security Fix(es):
* flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bubblewrap-0.4.0-2.el8_10.x86_64.rpm
2899b655f4be66eac7534acc35858209ac1a0be12117a95aa8294ad4f14bce75
RLBA-2024:6980
kexec-tools bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel.
Bug Fix(es):
* The dracut-module-setup.sh interface renaming regex is not accurate (JIRA:Rocky Linux-47130)
none-baseos-rpms
kexec-tools-2.0.26-14.el8_10.2.x86_64.rpm
6169d07b5306a18c6ce043f07aaabdf730987de703ce18531b47afce0edc0935
RLSA-2024:6975
Moderate: python3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032)
* cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923)
* python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-3.6.8-67.el8_10.rocky.0.x86_64.rpm
df9f7d5ddb4a271feac50bbda594c56a0785732abe4eeac884cf62a4b6fb5e65
python3-libs-3.6.8-67.el8_10.rocky.0.i686.rpm
ee4bb44b997d763704304d559837e9d2a828f19f47765c68ba6ea7e6b3a22862
python3-libs-3.6.8-67.el8_10.rocky.0.x86_64.rpm
3905e8ea0de4870168d799d765bf122e5138ef6330041cc638c3253b89e196f3
python3-test-3.6.8-67.el8_10.rocky.0.x86_64.rpm
9a35e692159325f6482e6206f091092b6f7d9c5f7489dbe4994fcec809965f88
RLBA-2024:6976
findutils bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for findutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments.
Bug Fix(es):
* findutils-4.9.0-8.el10: Rocky Linux SAST Automation: address 1 High impact true positive(s) [rhel-8.10.z] (JIRA:Rocky Linux-45720)
none-baseos-rpms
findutils-4.6.0-23.el8_10.x86_64.rpm
c9493548ff0e51d8db2ee1969f4ad8e3d774426a5314294d5c0f252509c7d0c8
RLBA-2024:6977
systemd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* [spec] do not create symlink /etc/systemd/system/syslog.service (JIRA:Rocky Linux-13179)
none-baseos-rpms
systemd-239-82.el8_10.2.i686.rpm
48802060a7c077bc206c1ff090e982680943411c2a88a57bb0d28602b0737fd3
systemd-239-82.el8_10.2.x86_64.rpm
26044bf586d7458dc417434d6bf1951366daedf1ed510eecbe738729c3dbaafc
systemd-container-239-82.el8_10.2.i686.rpm
9cf3bfe7211b1fb1267a62381cf96fbee8c281f3c7659b0e59af07ce35491602
systemd-container-239-82.el8_10.2.x86_64.rpm
59c0d8d4a65baf9e72d3366fbfc872685fa1c30ec27de2e15a9fd5bb6f4e99dc
systemd-devel-239-82.el8_10.2.i686.rpm
3dc4fd44ca9b9a98a2b01658f7a3150e397095779923edf883ed01eb4088a861
systemd-devel-239-82.el8_10.2.x86_64.rpm
d4a578456394dd2e064ad72f3ba2a3348002e55635a7ab3e430d528c2f673004
systemd-journal-remote-239-82.el8_10.2.x86_64.rpm
bf0b9c83da129a4e25c52b0071410375b1acceadc3474030fcb5714d0e3c13fe
systemd-libs-239-82.el8_10.2.i686.rpm
6fdf8b0117fe73264361c052631fbf554c07e1a22931f5d3eac1823ee5a00142
systemd-libs-239-82.el8_10.2.x86_64.rpm
401eee3af67df2147d64f527f0b3284ed49586ececa343af205a04c042acd015
systemd-pam-239-82.el8_10.2.x86_64.rpm
6f38bd9aa546dcf6932dc54ad7dffc2273cf2ca8b5aa3065dec490831ff72417
systemd-tests-239-82.el8_10.2.x86_64.rpm
b98f03f1e93a33522573289e5ee7fe8de2212afb4ca2c8c98a8f0b8b525ccfe2
systemd-udev-239-82.el8_10.2.x86_64.rpm
27ab1eb0e04c31403ca52023518ef31397a48541551ec33e43887923e06b0b0c
RLBA-2024:6981
libldb bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libldb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.
Bug Fix(es):
* libldb performance regression with indexes [rhel-8] (JIRA:Rocky Linux-12109)
none-baseos-rpms
ldb-tools-2.8.0-1.el8_10.x86_64.rpm
537edf41dcd5d3199d6ff54ef671467c927f9fcc54a1f1ac932434c25af8c652
libldb-2.8.0-1.el8_10.i686.rpm
0501a87776036bdb1badb9b24bd9035652a8ddcc972ccea76586d8dfbe93cf49
libldb-2.8.0-1.el8_10.x86_64.rpm
1d1615f71e57c248fde5c23487720016686f22b4aa7388ab7fc64c8433f75d69
libldb-devel-2.8.0-1.el8_10.i686.rpm
4a72d9050e72202cfadddb04ecd1057792ffd91bafa0f540cf0ff908320bab8e
libldb-devel-2.8.0-1.el8_10.x86_64.rpm
56e0667a3ed5b27350118777a1b1e4ecc0a81a143cdd5b1f240efe2f4cd118bc
python3-ldb-2.8.0-1.el8_10.i686.rpm
dea31effdec862f9cf332dc694ecbecc4fd33caa5d8724084d9d99793783905c
python3-ldb-2.8.0-1.el8_10.x86_64.rpm
88769d1b0d94f8638473ab904d87ba7d7e335a1aa3c31afe1b8b5040fdb43d6f
RLBA-2024:6982
blktrace bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for blktrace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The blktrace packages contain a number of utilities to record the I/O trace information for the kernel to user space, and utilities to analyze and view the trace information.
Bug Fix(es):
* Rocky Linux 8.9 - blktrace is still running after duration time exceeded (JIRA:Rocky Linux-17500)
none-baseos-rpms
blktrace-1.2.0-11.el8_10.x86_64.rpm
c0c90166685a56ddc97bc428202ff167877db657023a80107f024b37f2f63714
RLBA-2024:6983
libuser bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libuser.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libuser library implements a standardized interface for manipulating and administering user and group accounts. The library uses pluggable back-ends to interface to its data sources. Sample applications modeled after those included with the shadow password suite are included.
Bug Fix(es) and Enhancement(s):
* [libuser] Rocky Linux 8.9 Tier 0 Localization (JIRA:Rocky Linux-12111)
* libuser: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-35578)
none-baseos-rpms
libuser-0.62-26.el8_10.i686.rpm
0f9c565da62f981d0b290b831c1b83d89dfe293a0a23f50c9982995f3746889c
libuser-0.62-26.el8_10.x86_64.rpm
4367760f5c2bce19124600987f474ff837bc274825f533a9d52d636f4d7c8eca
python3-libuser-0.62-26.el8_10.x86_64.rpm
e9d86d41bf04bb506257715a54ec7c7bf72d294b841d232966394ae9b1d717a9
RLSA-2024:6986
Low: nano security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for nano.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU nano is a small and friendly text editor.
Security Fix(es):
* nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file (CVE-2024-5742)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
nano-2.9.8-3.el8_10.x86_64.rpm
b6803176894c404c804ec57e5947ef4601d0f3ad525bb4d7dde6c05fc1d93111
RLSA-2024:6989
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490)
* libexpat: Integer Overflow or Wraparound (CVE-2024-45491)
* libexpat: integer overflow (CVE-2024-45492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.2.5-15.el8_10.i686.rpm
34bf97e0fdb610596da4c379bb6a3cf45d5025368a971d7ee5fd1d723b5e69d2
expat-2.2.5-15.el8_10.x86_64.rpm
61c0534f01e0df8c8ba96dbf47f2a1ca8d68bc6ad87be4449d5b8586aa63664f
expat-devel-2.2.5-15.el8_10.i686.rpm
1a9c25d235394dc6ece7678ce142bcc30d6079655acc737eb4a61ce7503e8520
expat-devel-2.2.5-15.el8_10.x86_64.rpm
8d9d925962d7c7dbf5bd67ad703040647127603f34ba107b3db4c7eb08cb9e7b
RLSA-2025:17797
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 (CVE-2022-50228)
* kernel: Bluetooth: L2CAP: Fix use-after-free (CVE-2023-53305)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.79.1.el8_10.x86_64.rpm
4757108743a7a70c6a4b005afea8421bba0175c3356755bb261dfcc067d312ef
kernel-4.18.0-553.79.1.el8_10.x86_64.rpm
5f034da7e1042a854fcb6f0631614e50fd28cc68e954cb5f9498b5ad966d7b61
kernel-abi-stablelists-4.18.0-553.79.1.el8_10.noarch.rpm
fc8a24d8e1fb8816cbc9a4d0bd90c55d4511cf1a83615456008dfb938180ef18
kernel-abi-stablelists-4.18.0-553.79.1.el8_10.noarch.rpm
fc8a24d8e1fb8816cbc9a4d0bd90c55d4511cf1a83615456008dfb938180ef18
kernel-core-4.18.0-553.79.1.el8_10.x86_64.rpm
e982cadf0bae6a8f7366256861750dad50ebb9f2394e7960ddd6dbb614c53025
kernel-debug-4.18.0-553.79.1.el8_10.x86_64.rpm
4ec4f050bc5e3278556efd54c5ee2fbc90c4437ab9ff4f62946ddd4f431d7047
kernel-debug-core-4.18.0-553.79.1.el8_10.x86_64.rpm
081d8077b719d98fa9a47891af6456a4ad88be07ce493ebbfd0854ffd058ca74
kernel-debug-devel-4.18.0-553.79.1.el8_10.x86_64.rpm
e795e66632de0b9d09331399f80c281530b640999f8210fc814549b55b7c54fb
kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64.rpm
c66503da91763c84d8acc44ece3dcee5b8176d010520ff723ed33cbeaa2b277c
kernel-debug-modules-4.18.0-553.79.1.el8_10.x86_64.rpm
753b253aa0dabaded2f59dd5a15276349689e2a2a7812e114b3a9170a9fd0a38
kernel-debug-modules-extra-4.18.0-553.79.1.el8_10.x86_64.rpm
162260d3ad11465d9af0e769a76df6554287f7db2398e2e7d747f8179c72bddc
kernel-devel-4.18.0-553.79.1.el8_10.x86_64.rpm
d7f73c70c1181fedd42e38797638c1bce283e1b8d4a88cbc3dbf4ba4876fe2e6
kernel-doc-4.18.0-553.79.1.el8_10.noarch.rpm
8aa38b159176d2cef0142976bdeaafbd824815186a93c6679dcb91ab78d2c296
kernel-doc-4.18.0-553.79.1.el8_10.noarch.rpm
8aa38b159176d2cef0142976bdeaafbd824815186a93c6679dcb91ab78d2c296
kernel-modules-4.18.0-553.79.1.el8_10.x86_64.rpm
75622fb68f6d08735e5bb459b58b1e07bffeac3489a9c998387c3ff6874c2be4
kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64.rpm
9800f2b67ae4f5be663fd7542e2fb62d4b13a7388090477908e00bd3d8ef6bff
kernel-tools-4.18.0-553.79.1.el8_10.x86_64.rpm
ca55b320eb96617c00dcd79f7d852b66e58a568507535be252a140a682523a04
kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64.rpm
be2f539e39b9a668382f5f609d128d45f914adac0081590981469d857bc67592
perf-4.18.0-553.79.1.el8_10.x86_64.rpm
ff00a4265d0c41474a407b690420fef7461489298b75efedea6fa18669b34d83
python3-perf-4.18.0-553.79.1.el8_10.x86_64.rpm
d90d619c865bdc4a4f870486575d1f528135772537df48f6fe98d1f40f6eb755
RLSA-2024:7848
Low: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-1.1.1k-14.el8_10.x86_64.rpm
18d40b3765711cce2ae376d82c93d047792a6f8a8d18c082d814e9dabcfb1126
openssl-devel-1.1.1k-14.el8_10.i686.rpm
d4806751c4b939918bc8a8feb34a8a2b2bf26a5f676b6b800c236b14cef13eb2
openssl-devel-1.1.1k-14.el8_10.x86_64.rpm
d9f06faeb9a83214642d8cc8c9b9891defe5493696f9c41ca322c471fa9f1277
openssl-libs-1.1.1k-14.el8_10.i686.rpm
c8f4ee93606fa9abec120336e29e1cdbd35529340cd2dcbaa67b7621e3e827d7
openssl-libs-1.1.1k-14.el8_10.x86_64.rpm
03bc23973ae2f1c85cd8db82cc0ee0a142dd66044bb299bfd72744d029f78800
openssl-perl-1.1.1k-14.el8_10.x86_64.rpm
e50b815d5cb1440c6e5601971a12b0045cb73ced27c634300f482708c00fe159
RLEA-2024:8159
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
* microcode_ctl: kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R) [rhel-8.10.0] (JIRA:Rocky Linux-30859)
* microcode_ctl: kernel: Local information disclosure on Intel(R) Atom(R) processors [rhel-8.10.0] (JIRA:Rocky Linux-30862)
* microcode_ctl: kernel: Local information disclosure in some Intel(R) processors [rhel-8.10.0] (JIRA:Rocky Linux-30865)
* microcode_ctl: kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode [rhel-8.10.0] (JIRA:Rocky Linux-30868)
* microcode_ctl: kernel: Possible Denial of Service on Intel(R) Processors [rhel-8.10.0] (JIRA:Rocky Linux-30871)
* microcode_ctl: intel-microcode: Race conditions in some Intel(R) Processors [rhel-8] (JIRA:Rocky Linux-41093)
* microcode_ctl: intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors [rhel-8.10.z] (JIRA:Rocky Linux-41108)
none-baseos-rpms
microcode_ctl-20240531-1.el8_10.x86_64.rpm
c12ca5d0f6547835c6d445f389ca2c67d3cde7c19f6cbbbda850294cdc35b358
RLBA-2024:8805
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8, Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2024b, which addresses recent
changes. Notably:
* This is an optional update. This update does not contain any urgent time zone changes.
* Several changes to improve historical data and conformance.
* A variety of changes documented in detail in the NEWS file.
none-baseos-rpms
tzdata-2024b-2.el9.noarch.rpm
0bd4b46ca3ca42d5dc6f03d08cbf3af50c606053942bb610574c8701c9001244
tzdata-2024b-2.el9.noarch.rpm
0bd4b46ca3ca42d5dc6f03d08cbf3af50c606053942bb610574c8701c9001244
tzdata-2024b-2.el9.noarch.rpm
0bd4b46ca3ca42d5dc6f03d08cbf3af50c606053942bb610574c8701c9001244
tzdata-2024b-2.el9.noarch.rpm
0bd4b46ca3ca42d5dc6f03d08cbf3af50c606053942bb610574c8701c9001244
tzdata-2024b-4.el8.noarch.rpm
f414a56c04ba79814455084acd08fdb629ec60f262b38536458f70538d870767
tzdata-2024b-4.el8.noarch.rpm
f414a56c04ba79814455084acd08fdb629ec60f262b38536458f70538d870767
RLEA-2024:8852
libproxy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libproxy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libproxy packages provide a library that handles all the details of proxy configuration. The libproxy library provides a stable external API, dynamic adjustment to changing network topology, and small core footprint. It does not use external dependencies within the libproxy core, however libproxy plug-ins may have dependencies.
Bug Fix(es) and Enhancement(s):
* libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [rhel-8.10.0] (JIRA:Rocky Linux-30660)
none-baseos-rpms
libproxy-0.4.15-5.5.el8_10.i686.rpm
cbbc11d6287b3ab86a5c336af95f0c9b6c6d00c4d207d5fa7b7d18eb34f98ecb
libproxy-0.4.15-5.5.el8_10.x86_64.rpm
d41213a16c07034463763a3dfb9963f99b72e9cde1d2e03430a760b6a44c8d87
python3-libproxy-0.4.15-5.5.el8_10.noarch.rpm
8cef7931b27c0f17dff2d75c16d7234fab2334523d64c49271939e4c1f77a7f7
python3-libproxy-0.4.15-5.5.el8_10.noarch.rpm
8cef7931b27c0f17dff2d75c16d7234fab2334523d64c49271939e4c1f77a7f7
RLBA-2024:8854
grub2 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grub2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Bug Fix(es):
* BLS snippets in /boot/loader/entries are improperly labeled with "module_object_t" SELinux context (JIRA:Rocky Linux-4395)
* [Rocky Linux8.10/Grub/SCAP/Bug] conflicting requirements of permissions on grub2-pc grub.cfg (JIRA:Rocky Linux-58835)
none-baseos-rpms
grub2-common-2.02-158.el8_10.rocky.0.1.noarch.rpm
7ac05d14c767cf0b47b36e9db8242fbae280a60e47ed42b10940d6b376db1031
grub2-common-2.02-158.el8_10.rocky.0.1.noarch.rpm
7ac05d14c767cf0b47b36e9db8242fbae280a60e47ed42b10940d6b376db1031
grub2-efi-aa64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
5814cbf5ac6d266f94d1c08f39d4d02fb96cdd3b103709b30cee8dc5796ee555
grub2-efi-aa64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
5814cbf5ac6d266f94d1c08f39d4d02fb96cdd3b103709b30cee8dc5796ee555
grub2-efi-ia32-2.02-158.el8_10.rocky.0.1.x86_64.rpm
b3ea83fb7e2e076890904358fa4a8c2e375e0430a9375b132588ea2397211b89
grub2-efi-ia32-cdboot-2.02-158.el8_10.rocky.0.1.x86_64.rpm
7ee83a120119c280cd5f8dce037cb0c6865abfadc131665f5357ead2f68817b7
grub2-efi-ia32-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
90a64a141a8111b7f4f7f219ff54530a0d5687992f563f77f0125701b265e835
grub2-efi-ia32-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
90a64a141a8111b7f4f7f219ff54530a0d5687992f563f77f0125701b265e835
grub2-efi-x64-2.02-158.el8_10.rocky.0.1.x86_64.rpm
41ad7c4bbf8b86823492f889eb22666d5019463bf1756c0a92580e404e41c80a
grub2-efi-x64-cdboot-2.02-158.el8_10.rocky.0.1.x86_64.rpm
49b4ebb54ba8f7edcc34ed8c6e4d295060081d551e5c1ec3a9ec897bf4956988
grub2-efi-x64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
8c01f46d0353c0234a2458f0430e723a1b66ea6c69b047088ceec25e120b11f5
grub2-efi-x64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
8c01f46d0353c0234a2458f0430e723a1b66ea6c69b047088ceec25e120b11f5
grub2-pc-2.02-158.el8_10.rocky.0.1.x86_64.rpm
f3ceeb4bedb36b53bcc39c6d2051cee02449cc5deb8890b308492707d1d6583b
grub2-pc-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
21193ab9db8e8a345171e3737ee71a65e7d506423fbf9062865bca245d3fc8f8
grub2-pc-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm
21193ab9db8e8a345171e3737ee71a65e7d506423fbf9062865bca245d3fc8f8
grub2-tools-2.02-158.el8_10.rocky.0.1.x86_64.rpm
cefb30ae61948ddb61053dacbbe509c36edac42c26a9ef4c0bc3cb18d11c5751
grub2-tools-efi-2.02-158.el8_10.rocky.0.1.x86_64.rpm
07ea927ea7b461bea9c52f93f1404fae01a4e45b2982c85173103981431c09de
grub2-tools-extra-2.02-158.el8_10.rocky.0.1.x86_64.rpm
d4c46ec94aa9d4ff0f10ae1573f342a182fd1b2aabb8fccd520fe79b08b3acef
grub2-tools-minimal-2.02-158.el8_10.rocky.0.1.x86_64.rpm
fc9fd990ae0122d154967cb162ea9cebbd632342658da81fd1b9dd7ae802dfcb
RLBA-2024:8855
chrony bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chrony.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The chrony suite, chronyd and chronyc, is an advanced implementation of the Network Time Protocol (NTP), specially designed to support systems with intermittent connections. It can synchronize the system clock with NTP servers, hardware reference clocks, and manual input. It can also operate as an NTPv4 (RFC 5905) server or peer to provide a time service to other computers in the network.
Bug Fix(es):
* Enable support for AES-CMAC into chrony 4.5.z with Rocky Linux 8.10 (JIRA:Rocky Linux-59032)
* chronyd crashing [rhel-8.10.z] (JIRA:Rocky Linux-59112)
none-baseos-rpms
chrony-4.5-2.el8_10.x86_64.rpm
e20c27df84b673dee278b8995100442429cc1423760027bee249c7a2774de2f9
RLSA-2024:8856
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857)
* kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492)
* kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851)
* kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924)
* kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017)
* kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976)
* kernel: nouveau: lock the client object tree. (CVE-2024-27062)
* kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839)
* kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898)
* kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939)
* kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608)
* kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)
* kernel: of: module: add buffer overflow check in of_modalias() (CVE-2024-38541)
* kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540)
* kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503)
* kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924)
* kernel: ipv6: prevent possible NULL deref in fib6_nh_init() (CVE-2024-40961)
* kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983)
* kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." (CVE-2024-40984)
* kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773)
* kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009)
* kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042)
* kernel: ibmvnic: Add tx check to prevent skb leak (CVE-2024-41066)
* kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092)
* kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)
* kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070)
* kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079)
* kernel: USB: serial: mos7840: fix crash on resume (CVE-2024-42244)
* kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)
* kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292)
* kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301)
* kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)
* kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880)
* kernel: gso: do not skip outer ip header in case of ipip and net_failover (CVE-2022-48936)
* kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889)
* kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892)
* kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935)
* kernel: bonding: fix xfrm real_dev null pointer dereference (CVE-2024-44989)
* kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990)
* kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)
* kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826)
* kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (CVE-2024-47668)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.27.1.el8_10.x86_64.rpm
7350d5d8d668f81fa82d6504cc20579c47410d042134da8d81ba916e9cb84a8b
kernel-4.18.0-553.27.1.el8_10.x86_64.rpm
75f7258d755d54f73f63eddfa83bca3b28419ba7dc1e941eeec115fc4b8f0c0f
kernel-abi-stablelists-4.18.0-553.27.1.el8_10.noarch.rpm
d72ee6a6ae36b2d434a126ed68f3d248f2faeaaa0ea8a00b8d86de1b19952d18
kernel-abi-stablelists-4.18.0-553.27.1.el8_10.noarch.rpm
d72ee6a6ae36b2d434a126ed68f3d248f2faeaaa0ea8a00b8d86de1b19952d18
kernel-core-4.18.0-553.27.1.el8_10.x86_64.rpm
9de543df6b4283a5057082040e7debbfd4300b09e31bc501de6ba5bb3c705e61
kernel-cross-headers-4.18.0-553.27.1.el8_10.x86_64.rpm
98d4608e0ec5f65932f6af116e98f1b69e904079d29e792f9813a6b8f8d8c241
kernel-debug-4.18.0-553.27.1.el8_10.x86_64.rpm
50f9fca4acba2c0b1a6e8099730d4a5e6eb6b54f4d56ebdc14e377c60bbdfe11
kernel-debug-core-4.18.0-553.27.1.el8_10.x86_64.rpm
ff624fd33cead14d2cc2f9ebc49ab55e6cea2f66b253f800dae6f7b710e71c6a
kernel-debug-devel-4.18.0-553.27.1.el8_10.x86_64.rpm
fca6320f6882c518902d9794417a1ac53aaae32fde0f6125d592da6a766eca06
kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64.rpm
d3c5c4eed84b16737b74b7df3f8d5c24aae4a8468e6d9b7737ceb5940c91addf
kernel-debug-modules-4.18.0-553.27.1.el8_10.x86_64.rpm
bb03cbf8d6c89d0506211b9af93002c974db87f3f982332d3cbdceadd621cf24
kernel-debug-modules-extra-4.18.0-553.27.1.el8_10.x86_64.rpm
fbcfa4c2321cbcafdb177c3ed640e7cad7110ebad12da0a151bd930a490fdfff
kernel-devel-4.18.0-553.27.1.el8_10.x86_64.rpm
25c4e5d1ad05da879b4ca73bd15679c038fa0b74f4e9553d29e658eb9a914f09
kernel-doc-4.18.0-553.27.1.el8_10.noarch.rpm
5bfcdf6525369d32ddae9a4d73e97f9ede62fd6355513cc0fcae450c3e34d1f0
kernel-doc-4.18.0-553.27.1.el8_10.noarch.rpm
5bfcdf6525369d32ddae9a4d73e97f9ede62fd6355513cc0fcae450c3e34d1f0
kernel-headers-4.18.0-553.27.1.el8_10.x86_64.rpm
9150f8d9bb531d9bbeaf1a2c98ac5d815247a5c1016fa767a7ce5327bbca71d9
kernel-modules-4.18.0-553.27.1.el8_10.x86_64.rpm
2bc901103dcca2f56e008992ca25e037e83a5f5b5ac49130cacfaef05f8dfe98
kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64.rpm
f43a16113d7eaf881e8bb3050fc6a62e489eb647672f8e5c374af9083122321f
kernel-tools-4.18.0-553.27.1.el8_10.x86_64.rpm
f925a9b11608966c791609ef8e8b116447bc8073c0a8be20a8022f87f76844ef
kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64.rpm
23933dd29c487d627afa4aceb6fc75283cffff5bb92af17be7a549f687a69185
perf-4.18.0-553.27.1.el8_10.x86_64.rpm
afd540b1ce9d3dccf87d364133c431b50cf09b390cd383ae9bd824e05e2cd6aa
python3-perf-4.18.0-553.27.1.el8_10.x86_64.rpm
bf803928e455595e05ca96de7cbf6a55a550ccabe1f041306350a46135a07792
RLEA-2024:8857
microcode_ctl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Bug Fix(es) and Enhancement(s):
* microcode_ctl: Denial of Service [rhel-8.10.z] (JIRA:Rocky Linux-59081)
none-baseos-rpms
microcode_ctl-20240910-1.el8_10.x86_64.rpm
cbafd011353c49eb44b0eb39add3b960412f8145ff67f9012096e7fd57ae86c3
RLBA-2024:8858
linux-firmware bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Bug Fix(es):
* Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-62359)
none-baseos-rpms
iwl1000-firmware-39.31.5.1-125.el8_10.1.noarch.rpm
a66528012cc956ae20d41308e6611bb9f129f51c517cd8b4ef5e34fb276a932f
iwl1000-firmware-39.31.5.1-125.el8_10.1.noarch.rpm
a66528012cc956ae20d41308e6611bb9f129f51c517cd8b4ef5e34fb276a932f
iwl100-firmware-39.31.5.1-125.el8_10.1.noarch.rpm
fba5e32e3ae6034543159d5ab4b05d5344f6e8345184bfe925a7f3f3ccdaabba
iwl100-firmware-39.31.5.1-125.el8_10.1.noarch.rpm
fba5e32e3ae6034543159d5ab4b05d5344f6e8345184bfe925a7f3f3ccdaabba
iwl105-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
accc10162f0f3697868a1a77055d1f35d380db5613e1b4ae0ffc398fcf7db594
iwl105-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
accc10162f0f3697868a1a77055d1f35d380db5613e1b4ae0ffc398fcf7db594
iwl135-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
442ecd6f7e593bca75cb8af3902d0c56eac5821798ef22746a6a3d823d23607d
iwl135-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
442ecd6f7e593bca75cb8af3902d0c56eac5821798ef22746a6a3d823d23607d
iwl2000-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
9d3dc1710d002797c9373aee7202977f893c5a9947465a7c6357b10ab63eed74
iwl2000-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
9d3dc1710d002797c9373aee7202977f893c5a9947465a7c6357b10ab63eed74
iwl2030-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
133c2cae6c4bdda644980bff538282a18163103f61d20ebf5669e1cbfb5595aa
iwl2030-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
133c2cae6c4bdda644980bff538282a18163103f61d20ebf5669e1cbfb5595aa
iwl3160-firmware-25.30.13.0-125.el8_10.1.noarch.rpm
f8d85082d45d3eb5c54033027965d10f4850210a1665dc5fe032cdbfd67e506a
iwl3160-firmware-25.30.13.0-125.el8_10.1.noarch.rpm
f8d85082d45d3eb5c54033027965d10f4850210a1665dc5fe032cdbfd67e506a
iwl3945-firmware-15.32.2.9-125.el8_10.1.noarch.rpm
2f3da47cda51d118bf88b40085bdd05f11c1d30341e9247c8f1d25bde87c1c33
iwl3945-firmware-15.32.2.9-125.el8_10.1.noarch.rpm
2f3da47cda51d118bf88b40085bdd05f11c1d30341e9247c8f1d25bde87c1c33
iwl4965-firmware-228.61.2.24-125.el8_10.1.noarch.rpm
65688a2a8c2957ca69df1141ba779e89ee91ce22a682245f97a4c133162f6eb5
iwl4965-firmware-228.61.2.24-125.el8_10.1.noarch.rpm
65688a2a8c2957ca69df1141ba779e89ee91ce22a682245f97a4c133162f6eb5
iwl5000-firmware-8.83.5.1_1-125.el8_10.1.noarch.rpm
09b18ab9dcdbf2a718f15297ede7c88b4f280f364aae58c33e03154f9a6997e7
iwl5000-firmware-8.83.5.1_1-125.el8_10.1.noarch.rpm
09b18ab9dcdbf2a718f15297ede7c88b4f280f364aae58c33e03154f9a6997e7
iwl5150-firmware-8.24.2.2-125.el8_10.1.noarch.rpm
b39d6682ed74ae05d9fc3e8a82bc894feb6df7c541c9171426b293072afbf091
iwl5150-firmware-8.24.2.2-125.el8_10.1.noarch.rpm
b39d6682ed74ae05d9fc3e8a82bc894feb6df7c541c9171426b293072afbf091
iwl6000-firmware-9.221.4.1-125.el8_10.1.noarch.rpm
a9718054c9d79f701661b8bfbc610a51f2d05e43ed33676f6d0250399e8e0884
iwl6000-firmware-9.221.4.1-125.el8_10.1.noarch.rpm
a9718054c9d79f701661b8bfbc610a51f2d05e43ed33676f6d0250399e8e0884
iwl6000g2a-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
d01b1866e8d7b478593ee1767c0354bba6e29a5b2fe7527e4d13a35d747af0b0
iwl6000g2a-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
d01b1866e8d7b478593ee1767c0354bba6e29a5b2fe7527e4d13a35d747af0b0
iwl6000g2b-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
e566a80fdf6b48d80a14f01c0695600cc4ea074c298faeec311606a11d76fcaa
iwl6000g2b-firmware-18.168.6.1-125.el8_10.1.noarch.rpm
e566a80fdf6b48d80a14f01c0695600cc4ea074c298faeec311606a11d76fcaa
iwl6050-firmware-41.28.5.1-125.el8_10.1.noarch.rpm
ad395b814f8c1c21d68ec905e209539214110860e9318f83cca673e07a2b51e1
iwl6050-firmware-41.28.5.1-125.el8_10.1.noarch.rpm
ad395b814f8c1c21d68ec905e209539214110860e9318f83cca673e07a2b51e1
iwl7260-firmware-25.30.13.0-125.el8_10.1.noarch.rpm
a0af61194dc88b4d645867c9bf346ae4b69c05df70030d33e03aacb75fe89745
iwl7260-firmware-25.30.13.0-125.el8_10.1.noarch.rpm
a0af61194dc88b4d645867c9bf346ae4b69c05df70030d33e03aacb75fe89745
libertas-sd8686-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
daa97b1a030ef6c4bcab8cf8a2097d53134eccc133a723d417631bca1f301b4c
libertas-sd8686-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
daa97b1a030ef6c4bcab8cf8a2097d53134eccc133a723d417631bca1f301b4c
libertas-sd8787-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
a71b4f019ddcadd243b08550a7fb764678b534ea334f5fc6b9dd7afd42aa664a
libertas-sd8787-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
a71b4f019ddcadd243b08550a7fb764678b534ea334f5fc6b9dd7afd42aa664a
libertas-usb8388-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
4bab692d7831674103e18bd960b4f5dd2c72cf617b38a0b42d7a82ff49ef4b9f
libertas-usb8388-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
4bab692d7831674103e18bd960b4f5dd2c72cf617b38a0b42d7a82ff49ef4b9f
libertas-usb8388-olpc-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
fa3203a938e9560ed0be442a6395e1057ea9990bb1d8cc5afd65ab06197a9dd2
libertas-usb8388-olpc-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
fa3203a938e9560ed0be442a6395e1057ea9990bb1d8cc5afd65ab06197a9dd2
linux-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
9a7fadb3f747503109a5c263b3762a490f1193c31a9fb7da944c82078df2f4bc
linux-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm
9a7fadb3f747503109a5c263b3762a490f1193c31a9fb7da944c82078df2f4bc
RLSA-2024:8859
Moderate: xmlrpc-c security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* libexpat: Integer Overflow or Wraparound (CVE-2024-45491)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
xmlrpc-c-1.51.0-10.el8_10.i686.rpm
2353e624b56392a279dc13c472779ab656f88794ff5d7d362be7f96350e8f17d
xmlrpc-c-1.51.0-10.el8_10.x86_64.rpm
a291748064b5e9b96895b3752a1c024d7accd5a42b562f76d6eefe968fd49bef
xmlrpc-c-client-1.51.0-10.el8_10.i686.rpm
5c2c3707e60378bfe551543ce18ae5b3e341d321efb7f32111ee47738aa611b5
xmlrpc-c-client-1.51.0-10.el8_10.x86_64.rpm
8b03c125a7910a8363c744836320eef2b8d209dd3a4c67f2018f8a588097f2a3
RLSA-2024:8860
Important: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* freeradius: forgery attack (CVE-2024-3596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
krb5-devel-1.18.2-30.el8_10.i686.rpm
acab2425fa6abebc6966dcb1faf7fb13b1f748c188f98971181ad5d58050f685
krb5-devel-1.18.2-30.el8_10.x86_64.rpm
af4acbbcf008f05c9d0ce1d34e7d163bc8f994e4c027f507ecaaaf57d1c6a85a
krb5-libs-1.18.2-30.el8_10.i686.rpm
6ce55eeda8cc969a84a70f4df8b63b2b146a17b6661b3eda42137ad4a981bb7c
krb5-libs-1.18.2-30.el8_10.x86_64.rpm
7f20b45ff0cdd6655f691e12518aa795dc447cbdb0fe20e4a5dcac5dc782bb90
krb5-pkinit-1.18.2-30.el8_10.i686.rpm
731b61baa597b70e7beb08304e4e3ce446ef47b2fe40c556c498766ac2d1900b
krb5-pkinit-1.18.2-30.el8_10.x86_64.rpm
014920157a0d8e3e7b8828847a640aab91b9a223728aff2673f4c5f91efb2914
krb5-server-1.18.2-30.el8_10.i686.rpm
dde079ef1ebc63ca35b78e771467233a714d381f10463fc76a6010a77dee5fc1
krb5-server-1.18.2-30.el8_10.x86_64.rpm
3c7d68c85a2e8a630e73e4c6992393f22864461fc8d300f49c40daa348c0ffe5
krb5-server-ldap-1.18.2-30.el8_10.i686.rpm
2e156cace20b5c4c058f0ad89ab90742ed6123e1380a2e6ecc87d653e0ac78fe
krb5-server-ldap-1.18.2-30.el8_10.x86_64.rpm
7c0f8d349c008c30603f2b486b9253f51934aebf4ada9b58c18032060fed56b8
krb5-workstation-1.18.2-30.el8_10.x86_64.rpm
d5904073fda2dd791c3d682f052fb3ca5147494b27741d1abda82b842b5dd850
libkadm5-1.18.2-30.el8_10.i686.rpm
b860ab9aed6d3728d653d46a89371fa3458d50bc8fdbc4d6bfc664dd5acae662
libkadm5-1.18.2-30.el8_10.x86_64.rpm
ed75ed1e2fe5c296071294c910ff231a93cc858ec0d9b173b7def39c8ed5504c
RLBA-2024:8861
openldap bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network.
Bug Fix(es):
* LDAPChannel binding enforced on AD with AD cert using EDCSA-SHA384 ( NOT RSA)- sssd kerberos SASL fails with STARTTLS enabled on AD LDAP Port while it works with AD cert using RSA (JIRA:Rocky Linux-35538)
none-baseos-rpms
openldap-2.4.46-20.el8_10.i686.rpm
3ae7ec7772715831ccb4161e3bdf44e75ffc92867636a5e392a8bf4f606ee9b6
openldap-2.4.46-20.el8_10.x86_64.rpm
099731c0303a4dbe542577c6ede6347878606b5dd386481b746b98c8f3edd095
openldap-clients-2.4.46-20.el8_10.x86_64.rpm
aa91a61331539bc2a959515f5fff33b49d029a6fc1872c0dafdc4f0a7fef2a1b
openldap-devel-2.4.46-20.el8_10.i686.rpm
7477883d3817721e0361606eb9a9f87ccc566d97031603629d9be5a2e31020a9
openldap-devel-2.4.46-20.el8_10.x86_64.rpm
d77c2b9c6b058582430a30a1f5d5e8f3881785bf811b89da1989ae2f6e320a86
RLBA-2024:8866
glib2 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Bug Fix(es):
* Trashing on system internal mounts is not supported (JIRA:Rocky Linux-46828)
none-baseos-rpms
glib2-2.56.4-165.el8_10.i686.rpm
d819f60f3d7f0cdeaa760583e577a241859ab17369ee09b9795f6d68e5aa41d4
glib2-2.56.4-165.el8_10.x86_64.rpm
653e7dc5ef8db19bb46e75e8e2ea78fecce6b5cdaefc77c27700f153dc7175f1
glib2-devel-2.56.4-165.el8_10.i686.rpm
3c0ebef0276106c2698fe7ad76e771263482127d454499734b1212b9f27453ed
glib2-devel-2.56.4-165.el8_10.x86_64.rpm
5efb9e58fd3503f158ade42c6a3d56c40ebd599b9a3990e6e2b5b92f0778f58c
glib2-fam-2.56.4-165.el8_10.x86_64.rpm
c3afe88a019997c7cd7bfef45b25d463aebdb096e68a2fb6e3d85a9bb441adfa
glib2-tests-2.56.4-165.el8_10.x86_64.rpm
2793c12743f6db63923865b44b30e4b1eea6a69a977dbf145691d3f525be08ad
RLSA-2024:8922
Low: bzip2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for bzip2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs.
Security Fix(es):
* bzip2: out-of-bounds write in function BZ2_decompress (CVE-2019-12900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bzip2-1.0.6-27.el8_10.x86_64.rpm
33663442e582669bad88a4eddf1cb7ec6f5e71b4577a628203600fa540a4d016
bzip2-devel-1.0.6-27.el8_10.i686.rpm
659f2450e04490174e27674ca46ea40ea6f0a3d67dde40a216cbb473f1b2926f
bzip2-devel-1.0.6-27.el8_10.x86_64.rpm
5b16c16beb3cb0475c5f889bffb2c9cd3975842f53eca8adccebdf3034874a01
bzip2-libs-1.0.6-27.el8_10.i686.rpm
9b0df2368e99bcef580f72da60fe7731f3110ebd130cd0f6163a98b32da0c7ae
bzip2-libs-1.0.6-27.el8_10.x86_64.rpm
e50288c79ae6b228be4d05b47a496f61bfb11d16c7d1ef8a2539745cc9f5aa41
RLSA-2024:9502
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: DoS via XML_ResumeParser (CVE-2024-50602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.2.5-16.el8_10.i686.rpm
24158bc28896108c1190b06480e6d531166b6de8727c205cad67dccfcb302688
expat-2.2.5-16.el8_10.x86_64.rpm
8a9abbc6a76238007f3e7b65e9b4c5d523d669dc433e968f2c78000ffaa980cb
expat-devel-2.2.5-16.el8_10.i686.rpm
01a481c7e17810ce09ce4f28855b5788d950afdc7fef7ef1b54be132d127fdb5
expat-devel-2.2.5-16.el8_10.x86_64.rpm
2796be763a9f11e0395d3e52231bdf880985b4f2a90ee1d081e9f43b1b32e8c9
RLSA-2024:9573
Important: libsoup security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libsoup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: infinite loop while reading websocket data (CVE-2024-52532)
* libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libsoup-2.62.3-6.el8_10.i686.rpm
35b5d9c071435a9221e54e56ba308e99cb4b95cee485db9bfbccb024ef06ab18
libsoup-2.62.3-6.el8_10.x86_64.rpm
3eca16716bca393a72a6d531f01fd121501c91a41528ba88aea001f304c486fc
RLSA-2024:9689
Low: binutils security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for binutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities.
Security Fix(es):
* binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
binutils-2.30-125.el8_10.x86_64.rpm
b45971a9a1f2df9710438dcb19adc0b21778a2bb3edf04d23aad107042518059
RLBA-2019:3534
libsemanage bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
libsemanage-2.9-10.el8_10.i686.rpm
b84aaacc51058337bde5da814ff2b6e9aea25af7eefdba89ccc318dc9f8ec1df
libsemanage-2.9-10.el8_10.x86_64.rpm
79e308a78eb7d93c7159042c776fc406a635aaed89819feca94a8e33f50ce184
python3-libsemanage-2.9-10.el8_10.x86_64.rpm
b58451d8a78ebaf488888a312a764ce575c730dcc78926e1e9a3537ddea47939
RLSA-2024:10281
Moderate: kernel:4.18.0 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: edia: dvbdev: fix a use-after-free (CVE-2024-27043)
* kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399)
* kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CVE-2024-38564)
* kernel: mptcp: pm: Fix uaf in __timer_delete_sync (CVE-2024-46858)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.30.1.el8_10.x86_64.rpm
6d14928a0d6bf4ac79896b5ae81d199a4ec4205f11b31312717da36afd6d38c3
kernel-4.18.0-553.30.1.el8_10.x86_64.rpm
40efc54c866b45c7485cb3d687da58e7c5813fb7cd081ae4ec7454e30a267a56
kernel-abi-stablelists-4.18.0-553.30.1.el8_10.noarch.rpm
987a44cd1a13de87d1bab74d90dae7cb192b773b48a381312fd96c937cd7be52
kernel-abi-stablelists-4.18.0-553.30.1.el8_10.noarch.rpm
987a44cd1a13de87d1bab74d90dae7cb192b773b48a381312fd96c937cd7be52
kernel-core-4.18.0-553.30.1.el8_10.x86_64.rpm
8e093520756dc858f490ad816486bd604f8a2e5f1b51cde02e7ebcda43acd207
kernel-cross-headers-4.18.0-553.30.1.el8_10.x86_64.rpm
b55b8d905bd109a8ad15e204c0193b7c39ead10cf805c46a34fa4a9f3da2cc79
kernel-debug-4.18.0-553.30.1.el8_10.x86_64.rpm
498db7d2eca00bb44f11eb65f4a15090b8c27480dd21526800439ba520ebdea8
kernel-debug-core-4.18.0-553.30.1.el8_10.x86_64.rpm
417562e3604878f7ccd9f1b41073ddd68cb3b2dd950a616b3c215f6bd477363d
kernel-debug-devel-4.18.0-553.30.1.el8_10.x86_64.rpm
c446c066f1051af1928d6ab00f16fac1f10b75017cde659d741b5f11040aa772
kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64.rpm
155e9f4ea45602860c659ae715f6cc7244acbdd176c1f747af229c0bf0406a1b
kernel-debug-modules-4.18.0-553.30.1.el8_10.x86_64.rpm
9f1fdc18d2c5636415b6f5406271069a0eff57983fad616242408d9454f0c24d
kernel-debug-modules-extra-4.18.0-553.30.1.el8_10.x86_64.rpm
10a240dcdcbef8673797b9c738fdbd1e72132aa9c0b1a610a901f5ae9ef4a6b8
kernel-devel-4.18.0-553.30.1.el8_10.x86_64.rpm
757bbe0a32a85318f7ac932584e4caf10b0422860b148c4375e1cd85a2838779
kernel-doc-4.18.0-553.30.1.el8_10.noarch.rpm
f86c40b31ee92244aa0ac6c4b4d815bb0649440a2df89a12610ea5b6ace3d8bb
kernel-doc-4.18.0-553.30.1.el8_10.noarch.rpm
f86c40b31ee92244aa0ac6c4b4d815bb0649440a2df89a12610ea5b6ace3d8bb
kernel-headers-4.18.0-553.30.1.el8_10.x86_64.rpm
cc7971802eb30b04a32dae46ebd4ab117fef9766ca1f271e4d8229b2ff1ea732
kernel-modules-4.18.0-553.30.1.el8_10.x86_64.rpm
c438914180225d063785437c0dd3c2fe5fb8a1dc6046a9e914e7f5453eb3ba73
kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64.rpm
ed22140b2989b949460995699463e79bbee16642054de4146133a06ce48220bc
kernel-tools-4.18.0-553.30.1.el8_10.x86_64.rpm
3541d97a577888bfd5e0f44c8aaca7c71437792fa46d71b8593a36ea7ca6caae
kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64.rpm
bf4cfaf335c45aa8ca63806276ab7526e2e3611e02ed2b2bc74d9dad95481ea9
perf-4.18.0-553.30.1.el8_10.x86_64.rpm
cda6a66917567f94e9bf6b33feafa97b3574a2665aa1d4400961975e04eca4a7
python3-perf-4.18.0-553.30.1.el8_10.x86_64.rpm
dbf1ac1cc21576d4995e31887c540905b39a3e9198df5f931b595312051282d3
RLSA-2024:10379
Important: pam security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* pam: libpam: Libpam vulnerable to read hashed password (CVE-2024-10041)
* pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
pam-1.3.1-36.el8_10.i686.rpm
e86794916b4c480c5c94f3510ba6dcd20741a2305efd0ab9b9367b9fa11679f3
pam-1.3.1-36.el8_10.x86_64.rpm
2bd96a4c5fe9e4db860e4e6aaafc7eba78ea0f6de763aa9603d5733aa6170234
pam-devel-1.3.1-36.el8_10.i686.rpm
378f8c9f2fce900521dc8f5580b762f614872d6904202b159a63e71fb75bc48a
pam-devel-1.3.1-36.el8_10.x86_64.rpm
25897bd92966e9a4e231522ae38b94ee2962536e9e57b7ad6dba2700f2768671
RLBA-2024:10663
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* Prepare new plugin for kea dhcp server (JIRA:Rocky Linux-40285)
* [RFE] Sudo plugin is not capturing certain logs. (JIRA:Rocky Linux-56747)
* Create bootc plugin (JIRA:Rocky Linux-58177)
* [rebase] rebase sos to 4.8.1 into Rocky Linux9 (JIRA:Rocky Linux-64159)
* [rebase] rebase sos to 4.8.1 into Rocky Linux8 (JIRA:Rocky Linux-64160)
* sos upload does not deal with 1GB limit (JIRA:Rocky Linux-22732)
* Requesting sosreport be updated to collect information related to rhc-worker-playbook (JIRA:Rocky Linux-27555)
* Include /sys/kernel/debug/sched/debug in sosreport (JIRA:Rocky Linux-44353)
* [Hyper-V][Rocky Linux-9][RFE] Capture the Hyper-V balloon debugfs file located at /sys/kernel/debug/hv-balloon in sos report (JIRA:Rocky Linux-45980)
* [REF] Capture authselect.conf (JIRA:Rocky Linux-48608)
* RFE: lru_gen is required to be included in sos (JIRA:Rocky Linux-50917)
* Unexpected formating changes in plugin and presets listing (JIRA:Rocky Linux-57675)
* sos upload does not deal with 1GB limit (JIRA:Rocky Linux-58947)
* sos report collects credentials in HTTP(S)_PROXY environment (JIRA:Rocky Linux-60130)
none-baseos-rpms
sos-4.8.1-1.el8_10.noarch.rpm
798f84da4d24032635a4088de2570411bf1ef5c2a039d7ae23c2a2b822a01161
sos-4.8.1-1.el8_10.noarch.rpm
798f84da4d24032635a4088de2570411bf1ef5c2a039d7ae23c2a2b822a01161
sos-audit-4.8.1-1.el8_10.noarch.rpm
1ec3f7ba0687d21e7f1818a2610cbdec6c71b77e0052f295c79b111f5480b70f
sos-audit-4.8.1-1.el8_10.noarch.rpm
1ec3f7ba0687d21e7f1818a2610cbdec6c71b77e0052f295c79b111f5480b70f
RLBA-2024:10735
autofs bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy.
Bug Fix(es):
* Sporadic mount failures with amd program maps on Rocky Linux8 (JIRA:Rocky Linux-52402)
* sporadic autofs daemon segfaults (JIRA:Rocky Linux-61670)
none-baseos-rpms
autofs-5.1.4-114.el8_10.1.x86_64.rpm
763a22cb4bdafaaec9425eb782a4cf24431223e786f56d1a0f04c5ed99cc9b5d
RLSA-2024:10779
Moderate: python3:3.6.8 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287)
* python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-3.6.8-69.el8_10.rocky.0.x86_64.rpm
a7e8e664d796d6acf79a086c3de1bea2e9d307f4ea15df65df37b03504ef5d26
python3-libs-3.6.8-69.el8_10.rocky.0.i686.rpm
bdc633b7f576e701fac01a6a466777343a365fe73475b7f34355f290bb6ce0db
python3-libs-3.6.8-69.el8_10.rocky.0.x86_64.rpm
70d2e92d065009f3ac5c5465607dd321944305657cb4ced0054be59779b72fc5
python3-test-3.6.8-69.el8_10.rocky.0.x86_64.rpm
7c2ac73722370e496a5ea7a3f3a1319e7bf242718fbc7a786242da1e54123233
RLSA-2024:10943
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695)
* kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (CVE-2024-49949)
* kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (CVE-2024-50082)
* kernel: arm64: probes: Remove broken LDR (literal) uprobe support (CVE-2024-50099)
* kernel: xfrm: fix one more kernel-infoleak in algo dumping (CVE-2024-50110)
* kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (CVE-2024-50142)
* kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (CVE-2024-50192)
* kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (CVE-2024-50256)
* kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (CVE-2024-50264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.32.1.el8_10.x86_64.rpm
fbc7ee8af53a168a5acf38f718c3fac9f1fb813b5da62116c4b934bcc559b313
kernel-4.18.0-553.32.1.el8_10.x86_64.rpm
c27290dfff732fda300e90f16f6ea8ed9c10bfc7944f3e079bc96cb572ef0c94
kernel-abi-stablelists-4.18.0-553.32.1.el8_10.noarch.rpm
ee3466f0292e8790260c9bc452911cc81836a95b096a75066525db2c31f2219b
kernel-abi-stablelists-4.18.0-553.32.1.el8_10.noarch.rpm
ee3466f0292e8790260c9bc452911cc81836a95b096a75066525db2c31f2219b
kernel-core-4.18.0-553.32.1.el8_10.x86_64.rpm
e2f957df26f184cb92a8614756e2377bcb0889b870538b73d8e0a5080058dbe7
kernel-cross-headers-4.18.0-553.32.1.el8_10.x86_64.rpm
ccf63c0c864f2dd86e0405b2936ceeb2cfaec17ffacec68a7c78c8da0d35883d
kernel-debug-4.18.0-553.32.1.el8_10.x86_64.rpm
18a1f420f3d42cbf959b8ba2b0a137a9dbe4820988319f556a316c52518ce8b6
kernel-debug-core-4.18.0-553.32.1.el8_10.x86_64.rpm
47776ae251e75983586a581e0c254a3afa14a2e0db519fa91ad9770ac53a4f93
kernel-debug-devel-4.18.0-553.32.1.el8_10.x86_64.rpm
f8b27f5a701f08ff1fb76a03930e09d4d44e704f334f6b14f7253419d43183fc
kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64.rpm
3a69ee2cbc9cd8731ca3dabd14ddd6d797d841aa06bb3a90a3ec3eac146e6522
kernel-debug-modules-4.18.0-553.32.1.el8_10.x86_64.rpm
44b34fd7722ce046b285c2356ad77ae80f8b87200dac3f304d17573adbb2863f
kernel-debug-modules-extra-4.18.0-553.32.1.el8_10.x86_64.rpm
278114b3148ba63f24bf1f461fa7a9714b0a847c55bca63ccde103d91a1452e4
kernel-devel-4.18.0-553.32.1.el8_10.x86_64.rpm
b5504b4cffb1b5c9051be00e42875f47b0bc71a1234eca60f98e1c5f5b2978a3
kernel-doc-4.18.0-553.32.1.el8_10.noarch.rpm
b5b18a468c2208f1c3ba868ed85b20a953ec09437e07c3ef7ec727eaf4bb8ca4
kernel-doc-4.18.0-553.32.1.el8_10.noarch.rpm
b5b18a468c2208f1c3ba868ed85b20a953ec09437e07c3ef7ec727eaf4bb8ca4
kernel-headers-4.18.0-553.32.1.el8_10.x86_64.rpm
1872a4e9fab25db4648cf01fdac577eebf34b2cc0f1e475f6a4577661335a68d
kernel-modules-4.18.0-553.32.1.el8_10.x86_64.rpm
2e1a1955726e562ed7522c95844f92828365686c11a7d0abde3735dfd4694217
kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64.rpm
cb131889945b5612f62c9813843cc1fb5547d3cb2946115bbf4d28281488a01f
kernel-tools-4.18.0-553.32.1.el8_10.x86_64.rpm
ec4623a32f6265d5a5cdd7209ab96b8d041c45b19311ba6c4fbf9df8f6b0df6e
kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64.rpm
6a593989d076a7246e4274a29490894a335f3ed2b40b72b313f2832d6787917e
perf-4.18.0-553.32.1.el8_10.x86_64.rpm
5c8e20c27547bfc583e3b89d913a756ba20b2e7233220dc01336bab34c5bfe3d
python3-perf-4.18.0-553.32.1.el8_10.x86_64.rpm
81234634881669287a9ba0cc03c3578cac8d3c4eb5e2b0708337095d606ed968
RLBA-2024:11151
sssd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* [RfE] SSSD Failover Enhancements [rhel-8.10.z] (JIRA:Rocky Linux-39085)
* SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-8.10.z] (JIRA:Rocky Linux-66267)
* sssd is skipping GPO evaluation with auto_private_groups [rhel-8.10.z] (JIRA:Rocky Linux-66272)
* possible regression of rhbz#2196521 [rhel-8.10.z] (JIRA:Rocky Linux-66277)
* Excessive "Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest [rhel-8.10.z] (JIRA:Rocky Linux-67128)
* Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-8.10.z] (JIRA:Rocky Linux-67671)
* sssd backend process segfaults when krb5.conf is invalid [rhel-8.10.z] (JIRA:Rocky Linux-68507)
none-baseos-rpms
libipa_hbac-2.9.4-5.el8_10.1.i686.rpm
ed68e9675514ba5d24854edc96596f90be4d57c9b2906b8f487398b967c1ed46
libipa_hbac-2.9.4-5.el8_10.1.x86_64.rpm
c602735a2144b592bb2fc7e332534d76c5bad870193535bfc31a3e9c9dc3ae0b
libsss_autofs-2.9.4-5.el8_10.1.x86_64.rpm
1f701dabcba8ca3d4a21deba9d44f671c5147e562de694a2839b800ec1290ed5
libsss_certmap-2.9.4-5.el8_10.1.i686.rpm
9121d09792ae9765df43287594b9e92ef03d817742405061e13f9980d2aa4edb
libsss_certmap-2.9.4-5.el8_10.1.x86_64.rpm
3cd660b0073b416fc59cfc9f892774bf2f48d854b3fb06ad80f5b456d657da59
libsss_idmap-2.9.4-5.el8_10.1.i686.rpm
cfdcdb7516c7ea1e168adb008b5a2b822e3cd11c27cc9811d016875d41d68191
libsss_idmap-2.9.4-5.el8_10.1.x86_64.rpm
4c74372bcc18f97b395b92080943a7708bedd76c2311474f90b7c7b74a4172b9
libsss_nss_idmap-2.9.4-5.el8_10.1.i686.rpm
b1220d078e3d475fedd1e013381212b2e9b7b245cf32d13f8d3b59b5f95ac130
libsss_nss_idmap-2.9.4-5.el8_10.1.x86_64.rpm
4a982046c3d5b3ec5e997defadc3eddec429d6a7a62236dea6645927b137493e
libsss_simpleifp-2.9.4-5.el8_10.1.i686.rpm
9c69e76174e2edf3609f273e26f4a2c1dec75595eb3417c1367434581306f88b
libsss_simpleifp-2.9.4-5.el8_10.1.x86_64.rpm
7f9dffc5d23008e3974dba3ae0ac735f0b65d3ce3eff289cbe333d58bfc36d03
libsss_sudo-2.9.4-5.el8_10.1.x86_64.rpm
70c9dd14654bd1054ec58192152dac38e013fab11d8f594bd461a8cb24372e08
python3-libipa_hbac-2.9.4-5.el8_10.1.x86_64.rpm
9e52ab7cde4613d125bc9e3379c829d0806c80c4447a5dfe98138e811a67367b
python3-libsss_nss_idmap-2.9.4-5.el8_10.1.x86_64.rpm
9c71fcd96577db608fd600b14815fec1e1b11fbc8cf0466d4b6deaa353342aad
python3-sss-2.9.4-5.el8_10.1.x86_64.rpm
183675115c50f61054dd2c8577a5885657fef9a9795e7a403115387a97091fc0
python3-sssdconfig-2.9.4-5.el8_10.1.noarch.rpm
e3a6b585dd61eaa2c7b007ad3e6ea3e25388ba82e0a158e8de6d669eb9359411
python3-sssdconfig-2.9.4-5.el8_10.1.noarch.rpm
e3a6b585dd61eaa2c7b007ad3e6ea3e25388ba82e0a158e8de6d669eb9359411
python3-sss-murmur-2.9.4-5.el8_10.1.x86_64.rpm
cc715fe92ca3e34cead436536dd3849e6f777f2b6b0ff36462aa73cc4982a26a
sssd-2.9.4-5.el8_10.1.x86_64.rpm
6531119586f32b0489fb385badd3ccb6591c68bc7aeecbb8ddf775b1ca89cd92
sssd-ad-2.9.4-5.el8_10.1.x86_64.rpm
93540fe49c7a7f0c4e75950f13383320a5b1b82407fbd15d99d9966d774a6f45
sssd-client-2.9.4-5.el8_10.1.i686.rpm
b1d1962a0fb919e1c5c7d2ec8248d3e284ea9d17cd999f22962a98b198ef5d90
sssd-client-2.9.4-5.el8_10.1.x86_64.rpm
bd66df0d522cfa3d82b470ea6c88bef6919a538301a8760a6c53fe8ea8abc5e6
sssd-common-2.9.4-5.el8_10.1.x86_64.rpm
fe840a7df6ff70b99d9802bcb0ffd0a800e4c4f5475636a70d3df38dd7d2f237
sssd-common-pac-2.9.4-5.el8_10.1.x86_64.rpm
fe7e83c2ae74ea317cb0ee28b120449eeb8465e832cd9d763b4fde011465ddb1
sssd-dbus-2.9.4-5.el8_10.1.x86_64.rpm
cbd5e901ebf045ea633f16a706750bce85194e80b8226cba6c8fb498fc173da0
sssd-ipa-2.9.4-5.el8_10.1.x86_64.rpm
d56296d276b6e2e254f72914a06291c1eea5b910f22b9ba2d374f352f8225a46
sssd-kcm-2.9.4-5.el8_10.1.x86_64.rpm
6116dfad4248eb355e6ce3b0d5a4408aa66a193272c036f61805c83e55d4309e
sssd-krb5-2.9.4-5.el8_10.1.x86_64.rpm
fde99f74833d2bd766b51a3bb6d44d0ff582570462cf5f82a1a75913d3bad846
sssd-krb5-common-2.9.4-5.el8_10.1.x86_64.rpm
5a7efc1ee56b9fc89076cfa3dc57ed613c89761dc3fe3765786eb776ba0ad7f1
sssd-ldap-2.9.4-5.el8_10.1.x86_64.rpm
03e780865e29beea62ca3bfaa590e1877ae13b975654a44c001d6795d9b0651e
sssd-nfs-idmap-2.9.4-5.el8_10.1.x86_64.rpm
0d83c52a01775d803bdf3ecdc3c732a942bc295e53269af876502bfef1ac126b
sssd-polkit-rules-2.9.4-5.el8_10.1.x86_64.rpm
ed16844dc383371e9770562da38145560655de2b92828e4e73ce63147a0867a6
sssd-proxy-2.9.4-5.el8_10.1.x86_64.rpm
8e0c56da66a7dc36a762e8d0749a55097e67d25abc3723eb8dd2174a5f429944
sssd-tools-2.9.4-5.el8_10.1.x86_64.rpm
90d271873d850b8f8c7c1b236ec38cf1102dc83f9b6a63fc8673bcd51c50239b
sssd-winbind-idmap-2.9.4-5.el8_10.1.x86_64.rpm
556513f2e54e73619dcd0cefa5379ffdabd548315b047ef74134939c654be746
RLBA-2024:11152
samba bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-8.10.z] (JIRA:Rocky Linux-63770)
none-baseos-rpms
ctdb-4.19.4-6.el8_10.x86_64.rpm
d63d7ebafb47acfbbdfcb412b019b0e37c7af234bc83aa88d8dde087f076ec8b
libnetapi-4.19.4-6.el8_10.i686.rpm
d1b73fd410c9a0646e307ffd687e8ff60aa3e67fb3d1e19fc330ce8bc8bd4409
libnetapi-4.19.4-6.el8_10.x86_64.rpm
af2fa4c98e5d459175c050923755c077d7c2af484bcf90f00e6891b8da90d295
libsmbclient-4.19.4-6.el8_10.i686.rpm
85aa19eeab34a33a73723a4bad4fc3e4c102ce6912f8138be6ddc1b2cc92a52f
libsmbclient-4.19.4-6.el8_10.x86_64.rpm
826f2e40552417951c3e12e2e01a1783669af91fa4ba6ecc08533196df08ccf7
libwbclient-4.19.4-6.el8_10.i686.rpm
e132849daf0130a52eb9d671beb6257a1fd01039f388982ea3b2da34e8ed30d6
libwbclient-4.19.4-6.el8_10.x86_64.rpm
f2d3ff06b8383d0e284cfd6e3b6b8deac9ffe6b34f671bd2458c848bdc58d2bf
python3-samba-4.19.4-6.el8_10.i686.rpm
38b8f7daf2f698d3f8a87b53695f811ed8eb9af7a9f3f8e4a8ea0d0abd11f950
python3-samba-4.19.4-6.el8_10.x86_64.rpm
4d8878ab79f71dd823ed5571e4f674833d8a8a99c5c76cd7535729b0087b63ae
python3-samba-dc-4.19.4-6.el8_10.x86_64.rpm
7eb7472dfe2a07b60ddec2ebdbe2eb8413ba23fecd7950ab96b3cbbf485262b8
python3-samba-test-4.19.4-6.el8_10.x86_64.rpm
706060813f2f53b9375c091759d5f759f9d28957b5e0fd1c4e4819ee2f96db20
samba-4.19.4-6.el8_10.x86_64.rpm
9b1b3fd57afd1a57be5c5991a1a69a333d4f27f1325a7bdd74b077bf4bbcbcf0
samba-client-4.19.4-6.el8_10.x86_64.rpm
461106b036c0320ae0663f1d93866b3e3adc72374db3e2b6aa2eb38b730eb616
samba-client-libs-4.19.4-6.el8_10.i686.rpm
7a847931a65c04a62bfb362256dc12b23917e6904eed33a499a5af16ecaa46be
samba-client-libs-4.19.4-6.el8_10.x86_64.rpm
5c2c541db8dc483d2c1a572d7bfcb8c326861c0f8c441cd832b1e70b582f539f
samba-common-4.19.4-6.el8_10.noarch.rpm
9a4b9dc986484607e4c649c2418155d41c967a7aec8c811b8ad287bafabeec36
samba-common-4.19.4-6.el8_10.noarch.rpm
9a4b9dc986484607e4c649c2418155d41c967a7aec8c811b8ad287bafabeec36
samba-common-libs-4.19.4-6.el8_10.i686.rpm
102b676c080686a6a4046e872bb6e18248e0671c92b7e0ad28d6536525f37d25
samba-common-libs-4.19.4-6.el8_10.x86_64.rpm
552aefb664f2070f2c01ac730d1734776c33844a7d96cfce94c264ffe87b257d
samba-common-tools-4.19.4-6.el8_10.x86_64.rpm
f4e703f9f5a66b52d75f706150fc842b73b03884f12e1d324377cca8da8b8b65
samba-dcerpc-4.19.4-6.el8_10.x86_64.rpm
2ae52cee5236502bca51e153b35099264d35d38fb3ee094826e176b4cc9a7790
samba-dc-libs-4.19.4-6.el8_10.i686.rpm
66a947778b943705bc550881331d12e0d090e85e16030dc9353084953edfd985
samba-dc-libs-4.19.4-6.el8_10.x86_64.rpm
da5aa55d90078e50187606ab2ab64ebd473f9574fba532a0fabd787fe950cb68
samba-krb5-printing-4.19.4-6.el8_10.x86_64.rpm
daf324af0af84044e8ef3923a6a143e19007cbfeff32f6d51e179bce27e7c9b9
samba-ldb-ldap-modules-4.19.4-6.el8_10.x86_64.rpm
91afd894512ef35f16fa81680bb805e9e3f2d564fd3a2222a61567b0a4f79eed
samba-libs-4.19.4-6.el8_10.i686.rpm
ed3881450d5dfdd6c2d47ec0773c05e4dee622fe7c26706ca8b87d5659647a1a
samba-libs-4.19.4-6.el8_10.x86_64.rpm
6d5b553dcf888001c49c4e2177f080fad004096f74a1fde283b70de92af4c8d4
samba-pidl-4.19.4-6.el8_10.noarch.rpm
2950ff4fd00e1e3ec495f8f484f8f7bfd16c1efbbeea2fa120a03b69b44fa3e5
samba-pidl-4.19.4-6.el8_10.noarch.rpm
2950ff4fd00e1e3ec495f8f484f8f7bfd16c1efbbeea2fa120a03b69b44fa3e5
samba-test-4.19.4-6.el8_10.x86_64.rpm
6fbf08aba50d61e92e8a1f8fe9aea6ed959396edb6014b64dfcfd5e031be5c7c
samba-test-libs-4.19.4-6.el8_10.x86_64.rpm
5de5b6d58c8b4648296a43206d1ef6319354aaa895eb0a2b759f97d35c33dfc5
samba-tools-4.19.4-6.el8_10.x86_64.rpm
9cce9fb738d2cd53c7856d5b6cdcbcd3f7d71e8f2ebe414fa10d4d725d3e4c41
samba-usershares-4.19.4-6.el8_10.x86_64.rpm
3915b03831e17116491a90e815518e1fd7b71e4159bdc41cc0df62c96c1ce7d8
samba-winbind-4.19.4-6.el8_10.x86_64.rpm
261988f526681d824b7667a20751bfd695f16afa326bca1a775f562e56b7025f
samba-winbind-clients-4.19.4-6.el8_10.x86_64.rpm
2944297016406d41ca170cf55bf2d77e4608b0efa4e71c3e66b7afdfb4d0ec23
samba-winbind-krb5-locator-4.19.4-6.el8_10.x86_64.rpm
7c02528ac602b2a6727f913ed5b12ed3f9e7fdf31f30a5778f9197e8ab19c383
samba-winbind-modules-4.19.4-6.el8_10.i686.rpm
d935826f90b38db457c495effce58896d4a23f140bbc7a7485cf0af0dadd6c3f
samba-winbind-modules-4.19.4-6.el8_10.x86_64.rpm
59a4893d13dc45ac9ed15d023df78b29e8e04f8c2292e82a6e894c83299e65b6
samba-winexe-4.19.4-6.el8_10.x86_64.rpm
6b33bf7a39884e5c8d86a9113b62f2a212801c31314972f71adf3a6a10254b92
RLBA-2024:11153
mdadm bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for mdadm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mdadm packages contain a utility for creating, managing, and monitoring Linux multiple disk (MD) devices.
Bug Fix(es):
* [INTEL Rocky Linux8.10.z BUG][VROC] Fix update_subarray on active volume - missing patch (JIRA:Rocky Linux-20833)
* [Rhel8.10.z] mdadm: After adding entry to /etc/mdadm.conf getting messages "localhost.localdomain:101" cannot be set as name. Reason: Not POSIX compatible. Value ignored" (JIRA:Rocky Linux-45608)
none-baseos-rpms
mdadm-4.2-16.el8_10.x86_64.rpm
9f71966e9aaee7e6f86b011bde7aef23f01f4924a0858e280133a411a6ecc8f6
RLBA-2024:11157
unzip bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for unzip.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unzip utility is used to list, test, and extract files from zip archives.
Bug Fix(es):
* Unzip Fails on Large Zip Files (1TB) - End-of-centdir-64 Signature Error [rhel-8.10.z] (JIRA:Rocky Linux-45997)
none-baseos-rpms
unzip-6.0-47.el8_10.x86_64.rpm
169367ac80b455a69ab62dabaee6d7465464b1d6792b5f38fd50acf1d0f524ce
RLBA-2024:11158
systemd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* Idle session setting kills the GDM process (JIRA:Rocky Linux-19215)
* User logins are super slow when system has tons of disks attached (JIRA:Rocky Linux-5877)
none-baseos-rpms
systemd-239-82.el8_10.3.i686.rpm
f31414700b2a32321c0317766b4f6e06627e86e44835ceebdf90df99bccd447e
systemd-239-82.el8_10.3.x86_64.rpm
fd10bcdd6103d6387168a5c88769436da3c51c4b7b2d5a9daaf88738dbedc49e
systemd-container-239-82.el8_10.3.i686.rpm
346db3f310eb79476e068f5cf32ea8d558ff5be82a03b937bf2d4affafb8d869
systemd-container-239-82.el8_10.3.x86_64.rpm
c8d86bbfadd5ea7775ed0d8a881fcdbe05c25c36598587405be2ce0796e670f2
systemd-devel-239-82.el8_10.3.i686.rpm
1ebf645fec9befafdc23404a0054d4865907b445c6c3fb3888e8ce8f3b83f667
systemd-devel-239-82.el8_10.3.x86_64.rpm
55291a18c4504ed8a30d580c483edef6b9deb48922ed8740edf445721c7d23f6
systemd-journal-remote-239-82.el8_10.3.x86_64.rpm
7f1c6d541a48d5e64d197be81565ac69260e4ace2bb6f6428be73b3c42354f44
systemd-libs-239-82.el8_10.3.i686.rpm
7e31b2b85fcb9b40fa7509ef6ded34a7ed2e8e5b56046a34234e6cab14f81330
systemd-libs-239-82.el8_10.3.x86_64.rpm
a8d0d63a100a16f4b001bf1659fae01138937dd8aae81c0aef6b3093832ff746
systemd-pam-239-82.el8_10.3.x86_64.rpm
3fb54abee0a72e9513e04c961c3ae2088580f4596c6636bab002bf59117e7781
systemd-tests-239-82.el8_10.3.x86_64.rpm
15e9c5efd51dba3c24f5fa6b4ab82743912a2c20528b730abef9303330f30437
systemd-udev-239-82.el8_10.3.x86_64.rpm
2496dfafe1fc64efd83ad5cdc2c0f68ea71c2a6655e0f43f9d765a080582fe28
RLBA-2024:11162
vdo bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for vdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The vdo packages provide Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage.
Bug Fix(es):
* Rocky Linux In-Place Upgrade engagement using LEAPP and am seeing the /usr/libexec/vdoprepareforlvm --check fail on a read-only disk. (JIRA:Rocky Linux-65721)
none-baseos-rpms
vdo-6.2.11.5-14.el8_10.x86_64.rpm
011fbc4eb6db23cf541c4bf2218181c8d04544460f18a8812e021603f838d376
vdo-support-6.2.11.5-14.el8_10.x86_64.rpm
4cc692dcb3bcc04a240cf2fe5271764dd8f49fd13e31f211cc2cb90c56832505
RLSA-2025:0012
Moderate: python-requests security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: subsequent requests to the same host ignore cert verification (CVE-2024-35195)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-requests-2.20.0-5.el8_10.noarch.rpm
a2aa9a996f107bf060404602ea15831f10aa12417dc027cde6dca0d200cde385
python3-requests-2.20.0-5.el8_10.noarch.rpm
a2aa9a996f107bf060404602ea15831f10aa12417dc027cde6dca0d200cde385
RLSA-2025:0065
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: i40e: fix race condition by adding filter's intermediate sync state (CVE-2024-53088)
* kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (CVE-2024-53122)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.34.1.el8_10.x86_64.rpm
39bd514f4619b3bb525fe7b355a8d8cf9162858b36da18f0951d0fe1151c55c2
kernel-4.18.0-553.34.1.el8_10.x86_64.rpm
e200c00d18a9fe13831fc68964f37bf8db97c42c80980fbcd9f0b4bbb1158080
kernel-abi-stablelists-4.18.0-553.34.1.el8_10.noarch.rpm
3ae7c04c9cb5753adfe3b32eb74aa7eec73935a89fdf6db7efb56283a9f4ab20
kernel-abi-stablelists-4.18.0-553.34.1.el8_10.noarch.rpm
3ae7c04c9cb5753adfe3b32eb74aa7eec73935a89fdf6db7efb56283a9f4ab20
kernel-core-4.18.0-553.34.1.el8_10.x86_64.rpm
77df06b828d989127999efb871eb7a918ba6b8273664734d486004e55cbfd57e
kernel-cross-headers-4.18.0-553.34.1.el8_10.x86_64.rpm
d9c6de8cac97b6a9597b7d84c03c78d5a6b6574bd187a671c3305348c24e15bb
kernel-debug-4.18.0-553.34.1.el8_10.x86_64.rpm
3f4e543ddb0cd7b1344737fa294dd640461ea0370571b8ec3979692403f760f5
kernel-debug-core-4.18.0-553.34.1.el8_10.x86_64.rpm
60a82e4710a8d44ce335da663ace3087832c8f6d5227ed848c2f9b7c4fb4e099
kernel-debug-devel-4.18.0-553.34.1.el8_10.x86_64.rpm
ba8871155ff981bd13e769649253e5655f7e517f10572b8b13bf1789651a452a
kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64.rpm
5fbcd94ce990449f6929ea6e82eae6a8981b178b5dbb125fa9171a0caf6e1bcd
kernel-debug-modules-4.18.0-553.34.1.el8_10.x86_64.rpm
a9466ee7d39e1a20ebde7f57aea1f65bdc61f7e05e9c09b6ea11ed3f9add69b7
kernel-debug-modules-extra-4.18.0-553.34.1.el8_10.x86_64.rpm
384751ca1c533afd23170e36a98092c2c7206e389770939a559ca623e443ae34
kernel-devel-4.18.0-553.34.1.el8_10.x86_64.rpm
4225c208d4a3587d9abea748d34619a918385940b36de3040998d36f0a25cbac
kernel-doc-4.18.0-553.34.1.el8_10.noarch.rpm
2834db38150c9c5ab8fa2bb647c483fad1df44ae26899a3b97185cd553592b7a
kernel-doc-4.18.0-553.34.1.el8_10.noarch.rpm
2834db38150c9c5ab8fa2bb647c483fad1df44ae26899a3b97185cd553592b7a
kernel-headers-4.18.0-553.34.1.el8_10.x86_64.rpm
289fd6e3e29c5e9e87ecbebff82cf244a1e00a25d042c9066cc91c96fb57e40c
kernel-modules-4.18.0-553.34.1.el8_10.x86_64.rpm
51504ad216bf0751541c41f7a1bb262eabfdf650b19f5f5cd361eb7379a54629
kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64.rpm
c54460f4330bd9e15fc8ac8382fddacb52fd3251856da21e34bfe078170263ee
kernel-tools-4.18.0-553.34.1.el8_10.x86_64.rpm
c710702838e981c3349764aac5f33f02d41473df0e30edde5d57a64424918d7e
kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64.rpm
bb538ffe4510103bf9451cf2db682eee03b5bc1712f681af1d29d0bd655dc92f
perf-4.18.0-553.34.1.el8_10.x86_64.rpm
6fd0c9761907c5fb58010e87f8a35217c17e23b6ae864d9ad2bf83ec46b3db39
python3-perf-4.18.0-553.34.1.el8_10.x86_64.rpm
0e660af5f5267d39b9dc91e9b44fcb85de877b9fac0cb9d38f089ba459fb0898
RLSA-2025:0325
Important: rsync security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* rsync: Info Leak via Uninitialized Stack Contents (CVE-2024-12085)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
rsync-3.1.3-20.el8_10.x86_64.rpm
9fdd7a847c656a7e85aa2df142a65172fa69cde180566b8e9bb7edb13e4c7009
rsync-daemon-3.1.3-20.el8_10.noarch.rpm
0bcfc271d4ebce5f6096625a78865d7e0d3012fb43fced30b9cb41976c525b0c
rsync-daemon-3.1.3-20.el8_10.noarch.rpm
0bcfc271d4ebce5f6096625a78865d7e0d3012fb43fced30b9cb41976c525b0c
RLSA-2025:0083
Low: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: libppd: remote command injection via attacker controlled data in PPD file (CVE-2024-47175)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
cups-libs-2.2.6-62.el8_10.i686.rpm
0c320bf06e9fc69692cc6c45bdcc66a6d9405c59be02d19d4cbc66631a3da6c5
cups-libs-2.2.6-62.el8_10.x86_64.rpm
b0d0e06219f7248db255b0e2ab79a3c73790d9f7fda176fba643ec8bc536f12c
RLSA-2024:3269
Important: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-2.28-251.el8_10.11.i686.rpm
0249a9b4d83bae8771b4210aace3883246b9607f71a21791c597d5bacaf93168
glibc-2.28-251.el8_10.11.x86_64.rpm
f5e92b079f70a4e208fda1de5855496808829560e42d9eb4b00e43299e0320f4
glibc-all-langpacks-2.28-251.el8_10.11.x86_64.rpm
08dcfc44150433437dcc5c0feaae3e05c59df032dad91d229d77e676dfc382fb
glibc-common-2.28-251.el8_10.11.x86_64.rpm
849d5abb4477f56701e53a1fc277f7eadfd9dfc0aa1f8eae0bb85caf9f4914a7
glibc-devel-2.28-251.el8_10.11.i686.rpm
05e124511a8b52e6472996ca109e9d4fc09bff4878030a4a310bb653917aa42f
glibc-devel-2.28-251.el8_10.11.x86_64.rpm
808e22ff94a58eed442186722392fed03052348ab9f7bdd77df56895b714b912
glibc-doc-2.28-251.el8_10.11.noarch.rpm
3a7120c1d53cf98ed6bcb9510604c821d067896637d36a1a39cfdf1de3cf7ffe
glibc-doc-2.28-251.el8_10.11.noarch.rpm
3a7120c1d53cf98ed6bcb9510604c821d067896637d36a1a39cfdf1de3cf7ffe
glibc-gconv-extra-2.28-251.el8_10.11.i686.rpm
ac28c2e9b67adb80c5e3f757755018e1f6a1c7a6dc0624a281a3a787dd2e594f
glibc-gconv-extra-2.28-251.el8_10.11.x86_64.rpm
5476f1e598f9c800d18fd39c820f03a12a7d63765ca02461f55785bdb37bbb00
glibc-headers-2.28-251.el8_10.11.i686.rpm
cd9f788d58d41409cf95f4d7b5d4dab20fe78c3fe9a33128130b05cc761d4a03
glibc-headers-2.28-251.el8_10.11.x86_64.rpm
45b5cb075caeb5854319094a087da6431d5f85a33b0c2027e7c190bc053bc1e4
glibc-langpack-aa-2.28-251.el8_10.11.x86_64.rpm
1b55fe55cb20796df617fbfce1164c60115ac2eb1ac96599cb8aeb14866485e3
glibc-langpack-af-2.28-251.el8_10.11.x86_64.rpm
842bd38c5b57706e18b441c7812ca7a559cd381d528197f915bcfa305bda50c5
glibc-langpack-agr-2.28-251.el8_10.11.x86_64.rpm
64e03dc27225ededa298b009166b51a1c4936c4a2a6158f52c484d1c1b53f477
glibc-langpack-ak-2.28-251.el8_10.11.x86_64.rpm
c0a0b04dcc29943e11801529c7f893ba4bb410894e8a49f4deed2043c833e378
glibc-langpack-am-2.28-251.el8_10.11.x86_64.rpm
04eca3c6f70b9d4c306a53d2538be0011cbc2db885d2e59c42ea2cf4f54f75b5
glibc-langpack-an-2.28-251.el8_10.11.x86_64.rpm
84472cb55b4859285690e553113e28671d65c0cee12a2cd05c64ba1dc307c2e7
glibc-langpack-anp-2.28-251.el8_10.11.x86_64.rpm
9ff6fa182916162b5eab778eae00f1bf3e15c161f6a2fcc6b62560a299e6b701
glibc-langpack-ar-2.28-251.el8_10.11.x86_64.rpm
f13f41d27fedf6d123f4459c341a1ddf5350b15b3308b49148844c1959e3fe04
glibc-langpack-as-2.28-251.el8_10.11.x86_64.rpm
05030859aba8294467075a8ebfec8a35944884c0ea3ff4e2faa42ddf567dc32a
glibc-langpack-ast-2.28-251.el8_10.11.x86_64.rpm
a5072ef8d985c4f95b0ea681abab6b7b7a5a0d95cc7d5ea01cdf9778e3857010
glibc-langpack-ayc-2.28-251.el8_10.11.x86_64.rpm
e286c5567720b489f51c6eb5a194e841d6354094ca5d00d91abee6a7e604390b
glibc-langpack-az-2.28-251.el8_10.11.x86_64.rpm
67af6037319a9d14c8a3e8d38e8c1b5503942f5488c95478cc146622fd74687e
glibc-langpack-be-2.28-251.el8_10.11.x86_64.rpm
7827c4bd053b82db2bc1ca56acd2adf62c2c7b95ce24d5813851138a7c77d79c
glibc-langpack-bem-2.28-251.el8_10.11.x86_64.rpm
61d9c0457a55360354c84194e668d4ca5e6225e86931c650249e8eb0f8d010f9
glibc-langpack-ber-2.28-251.el8_10.11.x86_64.rpm
2d439e97d3e5ba3ae3745174bfdf06cd6346940bbe8ebfd8d9b9f4e365171492
glibc-langpack-bg-2.28-251.el8_10.11.x86_64.rpm
07d9379153337b464617761b8d73f6df87b4c5ee1b9d719432d500b7901c2b94
glibc-langpack-bhb-2.28-251.el8_10.11.x86_64.rpm
a1cfb3349d8126ad4ca97c8c76e61479daf8a31e4a1191f96c18a3c7da7b8652
glibc-langpack-bho-2.28-251.el8_10.11.x86_64.rpm
da4c8abe3c2a62b98de1956b52b7506dec1fc56dbf79796d6ce60407d6a62e82
glibc-langpack-bi-2.28-251.el8_10.11.x86_64.rpm
50ac2d9a1ce79eae57d7acbaab5716bdcaeec63751451137d6205f8adc1c54ea
glibc-langpack-bn-2.28-251.el8_10.11.x86_64.rpm
e577703e3c550f79d16ceb762b4a2a711419cc28e43f14856f32c82684053544
glibc-langpack-bo-2.28-251.el8_10.11.x86_64.rpm
ed8bf109680e511bd40fe72efc591f6c683fd5c7d9991a6c93be487453391389
glibc-langpack-br-2.28-251.el8_10.11.x86_64.rpm
c9591005caf1ee3e4bce832facd15e774d98cf9c974554bc8d24a8a575339cf0
glibc-langpack-brx-2.28-251.el8_10.11.x86_64.rpm
88414d0246672750e891897f88a1a7fa52ae6ca3472d12173b3c399c215f7b33
glibc-langpack-bs-2.28-251.el8_10.11.x86_64.rpm
4622351ac6b5565e01b716c34f2341795f9add2e52c1c97b079198aa0cb3c01a
glibc-langpack-byn-2.28-251.el8_10.11.x86_64.rpm
9fa86d4dab216846a1b2b768f30c5ff3ada5468c78d9760d5733f1a6bb510548
glibc-langpack-ca-2.28-251.el8_10.11.x86_64.rpm
b3817a8c670ae32d9294bcd02df7902baab87b11b59594216776cd795b1bd5b3
glibc-langpack-ce-2.28-251.el8_10.11.x86_64.rpm
4644c0c6944bab67c5083f96f600cc86879f6184fbafd5047f38571fa63654e2
glibc-langpack-chr-2.28-251.el8_10.11.x86_64.rpm
382076224d3f351376cb06fb4860dc140bc29500a3836780d3bf0b135bd8f1ed
glibc-langpack-cmn-2.28-251.el8_10.11.x86_64.rpm
0fb14585ffb70dd91bcf68143079dfd89093317f7490eb5f0fba1b5f536dbef9
glibc-langpack-crh-2.28-251.el8_10.11.x86_64.rpm
d015ec384f787a9276fdf35fa1fbafbd31811b245a8cad7271033d23283ce518
glibc-langpack-cs-2.28-251.el8_10.11.x86_64.rpm
5bb95e65eb2aec904d3207c6d0a198ebbc828cf29dcc37ab14ebb703c7658a32
glibc-langpack-csb-2.28-251.el8_10.11.x86_64.rpm
5211fa9b4629ba09eee927c60d1513f759769bc7be5ce156c64a9398ea356aca
glibc-langpack-cv-2.28-251.el8_10.11.x86_64.rpm
f8b85738dc9089f4bd24016a4d522988b83b0fe7dd2914f3a22361ef1a3e152f
glibc-langpack-cy-2.28-251.el8_10.11.x86_64.rpm
bb6044960cafb9bc4c78e010367c86542bdf5ffb29d8f751b9d81243a1d76b59
glibc-langpack-da-2.28-251.el8_10.11.x86_64.rpm
4b8ecd5ade0db6196b2a793b8f6b56c11c19cb34608dc066a6f2bbbeffd1f753
glibc-langpack-de-2.28-251.el8_10.11.x86_64.rpm
4a658677e16f0449b7bdb454f95971949a67ff0ff2de25fc71030d0ddbc5b3d0
glibc-langpack-doi-2.28-251.el8_10.11.x86_64.rpm
7839473acb93fb5763807bef7a0b0c66f6ca45aabf5b48d6671e67de8729dc0c
glibc-langpack-dsb-2.28-251.el8_10.11.x86_64.rpm
e7efc148b42293ae463bf7545cd4ef02cf6eb78349342e878f03b39f7a2a0d2d
glibc-langpack-dv-2.28-251.el8_10.11.x86_64.rpm
7ae2f3bde6688f635d2c3ef017a68a7088e6c5be88133d46f0ecbf8daa21b66f
glibc-langpack-dz-2.28-251.el8_10.11.x86_64.rpm
a2e007e4ea55f7b6e46c8984ea4719f00842f627a483504f685e13efddbff866
glibc-langpack-el-2.28-251.el8_10.11.x86_64.rpm
b69f80b63d6134206cfdf50792821d31d589fa75ecc18910ac680686924d6a29
glibc-langpack-en-2.28-251.el8_10.11.x86_64.rpm
04409dd5509af51466c62c51a28dd8d0585f3694b2ea2d87f9dc80bce9838e46
glibc-langpack-eo-2.28-251.el8_10.11.x86_64.rpm
ce3ae5c2211d0bb69b6d41a185d26588e7ba4fd26ffe0ad69d6d35c8af7825ef
glibc-langpack-es-2.28-251.el8_10.11.x86_64.rpm
b703466f6f7bd2c8a72b5aaa81a1540221d13d538712aaa914ab7baaac929180
glibc-langpack-et-2.28-251.el8_10.11.x86_64.rpm
0e87c0db04a772355ce0e8577d3ee9e9db6ae7303e37dd1de99e91d0d862705f
glibc-langpack-eu-2.28-251.el8_10.11.x86_64.rpm
5c94d367799b9f583e1ad99393258a2030ae244c72f698f09b2dc6199f0fedf9
glibc-langpack-fa-2.28-251.el8_10.11.x86_64.rpm
e064bfe6d7c436fee8864f3ca999b88a8f9fe12b1edd97d3a46012a480cf45da
glibc-langpack-ff-2.28-251.el8_10.11.x86_64.rpm
101472d6cc17d7e13290bafe7035af2f4617828c8febd055d6c3236f2d0dbd4f
glibc-langpack-fi-2.28-251.el8_10.11.x86_64.rpm
d02cffb72dbaa4e7b43ea724e471ba303d2aa150e1df519592e9505861c1274f
glibc-langpack-fil-2.28-251.el8_10.11.x86_64.rpm
183b2888ba9a42a0e0b14c48807bb113301525c0ed5c7d61b405c82e691f1b0f
glibc-langpack-fo-2.28-251.el8_10.11.x86_64.rpm
23cba993fa7b2b40ac446fe2bb1eb2baa14caab158eedc5e1c8208aaf458a9c4
glibc-langpack-fr-2.28-251.el8_10.11.x86_64.rpm
0c474c1c09b348ff11426d274c6d2c68b12b33393a0baad45fad53ba947ee6c9
glibc-langpack-fur-2.28-251.el8_10.11.x86_64.rpm
4eba3352ca1fd309d47f8b4cd667feebb8898847a30fd4bedd09d1a4590af593
glibc-langpack-fy-2.28-251.el8_10.11.x86_64.rpm
2adf5404f8f2699923500aad414c191f21db35975aee82c6ad58531ff758ebb4
glibc-langpack-ga-2.28-251.el8_10.11.x86_64.rpm
e386c67d65e071ff0b8d86aa4e2796a69b9c3b13461ee487857c13efa946a304
glibc-langpack-gd-2.28-251.el8_10.11.x86_64.rpm
d61c809174d79c335ab532a31b0fe4d579f4395cd198ba9125f290bad1db3e7e
glibc-langpack-gez-2.28-251.el8_10.11.x86_64.rpm
3ad71a1436a2f7b57853210aa57e2968874a4d35a562d8b3c1bac428c9b0b05b
glibc-langpack-gl-2.28-251.el8_10.11.x86_64.rpm
74ec9a3c17f6b406bb348f53324e8af7b1444a05e154fec6e8347b4a093ba944
glibc-langpack-gu-2.28-251.el8_10.11.x86_64.rpm
ca1d943d73adcb352d5c697cef3fe09a7883168be5af2e9df5efcea82a3c61e6
glibc-langpack-gv-2.28-251.el8_10.11.x86_64.rpm
f384a0c8c344c227317ccd051c63520b2bde25049553bd5eb7db332044065a25
glibc-langpack-ha-2.28-251.el8_10.11.x86_64.rpm
52fc553fa36bcba15c8a0ed274c91c3a873e07e75ce3dcad77f6325ed634218e
glibc-langpack-hak-2.28-251.el8_10.11.x86_64.rpm
9d4250394572b183bf4bd27b720b900f8b4e0cf301ed55dcf808a51f5b146118
glibc-langpack-he-2.28-251.el8_10.11.x86_64.rpm
062156503663c07366cbffb69f88e76109c9034b011fb824bb5398d9d19df458
glibc-langpack-hi-2.28-251.el8_10.11.x86_64.rpm
7c74f31fa2855cf6541d171318bd1b0182a7cfdd2b6826a5974709ff850444c9
glibc-langpack-hif-2.28-251.el8_10.11.x86_64.rpm
13820d6bfa166bf1c144333d298ed63714e4c399043c6077eebb6f30742dc9b3
glibc-langpack-hne-2.28-251.el8_10.11.x86_64.rpm
b698075bcc1bdebb863843c8066a1a710541a63e63ebf597da4cc33ab3e33c78
glibc-langpack-hr-2.28-251.el8_10.11.x86_64.rpm
8f41ce9d28dcca938a4d7f65a8fc7c2e75efcaf1d5e7dee1bb19cf3cbcdaaaf2
glibc-langpack-hsb-2.28-251.el8_10.11.x86_64.rpm
c9fa70d70d0ade3be415d42a2e60e242f52d39dbec7464466bb92b2c4149bc60
glibc-langpack-ht-2.28-251.el8_10.11.x86_64.rpm
0fd8fdb95a8cea21577330ec4571104de42e9f2446a62a8635202641935c50a3
glibc-langpack-hu-2.28-251.el8_10.11.x86_64.rpm
9c8c1ef6f5697c2743888c32f977165a8bfc22f0d67f50150b563731915073fa
glibc-langpack-hy-2.28-251.el8_10.11.x86_64.rpm
ef024a3a0df92d3140ba9456b30429fcb8a4272137da966bdeaf8b4a20f56607
glibc-langpack-ia-2.28-251.el8_10.11.x86_64.rpm
604a31950a1f1efecc7dd3e88985c5bd3e73dfd216d74acc0842bc5379ae3f36
glibc-langpack-id-2.28-251.el8_10.11.x86_64.rpm
7041052ca1b21d14d437df7f8e8a310aabcce56e794bf6fbafd6717bfe390e7e
glibc-langpack-ig-2.28-251.el8_10.11.x86_64.rpm
e3dd564643b00d28fe557d1e9676c16b77e630fd7d49eb136c452fa586f47cbf
glibc-langpack-ik-2.28-251.el8_10.11.x86_64.rpm
6dcc217f00295bb8777fdfd8375c3cbc62dc510b97c2a333ed92da2e4ba8519a
glibc-langpack-is-2.28-251.el8_10.11.x86_64.rpm
3db0a4b8597b81b1cb4d45fa26c612345f5b7baa2eb19e43111b4b1350c20a9c
glibc-langpack-it-2.28-251.el8_10.11.x86_64.rpm
516209affde993cbcb401775627d3679d0795811fc02a71cd079a9aad952defc
glibc-langpack-iu-2.28-251.el8_10.11.x86_64.rpm
639aa547d86a55cd08eefe8be417aa637249a43a50cbe01ee295868eaa6a184e
glibc-langpack-ja-2.28-251.el8_10.11.x86_64.rpm
c2bdbc7ff2d15f11087f082c84fc1903be9a45cd637e78dd19e56bd28dac3cf8
glibc-langpack-ka-2.28-251.el8_10.11.x86_64.rpm
8195d675cbe8b896b15ad54bb25f80312d7aa6a4111a59b1a3ee4a1b19cc884b
glibc-langpack-kab-2.28-251.el8_10.11.x86_64.rpm
3d2cd188b5a5332f27a07474b9a664bac100636dcfca7d318da42d3591a9c270
glibc-langpack-kk-2.28-251.el8_10.11.x86_64.rpm
240c06aa5fb51ef2375437d1643cbd3716c6df5148c0d4365f0ee2f0d4e9227d
glibc-langpack-kl-2.28-251.el8_10.11.x86_64.rpm
2f1a302d7b0b8f8308571e10e802830d1f8d312a9ff19776f3e6328fc44f535a
glibc-langpack-km-2.28-251.el8_10.11.x86_64.rpm
625b7ad6a487085406f49b5438c4a5b02a5ef18cbe54e68ad38fa2bbbc77c107
glibc-langpack-kn-2.28-251.el8_10.11.x86_64.rpm
0159aa131d5f0cb9a688a3e01edd54f8a1ec18fc3c7eedfd2a0470453c0c2831
glibc-langpack-ko-2.28-251.el8_10.11.x86_64.rpm
117315b1d2a08f58581ad71656c0bac0e7f439210a03e993de4cccf11479b81a
glibc-langpack-kok-2.28-251.el8_10.11.x86_64.rpm
1415b0b17586a8cfe15c31e2888fef6b0c6090d9ee29c305bc0daf6e3d135e3d
glibc-langpack-ks-2.28-251.el8_10.11.x86_64.rpm
8e584357c47da045f8c374d37845dbf5720c67ded3637c2d86ccbca40d78cdf8
glibc-langpack-ku-2.28-251.el8_10.11.x86_64.rpm
885a70164f49385b647ff621eabe4bc24c9f015947db76ffb67ccc20d46b5fbf
glibc-langpack-kw-2.28-251.el8_10.11.x86_64.rpm
2dd746eebbd59eca2cae29fbc01331e5619036199ee59355f84a49b5c2d79d95
glibc-langpack-ky-2.28-251.el8_10.11.x86_64.rpm
8c41da4bfaae3fa6e00681c463290caab7723a78b5d468e5e890e18cec488dbe
glibc-langpack-lb-2.28-251.el8_10.11.x86_64.rpm
631ad9b48b0f3a5a3b70e9d594faf480255c676aeeab48f4ca2f98ac249cb8f5
glibc-langpack-lg-2.28-251.el8_10.11.x86_64.rpm
76e9d470e8c06be0a9737f3dbc5e58688c3927b8055b3a4e2dbbba6fc6f22a89
glibc-langpack-li-2.28-251.el8_10.11.x86_64.rpm
91764a63c29b2f0275e97317882c3c017ced58d2ec3d94656a2f5fe3c8c810c1
glibc-langpack-lij-2.28-251.el8_10.11.x86_64.rpm
8376e32737f0bd7d129be3f4c3390b5f68cbe0102b855ad83426c06a7f468ff9
glibc-langpack-ln-2.28-251.el8_10.11.x86_64.rpm
61e658de6f9e50e40c3b42aab63b9ec5b1a07819f1a99917a8ef2f17ce39a4ad
glibc-langpack-lo-2.28-251.el8_10.11.x86_64.rpm
04329e1006d2359a12a0e6429d9c51b19b0d70a696f41dba3f9a3b57f802ccda
glibc-langpack-lt-2.28-251.el8_10.11.x86_64.rpm
6cd9ef290bb532156af22fae0d821d96780a88349469e3f1ebe65357089b814e
glibc-langpack-lv-2.28-251.el8_10.11.x86_64.rpm
47208d9bc7933696e499145271def64f4df5f7585dfc986300ffa6fab002e532
glibc-langpack-lzh-2.28-251.el8_10.11.x86_64.rpm
7c5a79b95a1226156f2b02ad96b6d2e37ba15fd895d5a16103e9f46c4752fcb4
glibc-langpack-mag-2.28-251.el8_10.11.x86_64.rpm
e50bc7da5e309ff4d1287db1684fcf8ff5878deb7b70a0df3b983d32775e8071
glibc-langpack-mai-2.28-251.el8_10.11.x86_64.rpm
5684c4956d53060f5bd963f9db7af403bdad53df7e43aa9fcd29c3cdf0a6fa17
glibc-langpack-mfe-2.28-251.el8_10.11.x86_64.rpm
faa55275fb8dce5f317c1ab8d9b8c464ee94aeef88cc7da7e7cd6f2f1c675557
glibc-langpack-mg-2.28-251.el8_10.11.x86_64.rpm
4852a1293ff4154045996559d0b89d953f7fa8093fbb0771d16ad0d157d45dfa
glibc-langpack-mhr-2.28-251.el8_10.11.x86_64.rpm
12337a695f4b6891220c04d325e75c79777e8247eb0bfbb1dc95a27b4358df05
glibc-langpack-mi-2.28-251.el8_10.11.x86_64.rpm
a209757919dcbaf35c7b72b60e2b71f4df97d0999c41bbeee39e5b47f306ab99
glibc-langpack-miq-2.28-251.el8_10.11.x86_64.rpm
68ea0ba1570e60638e650d1c731d44093cc48b342ff7a05f86bb06465abb457d
glibc-langpack-mjw-2.28-251.el8_10.11.x86_64.rpm
90d8f1ff0b11867355d5c1ccc69a8facc2fffff5a02d079a44f1cb6bb733bc01
glibc-langpack-mk-2.28-251.el8_10.11.x86_64.rpm
3f32b00c854154153922e481c8937178ddbdcbe4540817c4bc52b7912581540f
glibc-langpack-ml-2.28-251.el8_10.11.x86_64.rpm
07ebf1db40dff85c3871d26c00ca1ec615713b3bb19ea859ad9c9ef09a53fab6
glibc-langpack-mn-2.28-251.el8_10.11.x86_64.rpm
5ed806bb789fd118fc0645a44847dd1efa376c3f9ddb1a836ae4d461a2e3b165
glibc-langpack-mni-2.28-251.el8_10.11.x86_64.rpm
c77aa384a6e4db3f7ac4331cb9f69a14259518fa012a5b77aa3f8b5ff003267a
glibc-langpack-mr-2.28-251.el8_10.11.x86_64.rpm
9aaf57dc7037ac227f96d1cf6c76b65a51aea12f0ee0b86f6e6fe4190b8861fb
glibc-langpack-ms-2.28-251.el8_10.11.x86_64.rpm
7fe7e1d95ab2027d7b582ee53cb11f00e59154e5383a329498d4a1c84ac67084
glibc-langpack-mt-2.28-251.el8_10.11.x86_64.rpm
d5b0f5e2c25661a418b636b8613b7bc1ed40c264b26f917bfbf9f27f2b84b39b
glibc-langpack-my-2.28-251.el8_10.11.x86_64.rpm
23e7c40aa564662da3b66046f59754371feb773c8499e18b0138dc8eb18470fb
glibc-langpack-nan-2.28-251.el8_10.11.x86_64.rpm
0424deabea1d51b817d68b00e52f37b1bc86b95244c16245bf7406f007e17a65
glibc-langpack-nb-2.28-251.el8_10.11.x86_64.rpm
40d064579f84d545d5786f6140effb461e32b5e93a21915d0cfd64a904fd8d6a
glibc-langpack-nds-2.28-251.el8_10.11.x86_64.rpm
fb99df7932c82bc8c9d09511b3449aa42f5dce20106e5e786eec2704fd8c62be
glibc-langpack-ne-2.28-251.el8_10.11.x86_64.rpm
4e065ac8b806839ac3c0b00d5f2c09b15f2a6671cfb4f5bf1436517c1083fa8d
glibc-langpack-nhn-2.28-251.el8_10.11.x86_64.rpm
44830c39bd57493750ff990c8f7a967d4bc856e99477416376b3416608dbc35b
glibc-langpack-niu-2.28-251.el8_10.11.x86_64.rpm
2ee3db57c6ca6f9a7e01e109f29aa2e1d020f09cbaea15bcfab680543c56b099
glibc-langpack-nl-2.28-251.el8_10.11.x86_64.rpm
2ad568484aac26c842eedbee6b32fb9d619a251a51d9334cc7ed96b362fc8d86
glibc-langpack-nn-2.28-251.el8_10.11.x86_64.rpm
f39acdc98827bf00a08107a90fb32fc023aaa7c0954fa97dd33277af188b5f5b
glibc-langpack-nr-2.28-251.el8_10.11.x86_64.rpm
cbb071a81dacdd7e4471cc5d951f4c1b67ce3f64c7041d4af9e58a207daea7a6
glibc-langpack-nso-2.28-251.el8_10.11.x86_64.rpm
528511c32a06d4d70527cfbd8badb54e85b08e8e071dce80a5d0665129b2cc6e
glibc-langpack-oc-2.28-251.el8_10.11.x86_64.rpm
39183a9951d4bc8358b921856220ea52d6284213c8918ce088848ddf2436feda
glibc-langpack-om-2.28-251.el8_10.11.x86_64.rpm
0daa5044dbf074927b01b4a41c128f066a02a582b74e0c372ed6cd9945864f75
glibc-langpack-or-2.28-251.el8_10.11.x86_64.rpm
8c4f894571552a22578fdedd87c1fe06bb9c8c423e9da59421bf37f143827cff
glibc-langpack-os-2.28-251.el8_10.11.x86_64.rpm
92b6665695320cbea8ca4876f7eb41c509ec770ca81e6a3f0c09af1b09db253c
glibc-langpack-pa-2.28-251.el8_10.11.x86_64.rpm
17e8bfda8db7dca86d8ba89edf2b94dba6bb643a51d7c3696437d41d1cb62c83
glibc-langpack-pap-2.28-251.el8_10.11.x86_64.rpm
5f121a2daf52e85620879790babaf886f6114b680e8931efc7709a6e77558d3e
glibc-langpack-pl-2.28-251.el8_10.11.x86_64.rpm
b30a32da61c39c1609d9c29409f38dda0b6925abfebbd16e0a4df528295d2b7f
glibc-langpack-ps-2.28-251.el8_10.11.x86_64.rpm
a4acaaf400e11a7d4d387303a3a68491a77137e149e5f6b8cd5596f482da7680
glibc-langpack-pt-2.28-251.el8_10.11.x86_64.rpm
e7606dbedc2a186f13fedf2a90f4bdc024e642897f8b99a7b3759da3f656d406
glibc-langpack-quz-2.28-251.el8_10.11.x86_64.rpm
49f0db3f441346cdd4428cdd7ca0c071bd028d275208f668ce1474f02c026079
glibc-langpack-raj-2.28-251.el8_10.11.x86_64.rpm
b30634f4e260dc7084e3df18f71aeec168605060047415c854517f1cfcfac1fa
glibc-langpack-ro-2.28-251.el8_10.11.x86_64.rpm
623a207c70b327128bfbd7a104ad8b32deb2bbc61ad90a6756d0d7cf8d429645
glibc-langpack-ru-2.28-251.el8_10.11.x86_64.rpm
b5cd86a14443b18ff75a92469dad937646b1ba7cc60735518daeb2f69dfa9e46
glibc-langpack-rw-2.28-251.el8_10.11.x86_64.rpm
c2230d74dad1c3bce1d9c8109853039a1ef550c6783ea3b77d9607c180d0deac
glibc-langpack-sa-2.28-251.el8_10.11.x86_64.rpm
f40dffb41c09343513aa2bc3363eb0403d3cce84cdb6c5e3ace9e9da141f07df
glibc-langpack-sah-2.28-251.el8_10.11.x86_64.rpm
e0443a4d78c3de2852df51f7a384506cf8c679a69452f045d5a871a281e350f2
glibc-langpack-sat-2.28-251.el8_10.11.x86_64.rpm
0cca0374d07b13e649a4eed859d44fd4274695d703915569dd629017905e1af8
glibc-langpack-sc-2.28-251.el8_10.11.x86_64.rpm
4525d6e492f60d2fa2fe2e184a0f4677829ac588258372bab23e1c62a26a2c27
glibc-langpack-sd-2.28-251.el8_10.11.x86_64.rpm
2e18e6fd7aeeb86257f3796f0ab4c8e250f7046087f3888bcd6883f184aba1d4
glibc-langpack-se-2.28-251.el8_10.11.x86_64.rpm
9c99c7c76843106cae9ae1ccc6dbb0e41e45200d49e9f1283854affb84d70bda
glibc-langpack-sgs-2.28-251.el8_10.11.x86_64.rpm
fe8182644975cd702ef5c5b4cc0fab5777b32bf5efca2a8b0e03a8506840dc2a
glibc-langpack-shn-2.28-251.el8_10.11.x86_64.rpm
dc617d6a49607d74a5f8402c1bbe09869a2fe78712d935fd26f91e379163d563
glibc-langpack-shs-2.28-251.el8_10.11.x86_64.rpm
ce338f6c9b78507a182e5e39839ec93350c3b0fce71cb0ecd8a3edd877d154c9
glibc-langpack-si-2.28-251.el8_10.11.x86_64.rpm
b730c4ed1083e23cf20560dbe3e7ab7cd3bd19efeddda3a6aa3c10d5a77036df
glibc-langpack-sid-2.28-251.el8_10.11.x86_64.rpm
30dfd693be14b57af4c02f80569c95325450b383ce212a4be160321b54d14b22
glibc-langpack-sk-2.28-251.el8_10.11.x86_64.rpm
02af33a627c9c7b0b3672023798d8555cf5c07fba15e2b38377ef6496ad564cf
glibc-langpack-sl-2.28-251.el8_10.11.x86_64.rpm
c2fd0d807532f06fb8f764258c96d56bcf24c9f86b8da745b4e7ae9423c5cb2a
glibc-langpack-sm-2.28-251.el8_10.11.x86_64.rpm
1080b607388b74da44cd89db77f06b1133c3a5cd63168f7fafd7a13703830dc9
glibc-langpack-so-2.28-251.el8_10.11.x86_64.rpm
8a75bfe741842d2e268b303cd5da5bfdb3b373e9833eb29c280184d438b77aca
glibc-langpack-sq-2.28-251.el8_10.11.x86_64.rpm
85e3eb36427530d0b3a4beb10779d657f85f59b7f57e3007a7f72164f03fdb1b
glibc-langpack-sr-2.28-251.el8_10.11.x86_64.rpm
eadab5e57d4eb7aff45631d0c85f2b0bda391bc81d4e166e77913614238961e3
glibc-langpack-ss-2.28-251.el8_10.11.x86_64.rpm
391f56df4e7db44ba1be0980632f927d0d5f3ca26d41ff2114c25d45678ab2fa
glibc-langpack-st-2.28-251.el8_10.11.x86_64.rpm
8d3a3fa6dfeda305b4d44369024a35a643e24bafc6f8b38fd365850ecadc0498
glibc-langpack-sv-2.28-251.el8_10.11.x86_64.rpm
faa88a72af5279110ffbc7764d2cf9b4dc40b36e263f7de631837bebe0450b1c
glibc-langpack-sw-2.28-251.el8_10.11.x86_64.rpm
d6b7a15215eb29a273d486b62aca555e62bcaf2a5a3b7c5b35d161e2fe70a693
glibc-langpack-szl-2.28-251.el8_10.11.x86_64.rpm
3720b9b2d0e566d1cfe5a28f2c2bdbfa42bf38a29e826dbe993350607cac1d3b
glibc-langpack-ta-2.28-251.el8_10.11.x86_64.rpm
b9f77bb805fbbf0126e4d73ad4c1dcc529a6aa3d26da6ba80b6414c432ea9156
glibc-langpack-tcy-2.28-251.el8_10.11.x86_64.rpm
58f85ad448159d9258cfca429aec38ac57557d62b0b9b01a5fb286d09bc68226
glibc-langpack-te-2.28-251.el8_10.11.x86_64.rpm
6c80885aac9ce07263329aa351f2d094f9ffd39ef1fb91d973b6a80c461a43e0
glibc-langpack-tg-2.28-251.el8_10.11.x86_64.rpm
f4b3264075774466f0210f3a6c6dc858c814ed125233a9fb566d48f0ac77b755
glibc-langpack-th-2.28-251.el8_10.11.x86_64.rpm
b586e151f0c5aaf9ab2d0f7e07af2c657a9c71201fb520b76b429aa3ea4558d9
glibc-langpack-the-2.28-251.el8_10.11.x86_64.rpm
46dbfc3d98f690d9e41db1e193cbb59fed41af4693d8752d4cf38510ff7d40f5
glibc-langpack-ti-2.28-251.el8_10.11.x86_64.rpm
93dbf5d87fffdea3ac1c97f3fbda4a68a0c150b139ee27ac6421b999383057c6
glibc-langpack-tig-2.28-251.el8_10.11.x86_64.rpm
06496a79f9ab0a9a62fbe7d8f4ac00cb7815a1c652ab141bca525c89ba4b38c5
glibc-langpack-tk-2.28-251.el8_10.11.x86_64.rpm
f4668cdcbd90e4ddc81a592b13e297f46847bed0da16edf2d41c322a4d3f3fe4
glibc-langpack-tl-2.28-251.el8_10.11.x86_64.rpm
5b2bc00ff7977042f347d6b5ae600819936d327cae163207397cc989201e3b0b
glibc-langpack-tn-2.28-251.el8_10.11.x86_64.rpm
c48a12516cca943d940dd6d7c1b4131b624d3d373024da05cab1a132dfe6f9a0
glibc-langpack-to-2.28-251.el8_10.11.x86_64.rpm
2705d4faa75d370d1e9a78574a253c8b28ac2f4392e20a36a5424d33010ca9b9
glibc-langpack-tpi-2.28-251.el8_10.11.x86_64.rpm
bd22c76135abd7a983c291531dad386d02196605cc1c73652e37bb52cfd3f005
glibc-langpack-tr-2.28-251.el8_10.11.x86_64.rpm
2f96cc670e86fd470cdd09daa9bcebf225e6b663873da9355c89e87b43e4269a
glibc-langpack-ts-2.28-251.el8_10.11.x86_64.rpm
84d94e00c0ff89ad8fe5935869ee5303a819c40799271de17b188f9c7de91d98
glibc-langpack-tt-2.28-251.el8_10.11.x86_64.rpm
b492ad2de0028c8c84cb78f0c9a393558a6e18edbc91cb9fcaf7825de2e39443
glibc-langpack-ug-2.28-251.el8_10.11.x86_64.rpm
300ca0304ee4effe4475ec583befe6de4603ed759b78036caba64340ae3d1f8d
glibc-langpack-uk-2.28-251.el8_10.11.x86_64.rpm
e0669ee3ffd7e62526dcacd13a1220bffa28a661307a17c253a503fb59e055f3
glibc-langpack-unm-2.28-251.el8_10.11.x86_64.rpm
2dff737f1c5824c2991cbb349697afae6e1cb81c81fa21419c842acd1c92b620
glibc-langpack-ur-2.28-251.el8_10.11.x86_64.rpm
b4a480025ea9335a4a340150f657d8c69c50289c08d48f0495f5933e2286c6ae
glibc-langpack-uz-2.28-251.el8_10.11.x86_64.rpm
90df67535cdf1fec062502c4d7d48d607952b76904832a65e06e23aa67c14a0d
glibc-langpack-ve-2.28-251.el8_10.11.x86_64.rpm
b7ff329d3993558081d7ddb19877ba45af61a71d908ef3bce7883bc039ffffeb
glibc-langpack-vi-2.28-251.el8_10.11.x86_64.rpm
3f37030f3e62b37c2a1416f19f549dcd034182ece89e030ffe9df6e0c7841215
glibc-langpack-wa-2.28-251.el8_10.11.x86_64.rpm
b625534f6cfd87887d5d412e1a24ebfedc6728b12328991e50781ee95a0c5231
glibc-langpack-wae-2.28-251.el8_10.11.x86_64.rpm
7682c5886d435993c0c7791f05e6ddf87cdddb09c67e5fca7641bd38778d6b5c
glibc-langpack-wal-2.28-251.el8_10.11.x86_64.rpm
8343bd8f43156f26b24490038aaf67607f18324f64870e836c3eb015426445e1
glibc-langpack-wo-2.28-251.el8_10.11.x86_64.rpm
fb08310ca8f1e7fedea0cc42d05b48ff5f9ed5c6deba8b6076dae631d3eb07c7
glibc-langpack-xh-2.28-251.el8_10.11.x86_64.rpm
2cee4dae38653a2b1180cc83e8fae453722faf74910bb5d628082fe0e5b68089
glibc-langpack-yi-2.28-251.el8_10.11.x86_64.rpm
542d569ec44c92587f954c30a981c665905da181bd6b7005de261baf73559b14
glibc-langpack-yo-2.28-251.el8_10.11.x86_64.rpm
d6ab4bdd2d1ddd8de41d8028ec19b8b08db2113fddae7cf45fa37ffde4c58d13
glibc-langpack-yue-2.28-251.el8_10.11.x86_64.rpm
e7eb90756972b72536f0b8a47e755cea9d10faa1b9d79c9bf33729f470cc368a
glibc-langpack-yuw-2.28-251.el8_10.11.x86_64.rpm
0d06ec4d62c023a23134019e4c2bfff09435950adb98572c5b66cceb7c28c7d4
glibc-langpack-zh-2.28-251.el8_10.11.x86_64.rpm
98efb0957c84766cf05f0ec265da0f97697e7ae4e87f8947904d4c02b417bef5
glibc-langpack-zu-2.28-251.el8_10.11.x86_64.rpm
22b542b12d100b76d5012cf05648dd65044dc715add33e84017167b75ac0f838
glibc-locale-source-2.28-251.el8_10.11.x86_64.rpm
bf29ba9780da89408ea28dc9ae1bbc8e29273152a9fbd90302284c6cb5c3dfbf
glibc-minimal-langpack-2.28-251.el8_10.11.x86_64.rpm
b74b2ee35f5b5e7bd0b7a18d259675ec355a2777af9ff99f64c3ac9d827dbdfb
libnsl-2.28-251.el8_10.11.i686.rpm
069c000b7e7fda5d2d91a87e85ac6a37bc66721caf772967a19eb6b44d811610
libnsl-2.28-251.el8_10.11.x86_64.rpm
fd9f73536a96c6cabfb9b309e06b5dee1eafd870abc67f2b7161bd077187b999
nscd-2.28-251.el8_10.11.x86_64.rpm
7b824110537d77879e9ac1ed6f5367b889a70849468710bab7b7b3cd9b647e29
nss_db-2.28-251.el8_10.11.i686.rpm
9391747d140a3788826bb894ffb9b074d367bee30a2dd90957d2ca58ee9c5808
nss_db-2.28-251.el8_10.11.x86_64.rpm
7604f8197eff4065ff509524598986a68169d9d4ffd6b25ceb875206334d9ba9
RLBA-2025:0572
kernel bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
(Rocky Linux-56480)
(Rocky Linux-71396)
(Rocky Linux-28790)
(Rocky Linux-59649)
none-baseos-rpms
bpftool-4.18.0-553.36.1.el8_10.x86_64.rpm
6b676af4615d20e7c598fdb8595dc6e693eec82508e3b90085b60926e6f5a285
kernel-4.18.0-553.36.1.el8_10.x86_64.rpm
fc2a8065c8c6bb2a946ef5f576bd570a4053a9f4ee5b71479eb9126584540369
kernel-abi-stablelists-4.18.0-553.36.1.el8_10.noarch.rpm
c409c5aa05651cec750c6246d00e80b62628269151818904281554670cda9610
kernel-abi-stablelists-4.18.0-553.36.1.el8_10.noarch.rpm
c409c5aa05651cec750c6246d00e80b62628269151818904281554670cda9610
kernel-core-4.18.0-553.36.1.el8_10.x86_64.rpm
ec7992e5a0f6d423a0548adce2f7ec02df371e540a639ff725c2ba31def49eeb
kernel-cross-headers-4.18.0-553.36.1.el8_10.x86_64.rpm
0a79aae0390821a7e777622393877d1700092ec974b9213054cc2bf53e2c3afd
kernel-debug-4.18.0-553.36.1.el8_10.x86_64.rpm
1343c2e3ea1905b50c2b1b42fecf31acb9be8426e831fd143d0a3fdbaed90f26
kernel-debug-core-4.18.0-553.36.1.el8_10.x86_64.rpm
0ea1f6b2b54c03d872dd5dc235e13f705f3521744adaaa5bb930634b21f86c63
kernel-debug-devel-4.18.0-553.36.1.el8_10.x86_64.rpm
1676d8e1826f4d9f9d4eb974a17abf50e622f33081bc5fcb6a4c52717849a11f
kernel-debuginfo-common-x86_64-4.18.0-553.36.1.el8_10.x86_64.rpm
6d37df583d9258fccafca4d7ec856a5cac3e7315d3aa0bd252f8adaa4a8fbe99
kernel-debug-modules-4.18.0-553.36.1.el8_10.x86_64.rpm
0f3108ebc2361972d6d23ced4c666571242e91764db54c19ced2230be43ccad1
kernel-debug-modules-extra-4.18.0-553.36.1.el8_10.x86_64.rpm
1f823d8cf8f48332d0b54dad5df78346a0b813314e435186f8e4c34aeb61f7db
kernel-devel-4.18.0-553.36.1.el8_10.x86_64.rpm
8534ada16c16a5ec1a81219b058788c61be47a135d390e2386654e4c91fe4c69
kernel-doc-4.18.0-553.36.1.el8_10.noarch.rpm
eb8ca9cf1808f792a6ce476049046d5541265fe4ca798d4f3e5d65267aff5a07
kernel-doc-4.18.0-553.36.1.el8_10.noarch.rpm
eb8ca9cf1808f792a6ce476049046d5541265fe4ca798d4f3e5d65267aff5a07
kernel-headers-4.18.0-553.36.1.el8_10.x86_64.rpm
c2ed97f4e6a84d495111ec3f0f3a951063c161d26e1bea9fec63e8d164caee74
kernel-modules-4.18.0-553.36.1.el8_10.x86_64.rpm
3915f1acba7117a196d57270b54ec67fd6db15123a28c051effb9adaf83665f3
kernel-modules-extra-4.18.0-553.36.1.el8_10.x86_64.rpm
4ebf2f638e960947e2bc00774048812acfdf6a5d9859630ebb44894cb129beff
kernel-tools-4.18.0-553.36.1.el8_10.x86_64.rpm
1e97c85ab05ac3f3aecbc389ae227df1445f36669cfafa69ab70998748fc9fd1
kernel-tools-libs-4.18.0-553.36.1.el8_10.x86_64.rpm
60a2d102d530d15ade92833afca8d41c07229bf0ea1ace63df8ae01b032fa269
perf-4.18.0-553.36.1.el8_10.x86_64.rpm
9c527dc16fd326d00900be3ed186b686dd8d8d93847405327adbe86802a0d1a3
python3-perf-4.18.0-553.36.1.el8_10.x86_64.rpm
b0bacae7f4e89f7a58d274a5f81760d6b983a375940372f21f2da8cea6700930
RLBA-2025:0727
strace bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for strace.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The strace utility intercepts and records the system calls that are made and received by a running process and prints a record of each system call, its arguments, and its return value to standard error output or a file. It is often used for problem diagnoses, debugging, and for instructional purposes.
Bug Fix(es):
* [Rocky Linux-8] Incorrect syscall name when using strace and strace printing <... resuming interrupted $syscall_name ...> (JIRA:Rocky Linux-8570)
none-baseos-rpms
strace-5.18-2.1.el8_10.x86_64.rpm
56fa2c91325b7272c3e570f865e09d442e042f7b1d3c2a31d198cc72c42c73b5
RLBA-2025:0729
linux-firmware bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Bug Fix(es):
* Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-68279)
* Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-73145)
none-baseos-rpms
iwl1000-firmware-39.31.5.1-127.el8_10.1.noarch.rpm
3aa81e39b5df0fe98cad2207ec23def62641c5e0d61a5729222a08d6bcf135b2
iwl1000-firmware-39.31.5.1-127.el8_10.1.noarch.rpm
3aa81e39b5df0fe98cad2207ec23def62641c5e0d61a5729222a08d6bcf135b2
iwl100-firmware-39.31.5.1-127.el8_10.1.noarch.rpm
5e5364c47287c435b905fbc91fd6724b65ca1c1b869cd91dd7aa775557aed303
iwl100-firmware-39.31.5.1-127.el8_10.1.noarch.rpm
5e5364c47287c435b905fbc91fd6724b65ca1c1b869cd91dd7aa775557aed303
iwl105-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
2875d6fce4c30fdd93468e371eaffe8a15e21abc5e645bcf5bc4912d2ab91c94
iwl105-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
2875d6fce4c30fdd93468e371eaffe8a15e21abc5e645bcf5bc4912d2ab91c94
iwl135-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
5adf7f9b552dd03e2d6fc1a6d5be7351a350f937189b7e91bcdb1e9e068fe9f6
iwl135-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
5adf7f9b552dd03e2d6fc1a6d5be7351a350f937189b7e91bcdb1e9e068fe9f6
iwl2000-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
3b0276e2c1ce92e8efad54cf35e128448e5d0a1ca6a9a46c9f8b0208c262be81
iwl2000-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
3b0276e2c1ce92e8efad54cf35e128448e5d0a1ca6a9a46c9f8b0208c262be81
iwl2030-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
21bd28fdaa10449cc70544cf52b420d6b7d010c1d0f438e77520857b9aab2fd2
iwl2030-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
21bd28fdaa10449cc70544cf52b420d6b7d010c1d0f438e77520857b9aab2fd2
iwl3160-firmware-25.30.13.0-127.el8_10.1.noarch.rpm
4bdf9f496a4ccbadee5942cb26de31a1b7c7d1e6e7f904cd69111110054133ad
iwl3160-firmware-25.30.13.0-127.el8_10.1.noarch.rpm
4bdf9f496a4ccbadee5942cb26de31a1b7c7d1e6e7f904cd69111110054133ad
iwl3945-firmware-15.32.2.9-127.el8_10.1.noarch.rpm
fbfe7373aa764d99168867d4bfc19a148a2388d21f5fb33ae1c3fa72602fc7e0
iwl3945-firmware-15.32.2.9-127.el8_10.1.noarch.rpm
fbfe7373aa764d99168867d4bfc19a148a2388d21f5fb33ae1c3fa72602fc7e0
iwl4965-firmware-228.61.2.24-127.el8_10.1.noarch.rpm
78de39a4d95fd01f69fcce5efc6900715bb2e502779b04c4d092051230f9cf63
iwl4965-firmware-228.61.2.24-127.el8_10.1.noarch.rpm
78de39a4d95fd01f69fcce5efc6900715bb2e502779b04c4d092051230f9cf63
iwl5000-firmware-8.83.5.1_1-127.el8_10.1.noarch.rpm
1b381fcaa06df56ebbe6d6537c5c084ab0c255fec39fbe8571b689032c850762
iwl5000-firmware-8.83.5.1_1-127.el8_10.1.noarch.rpm
1b381fcaa06df56ebbe6d6537c5c084ab0c255fec39fbe8571b689032c850762
iwl5150-firmware-8.24.2.2-127.el8_10.1.noarch.rpm
4f2449e15ed60bceaf7137343f8c7a2c8eaea8638a6c67a46f454a530c9245e7
iwl5150-firmware-8.24.2.2-127.el8_10.1.noarch.rpm
4f2449e15ed60bceaf7137343f8c7a2c8eaea8638a6c67a46f454a530c9245e7
iwl6000-firmware-9.221.4.1-127.el8_10.1.noarch.rpm
4c401b5322e8540fe16e52648a23f2dedeba65043f75866732bf926589b4e1c2
iwl6000-firmware-9.221.4.1-127.el8_10.1.noarch.rpm
4c401b5322e8540fe16e52648a23f2dedeba65043f75866732bf926589b4e1c2
iwl6000g2a-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
527a2ff1ea2a30fcff4a85d3bd71380516cd188dca472b21033e4337f4720cb6
iwl6000g2a-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
527a2ff1ea2a30fcff4a85d3bd71380516cd188dca472b21033e4337f4720cb6
iwl6000g2b-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
e3ce7776d91a1f836f8f7bfdccf94910f934165e6567644d29a9453d776d2e26
iwl6000g2b-firmware-18.168.6.1-127.el8_10.1.noarch.rpm
e3ce7776d91a1f836f8f7bfdccf94910f934165e6567644d29a9453d776d2e26
iwl6050-firmware-41.28.5.1-127.el8_10.1.noarch.rpm
7c65cb46d02590b4ab3463775e61e837193ff1ecd4ce0d19b614736ad0648ee1
iwl6050-firmware-41.28.5.1-127.el8_10.1.noarch.rpm
7c65cb46d02590b4ab3463775e61e837193ff1ecd4ce0d19b614736ad0648ee1
iwl7260-firmware-25.30.13.0-127.el8_10.1.noarch.rpm
dfa58ef498e6ed2e7253f48da44363597bcc04d707b40b48c11499e64ca7b198
iwl7260-firmware-25.30.13.0-127.el8_10.1.noarch.rpm
dfa58ef498e6ed2e7253f48da44363597bcc04d707b40b48c11499e64ca7b198
libertas-sd8686-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
47473f7d5588cf86e7d4bcaf7185c7a6684ad428a0cb761727f7ca7306c84ba8
libertas-sd8686-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
47473f7d5588cf86e7d4bcaf7185c7a6684ad428a0cb761727f7ca7306c84ba8
libertas-sd8787-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
409329e511eecda90842ed5cc88e3e00aae598b6444287a8f95e6b7539a088d2
libertas-sd8787-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
409329e511eecda90842ed5cc88e3e00aae598b6444287a8f95e6b7539a088d2
libertas-usb8388-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
0fb0c40d21dd1bcf25412eaf85d6320d3c034c917abbf21a7fd94f04e2c7fce5
libertas-usb8388-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
0fb0c40d21dd1bcf25412eaf85d6320d3c034c917abbf21a7fd94f04e2c7fce5
libertas-usb8388-olpc-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
0042edbe0832513226f445ca90b20bba69359059b1733f3309f87013b2451fcc
libertas-usb8388-olpc-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
0042edbe0832513226f445ca90b20bba69359059b1733f3309f87013b2451fcc
linux-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
50dc29b613b1926178f8fbb7b95a819bfb0ec89f27add8cf2a5dc88fc8c5592e
linux-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm
50dc29b613b1926178f8fbb7b95a819bfb0ec89f27add8cf2a5dc88fc8c5592e
RLBA-2025:0731
curl bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Bug Fix(es):
* libcurl crashes when connecting to RH repo through a NTLM proxy in FIPS mode [rhel-8.10.z] (JIRA:Rocky Linux-32641)
* race condition in curl's dns impacting customer's internal tool powerman (JIRA:Rocky Linux-34906)
* Eliminate use of obsolete %patchN syntax (JIRA:Rocky Linux-65667)
none-baseos-rpms
curl-7.61.1-34.el8_10.3.x86_64.rpm
f4eb8035ceb26d39f7be6249e9106a00b4af9e5f2f38dd793ba22b1c37b63fe3
libcurl-7.61.1-34.el8_10.3.i686.rpm
572fc5eb92b652c43a09213dbc8e7976b5125b8df1f98d302eaa26258ca511b5
libcurl-7.61.1-34.el8_10.3.x86_64.rpm
2d97680f3cc89102e68469abe24fcb608a48abaeefabb166018c7efbb406e8d0
libcurl-devel-7.61.1-34.el8_10.3.i686.rpm
536186fe8a7ad97be269d2351f6a5b1293c0e47c65c07da7815a4e0763721e20
libcurl-devel-7.61.1-34.el8_10.3.x86_64.rpm
7e43a0559751b749db014ebf83d9c4d5444af6be55515e6c143569e98217bccf
libcurl-minimal-7.61.1-34.el8_10.3.i686.rpm
5657fbeaff2a62d256dd3f3fa5c506efed617934b690b59388df50e90e339e23
libcurl-minimal-7.61.1-34.el8_10.3.x86_64.rpm
99bdbd8b83071021a707de5a1891961e986bce46d2a67c34b8d4904f07984499
RLBA-2025:0730
nftables bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for nftables.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables.
Bug Fix(es):
* Actively reject untranslatable compat expressions (JIRA:Rocky Linux-5806)
* Unable to set port range/interval in nftables using nft insert command. (JIRA:Rocky Linux-62895)
none-baseos-rpms
nftables-1.0.4-7.el8_10.i686.rpm
454bcb1597e22c9964995f83ec882cd6a059721933d336dc83633e367ef2479b
nftables-1.0.4-7.el8_10.x86_64.rpm
f8dafacc0e279210f05a7c66815a688de0207e52d8bb032c337ce9f3037cb72b
python3-nftables-1.0.4-7.el8_10.x86_64.rpm
315bc3318a16f47c4a757cfa4f34c872651e08ad0bdb54e1525f5fd01a31284e
RLBA-2025:0732
libdnf bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A Library providing simplified C and Python API to libsolv.
Bug Fix(es):
* "dnf history rollback <id>" operates as if it was a "undo" when <id> is not latest [rhel-8.10.z] (JIRA:Rocky Linux-68770)
none-baseos-rpms
libdnf-0.63.0-21.el8_10.i686.rpm
b37e5f23a9f73094b0dc4a6fcadf6d3671ad6361a7e187b1951f4f638cb7a1ea
libdnf-0.63.0-21.el8_10.x86_64.rpm
0f11ea18a1430d9aae5409289553ad525bc798a3bbd5b0c2c5cdc52f9993eaba
python3-hawkey-0.63.0-21.el8_10.x86_64.rpm
24bdf3297d69a9aae9bfbb8d4e79ab6ecc8800b0ddb5f2e511deb1ee89ac1568
python3-libdnf-0.63.0-21.el8_10.x86_64.rpm
23a7af175bb992fd45036f01073d36c71c3940f0e71d6ee0be0768949856c748
RLSA-2025:0733
Moderate: bzip2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bzip2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs.
Security Fix(es):
* bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). (CVE-2019-12900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bzip2-1.0.6-28.el8_10.x86_64.rpm
df8552e87d82162ce371128a7736f3205990763257e3ead41fd4c422140c2437
bzip2-devel-1.0.6-28.el8_10.i686.rpm
64b2390a486414fbc35bc97231beceb3fec3b394984129aaedc0bfc211544151
bzip2-devel-1.0.6-28.el8_10.x86_64.rpm
45085dd82dbc6423ed9fd40f16efbd7c5cf12a96ee01d12532fce43ae6279fc3
bzip2-libs-1.0.6-28.el8_10.i686.rpm
81c0b68bdb2ce1cc17582304c7d398a4e1d3b59fe0aa810354eafb32364d30ef
bzip2-libs-1.0.6-28.el8_10.x86_64.rpm
14ecb4995555392bd45644630196b6f864d93dba9c56133bb96f199841852ad0
RLSA-2025:0838
Important: libsoup security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libsoup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libsoup-2.62.3-7.el8_10.i686.rpm
48cf79b9a4c5168d2e512871493f3a01cb7bce7ecc907c0e58431046ef317b3c
libsoup-2.62.3-7.el8_10.x86_64.rpm
7de965f6ae90391bc229510826bfb40d58f5083fbd5cc369cd48882da0a66eb4
RLSA-2025:1068
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)
* kernel: arm64/sve: Discard stale CPU state when handling SVE traps (CVE-2024-50275)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.37.1.el8_10.x86_64.rpm
8fd9368a38acca93723950e2079385f627652b72f3af015c36e1fdbe76b78c97
kernel-4.18.0-553.37.1.el8_10.x86_64.rpm
a6f10a787566ad7251ba99e3982063bac702115478a55ed1039bbe454da810b0
kernel-abi-stablelists-4.18.0-553.37.1.el8_10.noarch.rpm
77c5ce9293e618095ab96866e6bc6c509bc5065a77eb4085273471c8938e29b5
kernel-abi-stablelists-4.18.0-553.37.1.el8_10.noarch.rpm
77c5ce9293e618095ab96866e6bc6c509bc5065a77eb4085273471c8938e29b5
kernel-core-4.18.0-553.37.1.el8_10.x86_64.rpm
92d6476e0aa8f80c2ce550429077658a7fdda41c19cd91a3784700a8ec158a6c
kernel-cross-headers-4.18.0-553.37.1.el8_10.x86_64.rpm
43c6790c8d196d3cd3066091cb725d81d076ea9cb1e9c2555117435a010e75fd
kernel-debug-4.18.0-553.37.1.el8_10.x86_64.rpm
dddae73a3a68e29bd06819ab19a7760d36a2d55a45c5aef99188ec06a679e4b8
kernel-debug-core-4.18.0-553.37.1.el8_10.x86_64.rpm
78a44b357754abf54d5ffc419b1bbfaec82ec2efa2976745c9ccb314f36386ad
kernel-debug-devel-4.18.0-553.37.1.el8_10.x86_64.rpm
30b60c6345cb0f463998c6e7b9e0a8a8915548e2e54b0957bc9171075ee032f9
kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64.rpm
01c58e5dbfc995e30b7ffaa4c3c58989b26b111c9eaf23328544b191597dacb1
kernel-debug-modules-4.18.0-553.37.1.el8_10.x86_64.rpm
9c29997e7000f17e090046f75e851fb9b59b4caf2bff196f01d2067c06eaf74d
kernel-debug-modules-extra-4.18.0-553.37.1.el8_10.x86_64.rpm
f06bd8be2ed354d0692d3b81567e43b889bfd9c00c17be06e3b1a78d34f05815
kernel-devel-4.18.0-553.37.1.el8_10.x86_64.rpm
952e47a3c01f803c46159d7adbf2b76aa1b1d10c8c943d01ab2101d62bfd5352
kernel-doc-4.18.0-553.37.1.el8_10.noarch.rpm
9ba60997ef996222c9e0e73322a6a716155ce49e6c2fd754edda32ff644ca154
kernel-doc-4.18.0-553.37.1.el8_10.noarch.rpm
9ba60997ef996222c9e0e73322a6a716155ce49e6c2fd754edda32ff644ca154
kernel-headers-4.18.0-553.37.1.el8_10.x86_64.rpm
b7ea805f1f1ee475c428e2df9d342f2b2df869d098fb8dfef567fae52991a048
kernel-modules-4.18.0-553.37.1.el8_10.x86_64.rpm
8e7a4f85a3a872e712bf9e3b024eeec4cc0d4eba943359a8b0ee3331b591c930
kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64.rpm
8fda798e4ced31dae4757d67a7b98e84fd129be3455ed1da0677b92a9d10e4eb
kernel-tools-4.18.0-553.37.1.el8_10.x86_64.rpm
7d7b04fbe161c17b1fb5674367a14703a7d7c72358f1e1dd2a7ea860eb78da35
kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64.rpm
5d2f4fd0e416af33824150af2bed122915b8c7ce929264d2bd6f769d6b92f9d8
perf-4.18.0-553.37.1.el8_10.x86_64.rpm
30cbff9761e4e12351cb18bf5b717f01391ed4a0b7c5634dc5605bd1b8de781b
python3-perf-4.18.0-553.37.1.el8_10.x86_64.rpm
bee57466558dd4e1d3bc3cf63a1e08643410168893f4920dbc2ff4f483eb4fcd
RLBA-2025:1104
tzdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tzdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tzdata packages contain data files with rules for various time zones.
Bug Fix(es) and Enhancement(s):
* Update to tzdata-2025a [Rocky Linux 8] (JIRA:Rocky Linux-74309)
* Update to tzdata-2025a [Rocky Linux 7] (JIRA:Rocky Linux-74311)
* Update to tzdata-2025a [rhel-9.5.z] (JIRA:Rocky Linux-76432)
none-baseos-rpms
tzdata-2025a-1.el8.noarch.rpm
2db0997d9d00c6280031eab80c627f962cc25e82d65baa8bf2146221a673ee24
tzdata-2025a-1.el8.noarch.rpm
2db0997d9d00c6280031eab80c627f962cc25e82d65baa8bf2146221a673ee24
tzdata-2025a-1.el9.noarch.rpm
8e93852cd736a3edcd048f9fe4eac259134ad10bbda6aac96e94d9d8d612043d
tzdata-2025a-1.el9.noarch.rpm
8e93852cd736a3edcd048f9fe4eac259134ad10bbda6aac96e94d9d8d612043d
tzdata-2025a-1.el9.noarch.rpm
8e93852cd736a3edcd048f9fe4eac259134ad10bbda6aac96e94d9d8d612043d
tzdata-2025a-1.el9.noarch.rpm
8e93852cd736a3edcd048f9fe4eac259134ad10bbda6aac96e94d9d8d612043d
RLBA-2025:1240
sos bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sos.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging.
Bug Fix(es) and Enhancement(s):
* sos "ssh" plugin collects user's .ssh files by default, which breaks systems when having automount users (JIRA:Rocky Linux-22389)
* Capture information about sched_ext in SoS (JIRA:Rocky Linux-70330)
* Capture 'ceph config dump' json output (JIRA:Rocky Linux-70689)
* sos report collects http_proxy password in plaintext in /var/log/foreman/production.log (JIRA:Rocky Linux-71193)
* sos report collects http_proxy from rhsm.conf in plaintext, via curl command (JIRA:Rocky Linux-71269)
* [rebase] rebase sos to 4.8.2 into Rocky Linux8 (JIRA:Rocky Linux-72941)
* [rebase] rebase sos to 4.8.2 into Rocky Linux9 (JIRA:Rocky Linux-72942)
none-baseos-rpms
sos-4.8.2-1.el8_10.noarch.rpm
b6954e92e68d2059981bccaf9d3a42bcaeed38424d0a3f61b5016625e219e751
sos-4.8.2-1.el8_10.noarch.rpm
b6954e92e68d2059981bccaf9d3a42bcaeed38424d0a3f61b5016625e219e751
sos-audit-4.8.2-1.el8_10.noarch.rpm
1e71919aafd6e987c0af78d4187f10a01b960aa0863b9f2b54aebd997954ee85
sos-audit-4.8.2-1.el8_10.noarch.rpm
1e71919aafd6e987c0af78d4187f10a01b960aa0863b9f2b54aebd997954ee85
RLSA-2025:1301
Moderate: gcc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Security Fix(es):
* jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libasan-8.5.0-23.el8_10.i686.rpm
400587a16c3933e397a0a4a1e7200ca0c6c1fd7729092337d2f7da3fd6111a70
libasan-8.5.0-23.el8_10.x86_64.rpm
9bbedca6f8328daccc2f97aad202d8bdefe54c6615d49c2ced8d97117c1384fa
libatomic-8.5.0-23.el8_10.i686.rpm
cf7605701936e2fe92d97a66175234c13f0f2f89494f6af9b0d919f848af8327
libatomic-8.5.0-23.el8_10.x86_64.rpm
17e827f28d2a788f021e77580e20f1899df12c9f847b3ad85119dfe07322c4a6
libatomic-static-8.5.0-23.el8_10.i686.rpm
2f5168625f328cb1e44c9667f98349ed09b0b79fc1ad3c0e9ad50e5c8182f031
libatomic-static-8.5.0-23.el8_10.x86_64.rpm
f0c9807d8016523069eb9e34cdbfdf15266db40b577743625f37cf03649d370e
libgcc-8.5.0-23.el8_10.i686.rpm
bacdc72fc0e3180c23ff30bd528969c42f389c8ae219d1fa2287e5f5c9206d6c
libgcc-8.5.0-23.el8_10.x86_64.rpm
484a55634bd2979a278d803e9447dd85054d70e31beb84b76980f6fc34151418
libgfortran-8.5.0-23.el8_10.i686.rpm
161c2bdeced8c241af87c35427cc10d6f8a724dbbda0428f2cae7b1b7cbce088
libgfortran-8.5.0-23.el8_10.x86_64.rpm
e57021755f06da31377b2d3cca29d94612abb35674f6d475bea82a35d2ab6140
libgomp-8.5.0-23.el8_10.i686.rpm
82619d4f4d25bb0e9963ea2f6517c184499fe315bf85699e6e56fc084d1529c2
libgomp-8.5.0-23.el8_10.x86_64.rpm
31c1aae5b27dfd30c11ab1901d6228061d3e01bf34f76899a3eb6b932d523aae
libgomp-offload-nvptx-8.5.0-23.el8_10.x86_64.rpm
1551e0f12f9799c508f8025821441d1fee3b4d0a10cbc33c1938a2a374074837
libitm-8.5.0-23.el8_10.i686.rpm
aadd87c6ea2011e6a5dac02a7801e4b9ab7a361feb307fc78a3edb7a3a81d5db
libitm-8.5.0-23.el8_10.x86_64.rpm
de6c2b27c7602b8744163139a4c42e156e0b2b4d9c272314babb57a83f0b8a50
liblsan-8.5.0-23.el8_10.x86_64.rpm
8e6cfb2cd6eac56a0430942900d1c13f726f7a5efd54f1d180a2de469369838a
libquadmath-8.5.0-23.el8_10.i686.rpm
97e5263c9a201123f1ae84959bf4f3fdeb8becb2994f33af1202f3501259aa5e
libquadmath-8.5.0-23.el8_10.x86_64.rpm
eed536443a21ecf2e374d8572a8593cd078737343243d8b4133e436c53e6fdbb
libstdc++-8.5.0-23.el8_10.i686.rpm
5ea1dd3af825a1c581ce710b1943aa568dbc2252fb92e0730d2ca9867e6d4458
libstdc++-8.5.0-23.el8_10.x86_64.rpm
665e22f5f1c35184edb7a27ffb7ee757166fc72477077445bd515037c8275dce
libtsan-8.5.0-23.el8_10.x86_64.rpm
dd1c0d71869a20ae89c32b4727201dbc41ddfd08d562d9fa9aa4900e21ab26c3
libubsan-8.5.0-23.el8_10.i686.rpm
fb31f03da402037c7ced2c877f7142c05f792aacdfecf74cc549f7f45ceba337
libubsan-8.5.0-23.el8_10.x86_64.rpm
e970f3ab376fc358faa12232716c16ed5f3cb528b7a239f0df40bf0168872396
RLSA-2025:1266
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.40.1.el8_10.x86_64.rpm
2f7db0d2d1a40b203bd372c63fde7f4f13e1cf9c839a9a9fc8a532ad231e1dfc
kernel-4.18.0-553.40.1.el8_10.x86_64.rpm
16ad4c795adceeff2f5a552a9fecb5f029ce1fe45cd209b27036062e50876039
kernel-abi-stablelists-4.18.0-553.40.1.el8_10.noarch.rpm
11b048ba6c7a9ce1ac1e953bee5fc1fab35513f24a65de449bf19bf967f43177
kernel-abi-stablelists-4.18.0-553.40.1.el8_10.noarch.rpm
11b048ba6c7a9ce1ac1e953bee5fc1fab35513f24a65de449bf19bf967f43177
kernel-core-4.18.0-553.40.1.el8_10.x86_64.rpm
55983b5d48f333bba3c73f1591f22dd71a5ec3e5642201e74e4e637e09a85088
kernel-cross-headers-4.18.0-553.40.1.el8_10.x86_64.rpm
0a214edacd435aed49c0ff3a12f6d74d77a0bc4b8972d77e2defa5801c631d33
kernel-debug-4.18.0-553.40.1.el8_10.x86_64.rpm
9d8b8abf7da42a1a202026c319dc50dfb3a8830b055e4447fc45197309a17d0a
kernel-debug-core-4.18.0-553.40.1.el8_10.x86_64.rpm
f9f1620029fe01c34f3d702149eb0eb32af15ae3451ccd5b4a4d896529b76e26
kernel-debug-devel-4.18.0-553.40.1.el8_10.x86_64.rpm
1b2a7f1f2224eb4b3ccbe4ae6f5aaee02b9ced5c9ef44340e671eb97520a252b
kernel-debuginfo-common-x86_64-4.18.0-553.40.1.el8_10.x86_64.rpm
d30d66eee251a555ba1f3b5a7681fe8e042e45ed9b46ee67b3348d05438ed8ef
kernel-debug-modules-4.18.0-553.40.1.el8_10.x86_64.rpm
11b82e23b562af30293286b5813f71bb571c251bdb1c776274f72cd179437ef9
kernel-debug-modules-extra-4.18.0-553.40.1.el8_10.x86_64.rpm
30ba8c1ffb0aece441b38d967396217bc018c4bc1dba91b8cad53c601a3a2200
kernel-devel-4.18.0-553.40.1.el8_10.x86_64.rpm
bb3ed2e084a12836acfe55d54b1236cd2f58ec6806b683ee2d9e4eb98e12e139
kernel-doc-4.18.0-553.40.1.el8_10.noarch.rpm
771313783e5c20441d5f0eb72ad1bd14d65ba6329aca536a841b83ada3b1a0d1
kernel-doc-4.18.0-553.40.1.el8_10.noarch.rpm
771313783e5c20441d5f0eb72ad1bd14d65ba6329aca536a841b83ada3b1a0d1
kernel-headers-4.18.0-553.40.1.el8_10.x86_64.rpm
92b24735c0cb28ff0b432a48da48bab569675630128eda98887d3d6670524401
kernel-modules-4.18.0-553.40.1.el8_10.x86_64.rpm
9a5aa326edc3591e484d0a306d4823f00dc70c84206f202465e4a9c11e4aff9b
kernel-modules-extra-4.18.0-553.40.1.el8_10.x86_64.rpm
10632cea7bfe19c0e9c418b7fb9f6a9690a7e60ea2d46b1c5c184a90acbc511e
kernel-tools-4.18.0-553.40.1.el8_10.x86_64.rpm
cead1abc418d7e6fa225919431b24f7bce78953fc4475f894dbba15af3f7fb46
kernel-tools-libs-4.18.0-553.40.1.el8_10.x86_64.rpm
97d4ec2cdb4ffa9510c41ec0b50c90805bda422b2746dcbe35b5346475ffe9d9
perf-4.18.0-553.40.1.el8_10.x86_64.rpm
8b094b2a4c71637810f0cf7b6bbf51ef01179545056e2ac0becc5696a7a54780
python3-perf-4.18.0-553.40.1.el8_10.x86_64.rpm
dcdd7186c0b241c354bcae8de75eca24b38a0dac2a29737be655d7d2d5f1135b
RLSA-2025:1517
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: use-after-free in xmlXIncludeAddNode (CVE-2022-49043)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-18.el8_10.2.i686.rpm
3b35e718c3d24f345bde6061b26041de0baed5f25a164ac90453224ce6818e6b
libxml2-2.9.7-18.el8_10.2.x86_64.rpm
b5454a505e4ba55a8032fb28130570d9bf3c937c60dee833b74592fda3be948a
python3-libxml2-2.9.7-18.el8_10.2.x86_64.rpm
6cf2770e0808ea1ea4e0a942a963172efeca1e18d78120442f19f7d13c9182a7
RLBA-2025:1573
glibc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Bug Fix(es):
* glibc: pthread_cond_wait missed wakeup (swbz#25847) [rhel-8] (JIRA:Rocky Linux-8381)
none-baseos-rpms
glibc-2.28-251.el8_10.13.i686.rpm
50adeca8ea110233a0b80ae6615ec5c548bc165c73160edbd68d518daf278ca0
glibc-2.28-251.el8_10.13.x86_64.rpm
a6b3432e372d0dd98ff888b710d3d7be8d36744c8034e417828ce6454743f1c9
glibc-all-langpacks-2.28-251.el8_10.13.x86_64.rpm
746d80a5ef12379bf322758c3d413a7df781ffab34bf3b17c4a9192c65fd936f
glibc-common-2.28-251.el8_10.13.x86_64.rpm
2013e3f995c7a8f3930f77a6aaa297b7119a65303ecf632cfd0813e57879400a
glibc-devel-2.28-251.el8_10.13.i686.rpm
34af26f04f02b79166e0aa7ce9c799d94a5a50ddb34a6fdfb4817910a3eaea68
glibc-devel-2.28-251.el8_10.13.x86_64.rpm
3063e24dd9250bff462de0e81eee598ae3667a6b9e7373ac2524b6ba43642da2
glibc-doc-2.28-251.el8_10.13.noarch.rpm
170cd795503edcbba4ee0529bd763a306908f33ded18bbfe86a3959c2ce72bfd
glibc-doc-2.28-251.el8_10.13.noarch.rpm
170cd795503edcbba4ee0529bd763a306908f33ded18bbfe86a3959c2ce72bfd
glibc-gconv-extra-2.28-251.el8_10.13.i686.rpm
8be80c7c1a5765481ea48feaf8c5c0b184e3420d9137cf22ae99951eee96779a
glibc-gconv-extra-2.28-251.el8_10.13.x86_64.rpm
55c53c3fb5d951b4a1f9618e3601fca13b4132383bb60148cd242784d3b615b3
glibc-headers-2.28-251.el8_10.13.i686.rpm
665bd2e715194d1f2b6267e684265033883ad85f6131cd99881b364894e333aa
glibc-headers-2.28-251.el8_10.13.x86_64.rpm
d1e0e8415c3211a2ed03e7be4ebf62950141187e3f6aa79c798442b5405f41cf
glibc-langpack-aa-2.28-251.el8_10.13.x86_64.rpm
abb6acc4a53ff32d7a8f18b719d0992849bd789690d55f90204a8f16b8e8b696
glibc-langpack-af-2.28-251.el8_10.13.x86_64.rpm
51fb746a6741848558f4faecb54173d964cfabb2142e96bc815d0b9db0750a4c
glibc-langpack-agr-2.28-251.el8_10.13.x86_64.rpm
1e74c4558fa7ca9daceec6e9215823242592ae9e05d7e9dd534c44f3c67a0e60
glibc-langpack-ak-2.28-251.el8_10.13.x86_64.rpm
9f62824da629d06c6c68b1d8b5453e367304fdd3c401c5a864a2e64de6facb0c
glibc-langpack-am-2.28-251.el8_10.13.x86_64.rpm
b67e3fc1d5f182186526c334b67a60b10990b389e41aff38c6531da912c08681
glibc-langpack-an-2.28-251.el8_10.13.x86_64.rpm
d341cd6617f8bccb273879d2f9d56c4d5be3b4955c17dc850ecdd37c369512cf
glibc-langpack-anp-2.28-251.el8_10.13.x86_64.rpm
894914edf559cd4e597b7a6942a9ffadc931c8af12d6b99a54715dd8691e1172
glibc-langpack-ar-2.28-251.el8_10.13.x86_64.rpm
0ed192c05b08968f6e3ed048ce369f584103e5554b0b60cde21ea3d117e1b23d
glibc-langpack-as-2.28-251.el8_10.13.x86_64.rpm
8927ab20a4f0df508d4b11c14578e5b2a32553fb481cc82f606d13ea5c8e9894
glibc-langpack-ast-2.28-251.el8_10.13.x86_64.rpm
33d3d16044389a4f0607404d8c59dbfc597b9e2c530df6000bee3427a2535e0d
glibc-langpack-ayc-2.28-251.el8_10.13.x86_64.rpm
354c9d0f170763fcc3fb741f1aba5b83532206c2a3422ed13c39caa0d04b0ed8
glibc-langpack-az-2.28-251.el8_10.13.x86_64.rpm
ecc28a9913babf9c291f155b15ebc75c364d754bbf2afa60daa75768d6195590
glibc-langpack-be-2.28-251.el8_10.13.x86_64.rpm
82ef1631c4720d13b67682a31d383b93f808a5a583687b3e117c24395bb4c5a0
glibc-langpack-bem-2.28-251.el8_10.13.x86_64.rpm
6f0ed504cfb7540e1a6e71653d4340dcaaffa6e88018eb0feab206ad9f2d7433
glibc-langpack-ber-2.28-251.el8_10.13.x86_64.rpm
a8a78937bf39ef6960ddc8a38713d4c93da29b291571a918c85b37264c8baa14
glibc-langpack-bg-2.28-251.el8_10.13.x86_64.rpm
251e0da742d823f51540185ba05f7f133132bd326992a756c28098da1769f7d7
glibc-langpack-bhb-2.28-251.el8_10.13.x86_64.rpm
98e7ce18127737e21c57f1745e678f4c054b5a8d31624876c4a92c61b4ac8828
glibc-langpack-bho-2.28-251.el8_10.13.x86_64.rpm
b15844263e3b4276a9f359d407350535b3a1e73b5d35076441133d284e0fe8c3
glibc-langpack-bi-2.28-251.el8_10.13.x86_64.rpm
703f985f7ef0154617997c3fc32721a9ad3bf35d5293b5970bac0606ae2bcca7
glibc-langpack-bn-2.28-251.el8_10.13.x86_64.rpm
c23f6cba1d33170f3e80a3ac08350594715551203ba8355fd8369370d06f462d
glibc-langpack-bo-2.28-251.el8_10.13.x86_64.rpm
7fcf87dbadc0989b1c7bc1a6aea003e687c94d0f33a4360a86ea126b3b89907b
glibc-langpack-br-2.28-251.el8_10.13.x86_64.rpm
2d04c392531fbbb4dade630820575675e9d41e5942cf5ae6e93c0238788f1f12
glibc-langpack-brx-2.28-251.el8_10.13.x86_64.rpm
ea0f9ad48855dc78aacf0b77eed017286e370b849af19713e00be9dd91d5ec9d
glibc-langpack-bs-2.28-251.el8_10.13.x86_64.rpm
20a3fdcc5ae5756837133d06641f0fc5456b2e9fc9c0cc681e23251f6750cfdb
glibc-langpack-byn-2.28-251.el8_10.13.x86_64.rpm
aaf960c27f135fb86ada736b5aad02df6ee61ad642597978a5b8392ab0599798
glibc-langpack-ca-2.28-251.el8_10.13.x86_64.rpm
90dd1f19c45c79620639efdf8932a425099df14c6210b80e209d68ac764d6285
glibc-langpack-ce-2.28-251.el8_10.13.x86_64.rpm
cdc5d90df9b1a3a7bf45cbed546a464d734a0d88bbb1da4c03c500739bb73c5b
glibc-langpack-chr-2.28-251.el8_10.13.x86_64.rpm
912bc37b815dc2042e32ee5c005f215804dcd05274886b767c934d8d84e0abfa
glibc-langpack-cmn-2.28-251.el8_10.13.x86_64.rpm
8a77d02754e0f4a8ab7ec819b30f3f0849490ec395cd5d1adedb6baad6e3e8a1
glibc-langpack-crh-2.28-251.el8_10.13.x86_64.rpm
6e43451cae0cb200cd5e186d27a9e1a7e67f455380149248785cf70459802921
glibc-langpack-cs-2.28-251.el8_10.13.x86_64.rpm
d95e469d56aa8b665e2635634bf5832ae4fa9b192e5190e81d1606428be76a9a
glibc-langpack-csb-2.28-251.el8_10.13.x86_64.rpm
af0ba70eb3be4e7dfd6855a62b2b5dcb84dcf9994948e0f76e6da307f66033d1
glibc-langpack-cv-2.28-251.el8_10.13.x86_64.rpm
d8aa29ae4cd0d9be32654ecea1a76ad6a4ec640e02987c48772336f3697cb9c0
glibc-langpack-cy-2.28-251.el8_10.13.x86_64.rpm
39fc4610ac14343258850ebf2498f9e61dafbf519073114305fd3d522a540aff
glibc-langpack-da-2.28-251.el8_10.13.x86_64.rpm
f03e846da13aa592a7a067af0c55aecaa9f98c55e2b1395e93803b6f7218bac7
glibc-langpack-de-2.28-251.el8_10.13.x86_64.rpm
07ab66956e3742b8eea6d8aa61ec11d760431874ca0428333f2c309c7220a5bf
glibc-langpack-doi-2.28-251.el8_10.13.x86_64.rpm
a51e1191cf777f8c4be62a78197347e80172c5d5fa45ebe6041f35ff90df1651
glibc-langpack-dsb-2.28-251.el8_10.13.x86_64.rpm
93aa1978a3f3538f6ebcff65ba27f98877d1c7e8dd58d1595f5ec9934a8efbe1
glibc-langpack-dv-2.28-251.el8_10.13.x86_64.rpm
403c52a3f2fca67a0177870ae035ae044cd591a973d054c41093f8be226f8c23
glibc-langpack-dz-2.28-251.el8_10.13.x86_64.rpm
983a1ef5953ca532f81bcc924a3bb589c7c94561be51dc48ae8766a334dfafac
glibc-langpack-el-2.28-251.el8_10.13.x86_64.rpm
3baa4ab520537e21f3641d4cf2c79ee8c329934fac2aa66b1ce3cefbd5a11d0f
glibc-langpack-en-2.28-251.el8_10.13.x86_64.rpm
bae18d090cce373693cfad01840e00d162f493579e1ad92cdb014c800654caec
glibc-langpack-eo-2.28-251.el8_10.13.x86_64.rpm
17b30a64c602e249e59953103ee74bb98fcfbd81bcbe7b4f91f7bb6a2674f987
glibc-langpack-es-2.28-251.el8_10.13.x86_64.rpm
a7276eabc756504b26f3ce321c3b7fcadec5eba59be07aa14fc90e5238dffc29
glibc-langpack-et-2.28-251.el8_10.13.x86_64.rpm
a208ab3090251cfb06d3b43bd6a7fee2ec28c5c393863cddbe484b3c13f0b887
glibc-langpack-eu-2.28-251.el8_10.13.x86_64.rpm
d85167de0bbaa4dca72a5a1c24119f0f5cfea044d7efead6876bf112598b984e
glibc-langpack-fa-2.28-251.el8_10.13.x86_64.rpm
08e9e220a7c38d26881ecd69d14e0248873db851caf13dc5dcbea74983791034
glibc-langpack-ff-2.28-251.el8_10.13.x86_64.rpm
8035dd4b2535bc8433ccbda26a8cf0ec0410a463988d2d592349237ae5350c8a
glibc-langpack-fi-2.28-251.el8_10.13.x86_64.rpm
c543496c04fcef02c37f7c6eacda0df4300b3f804eccf39ed1ecc16d050d9f17
glibc-langpack-fil-2.28-251.el8_10.13.x86_64.rpm
b378a3dd9e878f8060871ad9b362d421a5a8c73b06e5062a82b64538ad4860b9
glibc-langpack-fo-2.28-251.el8_10.13.x86_64.rpm
ca84b807d390701275aa6e2f7e1b4394c8fd6f0788a451d06f6fc76766406c57
glibc-langpack-fr-2.28-251.el8_10.13.x86_64.rpm
96120a1fd991763703a42b7a37e402be78a33161c49c852e0cd64204b7f6c69b
glibc-langpack-fur-2.28-251.el8_10.13.x86_64.rpm
bd8c56b5ef8c7dcbfb47107b65874b75764607fd4659631dbd7dbaa239adc0a1
glibc-langpack-fy-2.28-251.el8_10.13.x86_64.rpm
6f4a168a7029c3b03bd61673ee0b4d1d2343897de75dd2ba31a9fc2e8420ad5a
glibc-langpack-ga-2.28-251.el8_10.13.x86_64.rpm
cc1084ec91816305aeb14665f82412f3526ae5ff856de087c4ea05d6d13a8b73
glibc-langpack-gd-2.28-251.el8_10.13.x86_64.rpm
831b15c1c3159b8a4b5c7e2a8eef3179bf2a9351efd1500b70c537e5f8bce641
glibc-langpack-gez-2.28-251.el8_10.13.x86_64.rpm
e28395f7bc8ba41ae38d8510219cf3c74351af3b94cb40cf42a20c68a5cf0dca
glibc-langpack-gl-2.28-251.el8_10.13.x86_64.rpm
6f6635cb7f0b0cf6ba0ea133a5fab7b12a928678518f2cab20131371e3cb8e34
glibc-langpack-gu-2.28-251.el8_10.13.x86_64.rpm
18506006749b914b4e5853a8bd9b437bcefa3e8e2ea82ea3c5781276b5323005
glibc-langpack-gv-2.28-251.el8_10.13.x86_64.rpm
20a8ad1835f5fad0600dad589ac5d49f8d1adad1eefdd70d68ab54661f6918ec
glibc-langpack-ha-2.28-251.el8_10.13.x86_64.rpm
cd5187ab788dd0933773e6d17ee3899bf816da1befb2ad92d42eb40af5820595
glibc-langpack-hak-2.28-251.el8_10.13.x86_64.rpm
4da97fb9f9cfe13329fc9463b55ddea0876ee7dd6828184f0e69c0c40a39b144
glibc-langpack-he-2.28-251.el8_10.13.x86_64.rpm
044560ad3de1b68237c30b7d94241b84507219593521743c752d5bdeb54e6691
glibc-langpack-hi-2.28-251.el8_10.13.x86_64.rpm
0627550bccdbf0df506e6b7281a3df477213a53a1f5acc5b4c0e56ffa55b0caa
glibc-langpack-hif-2.28-251.el8_10.13.x86_64.rpm
26ffd8e18d9e35b9cdecc3145efa08b4c513758c63b9b04c1b2742fe250489cb
glibc-langpack-hne-2.28-251.el8_10.13.x86_64.rpm
ded43a36fce1dda39ecba08fd43fa318e1a3762a260544d29d17990f7ce4d6a9
glibc-langpack-hr-2.28-251.el8_10.13.x86_64.rpm
8d505c86bbc42b156ea2c74b0e223899382edf1afc5885bde87784dfa51eca51
glibc-langpack-hsb-2.28-251.el8_10.13.x86_64.rpm
54b391569e7db7a71ad097e1d6cae71d7548777ee69b2f0126a81f0d49fdfa7e
glibc-langpack-ht-2.28-251.el8_10.13.x86_64.rpm
1d83f8bca10d9e0aa9fc04c8ad45f8855f7e0dea64b06d27de32be50fc7b6f60
glibc-langpack-hu-2.28-251.el8_10.13.x86_64.rpm
95b3968bbd444d714c482ac3b23e497a22e82580e6c1c73f0d32b3ed2f2963cd
glibc-langpack-hy-2.28-251.el8_10.13.x86_64.rpm
3a53cf5ef29ce23160e1a2d34b98b029ff9d11540e9d0f38f6513fb74894387b
glibc-langpack-ia-2.28-251.el8_10.13.x86_64.rpm
d867810344f39cba25f827827006b810edf6d451d4b12ab360666435e678f664
glibc-langpack-id-2.28-251.el8_10.13.x86_64.rpm
1b5f5066ae3136f8501244ea94c5818344f204ac9c8c698f7cfe2cd999eaec54
glibc-langpack-ig-2.28-251.el8_10.13.x86_64.rpm
cda8627cf656024c6fe0f6b262d0dc8b8bea56e4d708ab758a8926b94ed82b5d
glibc-langpack-ik-2.28-251.el8_10.13.x86_64.rpm
eee6e80099a1d6e768d49a2bf51bd7ab44496c4b37da906723cd7c2653a7f0d1
glibc-langpack-is-2.28-251.el8_10.13.x86_64.rpm
f06634222ad1af28045df7d78e97a549782462ae38f8b50f8179c4ef39fdff94
glibc-langpack-it-2.28-251.el8_10.13.x86_64.rpm
b87b81883f3a4507bcb8d7984196cead4d29c2519d0ed567a242b4a210a4fefb
glibc-langpack-iu-2.28-251.el8_10.13.x86_64.rpm
04ca31c834fbbbda8b006b2ba5ee549939c1ad6b07ab17d041da00ddb76de6b9
glibc-langpack-ja-2.28-251.el8_10.13.x86_64.rpm
aa21c0981d087573504c68677d925b9af9a7226745cb9ee6f07c6cf2be4822d2
glibc-langpack-ka-2.28-251.el8_10.13.x86_64.rpm
241d69f3c8d78b3af30476563674ac944bf106c7908fa07c9dbdfef68dfdb67a
glibc-langpack-kab-2.28-251.el8_10.13.x86_64.rpm
67f58da36480a4b5064a117910cb8a5e61eb4d5847e09820e059aee8692cb23c
glibc-langpack-kk-2.28-251.el8_10.13.x86_64.rpm
5ccfe66a4e8ee66ce4ac1f5869005fe7f77e79e2ed6e086f7ecb73c8e4a23d8f
glibc-langpack-kl-2.28-251.el8_10.13.x86_64.rpm
dec616d4f3258fe11a0b13d0f5ce95aeafe7694d4b4344121efd35dd10401edd
glibc-langpack-km-2.28-251.el8_10.13.x86_64.rpm
e7cb87e3728708b1460cc2b4d7e8c0bae80006be33b417cebd6a1a43a686232d
glibc-langpack-kn-2.28-251.el8_10.13.x86_64.rpm
54562b3ee5fb57caf9cc1f4d7b99eac1a3575cd988ede96d36e9e9cd96917de6
glibc-langpack-ko-2.28-251.el8_10.13.x86_64.rpm
f2280550ff244c5a76f482f23b6aa0df64bff58fa4530d76b71b5b38b345a981
glibc-langpack-kok-2.28-251.el8_10.13.x86_64.rpm
2b7dd0cf344a557424a7abe513fa6d3ee40906a3b5a3e37ab3de5f0749640dc8
glibc-langpack-ks-2.28-251.el8_10.13.x86_64.rpm
c94110560acb6bd7bbe0819f62088f14c41aa1f9c2cb1cb1d1198d95bd8e6ffc
glibc-langpack-ku-2.28-251.el8_10.13.x86_64.rpm
5fd823f13449c7a61fc6baf5134b1174ccbbbd7df700bbae6edcf6fae1e535fc
glibc-langpack-kw-2.28-251.el8_10.13.x86_64.rpm
9b58d40a4261880dc3c070699f48ec7abaccd7f90578f90013bf36571aab0b65
glibc-langpack-ky-2.28-251.el8_10.13.x86_64.rpm
b2e09c54dfd9d5e29b41b33f4b5a50a24c3ca1acb0e99d98b0d395c5f98ef31a
glibc-langpack-lb-2.28-251.el8_10.13.x86_64.rpm
16d849a1eb25f276ef98a4fa630623e271904375500a48f467221620ff7a6c62
glibc-langpack-lg-2.28-251.el8_10.13.x86_64.rpm
27a939ba8e42f02833794fc3b20f83add8841ccb759641f5d26251c07e2aaca1
glibc-langpack-li-2.28-251.el8_10.13.x86_64.rpm
3efa8698fdda40616c9acf123c1814437054d318c4bc91b765b0963e65246e3e
glibc-langpack-lij-2.28-251.el8_10.13.x86_64.rpm
7b6480c57cb4b86e105e8d95edcd304e40983da4422723dc834a637b1df0dfe7
glibc-langpack-ln-2.28-251.el8_10.13.x86_64.rpm
c465794434e3b501855dd458c39a7de0751e067813afd5b403df2a19291ee1c1
glibc-langpack-lo-2.28-251.el8_10.13.x86_64.rpm
6d2b416214952f99d12eb264d9ab17b63db7cd12edcb77fb81aaf9ec76dc0a2c
glibc-langpack-lt-2.28-251.el8_10.13.x86_64.rpm
290000084cd328a9871d450c8ec0b12fa470967b46d8c828494cf15def3527a0
glibc-langpack-lv-2.28-251.el8_10.13.x86_64.rpm
dec6b265cd3c93e7057ed89455fe874f5864d78f21f7512cda86b33d5c65ce1d
glibc-langpack-lzh-2.28-251.el8_10.13.x86_64.rpm
c8d01052976d7a4eb5a8f49cea375a7a55df675e2258518cde13f4820aab43ed
glibc-langpack-mag-2.28-251.el8_10.13.x86_64.rpm
df86a5aef84db37d2b5c7ba97c0eb4120febe103361a2d5aa10579b9d09b5c4b
glibc-langpack-mai-2.28-251.el8_10.13.x86_64.rpm
7a252cfc6c7127f31a1ed56f9de942508d552e98cbff27c6bc87f690182d3902
glibc-langpack-mfe-2.28-251.el8_10.13.x86_64.rpm
a6a04978fd73ad96196320538b5ca5b11c0470f6e14544507e6b13bde29701ce
glibc-langpack-mg-2.28-251.el8_10.13.x86_64.rpm
a98973a5f93edb58930d5486f32765238df675ed375d83253e462eba6bfee918
glibc-langpack-mhr-2.28-251.el8_10.13.x86_64.rpm
8e7d2437c8b1097313afe52d0f8af71a63ccb44603b942988d389e41e5fc25ce
glibc-langpack-mi-2.28-251.el8_10.13.x86_64.rpm
2349f38859ded25d247c1ca20ebf25291adef1ba1d2d0f6f1b4625b378de3abf
glibc-langpack-miq-2.28-251.el8_10.13.x86_64.rpm
8c37029b6b566b78061b98cd4718193ae10738622ec12b4a1cb188e19d80fef4
glibc-langpack-mjw-2.28-251.el8_10.13.x86_64.rpm
5d127a6e8907b7384203dbb28d42db3038e93b04640fa4f835edaf07708784d4
glibc-langpack-mk-2.28-251.el8_10.13.x86_64.rpm
6e8ec99e7293240553a3e6005c9c631141fa70e8273934110b58138601947203
glibc-langpack-ml-2.28-251.el8_10.13.x86_64.rpm
de3c208412f9d06017434d2bf906489e3b13623fbf8ebd13b042998ed2218cf2
glibc-langpack-mn-2.28-251.el8_10.13.x86_64.rpm
730da706e3f3abdb0fae24d7082932fc95a8594c47498b46b516ae6c6d0bf8fc
glibc-langpack-mni-2.28-251.el8_10.13.x86_64.rpm
63e652b75e64cc7b51d2d43dc2c905e498539414c009b7b4aefda9ab7349d396
glibc-langpack-mr-2.28-251.el8_10.13.x86_64.rpm
eacfdb6d8fbc022350bfda17937d7e8dbb11bddaebdb520e9ea2c97b25c24665
glibc-langpack-ms-2.28-251.el8_10.13.x86_64.rpm
eff9a28e4774e4f6c4bcc9896c93bc8932a9ae5c7b75bc551fd892539f4b09fa
glibc-langpack-mt-2.28-251.el8_10.13.x86_64.rpm
aff42f12815ef47a91b3bb2875e2f75fc32a8cf692cc011a10afa7278ba007e0
glibc-langpack-my-2.28-251.el8_10.13.x86_64.rpm
3d711e0269005a22ea7b667eba359150f3e7deb2021357ca8870f74dd51d0019
glibc-langpack-nan-2.28-251.el8_10.13.x86_64.rpm
18ff84215de285d81de7020685bd309e086f130902b3b32a654a79cd2b854214
glibc-langpack-nb-2.28-251.el8_10.13.x86_64.rpm
3acf4a862de7dfdf4c029551f55a82f2e94d54daaf8e7e0f2bfd1baf44013836
glibc-langpack-nds-2.28-251.el8_10.13.x86_64.rpm
43ba86bdfcc936784ecc5fd1d85483b3e88ff28dc00218fe28a93e5cc33e730a
glibc-langpack-ne-2.28-251.el8_10.13.x86_64.rpm
87b911157ebfbe5aa267c3fbfe31d1f8b1f64e8be138ec00e24b6b0d5fce9b7a
glibc-langpack-nhn-2.28-251.el8_10.13.x86_64.rpm
d74f1c30bb57cf0c8b7b1d423764856c0e93ddbbc29ff35788615028faf19886
glibc-langpack-niu-2.28-251.el8_10.13.x86_64.rpm
27ea3d5aef371aba6228468e63370c5a7a2f22ba9df8890f14ecb063c82231bb
glibc-langpack-nl-2.28-251.el8_10.13.x86_64.rpm
760940df9ccbe711398baf97756cc8f8be60cea67f2293e8a2e03e6b96745153
glibc-langpack-nn-2.28-251.el8_10.13.x86_64.rpm
eaf5b0af80e0929e254cc9df86b6e62029ec5aae1db32c3042be3edfc135794f
glibc-langpack-nr-2.28-251.el8_10.13.x86_64.rpm
0a914449d446d48a3aeb6468f889913f3ce17d5d6f5e94d1fccae7bcb2320e39
glibc-langpack-nso-2.28-251.el8_10.13.x86_64.rpm
46363bb0917ed991b61cbdb98c633ce7e45ed751c176e28ba8cc48ff0754659b
glibc-langpack-oc-2.28-251.el8_10.13.x86_64.rpm
4c2686f1e21cb980da7cb8dc201370e3002a47665f125db0361805a4bcaaa6c1
glibc-langpack-om-2.28-251.el8_10.13.x86_64.rpm
216571a7bfd38ec173f0a16ec14498cb3c35967b376fe12b257bbfc477b15061
glibc-langpack-or-2.28-251.el8_10.13.x86_64.rpm
d31b59b186a649e729e170edc437ccb3d799cf2822399931827317f1324f6282
glibc-langpack-os-2.28-251.el8_10.13.x86_64.rpm
e8f047a31af0f507b055d894ee4fd6adf4097ffbb6212ece4fd1826c0a467aff
glibc-langpack-pa-2.28-251.el8_10.13.x86_64.rpm
85b5327ab33ed23b88f4d07140eb10bafeb5006d77de505b486214feef45e196
glibc-langpack-pap-2.28-251.el8_10.13.x86_64.rpm
cf043042be4f05da57f1ef069a6c8a4795c6626e066a0fac9e0cae14d5051db4
glibc-langpack-pl-2.28-251.el8_10.13.x86_64.rpm
f73081554fd39d31eb0bdfdc18cad401f20f46db9515d3b6e48ddddd686f7fcc
glibc-langpack-ps-2.28-251.el8_10.13.x86_64.rpm
c13887036860e25170d457f1940147c43d9fa70dbbe7ef2a65639a0e7cb82311
glibc-langpack-pt-2.28-251.el8_10.13.x86_64.rpm
ad6e4b1828c6084af958a724b4a1b61c3fa2d3692d2620a4669764f4a151f9fa
glibc-langpack-quz-2.28-251.el8_10.13.x86_64.rpm
96b6ef780ea29706c312f0e4aa17d13b67232f63fdce1d9a137f430c3b6b7876
glibc-langpack-raj-2.28-251.el8_10.13.x86_64.rpm
0d542cf0af37bce2f7217575de68de88bedd09be4a828bc5f735ba77faff3458
glibc-langpack-ro-2.28-251.el8_10.13.x86_64.rpm
de1f4d16639009771a0842d5847ab0351884a8b7aaa6ebfe9f5d1d98118c4910
glibc-langpack-ru-2.28-251.el8_10.13.x86_64.rpm
0b0a73b0c918a7e60c026ace63bbe65093ad2bff8ba47761c808075617c9b607
glibc-langpack-rw-2.28-251.el8_10.13.x86_64.rpm
196f19cae2f246e08531834a4b92764e587ce5ae531960d05b17503a8b7af24f
glibc-langpack-sa-2.28-251.el8_10.13.x86_64.rpm
3c3fed292ceadb89bddb7412e0634ecade13124914c4d4b52a2b2c2df66b9d59
glibc-langpack-sah-2.28-251.el8_10.13.x86_64.rpm
cfca7cf3f522619d3949b338d2ab6f636bc0d9263e2a7a8dc2f91c6424fc2f80
glibc-langpack-sat-2.28-251.el8_10.13.x86_64.rpm
f731a66c5c6f84e5f429399dbf66bf107892a957dcf4e1abb6352a5edf05ff4d
glibc-langpack-sc-2.28-251.el8_10.13.x86_64.rpm
d2eaf9d78cf952433dd0d956f443cc548a414892d37242241fef997c441b1780
glibc-langpack-sd-2.28-251.el8_10.13.x86_64.rpm
d73b3b963f51c20046a8ccb0d69147f14f9d8a3af0776ee9dc30f9b2bc386604
glibc-langpack-se-2.28-251.el8_10.13.x86_64.rpm
a0d70d765d2dd604fc778dbb51aedb17e77eb573d8fe9c6731460e6e27ed5b13
glibc-langpack-sgs-2.28-251.el8_10.13.x86_64.rpm
aec0a53edc73ac400e6112a674dd99c520521612aa2118038a35c2299e5d31de
glibc-langpack-shn-2.28-251.el8_10.13.x86_64.rpm
21ca70a1d0b7804d9c6387f4e0f6a6419ca24fae201559364ba7df33f64b0c88
glibc-langpack-shs-2.28-251.el8_10.13.x86_64.rpm
e27fd91bc0abf82eb1bb2d4719b9e5009d596a5d19dc1332040ddd718cb41a36
glibc-langpack-si-2.28-251.el8_10.13.x86_64.rpm
c5f12e29204e400f397af8632ffa3dc4138ec8c43af1600d3b25ad2467740a69
glibc-langpack-sid-2.28-251.el8_10.13.x86_64.rpm
e5477275c40d906aefd2e79c8919c6ae086b45768ccba4708f21bdf903f0cae7
glibc-langpack-sk-2.28-251.el8_10.13.x86_64.rpm
8ff40d38435f48c59b5fa34424cfabce107f7baf604ece0cfcb841f1aacd6e59
glibc-langpack-sl-2.28-251.el8_10.13.x86_64.rpm
ce7a10849dbd13d6a218c17907ae1f724886edd2dd722c08c786f285321e1d36
glibc-langpack-sm-2.28-251.el8_10.13.x86_64.rpm
e9b3bf3e79869a8d96aa1739b61d90ad25eab0b3d2cc14d9f848bfda9fa15dc3
glibc-langpack-so-2.28-251.el8_10.13.x86_64.rpm
763c98e8a02fc923ce8d7fa8d8b97ba8f77e2c1a027f9324ab0c6f65f2fd3f5c
glibc-langpack-sq-2.28-251.el8_10.13.x86_64.rpm
a69cee5567398697ee6cfa3280034698d690204957a76cb8d4785c3eddcc7f52
glibc-langpack-sr-2.28-251.el8_10.13.x86_64.rpm
2546db92621785636cc2bc3ba4650ffff2b942f40752fcaf0b79673d9b78dfba
glibc-langpack-ss-2.28-251.el8_10.13.x86_64.rpm
3ce06a5962760e6b3d1e86acf84c0e08c5afa7a400976542d9ce6883b654268c
glibc-langpack-st-2.28-251.el8_10.13.x86_64.rpm
7539974a804ac37c0bf71e4230f975d9c72eba78a79a6dda2aff8883586a9ae2
glibc-langpack-sv-2.28-251.el8_10.13.x86_64.rpm
cccbe94a1af98812aee7d32ab058efa1231f90cb3b7c6fdfb9a4895b6c1bb402
glibc-langpack-sw-2.28-251.el8_10.13.x86_64.rpm
3d3de3d69c11e962a33c2bca04e2aefe2c92501b5a3a261e5b47aef3eb1646d7
glibc-langpack-szl-2.28-251.el8_10.13.x86_64.rpm
3d8a96d1718eafff9776424e8fe7d14aafb2b6d845e950884571d137b9d48722
glibc-langpack-ta-2.28-251.el8_10.13.x86_64.rpm
b8289754d5048467cd4c823c226245fe6962d4d7e510f31c1238e50d9337f2f4
glibc-langpack-tcy-2.28-251.el8_10.13.x86_64.rpm
cc298d4d167bb1a786fd0cc7fbc2e3cd723c7b40cce1e5f30beafb61bff62ad4
glibc-langpack-te-2.28-251.el8_10.13.x86_64.rpm
567d49ed2b151e3589ac25dea6a58c79166b8aeaef2da68159d296596ccea788
glibc-langpack-tg-2.28-251.el8_10.13.x86_64.rpm
ec03ae442ecc56a2544979dd16de3ce0b6cb8014400f24875808a2b7f88d6d4b
glibc-langpack-th-2.28-251.el8_10.13.x86_64.rpm
068edac90a04976a3d6a1d1c0f9922858759f95caff6a6e8ed9f9559e6ce3640
glibc-langpack-the-2.28-251.el8_10.13.x86_64.rpm
bdbdc8e5cb73f5eb9fdc34a614b2fcaab7f03333d64fced51dad7d5221cefc47
glibc-langpack-ti-2.28-251.el8_10.13.x86_64.rpm
e5c90fbc29a7755563e1dd335fe21f4691003f029b61d839296ca3236925f85d
glibc-langpack-tig-2.28-251.el8_10.13.x86_64.rpm
9b2f834928c39f98ec6bcbdba727e908be69ae3afab6b68228d292844d0d8a6a
glibc-langpack-tk-2.28-251.el8_10.13.x86_64.rpm
412b7a3aac44806072b4d68e1f04c8b6f2a9b096ee39f4bddc2758791e7a1a0d
glibc-langpack-tl-2.28-251.el8_10.13.x86_64.rpm
845c0f11f28ebd9d3140ba065b448092a053f9a9f70761d842761aecd7eb15bf
glibc-langpack-tn-2.28-251.el8_10.13.x86_64.rpm
88136374525f72e537395dd553afd6cb5359e7f2061d802a79a3f8906aeb6068
glibc-langpack-to-2.28-251.el8_10.13.x86_64.rpm
76ee9f53874a4c007d2ca4899d59f2c80dfa312605a0920d338c01a686a30db1
glibc-langpack-tpi-2.28-251.el8_10.13.x86_64.rpm
c0ef5bbc422dfdbd200ebca53222b19216344e53f25330dddc59c67138459272
glibc-langpack-tr-2.28-251.el8_10.13.x86_64.rpm
0907ecaa13c88033017434668d730a68cad1c3f7649a2bc30e9cce9020f9e7fb
glibc-langpack-ts-2.28-251.el8_10.13.x86_64.rpm
6b469699a745fad6484054d46b89a3a73dbd29f2aa8cf5aef65d4fbcc2ff71d5
glibc-langpack-tt-2.28-251.el8_10.13.x86_64.rpm
d7467a6a89a610948674f0fb1b0589e5da04ca5c3eb24d05262c98e4a06ad00a
glibc-langpack-ug-2.28-251.el8_10.13.x86_64.rpm
e678644edd43eff6c943b6520b51f7d872bed418dea83ba9fe7b544dff5944e0
glibc-langpack-uk-2.28-251.el8_10.13.x86_64.rpm
ffbcd6e47c477b4f832cef6899a17677cb5ed5e2c9af6536996069d21f58002e
glibc-langpack-unm-2.28-251.el8_10.13.x86_64.rpm
826a8adadf10515c6224849d44e32b0a5156c7ca4e6fcf157cf91a782a27df6e
glibc-langpack-ur-2.28-251.el8_10.13.x86_64.rpm
ef522a4f8f0e80890c47eab21356d4762589e34588422c215fd14b03ba8010a5
glibc-langpack-uz-2.28-251.el8_10.13.x86_64.rpm
5e0b9e801c93511d8d77fe9e2168f2daec4b14bdcb8ecc34e4d540e12948442f
glibc-langpack-ve-2.28-251.el8_10.13.x86_64.rpm
d5e14de81ccaab919184dedeeaf30a53806af91b4cf2e65f487ee2c1b965f94a
glibc-langpack-vi-2.28-251.el8_10.13.x86_64.rpm
4d91e853ff2f92ca1418f82b7b5331bfe17b0da9aee83c3629946b68c20c95f9
glibc-langpack-wa-2.28-251.el8_10.13.x86_64.rpm
b94db56facdf0ed823be6fb3a87cc2305a2e23cba1edc3af565202ed80a5a813
glibc-langpack-wae-2.28-251.el8_10.13.x86_64.rpm
7853423e52168d868dc6019caf26201e0b2a965a76895fc2ab5e5f2845d80a23
glibc-langpack-wal-2.28-251.el8_10.13.x86_64.rpm
cceae7d176949d5496f70e79424eeb4b2baee448e09d31b1d298393141514eed
glibc-langpack-wo-2.28-251.el8_10.13.x86_64.rpm
b9c0e565fb0f13520d0c2836f28334cea7a013c27d16b38d152742e219b67bca
glibc-langpack-xh-2.28-251.el8_10.13.x86_64.rpm
3e5f8415e95bb66f55ffbc53ff845d54957e60762d7a0b94dbef16709b5dc99b
glibc-langpack-yi-2.28-251.el8_10.13.x86_64.rpm
e0ed32e39a78df9083ab662ff10e294eb9830fc4b3219cd2f406cf9087b4b135
glibc-langpack-yo-2.28-251.el8_10.13.x86_64.rpm
250952064e06779dc3f34befeb55f63a19662ca36b89bf6ff23fc3724d83b355
glibc-langpack-yue-2.28-251.el8_10.13.x86_64.rpm
acc1a9f2fa1367bf71b23e57ae17d3fe0ddf3a495112b70326c3b8cd08192daa
glibc-langpack-yuw-2.28-251.el8_10.13.x86_64.rpm
32bbcbae03219243f35eb794ff30f5ed8dffabaac6971dd3fa9c713e08c8b5a4
glibc-langpack-zh-2.28-251.el8_10.13.x86_64.rpm
e6fae31b2d21efe2caaecd6d395a802bc8f12e060237caac0c628bdd55710027
glibc-langpack-zu-2.28-251.el8_10.13.x86_64.rpm
e289850faf11f1c86899bb763b6d6a399f0b401c3436287ec79aeb8a8fb97189
glibc-locale-source-2.28-251.el8_10.13.x86_64.rpm
8b6216d02e1b4ecb43c474f623221e9f0948a9f2d8be3fd3715020cc0468899c
glibc-minimal-langpack-2.28-251.el8_10.13.x86_64.rpm
87c9e11eca0ddd67d6a638a7b0c0973080c017d371be9a0d8141bfb8d09389b1
libnsl-2.28-251.el8_10.13.i686.rpm
b6b73dc19aec10b0dd5af67818bbb593bbd135f7d0ffcd7436ede44655ec7800
libnsl-2.28-251.el8_10.13.x86_64.rpm
d6ba8cd8df0478607ff6e4bcb7915eeaadfd39bc2b9c729b39fef178ce725b9b
nscd-2.28-251.el8_10.13.x86_64.rpm
6bfbd8d538e14846e296b657a8ebb2963de771d0867d6fb3de3b3ba3b001c1f8
nss_db-2.28-251.el8_10.13.i686.rpm
787b13a3a35fd7805029de26ae4fc61fb0a244a3d7e2f6dc9cdcdfc447af0130
nss_db-2.28-251.el8_10.13.x86_64.rpm
6fa76cb50cfe7502e2896b0d571976fac51a0fd5846f6acb5499b25ff405c8ec
RLSA-2025:1675
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bind-export-devel-9.11.36-16.el8_10.4.i686.rpm
3682125ad48a7d50a271b63cf6a618bfcda209cdda7d69526728da5721748e1c
bind-export-devel-9.11.36-16.el8_10.4.x86_64.rpm
52c69f3011c6952f43abc4b8ba36100befec18aa8334953d589e0c2835037e69
bind-export-libs-9.11.36-16.el8_10.4.i686.rpm
42d2a085f42beb2529ef726cf4b4590fa8b83bd764a8232dac100b5bcf5f80b8
bind-export-libs-9.11.36-16.el8_10.4.x86_64.rpm
7283e260f14ce4aa653d4762e23dd2bb2a3e609fa3c366a221b53306ee444600
RLBA-2025:1817
kmod-redhat-oracleasm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-redhat-oracleasm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
oracleasm kernel module
Bug Fix(es) and Enhancement(s):
* [rhel-8.10.0.z] Update kmod-redhat-oracleasm spec to include Obsoletes: for the 8.4.0.z update (JIRA:Rocky Linux-76082)
none-baseos-rpms
kmod-redhat-oracleasm-2.0.8-18.2.el8_10.x86_64.rpm
c03e78dfe9ceb1d99d2afae8fb65f51645959a9d536cac7d4bcbfac3d2b04ccb
RLBA-2025:2871
glibc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Bug Fix(es):
* [S3][MC8.6] Multithreaded syslog race condition fix backport request[tools] (JIRA:Rocky Linux-78390)
none-baseos-rpms
glibc-2.28-251.el8_10.14.i686.rpm
2610c300b3a2e59a80aef7140b0bb762b83a7a82f49e7b2e772d6411be053387
glibc-2.28-251.el8_10.14.x86_64.rpm
86123a6e90dc1501acc17d76f767838760360a374fd526023727faed74d35787
glibc-all-langpacks-2.28-251.el8_10.14.x86_64.rpm
232b9d2a06b80ea49dbe9fe1ccac00a8da6dc6c419d0c25d9da9046c62c138ef
glibc-common-2.28-251.el8_10.14.x86_64.rpm
b9c0c7993c3caf7981145a9f14520e1cebdbbbea21fead55b478d66438815880
glibc-devel-2.28-251.el8_10.14.i686.rpm
075baab411249a329ec0b5f340970f4e40274c49548b5542e71c006126b3a423
glibc-devel-2.28-251.el8_10.14.x86_64.rpm
671f04086e3b770dc84567aa12fdc091dc834e60a40351020b2790508e071f68
glibc-doc-2.28-251.el8_10.14.noarch.rpm
cfd62482ee6d6a17c7d103c209965bb9c02a31af4da44687905589b749291429
glibc-doc-2.28-251.el8_10.14.noarch.rpm
cfd62482ee6d6a17c7d103c209965bb9c02a31af4da44687905589b749291429
glibc-gconv-extra-2.28-251.el8_10.14.i686.rpm
3ba2c7131fd2b79a16105f16c9bbabcd5ffae685641af3001247565196b5bca9
glibc-gconv-extra-2.28-251.el8_10.14.x86_64.rpm
59f7a418076e3f3dfbfac1e4ac0a83fccab67dabc6daffe8b8ec7d279fb3363a
glibc-headers-2.28-251.el8_10.14.i686.rpm
7eec2305f37ee703d2104bf60a0d75792370f53383332171077d90b2c7d982e9
glibc-headers-2.28-251.el8_10.14.x86_64.rpm
3a7890165be8455916ec2b4dd900726f98186d3d0ef094c32cd5120957b090ea
glibc-langpack-aa-2.28-251.el8_10.14.x86_64.rpm
5dd4cf4fccf2c244d82a437373265acb355d39f909ecfe08a179be6eccbc8a91
glibc-langpack-af-2.28-251.el8_10.14.x86_64.rpm
54df1e2b80289aec8dacfc158fd2ebea156049971e6ce4d451b78065557bbff3
glibc-langpack-agr-2.28-251.el8_10.14.x86_64.rpm
06954bbbfedb9ada1a26c709b25fabd89fa04a6ea6614abea844ae7feb930306
glibc-langpack-ak-2.28-251.el8_10.14.x86_64.rpm
3daebcec1ca75c99e99537d8471aab662eebfb67edc7f373bc047f48711a2159
glibc-langpack-am-2.28-251.el8_10.14.x86_64.rpm
e6b1fa79be6a76635df2dbb02a3e723e0a671fc8ded3bd1ac3d1f3656fde3cf7
glibc-langpack-an-2.28-251.el8_10.14.x86_64.rpm
dd3c0573f30eb2cecff7626fd1ac63701949aca1b0c433f9f51231a4e6431a1b
glibc-langpack-anp-2.28-251.el8_10.14.x86_64.rpm
4043fec1371f5702644e85101d77d918731652e83611056540cf1cd66db9ac64
glibc-langpack-ar-2.28-251.el8_10.14.x86_64.rpm
c13acb71dab29570518659497653eb53faab13f90a566a49b017119a64f7f100
glibc-langpack-as-2.28-251.el8_10.14.x86_64.rpm
8902ae3002b6be422537ed99425fbf6397c6454d6bf4f3645d723f8b1ea2d44d
glibc-langpack-ast-2.28-251.el8_10.14.x86_64.rpm
9c466de4013529c20d2b4cde3af8cf258f74544ab91a23bad446dc7073df7867
glibc-langpack-ayc-2.28-251.el8_10.14.x86_64.rpm
0b45d32b697c27f4a6997810c856d37f998649764679c78a191d3d3331db3e13
glibc-langpack-az-2.28-251.el8_10.14.x86_64.rpm
cef6c0f3cff7d712e69460b37e43d51289b53bb39f7deefdadd0a8151fbf4365
glibc-langpack-be-2.28-251.el8_10.14.x86_64.rpm
37c54b469a66ada29912cb4af04567ad6c9818e295ae715cb454024eb4cca918
glibc-langpack-bem-2.28-251.el8_10.14.x86_64.rpm
e3a64fca700d68a73a13270865bcc8ff94c125b46c35812d22d5cf45398b5b3f
glibc-langpack-ber-2.28-251.el8_10.14.x86_64.rpm
1bb49260658ba98177d4c7bc415391738161df82db6d5a4ffc14d3dfe33e6297
glibc-langpack-bg-2.28-251.el8_10.14.x86_64.rpm
ead229166bd41c27b8a76c96bae72056c2685a521e893ba95e3c2f080404c9f4
glibc-langpack-bhb-2.28-251.el8_10.14.x86_64.rpm
b1e716b2631bf3433887d0a5e8ca85c4d3ebcb5e6af2bfc4a71ff441ada8b615
glibc-langpack-bho-2.28-251.el8_10.14.x86_64.rpm
42805ace80703ccd2c93ad1f4b66a45d5cc39e5a57de75ea518ef19a1eb93eff
glibc-langpack-bi-2.28-251.el8_10.14.x86_64.rpm
7e6e2c3da8e05d0597917792a241b8a713e2998733640f626cf479d30ef4b75f
glibc-langpack-bn-2.28-251.el8_10.14.x86_64.rpm
38abae9379ecaaa7eb9c7caa28417ac96c9d9b92611c016f6ad0e16171537dc8
glibc-langpack-bo-2.28-251.el8_10.14.x86_64.rpm
eef774eba4cea696422e9066b22255c227daf1b4557c2faeda31d7ef369f20ed
glibc-langpack-br-2.28-251.el8_10.14.x86_64.rpm
ce10f4b6edd44bd71c349eea656f323e40534e35bd45c5a2d31c95d9b998df7c
glibc-langpack-brx-2.28-251.el8_10.14.x86_64.rpm
16f4de43efc11d47255e6ddc4c063ed8729523dad52e492d22e66baeed9cd788
glibc-langpack-bs-2.28-251.el8_10.14.x86_64.rpm
2935cb44eb6849408769154bd87407dbf381b111d4f1e9b4eb3a6a9709463e14
glibc-langpack-byn-2.28-251.el8_10.14.x86_64.rpm
b2f4102e18df74195b5d96562f801dde42954cbfa65a5bcc7d001f2247f971e9
glibc-langpack-ca-2.28-251.el8_10.14.x86_64.rpm
45ee774ca1979f299c1f02ea13f7d54cc9f34e120fa367e523541121fd598835
glibc-langpack-ce-2.28-251.el8_10.14.x86_64.rpm
de2b9a9377f6c39cd317b7ba572f9b8ac82c85b5d765a7e2739a951c8709dd39
glibc-langpack-chr-2.28-251.el8_10.14.x86_64.rpm
8a5a513b6f872367f12e42e5b8bf1bfea97d44164aeb906f07cd489f1a5c1b50
glibc-langpack-cmn-2.28-251.el8_10.14.x86_64.rpm
ac82e973b47e81ef7f9ed67d14303b4956b0128ccec0f78dc0882719501b767c
glibc-langpack-crh-2.28-251.el8_10.14.x86_64.rpm
ec0c3528b81e3ec638f5c0d298ef5f2b2ef6dc2faae985ee1657d0631590b2c8
glibc-langpack-cs-2.28-251.el8_10.14.x86_64.rpm
70e3100968c0cf0fec7872e8c804fc18f6149dbb4a7b1dc1236d410a331b3769
glibc-langpack-csb-2.28-251.el8_10.14.x86_64.rpm
6b28e63a85514f911ca5244e2cd535b785ece5a4bd3e5cb600edd21075e645ee
glibc-langpack-cv-2.28-251.el8_10.14.x86_64.rpm
3fd08f7494090ee873df3d075630985906eac539ba07d382785be59b7319f37c
glibc-langpack-cy-2.28-251.el8_10.14.x86_64.rpm
a96f2ed5480cb61de7c5386270b41f4e97f5819526486a5c71dc0dd6a86fe37a
glibc-langpack-da-2.28-251.el8_10.14.x86_64.rpm
87b07f437d23f199d95b4cfccc29d733f9595cfaab1abb32c2296de1246d3df4
glibc-langpack-de-2.28-251.el8_10.14.x86_64.rpm
493b9941a128153bce336f3a94e1c6afab80951ba9723ecf5999c33aeaf90425
glibc-langpack-doi-2.28-251.el8_10.14.x86_64.rpm
7bf1c6c1d5f8496a12565b5d3995ce5f9149e17a16feee2c11538696ca33df5a
glibc-langpack-dsb-2.28-251.el8_10.14.x86_64.rpm
5489549c24a9ac81151ce0428f55fe9af80b16197114a94c7185d6b13ce36fb6
glibc-langpack-dv-2.28-251.el8_10.14.x86_64.rpm
c539ebd83e148a66ce066cdd42e3bd5f15021e0da2d929915d562ac0d53e9b07
glibc-langpack-dz-2.28-251.el8_10.14.x86_64.rpm
fcb2553fd3643c9c41838d4eae06b0627d65a94b1b85a6e5437aa115f31e59be
glibc-langpack-el-2.28-251.el8_10.14.x86_64.rpm
2ebf405be769366a7e41dcc5df7e4b77653eddcd571ae6a068e2940673b56bc9
glibc-langpack-en-2.28-251.el8_10.14.x86_64.rpm
da0f820d66f3d78898fa727c4ea327953418a13b151b6d617c7c745265de98ad
glibc-langpack-eo-2.28-251.el8_10.14.x86_64.rpm
8a4fb67bf8db11baaca138ff08a686079241f66517d044454da025bf83a714cc
glibc-langpack-es-2.28-251.el8_10.14.x86_64.rpm
2c59fd6b42857a093366be59f454e1adc78a857037b31b8be12f09d883cffbba
glibc-langpack-et-2.28-251.el8_10.14.x86_64.rpm
f60fded59ec5d3b6978b3b539b79a130428884ba994a9c9552f081dc780fd3a4
glibc-langpack-eu-2.28-251.el8_10.14.x86_64.rpm
8c55fc3add57bf58930b58502e21ede6d36bbfc97fd33d938fd7c3756a6d6289
glibc-langpack-fa-2.28-251.el8_10.14.x86_64.rpm
56db3916c4e0688c78444f1fd5ad2fba7bb66ac56b8d7712b654cf6a2da3b43a
glibc-langpack-ff-2.28-251.el8_10.14.x86_64.rpm
d5aaca5bf5bf773732a2ee6a4d9557794b3450716bd8d5fb350b6c8bcd8f4cf7
glibc-langpack-fi-2.28-251.el8_10.14.x86_64.rpm
a3b4bfb5e4a9dc1ea6c6603335d501d5811b526dea2ebb9ee50a10c74bc12461
glibc-langpack-fil-2.28-251.el8_10.14.x86_64.rpm
27b647fca600d4ba9a17c42db95495e8305e684dc4259b57565f17a5844069da
glibc-langpack-fo-2.28-251.el8_10.14.x86_64.rpm
0033dbe4ba4d6891208515a42d7992023b92559682c0f6d3e7c9d59331ced48f
glibc-langpack-fr-2.28-251.el8_10.14.x86_64.rpm
4b8eb68bd9a5cdc64daa811bb4b522bcace8426a7b241f02b4fce81af2f84ae8
glibc-langpack-fur-2.28-251.el8_10.14.x86_64.rpm
405d576f01b852d5bec6668e8257e0c08dfcea120cd8e874e23b7aea73b31101
glibc-langpack-fy-2.28-251.el8_10.14.x86_64.rpm
5140a3c692502c294a2899dcf9699bd1e1b5c477cd88a1cac3355eae2c7d9648
glibc-langpack-ga-2.28-251.el8_10.14.x86_64.rpm
e7c19d1528c0096994f90a1436191feb0e70db146c7ff02b125cce748f224aaa
glibc-langpack-gd-2.28-251.el8_10.14.x86_64.rpm
34edfa5d6b26038ab86dbd9f5a68e43f0710f9113e543e62dc2961f229164399
glibc-langpack-gez-2.28-251.el8_10.14.x86_64.rpm
38786896615c9b9fc6d76015ff55bb7c999b973681fef620c6c256830bd4c6e9
glibc-langpack-gl-2.28-251.el8_10.14.x86_64.rpm
3fa40de851f3fac37f6bb15f251978b240bf4ad38271b6412a0b939dac749abf
glibc-langpack-gu-2.28-251.el8_10.14.x86_64.rpm
0a72f7f46abcd3eeeebd9a85f1bc5231873f0b1b3b8fbb5d07da878c484b8e6d
glibc-langpack-gv-2.28-251.el8_10.14.x86_64.rpm
6aa52f23b22e43c41013dcbf962e91b7ee60b44452a7c7c62d64144c5ff50b9c
glibc-langpack-ha-2.28-251.el8_10.14.x86_64.rpm
a9f03ec9568333b9011c123a1d3905d01d7420789e30ba1e758d2a160a1cb94b
glibc-langpack-hak-2.28-251.el8_10.14.x86_64.rpm
170124bfa49c53f463c0676144f7fc56feacee2ac842ee2e02a9fff6e6bbc005
glibc-langpack-he-2.28-251.el8_10.14.x86_64.rpm
8cdbb1477ece29a3cf93bfe0aa5c9c8adcd70e150296e185578cff3495f4d204
glibc-langpack-hi-2.28-251.el8_10.14.x86_64.rpm
28f6790cc2e315756c0e1195e9b214c568cbe82eaa0de2f250a8f391ec78db7b
glibc-langpack-hif-2.28-251.el8_10.14.x86_64.rpm
b4c6dddc9c821ff3e65b22cd357d7af561647c0a7669637dd290adde89954fed
glibc-langpack-hne-2.28-251.el8_10.14.x86_64.rpm
3cbedf8e56ca2f63f34037b62116efb36000562edc3c24909c9c662633dabf67
glibc-langpack-hr-2.28-251.el8_10.14.x86_64.rpm
740fc548d02f18577abfc13c96ae032aea24e2ad3cdc95284e89bdfde47b55a2
glibc-langpack-hsb-2.28-251.el8_10.14.x86_64.rpm
6637c18947d30c2ef5a003118fc8050d34a800c38d81416a381874184e518c42
glibc-langpack-ht-2.28-251.el8_10.14.x86_64.rpm
fbcf5d607a460b40cc4825b3e14aa8d98d61f0f25cde222611cb68b0392a5211
glibc-langpack-hu-2.28-251.el8_10.14.x86_64.rpm
84a8b0486221b6d5c49aef929af298f4ad1fdc405a13d6e02ebee047009b2a21
glibc-langpack-hy-2.28-251.el8_10.14.x86_64.rpm
3fd67a66d964cb81f53c0a2ed60e4d6ca546944d683cd02888c450c8cfac4934
glibc-langpack-ia-2.28-251.el8_10.14.x86_64.rpm
0fdd046c415b1c894a7789f94c941066b5f2b76ea93c81299b4baaab3676f433
glibc-langpack-id-2.28-251.el8_10.14.x86_64.rpm
305d64ffbd18de3303a291049ed5d3cbba5d4315d5512f25b8279eaef7b16bc7
glibc-langpack-ig-2.28-251.el8_10.14.x86_64.rpm
7c2777a553fc6ecce3cdc2b5d2c3a3f4658809671faaecf3afa8756abe89d512
glibc-langpack-ik-2.28-251.el8_10.14.x86_64.rpm
64e38673bf799074cd7325ac9a68815ea581682421f04e704cab28497f4de7dc
glibc-langpack-is-2.28-251.el8_10.14.x86_64.rpm
ef04fecfa584c0529d5976a3bfc2bd29ace572b0f926281f79ba881ee672bd39
glibc-langpack-it-2.28-251.el8_10.14.x86_64.rpm
e504c1caa664fa7390b60485b88bbf460b44240b89b0680138834cecc526f454
glibc-langpack-iu-2.28-251.el8_10.14.x86_64.rpm
2ce6ae03bfaf7d39a0e93757db80d00554ca1febf252f702cc6e3cc4de1a24a8
glibc-langpack-ja-2.28-251.el8_10.14.x86_64.rpm
f5478ad246f26134d166edd9ae9c250f3c147c117c82efdbead38ed2e726ba0a
glibc-langpack-ka-2.28-251.el8_10.14.x86_64.rpm
148b64c5206f13b86c877f85e903b6b551f3529454181d1b2f09503726c2f4d5
glibc-langpack-kab-2.28-251.el8_10.14.x86_64.rpm
88187e056be9bb39c3f9620ef8b31e3bb4715a134c4d3745385b58844f11f224
glibc-langpack-kk-2.28-251.el8_10.14.x86_64.rpm
adb60e48a16ca6fa77afd64d9867cc068a151aa84a9c165098a8055658ac6d79
glibc-langpack-kl-2.28-251.el8_10.14.x86_64.rpm
b6cc9374150747b63f006f059ee8e232eb57bc008b477d623e26a8d6694c0237
glibc-langpack-km-2.28-251.el8_10.14.x86_64.rpm
5f03940df6fdc8253d56b63bd768199628b4e567c5a377a5d5eae913ef30dc48
glibc-langpack-kn-2.28-251.el8_10.14.x86_64.rpm
f14ffebc8b8a2c3d7f1f196bc23a99305fdcde8319901f003f7be1b0018f4e0f
glibc-langpack-ko-2.28-251.el8_10.14.x86_64.rpm
02ab8aba25429ad75df2ad56515b79a6de27a6b39080b8b90d84b58b616c21e0
glibc-langpack-kok-2.28-251.el8_10.14.x86_64.rpm
a7195943e39b0ba2d67077e1bbd0e8711a2e8d36ea7380da2595a167cf4326c8
glibc-langpack-ks-2.28-251.el8_10.14.x86_64.rpm
fcbd77b5c0c8aeff571e8726c52e5f654261485a39f50206173dca0f47093446
glibc-langpack-ku-2.28-251.el8_10.14.x86_64.rpm
d26e343544c25dfb74b3dea1a0b0fcef9f4046ab0cdcb8d63459b1e14d5f94f9
glibc-langpack-kw-2.28-251.el8_10.14.x86_64.rpm
37aa184246fec3aea9026a4e17c0c261176970685f586b09332403818f1864a0
glibc-langpack-ky-2.28-251.el8_10.14.x86_64.rpm
8b32c2dac57930ad491e5c3b4d768520839e9b23c7c50e4cf585cc229e8e9494
glibc-langpack-lb-2.28-251.el8_10.14.x86_64.rpm
b0f67d109d873647bbbcd6eb20dc97ef5ff3233e3fa058cc748bab0a9cf8cca9
glibc-langpack-lg-2.28-251.el8_10.14.x86_64.rpm
8ae38bfb54e65903d9ffa481a6ac486e8bd5d067aa6c55814580d0101daea187
glibc-langpack-li-2.28-251.el8_10.14.x86_64.rpm
48ded63163dadfb355daa3d77984f68b65c78f81beee622bf1ff87313112f0d9
glibc-langpack-lij-2.28-251.el8_10.14.x86_64.rpm
fa32c10a147a4ef68c5a09e3da0f5148d785b7cc1e6ff8c5601e0ca81beaf522
glibc-langpack-ln-2.28-251.el8_10.14.x86_64.rpm
0304921875a3ecb03d92e915969674c7f975cef9243e90521e7e2c1ca6eab2f9
glibc-langpack-lo-2.28-251.el8_10.14.x86_64.rpm
4adc28c538022b160e90c3a561ea94eb0ddd52cfbb13085f40f576ad1ad366ca
glibc-langpack-lt-2.28-251.el8_10.14.x86_64.rpm
0acca9f009138683f6c33f58db340faa1b4fb5922fdab884f9729e54d09089e6
glibc-langpack-lv-2.28-251.el8_10.14.x86_64.rpm
8b187addc63bacfd4457c86600f79b1c6ecddc34463edd436b722f43f3af2631
glibc-langpack-lzh-2.28-251.el8_10.14.x86_64.rpm
8819c8d41f43b494bf9bed30d19d2e6a3af235b8fe3a01d00931c9c1da3b9ae5
glibc-langpack-mag-2.28-251.el8_10.14.x86_64.rpm
7bf69ede3fe58e5482470cf59daefb1e0c9f094f664f07827f46be9ac9346ca5
glibc-langpack-mai-2.28-251.el8_10.14.x86_64.rpm
04ccd697b2022ee5eb2284a1d2308012fcc73aa6b0857dbf2dbc99544cd49a07
glibc-langpack-mfe-2.28-251.el8_10.14.x86_64.rpm
80eb6a8a571444983bbf218a187e1f33ff121ecae5c206376ab37720858cc71e
glibc-langpack-mg-2.28-251.el8_10.14.x86_64.rpm
d917e566e2216192cf06b9c0060ce8c767469792ce8e96ef3cee5b1e01f540ac
glibc-langpack-mhr-2.28-251.el8_10.14.x86_64.rpm
2200bf529866dc30088cd441fe8461dc39415c2621d292261774402e8e2b8d18
glibc-langpack-mi-2.28-251.el8_10.14.x86_64.rpm
2c46a30d4d6eba7c26c6c774617467f866cd5cebc4da4fb601a5a209b8b9fe9a
glibc-langpack-miq-2.28-251.el8_10.14.x86_64.rpm
b0d4e51b1c1d8c2e649c71a127ffc8773dd9ae880ce6103b53914b91189b0576
glibc-langpack-mjw-2.28-251.el8_10.14.x86_64.rpm
8c004c5505c8a70134800ee1d3b689cb4718da3a4761c3376f594735bd9abfec
glibc-langpack-mk-2.28-251.el8_10.14.x86_64.rpm
f8a6797f5c5e9f59c661171b9bf2582ad37160e745797dd46a5d0a182f2b6ed2
glibc-langpack-ml-2.28-251.el8_10.14.x86_64.rpm
f93e4fedb55021156514d336cc9588d2056dfeb79b25e0ebd27c6dd6f8f0b816
glibc-langpack-mn-2.28-251.el8_10.14.x86_64.rpm
d2d1db623d4b5631336cdc7c9c31972d78d6bb8d712f29f59d6f323d9af80407
glibc-langpack-mni-2.28-251.el8_10.14.x86_64.rpm
b54e0a159fc533da10d49f6a68b8f46b186babb441972d53d9ec5689e11c19eb
glibc-langpack-mr-2.28-251.el8_10.14.x86_64.rpm
68392fe5c9ff630bea8db3ac729dbe28013631c5fe566ce0c461a91cf45daf55
glibc-langpack-ms-2.28-251.el8_10.14.x86_64.rpm
f15b7b1c266648178970aff7fd52d5c58d57fcdc26dcd93e07e7c0d0e0a643da
glibc-langpack-mt-2.28-251.el8_10.14.x86_64.rpm
3a31d9b26fe02f091b84a5046fb557508621ddfc39d2b3fed78a69f9f5ce6674
glibc-langpack-my-2.28-251.el8_10.14.x86_64.rpm
b6dbefd78e24268113f2318d76a3adb3c90f0e86e78181a5dfe0126d453a0284
glibc-langpack-nan-2.28-251.el8_10.14.x86_64.rpm
c550560fc9090479588ce4d6be66420d7bef81a027eefd9ad9e20c72cbdc0e26
glibc-langpack-nb-2.28-251.el8_10.14.x86_64.rpm
b54ba7d83d264ef0f54f6e6ccafb05f6c6519f76e8a20e9fe4653f8200633da1
glibc-langpack-nds-2.28-251.el8_10.14.x86_64.rpm
ab0dd29597e090f3bd2dc5aa56e36db9b5e6928d0f9bba0874acfb5607bbf7af
glibc-langpack-ne-2.28-251.el8_10.14.x86_64.rpm
abf94e29e3f93ca4ee415c12d01587ddcbc1f8a45441ef2c4641907ce7835dd5
glibc-langpack-nhn-2.28-251.el8_10.14.x86_64.rpm
6a7a7e6c349b936fff6c64ba4b6751c5cb5430ca0efc4f01314a7c5254e948e0
glibc-langpack-niu-2.28-251.el8_10.14.x86_64.rpm
eb3b34b3c057654f23f6ad9e3d9f14dfecdf46f420b8f1e36b605d00c6d7f3f7
glibc-langpack-nl-2.28-251.el8_10.14.x86_64.rpm
da5d100815c54cc978870d4d0e369f4f459351a801018522b2d4755119daaea9
glibc-langpack-nn-2.28-251.el8_10.14.x86_64.rpm
606e33b707f56503a32abf841eb20fbbf23d3db943b49eb3bca10c12cc496a69
glibc-langpack-nr-2.28-251.el8_10.14.x86_64.rpm
efe520270f4a7b752a6f8dad1537bece7829553da15bb34c06525f8d3e0c7795
glibc-langpack-nso-2.28-251.el8_10.14.x86_64.rpm
b9482c7167eff345f5b44fb4bbb0e0cdd9769e2ea6591add381f90404a883050
glibc-langpack-oc-2.28-251.el8_10.14.x86_64.rpm
d314d7e0e9978c97ab590a9f86ccb39006dccc18679782e23146684b35f094e2
glibc-langpack-om-2.28-251.el8_10.14.x86_64.rpm
ba32a24bcdb7b2f88d2a7dc37162c10796676ea02c0ad8c0fc71ec044ffd6f66
glibc-langpack-or-2.28-251.el8_10.14.x86_64.rpm
637ac3ea211063cd8f016a165ee4c657c2a2a4351294832a4ef43c1e555fd4dc
glibc-langpack-os-2.28-251.el8_10.14.x86_64.rpm
8a21d6b6c6c83b6f497149171bf29967050e9f31b52bc01942f9d85652694b7a
glibc-langpack-pa-2.28-251.el8_10.14.x86_64.rpm
177251c9128fdfc9681209f572d164567dedcd94017423a7168112b113e0e0d1
glibc-langpack-pap-2.28-251.el8_10.14.x86_64.rpm
25971ba70a045c15c1c0bf5181c28691d5e432d0d054e4ded68f4740b6a85c7f
glibc-langpack-pl-2.28-251.el8_10.14.x86_64.rpm
7b3240b2f93b0f95a8714482d9d0aa86347b3ff9bde9fcb07b05ba5cd0639e3f
glibc-langpack-ps-2.28-251.el8_10.14.x86_64.rpm
e5648683547374f1f59ca5640c7db5e0ac65b244d385b749c5e832e833d391d6
glibc-langpack-pt-2.28-251.el8_10.14.x86_64.rpm
148f5d06412944b8bbf7209f45e77aaaf5ed9d11e2bae33fcd928dc8631ee91d
glibc-langpack-quz-2.28-251.el8_10.14.x86_64.rpm
e2820619afd35ad6e85065eb3db54322b39311ac4003cfd7cfceac880b99ddfe
glibc-langpack-raj-2.28-251.el8_10.14.x86_64.rpm
a0e769005f0d94cb796ffb7b8a62ff8508b1ee030b4e0d9854ec69e637357662
glibc-langpack-ro-2.28-251.el8_10.14.x86_64.rpm
90844c4633f6a9fd0a05a956bdcf098e9264370ed6d07723cd3439b95b62726c
glibc-langpack-ru-2.28-251.el8_10.14.x86_64.rpm
fe027d5e21fca00d48ff63cb091b54c1b92bcfd8cbe10e394d96d1f1ad287d47
glibc-langpack-rw-2.28-251.el8_10.14.x86_64.rpm
b1a284ec36ee85f5b7a3fc8c7cf029f828597099f32158657406bb6ba7f53dba
glibc-langpack-sa-2.28-251.el8_10.14.x86_64.rpm
dfec8cc9ff428dd66a451e1c849171c0bb871d03300e88246a6c951c04f318d4
glibc-langpack-sah-2.28-251.el8_10.14.x86_64.rpm
2c7b963da2a7898a6724a0bbc0bde2fae60e5c2260b9e92d691f5437773cd55e
glibc-langpack-sat-2.28-251.el8_10.14.x86_64.rpm
c9cc9b251604fa9fd51f7a5792818416a6a458752c2c0dcb451ea1b34d5fb610
glibc-langpack-sc-2.28-251.el8_10.14.x86_64.rpm
985409bfffe2c659940aa20187cc4830292df9807a4c95f5af9b2e3acc81a6a0
glibc-langpack-sd-2.28-251.el8_10.14.x86_64.rpm
db8292da45495dfac4bdcfe3966f8258f7397282c8ea7938415fc32b36068467
glibc-langpack-se-2.28-251.el8_10.14.x86_64.rpm
f7cd0084e4eafb453692bd90b3fc8246a8e4d6e82d85ac32fc7a52b04cb1608f
glibc-langpack-sgs-2.28-251.el8_10.14.x86_64.rpm
497df9c03560014574e360c3aef5a9e359c9080f837319363431aaf1246ec08d
glibc-langpack-shn-2.28-251.el8_10.14.x86_64.rpm
4243e23df18070133555a6f7a05def41ae6c37b576d57e98175093a81e78fff1
glibc-langpack-shs-2.28-251.el8_10.14.x86_64.rpm
ddb40202b8d0fb26ac7e2a6c79ba82a59a7e71f1794b0c4b0e86790c0a0ffa87
glibc-langpack-si-2.28-251.el8_10.14.x86_64.rpm
4dbb7c2b3bcb68fadd31ec64b47069951864b902ba0ed6d37b0b4a347588985c
glibc-langpack-sid-2.28-251.el8_10.14.x86_64.rpm
357ef7588cc1906dbddf391e916edae76b211f3c22774f5967ddc8c3dc9e4c1b
glibc-langpack-sk-2.28-251.el8_10.14.x86_64.rpm
52c70f1975ac7e914f1c073f3fcf8524dd65828e69cfc112e48d83fb9af9842f
glibc-langpack-sl-2.28-251.el8_10.14.x86_64.rpm
499ad79182293bf88100f36a0b8a017b9315097f71ab8577b5a467422ebd1e65
glibc-langpack-sm-2.28-251.el8_10.14.x86_64.rpm
3a9bc832f7b73df23d47d620e670a3fe23a04a95e88989231f2a657032fe839b
glibc-langpack-so-2.28-251.el8_10.14.x86_64.rpm
6f3eff39464fd8f85cdd8be08442c85401129da5ad4a511cb979d6f1de2e3814
glibc-langpack-sq-2.28-251.el8_10.14.x86_64.rpm
6b1e2d075629ec17811278d330c9c24d37f120f7986fb71a4f611cf32ae03865
glibc-langpack-sr-2.28-251.el8_10.14.x86_64.rpm
744a2f2124d51410e86af7f9ad493ef48480e3e9d21ebbc9d2126af9ce7c3a6e
glibc-langpack-ss-2.28-251.el8_10.14.x86_64.rpm
03bd68f2a1e9494097a972dc3fb9c77636670ce789df83aa788ceea921bd1950
glibc-langpack-st-2.28-251.el8_10.14.x86_64.rpm
e9ff76165f0e13df7cf8d1e9828601a95f2962b8e7d176e92f4f62199083f70a
glibc-langpack-sv-2.28-251.el8_10.14.x86_64.rpm
fb428b03ae8d7e0b76d03aee3a173af746f9e2d2264279862a54105c97ec28fa
glibc-langpack-sw-2.28-251.el8_10.14.x86_64.rpm
c3ee0179b3fc47557fe58ef3d69fee2ee95e5ec486da9054742aac7a84cbc8d2
glibc-langpack-szl-2.28-251.el8_10.14.x86_64.rpm
8b8f27cac7646c608d55f9da6ca8ca433dff2599570f71bb883f38d1ca4a5c86
glibc-langpack-ta-2.28-251.el8_10.14.x86_64.rpm
f9e20cbea43f778f0c0b748d83f50059db4ddf3aae31e4e600dd7392c636f813
glibc-langpack-tcy-2.28-251.el8_10.14.x86_64.rpm
8b712f466b172d5a49172dc6b90380e97ab82e93db5a325fb17c93306c87ba13
glibc-langpack-te-2.28-251.el8_10.14.x86_64.rpm
35eac8af458129276bb2b675652a81357731f680d73b66fa96af1f8ee8888d68
glibc-langpack-tg-2.28-251.el8_10.14.x86_64.rpm
2ac4f447163bfb2750e083da873272824d74e5ac9a57460519d032ffae7c2499
glibc-langpack-th-2.28-251.el8_10.14.x86_64.rpm
e7c39c72b67c89bed01ec5ce3aad4ede32cff6b358a51becbf39e32edf1bf370
glibc-langpack-the-2.28-251.el8_10.14.x86_64.rpm
0634273cbac24a36fe1a098cdbfc909d48681858c5486fad559ed6c8a5f69fdc
glibc-langpack-ti-2.28-251.el8_10.14.x86_64.rpm
7d2f1b3b82f61653b34c2b6986e1ee7a77716e8db978efeb51fc1437f21f46fe
glibc-langpack-tig-2.28-251.el8_10.14.x86_64.rpm
471da85df44d31da56973feb37ba107d781a899cb5d4517c6eabc9e0b63672b3
glibc-langpack-tk-2.28-251.el8_10.14.x86_64.rpm
06a4d5464cffc15d00adb3811fc9e96af7930795b1157e01de7eb0dca881154d
glibc-langpack-tl-2.28-251.el8_10.14.x86_64.rpm
010b781abffe52eda8425bbe6ed7b5a498ba85e9d7e1c4a9b3a9546e0e8f7127
glibc-langpack-tn-2.28-251.el8_10.14.x86_64.rpm
7deba4f9f00a7b45df38983632bb89521d72de97b5d0cdef9993acc5b6d9bb5b
glibc-langpack-to-2.28-251.el8_10.14.x86_64.rpm
5b4eba3fdeb4b3f958d139efa0bf2a3576d4018c1fd2ed257351bc21f0eda620
glibc-langpack-tpi-2.28-251.el8_10.14.x86_64.rpm
ddc0b74aa17bf3ca1a0caa4c40906b17286363715782790618158e6f56286799
glibc-langpack-tr-2.28-251.el8_10.14.x86_64.rpm
c6bbfda0271c7176a6f4d1a8fedfb6682fb198a4fc7f5e2193cf981b52b9b941
glibc-langpack-ts-2.28-251.el8_10.14.x86_64.rpm
8862554ac7ffe160a59fd56e6956dc3e7f77bd947af1d889c5732a9a91d23588
glibc-langpack-tt-2.28-251.el8_10.14.x86_64.rpm
a73b9b1f7b640b6bd6e214c0862663a58dffad0e0a01f18a193ac7a28cf52d3d
glibc-langpack-ug-2.28-251.el8_10.14.x86_64.rpm
5ff76a05453a92c5a91ab3629b940505e7621b6a55fa6db7b0608a5578d7b9fe
glibc-langpack-uk-2.28-251.el8_10.14.x86_64.rpm
d0d31000f7d9a09dba0bbe5f4ce3ffcd08a26df394b0880a14de43f9aba6b365
glibc-langpack-unm-2.28-251.el8_10.14.x86_64.rpm
25d111f30082c1600c586a500862a05565c4b3a31f3004c77b0b5e482c8e29fe
glibc-langpack-ur-2.28-251.el8_10.14.x86_64.rpm
c66f4af65e5bdfef099f0c3c9837aabff40b54d26a9a64ab3c2e6d84e9742a14
glibc-langpack-uz-2.28-251.el8_10.14.x86_64.rpm
e5be1582e980250abc1380f3059b77bd90b048553178cfb3b693cc04e2ee6f4d
glibc-langpack-ve-2.28-251.el8_10.14.x86_64.rpm
b662aad1e791671e286ebfb2c60e7f2880f4a7654804ea995fd3be2815c45b44
glibc-langpack-vi-2.28-251.el8_10.14.x86_64.rpm
ded0af3f0be908c8142345a116121be15904ee420583e6c87e6373ea506b375b
glibc-langpack-wa-2.28-251.el8_10.14.x86_64.rpm
22c28e7196e795be59030d265442eb3c36233343d379aefb9fe15294daa3fd4f
glibc-langpack-wae-2.28-251.el8_10.14.x86_64.rpm
17eec04db3da02e85990948d8a656172c2537e9c1340bdea4767dd1584a3e3d0
glibc-langpack-wal-2.28-251.el8_10.14.x86_64.rpm
02a533ae07c64540253f94dee8c6552ec43b2dec4d0333c4d2523e94dfd53f3c
glibc-langpack-wo-2.28-251.el8_10.14.x86_64.rpm
dcb9a32f89faa48aab71957a20674886175124c21babbd1d2ce85232c76957db
glibc-langpack-xh-2.28-251.el8_10.14.x86_64.rpm
b56717d0e0cb004c7617598cd0d931908b591e226359099886142c9a8f2e7466
glibc-langpack-yi-2.28-251.el8_10.14.x86_64.rpm
69e3711a3db19e7f6fc2401f139cd40c1dad741958eec951c3f9c875908e5d63
glibc-langpack-yo-2.28-251.el8_10.14.x86_64.rpm
fa0b9ba02bcd6432b7922583cb4879a0d4228e66211eefdcb922135771d9204a
glibc-langpack-yue-2.28-251.el8_10.14.x86_64.rpm
7b12835c68614032264dda95eee680b67291114105c519f8a861b7c8d709bc8d
glibc-langpack-yuw-2.28-251.el8_10.14.x86_64.rpm
dd7a0c4ea00316ce8b32fe89b35fa1d87658897633be5b94839284050ac4229f
glibc-langpack-zh-2.28-251.el8_10.14.x86_64.rpm
1bb9d0c2f387ae41f10c9627da3beea2cad6c15898f07c13f1f5e5f0b0c47514
glibc-langpack-zu-2.28-251.el8_10.14.x86_64.rpm
1046bb74038d2514ebd73e30bd4d9195b410aaa611d28778eddd9345c0f9ee07
glibc-locale-source-2.28-251.el8_10.14.x86_64.rpm
b4ac1de73130bbbe567fe0a13aa930ae30e223cf2512e639997db3e28fad9823
glibc-minimal-langpack-2.28-251.el8_10.14.x86_64.rpm
74618210ea193487e0ef0a0df4c33a17228e38a7e55ac47b6c4b866e0e558987
libnsl-2.28-251.el8_10.14.i686.rpm
8f96b0e9d42bfb3d275dbaed55900adb6fb30802b22880b21e2466c4b4677382
libnsl-2.28-251.el8_10.14.x86_64.rpm
587e1fd07cabf68a7cef5eace73da7f2c3ea4617a8bfc4956852ec3c7ca1f1c3
nscd-2.28-251.el8_10.14.x86_64.rpm
b69f440210cabc37852077ef3e60445dc07110b5f3a3bbbe9c4c7a032763b94a
nss_db-2.28-251.el8_10.14.i686.rpm
81391a39bf634cb3ed47f27ed49b414515b60ae1962d3e3f17cfb7fb761e2caf
nss_db-2.28-251.el8_10.14.x86_64.rpm
768e0ff03777fa66d183906b6fc7ba777074cbe2a878e0811d87b60d1f6095d1
RLSA-2024:0119
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: crafted xml can cause global buffer overflow (CVE-2023-39615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-18.el8.i686.rpm
462990825216503457b423d185649c934e8cf4b8699e70fc9534324c481b2dd8
libxml2-2.9.7-18.el8_9.i686.rpm
9bbc98e4484f3efdf04456da7813ae3aeb75a642acfcfdcc2a43708ace968a67
libxml2-2.9.7-18.el8.x86_64.rpm
73f220a2d3eb00cb30d7451f01ec288afdd236b33417ca86b02d69d9f6d359c4
libxml2-2.9.7-18.el8_9.x86_64.rpm
7ac42d0e0ac4d4899085b2049197bef1c22f3a2706304cd450d42375144569e8
python3-libxml2-2.9.7-18.el8_9.x86_64.rpm
a2cd2490bdf377cf6293d62abcd4c6d04a4eb6adf4c9e2201c08d015da3a3ad5
python3-libxml2-2.9.7-18.el8.x86_64.rpm
180c096757843d64ba78420bc111e19be5fef845aa1028298c9b4d73da230ee6
RLBA-2024:0896
librabbitmq bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librabbitmq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The librabbitmq package provides a C-language AMQP client library for use with AMQP servers.
Bug Fix(es) and Enhancement(s):
* librabbitmq-tools for Rocky Linux8 (JIRA:Rocky Linux-17851)
none-baseos-rpms
librabbitmq-0.9.0-5.el8_9.i686.rpm
ed7971142a445574a102000e812433760b72e8b0ce06bf2df27cb7eb34a9434c
librabbitmq-0.9.0-5.el8_9.x86_64.rpm
0c8dbbbebf0705b5cf8c8c6b7ecfd9cd7fdce5d2221c5f01638c9d6af21691f5
RLSA-2024:0967
Moderate: opensc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for opensc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures.
Security Fix(es):
* OpenSC: Side-channel leaks while stripping encryption PKCS#1 padding (CVE-2023-5992)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
opensc-0.20.0-8.el8_9.i686.rpm
6710b7657e3629f773c0815340e7d957e9520a5e148c418ef873eca1df1b8dd7
opensc-0.20.0-8.el8_9.x86_64.rpm
b806e97f8521647166f83ec2fbb873107ea67d4c78395b94bdfaaee653c3b267
RLBA-2024:3143
selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for selinux-policy.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
selinux-policy-3.14.3-139.el8_10.noarch.rpm
f5a434557cbb77b74e3ce3bd2dabdaed6487ea4e8f2eac8bd7303526ce277a0d
selinux-policy-3.14.3-139.el8_10.noarch.rpm
f5a434557cbb77b74e3ce3bd2dabdaed6487ea4e8f2eac8bd7303526ce277a0d
selinux-policy-devel-3.14.3-139.el8_10.noarch.rpm
eda07ad80c7b4b1b60ec4cf071ff4cfb0d4083d138dfb982d9c02bfb3363be31
selinux-policy-devel-3.14.3-139.el8_10.noarch.rpm
eda07ad80c7b4b1b60ec4cf071ff4cfb0d4083d138dfb982d9c02bfb3363be31
selinux-policy-doc-3.14.3-139.el8_10.noarch.rpm
d801e8888b845570c724d7b9ce61bd4231a541f7a56415a0a6ec685ad39731bd
selinux-policy-doc-3.14.3-139.el8_10.noarch.rpm
d801e8888b845570c724d7b9ce61bd4231a541f7a56415a0a6ec685ad39731bd
selinux-policy-minimum-3.14.3-139.el8_10.noarch.rpm
360b4e5685021ab1eea108b7fbfaed5a304e79e14dc2cb56b6ec63f840a9b7c4
selinux-policy-minimum-3.14.3-139.el8_10.noarch.rpm
360b4e5685021ab1eea108b7fbfaed5a304e79e14dc2cb56b6ec63f840a9b7c4
selinux-policy-mls-3.14.3-139.el8_10.noarch.rpm
f96ecb8b70b2bc456eeca0c0b881b43f12dccc46d28f4ef606f4bec5120f1d76
selinux-policy-mls-3.14.3-139.el8_10.noarch.rpm
f96ecb8b70b2bc456eeca0c0b881b43f12dccc46d28f4ef606f4bec5120f1d76
selinux-policy-sandbox-3.14.3-139.el8_10.noarch.rpm
e9fc3744909b80a91ce8c6174cf80e28ba0337cdd9986bf94b7b22b918c8edf0
selinux-policy-sandbox-3.14.3-139.el8_10.noarch.rpm
e9fc3744909b80a91ce8c6174cf80e28ba0337cdd9986bf94b7b22b918c8edf0
selinux-policy-targeted-3.14.3-139.el8_10.noarch.rpm
96bc877506d2a47d170c7b4e08ccecbdf53f5e88a831a2854a611f1963a93eb3
selinux-policy-targeted-3.14.3-139.el8_10.noarch.rpm
96bc877506d2a47d170c7b4e08ccecbdf53f5e88a831a2854a611f1963a93eb3
RLBA-2024:3145
stunnel bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for stunnel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
stunnel-5.71-2.el8.x86_64.rpm
caa4c7bb6d5cea8e7af8802e56101e12a1ff08b05892b37a089da86903437fed
RLBA-2024:3146
kmod-kvdo bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-kvdo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
kmod-kvdo-6.2.8.7-94.el8.x86_64.rpm
56acada41d056217783889c52439164dbbd5d70f446c58303424bcde6d5fd6c9
RLBA-2024:3147
xfsdump bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for xfsdump.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
xfsdump-3.1.8-7.el8_9.x86_64.rpm
80d43fca687ae6c8d19200488d42b0a93f616b240c30d70001dfcf9c81169366
RLBA-2024:3153
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
NetworkManager-1.40.16-15.el8_9.x86_64.rpm
48da1b81cce6b3b83a482cfb8e6d7676a1bff7f7674b87631e9def6a7e30e073
NetworkManager-adsl-1.40.16-15.el8_9.x86_64.rpm
474a026ab535777c7264755efa9d776bc877d443d6ff3fcae81c487c12105885
NetworkManager-bluetooth-1.40.16-15.el8_9.x86_64.rpm
86d13c3405afe0f1610e384a47de5ce6055704395ce5e837d6dadcd9892bfb81
NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm
7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44
NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm
7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44
NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm
b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f
NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm
b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f
NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm
705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30
NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm
705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30
NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm
6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93
NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm
6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93
NetworkManager-libnm-1.40.16-15.el8_9.i686.rpm
24502121a202c342dd9dcc97ee116c7537d0f8950b73150740385ca4556cb42d
NetworkManager-libnm-1.40.16-15.el8_9.x86_64.rpm
3911b290a4f36569df75674b8a959d9771972ceba5c9e0d067c4af3305c462d2
NetworkManager-ovs-1.40.16-15.el8_9.x86_64.rpm
c79c415939f051f3bad78797a287a0531e131e8ebc1c166ca7abcf381c669965
NetworkManager-ppp-1.40.16-15.el8_9.x86_64.rpm
02bc73184d084a76dfaa8e7144f883e96067b501c9b09186a5231fb42047c483
NetworkManager-team-1.40.16-15.el8_9.x86_64.rpm
3f4960bf57e6c4264125b181b3f3a236431616f4e8f7c820ea34906c2c296f94
NetworkManager-tui-1.40.16-15.el8_9.x86_64.rpm
ee87c160b59aa7ac7c0bf3e3cc1a5850f2aa2c72a75a6d20b6521ad8fcf9659d
NetworkManager-wifi-1.40.16-15.el8_9.x86_64.rpm
93ecdf508147d0b081549133a71ed7f7a84240caa32ca3373a8dd8a13269ba4b
NetworkManager-wwan-1.40.16-15.el8_9.x86_64.rpm
ed422416d4b53e93ddf51a50af1ff3aef9271d3870e391aae0dd958845ab6fa5
RLBA-2024:3154
curl bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
curl-7.61.1-34.el8.x86_64.rpm
fae57a31a541860ce0eca85256227280490bef8f55e36f61a20ab73212ea18f5
libcurl-7.61.1-34.el8.i686.rpm
dec14cc4b363326da17f95af500c0dc6db67c07ef36a1035aa6a34cc94b3bdaf
libcurl-7.61.1-34.el8.x86_64.rpm
7c32bb92d9c0a8359944af40b80c59e35db3ff7b6f87f63edc4ac769477490ce
libcurl-devel-7.61.1-34.el8.i686.rpm
a9ed247ff6aecde481022a1caa2bb038b4aaaca3426beaafbd71ebf2c1c01b7b
libcurl-devel-7.61.1-34.el8.x86_64.rpm
98dc092329a3ffa2abab3eae61f0a3f0ecb865a4235fe9c7b12e6aea4e73dc53
libcurl-minimal-7.61.1-34.el8.i686.rpm
b6982f0672de541d4a45ce74f2b8b2581d155905b8a4ef7b5935579fa359b5e3
libcurl-minimal-7.61.1-34.el8.x86_64.rpm
834f861ee70eb7e8b0f9f6b032346fdfb10e56066500c571451812dc36e924f6
RLBA-2024:3156
rpm bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
python3-rpm-4.14.3-31.el8.x86_64.rpm
923d2fff2407eedc7da5fc438ab87df3d4433b74d62df20b395586c766eb528a
rpm-4.14.3-31.el8.x86_64.rpm
eb10bb30beec9b78d2b0502ea7f986db5f9874c5cca75b78a738a802c1111171
rpm-apidocs-4.14.3-31.el8.noarch.rpm
6281d0ad9bec4754052e07f41ba3cffd7ea524f61ab9006e6b0456ad7fa55ab6
rpm-apidocs-4.14.3-31.el8.noarch.rpm
6281d0ad9bec4754052e07f41ba3cffd7ea524f61ab9006e6b0456ad7fa55ab6
rpm-build-libs-4.14.3-31.el8.i686.rpm
629edc56f44a3d213b106a2799e3d3cb6ecbde3f053050f4c74f7acd345ca3cf
rpm-build-libs-4.14.3-31.el8.x86_64.rpm
a9373cb4de290a8cd936c5458164d5e81509018a91b961feeed68ef8df555721
rpm-cron-4.14.3-31.el8.noarch.rpm
8b748ae549a4a9f81557df069ef430f41adc845883caa62e387c0a6e9467cd7f
rpm-cron-4.14.3-31.el8.noarch.rpm
8b748ae549a4a9f81557df069ef430f41adc845883caa62e387c0a6e9467cd7f
rpm-devel-4.14.3-31.el8.i686.rpm
82715e2ae648b09313a1b5c33c7d580a67d066a88f0ef942745ef557a8902f2b
rpm-devel-4.14.3-31.el8.x86_64.rpm
991e83bde6345afcaff7c6e47ca00a19a37a51381796c22f0dbc50faeccf24fa
rpm-libs-4.14.3-31.el8.i686.rpm
7dee30a7c0c58ba1d0bce56edb171e8e1ac5aa4c1cf5d13752c41eea6119db9d
rpm-libs-4.14.3-31.el8.x86_64.rpm
673602185c19201eefd1f57a2a13cbc1775ec6dec8a8ed9bb2c2b150eaa34ed5
rpm-plugin-ima-4.14.3-31.el8.x86_64.rpm
1b74468518acecad7935ccdafdf62398bf593aa8c2c5d01a93f78bf56a22bc44
rpm-plugin-prioreset-4.14.3-31.el8.x86_64.rpm
bd309851877482009a2c4acf00dc3a5ce3f76174d7b8c19d026c71f2eddb3b85
rpm-plugin-selinux-4.14.3-31.el8.x86_64.rpm
1f15e4040644c76e9f5208033062a5c7ece348a150869090a7dec9f51541663e
rpm-plugin-syslog-4.14.3-31.el8.x86_64.rpm
c57b2ee9d67468aa958f1f96f185db2e42cb1b6bb11916307648609347139704
rpm-plugin-systemd-inhibit-4.14.3-31.el8.x86_64.rpm
ab3f88f761a2470425d1d63f8d481d202b6508e88fb2a8f8d4082f3a70ee7e60
rpm-sign-4.14.3-31.el8.x86_64.rpm
721140ef80060a730aa4e3dcabdd262e26b4639bb3d968a58587fb89438f51c5
RLBA-2024:3155
kmod bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
kmod-25-20.el8.x86_64.rpm
1a1dc2808b694f88d478e87fcaddd10cf70ecb031d24a607b50629fa6d0d2c01
kmod-libs-25-20.el8.i686.rpm
f7a7fc261c883d783b0c098ffe34b905c949cb0a48fbd3dcb9b6f55ec66cf693
kmod-libs-25-20.el8.x86_64.rpm
a4e26848700d7b3d32cc27fde17a7c322e3b68e1d892240d45d6dd7876e4493e
RLBA-2024:3161
libdnf bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
libdnf-0.63.0-19.el8.i686.rpm
f832e5c5ec37b420f02ca517884ef36d4de6aad7a6b9cb3cb6e6616ee084d5f7
libdnf-0.63.0-19.el8.x86_64.rpm
78409cbbb1a7ed3210c17fafaf9d1967d3abdcdda6ff0c69fdd23c39ccb957dc
python3-hawkey-0.63.0-19.el8.x86_64.rpm
3456599472142fdf0044598c0492f58099cc34121f1af43a5d808a6bf14a93b4
python3-libdnf-0.63.0-19.el8.x86_64.rpm
91760ca9d0305f742bd4b8f2589b8d68e6569a0430c2b90bbe4fe5b4789b15f4
RLBA-2024:3162
shadow-utils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for shadow-utils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
shadow-utils-4.6-22.el8.x86_64.rpm
647f181caed868df32f5e44ce42ebfaf667730d09ae8115fd7027624e29b81b8
shadow-utils-subid-4.6-22.el8.i686.rpm
5903db97965004db5f3b873b90dd8cf82ced27e2be4976a28ae271dc15c649b3
shadow-utils-subid-4.6-22.el8.x86_64.rpm
fccd83e6d5386b0d2e728923cf5e44beff70f524f758d0548ebec4d780368967
RLBA-2024:3160
tuna bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
tuna-0.18-9.el8.noarch.rpm
7406a7de42eab91721f6f49b6ba27668cf0491424b8890ea0fd5ad6bb5c8a19b
tuna-0.18-9.el8.noarch.rpm
7406a7de42eab91721f6f49b6ba27668cf0491424b8890ea0fd5ad6bb5c8a19b
RLSA-2024:3166
Moderate: openssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: scp allows command injection when using backtick characters in the destination argument (CVE-2020-15778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
openssh-8.0p1-24.el8.x86_64.rpm
a5056931cb68b5a349dce7eaacc75f90f421c03600ecfe30822d1826b4338be1
openssh-cavs-8.0p1-24.el8.x86_64.rpm
ae8406c9865c70c9488a747fbe063aac819f7c58d0070b224f256c565fdb5b34
openssh-clients-8.0p1-24.el8.x86_64.rpm
7bb7dca1880a8f32c6cccd6459f6856cb4c95336cc3343889423c3b05e4416b4
openssh-keycat-8.0p1-24.el8.x86_64.rpm
12eff5f020ccd1ac4f76b43769f55cd2d019ab6b584d1a5ed777528052c00711
openssh-ldap-8.0p1-24.el8.x86_64.rpm
b015426aceadd45e4d87995e1225e6e005cd18c3f1a893aa32ad2a0350507332
openssh-server-8.0p1-24.el8.x86_64.rpm
2de1dc79617660a93e4d9f795116af1adf0abbac8303ca1218477aeaba6f449c
pam_ssh_agent_auth-0.10.3-7.24.el8.x86_64.rpm
b424cd39ce0c6f59464a07e6167966be49cc6ff595e53ba7cc37043cb615cd65
RLBA-2024:3172
elfutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for elfutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
elfutils-0.190-2.el8.x86_64.rpm
20523117264964d539a6ac01e3089b6166dd4ca4a43fceb38f8e6341159e5aac
elfutils-debuginfod-0.190-2.el8.x86_64.rpm
a3696514ef6c9195c776efa8b5e64233e2d14653033f612ca2ffa6085aef0410
elfutils-debuginfod-client-0.190-2.el8.i686.rpm
f29fec570a3cba8df2ff61d0858fea74b8e914f4e81c99b792d6fbeae3d85c78
elfutils-debuginfod-client-0.190-2.el8.x86_64.rpm
80094878cfa0dd1cddb77655e67a8a53d9ab5b257223ae8498431c6c2e7d3f5c
elfutils-debuginfod-client-devel-0.190-2.el8.i686.rpm
11839888d0afeb1e3af32211ac13b3783a33d074f17e9e4f41456fe281b404ba
elfutils-debuginfod-client-devel-0.190-2.el8.x86_64.rpm
43c7250ceaa89be751ffd5ed15bd8437a4d075cdb1abe98f0c26f83f75008ca0
elfutils-default-yama-scope-0.190-2.el8.noarch.rpm
f5e46bf54b40eb7feb74b42b4ea28f5dbe0e160199f35cf0e6d0e2c5a29f88d3
elfutils-default-yama-scope-0.190-2.el8.noarch.rpm
f5e46bf54b40eb7feb74b42b4ea28f5dbe0e160199f35cf0e6d0e2c5a29f88d3
elfutils-devel-0.190-2.el8.i686.rpm
5699e4755b21f2164c8d14cda190c636236d079c46116695ca6154081b03398d
elfutils-devel-0.190-2.el8.x86_64.rpm
e3c50b046c992684a98fb641d03abfe24e414f0d37d7bad0f3e03175fdac0fa6
elfutils-libelf-0.190-2.el8.i686.rpm
e1f4a774e6d891e7d86d7b82c897f3e05bb0065d9d39cbf316e4df1c39965883
elfutils-libelf-0.190-2.el8.x86_64.rpm
0cd9636d64cd3bcc98b27c959d1e21ccf4e8696313801069611eb2306e9c9957
elfutils-libelf-devel-0.190-2.el8.i686.rpm
598c330aaf1da99f5bf0accfa74e7cdc50fa95aed9cf23bf90ae1165233179a3
elfutils-libelf-devel-0.190-2.el8.x86_64.rpm
5f234c8cbdc482f0a15b0df91f4a8d922cf51044cd6323d13baa9d2a30caeeec
elfutils-libs-0.190-2.el8.i686.rpm
85a139476cd7842a7d5e6dba430f200b4dd50de8de7ffc338974dec6593a5e6b
elfutils-libs-0.190-2.el8.x86_64.rpm
13ad1c673193d90641b92aa1f5aa46595919ad9bea0722600c87a7716a1357ee
RLBA-2024:3170
perftest bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for perftest.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
none-baseos-rpms
perftest-23.07.0.0.27-1.el8.x86_64.rpm
3757a87b652843763c4d9232e52505c5a086385f0d8bad18457c37d86dce6b3b
RLSA-2024:3178
Important: linux-firmware security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi (CVE-2022-46329)
* hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem (CVE-2023-20592)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
iwl1000-firmware-39.31.5.1-121.el8.1.noarch.rpm
6de93489b1fd0f055c1810893bb268ab3159094541d442d00f144c2914916d0b
iwl1000-firmware-39.31.5.1-121.el8.1.noarch.rpm
6de93489b1fd0f055c1810893bb268ab3159094541d442d00f144c2914916d0b
iwl100-firmware-39.31.5.1-121.el8.1.noarch.rpm
edfdb8dcd290e73a1de9227c15dc5e4888441a767ebe39b8dacd43dbdc097214
iwl100-firmware-39.31.5.1-121.el8.1.noarch.rpm
edfdb8dcd290e73a1de9227c15dc5e4888441a767ebe39b8dacd43dbdc097214
iwl105-firmware-18.168.6.1-121.el8.1.noarch.rpm
fd7fb01cdac1b4f2b27bf31252fa837eea95ae50b481d06fb96f3576894212ee
iwl105-firmware-18.168.6.1-121.el8.1.noarch.rpm
fd7fb01cdac1b4f2b27bf31252fa837eea95ae50b481d06fb96f3576894212ee
iwl135-firmware-18.168.6.1-121.el8.1.noarch.rpm
5361b28d72ad43e7638d65574f352606622d69794800626d03775277bef9b6ac
iwl135-firmware-18.168.6.1-121.el8.1.noarch.rpm
5361b28d72ad43e7638d65574f352606622d69794800626d03775277bef9b6ac
iwl2000-firmware-18.168.6.1-121.el8.1.noarch.rpm
0ec79b37ee5e219ddf5b9b2c4c2d95fb3581ba3d48b2a1c8fec7f925414ce182
iwl2000-firmware-18.168.6.1-121.el8.1.noarch.rpm
0ec79b37ee5e219ddf5b9b2c4c2d95fb3581ba3d48b2a1c8fec7f925414ce182
iwl2030-firmware-18.168.6.1-121.el8.1.noarch.rpm
30260c57784d7266dea64ed945f65393709bf11863958de003697750a61ea9aa
iwl2030-firmware-18.168.6.1-121.el8.1.noarch.rpm
30260c57784d7266dea64ed945f65393709bf11863958de003697750a61ea9aa
iwl3160-firmware-25.30.13.0-121.el8.1.noarch.rpm
b4524d6f1bda87df0c6eec1ce00ded83751509cb21f7586af7911a53db38c07f
iwl3160-firmware-25.30.13.0-121.el8.1.noarch.rpm
b4524d6f1bda87df0c6eec1ce00ded83751509cb21f7586af7911a53db38c07f
iwl3945-firmware-15.32.2.9-121.el8.1.noarch.rpm
3f5edbf1d24a56366bb9475abc104e27bebad0a5fcbbabacb055211069bceced
iwl3945-firmware-15.32.2.9-121.el8.1.noarch.rpm
3f5edbf1d24a56366bb9475abc104e27bebad0a5fcbbabacb055211069bceced
iwl4965-firmware-228.61.2.24-121.el8.1.noarch.rpm
90b5ffab6f64dca7fa2e70773c295b57cf5f8860575a91577dae15f0e63ae9ff
iwl4965-firmware-228.61.2.24-121.el8.1.noarch.rpm
90b5ffab6f64dca7fa2e70773c295b57cf5f8860575a91577dae15f0e63ae9ff
iwl5000-firmware-8.83.5.1_1-121.el8.1.noarch.rpm
b147a83ba023ed76767e5bff4640aceb313dc0ee7a078998f770cb11432c91a4
iwl5000-firmware-8.83.5.1_1-121.el8.1.noarch.rpm
b147a83ba023ed76767e5bff4640aceb313dc0ee7a078998f770cb11432c91a4
iwl5150-firmware-8.24.2.2-121.el8.1.noarch.rpm
e590d20109c5bca9c2fb9a4dc796570686b54a23cdec300d9f87f78e1360008a
iwl5150-firmware-8.24.2.2-121.el8.1.noarch.rpm
e590d20109c5bca9c2fb9a4dc796570686b54a23cdec300d9f87f78e1360008a
iwl6000-firmware-9.221.4.1-121.el8.1.noarch.rpm
284c238d2f1a3dbecd4c0b5b2d89030961891f0730c5803767a553679a05ca65
iwl6000-firmware-9.221.4.1-121.el8.1.noarch.rpm
284c238d2f1a3dbecd4c0b5b2d89030961891f0730c5803767a553679a05ca65
iwl6000g2a-firmware-18.168.6.1-121.el8.1.noarch.rpm
24b205f1fd362cc0e5cdaf18e3895a0463844b5b3b2c5687ce0524e070de505b
iwl6000g2a-firmware-18.168.6.1-121.el8.1.noarch.rpm
24b205f1fd362cc0e5cdaf18e3895a0463844b5b3b2c5687ce0524e070de505b
iwl6000g2b-firmware-18.168.6.1-121.el8.1.noarch.rpm
145ee6a3f02112daa3c903a28ccbd9aec65dab7e069b91db2e7cc588c0754115
iwl6000g2b-firmware-18.168.6.1-121.el8.1.noarch.rpm
145ee6a3f02112daa3c903a28ccbd9aec65dab7e069b91db2e7cc588c0754115
iwl6050-firmware-41.28.5.1-121.el8.1.noarch.rpm
8e8a71b03f8e351eccdc475c0bc9c838f9093203f3763a5a596e946de027b07b
iwl6050-firmware-41.28.5.1-121.el8.1.noarch.rpm
8e8a71b03f8e351eccdc475c0bc9c838f9093203f3763a5a596e946de027b07b
iwl7260-firmware-25.30.13.0-121.el8.1.noarch.rpm
eea59a4cd43ca4f198e6061fa41682428ea084f805b123cc4e554e757802ab97
iwl7260-firmware-25.30.13.0-121.el8.1.noarch.rpm
eea59a4cd43ca4f198e6061fa41682428ea084f805b123cc4e554e757802ab97
libertas-sd8686-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
704386eebc33c79233fb13055961da9aacb18096294da8ea2a19710c0f72b0eb
libertas-sd8686-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
704386eebc33c79233fb13055961da9aacb18096294da8ea2a19710c0f72b0eb
libertas-sd8787-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
07575b21882086d777401cc2410b62c3eafd16b85e7e981bbd4ced246445e70f
libertas-sd8787-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
07575b21882086d777401cc2410b62c3eafd16b85e7e981bbd4ced246445e70f
libertas-usb8388-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
cbbc09c0b13fe8bb3ae2398bd279124024b0f78f655a0d6709315aa601b5c5ca
libertas-usb8388-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
cbbc09c0b13fe8bb3ae2398bd279124024b0f78f655a0d6709315aa601b5c5ca
libertas-usb8388-olpc-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
f723a31519a8ca920453a8fbec40d74072119e324ffba0640b9a40b1397a948c
libertas-usb8388-olpc-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
f723a31519a8ca920453a8fbec40d74072119e324ffba0640b9a40b1397a948c
linux-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
36f714b39bc3fa48132cb2ea04f1cc3392c7920960980d11aca841bcf2cf6c6b
linux-firmware-20240111-121.gitb3132c18.el8.noarch.rpm
36f714b39bc3fa48132cb2ea04f1cc3392c7920960980d11aca841bcf2cf6c6b
RLBA-2024:3183
device-mapper-multipath bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for device-mapper-multipath.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-multipath-0.8.4-41.el8.x86_64.rpm
c4638074f594f253a8c558e5f781ea8297252dd17e9e6a07b20cdb752055bcac
device-mapper-multipath-libs-0.8.4-41.el8.i686.rpm
caa28a9579c0c586472ef420e399f4dda30b4a11d49dba0e8b22298420a8ef25
device-mapper-multipath-libs-0.8.4-41.el8.x86_64.rpm
c17c9c057c0373a84093ae71dbc5032dec2666a134a3491770271da800407acf
kpartx-0.8.4-41.el8.x86_64.rpm
afacf1190e1345a98655b840cbb0083496551124770e39fb4741212fa24d0fa2
libdmmp-0.8.4-41.el8.i686.rpm
07dfb1652cd5edf35bbfcbeaa33cd2c83698e32d13dbd3d32c45d61c9ac97dfb
libdmmp-0.8.4-41.el8.x86_64.rpm
2b8865cbd594e620bb863eb489bda427da716de80dccb15b5e623c56ef9bc524
RLBA-2024:3185
samba bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
ctdb-4.19.4-3.el8.x86_64.rpm
89c52b4e8e9be9878d379ea77d78bcc4ddaade8882950cd57741e2be8616c463
libnetapi-4.19.4-3.el8.i686.rpm
071fff80129f9c0724b67115c817d2c15c45d8f54e36d4db23b82b34d566b70a
libnetapi-4.19.4-3.el8.x86_64.rpm
9abc678e3c43d7b71f6cb9b56bcb0b7c0878904f30542379bb57ce2b0eeed050
libsmbclient-4.19.4-3.el8.i686.rpm
cf1c2cc966802c7d66fe645817985b9d859ba3d6b723c00e24742a796e6e1cfe
libsmbclient-4.19.4-3.el8.x86_64.rpm
a4ecf16cfe8904690a81e386e4c823405b50facba0de3889f53a2da4b3f5ef61
libwbclient-4.19.4-3.el8.i686.rpm
05543bdaddb611482b8b2141886cc9e85bf968d63ff26b06f7790d4704811bae
libwbclient-4.19.4-3.el8.x86_64.rpm
2f1ddf5be736853adfbfbfcab130ac0bc9d1d874c2fdbb78ee41c28026f2dcbb
python3-samba-4.19.4-3.el8.i686.rpm
dde35b82459bcbd2ed633756e100a88a22a2d8ac859e5612123702442697cea1
python3-samba-4.19.4-3.el8.x86_64.rpm
362c695703a50fd061f535df7fd6104eba371c77395b7775999bc465878d363d
python3-samba-dc-4.19.4-3.el8.x86_64.rpm
3f2ef61a521c3f79691d5a9a97abd59bcb635aa36e15bc175ce2c001482bbd40
python3-samba-test-4.19.4-3.el8.x86_64.rpm
de4fb24dd4457e6f8e4e1b9bc5408b9f2f2812a67bd63519fae042cf5fbc7c01
samba-4.19.4-3.el8.x86_64.rpm
d39cf45033ecc3ed2a8972804f601abd5630e6106d1de33e2164b57aebb2da86
samba-client-4.19.4-3.el8.x86_64.rpm
ea62920b2c976226173533a9b7328c41193ff75764390c05b32a64b0c9f7261f
samba-client-libs-4.19.4-3.el8.i686.rpm
c65eeea9061c865160b366d2cdfb3f244c9386b0b6bc70374574c57ed88097e0
samba-client-libs-4.19.4-3.el8.x86_64.rpm
db9007870e48b255ff60e5348c10b4177f10915100b4b4432d542cc3d62c8079
samba-common-4.19.4-3.el8.noarch.rpm
893433aa34c69971b27c5336ef12c8543e38995851f94178431ae8b4fa2f5a2a
samba-common-4.19.4-3.el8.noarch.rpm
893433aa34c69971b27c5336ef12c8543e38995851f94178431ae8b4fa2f5a2a
samba-common-libs-4.19.4-3.el8.i686.rpm
f8b93a040b64c75e32ad40a1c95a56f4faae79f0f70ca8a9b20bf56f3129d40c
samba-common-libs-4.19.4-3.el8.x86_64.rpm
9acf17ec7e40644a5b8bfc558ff1c0d3fc4cebf37faf163b2b0b0d9b5061b54d
samba-common-tools-4.19.4-3.el8.x86_64.rpm
323c5dc6f0e641e77c3cad0ffe4bb7f17d2d3c8b9db938f908be34ccf8dbdbc9
samba-dcerpc-4.19.4-3.el8.x86_64.rpm
424fcf9dfbf05b2f49bdb8933aa6772ef761703d58984ef8ba5ecb188a54b0cd
samba-dc-libs-4.19.4-3.el8.i686.rpm
17bebf71b262952ac8b889d5ad3f78e4d60aef172e5644aab89adc25887ec486
samba-dc-libs-4.19.4-3.el8.x86_64.rpm
0ccdbc4a43b2d28b0f593b697077a033e64f2719f5c0993170b59b0488b832bf
samba-krb5-printing-4.19.4-3.el8.x86_64.rpm
a921edb57bc121fbf0c0983c37e245b93834ec566d120e9e92f8163d7f2923af
samba-ldb-ldap-modules-4.19.4-3.el8.x86_64.rpm
6406ee9c23e55836e7828b716279a5ac2de35199a1099265eca05c880577ddff
samba-libs-4.19.4-3.el8.i686.rpm
195cb83b6b0293af701b163c4f701262bab2f141ce3a03f531dd2d0021359102
samba-libs-4.19.4-3.el8.x86_64.rpm
e70e8fef656fae46d5e5399bb3c7f932bfa3a09d2cfc71013ee1d319cbf27dd4
samba-pidl-4.19.4-3.el8.noarch.rpm
f9e79e9279d0bda7e2195cc8b3a248cc084ec3ab48d09bf81449cbad40a1d1f2
samba-pidl-4.19.4-3.el8.noarch.rpm
f9e79e9279d0bda7e2195cc8b3a248cc084ec3ab48d09bf81449cbad40a1d1f2
samba-test-4.19.4-3.el8.x86_64.rpm
51a0c1dc527c50f55e14c7312d901cd517b282688b5f3528ee1a62d3960a5a9c
samba-test-libs-4.19.4-3.el8.x86_64.rpm
76990cefd4fc322d8c02386154b43e7414aafc4eddd2c23fd8be527931f39c25
samba-tools-4.19.4-3.el8.x86_64.rpm
fa75709c2f7940bae5252f21e88284fcc51670246a72bbf3c90e0e9497ad991a
samba-usershares-4.19.4-3.el8.x86_64.rpm
2756bb60ee92c93cef375201e043e69923acedc91b41319a0d2d99e15e9872f0
samba-winbind-4.19.4-3.el8.x86_64.rpm
ea0c7bcf836c74aa2f4df17cb491814011c488059f855e9769196988c7ff3ace
samba-winbind-clients-4.19.4-3.el8.x86_64.rpm
f1dd5e740a61abd40073c71443bb74b129fc8fe3348f2088cff36ad7ce36013b
samba-winbind-krb5-locator-4.19.4-3.el8.x86_64.rpm
9374640b871b7b0575e9d6bd1bd267ac915ad86149f4625ee8cc2be9468f132b
samba-winbind-modules-4.19.4-3.el8.i686.rpm
8e26c45e744203bc4e8e3c3edb4e1d3047c93c928c476de02742897bd4cc311e
samba-winbind-modules-4.19.4-3.el8.x86_64.rpm
b04a43b340c9394011449e9268c60ad670a3f21f7cac208c9725fc0efb269cf3
samba-winexe-4.19.4-3.el8.x86_64.rpm
c67ce1067bae1fe5b83c617dab16bab22f3896eb2f2aeb5fecdca934a4b642b9
RLBA-2024:3188
libtdb bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtdb.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
libtdb-1.4.9-0.el8.i686.rpm
a4b0602a5ac653da98d68d75a536ad386403e9ab334baec58a53c8b016423c5b
libtdb-1.4.9-0.el8.x86_64.rpm
793991275cd350417111e3775fc2901610f567626a0c87d4ba8f188292369c3e
libtdb-devel-1.4.9-0.el8.i686.rpm
caf03ea44426e9a38cd090a02acc14050cf080f2993d327636c5ea2ca18984c8
libtdb-devel-1.4.9-0.el8.x86_64.rpm
a8598c8f11d76663d446bd8b0ec31db089100bc99d8d0344fbee0a664298accf
python3-tdb-1.4.9-0.el8.i686.rpm
1ef68d38b003ad9952fe31e20c2432c12899c73418e30ec55085f251eb5f4391
python3-tdb-1.4.9-0.el8.x86_64.rpm
05efa3383321c7a448ccc09882189f8348f37ba59f1ec9ea6f427f11afb6de3f
tdb-tools-1.4.9-0.el8.x86_64.rpm
8fc8366dd35ba06e756f3c3f12aecb0a20ecc670e54e55b1dcb4585494087e26
RLBA-2024:3189
libtalloc bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtalloc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
libtalloc-2.4.1-0.el8.i686.rpm
ee40cb99627acdd8544dd8a5cf20cf9479fb439164eac88ac71b662869c67806
libtalloc-2.4.1-0.el8.x86_64.rpm
92fc8d13a1602ff7aac4246d495efbe8fc1d2cf3848de578f3566d1b771c9d38
libtalloc-devel-2.4.1-0.el8.i686.rpm
9d22f29004c38ba3a44eac5253f270c575460a46215987c9b0b3f72a2bb4312b
libtalloc-devel-2.4.1-0.el8.x86_64.rpm
845cc3a332e68d1fa68850001f9d07d7816380d2551e33fa8957454a661c4e96
python3-talloc-2.4.1-0.el8.i686.rpm
c25c168708b9a70925dc1e88985c73e25e24d701268098ec667621311c935df4
python3-talloc-2.4.1-0.el8.x86_64.rpm
4cf0e4aff537dc04321c0052830cf7667974ea28c592ce0f737d0cdddba9629b
RLBA-2024:3191
p11-kit bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for p11-kit.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
p11-kit-0.23.22-2.el8.i686.rpm
055e55ccde5a6da343bcf3caa23a4e2a96fb0768019d61157419e86967ea13b9
p11-kit-0.23.22-2.el8.x86_64.rpm
4dffa72079b4babbc6c7dec13408ce75da08bb18239e5e37c0861c39f48f33cd
p11-kit-devel-0.23.22-2.el8.i686.rpm
ce71a2346dc83369cc3f7aa08eeaf1978bb9455ec552d5a0d93af4b8ae6674cf
p11-kit-devel-0.23.22-2.el8.x86_64.rpm
f071b21f9e1fcadd12e0807d6cd0567757468dbe8618b3d1015fd320bdfb61a2
p11-kit-server-0.23.22-2.el8.x86_64.rpm
6101e7fc8eee6f3c533d96caf8f356acf659de518bb61f81cc9efc27f56f4ad2
p11-kit-trust-0.23.22-2.el8.i686.rpm
e9452de37cdd452205125c51a51928c2d71aae912cc085860b6c6c3a2893b43d
p11-kit-trust-0.23.22-2.el8.x86_64.rpm
d7f70ce7a4b467a717b6dc72f3fd1983e8aac9f04896ecc49696668ea3acedd2
RLBA-2024:3193
librabbitmq bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for librabbitmq.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
librabbitmq-0.9.0-5.el8_9.i686.rpm
ed7971142a445574a102000e812433760b72e8b0ce06bf2df27cb7eb34a9434c
librabbitmq-0.9.0-5.el8_9.x86_64.rpm
0c8dbbbebf0705b5cf8c8c6b7ecfd9cd7fdce5d2221c5f01638c9d6af21691f5
RLBA-2024:3194
cronie bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cronie.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
cronie-1.5.2-10.el8.x86_64.rpm
c6b28eb24eee0cd2c5dac0a3805ca45ef7bc671a15c926f83d95601e05fc99d2
cronie-anacron-1.5.2-10.el8.x86_64.rpm
61c2b6d2b00b44fc061e19661dba03e8590889b80145e1d8c2acade4847bebdf
cronie-noanacron-1.5.2-10.el8.x86_64.rpm
0aa588b3d181c2c3b274ace1f1520493a6954762cf8bdcb61dc55d4c3f257042
RLSA-2024:3203
Moderate: systemd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
* systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes (CVE-2023-7008)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
systemd-239-82.el8.i686.rpm
418bb6f0f0f28cd9db216b2cf5544b2afeae81798822596fe5b086a7bb60290e
systemd-239-82.el8.x86_64.rpm
d8a779de2a2c83d5c2fa5356c2c0bdab027563047d5b050cb770c9be2a3a7935
systemd-container-239-82.el8.i686.rpm
5d27adfb0a885c81177f8d6ba7a93bd09e60cd8102be48dd086306e64ebcdd7f
systemd-container-239-82.el8.x86_64.rpm
4dbb2378299a9f8566d8fb0a2906f134c3916116e4082cf13c9f4a8d4fbe5ccb
systemd-devel-239-82.el8.i686.rpm
277dba56104d238d167fbb41db755b37b6854db2577df8b7da2c9f1c9b11094c
systemd-devel-239-82.el8.x86_64.rpm
5e107d71988c7fc98c230fa49f8bf49d80233631becfe49bdb82aa778746cd4e
systemd-journal-remote-239-82.el8.x86_64.rpm
fe8226bb94f68e9c9c3a79dad890d1911e86d252087ad5388ab4e7534adefc53
systemd-libs-239-82.el8.i686.rpm
a778ec694c126a019ca0789d81720fac2d04cb1f7df7c561192c20f93a5a2f87
systemd-libs-239-82.el8.x86_64.rpm
6dbf9bc395fc49d9fc797f716987df59eeae95a9321091edaf0bf16e8feede9e
systemd-pam-239-82.el8.x86_64.rpm
af5903c9a542e3ffc82d3dd897c2390a32da5366dc0a62c89418c325faa7fa43
systemd-tests-239-82.el8.x86_64.rpm
12c68404b3fafbf5514183757a9547f4824ff3a2af534a3caa8b528193e6baf4
systemd-udev-239-82.el8.x86_64.rpm
282c5fe374c7bbb81d63020dee221326d1269969f21ec5bf1fcce2a3a6dceb2a
RLBA-2024:3204
grubby bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for grubby.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
grubby-8.40-49.el8.x86_64.rpm
23c00713c44103d26651f23b04ac569229e14b373de515a22e4a5e1814d26147
RLBA-2024:3212
chrony bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for chrony.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
chrony-4.5-1.el8.x86_64.rpm
c7d069647a3c76a6748a6b1eefe5666c2d15c25bb0c0b87434c4dcbff58b41db
RLBA-2024:3210
dmidecode bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dmidecode.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
dmidecode-3.5-1.el8.x86_64.rpm
181a425ad823aed51a9c6ef1667367d7cd5feacbc886dec20a18afd6cf021c13
RLBA-2024:3213
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
firewalld-0.9.11-4.el8.noarch.rpm
4fd194e7195e1b259fb1ca25e121dd099d5622645a6e6623da7e8287c1271f35
firewalld-0.9.11-4.el8.noarch.rpm
4fd194e7195e1b259fb1ca25e121dd099d5622645a6e6623da7e8287c1271f35
firewalld-filesystem-0.9.11-4.el8.noarch.rpm
43ae0e016d75b77afca908c12abed321e2f384f7a00184f7c4b46784a5da8163
firewalld-filesystem-0.9.11-4.el8.noarch.rpm
43ae0e016d75b77afca908c12abed321e2f384f7a00184f7c4b46784a5da8163
python3-firewall-0.9.11-4.el8.noarch.rpm
ea433ed8ef9c47e06effef3709bafc59376907e7f5ccc29f361644f70d196c5a
python3-firewall-0.9.11-4.el8.noarch.rpm
ea433ed8ef9c47e06effef3709bafc59376907e7f5ccc29f361644f70d196c5a
RLBA-2024:3217
arpwatch bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for arpwatch.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
arpwatch-2.1a15-46.el8.x86_64.rpm
e51acbcb040e6e96fd34d60c032eadb2bb9bb7200d840dbdab1a7866c7ff90ad
RLBA-2024:3219
gpgme bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gpgme.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
gpgme-1.13.1-12.el8.i686.rpm
29060358d1bec27d8f996fc7fc930eccaf6cafa03ca7a0c9716bb6413b1d97af
gpgme-1.13.1-12.el8.x86_64.rpm
ae13170d5249ae358f6581a9cb4770659a2f4464c2bbce6218590bd9c1cb57ff
gpgmepp-1.13.1-12.el8.i686.rpm
34c2a3bc87f54ec52678623f3fe60a555fb9d771cf3492e4864143a70a43cec9
gpgmepp-1.13.1-12.el8.x86_64.rpm
1e7b78d02506dcdfb76369a8bf11d6f9387c41859353f521b107e1ef62204540
python3-gpg-1.13.1-12.el8.x86_64.rpm
8ec0203e71888d633be9fa5222a2b97cd3aac4444d916221985a7d5b444d6c42
RLBA-2024:3218
policycoreutils bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
policycoreutils-2.9-25.el8.x86_64.rpm
c35f28edb99cf56461491682374a5e427aadfcc951f1323297c1f1d4db40362d
policycoreutils-dbus-2.9-25.el8.noarch.rpm
8107ddb47e7b5f920a3e7fa27c1193866e05c8cdcdffd24ba118bfef8a5303b3
policycoreutils-dbus-2.9-25.el8.noarch.rpm
8107ddb47e7b5f920a3e7fa27c1193866e05c8cdcdffd24ba118bfef8a5303b3
policycoreutils-devel-2.9-25.el8.i686.rpm
01825cdd52acbe68635010e91c02803fffa6b6e95359e1b9fe91cf467c316aec
policycoreutils-devel-2.9-25.el8.x86_64.rpm
a092e989abb28f4ec467c7c34d690e5a91f5a0672ff3df004ca9b68094f658fb
policycoreutils-newrole-2.9-25.el8.x86_64.rpm
b26ced794848108e83407bdec58b128c39605f2b4817468191c4836cf86ac62c
policycoreutils-python-utils-2.9-25.el8.noarch.rpm
f11fee096925adb2efdf9139732e8b9e02f2dc1c6a363b8570057ace870fae12
policycoreutils-python-utils-2.9-25.el8.noarch.rpm
f11fee096925adb2efdf9139732e8b9e02f2dc1c6a363b8570057ace870fae12
policycoreutils-restorecond-2.9-25.el8.x86_64.rpm
368d3e462a9bcaf3927b0f84359af0bf289a48890879cb21afba4c2369b3795b
python3-policycoreutils-2.9-25.el8.noarch.rpm
61a4f7b59d6126101aa05bc37eefd46724f4f05bddcb6707cf6f28141ff19cd3
python3-policycoreutils-2.9-25.el8.noarch.rpm
61a4f7b59d6126101aa05bc37eefd46724f4f05bddcb6707cf6f28141ff19cd3
RLBA-2024:3224
util-linux bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for util-linux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
libblkid-2.32.1-46.el8.i686.rpm
cf17f8829a8bc38a23555f2c8244c86edf1858e080ef30b7745e75cc028bf4c4
libblkid-2.32.1-46.el8.x86_64.rpm
30255998e667260ebe71a4c507427dc157ab7459fc3192f461f198560042d5fa
libblkid-devel-2.32.1-46.el8.i686.rpm
51887cdeb2bbefe411f1b4eeac6f82ecd79a68c6cbb98d6b0185210fc63dd74a
libblkid-devel-2.32.1-46.el8.x86_64.rpm
84c31cb77d9b8f818c1f2afda1a968279e867068caaa73094724a302e29a2517
libfdisk-2.32.1-46.el8.i686.rpm
e45ac71b765a4a0cd8e4331101b45e38c12c2725f72e4c290879b25634154789
libfdisk-2.32.1-46.el8.x86_64.rpm
51c49caa2e0883e75247397b0276631726d2f258955851c1515258f671b1034c
libfdisk-devel-2.32.1-46.el8.i686.rpm
ea59252c3f9ec37508da1b62bf787e5d0a7ca3cebfe6286d82d7788a2925ec17
libfdisk-devel-2.32.1-46.el8.x86_64.rpm
8d4dc4fd5053eb44fcb9e872b47c707cfa0e86fab1f4c94a0f697d5a042aedcd
libmount-2.32.1-46.el8.i686.rpm
77d1717783a54188542a212f54b03b2cdc78ba8ead6eebe6151ea197b950d147
libmount-2.32.1-46.el8.x86_64.rpm
d3f306d59b7968aa8b8fa159199f1e29d60b99eb0a86c49ee167b93ac77600f2
libsmartcols-2.32.1-46.el8.i686.rpm
c9c3b16f970c9ac88347c5b7177c54e0449846291b0e929c34b6a470c81f94f1
libsmartcols-2.32.1-46.el8.x86_64.rpm
64f1e43bad14062a94e5e1af2d28bdb81e337979508f4fad8bc777810d5ba729
libsmartcols-devel-2.32.1-46.el8.i686.rpm
727179e32015b9821c6f6c33b9ae3664aff9f1fa617ad582252d6c6335ce97e2
libsmartcols-devel-2.32.1-46.el8.x86_64.rpm
d11a3f58ead814c8074612c69330b6484fc64e496b991d3ea43b2a8e87dd554d
libuuid-2.32.1-46.el8.i686.rpm
9366efd005635aedbd9d2f7f2d071a0955c9fd47b6cb9d68e5a6453f1b886eac
libuuid-2.32.1-46.el8.x86_64.rpm
fedff8f2bd5407be6a1f396f5ef7bf36c62f2fe38da085c7a9c9974de11c07b1
libuuid-devel-2.32.1-46.el8.i686.rpm
2b22793521a592d42aa2897c791a843143953c2b2c73559c46f95918bbe3b08c
libuuid-devel-2.32.1-46.el8.x86_64.rpm
c31661599faa25bc9aed4cf6b329585cc35367074b600dba2be73f4a6446b389
util-linux-2.32.1-46.el8.x86_64.rpm
2c255db3cfa7de0dea6dc1b631179abeb38b4bf060b0843cd0b418c1a0088310
util-linux-user-2.32.1-46.el8.x86_64.rpm
d66ec97d8af8f98063a1b159a68369f22f4b012a907fa818f0ec367113bd4f62
uuidd-2.32.1-46.el8.x86_64.rpm
1b6150a744b6975f954bb5df8555e1899e694ce5f89638db708f4c9df1a3de19
RLBA-2024:3222
hwdata bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for hwdata.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
hwdata-0.314-8.22.el8.noarch.rpm
08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69
hwdata-0.314-8.22.el8.noarch.rpm
08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69
RLBA-2024:3228
lvm2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
device-mapper-1.02.181-14.el8.x86_64.rpm
0871dec429c5f59ae80d06b9bc8699351fa9ad53d8c3fdd30339dfe9fe120bb8
device-mapper-event-1.02.181-14.el8.x86_64.rpm
45d18dae026670d99c8e42ec10b888c9ac03d92d84106bcfc7e5ecc664a3432b
device-mapper-event-libs-1.02.181-14.el8.i686.rpm
3827d2f8a2c98eb8bb6d2b0699d935a19fa409ee0cbb38edeb7c0405f99ae632
device-mapper-event-libs-1.02.181-14.el8.x86_64.rpm
bb8fb08cccbeee917c2e1c48e1e32aaaee87e91cee07661b1b670999d5e339af
device-mapper-libs-1.02.181-14.el8.i686.rpm
aa7be918c6958916e6d12d691af3a7a639608ec3ce686138917a9a9e246c053d
device-mapper-libs-1.02.181-14.el8.x86_64.rpm
85c926310abfaaff96d4f6537f5db573ca69e7a012d2b5138f362c15c4f81682
lvm2-2.03.14-14.el8.x86_64.rpm
68d9c86bf4df61198367a92ec5e6603605b022950dbf5b5b213fb826f9684150
lvm2-dbusd-2.03.14-14.el8.noarch.rpm
5ec527c8c70e517fb9de5210ecfd8f2f5b16b40fd6418fb34add3cc0082c8592
lvm2-dbusd-2.03.14-14.el8.noarch.rpm
5ec527c8c70e517fb9de5210ecfd8f2f5b16b40fd6418fb34add3cc0082c8592
lvm2-libs-2.03.14-14.el8.i686.rpm
e5f110c754f5ac412ae48dd87bdc5cc0ce728a6ab27752d3432fe996c92ee653
lvm2-libs-2.03.14-14.el8.x86_64.rpm
c758a7daa83c886f491004e258aa6d493d28178919d20d4491e9ddd9f13dac74
lvm2-lockd-2.03.14-14.el8.x86_64.rpm
5b79a8b69f491c77a035b379b20c07364e458b72d1ff23d8b8f041fa5b2e0932
RLBA-2024:3229
sanlock bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sanlock.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.
none-baseos-rpms
sanlock-lib-3.8.4-5.el8.i686.rpm
901a93d0c7444d07391703ea1c18b177c46a5127723e8c33a8a0add2c97396f7
sanlock-lib-3.8.4-5.el8.x86_64.rpm
5adfa6af7536f38f984df2e3e9bdda6ff4ed6c8de82d8b3fcdb9934ca9c6da71
RLSA-2024:4249
Low: c-ares security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for c-ares.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The c-ares C library defines asynchronous DNS (Domain Name System) requests and
provides name resolving API.
Security Fix(es):
* c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
c-ares-1.13.0-11.el8_10.i686.rpm
9bdb653df32693bcaf429512e50acd6e292c3608d1e5176dbfad6b93fff132f1
c-ares-1.13.0-11.el8_10.x86_64.rpm
a11e9586a2da1d5c5445a03a5a01fad00c3e3a554e8c1382d0e3e1921c158958
c-ares-devel-1.13.0-11.el8_10.i686.rpm
3966266f854ff5bab5f1db7329e50eed7f90e60f55e25a042dedf6454e16f299
c-ares-devel-1.13.0-11.el8_10.x86_64.rpm
9c825c09433612a8fa69083c5135b361e1f33a9936211e295060d6f3abf47bcf
RLBA-2024:4250
libtirpc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libtirpc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages.
Bug Fix(es):
* RPC servers binding to ports outside ip_local_port_range (JIRA:Rocky Linux-27005)
none-baseos-rpms
libtirpc-1.1.4-12.el8_10.i686.rpm
47b3c133efe49ea52a7651bbfa3cebfd0cc51ffb81706af5032dc4366f1e2a50
libtirpc-1.1.4-12.el8_10.x86_64.rpm
acae165746e9b5c426a44cc4871966bcc5cba46182e464c193a2e8d94e391f3b
libtirpc-devel-1.1.4-12.el8_10.i686.rpm
55e11882298ca86d760d444eff77780a190b9eba2e1ad6e52081c47d7e370a72
libtirpc-devel-1.1.4-12.el8_10.x86_64.rpm
b44991ba4215fed492b6ab0c514547c8501dd32dafeb406a555d18335803c203
RLBA-2024:4251
pam bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Bug Fix(es):
* [Rocky Linux8 0day] pam_faillock audit events duplicate uid (JIRA:Rocky Linux-28620)
none-baseos-rpms
pam-1.3.1-34.el8_10.i686.rpm
f132602ba2bd281b144b6d79b53e7db521bc541527dfc1765df34335cab426f6
pam-1.3.1-34.el8_10.x86_64.rpm
984deaeabf1fd7792f9480e76f7b42787c903d0754bfcf6512cbe3eeb549453b
pam-devel-1.3.1-34.el8_10.i686.rpm
6763a2015353774682ff8ff3648d33f2e532d156a80f9e616e759f2cd1020377
pam-devel-1.3.1-34.el8_10.x86_64.rpm
16f84be218dc49d2b48096636fab5bd6c2c437d0fa08ad53106f698f2f0f64cb
RLSA-2024:4252
Moderate: nghttp2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for nghttp2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C.
Security Fix(es):
* nghttp2: CONTINUATION frames DoS (CVE-2024-28182)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libnghttp2-1.33.0-6.el8_10.1.i686.rpm
725c2bdea0e176f24f11c047bf242051b506f1c51a3e95f83d61b7e8d8ee372b
libnghttp2-1.33.0-6.el8_10.1.x86_64.rpm
22a085238bf03470e2c9954df86e8954f6bbc8cef37b8f2f10aaad1b5a4071dd
RLBA-2024:4253
policycoreutils bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for policycoreutils.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The policycoreutils packages contain the core policy utilities required to manage a SELinux environment.
Bug Fix(es):
* Semanage fcontext command doesn't list contexts in order of processing in Rocky Linux8 (JIRA:Rocky Linux-24461)
* Semanage export does not distinguish between --modify and --add (JIRA:Rocky Linux-28167)
none-baseos-rpms
policycoreutils-2.9-26.el8_10.x86_64.rpm
6c3780f9d232b391a8ba8dd786ee96b2acf90cb66b4c9239d037e2b28d1c47c2
policycoreutils-dbus-2.9-26.el8_10.noarch.rpm
70fa16415e4f8cdea690ab77a68a820bc0408953543e19df5dbf32c688760c28
policycoreutils-dbus-2.9-26.el8_10.noarch.rpm
70fa16415e4f8cdea690ab77a68a820bc0408953543e19df5dbf32c688760c28
policycoreutils-devel-2.9-26.el8_10.i686.rpm
cd247e95e04c938b291ef93dc841a77322c3c00467bf06b78932234f3e794af2
policycoreutils-devel-2.9-26.el8_10.x86_64.rpm
ad8ef9680fe981a0283e8c2ea07e6db5a4e92f74e2e5138351b0dca9ffc05df6
policycoreutils-newrole-2.9-26.el8_10.x86_64.rpm
bda8615c0709c245961b4c4034711e097f529d5aa053da23d88a045daa0483cc
policycoreutils-python-utils-2.9-26.el8_10.noarch.rpm
577785eb952f28c76f6030da12f02d5d7baa50cb9f0b28ae9418fe631bab244f
policycoreutils-python-utils-2.9-26.el8_10.noarch.rpm
577785eb952f28c76f6030da12f02d5d7baa50cb9f0b28ae9418fe631bab244f
policycoreutils-restorecond-2.9-26.el8_10.x86_64.rpm
cc8153c08ac3d485a402f9eb729c7fd6df4d1e8761b9fd83604e70d07b6c8134
python3-policycoreutils-2.9-26.el8_10.noarch.rpm
308d52bb26f2ee3993cd0b8c766351b9ff7d7609d9e873fb531e4e6197f6bba6
python3-policycoreutils-2.9-26.el8_10.noarch.rpm
308d52bb26f2ee3993cd0b8c766351b9ff7d7609d9e873fb531e4e6197f6bba6
RLBA-2024:4254
kmod-redhat-oracleasm bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kmod-redhat-oracleasm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Bug Fix(es):
* crash in asmfs_svc_query_handle from accessing freed asm_disk_info struct (Rocky Linux-30468)
none-baseos-rpms
kmod-redhat-oracleasm-2.0.8-18.1.el8_10.x86_64.rpm
5d6a8e50fbec05b2a7c134befca021ad60dc9a7d3bfbf3adbdabd06163b7d7f5
RLBA-2024:4255
systemd update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux,
compatible with the SysV and LSB init scripts. It provides aggressive
parallelism capabilities, uses socket and D-Bus activation for starting
services, offers on-demand starting of daemons, and keeps track of processes
using Linux cgroups. In addition, it supports snapshotting and restoring of the
system state, maintains mount and automount points, and implements an elaborate
transactional dependency-based service control logic. It can also work as a
drop-in replacement for sysvinit.
Bug Fix(es):
* Nautilus does not observe umask when creating files (Rocky Linux-28048)
* systemd CI fixes [rhel-8.10.z] (Rocky Linux-32494)
none-baseos-rpms
systemd-239-82.el8_10.1.i686.rpm
1c33810d717a9f6f42f288ffafd64637a742d27d385fba571cabcbef126afefa
systemd-239-82.el8_10.1.x86_64.rpm
0d7db476a01a19077f42aaaf27b4918491b79038c2a757638b272c71b6236822
systemd-container-239-82.el8_10.1.i686.rpm
4d5b5a994b55c49255874f464b247a197acb8a056ce29d929e40830616a2d706
systemd-container-239-82.el8_10.1.x86_64.rpm
1fdf7c48df2eb6de41e5901343c5de54b1873ac52f057952344d34c051dd79fb
systemd-devel-239-82.el8_10.1.i686.rpm
8365e3c73915268f2248adc945026a075178eecce372e9ca3f71c1a5f531f57d
systemd-devel-239-82.el8_10.1.x86_64.rpm
dc51b3a23a4373e419327349848b0604e8e4675023845281aadfd54d0027c337
systemd-journal-remote-239-82.el8_10.1.x86_64.rpm
3f4cd7ed0cb8c4d9f84e7f96ae8f943e62c2c7696001b80a28b5ec12490f5d8c
systemd-libs-239-82.el8_10.1.i686.rpm
6d56ce08415f222536869be0aa3ecf7f55e2f44ce5a25790cdca20802b40ae2f
systemd-libs-239-82.el8_10.1.x86_64.rpm
e785bb1e70ed43c1fafee4084a8281f3987d8cb8ccbb60613179d5ba1cf6a0c8
systemd-pam-239-82.el8_10.1.x86_64.rpm
4ef5a0cef95e632f61d6807bc2524d4c31af596dce1962da26e5adc17e9962c9
systemd-tests-239-82.el8_10.1.x86_64.rpm
cf91b0c3ae28c320db022cfff7118f912b66a27fdeef1d7d310ea8bfcf126393
systemd-udev-239-82.el8_10.1.x86_64.rpm
bef983e68c29553beafadb4c1854a689bb88ea5848701ba2bb94aa1b7d877b6f
RLSA-2024:4256
Important: less security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for less.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors.
Security Fix(es):
* less: OS command injection (CVE-2024-32487)
* less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
less-530-3.el8_10.x86_64.rpm
2f847e766214535e598d71765a153f0e83dafbb30a2b2ad6146e6fdb4077c835
RLSA-2024:4259
Moderate: xmlrpc-c security and bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* expat: parsing large tokens can trigger a denial of service (CVE-2023-52425)
none-baseos-rpms
xmlrpc-c-1.51.0-9.el8_10.i686.rpm
d933c9eb9c28f729b304492199484212fecb5194c8557accabda56e3b0ab6643
xmlrpc-c-1.51.0-9.el8_10.x86_64.rpm
fa38fba5539e344a1eb92704d624bd0918265fae51f2d9bcc140a3fc493c1a47
xmlrpc-c-client-1.51.0-9.el8_10.i686.rpm
acf51de71b9c84463d045f6ee1cddd3a19d92892ec9e8f5667947ee4b555f3c2
xmlrpc-c-client-1.51.0-9.el8_10.x86_64.rpm
1133bbd11b37c38ada2c9c62ec4d39279c3fa76eac3e14220a8187f6570d828d
RLSA-2024:4260
Moderate: python-idna security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-idna.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The hsakmt packages include a thunk library for AMD's Heterogeneous System Architecture (HSA) Linux kernel driver (amdkfd).
Security Fix(es):
* python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() (CVE-2024-3651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-idna-2.5-7.el8_10.noarch.rpm
92163b2acbc3d543483bc824d4fedc60aa1cf11114659ae5042a40bd03348262
python3-idna-2.5-7.el8_10.noarch.rpm
92163b2acbc3d543483bc824d4fedc60aa1cf11114659ae5042a40bd03348262
RLBA-2024:4261
samba bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* [RFE] idmap_ad : add option to request only POSIX groups from AD [rhel-8.10.z] (JIRA:Rocky Linux-33813)
none-baseos-rpms
ctdb-4.19.4-4.el8_10.x86_64.rpm
fe2fd211db59308f58b4b255e590f858b5f050116458e9f9cdea1643d61055e7
libnetapi-4.19.4-4.el8_10.i686.rpm
59c99b8d2169a325cf5a30a3dc352577d7b0cad8949dd6937687c0c7ec73261a
libnetapi-4.19.4-4.el8_10.x86_64.rpm
8e44b18d3f70f682eed51b4c8c335d049440922be66d28d2d69fc428ab7e188b
libsmbclient-4.19.4-4.el8_10.i686.rpm
7da36f1a43557ce6ed72253e959b1243563fc3c144a1ac69c9b210642e27b78a
libsmbclient-4.19.4-4.el8_10.x86_64.rpm
bea937b55d447c97fedd3b33f6d719b138b8f1735f9928b9fe5c1c99afd1e55f
libwbclient-4.19.4-4.el8_10.i686.rpm
ab95da828d4dee1e3dd910f36ba0053d91345511e184648d595176dd44443386
libwbclient-4.19.4-4.el8_10.x86_64.rpm
d255c3bd65d99061f76843b533e8743652708c32db679612363f120ce1c51c5b
python3-samba-4.19.4-4.el8_10.i686.rpm
fc799450724e19ee8e9f63f2af57c46e5cfd3f199e16b8580930205c674df6aa
python3-samba-4.19.4-4.el8_10.x86_64.rpm
72e99cb87fc31a04f570666b2d7481044036921ccb52b725e733225d7a0a5436
python3-samba-dc-4.19.4-4.el8_10.x86_64.rpm
a497e29adf067635968abc01c59dffb80313f3771fb6d032306733a64ead7d2e
python3-samba-test-4.19.4-4.el8_10.x86_64.rpm
374b953e54901fcc709b341f382f4358a9f04cc98872f8aff4fddc1ee244c7eb
samba-4.19.4-4.el8_10.x86_64.rpm
6e1b2fae1e083f0c3ec065464536799c30b890a3b95d6f44a5be5eb817402a86
samba-client-4.19.4-4.el8_10.x86_64.rpm
14bdc9724b34dcec465a61ccc9a7b548f23438cae78d32fc6dd327442b6329c4
samba-client-libs-4.19.4-4.el8_10.i686.rpm
cdd6de46c44d4f6a6a347b8136b1323c1d1f9ee8432466963255d0d6b72d5632
samba-client-libs-4.19.4-4.el8_10.x86_64.rpm
cdd04eb94c0c0c8bece194a3187bf88be84a05400b918e12b09b9657ef4d030f
samba-common-4.19.4-4.el8_10.noarch.rpm
74ab5c85a5cba13b670a8dc678dbd38c410e878e47901a497b4fbe2497afe4da
samba-common-4.19.4-4.el8_10.noarch.rpm
74ab5c85a5cba13b670a8dc678dbd38c410e878e47901a497b4fbe2497afe4da
samba-common-libs-4.19.4-4.el8_10.i686.rpm
097be4faf8983a5243518ef48e50d077f79ec547567dbb7b8bd923582b9c1c72
samba-common-libs-4.19.4-4.el8_10.x86_64.rpm
458e66228c2fd8c914bbffabb46a6f6883143a58dc18af6e988629ddab80a02e
samba-common-tools-4.19.4-4.el8_10.x86_64.rpm
d7728f276ed9b9b11917489c2f0b6b770e6e06220978c55be2c0815f0ecd0f9e
samba-dcerpc-4.19.4-4.el8_10.x86_64.rpm
50087a48e56d668775873bc457ad56e8ac24f323a5f3cd45ba5b0dea9fcde030
samba-dc-libs-4.19.4-4.el8_10.i686.rpm
9f3e4bcb552a3b35056de24fe9e7b45256e7cbe7c2411a48c0a4665dc4b3c874
samba-dc-libs-4.19.4-4.el8_10.x86_64.rpm
d91bafecc7d53e42e0d42a1d62d45426121f92616a7807ce63ac0734e324f65e
samba-krb5-printing-4.19.4-4.el8_10.x86_64.rpm
fe35864f3bb8dd00034cef1648bd5896fae2391638b452d7ad712e59b4387158
samba-ldb-ldap-modules-4.19.4-4.el8_10.x86_64.rpm
61aaea26b0b90005a0b956fdf0fd90ec861bde3a2f4207d0ecad8d31194acf24
samba-libs-4.19.4-4.el8_10.i686.rpm
2497caeef43f123a37b8ad810605092291611f954a97387299dc228c26b50638
samba-libs-4.19.4-4.el8_10.x86_64.rpm
c832cd0892d9a70175bc8df4cb9d28030b3d8a55a408c534c882c170a948cc4b
samba-pidl-4.19.4-4.el8_10.noarch.rpm
2b33ec58e9dc3430cf1a737d86d7c7de0bf48a2ae3bee0239e602a5a993cd013
samba-pidl-4.19.4-4.el8_10.noarch.rpm
2b33ec58e9dc3430cf1a737d86d7c7de0bf48a2ae3bee0239e602a5a993cd013
samba-test-4.19.4-4.el8_10.x86_64.rpm
a40142834a554fcc245bfa8f29125928e2f66ea99ce8071982430e0ea824c1dd
samba-test-libs-4.19.4-4.el8_10.x86_64.rpm
4b44406bd9d9749b29a124adeb3650ed701cc980de87ded5217892255c8cc83f
samba-tools-4.19.4-4.el8_10.x86_64.rpm
929f1ae1a1c6c7f7bc0220d4c055f9f4880b2cded2e265e66d6861157bce71a1
samba-usershares-4.19.4-4.el8_10.x86_64.rpm
1f6ee1fb6aaa4caf5357a14da02c23019571f3918e64e05101926dc75da043b4
samba-winbind-4.19.4-4.el8_10.x86_64.rpm
f9d2ac5bcf01107643d1a3730ee8dca00b1f6652bfe418182cb5d6de65fb1bc0
samba-winbind-clients-4.19.4-4.el8_10.x86_64.rpm
c8557bb78777568e29c2b0fce0ecefc52970c8d35de84d0ad998c90b6ce168c6
samba-winbind-krb5-locator-4.19.4-4.el8_10.x86_64.rpm
fbf7319ae70ac960821db4f77ee34af2ab2f529603978afcdb8192b25d9c4407
samba-winbind-modules-4.19.4-4.el8_10.i686.rpm
8591588b4ce4f88a900ef950f4e7997144cdfaeedc746d9610c93a9a8522f1b0
samba-winbind-modules-4.19.4-4.el8_10.x86_64.rpm
bd5228006b5fe9886d6ed07facaa4ac8462c18af59910e405557e369af7bf10c
samba-winexe-4.19.4-4.el8_10.x86_64.rpm
bd4c9ba414cee628a54377b0478aae735996f264d301157c35376243d3f069a1
RLSA-2024:4262
Moderate: linux-firmware security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* kernel: Reserved fields in guest message responses may not be zero initialized (CVE-2023-31346)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
iwl1000-firmware-39.31.5.1-122.el8_10.1.noarch.rpm
f5540d798e420578f47295790023468cfa231ac7a1482210568b62371263efa0
iwl1000-firmware-39.31.5.1-122.el8_10.1.noarch.rpm
f5540d798e420578f47295790023468cfa231ac7a1482210568b62371263efa0
iwl100-firmware-39.31.5.1-122.el8_10.1.noarch.rpm
bf61a337f67337e420fe98b7a24622899a957d44065ff230da3420d78ccf9a1a
iwl100-firmware-39.31.5.1-122.el8_10.1.noarch.rpm
bf61a337f67337e420fe98b7a24622899a957d44065ff230da3420d78ccf9a1a
iwl105-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
cc075f290cc1f08ec60f77aba5c69e6a10f735a1d267f30721320fd4c0277b34
iwl105-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
cc075f290cc1f08ec60f77aba5c69e6a10f735a1d267f30721320fd4c0277b34
iwl135-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
fca85c1113a8ad6b2fe73fac6952ede51b265bbf6ecb899726ca232f5988e0dc
iwl135-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
fca85c1113a8ad6b2fe73fac6952ede51b265bbf6ecb899726ca232f5988e0dc
iwl2000-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
39f5b49b74b3a3c03e15f2e72b7953e592f7f4de0338eb0812fae204da2f689d
iwl2000-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
39f5b49b74b3a3c03e15f2e72b7953e592f7f4de0338eb0812fae204da2f689d
iwl2030-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
db2852c1efd96f3333dedfa87ed44324ceff2a7e7a6afc8565df320b664024c0
iwl2030-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
db2852c1efd96f3333dedfa87ed44324ceff2a7e7a6afc8565df320b664024c0
iwl3160-firmware-25.30.13.0-122.el8_10.1.noarch.rpm
15f96638b4077b874e083b7556dfed5f4dcd4ea42ebd086defbce7725c1bde1a
iwl3160-firmware-25.30.13.0-122.el8_10.1.noarch.rpm
15f96638b4077b874e083b7556dfed5f4dcd4ea42ebd086defbce7725c1bde1a
iwl3945-firmware-15.32.2.9-122.el8_10.1.noarch.rpm
d6bc5669a1a8015ff0caeee6c29f45532cafe3545fedb12da104e4d966fd2732
iwl3945-firmware-15.32.2.9-122.el8_10.1.noarch.rpm
d6bc5669a1a8015ff0caeee6c29f45532cafe3545fedb12da104e4d966fd2732
iwl4965-firmware-228.61.2.24-122.el8_10.1.noarch.rpm
a00d5b209317fd60cd5f92928806108888ee2b5629ca395f8f4e6f9b70cb390a
iwl4965-firmware-228.61.2.24-122.el8_10.1.noarch.rpm
a00d5b209317fd60cd5f92928806108888ee2b5629ca395f8f4e6f9b70cb390a
iwl5000-firmware-8.83.5.1_1-122.el8_10.1.noarch.rpm
6744b2c347cfc0d0a9e749c6f06d59ec31de76bfe10162ac1d9ad2749be34d9d
iwl5000-firmware-8.83.5.1_1-122.el8_10.1.noarch.rpm
6744b2c347cfc0d0a9e749c6f06d59ec31de76bfe10162ac1d9ad2749be34d9d
iwl5150-firmware-8.24.2.2-122.el8_10.1.noarch.rpm
c600b76163d2a82a1cf06fecce4f0f933c91daf91a12fde2a185f9faa238fe41
iwl5150-firmware-8.24.2.2-122.el8_10.1.noarch.rpm
c600b76163d2a82a1cf06fecce4f0f933c91daf91a12fde2a185f9faa238fe41
iwl6000-firmware-9.221.4.1-122.el8_10.1.noarch.rpm
abea97f96527fde4453157330c1e0cafbf7751d1f0eb92691701a998527e749c
iwl6000-firmware-9.221.4.1-122.el8_10.1.noarch.rpm
abea97f96527fde4453157330c1e0cafbf7751d1f0eb92691701a998527e749c
iwl6000g2a-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
3241d41a4dcb44e953335fd97241072058363ab30dd45349610c10e5a3789dcc
iwl6000g2a-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
3241d41a4dcb44e953335fd97241072058363ab30dd45349610c10e5a3789dcc
iwl6000g2b-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
5275c69e023389e0493bbb07907454180a606769ba5a1b5650340c9411a44f26
iwl6000g2b-firmware-18.168.6.1-122.el8_10.1.noarch.rpm
5275c69e023389e0493bbb07907454180a606769ba5a1b5650340c9411a44f26
iwl6050-firmware-41.28.5.1-122.el8_10.1.noarch.rpm
4faf31fd7e1c1ffee20a4ef6df4c576a1cc389ff79d3444e08fccfef53a63694
iwl6050-firmware-41.28.5.1-122.el8_10.1.noarch.rpm
4faf31fd7e1c1ffee20a4ef6df4c576a1cc389ff79d3444e08fccfef53a63694
iwl7260-firmware-25.30.13.0-122.el8_10.1.noarch.rpm
4f36938f1030739f4f468898ad65782751c7dd61f61f1c7ecff08462e7b8c9b3
iwl7260-firmware-25.30.13.0-122.el8_10.1.noarch.rpm
4f36938f1030739f4f468898ad65782751c7dd61f61f1c7ecff08462e7b8c9b3
libertas-sd8686-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
ed6a1e73a46c37c8c203668de808e7cac25de4b5bece14e6b94a967f3417946b
libertas-sd8686-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
ed6a1e73a46c37c8c203668de808e7cac25de4b5bece14e6b94a967f3417946b
libertas-sd8787-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
5fe04df06f0c6851ee15915e96830f61372587f578dcd08f359e09b9b2a036da
libertas-sd8787-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
5fe04df06f0c6851ee15915e96830f61372587f578dcd08f359e09b9b2a036da
libertas-usb8388-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
5e37c810fd631c891a48fef337ef64e9a7a6b37845f9919363061f66c459d0bc
libertas-usb8388-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
5e37c810fd631c891a48fef337ef64e9a7a6b37845f9919363061f66c459d0bc
libertas-usb8388-olpc-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
7a4d9717fe13d4845ae354d3c51bd5fb060f7b040533468ecbd4bd0615ed49c2
libertas-usb8388-olpc-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
7a4d9717fe13d4845ae354d3c51bd5fb060f7b040533468ecbd4bd0615ed49c2
linux-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
2b0c8e8902c5591f7a2b61c6ab935d9b7e43cfa19c98273ac6b8ecc9dfe33aa3
linux-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm
2b0c8e8902c5591f7a2b61c6ab935d9b7e43cfa19c98273ac6b8ecc9dfe33aa3
RLBA-2024:4263
krb5 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Bug Fix(es):
* Backport of defcred leak in krb5 gss_inquire_cred() to Rocky Linux 8 [rhel-8.10] (JIRA:Rocky Linux-32258)
none-baseos-rpms
krb5-devel-1.18.2-28.el8_10.i686.rpm
e1bf1a6ff30d0164953a810852fd4e6608af7407fd1ffc52a81eb0b62769efe2
krb5-devel-1.18.2-28.el8_10.x86_64.rpm
7455238087b95bfc546f47c2811f001c68244b9c58bc5fc8240f812639e7dafa
krb5-libs-1.18.2-28.el8_10.i686.rpm
97dac4afbe48c608ad0dfc81e4ab5c381f2dd98b6f196e5c3ac10d39e5a55b6d
krb5-libs-1.18.2-28.el8_10.x86_64.rpm
6adea904e0b4536d00938d3c4ef39024b8a4d7391a4c48754c53e6a42ddb1b50
krb5-pkinit-1.18.2-28.el8_10.i686.rpm
a9d09199b3bebd532f77733f39c87b1266ccffdc01e500d78c0caf786de50431
krb5-pkinit-1.18.2-28.el8_10.x86_64.rpm
6d722272de408a61cdc05f4de34771d24447abc92d98933f0c89aa22eea8d3c9
krb5-server-1.18.2-28.el8_10.i686.rpm
fd460d39148497b0f8f59aa008038163b6813fce2d95b691b191647cb270a96d
krb5-server-1.18.2-28.el8_10.x86_64.rpm
833f86898b13ad0f98e4fc287d1f916ea20c1436692bf0cbfd5e6ab76f36c34f
krb5-server-ldap-1.18.2-28.el8_10.i686.rpm
cfbcf31a922afd0a589f6671d4886d97983cfb1936fe2bbac04507bac5e308c5
krb5-server-ldap-1.18.2-28.el8_10.x86_64.rpm
a411860f7001251e6b12aee1591193917627dc25824a8ba7440cfc76b53b470d
krb5-workstation-1.18.2-28.el8_10.x86_64.rpm
18c18e9e2632a518016a013be03a786cb5bedbf37fe6014236565af31aad0170
libkadm5-1.18.2-28.el8_10.i686.rpm
a74e20027c415e636c47747f211deb756bbd204aa2e2a46187d18419c288ae1a
libkadm5-1.18.2-28.el8_10.x86_64.rpm
b312aa2c2283d1bc79bfec26de519bf7d94c688d8ebad3a4b3d1440bfe77bbd7
RLSA-2024:4264
Low: openldap security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for openldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network.
Security Fix(es):
* openldap: null pointer dereference in ber_memalloc_x function (CVE-2023-2953)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openldap-2.4.46-19.el8_10.i686.rpm
49778302b3a10feea8c5f2bd3f31d4aa4ce61721bfaa499d794fe898692162e2
openldap-2.4.46-19.el8_10.x86_64.rpm
315da0fac9a7cbbec8c259fccd766fe692fd38f997b7534710e0b3740090abe6
openldap-clients-2.4.46-19.el8_10.x86_64.rpm
78c5d90e5677804499c78471b274c50fe0ed1c8482a28c55c2a6fbbc1fdb29a4
openldap-devel-2.4.46-19.el8_10.i686.rpm
56f42e5a2cf23e60062931b858cb2f77d71370f0eee60e91219fc5ebc310ecc2
openldap-devel-2.4.46-19.el8_10.x86_64.rpm
0c16d1d4de8943e78dbb93c87211d1074681b896fd62f5d2b284dbe1f21fd4c4
RLSA-2024:4265
Moderate: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Cupsd Listen arbitrary chmod 0140777 (CVE-2024-35235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
cups-libs-2.2.6-60.el8_10.i686.rpm
4776ec7fd43299a2d56c7ac92ee8b31981809d77180d8d0df47c99f73338e56d
cups-libs-2.2.6-60.el8_10.x86_64.rpm
b06965e44191074bb79b6aa5fe4e2b0bab9dac927ed05e574196e25fc0eba738
RLBA-2024:4266
kexec-tools bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kexec-tools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel.
Bug Fix(es):
* [Rocky Linux-8]mkdumprd fails to generate kdump initrd when /etc/kdump.conf contains "core_collector makedumpfile" without options. [rhel-8.10.z] (JIRA:Rocky Linux-38358)
none-baseos-rpms
kexec-tools-2.0.26-14.el8_10.1.x86_64.rpm
49e7685e37ee80101bc381e7d90582debe0ef8797a1fd755a9d65d944c1754fc
RLBA-2024:5307
sssd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Bug Fix(es):
* SSSD fails to process AD groups with 'Global Scope' correctly causing incomplete group-membership on Rocky Linux if cache is empty [rhel-8.10.z] (JIRA:Rocky Linux-33957)
none-baseos-rpms
libipa_hbac-2.9.4-4.el8_10.i686.rpm
74609574f1310ecaac6dc5115f29257d5d576f45388d057256739cc602cbfa33
libipa_hbac-2.9.4-4.el8_10.x86_64.rpm
bf0d65cd22a5e0cb32af72c5f1e74901d5d2b5283f8629da67013b91e59ec480
libsss_autofs-2.9.4-4.el8_10.x86_64.rpm
72a9faeb2ae84cbb9ed1da816087807b551fdd0fe76caf6ccf58daff3c1c8c80
libsss_certmap-2.9.4-4.el8_10.i686.rpm
bd2e7e286211158d65dedc1fd3ccb005abe16e5f12939af1f177dad027666878
libsss_certmap-2.9.4-4.el8_10.x86_64.rpm
3d54a732f5ea8e5230ecf88eb8940c6b994f54441d1e377b7601dbf5745ba57a
libsss_idmap-2.9.4-4.el8_10.i686.rpm
16d03d5f2fb206fd688c2acb3d331ce7e8af619ac7b7ccff99773655b8a4d6b4
libsss_idmap-2.9.4-4.el8_10.x86_64.rpm
45129783b0a402dbb50636af3ee1f7ef71017c631251865966223bfc2a826258
libsss_nss_idmap-2.9.4-4.el8_10.i686.rpm
44cc04469f5deab9e9e060f625db65e18993f41b3b55ba303344a0989d8e9020
libsss_nss_idmap-2.9.4-4.el8_10.x86_64.rpm
5e90303b6d7e2455073b7a79260784ac5d92b7ebf4ed878590357555def4ee4c
libsss_simpleifp-2.9.4-4.el8_10.i686.rpm
a5029abb32abafb67207ec26ce5c6e3de81df7308c132f3258f1e316f3f8aa59
libsss_simpleifp-2.9.4-4.el8_10.x86_64.rpm
75c15f93a5662583596ae464e6a012349b6a1af35c35d804c458a56ffd5131d9
libsss_sudo-2.9.4-4.el8_10.x86_64.rpm
18390ac2acf46b4fe6cbae04c06e23b13ad469e67b3f3d3edd6969a94b1a64f9
python3-libipa_hbac-2.9.4-4.el8_10.x86_64.rpm
3c6c991760b7135d38bfafc84d9d968d22218d76cadc09d71955bf380e4029ba
python3-libsss_nss_idmap-2.9.4-4.el8_10.x86_64.rpm
52e97fa94417ecb1a93b1d0aaf9f47bb9ea48abb1f29e48e7ccd9be5a99ba27f
python3-sss-2.9.4-4.el8_10.x86_64.rpm
69ccfc952fbf6472ed93a70e73247a5ed1aead0338186ddae55ec65a58f6cb3d
python3-sssdconfig-2.9.4-4.el8_10.noarch.rpm
1615fa38bc777ecb903a35dcb0542e43707487a146a402bd7b87a40585838f53
python3-sssdconfig-2.9.4-4.el8_10.noarch.rpm
1615fa38bc777ecb903a35dcb0542e43707487a146a402bd7b87a40585838f53
python3-sss-murmur-2.9.4-4.el8_10.x86_64.rpm
931a92d5922ab3c57a19248df516c1030d5b38fa4eb8fd2068c92fdf167f8155
sssd-2.9.4-4.el8_10.x86_64.rpm
85fd486b02d894322236b59be0452252f4e8c0890a6c6010f48ba81c3e9d8b4b
sssd-ad-2.9.4-4.el8_10.x86_64.rpm
9810019ac23172c327483741902e77487d3a3312346902225362da6de6323581
sssd-client-2.9.4-4.el8_10.i686.rpm
e3a7125a51141287bc5cf245cc2a604329ee5933a0b7cd4586c7649c3702a0d6
sssd-client-2.9.4-4.el8_10.x86_64.rpm
77d9231369cc6a3ad7ca352ef7f11c19cd2f878244a3aeb5a9e1ddf6db068131
sssd-common-2.9.4-4.el8_10.x86_64.rpm
ea01e0eb0c2bc149502effa0ea165a4e9aa9740bb7282236a92506ade89806de
sssd-common-pac-2.9.4-4.el8_10.x86_64.rpm
3888dd8a8907355a6efbd5b4fe9fcab49ab33a9fb1826fd54520988e72d5ad2a
sssd-dbus-2.9.4-4.el8_10.x86_64.rpm
6188839e83abb42ee4924b11253572d03fa7bb78f0822eb0d7e44b103a1e8a42
sssd-ipa-2.9.4-4.el8_10.x86_64.rpm
fcab68c0d11c17c651763412ff055521efedc43ca716a57d0f2649159ba3b8ca
sssd-kcm-2.9.4-4.el8_10.x86_64.rpm
426f8c1b3ba5de4569973f50336a08397f663ad45721353e6259393e7ffb1c5d
sssd-krb5-2.9.4-4.el8_10.x86_64.rpm
dcae77a93214f93abb321df526cd35e43b4b8c7ba4728a1c51ddc79b69cc9515
sssd-krb5-common-2.9.4-4.el8_10.x86_64.rpm
aaef020d95ac3e8d4491bcaccf32fa37f8e4f5e7e8a98dcb55acd249fe6432da
sssd-ldap-2.9.4-4.el8_10.x86_64.rpm
dfe7aacf70098b234b50deb125ea138f300eeea1714699863b60d9f714f87d9c
sssd-nfs-idmap-2.9.4-4.el8_10.x86_64.rpm
2819c5c6cbdbd1a4908346cf31524bc45ef0cc0d30ad7bd208a0bbc67119c3c6
sssd-polkit-rules-2.9.4-4.el8_10.x86_64.rpm
4353d33a2a8a27f04972478e642e9ec78d40bdc4c45233021b7f70a11fc6dc04
sssd-proxy-2.9.4-4.el8_10.x86_64.rpm
62ff3ff2d6f13d666f163fa84f6bf30870f5be3814f1141e8ecbc591699c0f11
sssd-tools-2.9.4-4.el8_10.x86_64.rpm
1ff592216eac785acd4a911cd82d8efd4e67efe7c6325bc399e5766a677fd68d
sssd-winbind-idmap-2.9.4-4.el8_10.x86_64.rpm
b176c0d0f5d9291e11e66a68ca82559f10e22e634ff7771747c3c25b2d820bb2
RLBA-2024:5310
openssh bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Bug Fix(es):
* ssh with multiplexing can fail to connect to remote system when connection just timed out (JIRA:Rocky Linux-37743)
none-baseos-rpms
openssh-8.0p1-25.el8_10.x86_64.rpm
d3ac975b3982ae3cd7a20fc962545ead897d3f24bbd071b33e031c77ce770268
openssh-cavs-8.0p1-25.el8_10.x86_64.rpm
2f9ccf32fe5a2d7c8a186979216d0cb0c36b3f18ef9e8bdf0c0aedfd10eabcd5
openssh-clients-8.0p1-25.el8_10.x86_64.rpm
4719cb480fc6734bf0c69b6d403db5cda09aa6e33b199417b104162b17250597
openssh-keycat-8.0p1-25.el8_10.x86_64.rpm
a1bcd91eebfb523d48b14a8195b7072cfb81946b0a3f7cea0c8270674ed6f549
openssh-ldap-8.0p1-25.el8_10.x86_64.rpm
6145da61e9a9cd36141f5164aee9dbefee4fcea51bd68987e1c8cfe2892a0a86
openssh-server-8.0p1-25.el8_10.x86_64.rpm
dee13bc7131124c265546ffb4a01a3737a09dfcc20adc2f06ae062d96d9e9a4b
pam_ssh_agent_auth-0.10.3-7.25.el8_10.x86_64.rpm
689e17d9fcbf16a7d0d1b741586c28ee559e4d322b1bff55fd45815ad060844b
RLBA-2024:5311
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface.
Bug Fix(es):
* regression: undefined service causes firewalld load failure in Rocky Linux8.5 (JIRA:Rocky Linux-5790)
Enhancement(s):
* Add nftables icmptypes mld*-listener-* types to firewalld (JIRA:Rocky Linux-13252)
* [RFE] firewalld feat: add support for rich language using ipset in destination (JIRA:Rocky Linux-29875)
* RFE: firewall-cmd should be able to deal with nft-rules with "burst" (JIRA:Rocky Linux-9316)
none-baseos-rpms
firewalld-0.9.11-8.el8_10.noarch.rpm
5a85ce615eaa8c1586c7fdf6dfab364e4f2accee4b11a6587b628a32c2cbe83a
firewalld-0.9.11-8.el8_10.noarch.rpm
5a85ce615eaa8c1586c7fdf6dfab364e4f2accee4b11a6587b628a32c2cbe83a
firewalld-filesystem-0.9.11-8.el8_10.noarch.rpm
04c8257f7998a5fcdc0e7da8a5327432253af258fd6f7d9e0068feb1a5d39d3f
firewalld-filesystem-0.9.11-8.el8_10.noarch.rpm
04c8257f7998a5fcdc0e7da8a5327432253af258fd6f7d9e0068feb1a5d39d3f
python3-firewall-0.9.11-8.el8_10.noarch.rpm
baa8b24656a50c1992c50bf0796033b88215232106723a975acadd9dfefebc2e
python3-firewall-0.9.11-8.el8_10.noarch.rpm
baa8b24656a50c1992c50bf0796033b88215232106723a975acadd9dfefebc2e
RLSA-2024:5309
Moderate: python-urllib3 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-urllib3.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
* urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-urllib3-1.24.2-8.el8_10.noarch.rpm
497e7da6a1ee90dfdcddc99daa96565936fd2c6b99f503b8fa7eca822c14ab5f
python3-urllib3-1.24.2-8.el8_10.noarch.rpm
497e7da6a1ee90dfdcddc99daa96565936fd2c6b99f503b8fa7eca822c14ab5f
RLBA-2024:5308
libdnf bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libdnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A Library providing simplified C and Python API to libsolv.
Bug Fix(es):
* error: Cannot create repo temporary directory "/tmp/libdnf.3fecxz": Permission denied [rhel-8.10.z] (JIRA:Rocky Linux-43231)
none-baseos-rpms
libdnf-0.63.0-20.el8_10.i686.rpm
c5862db63fb6361a6848a2f5c26a286c0c3c08cbaea148d9598fbc2b5281c817
libdnf-0.63.0-20.el8_10.x86_64.rpm
2691f5760e361303baf64151ebf82002fcf9e367cec1b2893912a5ecaa749bb8
python3-hawkey-0.63.0-20.el8_10.x86_64.rpm
ac3c34f8019e33f9d553e04276f519acf7089c13b7740beadba3c8b33d5c4e13
python3-libdnf-0.63.0-20.el8_10.x86_64.rpm
88ede2457c9119797420b983b0c7dff0b9547a078acbf76c309d7fe8eb09792b
RLSA-2024:5312
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: GSS message token handling (CVE-2024-37371)
* krb5: GSS message token handling (CVE-2024-37370)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
krb5-devel-1.18.2-29.el8_10.i686.rpm
b3588ea1c6a3df43992fd1e6d89a0c11aca2508d41109c3f38f3205bd695e850
krb5-devel-1.18.2-29.el8_10.x86_64.rpm
953a56a5fcdd50c035642ec8edc426bcbc869c312565d33c60aa9448aa46d3fd
krb5-libs-1.18.2-29.el8_10.i686.rpm
109e3e4b209e2fd8102ef9626ff54a305b134df654277904f95d41e2b4c07cb9
krb5-libs-1.18.2-29.el8_10.x86_64.rpm
5161ecc9061351ca2692abf63c4d2e106bb8484b3aefee66d8bf0c5074e39a4e
krb5-pkinit-1.18.2-29.el8_10.i686.rpm
3c7872b32a88d825460c8490d7a34cdf8453199c7fdb96d41df5bc60383885de
krb5-pkinit-1.18.2-29.el8_10.x86_64.rpm
5955f43d6ea3936216554e55a715f2a99e5fc9802d12fa497237e9005213d429
krb5-server-1.18.2-29.el8_10.i686.rpm
c4d61699ac54de15439e9a53096c0a4d84c7a9ac33dd75861053af201df2a1b8
krb5-server-1.18.2-29.el8_10.x86_64.rpm
e6a923e76aec470258e839e94666e458050b36c83e7c32ce4b5d5591ddc6c130
krb5-server-ldap-1.18.2-29.el8_10.i686.rpm
ecb86b01adc13d7e9f881d822e7b71bbf6af7db61daa8b0badaf8e3ae9d15b8e
krb5-server-ldap-1.18.2-29.el8_10.x86_64.rpm
f8daa5f6a7851e0c119130bfc0673be3bbbd21632e515911ae6e9c322a50678e
krb5-workstation-1.18.2-29.el8_10.x86_64.rpm
6b755b7f28e1d9260d4cd47af49dd5cf94cad2f8cc39c6386fb50ea2aeea010a
libkadm5-1.18.2-29.el8_10.i686.rpm
7ac3ad041dbb538eae80f6c8c3b72b081f31fa0983ca0288a2adf8fbbb46618c
libkadm5-1.18.2-29.el8_10.x86_64.rpm
f600b3774452b61bb594d9a1e04b67318863515493f89a8cc803c34eb1cd0ea5
RLSA-2024:5524
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam (CVE-2024-1737)
* bind9: bind: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bind-export-devel-9.11.36-16.el8_10.2.i686.rpm
f21dcca6eac6e7d9ba34fe7a4d79cfae0100a8ce3fb9936c812353d9b8c5e140
bind-export-devel-9.11.36-16.el8_10.2.x86_64.rpm
04dc584f1e7a3d5d0b33318659abcd19f785b2ed7a2f507f836837e5dd3762f2
bind-export-libs-9.11.36-16.el8_10.2.i686.rpm
6c3b509531c306e06cf25958dd6aac1c51cfad205ded4a0a46dffbe8dc905934
bind-export-libs-9.11.36-16.el8_10.2.x86_64.rpm
094120a7962241bfa30618f87565ed3fb3e9760d4ef402599893e71d00932a9d
RLSA-2024:5654
Moderate: curl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for curl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: HTTP/2 push headers memory-leak (CVE-2024-2398)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
curl-7.61.1-34.el8_10.2.x86_64.rpm
6c54e8e3847ec7b3283c3baf09737e78749baea42f022a854b6f03e1e6c3d73d
libcurl-7.61.1-34.el8_10.2.i686.rpm
065417c07482e34c3d118ff8d81efae00b83133a63250a6f92b79874bb651c15
libcurl-7.61.1-34.el8_10.2.x86_64.rpm
b28a768709973cfcc5bd9861a1a7768f421dcfb96d6fe634f129eab7b6df38b9
libcurl-devel-7.61.1-34.el8_10.2.i686.rpm
40952173682d666dc871198fb3a47257eb76f1633cbf1fb863a73fdd7343925a
libcurl-devel-7.61.1-34.el8_10.2.x86_64.rpm
2174393b61d940e43461f48ace0381cfb82171764ec4316061fe17db73029549
libcurl-minimal-7.61.1-34.el8_10.2.i686.rpm
9d9ed74288a4cf79b6c0f24d7fe653ffa8cf296d1e3e3a63583d25caef5ecf9b
libcurl-minimal-7.61.1-34.el8_10.2.x86_64.rpm
cd9f01d72776f71cf42848bcbbbf7607df3bdac8f552be47c6964fad826825e9
RLBA-2024:5736
ca-certificates bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for ca-certificates.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI).
Bug Fix(es) and Enhancement(s):
* Annual 2024 ca-certificates update version 2.69 from NSS 3.101.1 for Firefox 128 [rhel-8.10] (JIRA:Rocky Linux-44949)
* ca-certificates: python-certifi: Removal of e-Tugra root certificate [rhel-8.10.0.z] (JIRA:Rocky Linux-16194)
none-baseos-rpms
ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch.rpm
439054192070117cbd18855897f977b7e660338ec686fa112721129ba4b3282b
ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch.rpm
439054192070117cbd18855897f977b7e660338ec686fa112721129ba4b3282b
RLBA-2024:5834
glibc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Bug Fix(es):
* glibc: Add workaround for certain dynamic TLS usage in interposed malloc [rhel-8.10.z] (JIRA:Rocky Linux-39994)
* glibc: Fix ulp related test failures on x86-64 EPYC Rome (JIRA:Rocky Linux-52428)
none-baseos-rpms
glibc-2.28-251.el8_10.4.i686.rpm
2d2c475bc13e141d405974060b86281919a8b5bbb654b30b6ed7ab428267ec05
glibc-2.28-251.el8_10.4.x86_64.rpm
2ca98462509cdcb9641ce67c5e8a6b44f54221dabfa79aac18c689ed8edf0e8e
glibc-all-langpacks-2.28-251.el8_10.4.x86_64.rpm
1cb7950bb34755c46b77bfeb14e0c10edc6063320ba49d960f98a7ac5d6654ff
glibc-common-2.28-251.el8_10.4.x86_64.rpm
c2155a8788fdd8c6817cce2cac6a6d605e0a1ebf5aa4ca1e47fef6f85cbc113c
glibc-devel-2.28-251.el8_10.4.i686.rpm
89514612af2e9515bfccf1b7820e98b7046ed73fc766b639c2330159a1cac1a3
glibc-devel-2.28-251.el8_10.4.x86_64.rpm
9613787d9a12f41e54667ef9b606d73b2b4f93c3c11230bcb105c58e642e7f79
glibc-doc-2.28-251.el8_10.4.noarch.rpm
788456842d9b1c52385707c335966ff416dc965bc675509a70d32ddd8df761da
glibc-doc-2.28-251.el8_10.4.noarch.rpm
788456842d9b1c52385707c335966ff416dc965bc675509a70d32ddd8df761da
glibc-gconv-extra-2.28-251.el8_10.4.i686.rpm
5bea39269fa66c6e48b8ba77c017e6ab5a084afab057472fb604b99befc15bbd
glibc-gconv-extra-2.28-251.el8_10.4.x86_64.rpm
2b0f2d94ac8c97cae4a805c12ca62a862987bb3d27c20dea4d16ae49516414ba
glibc-headers-2.28-251.el8_10.4.i686.rpm
eb97b62b12ea1568f11b5bbb403424a0eb43bf86a0fefe4a22aa6984e77b54eb
glibc-headers-2.28-251.el8_10.4.x86_64.rpm
9fd21708198cc06591aba758ec1cca3e6ee77c29388123e81245f53e929303c8
glibc-langpack-aa-2.28-251.el8_10.4.x86_64.rpm
e6b938c2151780876742ae909fa6f842fae0d52144534db1adb8493ad0a544a6
glibc-langpack-af-2.28-251.el8_10.4.x86_64.rpm
71c9369dcc859c9fc8434b910741a57c0d762a65ab29eafd1047976bae0e5fb2
glibc-langpack-agr-2.28-251.el8_10.4.x86_64.rpm
df29692232ca7bbbcfc9631d7b1ad9f6ced463a7b9fab71a88ad51bf70e2ffcd
glibc-langpack-ak-2.28-251.el8_10.4.x86_64.rpm
3ef612990fb32f61c7243fe4c28146eb78ceac2250fefd603e0913b5d6eb1e5f
glibc-langpack-am-2.28-251.el8_10.4.x86_64.rpm
0769b6659b1d9ae8e266ce53884de1b194008ad2181f1b7e300dbdf0196a5586
glibc-langpack-an-2.28-251.el8_10.4.x86_64.rpm
1a1c62d9805b17b30e480668753dcf144c1dc5057c905cb20e518e8602413df7
glibc-langpack-anp-2.28-251.el8_10.4.x86_64.rpm
7520b8913c7e12a52de596c8c56120ca4c61a32de4fc932bb4b80b4bdd76e2c8
glibc-langpack-ar-2.28-251.el8_10.4.x86_64.rpm
12d84542d1d4d338c7f9d88f4a135997a95b52242b627da110fb88037026dfce
glibc-langpack-as-2.28-251.el8_10.4.x86_64.rpm
970041bbe16003a735b9f438ab6da39c1b0e4af27ac3992037669f9e8b44e532
glibc-langpack-ast-2.28-251.el8_10.4.x86_64.rpm
926a7a6d85ca6ef4d7dd8925f4fe8d18043f653f2d21338772ce239520997a7f
glibc-langpack-ayc-2.28-251.el8_10.4.x86_64.rpm
687e52cbdbda65382ff369c0de6727be2fc6f91cc0a5208670a10bbec0534aa6
glibc-langpack-az-2.28-251.el8_10.4.x86_64.rpm
9bbe33422c297e5188253cdf54ac61465946f54d7c0201b554508fdffd74878d
glibc-langpack-be-2.28-251.el8_10.4.x86_64.rpm
b21cd87de00e81adbb8a9cccbed378398c4060970fe39fd03be4637f67483b90
glibc-langpack-bem-2.28-251.el8_10.4.x86_64.rpm
b3371b631065e86b139e2676255df5e883aa911c16c07daae678e487d7a1333d
glibc-langpack-ber-2.28-251.el8_10.4.x86_64.rpm
b993b0436227ec232ad1f1cdccbb2eece6919b61150e67b0232ecb73d66ddebf
glibc-langpack-bg-2.28-251.el8_10.4.x86_64.rpm
cdf55c870a826b6230f86fe57879b5eaab87b55776b0ee786944a1b057e63eab
glibc-langpack-bhb-2.28-251.el8_10.4.x86_64.rpm
f37fc0746b10a24295dab6bc41334afccf09e1ca522d084794b6496e1301267c
glibc-langpack-bho-2.28-251.el8_10.4.x86_64.rpm
3ff804727f7ff1099e1cd5a1f12cd4cf6a3125d34f482628740126889854f557
glibc-langpack-bi-2.28-251.el8_10.4.x86_64.rpm
fd5dd19856652bacd0985dafee09a7c44792d0620a2136ee3c6e1e4e7dc9cfaa
glibc-langpack-bn-2.28-251.el8_10.4.x86_64.rpm
ad7c7d0dfd0ccd9620264287bbacd5431229fa830b948a1392d91098acf2b76c
glibc-langpack-bo-2.28-251.el8_10.4.x86_64.rpm
1a2b741dcbea0b0665c4ccd835461f1d4ab5d01669916fee9176f8e76b717bac
glibc-langpack-br-2.28-251.el8_10.4.x86_64.rpm
3e4202c95722585799e9a600cb7bf0d177ca098e64f7bf628b05c5764be7fd57
glibc-langpack-brx-2.28-251.el8_10.4.x86_64.rpm
239632cf3d9509fa78687408ec65acf24d526de91a3d9be2420c307b73de847a
glibc-langpack-bs-2.28-251.el8_10.4.x86_64.rpm
12d9f6beca1d949a8bfa586f69488e18f7e34e5fe090e03490c69808404e4016
glibc-langpack-byn-2.28-251.el8_10.4.x86_64.rpm
ca391b5ef79735d4e42d51c70c2a8db886c5bf292314c141614199a44f937383
glibc-langpack-ca-2.28-251.el8_10.4.x86_64.rpm
ec42feca705cdfc8ce2d86017aede00b07997f568a77f35ddc626fb5134205f4
glibc-langpack-ce-2.28-251.el8_10.4.x86_64.rpm
70c7b71055ce236c0f680c2abbf3b154e3284675b1cf0137229b7370a3b3861f
glibc-langpack-chr-2.28-251.el8_10.4.x86_64.rpm
00551700463add5fb5f8a225347d7e344075b6a101984d8c6ec62f820f6429d5
glibc-langpack-cmn-2.28-251.el8_10.4.x86_64.rpm
369d86dca7a5f7a10d39e181b1da2964f71cd92a633ba6942d80bfed51136585
glibc-langpack-crh-2.28-251.el8_10.4.x86_64.rpm
db1305dce5db8605d04bdeb936c563c236a8bb2895b8635d2362eaedc5219592
glibc-langpack-cs-2.28-251.el8_10.4.x86_64.rpm
aa1d08b44a6ea83e745b1ffa927ed83e085aa1d9575512d793f05405dbba5181
glibc-langpack-csb-2.28-251.el8_10.4.x86_64.rpm
22158fbad465047aa790f86d1c0e032ce1a90f00dfa053a42b7627a4c188f38e
glibc-langpack-cv-2.28-251.el8_10.4.x86_64.rpm
11fc6b7ccd5cb747a59de60983e29f701b4ccfee236e4ae0b3d73b5a4d2a01dc
glibc-langpack-cy-2.28-251.el8_10.4.x86_64.rpm
671a360fc65203c8359241d10de7bff682084add05f16445be95603225245711
glibc-langpack-da-2.28-251.el8_10.4.x86_64.rpm
345114af72180b79535a6bfd9f6cc322c243c8366bc93c93b9f790aece1e6997
glibc-langpack-de-2.28-251.el8_10.4.x86_64.rpm
6976007bc50e44da6509463a3427d6203e2d00ed6253a099af3365809ec1dc2e
glibc-langpack-doi-2.28-251.el8_10.4.x86_64.rpm
cb88fd910e556e78744997ddbf541195526d936ef33afe1130c0ffb8b7c15dba
glibc-langpack-dsb-2.28-251.el8_10.4.x86_64.rpm
14542c26e59107d758f8c3f952b9c61b66652aa03a548d4108ccad5b02a2c422
glibc-langpack-dv-2.28-251.el8_10.4.x86_64.rpm
68000a6463eb747a47cb99c494bf7fe2c788b04d861dbf3be4cb575d5c87b91c
glibc-langpack-dz-2.28-251.el8_10.4.x86_64.rpm
5071eeebc693166818287a2babc358d5ca1d147f23710d894ed6ca658e3b2b5a
glibc-langpack-el-2.28-251.el8_10.4.x86_64.rpm
d9576c219d50cdd6d6175506f9b85760f37218a5362b39521fd7c9a5fe361759
glibc-langpack-en-2.28-251.el8_10.4.x86_64.rpm
1fc1c91da81f70e7b0768926a6acf88aaa7db2a870259989ce0b67b23593f9ee
glibc-langpack-eo-2.28-251.el8_10.4.x86_64.rpm
22fa682b3f18703ec4da6cac76223cc06065a376c6ce328b5945e300ce304bd2
glibc-langpack-es-2.28-251.el8_10.4.x86_64.rpm
c5cc9d54217ca485b1279d494985f9d7261a6e34b21a1b69891306de2e5243d5
glibc-langpack-et-2.28-251.el8_10.4.x86_64.rpm
046ffc394a41ed7a3389b6b75b25f0644fd9d1a43ded0b7d7df86c42445b55a7
glibc-langpack-eu-2.28-251.el8_10.4.x86_64.rpm
342fb0e9f898afd015d4d4769a1d6ced2109c41cbaa9b3f8c379acfc3f3824cc
glibc-langpack-fa-2.28-251.el8_10.4.x86_64.rpm
6bb595a43d3b834f3b80e2c3f3ef1f26f0ee10fdb87bb71a3d74deace2c053e7
glibc-langpack-ff-2.28-251.el8_10.4.x86_64.rpm
57407210debcc35dee91307ac3cde704c08c247039366939244103e52dcd15fe
glibc-langpack-fi-2.28-251.el8_10.4.x86_64.rpm
160f8c11ab448d5b9d777d6663b0d8f8e284fa1dacce78780ee171db1956e1bf
glibc-langpack-fil-2.28-251.el8_10.4.x86_64.rpm
5cd192c775528c03ce7d7c08a61359b49cff27d886677f9d6713126105439bf3
glibc-langpack-fo-2.28-251.el8_10.4.x86_64.rpm
8f46ae6acee1430b254b02f15746820f7b4c70d51c6cb4d90dd5d3fb82899bdb
glibc-langpack-fr-2.28-251.el8_10.4.x86_64.rpm
5e5f33db5ba3d72cc2119de5da2a8c6aa4a0ef1dd5ddaef8081ab45e4b5bd6e0
glibc-langpack-fur-2.28-251.el8_10.4.x86_64.rpm
8713ee1555b920b35dcedc45bd8420d6fae2983fcd9fffe7548772497c407c6a
glibc-langpack-fy-2.28-251.el8_10.4.x86_64.rpm
c0ec94cc953763727ba3d9030e4dd582d8a3109eaf46a79849225fa1e1aa76f9
glibc-langpack-ga-2.28-251.el8_10.4.x86_64.rpm
3b641655eb32f5dcfd1a5ba9019e94c9afa07636552232a6a1a763d3eecb729d
glibc-langpack-gd-2.28-251.el8_10.4.x86_64.rpm
73931b9cefb82235e0f4d6265ccca0b296ec23b7c86148e9fa643dcef8a4e340
glibc-langpack-gez-2.28-251.el8_10.4.x86_64.rpm
5ec701a62c9aed8e0049be2c3c189fd13c35a41b971d0f4d77734b76e680e618
glibc-langpack-gl-2.28-251.el8_10.4.x86_64.rpm
bbaa0048d098b89d46447c89812e1119f83f88238a079df2961bb4bbae4ca9fe
glibc-langpack-gu-2.28-251.el8_10.4.x86_64.rpm
3899b348c583c6ef10ea31317c274d99fca957e04c1943f6b58c1cdfe9765ce9
glibc-langpack-gv-2.28-251.el8_10.4.x86_64.rpm
ed7a621cf7410561c663b5fd68e9de606b585406dbfe69e8efe1725241d06e42
glibc-langpack-ha-2.28-251.el8_10.4.x86_64.rpm
8bb20b52349a9945544cd07e7894b42893599caece316cb432be1fd9315e014b
glibc-langpack-hak-2.28-251.el8_10.4.x86_64.rpm
fba80d9e10d381d5139c209f0841c94da6b091ad6c346d50d745d2c84e99d5e3
glibc-langpack-he-2.28-251.el8_10.4.x86_64.rpm
63ba3d72dc916a891fc298282f2959adcf0a5a17d937f89577d1bfdd9aba25ca
glibc-langpack-hi-2.28-251.el8_10.4.x86_64.rpm
c00b68b90bfa2f4b247d0b4247c6a92ceeb620427a0e25a60d3f0395e0261234
glibc-langpack-hif-2.28-251.el8_10.4.x86_64.rpm
ea6b28b5f3ba48a5e473285eae1429e28e9ad7fab8d7ef4d678a7687e51fd49b
glibc-langpack-hne-2.28-251.el8_10.4.x86_64.rpm
e39839437b0a4a8a162b8784365977c5be9478dc1cfbf740ee1de3f831fafd3b
glibc-langpack-hr-2.28-251.el8_10.4.x86_64.rpm
fa5d375b594100c10f743f1222d6dda5742fa435fe6bd3a0a206593f86704b49
glibc-langpack-hsb-2.28-251.el8_10.4.x86_64.rpm
5719b2141f1534c65178e3253bba91c5ff418bdfc533950aa1e6783e1876b6a4
glibc-langpack-ht-2.28-251.el8_10.4.x86_64.rpm
57ccfb6b20fc87d027689a2adffbb91745824acdb643c8594d146e9ffd598773
glibc-langpack-hu-2.28-251.el8_10.4.x86_64.rpm
545f24e0dbacd06e891e0f46f905a5b43cb6da475bba468cb474bd5b5cf0ce2c
glibc-langpack-hy-2.28-251.el8_10.4.x86_64.rpm
4f5b5102669e3b07c7e3667bb3e0850ed05455e269e4b000a43acd0e9be43a1c
glibc-langpack-ia-2.28-251.el8_10.4.x86_64.rpm
35d64fadbc61276aee65e78d85d5d31a1b56d666bf34f11e619e57a327c67d5a
glibc-langpack-id-2.28-251.el8_10.4.x86_64.rpm
0f53eb5ca11dbfe9d84fbf6cac3b40694d4b39d5f0448a0eac352ef328d4249c
glibc-langpack-ig-2.28-251.el8_10.4.x86_64.rpm
81fc07639899cebd5bf4de72cca6394b183d6e4e368c7d2065238c30aef1b6af
glibc-langpack-ik-2.28-251.el8_10.4.x86_64.rpm
5b07ec9fc276b6d79543da566e2a700b6b84277d3e199769bf65e2907d89beea
glibc-langpack-is-2.28-251.el8_10.4.x86_64.rpm
1a72156136d3a8ed707951210880340dd87ab82ad2bb357b69fc1fa8728e0786
glibc-langpack-it-2.28-251.el8_10.4.x86_64.rpm
37ce7c34d9f6f68d588b4f022dcee38dff14318dba18aa7974b4b7a93217654c
glibc-langpack-iu-2.28-251.el8_10.4.x86_64.rpm
d8b210c2b012d26ac6be4834c491a7c4dba369cfc31d6e65dca332c10bda0846
glibc-langpack-ja-2.28-251.el8_10.4.x86_64.rpm
17a92e5043a5ef9676da5848f2650a57e9b204fe7095b3ab9c04f79e286f584e
glibc-langpack-ka-2.28-251.el8_10.4.x86_64.rpm
5aae72316c47da4d3dab0330e01e770f47ceed43bcf697dd3e9b107df276f52e
glibc-langpack-kab-2.28-251.el8_10.4.x86_64.rpm
0e34b2e7f95db631589b62127736c19f4a45b1ceb5284aeb9444f6f254e29992
glibc-langpack-kk-2.28-251.el8_10.4.x86_64.rpm
fdf36d686cc26c4add00e942c3928427ea8439c37120162a3770505a0f137e8b
glibc-langpack-kl-2.28-251.el8_10.4.x86_64.rpm
7da39e079f2cd2dcd8fe028359b2e08408f6de1ee251d14d329c9397069d47c8
glibc-langpack-km-2.28-251.el8_10.4.x86_64.rpm
06cbebfab5ba1bc77983962cf3e42af8d6ba7cfd364c7728a7c1dbbd408e0ce8
glibc-langpack-kn-2.28-251.el8_10.4.x86_64.rpm
1317c203b152e4c768e6e7e9fe4b709d7e6c19eaab178cfa4206f43b95b4d55e
glibc-langpack-ko-2.28-251.el8_10.4.x86_64.rpm
dcbffe2ec035efea0edbc0f875e50688eba4372b95e5423d10ca759594eb0878
glibc-langpack-kok-2.28-251.el8_10.4.x86_64.rpm
72b7b1239d92c1ea4467807bac8410cf63621f5d989f32bfa843e339903b1732
glibc-langpack-ks-2.28-251.el8_10.4.x86_64.rpm
8bbbf71047b6503fbf6ebb5d01b16540734215f2b1234d9745ad9a17a99a7ede
glibc-langpack-ku-2.28-251.el8_10.4.x86_64.rpm
e31688e84c2cb3125ca02b5ab5401cce7ebf35fe9881a96f6e4c4b2032735fb4
glibc-langpack-kw-2.28-251.el8_10.4.x86_64.rpm
250cd751ef570108260719c9d5d25923daeb375072dde9063f79b96d7151d5bf
glibc-langpack-ky-2.28-251.el8_10.4.x86_64.rpm
349b66e46298e9cc36c753ea7ead18f968a1f3343940203d3605d65e65c12c4c
glibc-langpack-lb-2.28-251.el8_10.4.x86_64.rpm
b5e2ff4bd6bc3b97174a0072f1847806cf1f5046bd681a1d1b865d7d8c242b6c
glibc-langpack-lg-2.28-251.el8_10.4.x86_64.rpm
dd0127d2b9bb4f582f627a9f04cff6046b3ab3fa536114d784c774b608a3d286
glibc-langpack-li-2.28-251.el8_10.4.x86_64.rpm
78063a3c0338e32a83ff36c25a69f1941f79291418c1946bd66109cec007a70e
glibc-langpack-lij-2.28-251.el8_10.4.x86_64.rpm
84c37faf44b5c5b18f5f73f3b8806323f4d6afbf157cd1e98c288033bcb21c20
glibc-langpack-ln-2.28-251.el8_10.4.x86_64.rpm
13d653f59cdc350a3b33d298eff1f2f33c97f63612048f2bdfa6d8c8e993dbf2
glibc-langpack-lo-2.28-251.el8_10.4.x86_64.rpm
92630420432c5eb201b474d8747501f1eced94a0e07a6025346415f1838d1211
glibc-langpack-lt-2.28-251.el8_10.4.x86_64.rpm
4300e7f6dce9732bd9918313f514e864dbdf4cf37e4e4a02533bf6d9dc4814e2
glibc-langpack-lv-2.28-251.el8_10.4.x86_64.rpm
31bb65a029ec44bac3979858929a3fafe7ab30bc2de85df1b441a5012ad3842d
glibc-langpack-lzh-2.28-251.el8_10.4.x86_64.rpm
44c79589e71a757f716ea497ac016abf9dcb791a7fed7d484b39b8a9b960d0cd
glibc-langpack-mag-2.28-251.el8_10.4.x86_64.rpm
c6b2bd8012b23bc5792cf764853a03e73ba801424cf6e2a31444440200f8b5f3
glibc-langpack-mai-2.28-251.el8_10.4.x86_64.rpm
8a6a768aa744728add42465fb704415f4fd9364fea8a97a48833b65ca106e5fb
glibc-langpack-mfe-2.28-251.el8_10.4.x86_64.rpm
b8de18e75abc8119548fd46c535738d78d6fb5d8403b6235e6668eda40f0d7bc
glibc-langpack-mg-2.28-251.el8_10.4.x86_64.rpm
60bb8314ae8f8c172eec0831cde15029213e25605f6f849490bc53c10db0476a
glibc-langpack-mhr-2.28-251.el8_10.4.x86_64.rpm
e7d119bd02a4a3f2d37a32d678a7387376f1900524abc2921751cde96f2ad4bd
glibc-langpack-mi-2.28-251.el8_10.4.x86_64.rpm
373b12544efa2a7c79fc103cc8a1d0198fe7b6be3acf1de3e31d91a5565315a5
glibc-langpack-miq-2.28-251.el8_10.4.x86_64.rpm
4658b3c9d90ae8a5f324f84dc7b523ae85c29476a1f2b4318f6e7cd9665b23c4
glibc-langpack-mjw-2.28-251.el8_10.4.x86_64.rpm
33a05ae7f682153aadf3b8cdb9a10a4195028ed7ccf6a0c71869c5546a554af3
glibc-langpack-mk-2.28-251.el8_10.4.x86_64.rpm
983c5aa3bfa1f85fd33d87106a882176e76fe426ba7728e83eff1ebbaa956c8f
glibc-langpack-ml-2.28-251.el8_10.4.x86_64.rpm
89f1695bf62c140bb82f32a3fb5bd2f5f7dfc2eefaecdb28489f20bffa01d074
glibc-langpack-mn-2.28-251.el8_10.4.x86_64.rpm
417da960c2395a1797f273ca36b0adf28370b8e9f5e55aa7b47329d4a2447c15
glibc-langpack-mni-2.28-251.el8_10.4.x86_64.rpm
36d2adbd6e5a751aafc3d62838c935deb87daa17a4db2be4a9016c3a22c97f18
glibc-langpack-mr-2.28-251.el8_10.4.x86_64.rpm
df133b098b1a8a9fb81036f2a31cb7dbbc29b5796979b8ba9ffe041086a98808
glibc-langpack-ms-2.28-251.el8_10.4.x86_64.rpm
c5cbdce392f31f599a7360120b7454711488b17a9ad18d86852a6db8318a4756
glibc-langpack-mt-2.28-251.el8_10.4.x86_64.rpm
46742025b4fd365bf87177f43e180b4c888e8a4c5f3b3fed16d63be88627df52
glibc-langpack-my-2.28-251.el8_10.4.x86_64.rpm
a148981cbd37fa95ce24fc529e1e9c56f69673210fcf0d0be6896e57ae0f4467
glibc-langpack-nan-2.28-251.el8_10.4.x86_64.rpm
b70c8785af50e8a4ec98d1ed45e1e108f74757b633dfe57d04c418496340bd19
glibc-langpack-nb-2.28-251.el8_10.4.x86_64.rpm
b1e5d9084fbd84341664e0431d865b9766115a25cddfed0990733ea269fa6cdf
glibc-langpack-nds-2.28-251.el8_10.4.x86_64.rpm
6e37878377b78933a749b515dd82feeab24c00c73a22af4bbabd0448d9448749
glibc-langpack-ne-2.28-251.el8_10.4.x86_64.rpm
faed84b323ac78f8d7b1ff160feca7f67a614eb8185cdc87bbf157e4d0b98513
glibc-langpack-nhn-2.28-251.el8_10.4.x86_64.rpm
9c10a1028879a5f1e9e59fe06270672c017db40275ebed08a84ca88e87220644
glibc-langpack-niu-2.28-251.el8_10.4.x86_64.rpm
c2603293856087ddc24c7ce918552319147aa2ec2244db2c09337b74a63cd311
glibc-langpack-nl-2.28-251.el8_10.4.x86_64.rpm
10a121a2992f888cc71a08738c75542eaece1bedf209261691aa27335b7a77ae
glibc-langpack-nn-2.28-251.el8_10.4.x86_64.rpm
48b8e36b6a352e90d61281b1dd6cd8034dd356f92e3404ae7dd8209bf48eea9e
glibc-langpack-nr-2.28-251.el8_10.4.x86_64.rpm
9aec206524acb2b76525eb27cfe795cfd911733f7d4179d5438dd8a446ea23c9
glibc-langpack-nso-2.28-251.el8_10.4.x86_64.rpm
214562def91fdb0c37f10aae646798da4bc94838406d5be970535514625cc0b0
glibc-langpack-oc-2.28-251.el8_10.4.x86_64.rpm
1c839d826576ba86ffe5637183c6c3498f06835ee1a086d6394d4303241f06f3
glibc-langpack-om-2.28-251.el8_10.4.x86_64.rpm
64839432f611baeace8a9ea8157a6b6df75942dd8ed998011e6d82063d726cf5
glibc-langpack-or-2.28-251.el8_10.4.x86_64.rpm
9255748e73ecc0b5070a9713c278372046e02cdb73ad03947149b4d504f1cac9
glibc-langpack-os-2.28-251.el8_10.4.x86_64.rpm
9e72ec3c1d3c494cd22a530182c95b741a755e77107b44540d49fd4beaa3ea15
glibc-langpack-pa-2.28-251.el8_10.4.x86_64.rpm
880467c2e1e27960a046b0aae6c3adc90e9a721c55790a083a26077b26dca1e4
glibc-langpack-pap-2.28-251.el8_10.4.x86_64.rpm
b920005a831c33334f173ac6d2d3a5404cd19fdf8c9e4e9823660482f796fe24
glibc-langpack-pl-2.28-251.el8_10.4.x86_64.rpm
3feb421cb8146efe464342b0007392be58b4d177ebd28d85339dcdb894225c51
glibc-langpack-ps-2.28-251.el8_10.4.x86_64.rpm
05d8a0ea3a061d56029251cb970ef10e5edf10962a8ff4c90b3fecf78911eb88
glibc-langpack-pt-2.28-251.el8_10.4.x86_64.rpm
5f231ecf36bf63735fa3a864d8738d855e3b15b10328cc422761b0136091f255
glibc-langpack-quz-2.28-251.el8_10.4.x86_64.rpm
98ccd18d1c6e9f54846b3a46b64b34337dee61be92a60c596f95ee79f796301a
glibc-langpack-raj-2.28-251.el8_10.4.x86_64.rpm
d36a6ca0ae338c342e346409711a08ea77742ee1dcf3ad95997fdc535ad5357a
glibc-langpack-ro-2.28-251.el8_10.4.x86_64.rpm
765ed0d7a332496aecc404220c37b7298cbba55fd856d4ceea17ffc26e45bb5e
glibc-langpack-ru-2.28-251.el8_10.4.x86_64.rpm
3ed25be57a9d4520492f9f86e28430014c79f9900c481d245b920d7abca74864
glibc-langpack-rw-2.28-251.el8_10.4.x86_64.rpm
8905ca751f9aad1a1892458a14ab775c0d737f432cfce898b79c35c0ba9ea37d
glibc-langpack-sa-2.28-251.el8_10.4.x86_64.rpm
93979d2e85cfb5d7dfba5267f48a272d459ba79bdf141edadf7ace5e7c1caae0
glibc-langpack-sah-2.28-251.el8_10.4.x86_64.rpm
aa852305797bd05ec82d592c329b4e8780070997778caff44ed84d84107fe4c4
glibc-langpack-sat-2.28-251.el8_10.4.x86_64.rpm
c0a5d4495cea6658199dfc55c2c73f3c72ca30d7c079880d559990eec23dd0f4
glibc-langpack-sc-2.28-251.el8_10.4.x86_64.rpm
842763776556b61475776296faab2a8b9f8cb7abb4dcfc68d43f3bc43ef8b9b5
glibc-langpack-sd-2.28-251.el8_10.4.x86_64.rpm
08990c7a2c1a160627594ebfee666ff1622a731e3b4123c352b7926d5f8a3fc7
glibc-langpack-se-2.28-251.el8_10.4.x86_64.rpm
a1c29808b5657ac828cbd260895fd5c413ba834f9adb6af0d7cad959587678fe
glibc-langpack-sgs-2.28-251.el8_10.4.x86_64.rpm
4d9c773d36eff00c04617c54cf77ad496749979388b832e593b3c1f0f63cf995
glibc-langpack-shn-2.28-251.el8_10.4.x86_64.rpm
614d60d0bef65bbf491304c0bc2de4957625174cbea23d5b351975ae71d487ce
glibc-langpack-shs-2.28-251.el8_10.4.x86_64.rpm
655455bfedd3fc5013b9b9779db31841ed3e2a37c7ca5946cd1be54d79b6a058
glibc-langpack-si-2.28-251.el8_10.4.x86_64.rpm
bd1d64f33a4186f431592f97de1b9c4317db65fd7957edb73922ed257549abd1
glibc-langpack-sid-2.28-251.el8_10.4.x86_64.rpm
e19b94d8bab0450302e39d763369b506b28f61679dcfc4fe1fa333777960ab6a
glibc-langpack-sk-2.28-251.el8_10.4.x86_64.rpm
7cb4db1e6e349cc02071753115277cd88c5535f4dacd2ed96c8d0de752f4d6fd
glibc-langpack-sl-2.28-251.el8_10.4.x86_64.rpm
5e41a785395f626b19bdce8f0de712f7ec7a116c3669f627bc899f75df6466b4
glibc-langpack-sm-2.28-251.el8_10.4.x86_64.rpm
cb29be79ff4322ced93080546f83218ecc1d879f44a13e6a71688bb990d5e9ad
glibc-langpack-so-2.28-251.el8_10.4.x86_64.rpm
a4d5df9e301c31f28a12f7c48d0f5961c2194e419a08e65257d6d0f3c6be45d1
glibc-langpack-sq-2.28-251.el8_10.4.x86_64.rpm
c7b855b713be9017182f0f6e69efaddb3b8178ebac5d0c24d80b9b84abe4bc1c
glibc-langpack-sr-2.28-251.el8_10.4.x86_64.rpm
b172f5a996ad8402d2d90ab343ea1b3bdf4700b806f2ab8b477547de04f3aa47
glibc-langpack-ss-2.28-251.el8_10.4.x86_64.rpm
3b2fbf9b9bdfeab52fe0720f66e007ba2609b05dc30f40a19792b5f20b920838
glibc-langpack-st-2.28-251.el8_10.4.x86_64.rpm
bdc2a65ab832ede92b2b866df6617bef469bc3adc99ba6c741d89ea030b37de3
glibc-langpack-sv-2.28-251.el8_10.4.x86_64.rpm
d16762e3a6449505a646ca4259b323e050d2115cb88fe270805978700aa83310
glibc-langpack-sw-2.28-251.el8_10.4.x86_64.rpm
edfd437d462b5c0c1fc90972ee8e1d81fd645a794c716a36732d83bc7e9a1efa
glibc-langpack-szl-2.28-251.el8_10.4.x86_64.rpm
16c385eb110f003407dcade7934231e1531e279e0f8102eee6171e60efaa243e
glibc-langpack-ta-2.28-251.el8_10.4.x86_64.rpm
f21280e910cd24b0f8d4dcce2695adc795b1dc13c132dd39c929514e996d1fa4
glibc-langpack-tcy-2.28-251.el8_10.4.x86_64.rpm
4694b31eb396fc381f86d3c0726b4bd3221b0727a928fc59fa87a17ed2a5e646
glibc-langpack-te-2.28-251.el8_10.4.x86_64.rpm
b1da62ba21ce7955a6cdc7ac9f68bd060a9840ff017ebe3681fe72e700f7438b
glibc-langpack-tg-2.28-251.el8_10.4.x86_64.rpm
4640054b32df6bfe7d45dacc18ae77e6b1178b3745cce19f7a91ce0df6ba19c5
glibc-langpack-th-2.28-251.el8_10.4.x86_64.rpm
fd78d9456b7e78bb0a938d382c59d44fae5c3c09f13c1b75a0546cf32e94abda
glibc-langpack-the-2.28-251.el8_10.4.x86_64.rpm
de36f1230a3a75e777d35e22ece9a0913828ea4903fdac6afa82f299b5111667
glibc-langpack-ti-2.28-251.el8_10.4.x86_64.rpm
67be7ec59bfb96b47e3503af9d14cf43eb14b1f1051a30b77b9e15284fbeccf0
glibc-langpack-tig-2.28-251.el8_10.4.x86_64.rpm
11f28034ac9d9974d1c84252c4658a997a29e049ee6875e28ea819919a744c34
glibc-langpack-tk-2.28-251.el8_10.4.x86_64.rpm
0659226479653d44a219109d815d9a9a1895a62970796b0ee62238a4d1802066
glibc-langpack-tl-2.28-251.el8_10.4.x86_64.rpm
a67fae8e23a64e21df0ad99b6d1b95a840b395e6c91f44ec6be801a29c072ebb
glibc-langpack-tn-2.28-251.el8_10.4.x86_64.rpm
c04e9cf032f7e824246c4796d7a8074b62713a23b0619b74c4346524330d128c
glibc-langpack-to-2.28-251.el8_10.4.x86_64.rpm
4c6b74ab99726d81abcd5cbd11ecf97131afe249329d6bd5b191859b60c7a7a9
glibc-langpack-tpi-2.28-251.el8_10.4.x86_64.rpm
03facdfc94dadc9be6569fe6e9d8f29126a430870292d8a9b4e0e943c9d4bf09
glibc-langpack-tr-2.28-251.el8_10.4.x86_64.rpm
259c4f08310cf298d5a140a8bc8d708482ab6fe526dc3a1d481c9f9cd7e8c103
glibc-langpack-ts-2.28-251.el8_10.4.x86_64.rpm
c17bbc310b2c7f8eab8d3335e058e90bf807eb14864265937f52b21586aef834
glibc-langpack-tt-2.28-251.el8_10.4.x86_64.rpm
a51545b5143dfe131d3df3a7c177eddadabf1879dc05645db6227cfdd8a5186b
glibc-langpack-ug-2.28-251.el8_10.4.x86_64.rpm
cf2108180983fc64721804443ed8a88783b17ad7f25834e44581731cebf7b425
glibc-langpack-uk-2.28-251.el8_10.4.x86_64.rpm
7240f21c3e27735ecb35a7ca10563007a58697c9a565cd2bada319925cac3b29
glibc-langpack-unm-2.28-251.el8_10.4.x86_64.rpm
680af3b28c03afcc2d0b402eb9c09cdbd069ba15486d105f67c2bea136c586db
glibc-langpack-ur-2.28-251.el8_10.4.x86_64.rpm
3f3930e3bf3df133b31dd151def686c909d93c6499b699dba31886dda1556880
glibc-langpack-uz-2.28-251.el8_10.4.x86_64.rpm
1953681fcbeaf995d99d2a705ca72569f5fd6dda35ad403cba5d580102175392
glibc-langpack-ve-2.28-251.el8_10.4.x86_64.rpm
0882bbfdbf56a53d628af160708600961874e361f175a7441df937c30196fc84
glibc-langpack-vi-2.28-251.el8_10.4.x86_64.rpm
bd34e17dca730e8e65b6d0a6e71c725fdceb2d223ade27419b746c840a6bfe8a
glibc-langpack-wa-2.28-251.el8_10.4.x86_64.rpm
8819fa56a7c97c2d520ef24b8448f1d44f5a7fc70a12ebf83d36c0603df9ac4f
glibc-langpack-wae-2.28-251.el8_10.4.x86_64.rpm
f4f8f4c47fbe888c9f22e69251d2b8ca5c9144aab57bf6b28b97852ee4238792
glibc-langpack-wal-2.28-251.el8_10.4.x86_64.rpm
02cbfb054ed09438c23528cf2c2b82647ddbbee0c72a583a38c443e642fb4d91
glibc-langpack-wo-2.28-251.el8_10.4.x86_64.rpm
132060a2c47831073d31b4025e155b66b445afe59c09a877ff7f213381b078f6
glibc-langpack-xh-2.28-251.el8_10.4.x86_64.rpm
d1eb3f457772941714b2b28367c1bbc5141ea1724ec6dccb759b79d6f97ebaf6
glibc-langpack-yi-2.28-251.el8_10.4.x86_64.rpm
d30d28528f0e49e9e16fd2b64322bf0b0f58dc3b194dff2d28e954f025063941
glibc-langpack-yo-2.28-251.el8_10.4.x86_64.rpm
2b0cb3bc086958fd81948140ffab65adea288f5f4b880fbfa07fac8378ec46b8
glibc-langpack-yue-2.28-251.el8_10.4.x86_64.rpm
6c1f445d253081ab1f108335a78c2ec61b2204286828b0667b37b1fbfc43fe48
glibc-langpack-yuw-2.28-251.el8_10.4.x86_64.rpm
c1e76a0638fab8dc7fa943af573e774fc36c4ba57a16eaad25c070fd03e62647
glibc-langpack-zh-2.28-251.el8_10.4.x86_64.rpm
e11e6db2c09929f7fc37813ddedaae39b1d5e437f97f1800e034c5efda2604c7
glibc-langpack-zu-2.28-251.el8_10.4.x86_64.rpm
cb43e632cab97722e05c1c6230c659fa3fe7d9837b45936df028dc45d85de8f0
glibc-locale-source-2.28-251.el8_10.4.x86_64.rpm
30ebedbc54c12839a29c4d2c0cf548ea891d03c2aec91a5be5a76e3d2240d9ac
glibc-minimal-langpack-2.28-251.el8_10.4.x86_64.rpm
34ee61db0b8ddde44a5047e730aacefd90f376195ed058f8e59af6073b637f63
libnsl-2.28-251.el8_10.4.i686.rpm
e37b4a7f8e16af3518d4abf967748554b8b71c83b8a00e862ee6d2d37982b72c
libnsl-2.28-251.el8_10.4.x86_64.rpm
8f2164c678b7ac3685d84652dd07e65139d38d56267fae493ff8bd4d24c10458
nscd-2.28-251.el8_10.4.x86_64.rpm
4da38717ce889d1777c158d4adae11efdb8071b6094f497a61aaea176b13a14d
nss_db-2.28-251.el8_10.4.i686.rpm
70462829f60a6c26fdaa4568315ebb959a7dff33ac6c214c404975d26bc98774
nss_db-2.28-251.el8_10.4.x86_64.rpm
6a4b15c61d18e92e8325bcdf5a6905c99db7712061a671f64bb0e16dc845537e
RLBA-2024:6978
samba bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for samba.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* idmap_ad creates an incorrect local krb5.conf in case of trusted domain lookups [rhel-8.10.z] (JIRA:Rocky Linux-45842)
none-baseos-rpms
ctdb-4.19.4-5.el8_10.x86_64.rpm
debe0d59031a6a48a5980e1bcb12b9b4716cd9d831d6746f46e039cce5ecb41b
libnetapi-4.19.4-5.el8_10.i686.rpm
88dc91490db95ea50104227e2794bee2fce0bdef93c6e820c04cc99c64cb6c61
libnetapi-4.19.4-5.el8_10.x86_64.rpm
0b4023d1e50f47e2089d8c1d556941de345d5b0f0d74405c7d5ca7c34ad173c8
libsmbclient-4.19.4-5.el8_10.i686.rpm
4de8173bb60d88c59d36a828c4134fa67a1f1c80462f9214c64b1e74e87635d2
libsmbclient-4.19.4-5.el8_10.x86_64.rpm
8d3b893e08a8baf938eedcaddabf0f9f5666b5a03ae6f87a7530429a354b8ff1
libwbclient-4.19.4-5.el8_10.i686.rpm
ec14c15a785f2717f6c9979f360d63c26c04eae4801d60dfb38f6b3385eddbf6
libwbclient-4.19.4-5.el8_10.x86_64.rpm
c333d609cd460d8ba6d65218aaec8c3aa4add1c517b239d52b5cd0f4317515d6
samba-common-libs-4.19.4-5.el8_10.i686.rpm
b991c66ab38481f1ff57fcbe206c0a764d257c15ecdee3e08cd6ed70602c2618
python3-samba-4.19.4-5.el8_10.i686.rpm
4d31ebc85d0267fbffe5677b8fec56492a6865f078c520ddf91f6a7a25c236d3
python3-samba-4.19.4-5.el8_10.x86_64.rpm
007c734a433990aacc57a0358c1fdb45a01050a9796f26fef3b930ae826fdd86
python3-samba-dc-4.19.4-5.el8_10.x86_64.rpm
84e0f55b107f29f5eba18d283bfdce79523074251b07b44032a070818d9537e3
python3-samba-test-4.19.4-5.el8_10.x86_64.rpm
044bd50417fada6844b9d347e723753bb20de5f7bb662deeec96e90986d9ea83
samba-4.19.4-5.el8_10.x86_64.rpm
b039ee27e98d150d745b8a8d3a14a6ae23f57ab3746317e31ca80fb660e3e6cd
samba-client-4.19.4-5.el8_10.x86_64.rpm
92657585b2951d21433ee557dc19721f12a314edff3eaa36ab47179e66a98869
samba-client-libs-4.19.4-5.el8_10.i686.rpm
a04bab238d0481295c748b8e43b39213d024c4a70d45197dba65d10901ec0761
samba-client-libs-4.19.4-5.el8_10.x86_64.rpm
b64ce3cb7f835c74cf7eea0fdbc64f990932a4dada6990edf1355531b2f3f88d
samba-common-4.19.4-5.el8_10.noarch.rpm
39346c6fc4aeba3aede20d6352de6c17d98f6025659042fef4d15d3e0163bfae
samba-common-4.19.4-5.el8_10.noarch.rpm
39346c6fc4aeba3aede20d6352de6c17d98f6025659042fef4d15d3e0163bfae
samba-common-libs-4.19.4-5.el8_10.x86_64.rpm
011cc132ecaa15d6de51b4ccc9e54ff65aa98603cb07709bd870ee41c4ca913a
samba-common-tools-4.19.4-5.el8_10.x86_64.rpm
9cee79574873652c067d17823e95a313aeffc54e964eaab00456707035798f11
samba-dcerpc-4.19.4-5.el8_10.x86_64.rpm
cbd06570b646af93e87b7c4005bff8a10fda26cfe7dcbdf52f8c2a5fb0958140
samba-dc-libs-4.19.4-5.el8_10.i686.rpm
f723fe1bce6fa8de58a57faa01277ac12483f76a8569c44a427d5c933aa01331
samba-dc-libs-4.19.4-5.el8_10.x86_64.rpm
eb0afcc73d6699b9f5c20fddedab6955b96a2ce1ffa21af13160e342d35a40ad
samba-krb5-printing-4.19.4-5.el8_10.x86_64.rpm
ebc5cc3cf107f78a49217826d2eb707d68bc693c995acea2819c2afef1c27a46
samba-ldb-ldap-modules-4.19.4-5.el8_10.x86_64.rpm
890be5c3df868c1778cf007e5d6fedd8599138ae8933416bce5f9f829ed4121a
samba-libs-4.19.4-5.el8_10.i686.rpm
8ae5edafb9588a1f91f5384694c4543c9cddb2e17efbf162508a76f090cb2d89
samba-libs-4.19.4-5.el8_10.x86_64.rpm
dc1606707cdc72b995dbbfb2a1c67ee24aa2add9b4e65cefb885934def60f173
samba-pidl-4.19.4-5.el8_10.noarch.rpm
2f3c646ad48300e2d89cdd2131a387eef9eaf5b845cab13548de1e41875f2c41
samba-pidl-4.19.4-5.el8_10.noarch.rpm
2f3c646ad48300e2d89cdd2131a387eef9eaf5b845cab13548de1e41875f2c41
samba-test-4.19.4-5.el8_10.x86_64.rpm
702f4ffefa6298f5f0d63c05325145c510ff4460239e3b3b937a838dd7cb32a5
samba-test-libs-4.19.4-5.el8_10.x86_64.rpm
da91bb031501a4afacb536e485db41b1496913bb0188769f4fb3e732a6d7fe18
samba-tools-4.19.4-5.el8_10.x86_64.rpm
5f7d34a3dbc803697c5081a470f2cea4c712e55817515c33da4e3171c1c987e7
samba-usershares-4.19.4-5.el8_10.x86_64.rpm
091c730d764cc1fa0258f917611539c7b18455d7c4e08ffdc18b1a675d8290b4
samba-winbind-4.19.4-5.el8_10.x86_64.rpm
7d3afdb0fd635cb05f057eb253b6e5cd5e184546e12506d10844560ea92d2358
samba-winbind-clients-4.19.4-5.el8_10.x86_64.rpm
223513c0bb295de5a03e3f4174eb3143b0c453ea99687b53a558c4c23bec2174
samba-winbind-krb5-locator-4.19.4-5.el8_10.x86_64.rpm
5668ade3e26aad792392a759418cc1291263b187b36079d7ad1af92eb69ce62d
samba-winbind-modules-4.19.4-5.el8_10.i686.rpm
82a428b7add6283272024b5d270a8dc85aab5471a8b55a9bd056312f4cf0ff29
samba-winbind-modules-4.19.4-5.el8_10.x86_64.rpm
02475cb9b7bb2a37f4c327cc9b9b26e5cbdd1f3c66e1cad836cf01114fddc770
samba-winexe-4.19.4-5.el8_10.x86_64.rpm
71a200c31596d9205d4c2df8cd484961f158629691788c486054f3e1da73cfe0
RLBA-2024:6984
firewalld bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface.
Bug Fix(es) and Enhancement(s):
* avoid iptables flush if using nftables backend [rhel-8.10.z] (JIRA:Rocky Linux-47595)
none-baseos-rpms
firewalld-0.9.11-9.el8_10.noarch.rpm
f99c077b8db11ee113421265c119737192fdcf6f9d0ba66616b3d5bc9c903986
firewalld-0.9.11-9.el8_10.noarch.rpm
f99c077b8db11ee113421265c119737192fdcf6f9d0ba66616b3d5bc9c903986
firewalld-filesystem-0.9.11-9.el8_10.noarch.rpm
3d96ababef2d8d9295f10545f7630cee1ab2437cc3bfa21c81a88d8996259bac
firewalld-filesystem-0.9.11-9.el8_10.noarch.rpm
3d96ababef2d8d9295f10545f7630cee1ab2437cc3bfa21c81a88d8996259bac
python3-firewall-0.9.11-9.el8_10.noarch.rpm
93942d0851600d2a4f41eb6849090c411f93a8dd6a5b58bfa1301a7fc576c74d
python3-firewall-0.9.11-9.el8_10.noarch.rpm
93942d0851600d2a4f41eb6849090c411f93a8dd6a5b58bfa1301a7fc576c74d
RLBA-2024:6985
avahi bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for avahi.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Bug Fix(es):
* Rocky Linux 8: avahi-daemon memory leaks (JIRA:Rocky Linux-43458)
* avahi package has incorrect owner:group defined in payload for /var/run/avahi-daemon (JIRA:Rocky Linux-5631)
none-baseos-rpms
avahi-0.7-27.el8_10.1.i686.rpm
c07aa55b73121fd1b3ae1f88a6ab37d21b7ef91610a5128be1c5752d5258fb57
avahi-0.7-27.el8_10.1.x86_64.rpm
992344f4b0349df48b2af448428f3630eb27182b4679196b006bccfa54422a24
avahi-autoipd-0.7-27.el8_10.1.x86_64.rpm
54ba67b4f8da12b27b0e0dbbd2b8f69d0e1ae18945f84f250c5faa426222b0ab
avahi-glib-0.7-27.el8_10.1.i686.rpm
7f270fe8897439a72817c71137b9a3561dfbeec0b969ba977cb71b1a82f6073c
avahi-glib-0.7-27.el8_10.1.x86_64.rpm
40d65becd716a20aff5e7b4aec5575bed7c50395f935947f8c240d09fa7b4319
avahi-gobject-0.7-27.el8_10.1.i686.rpm
965673fc9f5705531563441a95503aa1657b585d04cab1910989712e60d31e0c
avahi-gobject-0.7-27.el8_10.1.x86_64.rpm
3252e5b1383686dc970ed6b72451a06dc902681dfb8571fc681b50aa60870791
avahi-libs-0.7-27.el8_10.1.i686.rpm
5bc8bcf167d73e9eb0354e419858fcee2f4932a060eab1162d3d21321dccd509
avahi-libs-0.7-27.el8_10.1.x86_64.rpm
43382568441f17b6bd316543f57574661639e99abe8766cff996654345d6ba0d
python3-avahi-0.7-27.el8_10.1.x86_64.rpm
cacd6f4bff9f5372c77fb9ebb3d50d2d36c6a136f35a24fd5efc1e5d243fcd67
RLSA-2024:6987
Moderate: emacs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Gnus treats inline MIME contents as trusted (CVE-2024-30203)
* emacs: Org mode considers contents of remote files to be trusted (CVE-2024-30205)
* emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code (CVE-2024-39331)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
emacs-filesystem-26.1-12.el8_10.noarch.rpm
f839be43ed7822fc0f831750105d996ac1f42179f45607cefcc9810bbaaa344d
emacs-filesystem-26.1-12.el8_10.noarch.rpm
f839be43ed7822fc0f831750105d996ac1f42179f45607cefcc9810bbaaa344d
RLBA-2024:6988
glibc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Bug Fix(es):
* glibc: Previously used TLS sometimes incorrectly reverted to initial state after dlopen [rhel-8.10] (JIRA:Rocky Linux-36147)
none-baseos-rpms
glibc-2.28-251.el8_10.5.i686.rpm
56b139bc2612ffc0fba8e255e07a132e16646dd9bbe6cc847c41650ef47d40cb
glibc-2.28-251.el8_10.5.x86_64.rpm
8bb8873ac056cb14407867cff4b02e680f47bfbf56e9cba95f6f2a2a09c9de74
glibc-all-langpacks-2.28-251.el8_10.5.x86_64.rpm
8eda15b8e36f7c6755c6a7f9b9aa15122466ad55d8e574cd190913f534e7639f
glibc-common-2.28-251.el8_10.5.x86_64.rpm
31e8c59d8097e425288fed52604dcc90d89c0ee640be1c7ecd192a1f8870d97e
glibc-devel-2.28-251.el8_10.5.i686.rpm
d3f4f84538e60ab256336cf7ec55bbab12b9db7368ffe5482fe4dd4ca132248c
glibc-devel-2.28-251.el8_10.5.x86_64.rpm
6e73d314a66fec5a51fb071fc188749f79c54e734455df678d170928c7afd6b0
glibc-doc-2.28-251.el8_10.5.noarch.rpm
f41cc8b11191d7eec03d7f84dc8dfcbce6de66745f56373f989ce38988d38ad8
glibc-doc-2.28-251.el8_10.5.noarch.rpm
f41cc8b11191d7eec03d7f84dc8dfcbce6de66745f56373f989ce38988d38ad8
glibc-gconv-extra-2.28-251.el8_10.5.i686.rpm
a40c174bab7aaba7937dfe06d33d917ebfbe8c9938332e08ad5b13d8bf98afe7
glibc-gconv-extra-2.28-251.el8_10.5.x86_64.rpm
caa210ec38381b5f50607e4059f452d0fc03943522ca32117a23cc22c408808c
glibc-headers-2.28-251.el8_10.5.i686.rpm
da2dd65be4690e8e6db1e1193baa0d0c7f6e310597888cfd2a2026a6249b5b94
glibc-headers-2.28-251.el8_10.5.x86_64.rpm
99aeb32708f54d7f3ce4c2bd301f8bd416883b6a1bf46d303d3ae09cecf91b38
glibc-langpack-aa-2.28-251.el8_10.5.x86_64.rpm
02d16a68762bb7ef88619ff9dde2af017759aa5a5266b7930e06e6fcac341cd6
glibc-langpack-af-2.28-251.el8_10.5.x86_64.rpm
c6a05210cc712fa330ef1ba1b8c6ee06c86cccdd905809f33327e15165e93936
glibc-langpack-agr-2.28-251.el8_10.5.x86_64.rpm
6feada8f4a0351156359c8bd50eeb07d6d6ba7ab68d3625bf80c5679ebc8ffdd
glibc-langpack-ak-2.28-251.el8_10.5.x86_64.rpm
e62a665e38e968a798d7bf56112abb15ac22742b2bd5922a5c2974b3d2654659
glibc-langpack-am-2.28-251.el8_10.5.x86_64.rpm
590a4f2f06cd4e58c69b5cc70b9ef8ef9da4e6ddb89ea5fe68767d624c3c7fa4
glibc-langpack-an-2.28-251.el8_10.5.x86_64.rpm
35ffbeb8c2435bd487612a07c367df2697b13e0a4a42da55e8d59b1569281c17
glibc-langpack-anp-2.28-251.el8_10.5.x86_64.rpm
0608fd2d328945b7bf71b91b197a5d3a9045e45500b68169d0ec46bdf72c76ab
glibc-langpack-ar-2.28-251.el8_10.5.x86_64.rpm
87ac5e57f41bfce7896eba6b10be7a1227c46eafe3d2c658226481fc06d047ac
glibc-langpack-as-2.28-251.el8_10.5.x86_64.rpm
bb3d69595c9a189b30aa8639fddea133ab9441d38c82d8c421f1770066c1d854
glibc-langpack-ast-2.28-251.el8_10.5.x86_64.rpm
5ba7136879a92d1b8359df67ec73e476db50cfc8b5e3ca8cb949df2f5cd0580c
glibc-langpack-ayc-2.28-251.el8_10.5.x86_64.rpm
452d1e4c1c0287067dab4036185608260be96edad561b3bda0fdc10f95b3ad7e
glibc-langpack-az-2.28-251.el8_10.5.x86_64.rpm
60492d628c43220a2264ffeca62e319a9874c5b7539f9bf94af03332aa20f51e
glibc-langpack-be-2.28-251.el8_10.5.x86_64.rpm
63f009426f3b9ee488437f0d6d4fac5d26b87633198295dbb69821cfa48ebc84
glibc-langpack-bem-2.28-251.el8_10.5.x86_64.rpm
c313331301397c444b49f52e53ca0d72c938c7b615c852e62695782de9287f96
glibc-langpack-ber-2.28-251.el8_10.5.x86_64.rpm
eee095e7ac336d5b248432e2f0658eacfab3c2342493f42fe79da57d6d8c4577
glibc-langpack-bg-2.28-251.el8_10.5.x86_64.rpm
06e2735be9aba2cbf5995a3ce3783414ff90d4f47ffb744f1b0564e4fb3aba65
glibc-langpack-bhb-2.28-251.el8_10.5.x86_64.rpm
0ada10234f2c931858e363577f1af88fa876e8337a12bb6a5007cae9c4eb4045
glibc-langpack-bho-2.28-251.el8_10.5.x86_64.rpm
10e918f349c88469385ef5604b67a2fe39aa8103dfd071676ca11c166068618a
glibc-langpack-bi-2.28-251.el8_10.5.x86_64.rpm
88bfe5c8e2cbfd1de15fa60acc14881598e03f99339ffb90784c56689b0b2c7b
glibc-langpack-bn-2.28-251.el8_10.5.x86_64.rpm
e72f80cdef0d3550a52362966d44af4d484284efefa600c8ddc4c3900fc2dcda
glibc-langpack-bo-2.28-251.el8_10.5.x86_64.rpm
0c69177627973f179dd78457d404fcd2e8e6fa0de5721b4ff1f32f991af72c4e
glibc-langpack-br-2.28-251.el8_10.5.x86_64.rpm
ce1dae1e2eefdc8e8ae5cf7f9de75131b3f05983977c5e6b9006186fc766c046
glibc-langpack-brx-2.28-251.el8_10.5.x86_64.rpm
b287094b69e04848dbbf35c21ab1d438664fa074d3f62bdd67a1a1d5f71abf42
glibc-langpack-bs-2.28-251.el8_10.5.x86_64.rpm
df55d5c815e24020a266de0def222ec09ee51e06de9ea6ce56d88d13e313feea
glibc-langpack-byn-2.28-251.el8_10.5.x86_64.rpm
2deb1196d6b43c89ccf2669016919dd877f5d761d35b6b8a649373d1d9fb9809
glibc-langpack-ca-2.28-251.el8_10.5.x86_64.rpm
6faa67b1e73b08be813f20a73f05af64b6381f9cae2da259032b89f271b64032
glibc-langpack-ce-2.28-251.el8_10.5.x86_64.rpm
0644b40928d937a9c499e5e468a9277b58cafeebeec3f3f15cafd739e61b9679
glibc-langpack-chr-2.28-251.el8_10.5.x86_64.rpm
15909a90c2769ea3445a3159b9e29c9790fa5da083f391aeafd0fd25a0e92ff3
glibc-langpack-cmn-2.28-251.el8_10.5.x86_64.rpm
6a419dd13c81aedb43b930730b04f39c2ee71661d8e5dfd915a5a19e1a8c8dd4
glibc-langpack-crh-2.28-251.el8_10.5.x86_64.rpm
b1b4f2f4c3c4f54d5eabf6b66e0e616a8dfc4ed990f8b89edc4468e8afea09a0
glibc-langpack-cs-2.28-251.el8_10.5.x86_64.rpm
ff79f44098dad1d046faaf7903f699efb3b8a781afbdb1dfeb1063fbce5eb3ee
glibc-langpack-csb-2.28-251.el8_10.5.x86_64.rpm
da5146ad30caa28bb72b4fa9eb0d888f7fe1a578a050851c7d997c635dbaf519
glibc-langpack-cv-2.28-251.el8_10.5.x86_64.rpm
936d6e5ce9bbccdbb0ec444de94912bea4c7a966ac5509b9bed878218c21ea6a
glibc-langpack-cy-2.28-251.el8_10.5.x86_64.rpm
8474bc68a9950d7c842825f6680ea12ddb0fb9844929da1bf8b8de4304d51ce3
glibc-langpack-da-2.28-251.el8_10.5.x86_64.rpm
9e5053d2b98e5bed8ef1ef7f3612766ab470f50a514424c2e2aa9bbc42841a28
glibc-langpack-de-2.28-251.el8_10.5.x86_64.rpm
b109d507480ec73569154ac4ab443d533b7ed7eb65c3deb9d4cc126a40b2985d
glibc-langpack-doi-2.28-251.el8_10.5.x86_64.rpm
26c43bf959c542b1b6f712780d54e44746d15bd1054d59c8750aef97c4f45ecf
glibc-langpack-dsb-2.28-251.el8_10.5.x86_64.rpm
70b2f7e450ea42300bdd097e97e0e50046ab78a30f996388943cd3c3563fc162
glibc-langpack-dv-2.28-251.el8_10.5.x86_64.rpm
90990eefd788d29fc628b11f957bba89755478d9c2e6a3f6c9aa0e18ac52d519
glibc-langpack-dz-2.28-251.el8_10.5.x86_64.rpm
58296ba500554191dc534c5351a38cbcd3591ff68d3253884bebbf17126252aa
glibc-langpack-el-2.28-251.el8_10.5.x86_64.rpm
37e0adfeffd16d7b9bf0870048f2266d0110f23bb6679858e6de9aeadefb7d9d
glibc-langpack-en-2.28-251.el8_10.5.x86_64.rpm
ad19ef392b89bc4f9f60e01c0cad873322841843e162e6d5436040aaad681dc2
glibc-langpack-eo-2.28-251.el8_10.5.x86_64.rpm
e03b2c8ee84e3a8e3d3f46e2403f96544cc47683165a635c04590ae21b7cb9db
glibc-langpack-es-2.28-251.el8_10.5.x86_64.rpm
7512586436e1243622ae4aa1286b61f6ff130be2bbd598047774e676cdcb170b
glibc-langpack-et-2.28-251.el8_10.5.x86_64.rpm
2c0de1042d0fceb695cea06c33ae4ef97f225f598096482742d682b84bba6e72
glibc-langpack-eu-2.28-251.el8_10.5.x86_64.rpm
b5907034a3afa3224f9b4df27bdbb38806a00af3347c6fc93a2e2060a38fec1b
glibc-langpack-fa-2.28-251.el8_10.5.x86_64.rpm
45c6b4ab29461a32ea2ba72a5046bbba112da1b8a65689a8a86eceb615a01b1e
glibc-langpack-ff-2.28-251.el8_10.5.x86_64.rpm
358899f898d9b5a1251f3d2d3c0e9a629b7732d21702d4a4288c78ca8b695e6b
glibc-langpack-fi-2.28-251.el8_10.5.x86_64.rpm
98d001d449adf7cab8c4477630213879f61412a1e61628dbd47cf1e1a0459668
glibc-langpack-fil-2.28-251.el8_10.5.x86_64.rpm
96a5854170c5609cab04ca67613dd1a9ab2870c3f908c312f2a819ba4b303a22
glibc-langpack-fo-2.28-251.el8_10.5.x86_64.rpm
ea01e430c107a01773749a70754372ee6a1c677f7bda855cf62bc3801f6c1912
glibc-langpack-fr-2.28-251.el8_10.5.x86_64.rpm
796e97346505a7723bb92afd6733aebda13a3e7c8e692c355f8df93f97906a35
glibc-langpack-fur-2.28-251.el8_10.5.x86_64.rpm
65bd1c10c04556c03e09d7408ed9cd28163121a37c8a29c9b1a6e7735622195b
glibc-langpack-fy-2.28-251.el8_10.5.x86_64.rpm
b846b6852f3965a62c45bf9ea5181fe8d59cb6a9b87f5970eb7bfa69599856ca
glibc-langpack-ga-2.28-251.el8_10.5.x86_64.rpm
d062e1ae0c48c90a1bb6d1c21102077f43c12b14f7d61ac9bb2ed5203f6fa56e
glibc-langpack-gd-2.28-251.el8_10.5.x86_64.rpm
ca43109a55d5017d1e3c4dd1cdf9d12e90e9882063a3eb0379dc0c4514495e1a
glibc-langpack-gez-2.28-251.el8_10.5.x86_64.rpm
79adb5fdd219948d030d023d4afaf506e27cbabdc03aa8b196b15714092c2c59
glibc-langpack-gl-2.28-251.el8_10.5.x86_64.rpm
8db07b1c562036c7d79762429fa0e8f8a3d147d2258c1c6cbfa8118d3cc7db41
glibc-langpack-gu-2.28-251.el8_10.5.x86_64.rpm
18c4db77b7f82fcbfadc772e729417397df86229b7105803dbc4811bbf3a3311
glibc-langpack-gv-2.28-251.el8_10.5.x86_64.rpm
157d12c5cbc5f79afa55f4be9812c93ad935bc7c54459ca67c02116c54917106
glibc-langpack-ha-2.28-251.el8_10.5.x86_64.rpm
eaab779c825f1a4b89986957465b967e8eb172d0cc323f84716a256d056202e8
glibc-langpack-hak-2.28-251.el8_10.5.x86_64.rpm
ba3fb71590bd98cec6078521cf4e9ac260bc3a69b682451647064e7b9addc24e
glibc-langpack-he-2.28-251.el8_10.5.x86_64.rpm
b6eeeb8af16d9bbf873a47e98f38c09eb097597447403d5a119e04274db890a1
glibc-langpack-hi-2.28-251.el8_10.5.x86_64.rpm
6a8c46c1ea8cab0ed5087bba15c09db4d3a9e9a0391431381e18e09919083319
glibc-langpack-hif-2.28-251.el8_10.5.x86_64.rpm
d43f4f37b0f9b71a98ec523e110cacc6eeb3a6bf0bb2a45a893442be7430cb68
glibc-langpack-hne-2.28-251.el8_10.5.x86_64.rpm
4a0e6dc40c62c5e0afd866f434c14ee72286a52fb3e9d23e812cbbb8b286262b
glibc-langpack-hr-2.28-251.el8_10.5.x86_64.rpm
1098191eda424892e1bc31e90024429b9c8b895043549ac3741c0a2c18736a80
glibc-langpack-hsb-2.28-251.el8_10.5.x86_64.rpm
03ee142ed10e1ba6b410b8786d167867feb46b7426ea7547cd795a26e9194f77
glibc-langpack-ht-2.28-251.el8_10.5.x86_64.rpm
0b85f9b10d6989869feccaeb5d6a27d91404cc3e9cbb93f8e78a8bb42e907c09
glibc-langpack-hu-2.28-251.el8_10.5.x86_64.rpm
fa4d348bdf411e427b5ef1af087f3c49b0f19801271b724be45f47602c1d1138
glibc-langpack-hy-2.28-251.el8_10.5.x86_64.rpm
da99ea488c9000a5be6613f36e3e8feab9d31d930098a9a7d5527a447780d30a
glibc-langpack-ia-2.28-251.el8_10.5.x86_64.rpm
bc9214909b5ddc46a594246d8ac33edfdb5e7d7edbe6463fa689e54b4d4f3406
glibc-langpack-id-2.28-251.el8_10.5.x86_64.rpm
ff1e6bad622f8c434f4cea29825bdf40e311cff3d12d28c424ca06e58013f250
glibc-langpack-ig-2.28-251.el8_10.5.x86_64.rpm
1bde0d666c5cdb162970a55fb2b9575dd24f9edea30c6575853f4232c2d2eef1
glibc-langpack-ik-2.28-251.el8_10.5.x86_64.rpm
b54d2a1befbd9c81a32e90edaadbb44b1069b146c8c44f2369ffc66dea87cb45
glibc-langpack-is-2.28-251.el8_10.5.x86_64.rpm
e12c0af97a7afdcb7fea14bee5815f4106f527e1b9f7f38ead17f0ee319eaef1
glibc-langpack-it-2.28-251.el8_10.5.x86_64.rpm
d7ac90a28891cf0280ef769cfd590e899d3e67ec43f5b85b075dba5b05179155
glibc-langpack-iu-2.28-251.el8_10.5.x86_64.rpm
08a7fc9fa3745d1c4001d0154d78130e162aee88dac9ba11689d7eaa3adb54dd
glibc-langpack-ja-2.28-251.el8_10.5.x86_64.rpm
cd6df7ad6aed6955b6a12d4ff6e132313a7e19d7244357c9bae69f633a43e76d
glibc-langpack-ka-2.28-251.el8_10.5.x86_64.rpm
77a62c0f5a71ff492e79676ca24372ac2534fa4fc64fd1b06fc0dde56e27edba
glibc-langpack-kab-2.28-251.el8_10.5.x86_64.rpm
5f1e9fbc9ff24d43de1d6bc3f6b07d4d6f786f2a4d9016dd918f818d425489c6
glibc-langpack-kk-2.28-251.el8_10.5.x86_64.rpm
e8052aa43c4ddcf90f825874df9cdce8b63101c9416513d6c5a69829b4050c75
glibc-langpack-kl-2.28-251.el8_10.5.x86_64.rpm
32a7f0ced6dedf97afd5cd0440cdd84f1b9b63ab31b9d37ac2a4fb83cf5de9c4
glibc-langpack-km-2.28-251.el8_10.5.x86_64.rpm
626f6f1ed18b4fb9b54d166ea4b26fde035830ca9c45fcb708e3747d0456e9e7
glibc-langpack-kn-2.28-251.el8_10.5.x86_64.rpm
d8c9c0ed921feee9fc06ae43daf39a679be3c9bb4ed947dcbea54990d4461827
glibc-langpack-ko-2.28-251.el8_10.5.x86_64.rpm
d8f4518fda41f666f9eec58755431252fde894c5289afbecc3ab00712845cc37
glibc-langpack-kok-2.28-251.el8_10.5.x86_64.rpm
cfc48e464e7115fc48a8fe3a61e134c9baed7f189b8a3e88324f6f39a80df5f2
glibc-langpack-ks-2.28-251.el8_10.5.x86_64.rpm
6712faefe53fe2fdd50064de2dc8ef484948e8050a4d57c56195e9a96b46f9dc
glibc-langpack-ku-2.28-251.el8_10.5.x86_64.rpm
e41ddc4cc356d80cd47da87b94573e552e133062335f9c0214de3800889bd19e
glibc-langpack-kw-2.28-251.el8_10.5.x86_64.rpm
4a3f06757d16e25437046470a0e1195a086113342177e4f7fc7f8d02ad82149b
glibc-langpack-ky-2.28-251.el8_10.5.x86_64.rpm
375158fa7a2db9cf258948a905cd5cc4e12a095d17505887fbf9b1990b6afd76
glibc-langpack-lb-2.28-251.el8_10.5.x86_64.rpm
c1a3b4987d48d05dd63086f66cc903d69131d45defec5d17240a3a33b51003aa
glibc-langpack-lg-2.28-251.el8_10.5.x86_64.rpm
7697b219be9c5b1eb6996ed32a19ee822cff8a4bfadf5bd6d15e433616ad533f
glibc-langpack-li-2.28-251.el8_10.5.x86_64.rpm
b7f95fcb0abd6822e9ffecf63f849436392d68885f014bd5d3a64a4643f47f60
glibc-langpack-lij-2.28-251.el8_10.5.x86_64.rpm
6d174a58e2116698da31f59f50515a54b49ff8859bd6841393311e68ed5e1bda
glibc-langpack-ln-2.28-251.el8_10.5.x86_64.rpm
4e6926c55f5d5855ab24ffbd8cfdb2be820472b5915fe43b21754e28728f0a10
glibc-langpack-lo-2.28-251.el8_10.5.x86_64.rpm
402ac4fc413d1e3e198fafb314d734a4acf3cd5371cd854f0ea06685b4fc246b
glibc-langpack-lt-2.28-251.el8_10.5.x86_64.rpm
65935471b0125956bcd186ea402413961cf22e5de00be6ef0abfe9c167f4fa09
glibc-langpack-lv-2.28-251.el8_10.5.x86_64.rpm
cf33e206e06959258ef05fb69c3b30b835cc55bea272e79634cf473a0184d67a
glibc-langpack-lzh-2.28-251.el8_10.5.x86_64.rpm
06ff8be398e72e12d01ab8324cb8caaf8ca8511fc62437a9073090d211e5c0cf
glibc-langpack-mag-2.28-251.el8_10.5.x86_64.rpm
30be6537f29e5ec6d93c618eb760a708b1af091228af3f89b693db8256a8b8a1
glibc-langpack-mai-2.28-251.el8_10.5.x86_64.rpm
2622ee07a2d14144e27f66c735cd8a7dc19c258c6a4a4fce8f60d61691dd2461
glibc-langpack-mfe-2.28-251.el8_10.5.x86_64.rpm
345ab1b2fa1b308657785f61a5e81e480cb0996666eb6eff89f40e71fe65ca56
glibc-langpack-mg-2.28-251.el8_10.5.x86_64.rpm
155f4bd6d1df73b84f308ed5151c402e39edf0a452c7b06a5da89e3f22f0a635
glibc-langpack-mhr-2.28-251.el8_10.5.x86_64.rpm
6572f82dcc46d8029cb71322191ed8ee857ce066ec873d7fe15590122180304f
glibc-langpack-mi-2.28-251.el8_10.5.x86_64.rpm
2793159b417bd54fee4c7296b69eaaacaa06ee54be610448ee490e80beccf9ab
glibc-langpack-miq-2.28-251.el8_10.5.x86_64.rpm
cfdccf340899777dda0daa969173d31fad555703538f7c8498c4adfdde8adefd
glibc-langpack-mjw-2.28-251.el8_10.5.x86_64.rpm
6033ea24d8b084c0c6c7c60336f42385a1a0c22ed8c98ddbd90daa0bcb65914f
glibc-langpack-mk-2.28-251.el8_10.5.x86_64.rpm
933c927200ab79e5e3ea61ba3e7477283dd269ca09eb62ac5c6fa987c2d61439
glibc-langpack-ml-2.28-251.el8_10.5.x86_64.rpm
a60ad37fe45f1b686cdca4e1ecc258bc34aefb585104d9319612fa7587c93259
glibc-langpack-mn-2.28-251.el8_10.5.x86_64.rpm
47d06c9cb354cc313431f7c84f143ea3e3d8f3b741383598258ae44c7737474f
glibc-langpack-mni-2.28-251.el8_10.5.x86_64.rpm
c649797561be24d3207dba43279b55a9842e62dd616ac58d32ad8f692582b2ed
glibc-langpack-mr-2.28-251.el8_10.5.x86_64.rpm
dbb22cad58fa596153df3b0b78af6440bfd525f68caee447ff14ca06efbda0ca
glibc-langpack-ms-2.28-251.el8_10.5.x86_64.rpm
f9577fd911a6362590186ca47398d310d8ae83d492d7e1e9503a5d9f2d71d815
glibc-langpack-mt-2.28-251.el8_10.5.x86_64.rpm
7c70ea75b8ca9d206248b6a48ed6836dd6bedf2e24990587d29b1c6bdf24db4e
glibc-langpack-my-2.28-251.el8_10.5.x86_64.rpm
45028e73dcf5b604a427c667caa362231674097227b55f19a5d276d04e25c3bd
glibc-langpack-nan-2.28-251.el8_10.5.x86_64.rpm
535652e4d2c9038772702a673346a4988f2eb06a2c558dacef3fb94ea3b3150b
glibc-langpack-nb-2.28-251.el8_10.5.x86_64.rpm
8cf0031568391e26a1600da3af4a4a25f99e6b0c16f9dd1a8a34e4212d9cbec0
glibc-langpack-nds-2.28-251.el8_10.5.x86_64.rpm
c997d4be7ad0ea1e59cd7c11458d3718193299850b45a34cd6681f0fa1fcb363
glibc-langpack-ne-2.28-251.el8_10.5.x86_64.rpm
d88e50b701da195a37955fee98c66d208bc06f1f2c088b0be353b057f30f81ee
glibc-langpack-nhn-2.28-251.el8_10.5.x86_64.rpm
917c28eb05b8f0a3031bf26e6f56e51a0af37fe687f636b1e072e7b3919561af
glibc-langpack-niu-2.28-251.el8_10.5.x86_64.rpm
7c1105bda93a6c828a89412c62853818f6c6a020bc6919295a250941a9fc19c5
glibc-langpack-nl-2.28-251.el8_10.5.x86_64.rpm
e6c4d4ce5375753ed583ae9675459a77c23f2d3e56dcf6e2d7122960e1ac5cd6
glibc-langpack-nn-2.28-251.el8_10.5.x86_64.rpm
4fe8f5d80c1364b48b8cbca25f1133118c27a163cf8a878c346e15e4098a9708
glibc-langpack-nr-2.28-251.el8_10.5.x86_64.rpm
b35c95f36149892e32a43630d029cc22b793bd19dd3290218173d8dcc83af87c
glibc-langpack-nso-2.28-251.el8_10.5.x86_64.rpm
e8d926c5bcb122735e9d0a7bc0c72a5da1497ffe6326d62de72932ee0a0b7e3b
glibc-langpack-oc-2.28-251.el8_10.5.x86_64.rpm
1e4e21806d95480aa195bcda5222866c8dc6266f62708c5f4dd64aa1b373273c
glibc-langpack-om-2.28-251.el8_10.5.x86_64.rpm
03563080c7fd74cac17970946fa0fc8b6ff5a062b6c02f1ec4ad1228c940a77a
glibc-langpack-or-2.28-251.el8_10.5.x86_64.rpm
5aac3d667f876bf5532e1a188cfacbdf7416126642bad35fc4cb65d4f0ce3607
glibc-langpack-os-2.28-251.el8_10.5.x86_64.rpm
75c07b0463c9c5d3e60be58b113886bc074cf6e904aaffa52c55128f2f0a7027
glibc-langpack-pa-2.28-251.el8_10.5.x86_64.rpm
5d30f3ffc674b2ee472ee38dcb00d575622d69d76c47a035b41c570fab01c665
glibc-langpack-pap-2.28-251.el8_10.5.x86_64.rpm
f3b6b2bb02ace8b7d625e8719952f365d07a0920e384ef5e90bed5e9682b11db
glibc-langpack-pl-2.28-251.el8_10.5.x86_64.rpm
98a55f5cdb4d1fa3fa1441291a22ba8b60f9a7c24f894e11bf72c64b88b814c5
glibc-langpack-ps-2.28-251.el8_10.5.x86_64.rpm
08d739144508113f0b196dd0db667749ae5d0b6c1756a0459db0bc61acef3070
glibc-langpack-pt-2.28-251.el8_10.5.x86_64.rpm
ea67a7669a39abf86022fef5f649140f6652f65ce6daa1c50205798b0aa3651b
glibc-langpack-quz-2.28-251.el8_10.5.x86_64.rpm
1e8a60e7f9b7c950fd0e0ffbe3fdf651024e6368ad6ced93a34d956a8f2c26c1
glibc-langpack-raj-2.28-251.el8_10.5.x86_64.rpm
aa96c547830b4db6038e8deed207fef1ce03cea2117c6baf3cb1e4f70d23af3d
glibc-langpack-ro-2.28-251.el8_10.5.x86_64.rpm
fe80e8973fced24370248a59acfd551935149f2f30128d37bded2553276ba850
glibc-langpack-ru-2.28-251.el8_10.5.x86_64.rpm
9b64b55fcac764ebb1b5a48d1dc2d0ef33e51a3c2f092b618275260af1e684b7
glibc-langpack-rw-2.28-251.el8_10.5.x86_64.rpm
8ddeaf4563e74db64836a585d93fb4c42ada9b4b706bb1b0b0e52518fc198d37
glibc-langpack-sa-2.28-251.el8_10.5.x86_64.rpm
e5888bbb3edd9a23778fad2a97d22b586d3811518ee5b5a5ecc5ebb004ebc8f7
glibc-langpack-sah-2.28-251.el8_10.5.x86_64.rpm
051b0c1cf7e9c42e5f5267e2fbc33dccded7e95b4b9c578cf814f96bc753c28e
glibc-langpack-sat-2.28-251.el8_10.5.x86_64.rpm
62e04d060275f4e11b64d5688ef7ca3ffdc21e27e967340b2f38ffec46df839d
glibc-langpack-sc-2.28-251.el8_10.5.x86_64.rpm
d985e0b11e12d6ac8069b7fdd1d8e2e3cee26aea8576813687f4cd21479de575
glibc-langpack-sd-2.28-251.el8_10.5.x86_64.rpm
2359da35bce122ac6df604e9a3bd6480736bb4061ff0b3aa0b844bbee4c72168
glibc-langpack-se-2.28-251.el8_10.5.x86_64.rpm
7d75d4f781a1c494c3820293bd296453665c7ac5e0c752ba7464d2780072915f
glibc-langpack-sgs-2.28-251.el8_10.5.x86_64.rpm
676da55b2d5dc64d2574c7117298e2db4ef8aea55df576ecb140bdd4df5f1c5e
glibc-langpack-shn-2.28-251.el8_10.5.x86_64.rpm
b7750763cacc8701cf8d48e661a6e34dff7bcdf385f682159129beaace5612fd
glibc-langpack-shs-2.28-251.el8_10.5.x86_64.rpm
8930a6573a234df62c7185fb64e4fdb860f3ee8eca9a729d1d05534379566f44
glibc-langpack-si-2.28-251.el8_10.5.x86_64.rpm
a28304d760bd3a887b766d6e3e5345c73e8be72d8b27159450c2df0eac137256
glibc-langpack-sid-2.28-251.el8_10.5.x86_64.rpm
f11498a7fa9adcab82d53184362244ea0df2c9466e229cd34d8b41bceea871fb
glibc-langpack-sk-2.28-251.el8_10.5.x86_64.rpm
4929d724c2c03f28bc93abe94ca53b116c5389f380a1c1f74130d54dc0d35ae7
glibc-langpack-sl-2.28-251.el8_10.5.x86_64.rpm
5f5b4a550a714dfbf32202bfcd9013232d51ea5bb9915c96f76c73e14ebfeb79
glibc-langpack-sm-2.28-251.el8_10.5.x86_64.rpm
193aa01bfdbd9f01a332f116d2c11eba7cec3b683b7124b6b3bc3826a3ce0270
glibc-langpack-so-2.28-251.el8_10.5.x86_64.rpm
b48fd9be389a44bae8cfb90f059d1c06951d1eeb3960aaa8d7c5a72edd11e08a
glibc-langpack-sq-2.28-251.el8_10.5.x86_64.rpm
6356397fad33b7c44582c9ad745d8a20f7b876487b40ef11cc15086a351223a3
glibc-langpack-sr-2.28-251.el8_10.5.x86_64.rpm
999012108484868316323efc3ebf8427a2b32ea459d1c116ba8c5c90cbcf0331
glibc-langpack-ss-2.28-251.el8_10.5.x86_64.rpm
ad932c321fe62a29fcbb2d5055dd03264e327b5989bde9ad0b420feb4abc245f
glibc-langpack-st-2.28-251.el8_10.5.x86_64.rpm
0ecf4ba77c8e7041abdea20cf0874276f71fb012c478f4680fe8a622145d254c
glibc-langpack-sv-2.28-251.el8_10.5.x86_64.rpm
f5dae8804e8834de7f8439d60301f3578cdcb94ebc3a3a9f9d689ab81fc0a0c8
glibc-langpack-sw-2.28-251.el8_10.5.x86_64.rpm
f802a27c5fcea29178de3a5f0720ac6207641f4aed037440fbdd3ad8d3a94b0a
glibc-langpack-szl-2.28-251.el8_10.5.x86_64.rpm
c459ba366353e5376b6608013be2574bcc4e0e92dfe08cf7ddb20ca84632bfd6
glibc-langpack-ta-2.28-251.el8_10.5.x86_64.rpm
97c1e8f771e77f5eddaff2a64aeb3f1097d2321259a553b4609b89b5a1861e0c
glibc-langpack-tcy-2.28-251.el8_10.5.x86_64.rpm
da4e6e7145f4820d536911d869b530acca9613af1f93300639dcd0d11eeac535
glibc-langpack-te-2.28-251.el8_10.5.x86_64.rpm
d45079fa6b8e0fbf6ec94704003e6bed1ac016dd1ba3ee2a66db8a216875d849
glibc-langpack-tg-2.28-251.el8_10.5.x86_64.rpm
178662dba537261dc58b2e3ec20cd35e86c7e7c9570b9ad55c147af01586c901
glibc-langpack-th-2.28-251.el8_10.5.x86_64.rpm
335839d16eeacf0477be17215d8b2081c219358cf1c28ce08ae0247c5222c316
glibc-langpack-the-2.28-251.el8_10.5.x86_64.rpm
0b4f17ec04341cabfcbe23f4970f2e01e503cbc7f59b17ee0616882eafdb331d
glibc-langpack-ti-2.28-251.el8_10.5.x86_64.rpm
e4186a761e89a1e380c39044e655f385b727aa4f2084e7898879e08f0aa25341
glibc-langpack-tig-2.28-251.el8_10.5.x86_64.rpm
0fb1df14bd1aa60e430b7b133e4c1537b85932aa310be38bbb87f82a00f06cd7
glibc-langpack-tk-2.28-251.el8_10.5.x86_64.rpm
8f022f94cebc9cd047aad5514423874cbd6599e6117ec92a6b65f61eaaab78f0
glibc-langpack-tl-2.28-251.el8_10.5.x86_64.rpm
43d314bc72ecb8f6be3795f7bc51463ceef7cb9af2f7aa496d7d0d4fb8f8fcd6
glibc-langpack-tn-2.28-251.el8_10.5.x86_64.rpm
a0287e2c34a56427b009a332123a88a850efdf6b07d7e03dd8a0547846bedb71
glibc-langpack-to-2.28-251.el8_10.5.x86_64.rpm
22ff89ca86e9e5e5bed8b1cbff4d1891b605e2d7430c027b3acc9d1ccd2425a4
glibc-langpack-tpi-2.28-251.el8_10.5.x86_64.rpm
c5a2e114ccfb12684edda998f211480597c10df51d47bc0b0843dd2c63bbec98
glibc-langpack-tr-2.28-251.el8_10.5.x86_64.rpm
ff7ecacd129452e5c3a4bdf02208b83eb36f2a557ee1440d86dab55f1db23818
glibc-langpack-ts-2.28-251.el8_10.5.x86_64.rpm
cf646c95714cbacbdd8622382774813b6d5f64e049ba3ae564637454f8490473
glibc-langpack-tt-2.28-251.el8_10.5.x86_64.rpm
a092224a3511ed4663f373f25fc560ea2c501af457efbeaba8fb488561bd0c3c
glibc-langpack-ug-2.28-251.el8_10.5.x86_64.rpm
82882a0a72784600d1129dedd197e303ddb680fe916a4da9ead07a78e5ae89a1
glibc-langpack-uk-2.28-251.el8_10.5.x86_64.rpm
96bb18ee720eb4c5a7d0ff1d1e3fa9dfa105aa5c578c4b7343f227128db6b91a
glibc-langpack-unm-2.28-251.el8_10.5.x86_64.rpm
6b26363f288494808a4746c7985ebbfe8d895b79c08ed12db883daf66bf7244d
glibc-langpack-ur-2.28-251.el8_10.5.x86_64.rpm
3fe260db6d29d61f27d8f884f47f54d9c16970ff3f130fe094c26f78e88c8cd8
glibc-langpack-uz-2.28-251.el8_10.5.x86_64.rpm
cde14bd0b5970364ec0ffa881fbee4c1845ef34b1d9b8f1a3c0a5fbef0d6dc7a
glibc-langpack-ve-2.28-251.el8_10.5.x86_64.rpm
3d13b15b39c7a8dc04f612becb2bc1b4653d823b3c8a2bc3e885cbdf73d1a4e5
glibc-langpack-vi-2.28-251.el8_10.5.x86_64.rpm
499d355c7ccba81aa1e446ab6981213c6a324dd98340c2b87389f48dc3e83ad5
glibc-langpack-wa-2.28-251.el8_10.5.x86_64.rpm
ad722b9c69d63454a183dda852627fd78b851413af33f19809f25c246f9c118a
glibc-langpack-wae-2.28-251.el8_10.5.x86_64.rpm
16b3e67272d35dc1bd07b9319c167c7ea901aafe044d2ad20b5ff94649e718ec
glibc-langpack-wal-2.28-251.el8_10.5.x86_64.rpm
332f0388646b938bf745f2dbeca9b58f15907273bc52f135df2f020d23bbf4ef
glibc-langpack-wo-2.28-251.el8_10.5.x86_64.rpm
f65f720b8179d6dad060f2676b2e4afc81092ef1c7bb10530b49a89f7cfa1056
glibc-langpack-xh-2.28-251.el8_10.5.x86_64.rpm
64b8e5b4bb2732b37f4fefd518d906f5e730288f3593b34e3f1b9f0044f4ed6c
glibc-langpack-yi-2.28-251.el8_10.5.x86_64.rpm
f76b7d81b50e6311180a87eda98818c135dd791538df50eb9be42f63e935866d
glibc-langpack-yo-2.28-251.el8_10.5.x86_64.rpm
b77b9de2689bb2390f484ec93ee6e488135990d7dc621fbb624141b5f8a6b576
glibc-langpack-yue-2.28-251.el8_10.5.x86_64.rpm
04be195b9928195d63921f3cf7d6340d1348962539c7f1684770b393bebf086c
glibc-langpack-yuw-2.28-251.el8_10.5.x86_64.rpm
542f10c16b9e892e6bfb1841f03e2ea1b1ceb323912807bbf53ca218f88e7ef2
glibc-langpack-zh-2.28-251.el8_10.5.x86_64.rpm
a9265538e1c9cd75d40277c5141e2167a823f71f5ab2454fa26ab636abe62a04
glibc-langpack-zu-2.28-251.el8_10.5.x86_64.rpm
922e7ad7b7c64775c976b5b4cb2a92cb796164d8ddadfb8c5d8769ac43d6249c
glibc-locale-source-2.28-251.el8_10.5.x86_64.rpm
524b3439f9e0204f17f3be4d4f4f687e62ad2d53f048a4a244fdc505c61244a3
glibc-minimal-langpack-2.28-251.el8_10.5.x86_64.rpm
637c23aada7838e97595e8b11d1f84dcf961bb9d091a117d36224790a2fb6c5f
libnsl-2.28-251.el8_10.5.i686.rpm
b844852b4055519027fd0a60ed71a34a3771fb487bb9932d4c2c15b50ef7da8b
libnsl-2.28-251.el8_10.5.x86_64.rpm
7b276c5c3edbc62ec415d1850c0a9e54e935488d42473b71da0bc2bae9b25dad
nscd-2.28-251.el8_10.5.x86_64.rpm
3f4b5b743f1ef91c057f76640ddb8a85e44b6bbbee00851b146fdebde8e4f680
nss_db-2.28-251.el8_10.5.i686.rpm
5ad7234179bcd6bc3ad7292c01412d8402711a49caa86864dc687905adf2f053
nss_db-2.28-251.el8_10.5.x86_64.rpm
e4222d7826bac8f34d7d384e3532c940bc624afeaa67732ce86344ad2dfd4b56
RLSA-2024:7000
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
CVE-2023-6040 CVE-2024-26595 CVE-2024-26600 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26638 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26846 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52798 CVE-2023-52809 CVE-2023-52817 CVE-2023-52840 CVE-2023-52800 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36922 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36919 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38579 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41023 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41064 CVE-2024-41065 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42094 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42225 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43830 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.22.1.el8_10.x86_64.rpm
28a8a5c1ac00e510e1a2e96eaa785bdb6e2d85a0ba8697d2730cc3358578b184
kernel-4.18.0-553.22.1.el8_10.x86_64.rpm
9136ee72f83da9ea3b802676d85963eccf2eb9486edbab97b4f6ba245e4ddf40
kernel-abi-stablelists-4.18.0-553.22.1.el8_10.noarch.rpm
37868b1396369a301016915962c9bd00511ab563e2a72497f075079ee385d74e
kernel-abi-stablelists-4.18.0-553.22.1.el8_10.noarch.rpm
37868b1396369a301016915962c9bd00511ab563e2a72497f075079ee385d74e
kernel-core-4.18.0-553.22.1.el8_10.x86_64.rpm
4ae1edbdd3b0b8fb88d67cc382d242ba70be25c81a19482aab539a73853da954
kernel-cross-headers-4.18.0-553.22.1.el8_10.x86_64.rpm
8e96167c42f78a2a20179de560bea3799cf630da6bfb8c51fcaa029e82f439c8
kernel-debug-4.18.0-553.22.1.el8_10.x86_64.rpm
6aec85f93cfc9002245b53d24a4d9cdfb4e1808d834449f78343dc1fea3e8127
kernel-debug-core-4.18.0-553.22.1.el8_10.x86_64.rpm
841554fa4d97e42922dc65898ac64cb8c29ae2d0c014384ff71c99bce0ffcc0f
kernel-debug-devel-4.18.0-553.22.1.el8_10.x86_64.rpm
93d786d8e6d972a7c8244b9b95c7bda7170dd555c5c22444741141dbbde29be6
kernel-debuginfo-common-x86_64-4.18.0-553.22.1.el8_10.x86_64.rpm
46bb4a91910db6e6f7ff0fc794cf1bbbc52f4d37a3ed1529b105d104790dee1b
kernel-debug-modules-4.18.0-553.22.1.el8_10.x86_64.rpm
9f73b43cc8cb11f2c12829b6a1a64196004fc73369329e5e1cc1c6ec012a83dd
kernel-debug-modules-extra-4.18.0-553.22.1.el8_10.x86_64.rpm
2d9174f2d97166141afe1862bec64884661ca8375fdd5fe4110cf0528c5a9801
kernel-devel-4.18.0-553.22.1.el8_10.x86_64.rpm
e356e54502bd6471c3752f5dc96d0e14e5cba7c4724ae9572b4debc014f3216b
kernel-doc-4.18.0-553.22.1.el8_10.noarch.rpm
26974777e1dd5ef418e19ba439d59bb59de3947a9a58e163cfda8d2ad9c96228
kernel-doc-4.18.0-553.22.1.el8_10.noarch.rpm
26974777e1dd5ef418e19ba439d59bb59de3947a9a58e163cfda8d2ad9c96228
kernel-headers-4.18.0-553.22.1.el8_10.x86_64.rpm
9a9e04ff8bc77455514346d922e389007bdefc8d8654fac12dc3eb452fc375a7
kernel-modules-4.18.0-553.22.1.el8_10.x86_64.rpm
50ed7ca331ca776705b7bf05afd82df8c989e3c635f29262f1034b85ecad40d3
kernel-modules-extra-4.18.0-553.22.1.el8_10.x86_64.rpm
c7a7d822d72771cd6783998ec4f0cafd5be60083980fb8064482955bcf37cf24
kernel-tools-4.18.0-553.22.1.el8_10.x86_64.rpm
d444df3363a596780c3b826a83c7895a79a348b5b35a5403582514a8d52aafd5
kernel-tools-libs-4.18.0-553.22.1.el8_10.x86_64.rpm
49a0e3f384321f8e43ac311255a93ca45de53a449184d1580f808f2cd48fdd01
perf-4.18.0-553.22.1.el8_10.x86_64.rpm
890bb0a91e5758b6bbc0b00079793cb547bb0d630510309183ab4b5367161346
python3-perf-4.18.0-553.22.1.el8_10.x86_64.rpm
534d46600ee52ae55e49afb96a9fda86de721f43ee7617cf9c210e45947f2924
RLSA-2024:7481
Important: linux-firmware security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity (CVE-2023-20584)
* kernel: hw: amd:Incomplete system memory cleanup in SEV firmware corrupt guest private memory (CVE-2023-31356)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
iwl1000-firmware-39.31.5.1-124.el8_10.1.noarch.rpm
ec268dfa1053d5d1a842485637c8bb3411fb016fa3208992a20ed7459388ee12
iwl1000-firmware-39.31.5.1-124.el8_10.1.noarch.rpm
ec268dfa1053d5d1a842485637c8bb3411fb016fa3208992a20ed7459388ee12
iwl100-firmware-39.31.5.1-124.el8_10.1.noarch.rpm
3f7185a8b325f6402d01817e7465b4aecbf5ca285337d14dcebe7ddd49bc4175
iwl100-firmware-39.31.5.1-124.el8_10.1.noarch.rpm
3f7185a8b325f6402d01817e7465b4aecbf5ca285337d14dcebe7ddd49bc4175
iwl105-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
356fa5d82f2f00471f78566050294a30440c167cf83eed39ec458c8505c97e0a
iwl105-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
356fa5d82f2f00471f78566050294a30440c167cf83eed39ec458c8505c97e0a
iwl135-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
9e93a37d5b40a79005d360ad6661bcf3601539ee8167be9be24469c908c974b7
iwl135-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
9e93a37d5b40a79005d360ad6661bcf3601539ee8167be9be24469c908c974b7
iwl2000-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
2cbf28d04db06d04a954df44d12f9d9004ece220f57b34c4f1371ba74d0dd758
iwl2000-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
2cbf28d04db06d04a954df44d12f9d9004ece220f57b34c4f1371ba74d0dd758
iwl2030-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
4bd90f328534fa8922004b231d77725c15c86da0b9a6e3e14a68843817f99491
iwl2030-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
4bd90f328534fa8922004b231d77725c15c86da0b9a6e3e14a68843817f99491
iwl3160-firmware-25.30.13.0-124.el8_10.1.noarch.rpm
4dae7296307dc5f05be89af1576bb3d23e2aa07a82e5db9557c557f62674ac74
iwl3160-firmware-25.30.13.0-124.el8_10.1.noarch.rpm
4dae7296307dc5f05be89af1576bb3d23e2aa07a82e5db9557c557f62674ac74
iwl3945-firmware-15.32.2.9-124.el8_10.1.noarch.rpm
9b2ed7f1c8a8633a455fb65bf7dc747540f52ad68a82537f96cc8e70f0ffc992
iwl3945-firmware-15.32.2.9-124.el8_10.1.noarch.rpm
9b2ed7f1c8a8633a455fb65bf7dc747540f52ad68a82537f96cc8e70f0ffc992
iwl4965-firmware-228.61.2.24-124.el8_10.1.noarch.rpm
d1421386b76e3a09e3a378d5a329d193a2b8bb69a588d66c425d2fca65843eb4
iwl4965-firmware-228.61.2.24-124.el8_10.1.noarch.rpm
d1421386b76e3a09e3a378d5a329d193a2b8bb69a588d66c425d2fca65843eb4
iwl5000-firmware-8.83.5.1_1-124.el8_10.1.noarch.rpm
7659f75285578accc5a0686700c8803c159c5fdf2cc53e0eb1a9403ba712dbce
iwl5000-firmware-8.83.5.1_1-124.el8_10.1.noarch.rpm
7659f75285578accc5a0686700c8803c159c5fdf2cc53e0eb1a9403ba712dbce
iwl5150-firmware-8.24.2.2-124.el8_10.1.noarch.rpm
abd695129be3c73cc717c7bde0a0dc677bce6ddf53ce0bd00602c6df05956263
iwl5150-firmware-8.24.2.2-124.el8_10.1.noarch.rpm
abd695129be3c73cc717c7bde0a0dc677bce6ddf53ce0bd00602c6df05956263
iwl6000-firmware-9.221.4.1-124.el8_10.1.noarch.rpm
31b42eb8eeb5602044cf7743b90fbdbd78665645bf16130ad483ae569258eba2
iwl6000-firmware-9.221.4.1-124.el8_10.1.noarch.rpm
31b42eb8eeb5602044cf7743b90fbdbd78665645bf16130ad483ae569258eba2
iwl6000g2a-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
bc99ca43c3f3eb838a0000f79110281d313d1d7dd4b596bddc4d0845d9bfe202
iwl6000g2a-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
bc99ca43c3f3eb838a0000f79110281d313d1d7dd4b596bddc4d0845d9bfe202
iwl6000g2b-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
0abfc9e1c2236590f4258785d2400f709fe532506c53d66a523438c9b90bb431
iwl6000g2b-firmware-18.168.6.1-124.el8_10.1.noarch.rpm
0abfc9e1c2236590f4258785d2400f709fe532506c53d66a523438c9b90bb431
iwl6050-firmware-41.28.5.1-124.el8_10.1.noarch.rpm
f7ae4f830067f32a5490cacbdebd0f022811b68d698287ab5dcf588bb48e167e
iwl6050-firmware-41.28.5.1-124.el8_10.1.noarch.rpm
f7ae4f830067f32a5490cacbdebd0f022811b68d698287ab5dcf588bb48e167e
iwl7260-firmware-25.30.13.0-124.el8_10.1.noarch.rpm
57928a2dee13f480975971155fd8ccf6c2aa682906c2faddf384be76e523d5b4
iwl7260-firmware-25.30.13.0-124.el8_10.1.noarch.rpm
57928a2dee13f480975971155fd8ccf6c2aa682906c2faddf384be76e523d5b4
libertas-sd8686-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
64c6ce25731f3d460be0d2261259cc3d44318a1092b423e2c1ca00f961aa92ba
libertas-sd8686-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
64c6ce25731f3d460be0d2261259cc3d44318a1092b423e2c1ca00f961aa92ba
libertas-sd8787-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
8d507dc671d066f2a9d87ba3bdab29875b794a6c8b6b5bf10d30f16a6872db0b
libertas-sd8787-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
8d507dc671d066f2a9d87ba3bdab29875b794a6c8b6b5bf10d30f16a6872db0b
libertas-usb8388-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
53226c3a3b9d3d43e14399998f200a1cd134e3f6a17744b12432fe6eedaf5f87
libertas-usb8388-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
53226c3a3b9d3d43e14399998f200a1cd134e3f6a17744b12432fe6eedaf5f87
libertas-usb8388-olpc-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
249e72e6887ab991f1b15b06c9824ad2cb5842fbd18a52924ef943ebc7bd024d
libertas-usb8388-olpc-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
249e72e6887ab991f1b15b06c9824ad2cb5842fbd18a52924ef943ebc7bd024d
linux-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
b0a1f7bc562bbc16fa8815e94f816e479f64758128ac1e3e85ac224d871457bd
linux-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm
b0a1f7bc562bbc16fa8815e94f816e479f64758128ac1e3e85ac224d871457bd
RLBA-2024:8853
cups bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Bug Fix(es):
* cups source rpm doesn't actually build lspp support on Rocky Linux 8 (JIRA:Rocky Linux-54038)
none-baseos-rpms
cups-libs-2.2.6-61.el8_10.i686.rpm
fb6785e1dabf0355a4bd0e3559a6fbadb1d00d2d467d15e1351084bc8aeb34e0
cups-libs-2.2.6-61.el8_10.x86_64.rpm
2767d0ba82dd6fea1960859c83846489745a9e6eaa303e06787e62641add78d9
RLBA-2024:11156
rpm bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for rpm.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
Bug Fix(es):
* librpm crashes when applying the upgrade transaction from Rocky Linux7 to Rocky Linux8 [rhel-8.10.z] (JIRA:Rocky Linux-39894)
* intermittent core dump in hex2bin (librpm.so.8) [rhel-8.10.z] (JIRA:Rocky Linux-39896)
* dnf fails with misleading "cpio: open failed - Not a directory" error message [rhel-8.10.z] (JIRA:Rocky Linux-39897)
* Harden removal code of relocatable packages [rhel-8.10.z] (JIRA:Rocky Linux-49494)
* Unpack failure during update can cause unmodified %config file removal [rhel-8.10.z] (JIRA:Rocky Linux-63069)
none-baseos-rpms
python3-rpm-4.14.3-32.el8_10.x86_64.rpm
25b52c1e3324dc8741399ec8a8c188bfeef54033c7cfb9ffc545d8bad52960ce
rpm-4.14.3-32.el8_10.x86_64.rpm
3de59eb2a2850cf2c39d5940fb285cf7927941cb98e5e2cd623b425b367b1b98
rpm-apidocs-4.14.3-32.el8_10.noarch.rpm
9f4435e9683f32421b40f6b4be125c5b6601ec2125cac85b8ae9e80ba58eed37
rpm-apidocs-4.14.3-32.el8_10.noarch.rpm
9f4435e9683f32421b40f6b4be125c5b6601ec2125cac85b8ae9e80ba58eed37
rpm-build-libs-4.14.3-32.el8_10.i686.rpm
e35fdf491cfc6062fc84842f8abd72aad576efea60f151be568719b4d5f60895
rpm-build-libs-4.14.3-32.el8_10.x86_64.rpm
6580b3ce3e28df8982bc46ea92c10e00832fcfc2b9c8d5f8778c23763bc2ef76
rpm-cron-4.14.3-32.el8_10.noarch.rpm
448282582cf9e29235c9c87a686e07c37c8660c93cfa2d527236eec97c5c5850
rpm-cron-4.14.3-32.el8_10.noarch.rpm
448282582cf9e29235c9c87a686e07c37c8660c93cfa2d527236eec97c5c5850
rpm-devel-4.14.3-32.el8_10.i686.rpm
479e622027d099a904dcc4af6a5f9007346dbf996c76aacbb8d4f026f803f958
rpm-devel-4.14.3-32.el8_10.x86_64.rpm
eceb6adc6d88aa84252e29581707e992cdb9645cd873715eebe3c3c49051ff59
rpm-libs-4.14.3-32.el8_10.i686.rpm
96b022a1097312ca53c5afc599ba5368f7c4af3c11df8311105bf4d3f392cd13
rpm-libs-4.14.3-32.el8_10.x86_64.rpm
231567e147e46a8a6d938086d4a4994a74cc04281ee149d9f89c99a3c098cc78
rpm-plugin-ima-4.14.3-32.el8_10.x86_64.rpm
7beada484e6aef9b336c2b8f1c8e5715d18bc375dbc1ef4d391993d13e28b0bd
rpm-plugin-prioreset-4.14.3-32.el8_10.x86_64.rpm
f61543f8bff989c0a5c00d13f8a0ed7f5c6aec927d4b03635ed9616f63c0ae6e
rpm-plugin-selinux-4.14.3-32.el8_10.x86_64.rpm
d3292350b38063ff167ef5a5bdbe06f6a2005304a18d1faa629756683f55ff6c
rpm-plugin-syslog-4.14.3-32.el8_10.x86_64.rpm
c8e8446f22b080ca4af8f25d0aa605517911563ef35dce245ae56ef7c74f928a
rpm-plugin-systemd-inhibit-4.14.3-32.el8_10.x86_64.rpm
fc141c30d4f77e93a04c60ef21a1d10e9d2494dd1d65054ee92bf3f086ed4f0c
rpm-sign-4.14.3-32.el8_10.x86_64.rpm
95d54de6fe7524a7a57759347a2e33ed58368eea3ff9819b181e53d04fcc9638
RLBA-2024:11159
libselinux, libsemanage, and selinux-policy bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for libsemanage, selinux-policy, libselinux.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libselinux packages contain the core library of an SELinux system. The libselinux library provides an API for SELinux applications to get and set process and file security contexts, and to obtain security policy decisions. It is required for any applications that use the SELinux API, and is used by all applications that are SELinux-aware.
Bug Fix(es) and Enhancement(s):
* Allow dirsrv_snmp_t to manage dirsrv_var_run_t files (JIRA:Rocky Linux-32441)
* SELinux prevents setsebool from doing relabelfrom+relabelto on the policy store [rhel-8] (JIRA:Rocky Linux-55432)
* Semodule changes SELinux labels in /etc/selinux/targeted/contexts/files (JIRA:Rocky Linux-17509)
* Semodule changes SELinux labels in /etc/selinux/targeted/contexts/files [rhel-8.10.z] (JIRA:Rocky Linux-50830)
none-baseos-rpms
libselinux-2.9-9.el8_10.i686.rpm
8ed6249a1247f0b6cfb56b7608c1b9563dd38d674dd6205d1c7205ae38a9f019
libselinux-2.9-9.el8_10.x86_64.rpm
297011524041a22410a94f0dec067c3d7f257fcfbbb17a78a9c66fc253520e5c
libselinux-devel-2.9-9.el8_10.i686.rpm
68d1fdfa9cc43842cc687b94e047ae1b3337041cbddedff36cb443eee2b48b79
libselinux-devel-2.9-9.el8_10.x86_64.rpm
4a26c409aa9c6f25babc60a3d8ad4cd5da111032cafe82f9a9df983648e0542a
libselinux-utils-2.9-9.el8_10.x86_64.rpm
6d10be16370b576600fec25319eabcd140b580639f44b900c2c9409589e02b04
libsemanage-2.9-10.el8_10.i686.rpm
b84aaacc51058337bde5da814ff2b6e9aea25af7eefdba89ccc318dc9f8ec1df
libsemanage-2.9-10.el8_10.x86_64.rpm
79e308a78eb7d93c7159042c776fc406a635aaed89819feca94a8e33f50ce184
python3-libselinux-2.9-9.el8_10.x86_64.rpm
6cba91593cdc2a63dd1c390d28ecbfe9a7b6897491fdf5eb825fa909021fe916
python3-libsemanage-2.9-10.el8_10.x86_64.rpm
b58451d8a78ebaf488888a312a764ce575c730dcc78926e1e9a3537ddea47939
selinux-policy-3.14.3-139.el8_10.1.noarch.rpm
fce729c43955b50150d81e71d5eaa236264180e4c55adff6707a3f427bdcfecc
selinux-policy-3.14.3-139.el8_10.1.noarch.rpm
fce729c43955b50150d81e71d5eaa236264180e4c55adff6707a3f427bdcfecc
selinux-policy-devel-3.14.3-139.el8_10.1.noarch.rpm
8b9ed618521b95f075f3506b7c01c125b5f6f6c5eca28500b85a50e315b00c8a
selinux-policy-devel-3.14.3-139.el8_10.1.noarch.rpm
8b9ed618521b95f075f3506b7c01c125b5f6f6c5eca28500b85a50e315b00c8a
selinux-policy-doc-3.14.3-139.el8_10.1.noarch.rpm
b9ed1283a6f9e5ef1605e801ba034be52175d1bb8f0c150d24699825593bc443
selinux-policy-doc-3.14.3-139.el8_10.1.noarch.rpm
b9ed1283a6f9e5ef1605e801ba034be52175d1bb8f0c150d24699825593bc443
selinux-policy-minimum-3.14.3-139.el8_10.1.noarch.rpm
8b2898ca8fe1248c1d977063dce40028bddb2225b77595a2390868fee5cdbd4a
selinux-policy-minimum-3.14.3-139.el8_10.1.noarch.rpm
8b2898ca8fe1248c1d977063dce40028bddb2225b77595a2390868fee5cdbd4a
selinux-policy-mls-3.14.3-139.el8_10.1.noarch.rpm
518ecb3a323defa00ba39adcd1f21051700ab2c060cbd8ac5b3048d878f5b00d
selinux-policy-mls-3.14.3-139.el8_10.1.noarch.rpm
518ecb3a323defa00ba39adcd1f21051700ab2c060cbd8ac5b3048d878f5b00d
selinux-policy-sandbox-3.14.3-139.el8_10.1.noarch.rpm
41a879af3a0fde61333278b46fd5dcf896f1fe229931762bc4b7e80c511614a5
selinux-policy-sandbox-3.14.3-139.el8_10.1.noarch.rpm
41a879af3a0fde61333278b46fd5dcf896f1fe229931762bc4b7e80c511614a5
selinux-policy-targeted-3.14.3-139.el8_10.1.noarch.rpm
dfc228c719e46e2edcec3427483585477d321b84302c27d01c705b56e2faa3b4
selinux-policy-targeted-3.14.3-139.el8_10.1.noarch.rpm
dfc228c719e46e2edcec3427483585477d321b84302c27d01c705b56e2faa3b4
RLSA-2024:11161
Moderate: tuned security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Security Fix(es):
* tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
tuned-2.22.1-5.el8_10.noarch.rpm
6e53b35ca46aa33a189aa41cb93123c741fa9c28831cdd9f841b03f4e6d3b303
tuned-2.22.1-5.el8_10.noarch.rpm
6e53b35ca46aa33a189aa41cb93123c741fa9c28831cdd9f841b03f4e6d3b303
tuned-profiles-atomic-2.22.1-5.el8_10.noarch.rpm
48819ccae7edfe2b971114be4671e1f4b10f7bada45b1b1aed4bebef05303248
tuned-profiles-atomic-2.22.1-5.el8_10.noarch.rpm
48819ccae7edfe2b971114be4671e1f4b10f7bada45b1b1aed4bebef05303248
tuned-profiles-compat-2.22.1-5.el8_10.noarch.rpm
1867a23e46a28d7260715d8c61718805e4d1a2fba688f503be62f25fd7375f73
tuned-profiles-compat-2.22.1-5.el8_10.noarch.rpm
1867a23e46a28d7260715d8c61718805e4d1a2fba688f503be62f25fd7375f73
tuned-profiles-cpu-partitioning-2.22.1-5.el8_10.noarch.rpm
88b35806ff08946a36935e0cc93f2999043c1651af1718eb95fc57d18b5795c0
tuned-profiles-cpu-partitioning-2.22.1-5.el8_10.noarch.rpm
88b35806ff08946a36935e0cc93f2999043c1651af1718eb95fc57d18b5795c0
tuned-profiles-mssql-2.22.1-5.el8_10.noarch.rpm
69e79c642f0ff489e3ca77131ceb3879681ef63805452934d4077e236bf57a3c
tuned-profiles-mssql-2.22.1-5.el8_10.noarch.rpm
69e79c642f0ff489e3ca77131ceb3879681ef63805452934d4077e236bf57a3c
tuned-profiles-oracle-2.22.1-5.el8_10.noarch.rpm
ecf802f60c557c3ea3ea398b06646ca010be75c5dbc9bc9d14a2092fa932867e
tuned-profiles-oracle-2.22.1-5.el8_10.noarch.rpm
ecf802f60c557c3ea3ea398b06646ca010be75c5dbc9bc9d14a2092fa932867e
RLBA-2024:11481
kernel bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
(Rocky Linux-62796)
(Rocky Linux-64073)
none-baseos-rpms
bpftool-4.18.0-553.33.1.el8_10.x86_64.rpm
afc35653779ac42a1341741fff2896447745a4e1d4c40a8d579af9bc2f457b63
kernel-4.18.0-553.33.1.el8_10.x86_64.rpm
69a949d3e757add1f1ffb972170f874536aded2807825bd2f798c6e29a8d94eb
kernel-abi-stablelists-4.18.0-553.33.1.el8_10.noarch.rpm
efb8d6f0fa4e7d9b4e1d9c9d4641a63bdf262c58a04a34925c00a41ea94fe125
kernel-abi-stablelists-4.18.0-553.33.1.el8_10.noarch.rpm
efb8d6f0fa4e7d9b4e1d9c9d4641a63bdf262c58a04a34925c00a41ea94fe125
kernel-core-4.18.0-553.33.1.el8_10.x86_64.rpm
a373eb70046ecaca076c5f0940f0739941d8171fbb4e465e9f7d5d77035117de
kernel-cross-headers-4.18.0-553.33.1.el8_10.x86_64.rpm
6e0623b92e06ed6226c70e42a9d0ee374aa4474d3bee650099d0dbeefbe4b140
kernel-debug-4.18.0-553.33.1.el8_10.x86_64.rpm
b169c0560ce5783efdb7b3cfd9fd8ddb3bfd000cf59a01e7e8d73a31e7ae3634
kernel-debug-core-4.18.0-553.33.1.el8_10.x86_64.rpm
1f54c010bb3ef0e8d4e785383d4bc8821f165ed57a088300b21237d2ebfd168a
kernel-debug-devel-4.18.0-553.33.1.el8_10.x86_64.rpm
c6c36f032a1d51aedaf4d89b3a93a8f048f1ee30d4988e4f74899e778b67f69d
kernel-debuginfo-common-x86_64-4.18.0-553.33.1.el8_10.x86_64.rpm
1ac0ed16156b8cb5915b26c71d089d9ff4a39ab141a35cebcac48b5b30226f9a
kernel-debug-modules-4.18.0-553.33.1.el8_10.x86_64.rpm
f23e5d7db34485e0b88a384bd90baf95dcab329cb17e42eb31ebcc9ca6c711ac
kernel-debug-modules-extra-4.18.0-553.33.1.el8_10.x86_64.rpm
2d55ae2cab560058a8c9fc0afc9ef34db6399f323e722f590209fcafb03e0a95
kernel-devel-4.18.0-553.33.1.el8_10.x86_64.rpm
165d430ffd7cde0754ea9e49906f4710963e23ee656498330e0b8a14373b71df
kernel-doc-4.18.0-553.33.1.el8_10.noarch.rpm
f47fc3d1dffa950c2c7a14e3fdee33145ad32ab69b0e0093ee8c5d417c3251ae
kernel-doc-4.18.0-553.33.1.el8_10.noarch.rpm
f47fc3d1dffa950c2c7a14e3fdee33145ad32ab69b0e0093ee8c5d417c3251ae
kernel-headers-4.18.0-553.33.1.el8_10.x86_64.rpm
582ad53a77515ec6de646e6f311ef969177a719e9ff40b565d67c966115bbe9b
kernel-modules-4.18.0-553.33.1.el8_10.x86_64.rpm
90c72be00e0e1ba5d46a89f6a9fd60f1ccb2a7db23dbce8c4cef43a4951815e0
kernel-modules-extra-4.18.0-553.33.1.el8_10.x86_64.rpm
ac0ac68967a64b399df7e68708100d4ca800fd4262fdfb87cdead810ea7aa394
kernel-tools-4.18.0-553.33.1.el8_10.x86_64.rpm
92ca5373f469aec0bdf7eb3cf6098a79140a96664008465e4369812a4db33720
kernel-tools-libs-4.18.0-553.33.1.el8_10.x86_64.rpm
ea60573ac7593a91cf2b53b21ef949f9034051dc93fc9654288d636de0dba5d1
perf-4.18.0-553.33.1.el8_10.x86_64.rpm
b0deb764c80f665e71c72459360ebfb92876b6f5b011e32aabd31d45421eda37
python3-perf-4.18.0-553.33.1.el8_10.x86_64.rpm
86ed4245bf6c35c2a71631918e8f78b358628d892f7363815371c2b4ce433978
RLSA-2025:0288
Moderate: Bug fix of NetworkManager
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Security and Bug Fix(es):
* NetworkManager: DHCP routing options can manipulate interface-based VPN traffic (CVE-2024-3661)
* Route to VPN server not stored in routing table that is specified by ipv4.route-table (JIRA:Rocky Linux-73051)
* VPN connections do not support ipv4.routing-rules settings (JIRA:Rocky Linux-73052)
none-baseos-rpms
NetworkManager-1.40.16-18.el8_10.x86_64.rpm
cac81a43a966f1451910725f2380c076c94b6a9757bc9125eb29004a5d262823
NetworkManager-adsl-1.40.16-18.el8_10.x86_64.rpm
5c4ddcc88eb0b41b77df5bdd173995b75d6119250796e278a324fb06945a325f
NetworkManager-bluetooth-1.40.16-18.el8_10.x86_64.rpm
d2f4e0730edc5682b3e19652d4954762bfaa7c465ce07e87bfe7cda6c21b68b9
NetworkManager-config-connectivity-redhat-1.40.16-18.el8_10.noarch.rpm
b105a59a11f8ea1c2a48d584db2a1eae8c6d84c1cf7b81a394e29ea9410cc796
NetworkManager-config-connectivity-redhat-1.40.16-18.el8_10.noarch.rpm
b105a59a11f8ea1c2a48d584db2a1eae8c6d84c1cf7b81a394e29ea9410cc796
NetworkManager-config-server-1.40.16-18.el8_10.noarch.rpm
cedc05d41da491789a9ee832214ee3aa3bcd54adcd4382d8f4b8944f826532e2
NetworkManager-config-server-1.40.16-18.el8_10.noarch.rpm
cedc05d41da491789a9ee832214ee3aa3bcd54adcd4382d8f4b8944f826532e2
NetworkManager-dispatcher-routing-rules-1.40.16-18.el8_10.noarch.rpm
4aa41b7051d041cbb85f08011ca5037f0ec7547c41ce4a3502553102aab4f76e
NetworkManager-dispatcher-routing-rules-1.40.16-18.el8_10.noarch.rpm
4aa41b7051d041cbb85f08011ca5037f0ec7547c41ce4a3502553102aab4f76e
NetworkManager-initscripts-updown-1.40.16-18.el8_10.noarch.rpm
00794fede7b74228b81a9d5d8f85fce5081862cf3fe10c13b974f3f37c13dd48
NetworkManager-initscripts-updown-1.40.16-18.el8_10.noarch.rpm
00794fede7b74228b81a9d5d8f85fce5081862cf3fe10c13b974f3f37c13dd48
NetworkManager-libnm-1.40.16-18.el8_10.i686.rpm
90b744f140513261ce387e9158a8c624384580dbcbc3e5bff8ab040edd798a0c
NetworkManager-libnm-1.40.16-18.el8_10.x86_64.rpm
80f20fbcf190d587cd31f162b4a50d0cb44e242b46c2e3dc724b953becffacf5
NetworkManager-ovs-1.40.16-18.el8_10.x86_64.rpm
b3e8ed8fa70067bdb9152510580f8b526af9f05bb2001fcaf177a52afa4b7968
NetworkManager-ppp-1.40.16-18.el8_10.x86_64.rpm
68b9724ecbaacc77bb104da708c37cb605117e84f8cf815bbe4101afc20216eb
NetworkManager-team-1.40.16-18.el8_10.x86_64.rpm
d44bf69f5661479a6463d13c072db19c9ba6f70e39efec4f1a6a600f9f7fe048
NetworkManager-tui-1.40.16-18.el8_10.x86_64.rpm
5919988022ca3be3eb00d3498319d86a3b4ad744bc6e3e4ae7e3e4094447f4f6
NetworkManager-wifi-1.40.16-18.el8_10.x86_64.rpm
b5ab07694dcbe967d23c4e58272c9db8e65b9cd533f91908e061ea8067a75dae
NetworkManager-wwan-1.40.16-18.el8_10.x86_64.rpm
c60b9439669be8d1247599468d9c8424ef0bd43f9d5415479201b7b3d1e2cce2
RLBA-2025:0728
glibc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Bug Fix(es):
* glibc: Incorrect relative paths in glibc-debuginfo [rhel-8] (JIRA:Rocky Linux-63048)
* glibc: string/test-strncmp-nonarray segfaults on aarch64 [rhel-8.10.z] (JIRA:Rocky Linux-61255)
* glibc: string/test-strncmp-nonarray segfaults on ppc64le [rhel-8.10.z] (JIRA:Rocky Linux-61259)
* glibc: z13 wcsncmp implementation segfaults if n=1[rhel-8.10.z] (JIRA:Rocky Linux-49490)
* Some issues with iconv in glibc for GB18030-2022 encoding [rhel-8.10.z] (JIRA:Rocky Linux-67806)
none-baseos-rpms
glibc-2.28-251.el8_10.11.i686.rpm
0249a9b4d83bae8771b4210aace3883246b9607f71a21791c597d5bacaf93168
glibc-2.28-251.el8_10.11.x86_64.rpm
f5e92b079f70a4e208fda1de5855496808829560e42d9eb4b00e43299e0320f4
glibc-all-langpacks-2.28-251.el8_10.11.x86_64.rpm
08dcfc44150433437dcc5c0feaae3e05c59df032dad91d229d77e676dfc382fb
glibc-common-2.28-251.el8_10.11.x86_64.rpm
849d5abb4477f56701e53a1fc277f7eadfd9dfc0aa1f8eae0bb85caf9f4914a7
glibc-devel-2.28-251.el8_10.11.i686.rpm
05e124511a8b52e6472996ca109e9d4fc09bff4878030a4a310bb653917aa42f
glibc-devel-2.28-251.el8_10.11.x86_64.rpm
808e22ff94a58eed442186722392fed03052348ab9f7bdd77df56895b714b912
glibc-doc-2.28-251.el8_10.11.noarch.rpm
3a7120c1d53cf98ed6bcb9510604c821d067896637d36a1a39cfdf1de3cf7ffe
glibc-doc-2.28-251.el8_10.11.noarch.rpm
3a7120c1d53cf98ed6bcb9510604c821d067896637d36a1a39cfdf1de3cf7ffe
glibc-gconv-extra-2.28-251.el8_10.11.i686.rpm
ac28c2e9b67adb80c5e3f757755018e1f6a1c7a6dc0624a281a3a787dd2e594f
glibc-gconv-extra-2.28-251.el8_10.11.x86_64.rpm
5476f1e598f9c800d18fd39c820f03a12a7d63765ca02461f55785bdb37bbb00
glibc-headers-2.28-251.el8_10.11.i686.rpm
cd9f788d58d41409cf95f4d7b5d4dab20fe78c3fe9a33128130b05cc761d4a03
glibc-headers-2.28-251.el8_10.11.x86_64.rpm
45b5cb075caeb5854319094a087da6431d5f85a33b0c2027e7c190bc053bc1e4
glibc-langpack-aa-2.28-251.el8_10.11.x86_64.rpm
1b55fe55cb20796df617fbfce1164c60115ac2eb1ac96599cb8aeb14866485e3
glibc-langpack-af-2.28-251.el8_10.11.x86_64.rpm
842bd38c5b57706e18b441c7812ca7a559cd381d528197f915bcfa305bda50c5
glibc-langpack-agr-2.28-251.el8_10.11.x86_64.rpm
64e03dc27225ededa298b009166b51a1c4936c4a2a6158f52c484d1c1b53f477
glibc-langpack-ak-2.28-251.el8_10.11.x86_64.rpm
c0a0b04dcc29943e11801529c7f893ba4bb410894e8a49f4deed2043c833e378
glibc-langpack-am-2.28-251.el8_10.11.x86_64.rpm
04eca3c6f70b9d4c306a53d2538be0011cbc2db885d2e59c42ea2cf4f54f75b5
glibc-langpack-an-2.28-251.el8_10.11.x86_64.rpm
84472cb55b4859285690e553113e28671d65c0cee12a2cd05c64ba1dc307c2e7
glibc-langpack-anp-2.28-251.el8_10.11.x86_64.rpm
9ff6fa182916162b5eab778eae00f1bf3e15c161f6a2fcc6b62560a299e6b701
glibc-langpack-ar-2.28-251.el8_10.11.x86_64.rpm
f13f41d27fedf6d123f4459c341a1ddf5350b15b3308b49148844c1959e3fe04
glibc-langpack-as-2.28-251.el8_10.11.x86_64.rpm
05030859aba8294467075a8ebfec8a35944884c0ea3ff4e2faa42ddf567dc32a
glibc-langpack-ast-2.28-251.el8_10.11.x86_64.rpm
a5072ef8d985c4f95b0ea681abab6b7b7a5a0d95cc7d5ea01cdf9778e3857010
glibc-langpack-ayc-2.28-251.el8_10.11.x86_64.rpm
e286c5567720b489f51c6eb5a194e841d6354094ca5d00d91abee6a7e604390b
glibc-langpack-az-2.28-251.el8_10.11.x86_64.rpm
67af6037319a9d14c8a3e8d38e8c1b5503942f5488c95478cc146622fd74687e
glibc-langpack-be-2.28-251.el8_10.11.x86_64.rpm
7827c4bd053b82db2bc1ca56acd2adf62c2c7b95ce24d5813851138a7c77d79c
glibc-langpack-bem-2.28-251.el8_10.11.x86_64.rpm
61d9c0457a55360354c84194e668d4ca5e6225e86931c650249e8eb0f8d010f9
glibc-langpack-ber-2.28-251.el8_10.11.x86_64.rpm
2d439e97d3e5ba3ae3745174bfdf06cd6346940bbe8ebfd8d9b9f4e365171492
glibc-langpack-bg-2.28-251.el8_10.11.x86_64.rpm
07d9379153337b464617761b8d73f6df87b4c5ee1b9d719432d500b7901c2b94
glibc-langpack-bhb-2.28-251.el8_10.11.x86_64.rpm
a1cfb3349d8126ad4ca97c8c76e61479daf8a31e4a1191f96c18a3c7da7b8652
glibc-langpack-bho-2.28-251.el8_10.11.x86_64.rpm
da4c8abe3c2a62b98de1956b52b7506dec1fc56dbf79796d6ce60407d6a62e82
glibc-langpack-bi-2.28-251.el8_10.11.x86_64.rpm
50ac2d9a1ce79eae57d7acbaab5716bdcaeec63751451137d6205f8adc1c54ea
glibc-langpack-bn-2.28-251.el8_10.11.x86_64.rpm
e577703e3c550f79d16ceb762b4a2a711419cc28e43f14856f32c82684053544
glibc-langpack-bo-2.28-251.el8_10.11.x86_64.rpm
ed8bf109680e511bd40fe72efc591f6c683fd5c7d9991a6c93be487453391389
glibc-langpack-br-2.28-251.el8_10.11.x86_64.rpm
c9591005caf1ee3e4bce832facd15e774d98cf9c974554bc8d24a8a575339cf0
glibc-langpack-brx-2.28-251.el8_10.11.x86_64.rpm
88414d0246672750e891897f88a1a7fa52ae6ca3472d12173b3c399c215f7b33
glibc-langpack-bs-2.28-251.el8_10.11.x86_64.rpm
4622351ac6b5565e01b716c34f2341795f9add2e52c1c97b079198aa0cb3c01a
glibc-langpack-byn-2.28-251.el8_10.11.x86_64.rpm
9fa86d4dab216846a1b2b768f30c5ff3ada5468c78d9760d5733f1a6bb510548
glibc-langpack-ca-2.28-251.el8_10.11.x86_64.rpm
b3817a8c670ae32d9294bcd02df7902baab87b11b59594216776cd795b1bd5b3
glibc-langpack-ce-2.28-251.el8_10.11.x86_64.rpm
4644c0c6944bab67c5083f96f600cc86879f6184fbafd5047f38571fa63654e2
glibc-langpack-chr-2.28-251.el8_10.11.x86_64.rpm
382076224d3f351376cb06fb4860dc140bc29500a3836780d3bf0b135bd8f1ed
glibc-langpack-cmn-2.28-251.el8_10.11.x86_64.rpm
0fb14585ffb70dd91bcf68143079dfd89093317f7490eb5f0fba1b5f536dbef9
glibc-langpack-crh-2.28-251.el8_10.11.x86_64.rpm
d015ec384f787a9276fdf35fa1fbafbd31811b245a8cad7271033d23283ce518
glibc-langpack-cs-2.28-251.el8_10.11.x86_64.rpm
5bb95e65eb2aec904d3207c6d0a198ebbc828cf29dcc37ab14ebb703c7658a32
glibc-langpack-csb-2.28-251.el8_10.11.x86_64.rpm
5211fa9b4629ba09eee927c60d1513f759769bc7be5ce156c64a9398ea356aca
glibc-langpack-cv-2.28-251.el8_10.11.x86_64.rpm
f8b85738dc9089f4bd24016a4d522988b83b0fe7dd2914f3a22361ef1a3e152f
glibc-langpack-cy-2.28-251.el8_10.11.x86_64.rpm
bb6044960cafb9bc4c78e010367c86542bdf5ffb29d8f751b9d81243a1d76b59
glibc-langpack-da-2.28-251.el8_10.11.x86_64.rpm
4b8ecd5ade0db6196b2a793b8f6b56c11c19cb34608dc066a6f2bbbeffd1f753
glibc-langpack-de-2.28-251.el8_10.11.x86_64.rpm
4a658677e16f0449b7bdb454f95971949a67ff0ff2de25fc71030d0ddbc5b3d0
glibc-langpack-doi-2.28-251.el8_10.11.x86_64.rpm
7839473acb93fb5763807bef7a0b0c66f6ca45aabf5b48d6671e67de8729dc0c
glibc-langpack-dsb-2.28-251.el8_10.11.x86_64.rpm
e7efc148b42293ae463bf7545cd4ef02cf6eb78349342e878f03b39f7a2a0d2d
glibc-langpack-dv-2.28-251.el8_10.11.x86_64.rpm
7ae2f3bde6688f635d2c3ef017a68a7088e6c5be88133d46f0ecbf8daa21b66f
glibc-langpack-dz-2.28-251.el8_10.11.x86_64.rpm
a2e007e4ea55f7b6e46c8984ea4719f00842f627a483504f685e13efddbff866
glibc-langpack-el-2.28-251.el8_10.11.x86_64.rpm
b69f80b63d6134206cfdf50792821d31d589fa75ecc18910ac680686924d6a29
glibc-langpack-en-2.28-251.el8_10.11.x86_64.rpm
04409dd5509af51466c62c51a28dd8d0585f3694b2ea2d87f9dc80bce9838e46
glibc-langpack-eo-2.28-251.el8_10.11.x86_64.rpm
ce3ae5c2211d0bb69b6d41a185d26588e7ba4fd26ffe0ad69d6d35c8af7825ef
glibc-langpack-es-2.28-251.el8_10.11.x86_64.rpm
b703466f6f7bd2c8a72b5aaa81a1540221d13d538712aaa914ab7baaac929180
glibc-langpack-et-2.28-251.el8_10.11.x86_64.rpm
0e87c0db04a772355ce0e8577d3ee9e9db6ae7303e37dd1de99e91d0d862705f
glibc-langpack-eu-2.28-251.el8_10.11.x86_64.rpm
5c94d367799b9f583e1ad99393258a2030ae244c72f698f09b2dc6199f0fedf9
glibc-langpack-fa-2.28-251.el8_10.11.x86_64.rpm
e064bfe6d7c436fee8864f3ca999b88a8f9fe12b1edd97d3a46012a480cf45da
glibc-langpack-ff-2.28-251.el8_10.11.x86_64.rpm
101472d6cc17d7e13290bafe7035af2f4617828c8febd055d6c3236f2d0dbd4f
glibc-langpack-fi-2.28-251.el8_10.11.x86_64.rpm
d02cffb72dbaa4e7b43ea724e471ba303d2aa150e1df519592e9505861c1274f
glibc-langpack-fil-2.28-251.el8_10.11.x86_64.rpm
183b2888ba9a42a0e0b14c48807bb113301525c0ed5c7d61b405c82e691f1b0f
glibc-langpack-fo-2.28-251.el8_10.11.x86_64.rpm
23cba993fa7b2b40ac446fe2bb1eb2baa14caab158eedc5e1c8208aaf458a9c4
glibc-langpack-fr-2.28-251.el8_10.11.x86_64.rpm
0c474c1c09b348ff11426d274c6d2c68b12b33393a0baad45fad53ba947ee6c9
glibc-langpack-fur-2.28-251.el8_10.11.x86_64.rpm
4eba3352ca1fd309d47f8b4cd667feebb8898847a30fd4bedd09d1a4590af593
glibc-langpack-fy-2.28-251.el8_10.11.x86_64.rpm
2adf5404f8f2699923500aad414c191f21db35975aee82c6ad58531ff758ebb4
glibc-langpack-ga-2.28-251.el8_10.11.x86_64.rpm
e386c67d65e071ff0b8d86aa4e2796a69b9c3b13461ee487857c13efa946a304
glibc-langpack-gd-2.28-251.el8_10.11.x86_64.rpm
d61c809174d79c335ab532a31b0fe4d579f4395cd198ba9125f290bad1db3e7e
glibc-langpack-gez-2.28-251.el8_10.11.x86_64.rpm
3ad71a1436a2f7b57853210aa57e2968874a4d35a562d8b3c1bac428c9b0b05b
glibc-langpack-gl-2.28-251.el8_10.11.x86_64.rpm
74ec9a3c17f6b406bb348f53324e8af7b1444a05e154fec6e8347b4a093ba944
glibc-langpack-gu-2.28-251.el8_10.11.x86_64.rpm
ca1d943d73adcb352d5c697cef3fe09a7883168be5af2e9df5efcea82a3c61e6
glibc-langpack-gv-2.28-251.el8_10.11.x86_64.rpm
f384a0c8c344c227317ccd051c63520b2bde25049553bd5eb7db332044065a25
glibc-langpack-ha-2.28-251.el8_10.11.x86_64.rpm
52fc553fa36bcba15c8a0ed274c91c3a873e07e75ce3dcad77f6325ed634218e
glibc-langpack-hak-2.28-251.el8_10.11.x86_64.rpm
9d4250394572b183bf4bd27b720b900f8b4e0cf301ed55dcf808a51f5b146118
glibc-langpack-he-2.28-251.el8_10.11.x86_64.rpm
062156503663c07366cbffb69f88e76109c9034b011fb824bb5398d9d19df458
glibc-langpack-hi-2.28-251.el8_10.11.x86_64.rpm
7c74f31fa2855cf6541d171318bd1b0182a7cfdd2b6826a5974709ff850444c9
glibc-langpack-hif-2.28-251.el8_10.11.x86_64.rpm
13820d6bfa166bf1c144333d298ed63714e4c399043c6077eebb6f30742dc9b3
glibc-langpack-hne-2.28-251.el8_10.11.x86_64.rpm
b698075bcc1bdebb863843c8066a1a710541a63e63ebf597da4cc33ab3e33c78
glibc-langpack-hr-2.28-251.el8_10.11.x86_64.rpm
8f41ce9d28dcca938a4d7f65a8fc7c2e75efcaf1d5e7dee1bb19cf3cbcdaaaf2
glibc-langpack-hsb-2.28-251.el8_10.11.x86_64.rpm
c9fa70d70d0ade3be415d42a2e60e242f52d39dbec7464466bb92b2c4149bc60
glibc-langpack-ht-2.28-251.el8_10.11.x86_64.rpm
0fd8fdb95a8cea21577330ec4571104de42e9f2446a62a8635202641935c50a3
glibc-langpack-hu-2.28-251.el8_10.11.x86_64.rpm
9c8c1ef6f5697c2743888c32f977165a8bfc22f0d67f50150b563731915073fa
glibc-langpack-hy-2.28-251.el8_10.11.x86_64.rpm
ef024a3a0df92d3140ba9456b30429fcb8a4272137da966bdeaf8b4a20f56607
glibc-langpack-ia-2.28-251.el8_10.11.x86_64.rpm
604a31950a1f1efecc7dd3e88985c5bd3e73dfd216d74acc0842bc5379ae3f36
glibc-langpack-id-2.28-251.el8_10.11.x86_64.rpm
7041052ca1b21d14d437df7f8e8a310aabcce56e794bf6fbafd6717bfe390e7e
glibc-langpack-ig-2.28-251.el8_10.11.x86_64.rpm
e3dd564643b00d28fe557d1e9676c16b77e630fd7d49eb136c452fa586f47cbf
glibc-langpack-ik-2.28-251.el8_10.11.x86_64.rpm
6dcc217f00295bb8777fdfd8375c3cbc62dc510b97c2a333ed92da2e4ba8519a
glibc-langpack-is-2.28-251.el8_10.11.x86_64.rpm
3db0a4b8597b81b1cb4d45fa26c612345f5b7baa2eb19e43111b4b1350c20a9c
glibc-langpack-it-2.28-251.el8_10.11.x86_64.rpm
516209affde993cbcb401775627d3679d0795811fc02a71cd079a9aad952defc
glibc-langpack-iu-2.28-251.el8_10.11.x86_64.rpm
639aa547d86a55cd08eefe8be417aa637249a43a50cbe01ee295868eaa6a184e
glibc-langpack-ja-2.28-251.el8_10.11.x86_64.rpm
c2bdbc7ff2d15f11087f082c84fc1903be9a45cd637e78dd19e56bd28dac3cf8
glibc-langpack-ka-2.28-251.el8_10.11.x86_64.rpm
8195d675cbe8b896b15ad54bb25f80312d7aa6a4111a59b1a3ee4a1b19cc884b
glibc-langpack-kab-2.28-251.el8_10.11.x86_64.rpm
3d2cd188b5a5332f27a07474b9a664bac100636dcfca7d318da42d3591a9c270
glibc-langpack-kk-2.28-251.el8_10.11.x86_64.rpm
240c06aa5fb51ef2375437d1643cbd3716c6df5148c0d4365f0ee2f0d4e9227d
glibc-langpack-kl-2.28-251.el8_10.11.x86_64.rpm
2f1a302d7b0b8f8308571e10e802830d1f8d312a9ff19776f3e6328fc44f535a
glibc-langpack-km-2.28-251.el8_10.11.x86_64.rpm
625b7ad6a487085406f49b5438c4a5b02a5ef18cbe54e68ad38fa2bbbc77c107
glibc-langpack-kn-2.28-251.el8_10.11.x86_64.rpm
0159aa131d5f0cb9a688a3e01edd54f8a1ec18fc3c7eedfd2a0470453c0c2831
glibc-langpack-ko-2.28-251.el8_10.11.x86_64.rpm
117315b1d2a08f58581ad71656c0bac0e7f439210a03e993de4cccf11479b81a
glibc-langpack-kok-2.28-251.el8_10.11.x86_64.rpm
1415b0b17586a8cfe15c31e2888fef6b0c6090d9ee29c305bc0daf6e3d135e3d
glibc-langpack-ks-2.28-251.el8_10.11.x86_64.rpm
8e584357c47da045f8c374d37845dbf5720c67ded3637c2d86ccbca40d78cdf8
glibc-langpack-ku-2.28-251.el8_10.11.x86_64.rpm
885a70164f49385b647ff621eabe4bc24c9f015947db76ffb67ccc20d46b5fbf
glibc-langpack-kw-2.28-251.el8_10.11.x86_64.rpm
2dd746eebbd59eca2cae29fbc01331e5619036199ee59355f84a49b5c2d79d95
glibc-langpack-ky-2.28-251.el8_10.11.x86_64.rpm
8c41da4bfaae3fa6e00681c463290caab7723a78b5d468e5e890e18cec488dbe
glibc-langpack-lb-2.28-251.el8_10.11.x86_64.rpm
631ad9b48b0f3a5a3b70e9d594faf480255c676aeeab48f4ca2f98ac249cb8f5
glibc-langpack-lg-2.28-251.el8_10.11.x86_64.rpm
76e9d470e8c06be0a9737f3dbc5e58688c3927b8055b3a4e2dbbba6fc6f22a89
glibc-langpack-li-2.28-251.el8_10.11.x86_64.rpm
91764a63c29b2f0275e97317882c3c017ced58d2ec3d94656a2f5fe3c8c810c1
glibc-langpack-lij-2.28-251.el8_10.11.x86_64.rpm
8376e32737f0bd7d129be3f4c3390b5f68cbe0102b855ad83426c06a7f468ff9
glibc-langpack-ln-2.28-251.el8_10.11.x86_64.rpm
61e658de6f9e50e40c3b42aab63b9ec5b1a07819f1a99917a8ef2f17ce39a4ad
glibc-langpack-lo-2.28-251.el8_10.11.x86_64.rpm
04329e1006d2359a12a0e6429d9c51b19b0d70a696f41dba3f9a3b57f802ccda
glibc-langpack-lt-2.28-251.el8_10.11.x86_64.rpm
6cd9ef290bb532156af22fae0d821d96780a88349469e3f1ebe65357089b814e
glibc-langpack-lv-2.28-251.el8_10.11.x86_64.rpm
47208d9bc7933696e499145271def64f4df5f7585dfc986300ffa6fab002e532
glibc-langpack-lzh-2.28-251.el8_10.11.x86_64.rpm
7c5a79b95a1226156f2b02ad96b6d2e37ba15fd895d5a16103e9f46c4752fcb4
glibc-langpack-mag-2.28-251.el8_10.11.x86_64.rpm
e50bc7da5e309ff4d1287db1684fcf8ff5878deb7b70a0df3b983d32775e8071
glibc-langpack-mai-2.28-251.el8_10.11.x86_64.rpm
5684c4956d53060f5bd963f9db7af403bdad53df7e43aa9fcd29c3cdf0a6fa17
glibc-langpack-mfe-2.28-251.el8_10.11.x86_64.rpm
faa55275fb8dce5f317c1ab8d9b8c464ee94aeef88cc7da7e7cd6f2f1c675557
glibc-langpack-mg-2.28-251.el8_10.11.x86_64.rpm
4852a1293ff4154045996559d0b89d953f7fa8093fbb0771d16ad0d157d45dfa
glibc-langpack-mhr-2.28-251.el8_10.11.x86_64.rpm
12337a695f4b6891220c04d325e75c79777e8247eb0bfbb1dc95a27b4358df05
glibc-langpack-mi-2.28-251.el8_10.11.x86_64.rpm
a209757919dcbaf35c7b72b60e2b71f4df97d0999c41bbeee39e5b47f306ab99
glibc-langpack-miq-2.28-251.el8_10.11.x86_64.rpm
68ea0ba1570e60638e650d1c731d44093cc48b342ff7a05f86bb06465abb457d
glibc-langpack-mjw-2.28-251.el8_10.11.x86_64.rpm
90d8f1ff0b11867355d5c1ccc69a8facc2fffff5a02d079a44f1cb6bb733bc01
glibc-langpack-mk-2.28-251.el8_10.11.x86_64.rpm
3f32b00c854154153922e481c8937178ddbdcbe4540817c4bc52b7912581540f
glibc-langpack-ml-2.28-251.el8_10.11.x86_64.rpm
07ebf1db40dff85c3871d26c00ca1ec615713b3bb19ea859ad9c9ef09a53fab6
glibc-langpack-mn-2.28-251.el8_10.11.x86_64.rpm
5ed806bb789fd118fc0645a44847dd1efa376c3f9ddb1a836ae4d461a2e3b165
glibc-langpack-mni-2.28-251.el8_10.11.x86_64.rpm
c77aa384a6e4db3f7ac4331cb9f69a14259518fa012a5b77aa3f8b5ff003267a
glibc-langpack-mr-2.28-251.el8_10.11.x86_64.rpm
9aaf57dc7037ac227f96d1cf6c76b65a51aea12f0ee0b86f6e6fe4190b8861fb
glibc-langpack-ms-2.28-251.el8_10.11.x86_64.rpm
7fe7e1d95ab2027d7b582ee53cb11f00e59154e5383a329498d4a1c84ac67084
glibc-langpack-mt-2.28-251.el8_10.11.x86_64.rpm
d5b0f5e2c25661a418b636b8613b7bc1ed40c264b26f917bfbf9f27f2b84b39b
glibc-langpack-my-2.28-251.el8_10.11.x86_64.rpm
23e7c40aa564662da3b66046f59754371feb773c8499e18b0138dc8eb18470fb
glibc-langpack-nan-2.28-251.el8_10.11.x86_64.rpm
0424deabea1d51b817d68b00e52f37b1bc86b95244c16245bf7406f007e17a65
glibc-langpack-nb-2.28-251.el8_10.11.x86_64.rpm
40d064579f84d545d5786f6140effb461e32b5e93a21915d0cfd64a904fd8d6a
glibc-langpack-nds-2.28-251.el8_10.11.x86_64.rpm
fb99df7932c82bc8c9d09511b3449aa42f5dce20106e5e786eec2704fd8c62be
glibc-langpack-ne-2.28-251.el8_10.11.x86_64.rpm
4e065ac8b806839ac3c0b00d5f2c09b15f2a6671cfb4f5bf1436517c1083fa8d
glibc-langpack-nhn-2.28-251.el8_10.11.x86_64.rpm
44830c39bd57493750ff990c8f7a967d4bc856e99477416376b3416608dbc35b
glibc-langpack-niu-2.28-251.el8_10.11.x86_64.rpm
2ee3db57c6ca6f9a7e01e109f29aa2e1d020f09cbaea15bcfab680543c56b099
glibc-langpack-nl-2.28-251.el8_10.11.x86_64.rpm
2ad568484aac26c842eedbee6b32fb9d619a251a51d9334cc7ed96b362fc8d86
glibc-langpack-nn-2.28-251.el8_10.11.x86_64.rpm
f39acdc98827bf00a08107a90fb32fc023aaa7c0954fa97dd33277af188b5f5b
glibc-langpack-nr-2.28-251.el8_10.11.x86_64.rpm
cbb071a81dacdd7e4471cc5d951f4c1b67ce3f64c7041d4af9e58a207daea7a6
glibc-langpack-nso-2.28-251.el8_10.11.x86_64.rpm
528511c32a06d4d70527cfbd8badb54e85b08e8e071dce80a5d0665129b2cc6e
glibc-langpack-oc-2.28-251.el8_10.11.x86_64.rpm
39183a9951d4bc8358b921856220ea52d6284213c8918ce088848ddf2436feda
glibc-langpack-om-2.28-251.el8_10.11.x86_64.rpm
0daa5044dbf074927b01b4a41c128f066a02a582b74e0c372ed6cd9945864f75
glibc-langpack-or-2.28-251.el8_10.11.x86_64.rpm
8c4f894571552a22578fdedd87c1fe06bb9c8c423e9da59421bf37f143827cff
glibc-langpack-os-2.28-251.el8_10.11.x86_64.rpm
92b6665695320cbea8ca4876f7eb41c509ec770ca81e6a3f0c09af1b09db253c
glibc-langpack-pa-2.28-251.el8_10.11.x86_64.rpm
17e8bfda8db7dca86d8ba89edf2b94dba6bb643a51d7c3696437d41d1cb62c83
glibc-langpack-pap-2.28-251.el8_10.11.x86_64.rpm
5f121a2daf52e85620879790babaf886f6114b680e8931efc7709a6e77558d3e
glibc-langpack-pl-2.28-251.el8_10.11.x86_64.rpm
b30a32da61c39c1609d9c29409f38dda0b6925abfebbd16e0a4df528295d2b7f
glibc-langpack-ps-2.28-251.el8_10.11.x86_64.rpm
a4acaaf400e11a7d4d387303a3a68491a77137e149e5f6b8cd5596f482da7680
glibc-langpack-pt-2.28-251.el8_10.11.x86_64.rpm
e7606dbedc2a186f13fedf2a90f4bdc024e642897f8b99a7b3759da3f656d406
glibc-langpack-quz-2.28-251.el8_10.11.x86_64.rpm
49f0db3f441346cdd4428cdd7ca0c071bd028d275208f668ce1474f02c026079
glibc-langpack-raj-2.28-251.el8_10.11.x86_64.rpm
b30634f4e260dc7084e3df18f71aeec168605060047415c854517f1cfcfac1fa
glibc-langpack-ro-2.28-251.el8_10.11.x86_64.rpm
623a207c70b327128bfbd7a104ad8b32deb2bbc61ad90a6756d0d7cf8d429645
glibc-langpack-ru-2.28-251.el8_10.11.x86_64.rpm
b5cd86a14443b18ff75a92469dad937646b1ba7cc60735518daeb2f69dfa9e46
glibc-langpack-rw-2.28-251.el8_10.11.x86_64.rpm
c2230d74dad1c3bce1d9c8109853039a1ef550c6783ea3b77d9607c180d0deac
glibc-langpack-sa-2.28-251.el8_10.11.x86_64.rpm
f40dffb41c09343513aa2bc3363eb0403d3cce84cdb6c5e3ace9e9da141f07df
glibc-langpack-sah-2.28-251.el8_10.11.x86_64.rpm
e0443a4d78c3de2852df51f7a384506cf8c679a69452f045d5a871a281e350f2
glibc-langpack-sat-2.28-251.el8_10.11.x86_64.rpm
0cca0374d07b13e649a4eed859d44fd4274695d703915569dd629017905e1af8
glibc-langpack-sc-2.28-251.el8_10.11.x86_64.rpm
4525d6e492f60d2fa2fe2e184a0f4677829ac588258372bab23e1c62a26a2c27
glibc-langpack-sd-2.28-251.el8_10.11.x86_64.rpm
2e18e6fd7aeeb86257f3796f0ab4c8e250f7046087f3888bcd6883f184aba1d4
glibc-langpack-se-2.28-251.el8_10.11.x86_64.rpm
9c99c7c76843106cae9ae1ccc6dbb0e41e45200d49e9f1283854affb84d70bda
glibc-langpack-sgs-2.28-251.el8_10.11.x86_64.rpm
fe8182644975cd702ef5c5b4cc0fab5777b32bf5efca2a8b0e03a8506840dc2a
glibc-langpack-shn-2.28-251.el8_10.11.x86_64.rpm
dc617d6a49607d74a5f8402c1bbe09869a2fe78712d935fd26f91e379163d563
glibc-langpack-shs-2.28-251.el8_10.11.x86_64.rpm
ce338f6c9b78507a182e5e39839ec93350c3b0fce71cb0ecd8a3edd877d154c9
glibc-langpack-si-2.28-251.el8_10.11.x86_64.rpm
b730c4ed1083e23cf20560dbe3e7ab7cd3bd19efeddda3a6aa3c10d5a77036df
glibc-langpack-sid-2.28-251.el8_10.11.x86_64.rpm
30dfd693be14b57af4c02f80569c95325450b383ce212a4be160321b54d14b22
glibc-langpack-sk-2.28-251.el8_10.11.x86_64.rpm
02af33a627c9c7b0b3672023798d8555cf5c07fba15e2b38377ef6496ad564cf
glibc-langpack-sl-2.28-251.el8_10.11.x86_64.rpm
c2fd0d807532f06fb8f764258c96d56bcf24c9f86b8da745b4e7ae9423c5cb2a
glibc-langpack-sm-2.28-251.el8_10.11.x86_64.rpm
1080b607388b74da44cd89db77f06b1133c3a5cd63168f7fafd7a13703830dc9
glibc-langpack-so-2.28-251.el8_10.11.x86_64.rpm
8a75bfe741842d2e268b303cd5da5bfdb3b373e9833eb29c280184d438b77aca
glibc-langpack-sq-2.28-251.el8_10.11.x86_64.rpm
85e3eb36427530d0b3a4beb10779d657f85f59b7f57e3007a7f72164f03fdb1b
glibc-langpack-sr-2.28-251.el8_10.11.x86_64.rpm
eadab5e57d4eb7aff45631d0c85f2b0bda391bc81d4e166e77913614238961e3
glibc-langpack-ss-2.28-251.el8_10.11.x86_64.rpm
391f56df4e7db44ba1be0980632f927d0d5f3ca26d41ff2114c25d45678ab2fa
glibc-langpack-st-2.28-251.el8_10.11.x86_64.rpm
8d3a3fa6dfeda305b4d44369024a35a643e24bafc6f8b38fd365850ecadc0498
glibc-langpack-sv-2.28-251.el8_10.11.x86_64.rpm
faa88a72af5279110ffbc7764d2cf9b4dc40b36e263f7de631837bebe0450b1c
glibc-langpack-sw-2.28-251.el8_10.11.x86_64.rpm
d6b7a15215eb29a273d486b62aca555e62bcaf2a5a3b7c5b35d161e2fe70a693
glibc-langpack-szl-2.28-251.el8_10.11.x86_64.rpm
3720b9b2d0e566d1cfe5a28f2c2bdbfa42bf38a29e826dbe993350607cac1d3b
glibc-langpack-ta-2.28-251.el8_10.11.x86_64.rpm
b9f77bb805fbbf0126e4d73ad4c1dcc529a6aa3d26da6ba80b6414c432ea9156
glibc-langpack-tcy-2.28-251.el8_10.11.x86_64.rpm
58f85ad448159d9258cfca429aec38ac57557d62b0b9b01a5fb286d09bc68226
glibc-langpack-te-2.28-251.el8_10.11.x86_64.rpm
6c80885aac9ce07263329aa351f2d094f9ffd39ef1fb91d973b6a80c461a43e0
glibc-langpack-tg-2.28-251.el8_10.11.x86_64.rpm
f4b3264075774466f0210f3a6c6dc858c814ed125233a9fb566d48f0ac77b755
glibc-langpack-th-2.28-251.el8_10.11.x86_64.rpm
b586e151f0c5aaf9ab2d0f7e07af2c657a9c71201fb520b76b429aa3ea4558d9
glibc-langpack-the-2.28-251.el8_10.11.x86_64.rpm
46dbfc3d98f690d9e41db1e193cbb59fed41af4693d8752d4cf38510ff7d40f5
glibc-langpack-ti-2.28-251.el8_10.11.x86_64.rpm
93dbf5d87fffdea3ac1c97f3fbda4a68a0c150b139ee27ac6421b999383057c6
glibc-langpack-tig-2.28-251.el8_10.11.x86_64.rpm
06496a79f9ab0a9a62fbe7d8f4ac00cb7815a1c652ab141bca525c89ba4b38c5
glibc-langpack-tk-2.28-251.el8_10.11.x86_64.rpm
f4668cdcbd90e4ddc81a592b13e297f46847bed0da16edf2d41c322a4d3f3fe4
glibc-langpack-tl-2.28-251.el8_10.11.x86_64.rpm
5b2bc00ff7977042f347d6b5ae600819936d327cae163207397cc989201e3b0b
glibc-langpack-tn-2.28-251.el8_10.11.x86_64.rpm
c48a12516cca943d940dd6d7c1b4131b624d3d373024da05cab1a132dfe6f9a0
glibc-langpack-to-2.28-251.el8_10.11.x86_64.rpm
2705d4faa75d370d1e9a78574a253c8b28ac2f4392e20a36a5424d33010ca9b9
glibc-langpack-tpi-2.28-251.el8_10.11.x86_64.rpm
bd22c76135abd7a983c291531dad386d02196605cc1c73652e37bb52cfd3f005
glibc-langpack-tr-2.28-251.el8_10.11.x86_64.rpm
2f96cc670e86fd470cdd09daa9bcebf225e6b663873da9355c89e87b43e4269a
glibc-langpack-ts-2.28-251.el8_10.11.x86_64.rpm
84d94e00c0ff89ad8fe5935869ee5303a819c40799271de17b188f9c7de91d98
glibc-langpack-tt-2.28-251.el8_10.11.x86_64.rpm
b492ad2de0028c8c84cb78f0c9a393558a6e18edbc91cb9fcaf7825de2e39443
glibc-langpack-ug-2.28-251.el8_10.11.x86_64.rpm
300ca0304ee4effe4475ec583befe6de4603ed759b78036caba64340ae3d1f8d
glibc-langpack-uk-2.28-251.el8_10.11.x86_64.rpm
e0669ee3ffd7e62526dcacd13a1220bffa28a661307a17c253a503fb59e055f3
glibc-langpack-unm-2.28-251.el8_10.11.x86_64.rpm
2dff737f1c5824c2991cbb349697afae6e1cb81c81fa21419c842acd1c92b620
glibc-langpack-ur-2.28-251.el8_10.11.x86_64.rpm
b4a480025ea9335a4a340150f657d8c69c50289c08d48f0495f5933e2286c6ae
glibc-langpack-uz-2.28-251.el8_10.11.x86_64.rpm
90df67535cdf1fec062502c4d7d48d607952b76904832a65e06e23aa67c14a0d
glibc-langpack-ve-2.28-251.el8_10.11.x86_64.rpm
b7ff329d3993558081d7ddb19877ba45af61a71d908ef3bce7883bc039ffffeb
glibc-langpack-vi-2.28-251.el8_10.11.x86_64.rpm
3f37030f3e62b37c2a1416f19f549dcd034182ece89e030ffe9df6e0c7841215
glibc-langpack-wa-2.28-251.el8_10.11.x86_64.rpm
b625534f6cfd87887d5d412e1a24ebfedc6728b12328991e50781ee95a0c5231
glibc-langpack-wae-2.28-251.el8_10.11.x86_64.rpm
7682c5886d435993c0c7791f05e6ddf87cdddb09c67e5fca7641bd38778d6b5c
glibc-langpack-wal-2.28-251.el8_10.11.x86_64.rpm
8343bd8f43156f26b24490038aaf67607f18324f64870e836c3eb015426445e1
glibc-langpack-wo-2.28-251.el8_10.11.x86_64.rpm
fb08310ca8f1e7fedea0cc42d05b48ff5f9ed5c6deba8b6076dae631d3eb07c7
glibc-langpack-xh-2.28-251.el8_10.11.x86_64.rpm
2cee4dae38653a2b1180cc83e8fae453722faf74910bb5d628082fe0e5b68089
glibc-langpack-yi-2.28-251.el8_10.11.x86_64.rpm
542d569ec44c92587f954c30a981c665905da181bd6b7005de261baf73559b14
glibc-langpack-yo-2.28-251.el8_10.11.x86_64.rpm
d6ab4bdd2d1ddd8de41d8028ec19b8b08db2113fddae7cf45fa37ffde4c58d13
glibc-langpack-yue-2.28-251.el8_10.11.x86_64.rpm
e7eb90756972b72536f0b8a47e755cea9d10faa1b9d79c9bf33729f470cc368a
glibc-langpack-yuw-2.28-251.el8_10.11.x86_64.rpm
0d06ec4d62c023a23134019e4c2bfff09435950adb98572c5b66cceb7c28c7d4
glibc-langpack-zh-2.28-251.el8_10.11.x86_64.rpm
98efb0957c84766cf05f0ec265da0f97697e7ae4e87f8947904d4c02b417bef5
glibc-langpack-zu-2.28-251.el8_10.11.x86_64.rpm
22b542b12d100b76d5012cf05648dd65044dc715add33e84017167b75ac0f838
glibc-locale-source-2.28-251.el8_10.11.x86_64.rpm
bf29ba9780da89408ea28dc9ae1bbc8e29273152a9fbd90302284c6cb5c3dfbf
glibc-minimal-langpack-2.28-251.el8_10.11.x86_64.rpm
b74b2ee35f5b5e7bd0b7a18d259675ec355a2777af9ff99f64c3ac9d827dbdfb
libnsl-2.28-251.el8_10.11.i686.rpm
069c000b7e7fda5d2d91a87e85ac6a37bc66721caf772967a19eb6b44d811610
libnsl-2.28-251.el8_10.11.x86_64.rpm
fd9f73536a96c6cabfb9b309e06b5dee1eafd870abc67f2b7161bd077187b999
nscd-2.28-251.el8_10.11.x86_64.rpm
7b824110537d77879e9ac1ed6f5367b889a70849468710bab7b7b3cd9b647e29
nss_db-2.28-251.el8_10.11.i686.rpm
9391747d140a3788826bb894ffb9b074d367bee30a2dd90957d2ca58ee9c5808
nss_db-2.28-251.el8_10.11.x86_64.rpm
7604f8197eff4065ff509524598986a68169d9d4ffd6b25ceb875206334d9ba9
RLSA-2025:1917
Important: emacs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme (CVE-2025-1244)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
emacs-filesystem-26.1-13.el8_10.noarch.rpm
f50e8e13e6f8829a6621cd2055322c7d5e978d14b09f97aef2d5460a7a7fa99a
emacs-filesystem-26.1-13.el8_10.noarch.rpm
f50e8e13e6f8829a6621cd2055322c7d5e978d14b09f97aef2d5460a7a7fa99a
RLBA-2025:2352
kernel bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Bug Fix(es) and Enhancement(s):
* virtio-net virtqueue causing stalled socket (JIRA:Rocky Linux-72886)
* System hang due to soft lockup during snapshot removal with large hash list traversal in dm_exception_table_exit() [rhel-8.10.z] (JIRA:Rocky Linux-76230)
* [Rocky Linux-8] Lots of tasks are getting stuck in rwsem wait where the rwsem owner is calling throttle_direct_reclaim() and waiting (JIRA:Rocky Linux-64950)
* [Alibaba] Network PPS(Package Per Second) fails to meet the declared value in Spec against Gen8 AMD instance families on Rocky Linux8.10 (JIRA:Rocky Linux-66261)
* [Rocky Linux-8.10z] rping loopback test over vlan fails to run (JIRA:Rocky Linux-75826)
* kernel panic in ovl_dentry_upper() due to null pointer dereference (JIRA:Rocky Linux-76161)
* Rocky Linux8.10 : Tapes are broken again on newest Rocky Linux8.10 kernels - kernel-4.18.0-553.36.1.el8_10, Rocky Linux9.5+ affected too (JIRA:Rocky Linux-78415)
* NFS server thread blocked in flush_workqueue() (JIRA:Rocky Linux-79458)
none-baseos-rpms
bpftool-4.18.0-553.42.1.el8_10.x86_64.rpm
25a46ba06859dce248fc56b548e58a7b3c0395983f64c8e32812af651d06d4b4
kernel-4.18.0-553.42.1.el8_10.x86_64.rpm
ec2df040696c87432dfe14e97ec900a9accf9d2150c74c52bb70554373567e20
kernel-abi-stablelists-4.18.0-553.42.1.el8_10.noarch.rpm
5c1c13ae9894a9e10150d590e9b985be41a79eb555042f8e0ccc5b51e5f40b92
kernel-abi-stablelists-4.18.0-553.42.1.el8_10.noarch.rpm
5c1c13ae9894a9e10150d590e9b985be41a79eb555042f8e0ccc5b51e5f40b92
kernel-core-4.18.0-553.42.1.el8_10.x86_64.rpm
89c85cc6a3825de4ce537ac9854e292c95ee73b66b4bf245b09b5c4c67934c93
kernel-cross-headers-4.18.0-553.42.1.el8_10.x86_64.rpm
b5821f3453b505d5c989de762555a9e9d0e0b5566d67e796078cbccdf8e3b575
kernel-debug-4.18.0-553.42.1.el8_10.x86_64.rpm
ae3aacfc45293940627a82aff67333e843de8751c4df29b3ac12762f3d820c4d
kernel-debug-core-4.18.0-553.42.1.el8_10.x86_64.rpm
7fbf6db77dfcbbc9e2291bc79ca03419ef8ee464e4676205cb220751b530d030
kernel-debug-devel-4.18.0-553.42.1.el8_10.x86_64.rpm
4f474fefbc2f452fda290e5821867ff955aca270f54551c36faad67e8e402ad1
kernel-debuginfo-common-x86_64-4.18.0-553.42.1.el8_10.x86_64.rpm
ff92de1d55afc00f6e0a83cc00ab7b4198e114bce74e8e29799cffcaa21d567a
kernel-debug-modules-4.18.0-553.42.1.el8_10.x86_64.rpm
e5df06932d18937f2bea5f594870d37d8d767402892b59a02ba54d2d10e3ec6a
kernel-debug-modules-extra-4.18.0-553.42.1.el8_10.x86_64.rpm
be5546f9fde51578c8651b56f56e8197293edded3cee3fa9a95b91ecbea96041
kernel-devel-4.18.0-553.42.1.el8_10.x86_64.rpm
b386b151f7602861edde30c9cce3adb3933df2e54d8fc40deaa2fbba79921aae
kernel-doc-4.18.0-553.42.1.el8_10.noarch.rpm
67b90d74fde1aecd967b3bfacea52d07693ac96de234bf2e693a2c695bd986f0
kernel-doc-4.18.0-553.42.1.el8_10.noarch.rpm
67b90d74fde1aecd967b3bfacea52d07693ac96de234bf2e693a2c695bd986f0
kernel-headers-4.18.0-553.42.1.el8_10.x86_64.rpm
baa04c0962192546af357a4114cdca3eeb23af4039fa4a3d964b64bd5c0ea687
kernel-modules-4.18.0-553.42.1.el8_10.x86_64.rpm
998ac3925fc15de8b32e025bd2bd7f66b579c66c950298a69c19c3a88d85ee3a
kernel-modules-extra-4.18.0-553.42.1.el8_10.x86_64.rpm
5c4afb8dbc8f72f528de762076870484992c0ed142f7c747c81fc652a0199421
kernel-tools-4.18.0-553.42.1.el8_10.x86_64.rpm
f8cbcfa2c7c23a3eceb36c676f99df0eac03f83f71073d074ef173f8f32a20fc
kernel-tools-libs-4.18.0-553.42.1.el8_10.x86_64.rpm
89598db2400d0c0d1a4e004331e30275ad0736b3a1b655b20eeb2ad03ba3e75d
perf-4.18.0-553.42.1.el8_10.x86_64.rpm
b89abd9d8fbc504d5801fda5f000fdce131ba69d0185a574fd6421e3eb6f724d
python3-perf-4.18.0-553.42.1.el8_10.x86_64.rpm
55f7e56805c92f603c0057e20d3c7be8877919d1a3990840937977cfc5e27269
RLBA-2025:2590
tuned bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for tuned.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Bug Fix(es):
* Tuned on AMD cpu: "sched_migration_cost_ns" overwritten on "postgresql" profile (JIRA:Rocky Linux-70470)
* Tuned strartup after a long delay causes long reboot times (JIRA:Rocky Linux-71457)
none-baseos-rpms
tuned-2.22.1-6.el8_10.noarch.rpm
0343c745556dbcd17bc876dfbdd0c7957a1adb93c3fc32fa508e00b67bab7199
tuned-2.22.1-6.el8_10.noarch.rpm
0343c745556dbcd17bc876dfbdd0c7957a1adb93c3fc32fa508e00b67bab7199
tuned-profiles-atomic-2.22.1-6.el8_10.noarch.rpm
87beb780e771409eb661b8bd1e2174f2243ff6b4d432ff4c00c06412f09c5b99
tuned-profiles-atomic-2.22.1-6.el8_10.noarch.rpm
87beb780e771409eb661b8bd1e2174f2243ff6b4d432ff4c00c06412f09c5b99
tuned-profiles-compat-2.22.1-6.el8_10.noarch.rpm
ff44aff353487b973e42232ebab39678318f62534c9ef1408ed9f582d074acce
tuned-profiles-compat-2.22.1-6.el8_10.noarch.rpm
ff44aff353487b973e42232ebab39678318f62534c9ef1408ed9f582d074acce
tuned-profiles-cpu-partitioning-2.22.1-6.el8_10.noarch.rpm
e7c3f6a7ebba37d454cdcbda0797baf697d7583767da04940f96f0aecdde8d47
tuned-profiles-cpu-partitioning-2.22.1-6.el8_10.noarch.rpm
e7c3f6a7ebba37d454cdcbda0797baf697d7583767da04940f96f0aecdde8d47
tuned-profiles-mssql-2.22.1-6.el8_10.noarch.rpm
7754a43580724b4435eab7918241166332bdb6e7d67565cf9199fa13362054ed
tuned-profiles-mssql-2.22.1-6.el8_10.noarch.rpm
7754a43580724b4435eab7918241166332bdb6e7d67565cf9199fa13362054ed
tuned-profiles-oracle-2.22.1-6.el8_10.noarch.rpm
69c195e2f6ad2f30a378d014ab8d5a683f3bf4bf3a037a82def74e15532ca23b
tuned-profiles-oracle-2.22.1-6.el8_10.noarch.rpm
69c195e2f6ad2f30a378d014ab8d5a683f3bf4bf3a037a82def74e15532ca23b
RLBA-2025:2591
autofs bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for autofs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy.
Bug Fix(es):
* autofs: deadlock between mnts_lookup_mount and mnts_remove_mount (JIRA:Rocky Linux-72524)
none-baseos-rpms
autofs-5.1.4-114.el8_10.2.x86_64.rpm
182075c0e051e877cf8bc5825584fbc8d9af6938359c95df83ad2ee49b3ae7ef
RLBA-2025:2592
NetworkManager bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for NetworkManager.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services.
Bug Fix(es) and Enhancement(s):
* Primary and secondary IP's are swapped using nm-cloud-setup on Azure over random reboots [rhel-8.10.z] (JIRA:Rocky Linux-69462)
none-baseos-rpms
NetworkManager-1.40.16-19.el8_10.x86_64.rpm
01f65fbc273b2c88370e4d43855d34f349a9beaf91e9c8a0b55dcf8ea7b331ee
NetworkManager-adsl-1.40.16-19.el8_10.x86_64.rpm
7216a80fc185f4c3030670575de7f16afc121648115d1e12dd1b409719d35a64
NetworkManager-bluetooth-1.40.16-19.el8_10.x86_64.rpm
15cd9fd0987ef44999fd5ba9f5ddeac0d6529596e81eb8f2c0b85d82c8de1bcb
NetworkManager-config-connectivity-redhat-1.40.16-19.el8_10.noarch.rpm
6f565e0c04c027db1a22da2eb68b91f53c0cc8e1c225d9117890d9196a2f80e7
NetworkManager-config-connectivity-redhat-1.40.16-19.el8_10.noarch.rpm
6f565e0c04c027db1a22da2eb68b91f53c0cc8e1c225d9117890d9196a2f80e7
NetworkManager-config-server-1.40.16-19.el8_10.noarch.rpm
43ec06f498fdcb6a3e2f2988ec5e0f394f9263bd42d58c05b017ad2a604413eb
NetworkManager-config-server-1.40.16-19.el8_10.noarch.rpm
43ec06f498fdcb6a3e2f2988ec5e0f394f9263bd42d58c05b017ad2a604413eb
NetworkManager-dispatcher-routing-rules-1.40.16-19.el8_10.noarch.rpm
b4b044a52b4cd507fedea41b524733b8960e9958ffadacdff28493c0d1f4dd3d
NetworkManager-dispatcher-routing-rules-1.40.16-19.el8_10.noarch.rpm
b4b044a52b4cd507fedea41b524733b8960e9958ffadacdff28493c0d1f4dd3d
NetworkManager-initscripts-updown-1.40.16-19.el8_10.noarch.rpm
d70962d2d7e355c2fe14daa6d707983c0508995e8ca1abf266c137d81e53869a
NetworkManager-initscripts-updown-1.40.16-19.el8_10.noarch.rpm
d70962d2d7e355c2fe14daa6d707983c0508995e8ca1abf266c137d81e53869a
NetworkManager-libnm-1.40.16-19.el8_10.i686.rpm
bcb262bdaf349cc862a7e3413d8832def0f19229c9eb91a6a8c3c5f1ecbc68b2
NetworkManager-libnm-1.40.16-19.el8_10.x86_64.rpm
b3f8e3789983832bb88d9a4d581f1d507e95e34a4a83beb730e4b1920bd50235
NetworkManager-ovs-1.40.16-19.el8_10.x86_64.rpm
daf1f5195e029542d0f563be02007a88bee8c455b1606c9eb7801659871d6f6c
NetworkManager-ppp-1.40.16-19.el8_10.x86_64.rpm
08462b794b166a5a53c3ee592b3e39615461fdd1d75f2fd506b0f3dfd7839caf
NetworkManager-team-1.40.16-19.el8_10.x86_64.rpm
14abdd9b79424dea0356682ea66252ab7fa8f22344886f0683880f60eb3ecf88
NetworkManager-tui-1.40.16-19.el8_10.x86_64.rpm
7bbc7b85f1a0fb63fc5b9389a65d1935bbd1742a4d5f7c6ad3846da7fd03d90b
NetworkManager-wifi-1.40.16-19.el8_10.x86_64.rpm
2d73d4b5a9b87eb9dda7a57ed81a50ca055984f84b5f09efed44f08c7cef11f2
NetworkManager-wwan-1.40.16-19.el8_10.x86_64.rpm
2c2dbac9c2e220d8d2fffdea60f67e4292264ae3e5f3132cad24046590c58f08
RLBA-2025:2593
openldap bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for openldap.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network.
Bug Fix(es):
* Fix double file close when first TLS connection fails (JIRA:Rocky Linux-75823)
none-baseos-rpms
openldap-2.4.46-21.el8_10.i686.rpm
9b57754899b4ab1c82fa8576939d65671c90b8af891372634b0ebd509b626749
openldap-2.4.46-21.el8_10.x86_64.rpm
50d3e8b7ef70c516a86586e79d439257f6b3ba1e18d2e3dd46f9ace57066a4e5
openldap-clients-2.4.46-21.el8_10.x86_64.rpm
b3c6857c81159552687c4262417af8642965208213d813969cf703cf3cdb9549
openldap-devel-2.4.46-21.el8_10.i686.rpm
8efe31f7c362c6ff0c18c230cfd6393d9c5f8cfb98153a940b150d76a812a711
openldap-devel-2.4.46-21.el8_10.x86_64.rpm
13f7cf2538754917d4bcd51c9e262eef5ef9a392567528178bb5c8d2e91b5882
RLBA-2025:2594
systemd bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for systemd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Bug Fix(es):
* systemd crashes due to a segmentation fault, leading to a cant-boot issue. (JIRA:Rocky Linux-76308)
none-baseos-rpms
systemd-239-82.el8_10.4.i686.rpm
32988c1f34a066f2afc1b266a0550935ee4b2abcb5e58fa9d2b8eb0baf5ac3c5
systemd-239-82.el8_10.4.x86_64.rpm
559af16c83649d0ae66f7a81b84873d08e320c6d746ced8cdfdd292e7053e50b
systemd-container-239-82.el8_10.4.i686.rpm
5af3bd96ade6b5a99c9356233a976133d137dfcf0522658276873f21331d441c
systemd-container-239-82.el8_10.4.x86_64.rpm
a5cf777f166b3c9754ee932bd51e41b8c5aba8815f77906aa5d6ac791ae007d7
systemd-devel-239-82.el8_10.4.i686.rpm
d934456c74748a96804bc6349fb051bd470bea29d290624f52834ffc4f5b2991
systemd-devel-239-82.el8_10.4.x86_64.rpm
f0afff07f394e0c8f8e27ea9ff257549c3f1d951169ff46f3b1d6e4cb258de9d
systemd-journal-remote-239-82.el8_10.4.x86_64.rpm
a785045db1feae5cb64ac787e66c837d8620a62254b82e3f7795ce7d67db4233
systemd-libs-239-82.el8_10.4.i686.rpm
887f8b8d0c1db3bf4d8dba299556b8fb02e3bec617c77d70fb1c76054e4422bb
systemd-libs-239-82.el8_10.4.x86_64.rpm
34de2cc26a769a3abc1c284e34dbf4e75f2a1a81e26b687e03109ac227fd78fa
systemd-pam-239-82.el8_10.4.x86_64.rpm
4601bc3a2df59045f18bbb58ba1076137806cbdbee8b537102ef7e7883525c5c
systemd-tests-239-82.el8_10.4.x86_64.rpm
2313ad0bfa5a234f7d3534d879c97be17ef7df76067efb0bd95a6c09a9eae14b
systemd-udev-239-82.el8_10.4.x86_64.rpm
99ff1d2aca8b6562069c06a4567d43b16e44fc037c73055712f5c37f86f10140
RLBA-2025:2595
dnf bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for dnf.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
dnf is a package manager that allows users to manage packages on their systems. It supports RPMs, modules and comps groups & environments.
Bug Fix(es):
* dnf-automatic crashes with traceback for Network issue. [rhel-8.10.z] (JIRA:Rocky Linux-71545)
none-baseos-rpms
dnf-4.7.0-21.el8_10.noarch.rpm
12a3452adb0764a5193e3f07aa74791479ffbc4ca2a67eb7a0f2ee23329e1afa
dnf-4.7.0-21.el8_10.noarch.rpm
12a3452adb0764a5193e3f07aa74791479ffbc4ca2a67eb7a0f2ee23329e1afa
dnf-automatic-4.7.0-21.el8_10.noarch.rpm
75375f592b9cb8dcb68d1bdb2e1fe87eda5d3304376e218cee077b392ba1bf69
dnf-automatic-4.7.0-21.el8_10.noarch.rpm
75375f592b9cb8dcb68d1bdb2e1fe87eda5d3304376e218cee077b392ba1bf69
dnf-data-4.7.0-21.el8_10.noarch.rpm
b83967cb5a3d140ba28e505406c215e56932308343f9e90fdbf2daafb6afa0cd
dnf-data-4.7.0-21.el8_10.noarch.rpm
b83967cb5a3d140ba28e505406c215e56932308343f9e90fdbf2daafb6afa0cd
python3-dnf-4.7.0-21.el8_10.noarch.rpm
115d7df2b9ad7b762091b872a4800ff64580bb3c69370ddf9ddfb57d61700de0
python3-dnf-4.7.0-21.el8_10.noarch.rpm
115d7df2b9ad7b762091b872a4800ff64580bb3c69370ddf9ddfb57d61700de0
yum-4.7.0-21.el8_10.noarch.rpm
fac6c9bc54140b8c6657f60d8722f271ef9b473be808c785db47f8401d4fbbbd
yum-4.7.0-21.el8_10.noarch.rpm
fac6c9bc54140b8c6657f60d8722f271ef9b473be808c785db47f8401d4fbbbd
RLBA-2025:2596
lvm2 bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for lvm2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lvm2 packages include complete support for handling read and write operations on physical volumes, creating volume groups from one or more physical volumes, and creating one or more logical volumes in volume groups.
Bug Fix(es):
* dmeventd needs to quit upon receiving SIGTERM (JIRA:Rocky Linux-8288)
none-baseos-rpms
device-mapper-1.02.181-15.el8_10.x86_64.rpm
67d3a815562dac7c750439f7eb3b70beb889a1b571f57d6a280cf4d4b80d1d33
device-mapper-event-1.02.181-15.el8_10.x86_64.rpm
368ebb9e8c621e689e71fa0b4af919f733278ba40111044bc6ae8462eab8505d
device-mapper-event-libs-1.02.181-15.el8_10.i686.rpm
40a297f830009962645f16e81bb518a10e600bece4bfafaa892e30da09411dc6
device-mapper-event-libs-1.02.181-15.el8_10.x86_64.rpm
a29ffaf0309ddd719395b68a5a94539f7abc1aefd184e1cc5da47c9f243bfcda
device-mapper-libs-1.02.181-15.el8_10.i686.rpm
97bf5178f78624d45400b3905af755497ed29624fcf691bf55a97d8778917c24
device-mapper-libs-1.02.181-15.el8_10.x86_64.rpm
aa4a57c8073e7d518ce86539b5fc62b8852d28858da405e27478f9130bb9f4e2
lvm2-2.03.14-15.el8_10.x86_64.rpm
9c743e99e5d0aff784fef4f11a2979832ffcfbe13e56c872a915726e6ec54ece
lvm2-dbusd-2.03.14-15.el8_10.noarch.rpm
4652826b127b06b71dd5a6a80b4bda48451f27f56dd60a09ac2974fb63b1b88d
lvm2-dbusd-2.03.14-15.el8_10.noarch.rpm
4652826b127b06b71dd5a6a80b4bda48451f27f56dd60a09ac2974fb63b1b88d
lvm2-libs-2.03.14-15.el8_10.i686.rpm
8834449407c8f0a91a3cffd3190f2335e7cf5c9e071634e94c5cbaba1dcf0777
lvm2-libs-2.03.14-15.el8_10.x86_64.rpm
fc27b7d929c3bb7373b36ca21d7706289469f42be4ce19ae08d460f8e8ba1601
lvm2-lockd-2.03.14-15.el8_10.x86_64.rpm
9505f315837720a5c314bb4f7c6b49544ad69ebc416760f5db7371e28caba550
RLBA-2025:2597
traceroute bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for traceroute.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host.
Bug Fix(es):
* traceroute is consuming 100% of CPUs [rhel-8.10.z] (JIRA:Rocky Linux-71510)
none-baseos-rpms
traceroute-2.1.0-9.el8_10.x86_64.rpm
fb6d50f6d7a04c99fef7b5d3211ace8b8b2d18ee98857da78a297278507c750a
RLBA-2025:2598
firewalld bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for firewalld.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface.
Bug Fix(es):
* Raise port range for ceph service to be inline with new ceph defaults [rhel-8.10.z] (JIRA:Rocky Linux-66207)
none-baseos-rpms
firewalld-0.9.11-10.el8_10.noarch.rpm
e5ef296e7c79cf6e1fae6fb0c3f1bc4faffa385bf3f1c64beaeebac67f437849
firewalld-0.9.11-10.el8_10.noarch.rpm
e5ef296e7c79cf6e1fae6fb0c3f1bc4faffa385bf3f1c64beaeebac67f437849
firewalld-filesystem-0.9.11-10.el8_10.noarch.rpm
73357ad4fc565f6ed493c5c506097b62c1cc255175d69bfcc4f660c9d32de1d4
firewalld-filesystem-0.9.11-10.el8_10.noarch.rpm
73357ad4fc565f6ed493c5c506097b62c1cc255175d69bfcc4f660c9d32de1d4
python3-firewall-0.9.11-10.el8_10.noarch.rpm
545c9ebc0d8313404851571e7f119b11b7d90bd80c99f27d65d16ba2a3f3540c
python3-firewall-0.9.11-10.el8_10.noarch.rpm
545c9ebc0d8313404851571e7f119b11b7d90bd80c99f27d65d16ba2a3f3540c
RLBA-2025:2599
linux-firmware bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for linux-firmware.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Bug Fix(es):
* Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-79835)
none-baseos-rpms
iwl1000-firmware-39.31.5.1-128.el8_10.1.noarch.rpm
9a853af66ed27b927aad445a169f0b27e7c374989a8d2866a30f85e1b8f0d040
iwl1000-firmware-39.31.5.1-128.el8_10.1.noarch.rpm
9a853af66ed27b927aad445a169f0b27e7c374989a8d2866a30f85e1b8f0d040
iwl100-firmware-39.31.5.1-128.el8_10.1.noarch.rpm
493137723c01a73470889dddff772f59a8b6eb98a68aece1e926c747488a3e61
iwl100-firmware-39.31.5.1-128.el8_10.1.noarch.rpm
493137723c01a73470889dddff772f59a8b6eb98a68aece1e926c747488a3e61
iwl105-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
4567341113764f0ec3b5dcb5f6e2115886860ab201592bba07bd4e95f498cb95
iwl105-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
4567341113764f0ec3b5dcb5f6e2115886860ab201592bba07bd4e95f498cb95
iwl135-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
fde496610b572ce632fcdc090b44fa191c3ac552432af6d13996f70f526d4440
iwl135-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
fde496610b572ce632fcdc090b44fa191c3ac552432af6d13996f70f526d4440
iwl2000-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
2226b27d0fc7373ac8f32809baa47fe72bb1bdc0841c97bf5347afc0d0ccc29e
iwl2000-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
2226b27d0fc7373ac8f32809baa47fe72bb1bdc0841c97bf5347afc0d0ccc29e
iwl2030-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
83fd4fdb1d1f579e5bad792f7d4ccf55b0681f1c56106f3d2f164524b8563044
iwl2030-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
83fd4fdb1d1f579e5bad792f7d4ccf55b0681f1c56106f3d2f164524b8563044
iwl3160-firmware-25.30.13.0-128.el8_10.1.noarch.rpm
42df9c933faa11ba89f3fa07b2155fb6934287696d90383d86c228feafb3beae
iwl3160-firmware-25.30.13.0-128.el8_10.1.noarch.rpm
42df9c933faa11ba89f3fa07b2155fb6934287696d90383d86c228feafb3beae
iwl3945-firmware-15.32.2.9-128.el8_10.1.noarch.rpm
4bcaf559635bf8348c1c0e2aa9b6f0e0a3ca18ba251c2fe64ce49c50e01d72c8
iwl3945-firmware-15.32.2.9-128.el8_10.1.noarch.rpm
4bcaf559635bf8348c1c0e2aa9b6f0e0a3ca18ba251c2fe64ce49c50e01d72c8
iwl4965-firmware-228.61.2.24-128.el8_10.1.noarch.rpm
c21cbd19c094f4a2fc879910f11ff7716ad4022eafdd975232355b5bba9884c7
iwl4965-firmware-228.61.2.24-128.el8_10.1.noarch.rpm
c21cbd19c094f4a2fc879910f11ff7716ad4022eafdd975232355b5bba9884c7
iwl5000-firmware-8.83.5.1_1-128.el8_10.1.noarch.rpm
424765a1713c1a763041c6d77658399dab07c3b088a119f93b3eac7265bc0d56
iwl5000-firmware-8.83.5.1_1-128.el8_10.1.noarch.rpm
424765a1713c1a763041c6d77658399dab07c3b088a119f93b3eac7265bc0d56
iwl5150-firmware-8.24.2.2-128.el8_10.1.noarch.rpm
061f708533fe8a2f032a2781626a8ee80c2d6292c8b6a8dbe2727d87f57a5663
iwl5150-firmware-8.24.2.2-128.el8_10.1.noarch.rpm
061f708533fe8a2f032a2781626a8ee80c2d6292c8b6a8dbe2727d87f57a5663
iwl6000-firmware-9.221.4.1-128.el8_10.1.noarch.rpm
8667288c134589efa30d940be8d6892dedbd545428ec538f039a54e7f8409ed3
iwl6000-firmware-9.221.4.1-128.el8_10.1.noarch.rpm
8667288c134589efa30d940be8d6892dedbd545428ec538f039a54e7f8409ed3
iwl6000g2a-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
78ba6e6e1651d8993f226bee80c5caaabbc65975df6c5554414505d01b0d15b2
iwl6000g2a-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
78ba6e6e1651d8993f226bee80c5caaabbc65975df6c5554414505d01b0d15b2
iwl6000g2b-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
caaaa510afa6859d6d417badf422680b59314a73438b160ffce907c977e2bb17
iwl6000g2b-firmware-18.168.6.1-128.el8_10.1.noarch.rpm
caaaa510afa6859d6d417badf422680b59314a73438b160ffce907c977e2bb17
iwl6050-firmware-41.28.5.1-128.el8_10.1.noarch.rpm
cf34d8186c443330b78cc427f3496fac228a5f700a147f195520cd708ccde4b5
iwl6050-firmware-41.28.5.1-128.el8_10.1.noarch.rpm
cf34d8186c443330b78cc427f3496fac228a5f700a147f195520cd708ccde4b5
iwl7260-firmware-25.30.13.0-128.el8_10.1.noarch.rpm
89090e4468ac3ab7ee20c9828051527de4df3ded54ed54bb19c7fd7227189f8c
iwl7260-firmware-25.30.13.0-128.el8_10.1.noarch.rpm
89090e4468ac3ab7ee20c9828051527de4df3ded54ed54bb19c7fd7227189f8c
libertas-sd8686-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
e22b4e51aefd2f0edf0b31a83aec6797bf32ff2ba4633f6eb6bc65a89ae4b80c
libertas-sd8686-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
e22b4e51aefd2f0edf0b31a83aec6797bf32ff2ba4633f6eb6bc65a89ae4b80c
libertas-sd8787-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
cc8c3010e454a8c6ee4704f9ac7ee60304ae1458d0f6d7dbad1f6dd2492d8ac1
libertas-sd8787-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
cc8c3010e454a8c6ee4704f9ac7ee60304ae1458d0f6d7dbad1f6dd2492d8ac1
libertas-usb8388-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
934199d094c5fe61d11cd09f2c2dbeccb3d0c122579586fec31ba6c1c1939c85
libertas-usb8388-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
934199d094c5fe61d11cd09f2c2dbeccb3d0c122579586fec31ba6c1c1939c85
libertas-usb8388-olpc-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
14d381c2c08f07094551b49708c7f5eecbb01d837ce020c4b7be9c878be1a9d2
libertas-usb8388-olpc-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
14d381c2c08f07094551b49708c7f5eecbb01d837ce020c4b7be9c878be1a9d2
linux-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
fc1e6aaef4204a9c580c46a5c33d3c979c611df78e64e95b57915c5fb21197b9
linux-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm
fc1e6aaef4204a9c580c46a5c33d3c979c611df78e64e95b57915c5fb21197b9
RLSA-2025:2600
Moderate: rsync security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* rsync: Path traversal vulnerability in rsync (CVE-2024-12087)
* rsync: --safe-links option bypass leads to path traversal (CVE-2024-12088)
* rsync: Race Condition in rsync Handling Symbolic Links (CVE-2024-12747)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
rsync-3.1.3-21.el8_10.x86_64.rpm
da0e356028d5c2d683e96124c1320c8456f3e7e5a32cefe4c6f50079e8c03e5b
rsync-daemon-3.1.3-21.el8_10.noarch.rpm
5357362858d5407e417dc542cd76f1f5b71a4161f20d072c986159fbbe55a2b2
rsync-daemon-3.1.3-21.el8_10.noarch.rpm
5357362858d5407e417dc542cd76f1f5b71a4161f20d072c986159fbbe55a2b2
RLBA-2025:2601
portreserve bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for portreserve.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The portreserve package helps services with well-known ports that lie in the portmap range. It prevents portmap from occupying a real service's port by occupying it itself, until the real service tells it to release the port, generally in the init script.
Bug Fix(es) and Enhancement(s):
* Creating tmp files for systemd on behalf of portreserve references legacy directory /var/run/ instead of /run (JIRA:Rocky Linux-2863)
none-baseos-rpms
portreserve-0.0.5-20.el8_10.x86_64.rpm
3fd6715f617e011ecba2cb32d99c4abb8069de19a9d32aa7fc8cb383a3b3de51
RLBA-2025:2602
gcc bug fix update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
None
An update is available for gcc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries.
Bug Fix(es):
* gcc: ICE in expand_debug_locations, at cfgexpand.c:5410 (JIRA:Rocky Linux-79501)
none-baseos-rpms
libasan-8.5.0-24.el8_10.i686.rpm
00ad4da3aba80c9a930693a1ee316dbccf49d17bb5db1e7f1ab8bec26be16641
libasan-8.5.0-24.el8_10.x86_64.rpm
19cc6dde959e10a1dc7feeb7372fa0fb88e7b18a80f07af7911dc184d6732ba8
libatomic-8.5.0-24.el8_10.i686.rpm
c4b061154f189c34aff33f432e69a15ff1ca6c35bb6263fa8db25a538d8f567c
libatomic-8.5.0-24.el8_10.x86_64.rpm
73d281ddcdf8ba04371676cf2873a6960a907c9733587da624355160223e0775
libatomic-static-8.5.0-24.el8_10.i686.rpm
3cd6cdaff2789759069c7a9a7b539cef144f80e8cb3661660f9a74fb63bfcc82
libatomic-static-8.5.0-24.el8_10.x86_64.rpm
a557881849ad6d34261d75f1c7bdd1886a8341fabbfb65bbda789e1af0302688
libgcc-8.5.0-24.el8_10.i686.rpm
29f01daf25eb85721cb98fb1949a1fc54a12b1f9ca6c492a4b33deaae51cceb8
libgcc-8.5.0-24.el8_10.x86_64.rpm
c5c0ea24bea34d02a702f5a822995543d7759686016beb449965e4bc4f89184c
libgfortran-8.5.0-24.el8_10.i686.rpm
e0513fa4b31ee399cd2d53dc778128e7811a4c571d7d72d075dd32177deb4856
libgfortran-8.5.0-24.el8_10.x86_64.rpm
bd50f0af334b2af055fc90ab7e78022fdf74c9c45eb9c184dac631c52de7568c
libgomp-8.5.0-24.el8_10.i686.rpm
50cb157851018832ab2ae3cbca7124891ce5f9117dbb338dc5390ad0c3a1cfa2
libgomp-8.5.0-24.el8_10.x86_64.rpm
0f422c99b384f7d1d0e4065a50ac46fc6ea57e90074d8b1dec00547ab8829e9e
libgomp-offload-nvptx-8.5.0-24.el8_10.x86_64.rpm
c9ed57729bffeda2bd19cdb52bc0d0dbaf898288986f00e8481bb9f786dd0651
libitm-8.5.0-24.el8_10.i686.rpm
dd37d89c8b149dd18c1a3c3617fcfd882914ec13cef5c398ea2424e143bf76af
libitm-8.5.0-24.el8_10.x86_64.rpm
d2725b24003ce178c89c905ffc0f79482eab0472b2b692dd67f84c36b6f6e6f0
liblsan-8.5.0-24.el8_10.x86_64.rpm
c1147121039780527f4b18094270c29ecfcb1aaf37d33edc9fc100a15b95222f
libquadmath-8.5.0-24.el8_10.i686.rpm
93fcff0e11c987f611dcb1788e9b8c486f434e7e2ac4fd76ebe9bc7504cd4050
libquadmath-8.5.0-24.el8_10.x86_64.rpm
4d10345a53af4dcd4b5b79fc81a0538db4149b2902b04c04d5a526197528dc0b
libstdc++-8.5.0-24.el8_10.i686.rpm
cdc6cb5d23303e1e217ccb0ca0b5bae019f2077a06b4624b09111ddc69983946
libstdc++-8.5.0-24.el8_10.x86_64.rpm
7bb17d858c4ff966bd2e3481e2594f221227c85902787c707948dcc4c1d463f6
libtsan-8.5.0-24.el8_10.x86_64.rpm
42bdd0d6e63f09c8f70ec9226f0e3b66addd56574f4cb8f99c1bc0e238b8d4a6
libubsan-8.5.0-24.el8_10.i686.rpm
c841ed54c06546e5d79cb4a4e4972602a5efee26ee770de2e16f33515015fd5e
libubsan-8.5.0-24.el8_10.x86_64.rpm
860c2bb4c7f47514097010e8fd7c465ca8495ef64da6a22726211ede6e09f166
RLSA-2025:2686
Important: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Use-After-Free in libxml2 (CVE-2024-56171)
* libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-19.el8_10.i686.rpm
153f9bb9dc8df30abcb4407df06cbe7f9634c60c304934f8692d9272f332c4c8
libxml2-2.9.7-19.el8_10.x86_64.rpm
03b17da1195783c6c12dc9b4ae4def009bc9f14fa9b8ae2b8f748c77f4632e20
python3-libxml2-2.9.7-19.el8_10.x86_64.rpm
77df20c307e7f2ed40edcf5751fcdfaceb21d4a57efa67cbe9c7796adc530a2d
RLSA-2025:2722
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix:
* CVE-2025-24528 krb5: overflow when calculating ulog block size
Bug fix:
* kdb5_util: fix DB entry flags on modification
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
krb5-devel-1.18.2-31.el8_10.i686.rpm
23d3bb72911deb0a210421b42fb4110a248b67e844cb21a47a09a702559f155d
krb5-devel-1.18.2-31.el8_10.x86_64.rpm
1ebb982b693d3dd0c9c20d24e59835a6f9f761349c572b716f1e482cb17b7713
krb5-libs-1.18.2-31.el8_10.i686.rpm
c493578b27143fe02a0abd1db78e22e7e4681e26ce08f0238f6b6bb31b2375c7
krb5-libs-1.18.2-31.el8_10.x86_64.rpm
f86e8cbb7e8419386ebe5a51543cc196b4e84c91596b68662c9d0738adf946ff
krb5-pkinit-1.18.2-31.el8_10.i686.rpm
9466f1c0c15f6566b996fa2acfd920d195020c36713f0365fe3e1b3f1a41851a
krb5-pkinit-1.18.2-31.el8_10.x86_64.rpm
2c7ed3baf80608515cd421b08b5f896255589d52ef34fde3052eb9ed89ca53e0
krb5-server-1.18.2-31.el8_10.i686.rpm
30e7ca1737c0cf13a4483aee03675818292c3f734edb757f1addd59e82c48b9f
krb5-server-1.18.2-31.el8_10.x86_64.rpm
4e0c8f48a5e91b134d7e17112ee15895dc6c1d9a828df5ec9e4a7e570f49c2ea
krb5-server-ldap-1.18.2-31.el8_10.i686.rpm
fe3b4d545af61d2266fe5b1078dd2455b098978c09d8597f1f4ecfc503430300
krb5-server-ldap-1.18.2-31.el8_10.x86_64.rpm
33974993417b9d028c9e5bd4ba0f130ce28912d4590e71ecbde3b9aa26d5c015
krb5-workstation-1.18.2-31.el8_10.x86_64.rpm
909651f1aa0b5676aca4cebc03af916d52e7d3b7e9dc0f681c4d98c8bf55d07d
libkadm5-1.18.2-31.el8_10.i686.rpm
3a548d75746de76296357e4c281cb4ee5dbace6c658e16d2ff8632001f5849cf
libkadm5-1.18.2-31.el8_10.x86_64.rpm
67da62706e3deda0c223ddc2caebf8584edb1834330f8d8286cdb02bc0fba99b
RLSA-2023:7877
Low: openssl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for openssl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* openssl: Excessive time spent checking DH keys and parameters (CVE-2023-3446)
* OpenSSL: Excessive time spent checking DH q parameter value (CVE-2023-3817)
* openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow (CVE-2023-5678)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssl-1.1.1k-12.el8_9.x86_64.rpm
055a1875d916e50030ead2df6124de68bd3a99a24de4436e1fd62d92d958d95f
openssl-devel-1.1.1k-12.el8_9.i686.rpm
61e524f5d6a8499a6679fc9d8bf1e8c15631a8bd2606e387fa4abd90d1b3f16f
openssl-devel-1.1.1k-12.el8_9.x86_64.rpm
43558918f6b537fc877fa108a02aa3a2ed306f3b789c30d0d0fac8b657e7cfde
openssl-libs-1.1.1k-12.el8_9.i686.rpm
f0bb740ce91e52d708cd6788c48887c3bc6e8dfd764fff20efd2f3b43e3afcea
openssl-libs-1.1.1k-12.el8_9.x86_64.rpm
47db2774f793cf0e8f1be37af89df79e44376320fc14608f9c37a08c9a07d704
openssl-perl-1.1.1k-12.el8_9.x86_64.rpm
364ff6975e594cab5ad423b6290042dd0c58e43735b517efbdb7266e9acdaebe
RLSA-2025:18286
Moderate: libssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libssh-0.9.6-15.el8_10.i686.rpm
e81655bbcfd715df1859aacf7d1cc09f79fd27a1a98c22e3cfd89aff63ad0988
libssh-0.9.6-15.el8_10.x86_64.rpm
c6760723e10d2009f6c13b2217403ad7a977e2968e583fecd0bb31afb7ef365b
libssh-config-0.9.6-15.el8_10.noarch.rpm
804aff23eb4d762b5b05b4fbf98a6cc974620e6ff1b0ab755737487f58b713c8
libssh-config-0.9.6-15.el8_10.noarch.rpm
804aff23eb4d762b5b05b4fbf98a6cc974620e6ff1b0ab755737487f58b713c8
RLSA-2025:19102
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp (CVE-2023-53297)
* kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)
* kernel: Bluetooth: Fix potential use-after-free when clear keys (CVE-2023-53386)
* kernel: Bluetooth: L2CAP: Fix user-after-free (CVE-2022-50386)
* kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CVE-2025-39849)
* kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.81.1.el8_10.x86_64.rpm
7d45047f7ff383740b5072dad754ff98be7bc6a9fd11148bf63ea6af58e9c6fe
kernel-4.18.0-553.81.1.el8_10.x86_64.rpm
47fb4f72427c67ad556987987d3d95d9829702cdd6c017c1621f9502a82ad25a
kernel-abi-stablelists-4.18.0-553.81.1.el8_10.noarch.rpm
a39ead3890b1ce4b9263f53cc4a8a5f3e5b93aee26bf23fe48672ed54383c7a0
kernel-abi-stablelists-4.18.0-553.81.1.el8_10.noarch.rpm
a39ead3890b1ce4b9263f53cc4a8a5f3e5b93aee26bf23fe48672ed54383c7a0
kernel-core-4.18.0-553.81.1.el8_10.x86_64.rpm
b48d99beb2e21bbf34722400fbbed41d80e3f575885ef4dca38a1f16e7801121
kernel-debug-4.18.0-553.81.1.el8_10.x86_64.rpm
00e56fb1955ddb349447ddcb9bac671b1cad8cb5d63f1d0fe6703bb960386784
kernel-debug-core-4.18.0-553.81.1.el8_10.x86_64.rpm
47106e51505bfeea4809c3d5076e2091021c2b5865c5768215e1cafa3475ba0a
kernel-debug-devel-4.18.0-553.81.1.el8_10.x86_64.rpm
c7394d0ce0302cbbbf460a465155e9b7a34546edfc5495140d94ba7593746352
kernel-debuginfo-common-x86_64-4.18.0-553.81.1.el8_10.x86_64.rpm
70bcbf3a3173ffa30ce78447bd762da9d8e314077fdc8ae0d7049dd2ff388240
kernel-debug-modules-4.18.0-553.81.1.el8_10.x86_64.rpm
82c581c0ef83453a9af033905d156110bfd6b28ff79de3200b0aef4191481ed3
kernel-debug-modules-extra-4.18.0-553.81.1.el8_10.x86_64.rpm
64d6fd97bd734a457e6893dc824dbadb4ccb69d1c328d1b7090660064fa31e72
kernel-devel-4.18.0-553.81.1.el8_10.x86_64.rpm
031b13dfcccdb5a4c91abadf669105e72399d5ed9e867b08ef329b17a5f8769b
kernel-doc-4.18.0-553.81.1.el8_10.noarch.rpm
9c8c66c44fc334d11a2cecd604a0e05276a0829943b4f9194fefe88bf7fe6a27
kernel-doc-4.18.0-553.81.1.el8_10.noarch.rpm
9c8c66c44fc334d11a2cecd604a0e05276a0829943b4f9194fefe88bf7fe6a27
kernel-modules-4.18.0-553.81.1.el8_10.x86_64.rpm
d114b16981e5e918abe7ed6d116b6c5f7c7454f036efafd63a4f1afea35dbd43
kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64.rpm
7cd5fac1ec6d26b9a538acb686f659d60f813eb05cc60e5b1a1eba349fcd2a73
kernel-tools-4.18.0-553.81.1.el8_10.x86_64.rpm
779805ebf40f169518e9cc8469c2287016f35a0689560208914b71aada817f2f
kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64.rpm
d2945d624cf306553e2b6cf40730ac79148df27b19683818b54381ca4bbd38df
perf-4.18.0-553.81.1.el8_10.x86_64.rpm
478028d4a4635456300c01aba80c92493f712ba966fda9379c11fa3478a11550
python3-perf-4.18.0-553.81.1.el8_10.x86_64.rpm
f0d60e8923957c5a08ee96c72134b1b641575816f60cc69846a2559c6e4f5d1c
RLSA-2025:19835
Important: bind security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for bind.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bind-export-devel-9.11.36-16.el8_10.6.i686.rpm
b7d06df4c0429cb36b23c81b39f69650a895d5acd313e1f6a77c019d8a08d247
bind-export-devel-9.11.36-16.el8_10.6.x86_64.rpm
c7379c02e9ff6d5c7d077e092f5e59c8c3c494887ed9a01f5c485b54b727a740
bind-export-libs-9.11.36-16.el8_10.6.i686.rpm
87eb49071dc54d61d5ddb67a847558dff42b83d5bfbcfbc3ba07af59bb40dadb
bind-export-libs-9.11.36-16.el8_10.6.x86_64.rpm
080437579af6976c71cacfed57b1ac2015bdc535a72128c02d1261a51ec2fdea
RLSA-2025:2473
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: zero-initialize the report buffer (CVE-2024-50302)
* kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (CVE-2024-53197)
* kernel: scsi: megaraid_sas: Fix for a potential deadlock (CVE-2024-57807)
* kernel: pps: Fix a use-after-free (CVE-2024-57979)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.44.1.el8_10.x86_64.rpm
538087a29705aba7146c831baaee0a788d89ae7e1bce96e42b89137087f05c5b
kernel-4.18.0-553.44.1.el8_10.x86_64.rpm
997b3602daae5b711d1b2ebb00c8d1c04520d417273c0a21c8c22c55095f5b1c
kernel-abi-stablelists-4.18.0-553.44.1.el8_10.noarch.rpm
13318d11bf1b149e880cea82700c0a287c074744c6ce854f3a090d5a12842e3a
kernel-abi-stablelists-4.18.0-553.44.1.el8_10.noarch.rpm
13318d11bf1b149e880cea82700c0a287c074744c6ce854f3a090d5a12842e3a
kernel-core-4.18.0-553.44.1.el8_10.x86_64.rpm
9898a9e750a82dc8149dbe6db6f3c13be2625ca514495306532f8bb57f34d56d
kernel-cross-headers-4.18.0-553.44.1.el8_10.x86_64.rpm
5546349d872288d14c881f190b029567b80bd910473a3ef861e871c4389242f0
kernel-debug-4.18.0-553.44.1.el8_10.x86_64.rpm
13847f76887d725b12f13623b701dfcfac20671a6d7350f19061e9d608b1762d
kernel-debug-core-4.18.0-553.44.1.el8_10.x86_64.rpm
da5a5497d8a741079aac7e59e55d0f3fa5dc175006203f3e6bebc26d663b8525
kernel-debug-devel-4.18.0-553.44.1.el8_10.x86_64.rpm
5f7b7bfe83874ff5c5b113519f7ac9a8377a86f689a45f2fdfff6efef3d7f522
kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64.rpm
6615f7e5b99de8005654dd70aefd02c97a6f717d7f3ba91ae389c83ad5904f69
kernel-debug-modules-4.18.0-553.44.1.el8_10.x86_64.rpm
fab483520df9c168c498d8bf3a691b2834bdd1fd8d29cba536a97a4ee454ea80
kernel-debug-modules-extra-4.18.0-553.44.1.el8_10.x86_64.rpm
3571abeadfb09108a8a1ccdaa4db1997866d45c8503974a8c2e8bb2cea64cb0f
kernel-devel-4.18.0-553.44.1.el8_10.x86_64.rpm
a890052c2f949c3b86e8e7502cf77f8c821ac91b56fbb12140d220d7fb576b3d
kernel-doc-4.18.0-553.44.1.el8_10.noarch.rpm
d1358366ee2588087c7eb46b6dc7bb731574101fefa0d3ad2f3591b45fa52bd5
kernel-doc-4.18.0-553.44.1.el8_10.noarch.rpm
d1358366ee2588087c7eb46b6dc7bb731574101fefa0d3ad2f3591b45fa52bd5
kernel-headers-4.18.0-553.44.1.el8_10.x86_64.rpm
c7d52b8c4de8e462276370ed42f8ead0b76a5ead4e9f9009dea3d84fe213c79e
kernel-modules-4.18.0-553.44.1.el8_10.x86_64.rpm
181163ac203535e7b53164a1cfc13a340611d429f15744ff50d4c0c882485c73
kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64.rpm
2444d67857d1a51720235235ae52272571ea7f77d552491732e989b05accbcd4
kernel-tools-4.18.0-553.44.1.el8_10.x86_64.rpm
bebe3608aa935fb281f8979247011c1606cef1e4b507aef55f0df89620e11b39
kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64.rpm
12f93c0d100b473229097138b65cfa388e9e2f11c877dac8726993da174116be
perf-4.18.0-553.44.1.el8_10.x86_64.rpm
522d34ce1bfb79028b870df923fcd4f17a3a40c78953716de84c8c45827ba3ae
python3-perf-4.18.0-553.44.1.el8_10.x86_64.rpm
2c35839988a904984ae3bb71da9e94709c58d2d992bab6993c2c4b113c405c20
RLSA-2025:3026
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: can: bcm: Fix UAF in bcm_proc_show() (CVE-2023-52922)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.45.1.el8_10.x86_64.rpm
b9827042c8e200947c7dd00858c6ffca55a4bedbaabc434171dfedec29932be0
kernel-4.18.0-553.45.1.el8_10.x86_64.rpm
8072f25651c78b74b9d214212ec11896a3a1a6f75b0654ff2ac1bf1b849b1bbc
kernel-abi-stablelists-4.18.0-553.45.1.el8_10.noarch.rpm
fa12f68b999482de73456fa1ca3a02e0ae975892423669986ace2a0a480831ba
kernel-abi-stablelists-4.18.0-553.45.1.el8_10.noarch.rpm
fa12f68b999482de73456fa1ca3a02e0ae975892423669986ace2a0a480831ba
kernel-core-4.18.0-553.45.1.el8_10.x86_64.rpm
428598f495de5ac0d1fb1e7508646c2a795d4953c185341738f82c62772bfb28
kernel-cross-headers-4.18.0-553.45.1.el8_10.x86_64.rpm
edec40351edf21f6575677ecba033ad799224f593d3a68869e283384acbe14fa
kernel-debug-4.18.0-553.45.1.el8_10.x86_64.rpm
f69a6e639ef65960d9015c9311b230a5fced67deb0cfe1bfc524bc275b406556
kernel-debug-core-4.18.0-553.45.1.el8_10.x86_64.rpm
0dd06175a3a2e048ccc22d8d35c2d00ae02f5dcd8b7f5c07af2d57ed69de8e78
kernel-debug-devel-4.18.0-553.45.1.el8_10.x86_64.rpm
428a8851889e4025d79268dded50f9a900a02213c61628c34a4170dad76d0186
kernel-debuginfo-common-x86_64-4.18.0-553.45.1.el8_10.x86_64.rpm
207443f985164ed269856a218aea9a3562affc1f6d1900da53f361a4118cfa56
kernel-debug-modules-4.18.0-553.45.1.el8_10.x86_64.rpm
04f631ea4f336ba23d80fc5bcfe836b615a1ff9a623702d5c75c8495cb22d75e
kernel-debug-modules-extra-4.18.0-553.45.1.el8_10.x86_64.rpm
ac4db69b961237271b6fd50101338849c390e959655aea913ddee6038bce4571
kernel-devel-4.18.0-553.45.1.el8_10.x86_64.rpm
15f8e3e36c57c80c4e4f063af603bb90a87549324018b4a47b39842bcdff113f
kernel-doc-4.18.0-553.45.1.el8_10.noarch.rpm
6821d0990141917bf1bc4dc2941c2612ba53609191e39b438ab00341e237126e
kernel-doc-4.18.0-553.45.1.el8_10.noarch.rpm
6821d0990141917bf1bc4dc2941c2612ba53609191e39b438ab00341e237126e
kernel-headers-4.18.0-553.45.1.el8_10.x86_64.rpm
21d5f5e210cd69596ba95d8bdd109b078acc4e3a0dce024f360abc5281a49276
kernel-modules-4.18.0-553.45.1.el8_10.x86_64.rpm
7679ea60917aea6d73321d6254f1699d4f8b4363f1b1b416416c3740bea5fa7c
kernel-modules-extra-4.18.0-553.45.1.el8_10.x86_64.rpm
ff81f9bd9a2b3bd214b2e8e737238de6403633e0dec8dfb8b97182285eae2ae6
kernel-tools-4.18.0-553.45.1.el8_10.x86_64.rpm
aba742d3d74e57543bc4d29599d65d3cabb41cd3c18579507269193e82880e23
kernel-tools-libs-4.18.0-553.45.1.el8_10.x86_64.rpm
276e0b2f1376662d710884d1fac66a9a362a0078289c3c76c49cfa7431c244e1
perf-4.18.0-553.45.1.el8_10.x86_64.rpm
80e4550bb27c75cec572e369dc872a38e3e65853dfed1056aff226160189fcf6
python3-perf-4.18.0-553.45.1.el8_10.x86_64.rpm
4bf8cb2fb9fd4c7ad362503ea7d8b845c3079c6209b7b66eb55cc7a36f8c395b
RLSA-2025:3260
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (CVE-2025-21785)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.46.1.el8_10.x86_64.rpm
a0000c19169307fccfa9285a75070c2ba993bdd2b48b928bfd8fad8691694109
kernel-4.18.0-553.46.1.el8_10.x86_64.rpm
5c0c722fe6e17d17797f4aff4f51ef278370f4938e472fbcfefa50afd364f038
kernel-abi-stablelists-4.18.0-553.46.1.el8_10.noarch.rpm
77e144599a53116de2fba85681774edc86a58462d0b51f48abcf91d20b7d36bd
kernel-abi-stablelists-4.18.0-553.46.1.el8_10.noarch.rpm
77e144599a53116de2fba85681774edc86a58462d0b51f48abcf91d20b7d36bd
kernel-core-4.18.0-553.46.1.el8_10.x86_64.rpm
c204c0024ceaa6b9ae8527419d821ac186c86e939b6fca57ab0a316f2b17ff8d
kernel-cross-headers-4.18.0-553.46.1.el8_10.x86_64.rpm
e5d9fa9d145abb7a5a0ca6e6af6005c5cc80711b802f3e9a72c58ef8ff516a46
kernel-debug-4.18.0-553.46.1.el8_10.x86_64.rpm
f1879b6c6eda43b7bba34fe3bcc3f158492832bb8ea27dec67dc2925752c7fff
kernel-debug-core-4.18.0-553.46.1.el8_10.x86_64.rpm
84ac9025fb59fcc0e98fd46ced7ba5eb3b49f297bb5dfd7079ecd17c62d94531
kernel-debug-devel-4.18.0-553.46.1.el8_10.x86_64.rpm
7808ac49bd2bb16380ddb49dd8e8a030048714513268f280ebedd2c8fc334050
kernel-debuginfo-common-x86_64-4.18.0-553.46.1.el8_10.x86_64.rpm
da526298b8fdeb7425b97a02c0ed65dcdb7b088e17e9056932ae732e1ec251c6
kernel-debug-modules-4.18.0-553.46.1.el8_10.x86_64.rpm
3806584137a1a64b8a8c3af584dcab8e518b6d5b8620a0255f38905ad080754c
kernel-debug-modules-extra-4.18.0-553.46.1.el8_10.x86_64.rpm
79b89edc2aba01d41141436eefed2a7e458a828de3d2546a8b33ed44d851f311
kernel-devel-4.18.0-553.46.1.el8_10.x86_64.rpm
d94ea80d3a433f9d2499df9c33cb1d6155e50314b720f3c75d712220ba33b010
kernel-doc-4.18.0-553.46.1.el8_10.noarch.rpm
d11c7602b91a83a9a9501164f0f42f107c867807f32291b0d8fa761d2dc791f4
kernel-doc-4.18.0-553.46.1.el8_10.noarch.rpm
d11c7602b91a83a9a9501164f0f42f107c867807f32291b0d8fa761d2dc791f4
kernel-headers-4.18.0-553.46.1.el8_10.x86_64.rpm
8d52df087a96b3825a9fb2f6e5e087f27cae21312bd04ff2f564ab312a714bfd
kernel-modules-4.18.0-553.46.1.el8_10.x86_64.rpm
2be1193fca312e90c7ca1dfc7a84019075795191f82f052ff66713a71e7600c9
kernel-modules-extra-4.18.0-553.46.1.el8_10.x86_64.rpm
9a49cfd0539d120a50706bb9764cad09df734cf40b8ef4963d9105fe0e0f2f12
kernel-tools-4.18.0-553.46.1.el8_10.x86_64.rpm
771d25a8055aec1eab06e19fb3d1544b2aeab5064db84caa793f1735c0c7f6f7
kernel-tools-libs-4.18.0-553.46.1.el8_10.x86_64.rpm
dc109c17c236172ba9f78f4db7810dd55c18778871f4c609c41395dc280c9776
perf-4.18.0-553.46.1.el8_10.x86_64.rpm
a55138c01dcad8004bc21033dc7456d0b12cb8dc639c3eb612d199f8557c3110
python3-perf-4.18.0-553.46.1.el8_10.x86_64.rpm
3e55327a963c66492ec7758083b4b1e041fb7309e101b8e556ea96bca820f84e
RLSA-2025:3421
Important: freetype security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for freetype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently.
Security Fix(es):
* freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files (CVE-2025-27363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
freetype-2.9.1-10.el8_10.i686.rpm
46142c37c81524fc6d1890141f3a1f37153bb366e6bed85497a74b1897875f16
freetype-2.9.1-10.el8_10.x86_64.rpm
379878d60f3d4f01c61209ed57384d3c7f926d7429ec93dc886c22bf64a7cbfd
freetype-devel-2.9.1-10.el8_10.i686.rpm
1ca31539102f23222be579a9eb22a1bec7cbe6be0b67b69080130b7752a60c64
freetype-devel-2.9.1-10.el8_10.x86_64.rpm
1adbd2edf8b0e24ec73f3f464eb9c100e204acf93520c059a19ec40a5da45b20
RLSA-2025:3615
Important: libxslt security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libxslt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism.
Security Fix(es):
* libxslt: Use-After-Free in libxslt numbers.c (CVE-2025-24855)
* libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxslt-1.1.32-6.1.el8_10.i686.rpm
1bbc3397910cf17e8bb4757ac5829477cb57ab3bd8f04b0a5f70a6e3d69d4b2b
libxslt-1.1.32-6.1.el8_10.x86_64.rpm
e2c0d804a9a0f68a9df2728130289120fc2d5195b91f913e487422bbef583e3f
RLSA-2025:3828
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: buffer overflow in the GNU C Library's assert() (CVE-2025-0395)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-2.28-251.el8_10.16.i686.rpm
2c43314636c024efc2c6c2e73ab383e2a4a1cc3324fcd92a8c9c357ee8983417
glibc-2.28-251.el8_10.16.x86_64.rpm
f5b220b92d873f4602b0b3c0f1218a25f912fb6568819657aad872d832a3bc0c
glibc-all-langpacks-2.28-251.el8_10.16.x86_64.rpm
47b064a0742585ac3572f6b7e62da7304517d71c2b48423b472549985acc36db
glibc-common-2.28-251.el8_10.16.x86_64.rpm
259dccd1851423249972416b40c6fdbad0cb69348075989a3043b52f7b3b0c28
glibc-devel-2.28-251.el8_10.16.i686.rpm
62a76602e5278db4dbafa254a378730d03282f38c6d0706778a1dcefae51c98b
glibc-devel-2.28-251.el8_10.16.x86_64.rpm
fbee2a3b282ddfff45b7ae58d85020ba502fd3c31d7cc82d867f9a2917490426
glibc-doc-2.28-251.el8_10.16.noarch.rpm
2b65349f6b090b667de4758f7f84c48b5ff3d2eaf87df98f778fa0a46609d763
glibc-doc-2.28-251.el8_10.16.noarch.rpm
2b65349f6b090b667de4758f7f84c48b5ff3d2eaf87df98f778fa0a46609d763
glibc-gconv-extra-2.28-251.el8_10.16.i686.rpm
98d000c38e12d3c8f7331a230f09aeb181a5b05f114b52e02485be6de1ec4261
glibc-gconv-extra-2.28-251.el8_10.16.x86_64.rpm
466204d4ccafd1ea7e3a143e458a012ee3914db7cfe51121bfd8ee7c4099b721
glibc-headers-2.28-251.el8_10.16.i686.rpm
03beacdd48eb63243d06066ce2a3e206c3ffafa1a7d063e4ebc0ab257f3355d1
glibc-headers-2.28-251.el8_10.16.x86_64.rpm
88490a4556df3bed9cb5a7c5379cec78016505f84acfab960c389338cfda03c6
glibc-langpack-aa-2.28-251.el8_10.16.x86_64.rpm
dbede42065877edb9759ad34985958de9702f67e820f2193d3e67c63797d6a43
glibc-langpack-af-2.28-251.el8_10.16.x86_64.rpm
1874bce2e3fc8c10f3ba02be20555ce57c84327ad8a2eec4e19b56a9940ff071
glibc-langpack-agr-2.28-251.el8_10.16.x86_64.rpm
4e428b3c246caf736ad9ccc5a2571579f3d355f64691cb47bb29b85ce4b3bed3
glibc-langpack-ak-2.28-251.el8_10.16.x86_64.rpm
288589d22ec7d1d37a373d6d78b030384d3a3f0175da42e7620785c914fbd2e6
glibc-langpack-am-2.28-251.el8_10.16.x86_64.rpm
a8cc1f4421d65c548585d916b7ea7a7ba001f95c6c17de0dd9ca3acc18dd2043
glibc-langpack-an-2.28-251.el8_10.16.x86_64.rpm
07da8135953322e79d6e5c3a99feb1fe9abd9b4b4e9c1adc1bb317ab591cc3f8
glibc-langpack-anp-2.28-251.el8_10.16.x86_64.rpm
f2e30f2c0f205e330f6880be54876f7d3e4321e7be1546645759c8f45c103305
glibc-langpack-ar-2.28-251.el8_10.16.x86_64.rpm
50ba58b0d720d743e1c503baecb694bf53622267ad88b6ed53d3408a001498b7
glibc-langpack-as-2.28-251.el8_10.16.x86_64.rpm
28417fca2915f983380854d6611e8a7fadb7d72833cd8a51af3581b0415ae39c
glibc-langpack-ast-2.28-251.el8_10.16.x86_64.rpm
3ed44909c3942a8ee3d87eb56623f4b96dc426e9287463683932fba6720bae40
glibc-langpack-ayc-2.28-251.el8_10.16.x86_64.rpm
0c3bda8bb329423226e7a4d02919ab17fd7d558bab1b5f6cce698a71ff102f2b
glibc-langpack-az-2.28-251.el8_10.16.x86_64.rpm
64c119d8be634a62e1778cef22538ec42d597ef1fb33beef1523691dca7e289e
glibc-langpack-be-2.28-251.el8_10.16.x86_64.rpm
23fd503b56f2b252b6d1cc33f6056bd3b90cddadda63683d735d49fce26bee31
glibc-langpack-bem-2.28-251.el8_10.16.x86_64.rpm
e1aef0a5acaa5a97b3769297828ceb13b7f516e80cd11d459448aca1965974a4
glibc-langpack-ber-2.28-251.el8_10.16.x86_64.rpm
674dfb2d6c0b75895355c41d59fee1f4be945a9a9d349c574cbe739633a39f6c
glibc-langpack-bg-2.28-251.el8_10.16.x86_64.rpm
a17178504bebe83123ef9c2fef47c481e04af5203d5ecfef94614734165524e8
glibc-langpack-bhb-2.28-251.el8_10.16.x86_64.rpm
e99d547865d5a9ff5a3b3baf3454b1d6a76eabc1f2522f988debd31e7b47d193
glibc-langpack-bho-2.28-251.el8_10.16.x86_64.rpm
96fc0b938d4ac5a3c792cb1423ea94611fbe61e299a2bd47759ecfcf5feed24d
glibc-langpack-bi-2.28-251.el8_10.16.x86_64.rpm
b5835e625d86b3ffd9c03f6698efb8808fad2319e6d000ddb0609862c57da408
glibc-langpack-bn-2.28-251.el8_10.16.x86_64.rpm
dc486cd0f780c9b9acaeb0a7c72d1efe65beddfa832d52d44aa0703de490604c
glibc-langpack-bo-2.28-251.el8_10.16.x86_64.rpm
af28492793d8bd12828d65e2b7f71e619b3cdf17ca5cfc285c8a92ece60acc48
glibc-langpack-br-2.28-251.el8_10.16.x86_64.rpm
d69224c0744590f2a6fda47b42878c5f6eca0de8a8b7ba1ce3beaed8e159653b
glibc-langpack-brx-2.28-251.el8_10.16.x86_64.rpm
a33c2dc91e62409ef2c5d674fee08993fe34d002e9ff4e0ca2904f1c1c5d0988
glibc-langpack-bs-2.28-251.el8_10.16.x86_64.rpm
4cb2fa069e723af04fb2be7a77773cf9f2ff7e585e5f4f514d5d4f3346afaf61
glibc-langpack-byn-2.28-251.el8_10.16.x86_64.rpm
294e9923430619656796cbfa5600dc49558e2c4fcb767ff21cfa0dcf8fc27900
glibc-langpack-ca-2.28-251.el8_10.16.x86_64.rpm
6324587a16b533c2691b7299b33f98e715d110de30398dbd6a413cd9234b35c6
glibc-langpack-ce-2.28-251.el8_10.16.x86_64.rpm
cc33b2fb86e1c90096b7a516e25f17704f1d94fbb13ed5d654ccb51d1851bf8e
glibc-langpack-chr-2.28-251.el8_10.16.x86_64.rpm
9621c90e8564c08a8966a5f7cbecd5578e9a4092de88a42edbb7a443693a1479
glibc-langpack-cmn-2.28-251.el8_10.16.x86_64.rpm
65eba512bc851d572131a5bc4a079f6da7985d3079b0c3042919963a0a2b859f
glibc-langpack-crh-2.28-251.el8_10.16.x86_64.rpm
a2bea786e8248b73b40b3350b80286e16ba48e0505a3abd897d1d59fc0306cb1
glibc-langpack-cs-2.28-251.el8_10.16.x86_64.rpm
5dad3e967ae625efc18ffe116d052c9a9f352ae8a41ed7f55703a7bc1e5cd9f7
glibc-langpack-csb-2.28-251.el8_10.16.x86_64.rpm
c0589cf32991b11250f8d6b2d970221109602e5b5c1448eba273f9a69e2d7b0a
glibc-langpack-cv-2.28-251.el8_10.16.x86_64.rpm
d799c8ba437f8f794b33b6f2674834683c55936996783e6c003c814ef0c086e9
glibc-langpack-cy-2.28-251.el8_10.16.x86_64.rpm
c0e2dd623463b6a6a61eccc83f59194ecfbc2d8a4ee8cbec0defb9d582a07b7c
glibc-langpack-da-2.28-251.el8_10.16.x86_64.rpm
06ee74257b4cd1d0ca2cc0e5c9efd1e5e20267c59d67070d8959ca7de5443b99
glibc-langpack-de-2.28-251.el8_10.16.x86_64.rpm
99b8d1bf7feba62aa6ac391d1149e932afde3b48e1022c53a80c8a792266a149
glibc-langpack-doi-2.28-251.el8_10.16.x86_64.rpm
ca2c8c6543956183cef3df8e4be745cc1495e02eb3d12368ff674194c2afd39a
glibc-langpack-dsb-2.28-251.el8_10.16.x86_64.rpm
eac2372915bc8aec9dac3d26645873bf3ef88f020dd9a2003e981605f33d2963
glibc-langpack-dv-2.28-251.el8_10.16.x86_64.rpm
9b974b89f694b6fd410d30eac9607d81ec9dcc6fda3d20098249d23d91af425d
glibc-langpack-dz-2.28-251.el8_10.16.x86_64.rpm
e00ad0f03cd40899f216cb8d456332775e3d9c55bf51a8a251d21f7ee6d3c84b
glibc-langpack-el-2.28-251.el8_10.16.x86_64.rpm
e80e842837e05768642d579bc4d33c195a3eb699938f4d679ece544a8701db9d
glibc-langpack-en-2.28-251.el8_10.16.x86_64.rpm
1cc7fc74668f187aaee1815d02fd333933f3287de7fba4512201f4912d9c60fe
glibc-langpack-eo-2.28-251.el8_10.16.x86_64.rpm
6d69275b5540d9b435beecc1d2368bd6bd6bba472f01a455309518b9dddf81a6
glibc-langpack-es-2.28-251.el8_10.16.x86_64.rpm
726ae6dbb9585c73963849059c56f7b283b8e1ee9c181d9439c6a30bc7a4023d
glibc-langpack-et-2.28-251.el8_10.16.x86_64.rpm
25d7ec561f5b452db3eb56a8dd9c1db759f003cc36983ce8bc2ad881a0c0b9bc
glibc-langpack-eu-2.28-251.el8_10.16.x86_64.rpm
dbb1a15ae60404192a95e113c38e816da8a52bce036af16a78b0fa9c884f3061
glibc-langpack-fa-2.28-251.el8_10.16.x86_64.rpm
1067c9c3df28aae547201708e9fe969c5251e9323a540658112f35bd5bfa2f80
glibc-langpack-ff-2.28-251.el8_10.16.x86_64.rpm
312035c7da947f7657dec0d87ecaa48c076ddf46a9f857556c8d519560f66beb
glibc-langpack-fi-2.28-251.el8_10.16.x86_64.rpm
ee30fc8725b918ba839c3b09fde772faf20798caf2e080d05c7b157bbce38cb4
glibc-langpack-fil-2.28-251.el8_10.16.x86_64.rpm
cfae2c4961adb4668ec3373a53876b807d40322fe871bced4c8d3729ae7cc8fc
glibc-langpack-fo-2.28-251.el8_10.16.x86_64.rpm
d9e34b6b4370c8bb7a4da6fe60dc7ffbd94bd8333f94005e3bf4318b1e0fd00d
glibc-langpack-fr-2.28-251.el8_10.16.x86_64.rpm
9ad93f1c409d512a30a86e4e74daf37f45ae4bf6a76e2ac881e81a6c75febb8c
glibc-langpack-fur-2.28-251.el8_10.16.x86_64.rpm
96b8cc4d86d004b5289f263fc5075b158921ef7f40b1087c387a9b1472928074
glibc-langpack-fy-2.28-251.el8_10.16.x86_64.rpm
897db059a0124f7cf03e5b74884b7da5a3d239ea5c0068dad777f2aea029d87d
glibc-langpack-ga-2.28-251.el8_10.16.x86_64.rpm
c31a14fe69c15888c1c405beb3d4346de084e2b854b4ea55925eb50aebdf0626
glibc-langpack-gd-2.28-251.el8_10.16.x86_64.rpm
1a71c35c09f8e6068b2cf3841a406ae799403e3acea7c30db51031dce43fd332
glibc-langpack-gez-2.28-251.el8_10.16.x86_64.rpm
2a97482d15720a11fc12a8147d02596f64ccd9bd43ec7c65df253f6580109540
glibc-langpack-gl-2.28-251.el8_10.16.x86_64.rpm
13f5db1e4c4cef6d76ed5995c38d43804ac02474aca70a2f007de6790bf2d8b2
glibc-langpack-gu-2.28-251.el8_10.16.x86_64.rpm
4cd8ea75abfdf3b5c45c9f69e9e88afb3d418818e36b3c647eb3f16b8b9b3c2f
glibc-langpack-gv-2.28-251.el8_10.16.x86_64.rpm
cdf59dbd7d68424adde0c8d5db7aad142ccb90a4f1dd95823c0c1bed2ae8e6e2
glibc-langpack-ha-2.28-251.el8_10.16.x86_64.rpm
1e3908da12edb1fd8498efd1bbc90c0a7855fa9f167fb914941bdb5f9b2bf782
glibc-langpack-hak-2.28-251.el8_10.16.x86_64.rpm
430280b03d5f1b0ba2fde68a604980cecd0c2c21119e2614f42ef3d7e5ae217f
glibc-langpack-he-2.28-251.el8_10.16.x86_64.rpm
dd146cbd8abcd5b2b3f5dbeb9af2702d9ec313347dcd564f4e6645fd785063e8
glibc-langpack-hi-2.28-251.el8_10.16.x86_64.rpm
fdc4cee938f8e1f192c1df020a8129629cf587f1032503c38350b8159ddee8af
glibc-langpack-hif-2.28-251.el8_10.16.x86_64.rpm
31057ed030ecbc3b1162c2f5e874cc7bbe05634952e1252f7c71b6a067d39814
glibc-langpack-hne-2.28-251.el8_10.16.x86_64.rpm
95da5c81abbf83fa2e73c61f9963e86e0cfda66d54df8c2c6512a094a76b8832
glibc-langpack-hr-2.28-251.el8_10.16.x86_64.rpm
1d45bdb38c41f6ee1ce055104dbdceb3ba81b542b2e722e45c099cbdc588d3f9
glibc-langpack-hsb-2.28-251.el8_10.16.x86_64.rpm
8495744b86f4b75f461910715f4dc215cb94c55f4603fcb0613ca36f6ac0f324
glibc-langpack-ht-2.28-251.el8_10.16.x86_64.rpm
1c8b0c4fa7c08584718c9074fe0d2685cb0c952ef8a9251bac6ace602655bdb9
glibc-langpack-hu-2.28-251.el8_10.16.x86_64.rpm
3132910e694761d1ea256eec89849d64c3e73dd097e5a816d819327ba4ca9221
glibc-langpack-hy-2.28-251.el8_10.16.x86_64.rpm
047566301714fddf00456cb3a623dd8dde071451017498f6961f9687b2372d63
glibc-langpack-ia-2.28-251.el8_10.16.x86_64.rpm
2c914e695f7c0612ef9ec488099936b4f493708615733d7015da82c4b63aeef4
glibc-langpack-id-2.28-251.el8_10.16.x86_64.rpm
e6fc5ba835fecc48b37d0bf235b49eff0e0838b3e81c3d9a941bd04612088cca
glibc-langpack-ig-2.28-251.el8_10.16.x86_64.rpm
fcbcd74442b3af220e6167a4c6f7953905344edb97a2f2e0ea8495a266e61653
glibc-langpack-ik-2.28-251.el8_10.16.x86_64.rpm
6a49a77a945654ead840af6f55209ff7f7f55916efcaa98771971d2850c975fe
glibc-langpack-is-2.28-251.el8_10.16.x86_64.rpm
645c0fc2bfdbc01354c8a3802ff246d00bb436ebeebdbb5835fb0421fe6e661a
glibc-langpack-it-2.28-251.el8_10.16.x86_64.rpm
3f6d708189788aeb74e6063f2dedb9c5bb5f86a4dc940c4c7570bcad42b655c4
glibc-langpack-iu-2.28-251.el8_10.16.x86_64.rpm
c5c0f675e950c7f64a9fd25a74decf205221d25e80cd79e76b90361a193b8446
glibc-langpack-ja-2.28-251.el8_10.16.x86_64.rpm
da682bb4b5035816a7c63cda2a4c6cca6ecced0b0a13ef0508c39554b2c224a8
glibc-langpack-ka-2.28-251.el8_10.16.x86_64.rpm
b6c7fbc21198e7de4c172d78c893cfb28fd0e32e07b2037162438b5601779e93
glibc-langpack-kab-2.28-251.el8_10.16.x86_64.rpm
23cb2093470f75a058544be587ff888bc0724c73a4f148fb8b53e0694900735f
glibc-langpack-kk-2.28-251.el8_10.16.x86_64.rpm
49bcd372eab898670d93be59e81488a42474173fca7fa76eb9664c8c81d421be
glibc-langpack-kl-2.28-251.el8_10.16.x86_64.rpm
cabd60c666659a76660499bf48aff2dfeac611de860e988249ac74a358fd281d
glibc-langpack-km-2.28-251.el8_10.16.x86_64.rpm
fc6892c6326101f719f301debe5b97fba68f84b3e648458840c4b0d85f48867d
glibc-langpack-kn-2.28-251.el8_10.16.x86_64.rpm
37ce3145e259fb3c29e5a4d2d26a3ea1349ef0742b9e79988c167410841d725e
glibc-langpack-ko-2.28-251.el8_10.16.x86_64.rpm
aaece2f76a2dd107a2a310e7443f73a9c74ae860c29fb6f85ebb343b7c547cc5
glibc-langpack-kok-2.28-251.el8_10.16.x86_64.rpm
4c9e4116f16fede7e437f36ff69f5214c32ef9f3510625906f0b9dcb12211b14
glibc-langpack-ks-2.28-251.el8_10.16.x86_64.rpm
2c40c91e48e4d95a87f5ade517c30ac229bd137c50385935e14f896643d62a47
glibc-langpack-ku-2.28-251.el8_10.16.x86_64.rpm
363b04b0800533ae6b8a7d0b24a66785304c9cb318f79c4c3b9b6dca46148303
glibc-langpack-kw-2.28-251.el8_10.16.x86_64.rpm
7d2b5e30db58b7b31d2cf6974743a70a70d92a65c2c152fd120ac22516a8f4e5
glibc-langpack-ky-2.28-251.el8_10.16.x86_64.rpm
505704a505deae938dd94bcbe38ad9dd9d2c8767eedcf6a60b092f63c5f3c88a
glibc-langpack-lb-2.28-251.el8_10.16.x86_64.rpm
c420f79ed8ae437e1b958bffc5128ca68fbcab6301cb6eba110bf1da28b9f028
glibc-langpack-lg-2.28-251.el8_10.16.x86_64.rpm
4b0f547861e03c4ed2ba144c70b605087d321f3f436153e5ffcb9f5ea246af9c
glibc-langpack-li-2.28-251.el8_10.16.x86_64.rpm
36a30b5e905652f71d3bb0516eeced848deeae629c2dea0d896efee60ebe8569
glibc-langpack-lij-2.28-251.el8_10.16.x86_64.rpm
a2061703486a87cdcfe59ce1118df27c7c4f3815f74f4b1c3b6488ee8a4f537d
glibc-langpack-ln-2.28-251.el8_10.16.x86_64.rpm
ef9d7b65234520f4b4e01521673e3c5821ebef28dcd6d94e6b38416eebef36f8
glibc-langpack-lo-2.28-251.el8_10.16.x86_64.rpm
7026dd4d12789860e23a203fa9a37c0cce70218ae07be90c75371a4b69cb89d8
glibc-langpack-lt-2.28-251.el8_10.16.x86_64.rpm
008a77a585b01b59af0b80665ad5103c5fb5babeb7ecc86cea65b7acb8b9a6b5
glibc-langpack-lv-2.28-251.el8_10.16.x86_64.rpm
b474199327ae61a5d6c408dfe858941120a380cfd59158cff9e287e7e33f62b0
glibc-langpack-lzh-2.28-251.el8_10.16.x86_64.rpm
530300b97aa4bc0a1f66d26a251be59d74f3cd5570f4f75950e531cc161ce10a
glibc-langpack-mag-2.28-251.el8_10.16.x86_64.rpm
199da1021f99e7ebdeef18970794e25d0246909af4fe862730f2d78396a4dcbd
glibc-langpack-mai-2.28-251.el8_10.16.x86_64.rpm
1dad497252dd18e16e750dbaba0355faf72d7977628ec4b2343e9d356ac16208
glibc-langpack-mfe-2.28-251.el8_10.16.x86_64.rpm
ed9eef6a767e9d817f59d2ffae3c49b217780bbc9a7c19385d41c0b8cb2f2647
glibc-langpack-mg-2.28-251.el8_10.16.x86_64.rpm
d0b23337cca1354081ffc8b4fc3fcaafc4e2f475c9ebb650cf2615940023e875
glibc-langpack-mhr-2.28-251.el8_10.16.x86_64.rpm
fd2d13928e164be15f9fd556d1473baaec79de7a02b1eb1a50742d1ea4315fe6
glibc-langpack-mi-2.28-251.el8_10.16.x86_64.rpm
dd04c9e11901ff1c33d1ce2042bf9320dec0ea861e90c8d34be54114ae5ab128
glibc-langpack-miq-2.28-251.el8_10.16.x86_64.rpm
399bca812d61782269c8dd5d665eae9306c57356c41813608e10ad9525d23a8e
glibc-langpack-mjw-2.28-251.el8_10.16.x86_64.rpm
510444dc105a02cbd00fb5f6b18f55eec339d5671dde9526ab73d6e719ff00a4
glibc-langpack-mk-2.28-251.el8_10.16.x86_64.rpm
1eb9af921e45b8b2a0a810310618e1f5137e8813b1bd6aa4d327041e96f1d98d
glibc-langpack-ml-2.28-251.el8_10.16.x86_64.rpm
7932e061235efa9df6a4cda3197495b37aa739426afd0ff6b626470e3eeb0e2a
glibc-langpack-mn-2.28-251.el8_10.16.x86_64.rpm
bed3d5fb4f5d6d832e7fd6f06559994935f87862f134e427e567301a4dfa1652
glibc-langpack-mni-2.28-251.el8_10.16.x86_64.rpm
26008819bca16d690ddd9b1f339a47f19fc77b2359ab20ac15e2a9367abf154b
glibc-langpack-mr-2.28-251.el8_10.16.x86_64.rpm
12666efb17ccdc7927d4ce25e6f44cb867ac19f17030af92216a64a6e131e191
glibc-langpack-ms-2.28-251.el8_10.16.x86_64.rpm
0f4f55f66c4961538cbf95df717b79d7697184ba38b0c8d58ce567e4759b5f75
glibc-langpack-mt-2.28-251.el8_10.16.x86_64.rpm
66303873035f77fdf401b1fd0c798ebabbd7d340ab40a7f0952aff99a94ebc20
glibc-langpack-my-2.28-251.el8_10.16.x86_64.rpm
6f4bdcbeec6c1016a563f4ebe94dfe4a3f6f6ec783b5b51a4d9cfca3f2705ee8
glibc-langpack-nan-2.28-251.el8_10.16.x86_64.rpm
6f8cac4f37598b569826b6fa81c641d8a243c6bdd9e7aafbd89658f249079557
glibc-langpack-nb-2.28-251.el8_10.16.x86_64.rpm
3692185233859afdd5797877b0904990e8820626346c445cfcfae73c415f2d07
glibc-langpack-nds-2.28-251.el8_10.16.x86_64.rpm
0a2eb4bdba8a6c442804106ffbfa1b57fa015b4d2c9bf98a72747b0be3c1b57f
glibc-langpack-ne-2.28-251.el8_10.16.x86_64.rpm
8d82b6cac41c472928ffa8d136c29b7f327d142902f0a0de47c6dabe186496e7
glibc-langpack-nhn-2.28-251.el8_10.16.x86_64.rpm
f92dfe584d9d9f68172eb85bbd77ef78112fe524a1d95b6d3a1e84167eedd4d4
glibc-langpack-niu-2.28-251.el8_10.16.x86_64.rpm
b6d4cc53de9ff651218a858160486578c84268d8c485ca2b15d842a1ee610a5d
glibc-langpack-nl-2.28-251.el8_10.16.x86_64.rpm
4820b2ce479791c7fcff6bde2fe795a6345be6806c6183b26f559b00b7febc79
glibc-langpack-nn-2.28-251.el8_10.16.x86_64.rpm
3327eb0d0d6ef9ffa96c6136714c803c7cb0c8d51e31d28ef084d6efcfede3de
glibc-langpack-nr-2.28-251.el8_10.16.x86_64.rpm
155f08646e36f5b93cc0e99cbf71d4a440b071dd037d3437e239bc1a85676037
glibc-langpack-nso-2.28-251.el8_10.16.x86_64.rpm
c4e82ab242c2a45f0138b76cff5b252fb2ea0d5cfae7db86530a8279ac92b06c
glibc-langpack-oc-2.28-251.el8_10.16.x86_64.rpm
5fe659260add49678dd2f2df35610286acbadfb7c4988445c54325ea373c9f90
glibc-langpack-om-2.28-251.el8_10.16.x86_64.rpm
7ca213dd0e30143b0782f18480d358c1d47d63a9a113d163cc4c18f10d842f7c
glibc-langpack-or-2.28-251.el8_10.16.x86_64.rpm
26415085060607e3b3e5e0c61877885e156144128c3236155e179b32599c887c
glibc-langpack-os-2.28-251.el8_10.16.x86_64.rpm
ec9261e830d35e5af17dfe69bb87c5b0a24579ba7000d6da4d693f6c2606d86b
glibc-langpack-pa-2.28-251.el8_10.16.x86_64.rpm
1c9d1b75af1c029fda28d8f74e6b01272e79557a5cebf22431dea977761f8979
glibc-langpack-pap-2.28-251.el8_10.16.x86_64.rpm
80a3404460c12def7c72239115c1db4556e6b02b39439b5177fc359ef4a5d776
glibc-langpack-pl-2.28-251.el8_10.16.x86_64.rpm
fe3b84ac4f4a32b27f5e640a541f763b2e8521f59dd1d13726011f816e370bf3
glibc-langpack-ps-2.28-251.el8_10.16.x86_64.rpm
be5e06418c9562b0cd479f8eb99d74cc02453bc311ab42996e889786fdde850b
glibc-langpack-pt-2.28-251.el8_10.16.x86_64.rpm
55165b6fc5810927f99bc0b49e5e3afec79586c61f548e5eeb758c7af86cb9aa
glibc-langpack-quz-2.28-251.el8_10.16.x86_64.rpm
94f844cbf3c83cbee0aa736951356fac0258d1a1fe95b222f41fa04b527c5f4b
glibc-langpack-raj-2.28-251.el8_10.16.x86_64.rpm
a0c91f96d3b5b06fbfec1b67127cc370f3942610bd657e4d05ea807ac0cc34c3
glibc-langpack-ro-2.28-251.el8_10.16.x86_64.rpm
a80b23c973623fabca8f1c7316e3871e0bb773928c03b6960ca47effeeeb40d1
glibc-langpack-ru-2.28-251.el8_10.16.x86_64.rpm
37043d50d3f8b973218450e402dba5300fb0c6425ab47bf2d4daaa20cf991eab
glibc-langpack-rw-2.28-251.el8_10.16.x86_64.rpm
da3076c3cc39573c97c900cfbd3ea838cad6a1dc44f993d33a085a0dd831a639
glibc-langpack-sa-2.28-251.el8_10.16.x86_64.rpm
a5050007bf7ac9f87d331009ebe881e3255a3802e34459c6138ff72cf2815d63
glibc-langpack-sah-2.28-251.el8_10.16.x86_64.rpm
3f797f7a2c45563f22be000436e8f4bfd84ce7c6da25109070e7b1136c55d857
glibc-langpack-sat-2.28-251.el8_10.16.x86_64.rpm
e6e374810eec1c3c35c3d14d7c2da4abe81989c312eae0f16bb06640d18b9c40
glibc-langpack-sc-2.28-251.el8_10.16.x86_64.rpm
4ceb0635da7f37e31cea1f0d74c7eec511a1285330477d13c6ad3477abd3294a
glibc-langpack-sd-2.28-251.el8_10.16.x86_64.rpm
77b26755493b233019837796244363ae7dda15c20c22ffcae6eab25d1fd8e84e
glibc-langpack-se-2.28-251.el8_10.16.x86_64.rpm
d29c576a41f9b54c29c65fda0433b4c1b99ac82971cfbbf4a8853e763b1db6ec
glibc-langpack-sgs-2.28-251.el8_10.16.x86_64.rpm
2dfcdd51c133791cf91b8735e5663efd0c3aca20d63a24ba054588e6742c7758
glibc-langpack-shn-2.28-251.el8_10.16.x86_64.rpm
ad8d36cf83222eee9dea985690cca8917285ebe1a8d73f157eca8a94434a77a0
glibc-langpack-shs-2.28-251.el8_10.16.x86_64.rpm
baae8da1ee98eb81f5ab9d110f07c7b8b3a4a80d1627ce1df4e2f2ae93168a10
glibc-langpack-si-2.28-251.el8_10.16.x86_64.rpm
a91facb094ceee5ce2fd4d8f6c5ede2b8ce8c4c212e82fe2bb99428f61a9ec27
glibc-langpack-sid-2.28-251.el8_10.16.x86_64.rpm
00ecde57a3bcd646bd4ae03616d7d869e71cbf1699d77f91708849cc5f14b48e
glibc-langpack-sk-2.28-251.el8_10.16.x86_64.rpm
304f575e16b4a391172817e4d4aeda432d6b5b2c5eb524c0fe38959304f17598
glibc-langpack-sl-2.28-251.el8_10.16.x86_64.rpm
f4a557108abfd84d48c7cb7779b523112c7c21fd7c749ce5af745d532c1ebb1e
glibc-langpack-sm-2.28-251.el8_10.16.x86_64.rpm
b37999de2ca813ce99431ca519a415ebf4b31f3982954cddc2f40470550bafd9
glibc-langpack-so-2.28-251.el8_10.16.x86_64.rpm
d2aa3f2317746ba72eb02818376bc5d8dac74f496cb70f913eb32771ca4d447c
glibc-langpack-sq-2.28-251.el8_10.16.x86_64.rpm
70cd6317b347cab7dc80c35ee574d95eecca9b2bc54b426b7fcaf4ed4f04b927
glibc-langpack-sr-2.28-251.el8_10.16.x86_64.rpm
8c29fc9f6a480af786f65d1c4ab92348379df96e05f10c35d39e1fbbff37db6f
glibc-langpack-ss-2.28-251.el8_10.16.x86_64.rpm
0d29a8506ee239ca7f6352de1fc3668fde16e3d598ea7c9fe2f0ca88437422e4
glibc-langpack-st-2.28-251.el8_10.16.x86_64.rpm
d40cce68237269df63e40c786e22c6dbf36738d832d7c9b71e26235be9c8d556
glibc-langpack-sv-2.28-251.el8_10.16.x86_64.rpm
c0c9b175bcf0f2947991d2f418f5f6777636a9e116e95c337f68a746616ab80d
glibc-langpack-sw-2.28-251.el8_10.16.x86_64.rpm
65fe2944ad1d0ec9c2be873e14fdc888c6f77251da577a8572f71f6e8183635a
glibc-langpack-szl-2.28-251.el8_10.16.x86_64.rpm
21cf403baa3fef9bda922604f284924f9911a3c66e968b73bee07b27b71a1533
glibc-langpack-ta-2.28-251.el8_10.16.x86_64.rpm
b29e54ed41276af87bffaf43d9796eb51e3d95b887e5db27bc752bf949e8ccf1
glibc-langpack-tcy-2.28-251.el8_10.16.x86_64.rpm
a9e5e830d2c378eb4e76e1e2eb00bb3f353e6119612ef77e0e57c0c8234ca10e
glibc-langpack-te-2.28-251.el8_10.16.x86_64.rpm
65e39b1eb03e40b3203aa3aa1d4ddb2cbd2c8ddbe234852dae68758949b2a83b
glibc-langpack-tg-2.28-251.el8_10.16.x86_64.rpm
79bd0267e3ca1f7e5d0b83ca1fd4169b206c739add1e5af545efb8f9de473609
glibc-langpack-th-2.28-251.el8_10.16.x86_64.rpm
7a6705dee2275e9a28200ea3bb5a1178cb29c26b7bdfeedd0e2a043fc892eecb
glibc-langpack-the-2.28-251.el8_10.16.x86_64.rpm
b2cb6359bf0c260d2a8d4dff0ada4f012f3cb3376337d492877d846fc14466c4
glibc-langpack-ti-2.28-251.el8_10.16.x86_64.rpm
554d8fd5ebd7d9dc47811fd1de00fa486cd97548e689125cf2f2a5aa60e3b833
glibc-langpack-tig-2.28-251.el8_10.16.x86_64.rpm
62bba9f9250534dd680270528e77c543b2adfc4776a73166428b491a4395a93d
glibc-langpack-tk-2.28-251.el8_10.16.x86_64.rpm
7997d1f9ca751bb14caf9316eb5d113741b9029c8f1dfecf69d6f3a162221b02
glibc-langpack-tl-2.28-251.el8_10.16.x86_64.rpm
36763acd871fa638c0b75c4ce507836d64c79a16529870edd5141c7cd17390ac
glibc-langpack-tn-2.28-251.el8_10.16.x86_64.rpm
61441a40460d5fb47d86f06588a59cb8bf09d489c4c587bda08f45c6e73c990f
glibc-langpack-to-2.28-251.el8_10.16.x86_64.rpm
15a9f68ac4680fc357b6a778e30be0d1ae97c5ddebec569c7fa75ec89220c9e9
glibc-langpack-tpi-2.28-251.el8_10.16.x86_64.rpm
87912bc74c58019ad50a90d134b6367db0dcabb986c03b52ea1e158b1d35dd50
glibc-langpack-tr-2.28-251.el8_10.16.x86_64.rpm
3391f80c0bec70d34513b3d726a08800ae5baed084fbd28d90ba3a803b4e4a36
glibc-langpack-ts-2.28-251.el8_10.16.x86_64.rpm
57a3aab67f72e6bda1ca9024bf23b0e000261417d9c7fd6a3cf5e2c9c803d706
glibc-langpack-tt-2.28-251.el8_10.16.x86_64.rpm
50602666e4ab9cfe2b22eb6ab4b718c48999711b27b932e652e29cd8308c518d
glibc-langpack-ug-2.28-251.el8_10.16.x86_64.rpm
2fd8476606edbc9c8a5bd930c939228bc546798a63283e526ae73c03b462f971
glibc-langpack-uk-2.28-251.el8_10.16.x86_64.rpm
e1a216f53f3eff2d170acbc104a31fb1ce1176b43d2319210bd4984e3be9fd93
glibc-langpack-unm-2.28-251.el8_10.16.x86_64.rpm
cc86410e2f9b73b0883e7bb5259ffd8983ef367c0064210fb54cd58baa2bbcca
glibc-langpack-ur-2.28-251.el8_10.16.x86_64.rpm
c9e2e25023109de536abe225e4931bca17847ed8f2211e4d1107fa8f885ce67c
glibc-langpack-uz-2.28-251.el8_10.16.x86_64.rpm
308cc979b6250e18cf83209372c53e3efb01bb7070f2083bfd957cef2e8d59bb
glibc-langpack-ve-2.28-251.el8_10.16.x86_64.rpm
7cb1faa0a5cceda6c144e3805f00c07c8840dc3e0e7c27b3537731f39dc19f32
glibc-langpack-vi-2.28-251.el8_10.16.x86_64.rpm
c23f9d7775c68d212d05145ba79faa96d8709047ebec91652e29326f365e0d3d
glibc-langpack-wa-2.28-251.el8_10.16.x86_64.rpm
81d3430328d4e50ff947306a12f7dedc6fc6253125d5dfc4fc88141f10dcc4ed
glibc-langpack-wae-2.28-251.el8_10.16.x86_64.rpm
6eb3f705475eaf7fe4f6d9c53dfc269b28f49ba8108f96df678dcbd42c5111fc
glibc-langpack-wal-2.28-251.el8_10.16.x86_64.rpm
0b7bf17465c8b0797c89f882f901feae6cccdc555f9d129bb938677feca68717
glibc-langpack-wo-2.28-251.el8_10.16.x86_64.rpm
72e04124cec3af5cf93196ec7d39650c3edc13a660bab6fbc3bff3eb06992b92
glibc-langpack-xh-2.28-251.el8_10.16.x86_64.rpm
6431a9e713fac7a1105cca855c5b18ac93a9754f3616575bee020526cf72ffa8
glibc-langpack-yi-2.28-251.el8_10.16.x86_64.rpm
5a36b280e7943ef8848e57dccb8413b55872d17b69bf26eae45b45c3d26f302a
glibc-langpack-yo-2.28-251.el8_10.16.x86_64.rpm
6626134ac2f631fecd9f7fcb4ae8a338171706939bb2cf223b4c8e1c935847b9
glibc-langpack-yue-2.28-251.el8_10.16.x86_64.rpm
493bbd389702924a67f25208e3c92ffdb9ae65a28445439bc5d595af46129fe8
glibc-langpack-yuw-2.28-251.el8_10.16.x86_64.rpm
8cdf80cb3d97ac2722a7987cca803f475e7e3ca4154fe0becd5b415fcbf60704
glibc-langpack-zh-2.28-251.el8_10.16.x86_64.rpm
9c3781e9cbdb9c238adb12a4c48fe9c0901bfe1e28ef554e59aec337f0fe6e5a
glibc-langpack-zu-2.28-251.el8_10.16.x86_64.rpm
e82702466c4c0110f75c4cc23223ab64039aaec523a781c52da148b53dda55e3
glibc-locale-source-2.28-251.el8_10.16.x86_64.rpm
bc3a46a7491968e4b0c965554960fd3a727d71b3b502ab567cb92900758330ef
glibc-minimal-langpack-2.28-251.el8_10.16.x86_64.rpm
372934744dcaefeb4c8306023d06ffedc66538b3ac589371d5171ca840396520
libnsl-2.28-251.el8_10.16.i686.rpm
f071b5d0d1a1b1da573a2275903259a81c143a4a38c3f08447b0c9788fcdca6a
libnsl-2.28-251.el8_10.16.x86_64.rpm
cfe1c47f62fd869701aded9d2096e68ac3b867cf8c4efb5254d976048389e3a0
nscd-2.28-251.el8_10.16.x86_64.rpm
b502f3e8e5229ef8a3b507b65daf0e2482d6c40b982d33fb314c724e3d96d223
nss_db-2.28-251.el8_10.16.i686.rpm
5db3ac7dd7d669f655b42eea7cb4cf0b2e59365335aeacb2bb8f24039c87a897
nss_db-2.28-251.el8_10.16.x86_64.rpm
99338b126bc53f0ae8c8b129721867acd3d146551577e1e0a2ba42988dc7f638
RLSA-2025:3893
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) (CVE-2024-53241)
* kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources (CVE-2024-53150)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.50.1.el8_10.x86_64.rpm
6d63e32a2d4b0e061218af2ff3f81f2944178e8641883d16c825f4bf7dcf31aa
kernel-4.18.0-553.50.1.el8_10.x86_64.rpm
13514b0dc28553f24b8d13afa069164dc74a317ffde79d5ac2c99386dca3bdfd
kernel-abi-stablelists-4.18.0-553.50.1.el8_10.noarch.rpm
a5834b406e403f149cee35152bc57f52efcab9668493676cb0e8a83d879ae2ea
kernel-abi-stablelists-4.18.0-553.50.1.el8_10.noarch.rpm
a5834b406e403f149cee35152bc57f52efcab9668493676cb0e8a83d879ae2ea
kernel-core-4.18.0-553.50.1.el8_10.x86_64.rpm
67d2c220c9cd18cdb02a2e3b807f22e13e9776506da12b9ee13d7e9d68291f4a
kernel-cross-headers-4.18.0-553.50.1.el8_10.x86_64.rpm
6d6a0186de374cd4ddf68a78b3edb3f7de0433edf96e1318eda7930656aa6bfd
kernel-debug-4.18.0-553.50.1.el8_10.x86_64.rpm
f5cef5ceedc9f2954a1bd9e5a76ab25fcc85867f7817d2fd29926e5e826cdf90
kernel-debug-core-4.18.0-553.50.1.el8_10.x86_64.rpm
6bc9571f71baa97ec473fc0da57baedca102cb7028059fcbb7ab9a86ae18a496
kernel-debug-devel-4.18.0-553.50.1.el8_10.x86_64.rpm
1aa8bf75775c5c24b01ae8c032cdbae9d10bc2cd8656716e9f17f7428cc3be6e
kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64.rpm
3d6cf8e86a771f44996d2e063cb473cd4f9c3c38e139dcc02c00fcdc6602a6b1
kernel-debug-modules-4.18.0-553.50.1.el8_10.x86_64.rpm
c99a2ed8daa4f3633d608eed2ad2aa8bbe7086d32673743215b38f1e1b368a7a
kernel-debug-modules-extra-4.18.0-553.50.1.el8_10.x86_64.rpm
583c98accb2b4d10d44242968027a503b63df317ce116057084e6f1128c238d0
kernel-devel-4.18.0-553.50.1.el8_10.x86_64.rpm
5b5bb25fdd0b83ff0bf6c77a48170e169d80b5440059edb85b369da697b58bf4
kernel-doc-4.18.0-553.50.1.el8_10.noarch.rpm
8bff62618cb23496d9b3624a85b3b5ff90d716ab49fcf835a97e249a767720b9
kernel-doc-4.18.0-553.50.1.el8_10.noarch.rpm
8bff62618cb23496d9b3624a85b3b5ff90d716ab49fcf835a97e249a767720b9
kernel-headers-4.18.0-553.50.1.el8_10.x86_64.rpm
a5f05233d4b043c3e55c5a42cc19493cfd2a3a53aad25683a9cdbc8941cf2574
kernel-modules-4.18.0-553.50.1.el8_10.x86_64.rpm
cb25555632d0bdf8aa365b14df90274b85baf88003b703564f10e3590dae7259
kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64.rpm
726ad4c09e22b6e84ed82a6d7bfa798e93e444dd417ef2b07ed8be5696cb580b
kernel-tools-4.18.0-553.50.1.el8_10.x86_64.rpm
e0340f1fdddc56a7038d4d06d8967e27d1ebfa80b8f52488e90d12f8073b85af
kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64.rpm
d3a97d9afcb7b409774858f28e1c8bab344589ed41f4f30b134f3906867210fe
perf-4.18.0-553.50.1.el8_10.x86_64.rpm
bea0086a149bc9557b6269bb6393f713302a9e2f897907aefcad1446170804f5
python3-perf-4.18.0-553.50.1.el8_10.x86_64.rpm
fda45dcfe0f02b2ea32d6e05e79ae45d2ece287f0ad1bcf676bf8a545a57b680
RLSA-2025:3913
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.2.5-17.el8_10.i686.rpm
f62047ab17b7488963e6e31a0db42989f2fa0b9db053e213d9e0461589a2da67
expat-2.2.5-17.el8_10.x86_64.rpm
78aa94079f5c8e405fecd19e662c251789f2924ab6e6472a58013e941a168439
expat-devel-2.2.5-17.el8_10.i686.rpm
7f15deb7a5dde47b470dcb93b3a7f4c8b448ffd59dcf77b5daa13d3e1613fbe9
expat-devel-2.2.5-17.el8_10.x86_64.rpm
8109d5fa5497be58e744a0ba573a0bc9102e17a8b0b817d78d408c4b65722d8c
RLSA-2025:4051
Moderate: gnutls security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: GnuTLS Impacted by Inefficient DER Decoding in libtasn1 Leading to Remote DoS (CVE-2024-12243)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gnutls-3.6.16-8.el8_10.3.i686.rpm
eed02a465e0ed2dc48d8df862637fdd10beda2b5e9ae61bdd8d998ed4ab9ee59
gnutls-3.6.16-8.el8_10.3.x86_64.rpm
7ab091ce230c60248439a616cfae07aa746bfa7b7cf5813c49922c810982edb8
RLSA-2025:4043
Moderate: bluez security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for bluez.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files.
Security Fix(es):
* BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability (CVE-2023-27349)
* bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability (CVE-2023-51589)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bluez-5.63-5.el8_10.x86_64.rpm
fff65b142145a3e3b158d7e67b53f2091d5f619f919a474683e70fca691d33dd
bluez-hid2hci-5.63-5.el8_10.x86_64.rpm
384afbfa292e96dbdf22cd59e784b1cd534a62b3e45b61cccb60254fc2b73227
bluez-libs-5.63-5.el8_10.i686.rpm
b0bf3e8254fb1733af871abab763e590b0822063180a2da4a85908e14d7fe84a
bluez-libs-5.63-5.el8_10.x86_64.rpm
1d7bc91287c830f2ba3e4f74011882e886fedf2a1b3d77536d76563723c67a75
bluez-obexd-5.63-5.el8_10.x86_64.rpm
26e9272ac42d35819f49e2443b014cda0f20619c48ed21a7987a4e02c76c059a
RLSA-2025:4048
Moderate: xmlrpc-c security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for xmlrpc-c.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
xmlrpc-c-1.51.0-11.el8_10.i686.rpm
f8f197bfd61cc1cfb84052306c1f1a485bbbc59d8967defc7211d08c83c171fe
xmlrpc-c-1.51.0-11.el8_10.x86_64.rpm
cb809af928ce8ae2ad50f642e9b68b1fbedd7f298a4f9938e09a02c3f0b1a9c0
xmlrpc-c-client-1.51.0-11.el8_10.i686.rpm
0ac0b6c35e09907c1af27df808892301e6034c36212e415c59e308ad7fc0fdae
xmlrpc-c-client-1.51.0-11.el8_10.x86_64.rpm
17c82a0dd6af44a527c22d0e655f42ffc18f2d4027edb659014bfb281bb0b895
RLSA-2025:4049
Moderate: libtasn1 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libtasn1.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions.
Security Fix(es):
* libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS (CVE-2024-12133)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libtasn1-4.13-5.el8_10.i686.rpm
a2b7895207095f5e4a5b2f1117b0ffdb75c33daf6ab469435b74d8d35f5e6cb0
libtasn1-4.13-5.el8_10.x86_64.rpm
e1d2b78669710867d243c7da890b16640762dda3734c43ffc83054b001355157
RLSA-2025:4560
Important: libsoup security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libsoup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: Integer overflow in append_param_quoted (CVE-2025-32050)
* libsoup: Heap buffer overflow in sniff_unknown() (CVE-2025-32052)
* libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (CVE-2025-32053)
* libsoup: Out of bounds reads in soup_headers_parse_request() (CVE-2025-32906)
* libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value (CVE-2025-32911)
* libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header (CVE-2025-32913)
* libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server (CVE-2025-46421)
* libsoup: Memory leak on soup_header_parse_quality_list() via soup-headers.c (CVE-2025-46420)
* libsoup: Integer overflow in append_param_quoted [rhel-8.10.z] (CVE-2025-32050)
* libsoup: Heap buffer overflow in sniff_unknown() [rhel-8.10.z] (CVE-2025-32052)
* libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() [rhel-8.10.z] (CVE-2025-32053)
* libsoup: Out of bounds reads in soup_headers_parse_request() [rhel-8.10.z] (CVE-2025-32906)
* libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value [rhel-8.10.z] (CVE-2025-32911)
* libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header [rhel-8.10.z] (CVE-2025-32913)
* libsoup: Memory leak on soup_header_parse_quality_list() via soup-headers.c [rhel-8.10.z] (CVE-2025-46420)
* libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server [rhel-8.10.z] (CVE-2025-46421)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
none-baseos-rpms
libsoup-2.62.3-8.el8_10.i686.rpm
ef09d09a64ac273fad25a0f3b3626e95a00dbc9d1a87b973be59ad1257ddf5c8
libsoup-2.62.3-8.el8_10.x86_64.rpm
410606bab3ea92a26254f75e3f0b36c2e450b3ecbfcc697f60d24e2d5db2272f
RLSA-2025:8056
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/mlx5: Always stop health timer during driver removal (CVE-2024-40906)
* kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (CVE-2024-44970)
* kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.53.1.el8_10.x86_64.rpm
abf35ba961508f58789cf0f693b2c3d8e2b624b47af6f4f82687cc98f028c202
kernel-4.18.0-553.53.1.el8_10.x86_64.rpm
f1f4d716f7c16c9f0c271558801f18f86bc9c2a17015d20136191fb6e560da6d
kernel-abi-stablelists-4.18.0-553.53.1.el8_10.noarch.rpm
2eb2f94461dc54dc22508d3aa5bbccab8fb4b933712b9e01ae471d69a78f3e3f
kernel-abi-stablelists-4.18.0-553.53.1.el8_10.noarch.rpm
2eb2f94461dc54dc22508d3aa5bbccab8fb4b933712b9e01ae471d69a78f3e3f
kernel-core-4.18.0-553.53.1.el8_10.x86_64.rpm
28ba891b34ee97f69594add138e1e63942eb89536b02efca252689d7119e90dd
kernel-cross-headers-4.18.0-553.53.1.el8_10.x86_64.rpm
1e63e5ccbad9d5890efe7f4ccf36242a6d54d855212d551a62e707399a77ad53
kernel-debug-4.18.0-553.53.1.el8_10.x86_64.rpm
47bc2904e2c59450b551f6a8e8e711b8a58b52701a27ebd29d615a244b535e57
kernel-debug-core-4.18.0-553.53.1.el8_10.x86_64.rpm
e70dd009b22a6f22995e8d1269ebb7410c121a87c2a1fccf80fff90e41933b18
kernel-debug-devel-4.18.0-553.53.1.el8_10.x86_64.rpm
dede71d7070816cf3551f255dad71edd58c86cf1e319dee6aae9197184d56f71
kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64.rpm
69d8ec7aa693e208baef5190a3809c523b21ba4147708100d0611e8b2bc48774
kernel-debug-modules-4.18.0-553.53.1.el8_10.x86_64.rpm
c43518a18b29284eaea100befc6613f0812879e860afa45f6e28b000d9ef6f28
kernel-debug-modules-extra-4.18.0-553.53.1.el8_10.x86_64.rpm
224678910b8a8be6c4d50524d7088b4c51d4bd2edef6b97e1bb2ca69f0a8e44f
kernel-devel-4.18.0-553.53.1.el8_10.x86_64.rpm
a601937d12082c4bf37381d034365bc9d1ab9ba87f8197fff6b8f8e8ca7cc537
kernel-doc-4.18.0-553.53.1.el8_10.noarch.rpm
89dce0380879c136cb50a2f385ea6767750dbda775923dc7dee5afc328d07cf6
kernel-doc-4.18.0-553.53.1.el8_10.noarch.rpm
89dce0380879c136cb50a2f385ea6767750dbda775923dc7dee5afc328d07cf6
kernel-headers-4.18.0-553.53.1.el8_10.x86_64.rpm
186bc7197d7f7a7c743d559eb46c40eac7af8b02f2d1ab17c81be53ef9f7b744
kernel-modules-4.18.0-553.53.1.el8_10.x86_64.rpm
fdf8c0b239c7fefe942e65e687d5cd2e187d29d95e8205af6fd4c1ced0732896
kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64.rpm
8eb0676d577153fd33e18ca92731a2bb0a470afd78e1223802612e3f15b15fc0
kernel-tools-4.18.0-553.53.1.el8_10.x86_64.rpm
ed051f365f03571b7665303c58fcfa082b8f4503c45737c22e18a81c173883ad
kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64.rpm
e1a2e2247f4b53b5e85f0bcf3e3443c1926db7481b8b2475ea0d1c8a8212d57f
perf-4.18.0-553.53.1.el8_10.x86_64.rpm
39a882c92059f468e0b3a42b4084e30de424a8822095bef00a27b7df1ed4722a
python3-perf-4.18.0-553.53.1.el8_10.x86_64.rpm
02cdc0bcea1e4cfee43f21f8e5522b99c7eda17510f6fb4f23b4ca3244705600
RLSA-2025:8132
Important: libsoup security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libsoup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content (CVE-2025-2784)
* libsoup: Denial of Service attack to websocket server (CVE-2025-32049)
* libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process (CVE-2025-32914)
* libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libsoup-2.62.3-9.el8_10.i686.rpm
1962bacd0728add927a52e7a71711d3f8ca5e47b675451c7aab51517fe052344
libsoup-2.62.3-9.el8_10.x86_64.rpm
5647439f6d6bf5dc2021100bd506ff9917013dd778cae3bd8d04a20aa346913e
RLSA-2025:8246
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (CVE-2024-43842)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.54.1.el8_10.x86_64.rpm
0a2e314bcb0944b271d6234d0cc085d169c5ceb2b9c5d14865407bfeeaabadfe
kernel-4.18.0-553.54.1.el8_10.x86_64.rpm
308f1d66c5e152955ab087fcaff8cdad5fdf83e71cb0c442b1020f31bfe04e5d
kernel-abi-stablelists-4.18.0-553.54.1.el8_10.noarch.rpm
e943777d96be15a2f733c26a82ac31da1de9ec367d3bba230b148c3e68a470e8
kernel-abi-stablelists-4.18.0-553.54.1.el8_10.noarch.rpm
e943777d96be15a2f733c26a82ac31da1de9ec367d3bba230b148c3e68a470e8
kernel-core-4.18.0-553.54.1.el8_10.x86_64.rpm
61c69f261aa3178520acf6d67052a9f216f810cd128267056f14e570f8339ed4
kernel-cross-headers-4.18.0-553.54.1.el8_10.x86_64.rpm
22a5e6ba7c6754480a551aff41bd0bb25b0dea065afb5b25c80ac1d8dc8ebec5
kernel-debug-4.18.0-553.54.1.el8_10.x86_64.rpm
105ec940e1c5423e838a447643a445f40fb58bcaff0f7bf4d97f6049d29d71ef
kernel-debug-core-4.18.0-553.54.1.el8_10.x86_64.rpm
a4c8da094d317f4466164c4922c32867200290399af1bb1bdf6f1522652e038b
kernel-debug-devel-4.18.0-553.54.1.el8_10.x86_64.rpm
96a21b07b229c92c4812720d776baa7998094dc6967f930a8f64799f168bb1bd
kernel-debuginfo-common-x86_64-4.18.0-553.54.1.el8_10.x86_64.rpm
7ffac67801b9b18ab1f88cfa9b64f04baf872620fd1c63b95e258493e2ee87aa
kernel-debug-modules-4.18.0-553.54.1.el8_10.x86_64.rpm
98a98211bdeb6123221aa93e31941a33905735503db0bf5bbd640ecd1f8de0e0
kernel-debug-modules-extra-4.18.0-553.54.1.el8_10.x86_64.rpm
64b5e917e93cc1b762b7cca7bde9355e99d069091e08f467043e758c6039dd0c
kernel-devel-4.18.0-553.54.1.el8_10.x86_64.rpm
6a9343390cd0f8088b9ff5ed90148a01f2a6a81c812a5d8e2648a4dc4ccd758f
kernel-doc-4.18.0-553.54.1.el8_10.noarch.rpm
5a58eacd593ebd9938b90cfde46f9ddb611ddfe68b87dc058f1f974085d9da46
kernel-doc-4.18.0-553.54.1.el8_10.noarch.rpm
5a58eacd593ebd9938b90cfde46f9ddb611ddfe68b87dc058f1f974085d9da46
kernel-headers-4.18.0-553.54.1.el8_10.x86_64.rpm
efd044158737790b2f0fadfd93454d45caea85e100433ae12e818f96af1cb1ba
kernel-modules-4.18.0-553.54.1.el8_10.x86_64.rpm
eae53d023969f3e01bad594102d294635797c8c4a708fca07c528b87aca600a3
kernel-modules-extra-4.18.0-553.54.1.el8_10.x86_64.rpm
a186906f02f1377886b8f652c17abb74b62e464f12204a53b14568105c56a3c3
kernel-tools-4.18.0-553.54.1.el8_10.x86_64.rpm
67252234d0e8ed3c75c80fadf90646ef78ae0e571ee1690021592dc148ff0855
kernel-tools-libs-4.18.0-553.54.1.el8_10.x86_64.rpm
bef9b02f3e8b0d3b41611ee7a6bdb70e9fc0a295f0808290fdfdb2bb9b060101
perf-4.18.0-553.54.1.el8_10.x86_64.rpm
6face25fcde95b75e18f66ca8d5ecdbf9856cb1346972ea2427dde94973aa832
python3-perf-4.18.0-553.54.1.el8_10.x86_64.rpm
e6b6511c2ec22eba4e7b65c9a05c6d2058223189938a77c2d95b930dc386d6c3
RLSA-2025:8395
Low: rsync security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Low
An update is available for rsync.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool.
Security Fix(es):
* zlib: Out-of-bounds pointer arithmetic in inftrees.c (CVE-2016-9840)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
rsync-3.1.3-23.el8_10.x86_64.rpm
7cd67befe1b5991f9b8535ae90bbebb3ec702de63434d4a4b0f4c59f6c25b548
rsync-daemon-3.1.3-23.el8_10.noarch.rpm
ffac7441365c409e96cc4fe0208b912b5740da1aee4dce43e4a6cb8a9b83afe5
rsync-daemon-3.1.3-23.el8_10.noarch.rpm
ffac7441365c409e96cc4fe0208b912b5740da1aee4dce43e4a6cb8a9b83afe5
RLSA-2025:8411
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
krb5-devel-1.18.2-32.el8_10.i686.rpm
691f4af06f82260e132a2f6da789d05f4ec75768718494b787a35435d0fd4ac3
krb5-devel-1.18.2-32.el8_10.x86_64.rpm
649c0123b91a0000fbfd759463af733f4526fd9e2aa17ae65fdaeef9c0bc9977
krb5-libs-1.18.2-32.el8_10.i686.rpm
14b6245bad40971c709b13573a05af88f4d734bc3245fcd67e669b01a35f6b46
krb5-libs-1.18.2-32.el8_10.x86_64.rpm
a93fdcdaff678d286ac9dc4559cf2b5b36d0daaf6b17d25d8e42747626a534ee
krb5-pkinit-1.18.2-32.el8_10.i686.rpm
3f7b214d022b9dff312c2828f9687249d6e64f4da71e6c06832966e13f16826e
krb5-pkinit-1.18.2-32.el8_10.x86_64.rpm
187c58ce1647d60983a76cff8ab0540126dc41aacc651398108a04cfb9f6ccdd
krb5-server-1.18.2-32.el8_10.i686.rpm
24420a63c0aadd457de9646204789533ce7bed94b9e94271c79ef3a098b20668
krb5-server-1.18.2-32.el8_10.x86_64.rpm
9c5cfcd1f1de665fcb1e205951893e4c610b92db6b44e45d217d25afca4152ae
krb5-server-ldap-1.18.2-32.el8_10.i686.rpm
160a919020087215f03fa11b93c909c4f5537a86391beb8ca5efe52f98a7081c
krb5-server-ldap-1.18.2-32.el8_10.x86_64.rpm
729350362e61b022f050c388278a55888f6a33c3391255276ed5979f4b5c9a3f
krb5-workstation-1.18.2-32.el8_10.x86_64.rpm
8e731dda58d999a1e159545c994190ce3050f386eaadf7d8bcd79f3c871a8a6d
libkadm5-1.18.2-32.el8_10.i686.rpm
886e866f91a009463568c7f0e40fd2f05c56ebeb689ba4310362d3ccbb219da4
libkadm5-1.18.2-32.el8_10.x86_64.rpm
9687a40355ca3a219e74012427a562cfe37671aa940220e5378bd71cf451c5e1
RLSA-2025:8676
Moderate: libxslt security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxslt.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism.
Security Fix(es):
* libxslt: Processing web content may disclose sensitive information (CVE-2023-40403)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxslt-1.1.32-6.2.el8_10.i686.rpm
2e04a68ca0aec7a94a22d10a6f13aba3497cb4ec61d0bdfddd5db016c310c04c
libxslt-1.1.32-6.2.el8_10.x86_64.rpm
08cd23ee2437d369e2ed3f29c37028fccaeeec3537125777a91067cd029647ff
RLSA-2025:8686
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH (CVE-2025-4802)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glibc-2.28-251.el8_10.22.i686.rpm
da3d87d6e4ee9938995b0d55736eadd88aae9057c170d3eb4614185dc4cf0836
glibc-2.28-251.el8_10.22.x86_64.rpm
904846d9b51c9cbb5d86b42c824f0313701ca2d02301f1851694f2b0f2713097
glibc-all-langpacks-2.28-251.el8_10.22.x86_64.rpm
1d5932b9b717082b0c10f568cfede08d1d35cb6e71460fca14e48bf9b4dfb10f
glibc-common-2.28-251.el8_10.22.x86_64.rpm
28c7d010d90e99ca16a64a475b5abea55e3c86c8b33b5618b3b8ab49f8dccf07
glibc-devel-2.28-251.el8_10.22.i686.rpm
81b9ee35fa245f39c357522abcf3aac421b4521c6230d0c6db7d4169b2f6f840
glibc-devel-2.28-251.el8_10.22.x86_64.rpm
93e7575d06578f0417b2bf474636649e119e708e252fd3f8fe13cd9c75a7d618
glibc-doc-2.28-251.el8_10.22.noarch.rpm
821d85e079773f3043956c0cdb1186ceba913a3bdaaed0cf04cbf44107a6cfb6
glibc-doc-2.28-251.el8_10.22.noarch.rpm
821d85e079773f3043956c0cdb1186ceba913a3bdaaed0cf04cbf44107a6cfb6
glibc-gconv-extra-2.28-251.el8_10.22.i686.rpm
8f80de402e55bb605278d56c0fe7056e317c7bf72276863df22204c19fe0df63
glibc-gconv-extra-2.28-251.el8_10.22.x86_64.rpm
9621b6ecd2a711c5c640941fec5c6615c10632db2cdc625078fecc6eddbdad4f
glibc-headers-2.28-251.el8_10.22.i686.rpm
9b0a9d4809be7bb9cf00785fafbd08204faeca0d377d4e74c6500c8c1db4e391
glibc-headers-2.28-251.el8_10.22.x86_64.rpm
f80b924d58b3a5e2dd700390228f503685f795e6022c97439839d099ebaa80ac
glibc-langpack-aa-2.28-251.el8_10.22.x86_64.rpm
57049600bdea8d87c073ec54504d712741586348f6156b259debf26ca731a271
glibc-langpack-af-2.28-251.el8_10.22.x86_64.rpm
ed6967fede6ce393eef408c435e697529783c37e2feb315cb61b2899bd80a3e9
glibc-langpack-agr-2.28-251.el8_10.22.x86_64.rpm
49e10faf8c8c04e491f8457f089da801da74e608ca14ebd7b560c65f0ab84a9d
glibc-langpack-ak-2.28-251.el8_10.22.x86_64.rpm
70719276ed8b7514fc37a0c8d6b68e21ad07cc7606975cbcd7248686eabd19f7
glibc-langpack-am-2.28-251.el8_10.22.x86_64.rpm
5ab145e9928386e1bb75f27cdbb4048495a766e21cb72e586ca7154a0fe9c88b
glibc-langpack-an-2.28-251.el8_10.22.x86_64.rpm
2d50db7345fb1f1bbb2371868dcea03bdc4727a60749f50ebcb0a009053c59c4
glibc-langpack-anp-2.28-251.el8_10.22.x86_64.rpm
cfe875a7ae6f40f0381268c563f3b4d2989d9c2fb631dc30543f82623a6c9c7c
glibc-langpack-ar-2.28-251.el8_10.22.x86_64.rpm
57832e589118ba4ea51b72b3a3d8c967e6c7f4121ae8d04301b2b768a636c5d4
glibc-langpack-as-2.28-251.el8_10.22.x86_64.rpm
b9b0a51b284ae5e181c8ef1457c33dfa0c0b1a7535e2ad816e6e5a8326275d74
glibc-langpack-ast-2.28-251.el8_10.22.x86_64.rpm
228441057b6d130c16479a707e70d740b3d41acf5735102dd9baa5acf7bed726
glibc-langpack-ayc-2.28-251.el8_10.22.x86_64.rpm
917e8350121e9ef9aebcdac90dbdbbc3b6848e21b8d3d0ab7c96be84da91de25
glibc-langpack-az-2.28-251.el8_10.22.x86_64.rpm
ec9979ae040f2e8f5dc372de78cd5a8e00dcb5d1b14ef6fc173c57c2897c8a34
glibc-langpack-be-2.28-251.el8_10.22.x86_64.rpm
c61cb36f5d8106f1e2333ce7b48fbb65cfec5dde8c4841d0eeef74adab0381fe
glibc-langpack-bem-2.28-251.el8_10.22.x86_64.rpm
e08bfc231d8ceb5a252c14459cb2398fc790cdfe0d38c6bff40413757f64d722
glibc-langpack-ber-2.28-251.el8_10.22.x86_64.rpm
172dee33c8d9c4cf1f2f2911ac16a38d63f97e80de427dc2f773a73fa6f2205e
glibc-langpack-bg-2.28-251.el8_10.22.x86_64.rpm
0930e446bfe11a46940af06db5010371aa0f6365a3e703cf8f2c01a19fccab1e
glibc-langpack-bhb-2.28-251.el8_10.22.x86_64.rpm
10f5a9d3c93630393b99b3151df4ef033e45fbd39bea68b758e4f375abab85a1
glibc-langpack-bho-2.28-251.el8_10.22.x86_64.rpm
6a5a3573a10023c6f41fc3ba9ed0bebe9fca564562b9daff32b342d85f8b2213
glibc-langpack-bi-2.28-251.el8_10.22.x86_64.rpm
5716dd1355088241a446853c5d9e79cc86d732e4d0434ce8a3b6d1d28557e930
glibc-langpack-bn-2.28-251.el8_10.22.x86_64.rpm
4df2fe64bbcc5160275d55a1f2fa1738bd8f83937c89bc097c7212ba4d7fa752
glibc-langpack-bo-2.28-251.el8_10.22.x86_64.rpm
08b07bc732292b2fe687f0b4d9d977db84a3079b644ef825a9174d6564aa519a
glibc-langpack-br-2.28-251.el8_10.22.x86_64.rpm
0e36a95aa5cd42bd47fd45f1c01031c83ee93b72651c52b267d5c49342e274b4
glibc-langpack-brx-2.28-251.el8_10.22.x86_64.rpm
71b68c21dcd04cb1338b58707ac46dc3b89e7fa9e685e7c923914f858a14c9e5
glibc-langpack-bs-2.28-251.el8_10.22.x86_64.rpm
e741323a3e91929f4087fddc70923a5d6582d047639c3692fed171f4c4ede853
glibc-langpack-byn-2.28-251.el8_10.22.x86_64.rpm
632cbeacd3f9d25fe9d330cafe44f8f11991f99a7d766df13a5b353ffbe12bed
glibc-langpack-ca-2.28-251.el8_10.22.x86_64.rpm
3e70c92cc6caec2208d77a7bd00571820a8e966cf7b73083485ce6de86f09348
glibc-langpack-ce-2.28-251.el8_10.22.x86_64.rpm
f8f1478c57d85ed9ae7c8cd830b39cd7deccc93d3106f08f8c0ad9d2afdd5256
glibc-langpack-chr-2.28-251.el8_10.22.x86_64.rpm
c434a395c4da24bfc1f8cbf7511eefdaa5ea85d16cd0a94ecf370f825a48a8bd
glibc-langpack-cmn-2.28-251.el8_10.22.x86_64.rpm
b01d417ad23477880f63c42892693252052fdb4775d3146db5ae0d31985b0236
glibc-langpack-crh-2.28-251.el8_10.22.x86_64.rpm
1b8d6f9c5cc5f5207cb6ae4f3b9858b683b5d6835a77343d255e6bca55b2dda9
glibc-langpack-cs-2.28-251.el8_10.22.x86_64.rpm
b5d8925d097be1e5ea155dcf477561a55a6f3b14d5cf51683c0c400911547c3d
glibc-langpack-csb-2.28-251.el8_10.22.x86_64.rpm
9d1b5b321d647cd2d5d902ac58efec57cfed9bc4537cd2876853f9636faf0833
glibc-langpack-cv-2.28-251.el8_10.22.x86_64.rpm
51840262d7de61b1abfb271da5834881393950bde2c6e719ca701038fb653993
glibc-langpack-cy-2.28-251.el8_10.22.x86_64.rpm
3a3870c7c64a68cbef7bf9aae1a9d8e12edcf3b1e773e38713451d45d3122871
glibc-langpack-da-2.28-251.el8_10.22.x86_64.rpm
a44a4b79cef80c6c0b33e2ce91c8d3bf1339fa130caf381e237ea4670251bc86
glibc-langpack-de-2.28-251.el8_10.22.x86_64.rpm
bec6262d766807af9830fe4ef06be3a5ceeeda570a616398625f4e147c960b12
glibc-langpack-doi-2.28-251.el8_10.22.x86_64.rpm
8b277ad7741412d84bbfabcd64912a61a6c38ece0099690261aeceb127a6eb14
glibc-langpack-dsb-2.28-251.el8_10.22.x86_64.rpm
0b766cdb8529ab4e1e65bc037c6b725e2698bcc6b307dd18c5daa6290309b5fd
glibc-langpack-dv-2.28-251.el8_10.22.x86_64.rpm
61c0969ac576868537aa6715a2be6060e3948f8fa0079efd4bd6b40bb0823bf3
glibc-langpack-dz-2.28-251.el8_10.22.x86_64.rpm
6075a5156a5edaf4dd2a2127a34f53e32160987fcede52571bbd2699c4aecaf2
glibc-langpack-el-2.28-251.el8_10.22.x86_64.rpm
e10367d0bfae2b280ecb18673d2f7e7c9e270e5e70d04b0ee489db9cbe7c5c3d
glibc-langpack-en-2.28-251.el8_10.22.x86_64.rpm
06657246b9b47c628f70a202d640e81e0e2685d885d8b7097ec928f1ee77a77a
glibc-langpack-eo-2.28-251.el8_10.22.x86_64.rpm
b5532f9b7dd723323d548ae9ec1737f74383fcb4249052dacb0f288d8a02e9e0
glibc-langpack-es-2.28-251.el8_10.22.x86_64.rpm
a4b64bc67d7d2a61f40b32b960d92447645490faab9c2692e2fa2a0424d6be65
glibc-langpack-et-2.28-251.el8_10.22.x86_64.rpm
35b28d5c295d141e9eb8e201d190906e6c8c89fc9df5af2f7fe4ca66803d63f3
glibc-langpack-eu-2.28-251.el8_10.22.x86_64.rpm
296a8168fe5f3de7958e2e5dc98e71b95b008040ecc43e89832fa36ca2b6efef
glibc-langpack-fa-2.28-251.el8_10.22.x86_64.rpm
9093fb52d58c3c2605afd2c0d1d89638e5178827cc6080ff1820bba30be6a223
glibc-langpack-ff-2.28-251.el8_10.22.x86_64.rpm
ff644503364ab3d5ff21ad0c9580af8f79c3820d37aaf48da6e1018061aa2951
glibc-langpack-fi-2.28-251.el8_10.22.x86_64.rpm
650eae4341be4a39cc7ba2d5640879e054d03a41c0ba61b628b31540b534ea0f
glibc-langpack-fil-2.28-251.el8_10.22.x86_64.rpm
be7e08780902ad8deab9282c184f2ccf6a4f626cfa10a59b44e59438d2376c9c
glibc-langpack-fo-2.28-251.el8_10.22.x86_64.rpm
541774542636a045eaef3f9c7f93e14be4fd9588cac641f9077a3448f46192a4
glibc-langpack-fr-2.28-251.el8_10.22.x86_64.rpm
d458daf3e9bddbc560b6eb00c328b459c5f18f275157d9ba98e82a2ac2d5269e
glibc-langpack-fur-2.28-251.el8_10.22.x86_64.rpm
5100d6046b64a577e5fa7b082cdf935b5a9ae1535b91793947dfa020c04be873
glibc-langpack-fy-2.28-251.el8_10.22.x86_64.rpm
cfb3cb6422cc5dd3ee41954d9ec5794ec4df91e83f6590c0d7903bd72a18efb6
glibc-langpack-ga-2.28-251.el8_10.22.x86_64.rpm
247e44fd96d7388cceeda4658c559eb6c45bfe5ffa563069f693a121dd8ad3db
glibc-langpack-gd-2.28-251.el8_10.22.x86_64.rpm
cd4a280e7b4d5b242a9ae380310cd4b26b394c516ba4393c81dd6becea756d35
glibc-langpack-gez-2.28-251.el8_10.22.x86_64.rpm
ea21525c63a6fb987f5bea1f22be1bfd51c284848d9bfad6ff3c8c07c35f5603
glibc-langpack-gl-2.28-251.el8_10.22.x86_64.rpm
ec2546224b316649ffd34feeb2354338f1962207c371d0f35629318a53df40ef
glibc-langpack-gu-2.28-251.el8_10.22.x86_64.rpm
7d6c597563078c53593cc132d59e3f8fe79fa60650d0d64cad8b659994da6d59
glibc-langpack-gv-2.28-251.el8_10.22.x86_64.rpm
108e73f8bd9257b0c36e9a8ce63d89192bdd334fe126dba342cbe4ce07cf7f5e
glibc-langpack-ha-2.28-251.el8_10.22.x86_64.rpm
2b37a56dccc3a06d73233fb2f819354c1c5a919f69be987ecb26d8a0caa43048
glibc-langpack-hak-2.28-251.el8_10.22.x86_64.rpm
7b175ae1b8c8c06efe8b15dd67fa8c0b6a7f6bf5f2e3e8960163205cc9861e9a
glibc-langpack-he-2.28-251.el8_10.22.x86_64.rpm
d4244fe2289f085f2a8c801a4f831f91234c2aafcecc264463d0d3ba5dbae8f2
glibc-langpack-hi-2.28-251.el8_10.22.x86_64.rpm
17bb090a62991f5117e205926494a170eb75d41272e98b5e120c56b02579f6d4
glibc-langpack-hif-2.28-251.el8_10.22.x86_64.rpm
59de6675a7f54f1dffac2e8cdae783e6473abc1cbc1a49f4cbd866a943301f77
glibc-langpack-hne-2.28-251.el8_10.22.x86_64.rpm
389e5629aec2d78d6620c0ec29b9fea3b97313b3d575bba277a83c428e8d4fcf
glibc-langpack-hr-2.28-251.el8_10.22.x86_64.rpm
2dd3102a0c501c9074dba282c46ee60f335556a0d0a55796f8cb1e97269e3e2e
glibc-langpack-hsb-2.28-251.el8_10.22.x86_64.rpm
6f069a06d3dfb6402af65a65f8ba7357cb56d47ec4f23411b999638a7a996e6e
glibc-langpack-ht-2.28-251.el8_10.22.x86_64.rpm
78379296804af79d574de0b7bcd7d726d5150a506bf23ab2cf38087d8d5fcf5d
glibc-langpack-hu-2.28-251.el8_10.22.x86_64.rpm
ddc3521824e34041b0f785956ce974227fa52f27196e14165dc030f3c072e3d1
glibc-langpack-hy-2.28-251.el8_10.22.x86_64.rpm
de84f0cd1904c6b13eb8fad68907868f7d4e2ec58cb3ee2a44bc17c01e75a1b3
glibc-langpack-ia-2.28-251.el8_10.22.x86_64.rpm
6798cedce96c0407db6cb58cf7ca50872d9a279e63bb61a96c0932500f232c52
glibc-langpack-id-2.28-251.el8_10.22.x86_64.rpm
3e20d13a0731e57be6c079575f7fd74fa64f430f802515072072b8d84a3a3b37
glibc-langpack-ig-2.28-251.el8_10.22.x86_64.rpm
a373b6f697091419445fad9bc5d1e737f976b248c62f74dbfbb0cc2f82355299
glibc-langpack-ik-2.28-251.el8_10.22.x86_64.rpm
8c99787582821cb49b653f5c6213aa810f034834227e4f9c030e4662375e867c
glibc-langpack-is-2.28-251.el8_10.22.x86_64.rpm
97d204d21e17de6159041dcb7194debea7098d9e1f0ab733eda13db6e98c8c0d
glibc-langpack-it-2.28-251.el8_10.22.x86_64.rpm
a1e53456b11c7e79ff2f20f49ae227f730b6d6b8015ae045165c9b26799e6c89
glibc-langpack-iu-2.28-251.el8_10.22.x86_64.rpm
3ab1ce561f6b25c8b82b261b9c6d65cc60c0a956e86712ee1cc1b153c9608766
glibc-langpack-ja-2.28-251.el8_10.22.x86_64.rpm
91d393da2b0209cf14569a84f10c4390592fa882e1ef7cfdf2542b79f4bb4ffb
glibc-langpack-ka-2.28-251.el8_10.22.x86_64.rpm
a381f82ff1c23f35a71ab9e21dc3795cb775d094977e848ab74368f1d7730255
glibc-langpack-kab-2.28-251.el8_10.22.x86_64.rpm
6416af0bd773e67a2343f64ef869910b1c6e7d6af24139da87f2a80e5c6eea3d
glibc-langpack-kk-2.28-251.el8_10.22.x86_64.rpm
45d4777f28268ec5574829207ea7225097cf130035ead86df59da89d0a915fe4
glibc-langpack-kl-2.28-251.el8_10.22.x86_64.rpm
d5438ef57f5637d1b6d3e496fcea0b2fc0cd8502f5611eb1f85ca40734307554
glibc-langpack-km-2.28-251.el8_10.22.x86_64.rpm
356c2f14f1c8700a1f8b9771ccd77daa58200f56816bd0039ac43f1a62aba826
glibc-langpack-kn-2.28-251.el8_10.22.x86_64.rpm
c17c70f083c49a02d2a6e53ab25aecf362b752aa92520767034219e33fcdfa4b
glibc-langpack-ko-2.28-251.el8_10.22.x86_64.rpm
f730d129502de31a0b50273e31b52521d7617d8c52b31ec6c1d56fcb2368d405
glibc-langpack-kok-2.28-251.el8_10.22.x86_64.rpm
c4c589ce09d15ae4289bf0f6bb32d179d313da267201ad6691e4416846373baa
glibc-langpack-ks-2.28-251.el8_10.22.x86_64.rpm
83e50de13e04c88f342d4e65c30feedea41829a3c49c799e004da382ff74cdb3
glibc-langpack-ku-2.28-251.el8_10.22.x86_64.rpm
53eaf0a778538b021a9380145d66feba30ed2c8c0a0ba7c1d9290ad1b0cb6b24
glibc-langpack-kw-2.28-251.el8_10.22.x86_64.rpm
7a9a71a273a1e3faab64fbee2561bc0a057e0a6f6b8024b4642fe39920101570
glibc-langpack-ky-2.28-251.el8_10.22.x86_64.rpm
f1b1a72d9b98889bc12adcd55ba2d382d9ba035475c4fdd40d69d6cc0d3fbdf0
glibc-langpack-lb-2.28-251.el8_10.22.x86_64.rpm
68929ccca190a677a550298386692e50e763b92ae5fbfca633ada132772609a2
glibc-langpack-lg-2.28-251.el8_10.22.x86_64.rpm
6c2283added03dbadfa64a8752cc9629d8ebfaefc497b9dac53f3ec0ff9810c7
glibc-langpack-li-2.28-251.el8_10.22.x86_64.rpm
3ded21f27ca3cb91635af4caf2e091126f2536f5b2de24fa58c88ad53a7ad3fe
glibc-langpack-lij-2.28-251.el8_10.22.x86_64.rpm
5bc116423637a38eb35a859ddef8aa19d585482466734a18cbdbe81e1a628069
glibc-langpack-ln-2.28-251.el8_10.22.x86_64.rpm
dab4aa9e7190cc64b923f4d835a1c59fd403b12f5cfffb2202b5a6904899ca3d
glibc-langpack-lo-2.28-251.el8_10.22.x86_64.rpm
1e9fa30e1d748427052a1d0dad0a49db7a181b676e9d735e2d210a54eca0eaeb
glibc-langpack-lt-2.28-251.el8_10.22.x86_64.rpm
e5b750f171fcd1670112fcbdf3a7cf9b7986d535f49b2db6e96abc56b6915bd8
glibc-langpack-lv-2.28-251.el8_10.22.x86_64.rpm
5b913c6bcd72a412d85e6e086e8ca5256c4e1db288586d14f302d121a675dcd3
glibc-langpack-lzh-2.28-251.el8_10.22.x86_64.rpm
b107bd4b5cbbeaab6ee51646260c099dece8ada977688f091f3ab07e127eaffa
glibc-langpack-mag-2.28-251.el8_10.22.x86_64.rpm
72334d51c8263612bedb9c23fec458995d3798d1d91521588c661cf4fffc69ff
glibc-langpack-mai-2.28-251.el8_10.22.x86_64.rpm
0fb516d5c369dfa2c9802126476492a031b810219461c0bbb68432621608f9fd
glibc-langpack-mfe-2.28-251.el8_10.22.x86_64.rpm
ec0213d85a2706a8758d643207b651d193627bb1cfde0cee4d86e71681758bcd
glibc-langpack-mg-2.28-251.el8_10.22.x86_64.rpm
ebae5888a4da589a0cc73da75a3015d19b01fc87cbde0b1d0fbfaf309cc187e2
glibc-langpack-mhr-2.28-251.el8_10.22.x86_64.rpm
7f10ca6bfd0dfc08153e81ee5eb7f5652f7b75874858159855bf52afa11ecd9e
glibc-langpack-mi-2.28-251.el8_10.22.x86_64.rpm
432434efad56e8698af2ff751c44bcc2cd52b8fa8bb64c07facbfe7f132d6209
glibc-langpack-miq-2.28-251.el8_10.22.x86_64.rpm
4466b6dda30e61fc955c537384caf5bc2a46a9b5db9f4415b0e77ee279908078
glibc-langpack-mjw-2.28-251.el8_10.22.x86_64.rpm
e4c3fd4527aef9c01eb92d36926e194099cade01162c8c9497b6cae778230c6d
glibc-langpack-mk-2.28-251.el8_10.22.x86_64.rpm
0b669b22be3b1597ab3a159b8e926e6164b3d7db908f0c2061ddb2076ea15a40
glibc-langpack-ml-2.28-251.el8_10.22.x86_64.rpm
4ba4c8c78b6f343c35df23dadbec9851fac9999c272d071eadb5bba77534538d
glibc-langpack-mn-2.28-251.el8_10.22.x86_64.rpm
3241bb8cf6ee6823dbbd546d726d4dbe531862a7bb5f3e3ff9ecebd177b8090f
glibc-langpack-mni-2.28-251.el8_10.22.x86_64.rpm
2b51f2e016e69fcd592c575e441ec79a0fe2f3ab7e22c12772417c57c2c593c5
glibc-langpack-mr-2.28-251.el8_10.22.x86_64.rpm
f5aabf414e1887282c633aa0efba766f408c07db1b61c1fa2dbb3e5e06568c4e
glibc-langpack-ms-2.28-251.el8_10.22.x86_64.rpm
4cd1c1550f362475e5c202f924a51d53801d7f1e72113d4c63cd08b310ea9ebd
glibc-langpack-mt-2.28-251.el8_10.22.x86_64.rpm
c7099f80eff2af0f60c975af9276b3e8d795bb927910ead7a12cce4e15aaa7a1
glibc-langpack-my-2.28-251.el8_10.22.x86_64.rpm
824f5ca4dc574111232d136dfaa27724de1e70f6cdf3c27271c45403817682e7
glibc-langpack-nan-2.28-251.el8_10.22.x86_64.rpm
bacbbc05f94db31ca05c71946d61609da128641650243face6d82d927374ebdb
glibc-langpack-nb-2.28-251.el8_10.22.x86_64.rpm
2ac06e29c7362fc005b2e4a6e04241a63eb224d4709a40b3b8c7842141d5dd4e
glibc-langpack-nds-2.28-251.el8_10.22.x86_64.rpm
4c6917721a98d53af36a97dc17802459a559d31227d7ea97d0259c2dc4929f5e
glibc-langpack-ne-2.28-251.el8_10.22.x86_64.rpm
f25d8c4cc09f4be2a1f399957919a3a8fc60fbb8f9879de059b99372f40d38f5
glibc-langpack-nhn-2.28-251.el8_10.22.x86_64.rpm
59d8f9e9a4f5102e722f209c37a98ad51e654fba5061b1c94d272e3b0ff5337b
glibc-langpack-niu-2.28-251.el8_10.22.x86_64.rpm
0aa6f1a0e62bc777b850a41fa920d162d04cc9436e6d44d044623692f28112f3
glibc-langpack-nl-2.28-251.el8_10.22.x86_64.rpm
37c38a2b01f0f2f59e7e8ba4e829dd3f7b00a636c97f8d9fe34d713ef6f3248c
glibc-langpack-nn-2.28-251.el8_10.22.x86_64.rpm
bbcf9c6fdc04a5b93c7aae29a5d4684182a143c70212652997615a14cf9b73e1
glibc-langpack-nr-2.28-251.el8_10.22.x86_64.rpm
a6215523527a4f3423eba7442defc27d2797527d8cdab4d68a8f15bdb60ba34c
glibc-langpack-nso-2.28-251.el8_10.22.x86_64.rpm
35642cf55d134aca68123651e77311c1e20b6b781ae8af9d1b64135061b999b5
glibc-langpack-oc-2.28-251.el8_10.22.x86_64.rpm
f74fca1d2ba09961dfad20c93530d65a7b7bd18c9e41688cf61d4460fa221ace
glibc-langpack-om-2.28-251.el8_10.22.x86_64.rpm
55041012a3bc4324562acbe52e158ad96e7dc3e6fd1dde6914d581e4092b8ff5
glibc-langpack-or-2.28-251.el8_10.22.x86_64.rpm
ac0e8cd133ecca2fc1e0045634bb8201427e47494501881b76c334e68ead6565
glibc-langpack-os-2.28-251.el8_10.22.x86_64.rpm
86f82c85a98ec555229d4d7d8c6c457b71e45ab216b0996702c0e16d7eb06f9f
glibc-langpack-pa-2.28-251.el8_10.22.x86_64.rpm
c6c8431bdb7bfd6c1bb755876b4cf0091a4a9d1b4e55232baf90a86339e44073
glibc-langpack-pap-2.28-251.el8_10.22.x86_64.rpm
0ad3a63657be04bd713ba0fdd73ed490883696a3bddff371cf7188fe86a36361
glibc-langpack-pl-2.28-251.el8_10.22.x86_64.rpm
3039d4f8b74ba991240be5bfa2ee1e8b5e9697f11582f26fcd57e116486216d3
glibc-langpack-ps-2.28-251.el8_10.22.x86_64.rpm
68e458f16459095790104e9677456e23f030aa1e11c77ab4f8bd0bb50bcd6f15
glibc-langpack-pt-2.28-251.el8_10.22.x86_64.rpm
daeb92f185fb3aa95a5147a2bca11875bfa485fa61719450c84aecbe727d1af0
glibc-langpack-quz-2.28-251.el8_10.22.x86_64.rpm
3d1c86abe3992a5515382d3de6fdc6e958a534df944ea6a06e82a51d2639a51b
glibc-langpack-raj-2.28-251.el8_10.22.x86_64.rpm
bf9a75953f9081243a34ed4377a6876252a4a8e2dbc63eaf2c751d03080227f7
glibc-langpack-ro-2.28-251.el8_10.22.x86_64.rpm
1a17984b1c701993a7b7ed9033c83b40215d9d4cba460d3cc94c89bbfe9db2cc
glibc-langpack-ru-2.28-251.el8_10.22.x86_64.rpm
55e038638fa38d42e4595679a25a9361b7fac91b7865dc74ff16aa4a57c9ec63
glibc-langpack-rw-2.28-251.el8_10.22.x86_64.rpm
56accda132cabed1d389a41ff232a16ffaf9d18c030ae48c8e89fc29695696f1
glibc-langpack-sa-2.28-251.el8_10.22.x86_64.rpm
373c5e91d496835d229c336409cb9cf880ccd36299f530f25fe548f0cdf156eb
glibc-langpack-sah-2.28-251.el8_10.22.x86_64.rpm
43aad0f08617ee059727fd1b169927b19c63a88af8b7534e9a70f9d025c39b93
glibc-langpack-sat-2.28-251.el8_10.22.x86_64.rpm
5f689064462e6605268d73a3a213550d18560740ee059ea3cc38064348d409b3
glibc-langpack-sc-2.28-251.el8_10.22.x86_64.rpm
366dff8089d047012b1941933ca9890934d5051a22271db82610c4818f360962
glibc-langpack-sd-2.28-251.el8_10.22.x86_64.rpm
e888b585bf7f1445a0d897779767ee5a7cbec621f3765a3c8caccd9eba86715d
glibc-langpack-se-2.28-251.el8_10.22.x86_64.rpm
92dfb99b1d2002b186719ee60010adc38c7b0c67d3431e241ae2fd33bfefab39
glibc-langpack-sgs-2.28-251.el8_10.22.x86_64.rpm
5ea3258b607a28a187837c1ce5b8aa8eae6584973bf285c514466e5a6cae57d2
glibc-langpack-shn-2.28-251.el8_10.22.x86_64.rpm
b59790cbaeabc4a6626f9ddf62d77068c48a8ecbe730173ae1027f7bf88dabbb
glibc-langpack-shs-2.28-251.el8_10.22.x86_64.rpm
e48b52fb143188e015d6fbb6e79d8c3504c709ccb3bea3dd4753f53fed06dd9b
glibc-langpack-si-2.28-251.el8_10.22.x86_64.rpm
5c018a3fff052376da770b1e4f57ee6facfdd8ccf6225780dc17c2a3efc9eaaa
glibc-langpack-sid-2.28-251.el8_10.22.x86_64.rpm
e15a6b3c9d142515789932a31af75cde0513e04d78dc0e51f5ca31205bf22ca0
glibc-langpack-sk-2.28-251.el8_10.22.x86_64.rpm
527053203d83dcbf274c386accbb9a1918c1df45bc07f47f42887d0f6ecf913f
glibc-langpack-sl-2.28-251.el8_10.22.x86_64.rpm
9de7ca8443ff2d0b00b77f8299753d9cb9ff4489820774a9265dfa8373f2d806
glibc-langpack-sm-2.28-251.el8_10.22.x86_64.rpm
f096bb9ece9af5c83aefca0ae3a6750c84c3876765258e5d402a43ba2d4dd71a
glibc-langpack-so-2.28-251.el8_10.22.x86_64.rpm
5adac7901394e39b05c6c490f63b9b0f1a2cb8eb77b70fb7a600553d0c0be9b9
glibc-langpack-sq-2.28-251.el8_10.22.x86_64.rpm
685306fdc3df26346fc2ef89507c21714f3f28a3dad2aaf76415d2cd4720ecb3
glibc-langpack-sr-2.28-251.el8_10.22.x86_64.rpm
f5135203b8f319a3b3ba3b8408f1f070e3a6f32a551509b352829654da790d1c
glibc-langpack-ss-2.28-251.el8_10.22.x86_64.rpm
4aff170068c51b81ade5ebfe6e509cf09dc87b4a18571ffb6a9d168a800d484d
glibc-langpack-st-2.28-251.el8_10.22.x86_64.rpm
8b16bf33d14ac32d502fc18e8cbf3379f39c1c65b16425ca760b6369acfeb002
glibc-langpack-sv-2.28-251.el8_10.22.x86_64.rpm
1b5ef32ff3a254a19c772c037fec16056562fd5b4248c39fa3673a2c7b3ccbd7
glibc-langpack-sw-2.28-251.el8_10.22.x86_64.rpm
d3514cc66c55f8c26ce4094fd530dfb6f22008977bcb0e1a63503c9645762a74
glibc-langpack-szl-2.28-251.el8_10.22.x86_64.rpm
4b7f9fad65b69999400d59d144cf6ec351a4a283790c92f561a6d00e606a4ffc
glibc-langpack-ta-2.28-251.el8_10.22.x86_64.rpm
d275ea9a747f938a979243a7b09ae8737062d1d814be38ff1327c1a8fabc38a4
glibc-langpack-tcy-2.28-251.el8_10.22.x86_64.rpm
0f6723875788efe3357b0e16a61b31b5d2f8d000916a3e80d6149f573460e6b5
glibc-langpack-te-2.28-251.el8_10.22.x86_64.rpm
5d0a1aac3d492bb86e4ff6588816e05c62b55bbe540cfce67d2f272aed3bc62a
glibc-langpack-tg-2.28-251.el8_10.22.x86_64.rpm
ef01d9e9f6903623773392d572eea39d727a91d0aa5fbdc4c61d16e65b7b4756
glibc-langpack-th-2.28-251.el8_10.22.x86_64.rpm
0e916891576b800a6ce02dde1a292bf2aecb62cf5bc72fccde8dc4773ab93740
glibc-langpack-the-2.28-251.el8_10.22.x86_64.rpm
ab00b29ff0109f1e99c50a7b66d53af1219129e78095a083616853ec93b894f6
glibc-langpack-ti-2.28-251.el8_10.22.x86_64.rpm
128256b025c8bcf1a8a79ac5c6bdc6d5bd3fe29241ba3635de327f025b73405b
glibc-langpack-tig-2.28-251.el8_10.22.x86_64.rpm
268e1df7cd3fefb74ec365606df6ba77bfd01ce4d2994cf2897989d4f56f6e53
glibc-langpack-tk-2.28-251.el8_10.22.x86_64.rpm
e76d25c2b481f6b4971f0aa646dc43f7d8c3790c9d13f1ede00b8adf04d91dce
glibc-langpack-tl-2.28-251.el8_10.22.x86_64.rpm
a456c68b6a5b22e671fc1d925cb27169d802df495e4dd89d426a88a699e0cbeb
glibc-langpack-tn-2.28-251.el8_10.22.x86_64.rpm
e2e5ffbb5f48d8cd63aca1057378c3fc2efd7412aa713aeb843d5c5ca2d8d922
glibc-langpack-to-2.28-251.el8_10.22.x86_64.rpm
47aa9ad40d954ccb505cf5b9dd81eaf1baae0fbca69c6803db3bba49b0d5e637
glibc-langpack-tpi-2.28-251.el8_10.22.x86_64.rpm
ee29f4191553dece5bf919067b4dddf8696931b3f27aefd992dfa6173731bdf4
glibc-langpack-tr-2.28-251.el8_10.22.x86_64.rpm
166aefff45a8ea193011f13a0b3f4d36934f052c3c09041cdd39b66578f0d371
glibc-langpack-ts-2.28-251.el8_10.22.x86_64.rpm
c39e62765b0d5fcc6cd6e4a756d7950bb40b725dd4e04fb78b9b763b07b1a279
glibc-langpack-tt-2.28-251.el8_10.22.x86_64.rpm
1d5e56c50a89d7fbc777d19b96461a20b078dce919f3738ef00a2ba477e35ce4
glibc-langpack-ug-2.28-251.el8_10.22.x86_64.rpm
276eef3271d2bc2e0a48963bf65bd3ef32a723ffacd7a1ad91e85646ad9509f1
glibc-langpack-uk-2.28-251.el8_10.22.x86_64.rpm
4883a849b26918918ccbac1b20bdf6b42b01657195287f87d7f6d7d2dcd8d29a
glibc-langpack-unm-2.28-251.el8_10.22.x86_64.rpm
1eb0bfca910c826baf8146a28217fef7b488f45e61dfe9c1e230a796578e5149
glibc-langpack-ur-2.28-251.el8_10.22.x86_64.rpm
108bf7c980488b4c8fdf851e34e35e58541a5334203e1b592b993ac1565c9b54
glibc-langpack-uz-2.28-251.el8_10.22.x86_64.rpm
be603610aed31eb83cb6c34476ccd4378f90e6f8bbb12ba6bea39c1e29ff09fc
glibc-langpack-ve-2.28-251.el8_10.22.x86_64.rpm
4b02dadec26d4cc71e5097ea4f31d9ef0aa883b624f41c012016f2b3b063853a
glibc-langpack-vi-2.28-251.el8_10.22.x86_64.rpm
14694e5bbaca8ff69003bcc2182d50bb3bbbb4e49bb230fd1b687eb26fd9d513
glibc-langpack-wa-2.28-251.el8_10.22.x86_64.rpm
231a4e819facb7d1ee3802df60d1ddfd85f9606902a1e8b7e188684acb35b447
glibc-langpack-wae-2.28-251.el8_10.22.x86_64.rpm
301ebeb2299ba86fe84ac06d926407023a4e30fa5b3d2a064bef4a2795e7c19c
glibc-langpack-wal-2.28-251.el8_10.22.x86_64.rpm
c5a0b5d23aa8c519a138f2c08261d98eb26f2e1903fd8854539fba456e8f2c2a
glibc-langpack-wo-2.28-251.el8_10.22.x86_64.rpm
4a1d7052e0261c1a7e064e947c67dc18dc6660f7f98c37f13ee95abf49e7e7a0
glibc-langpack-xh-2.28-251.el8_10.22.x86_64.rpm
fab9a97fbb8db8b7b193e2bd1a4fb22e2ffb59ee46e3e5c1de04057e6a4496fd
glibc-langpack-yi-2.28-251.el8_10.22.x86_64.rpm
41cbd86de101e9e48ec44b81ab877fde306243144614f47b4043fdfa9f66fef8
glibc-langpack-yo-2.28-251.el8_10.22.x86_64.rpm
132815062e11d487b47ea0c2a54c26d2714d0b5786a658329139870f574861b1
glibc-langpack-yue-2.28-251.el8_10.22.x86_64.rpm
08924352b8d5e50e53ccb86f2a479bc17470da950f25cec7bb171f3090899e37
glibc-langpack-yuw-2.28-251.el8_10.22.x86_64.rpm
afce63fb75ac436819194f08de3fe605efe2b67f97a31fb1fee12a6983337ef5
glibc-langpack-zh-2.28-251.el8_10.22.x86_64.rpm
9247f0cee14223dfe69b94cd00fd500e83a7e5a1b88e41508b2e8793f9663e8f
glibc-langpack-zu-2.28-251.el8_10.22.x86_64.rpm
eea0a6b37d60e8f042eaaee78b2dd5859a9b9381fa077c7e6ba395191136eea9
glibc-locale-source-2.28-251.el8_10.22.x86_64.rpm
24c65002a1b8b8adc84289f67beba4a7f38ca9b9fb22249f4083528c5b3f6a9f
glibc-minimal-langpack-2.28-251.el8_10.22.x86_64.rpm
4c6df0d43fe1cf851142cdba233aa31351a397f3f15205a4c1da4efc75f8143e
libnsl-2.28-251.el8_10.22.i686.rpm
28396cebfec988819aa9c469af15cb4e7913677adb89dde603895efd0cc11a77
libnsl-2.28-251.el8_10.22.x86_64.rpm
28a5a611b83612943f57a8f87ec519de6e66d64c661e9bf5513d759e79a8aa30
nscd-2.28-251.el8_10.22.x86_64.rpm
11891a78a40b3c62de23adc743ea4466676446541618c3e9864e81933b7aeb91
nss_db-2.28-251.el8_10.22.i686.rpm
03cec3a0ef833c13d7ca616050cc14e535f8c63e11be6711531379c9c75af3eb
nss_db-2.28-251.el8_10.22.x86_64.rpm
3a62b659773f5b46dc252bcb2461de0502c20b63c3a83bcfa8e23b7ce52b5d07
RLSA-2025:8743
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: um: Fix out-of-bounds read in LDT setup (CVE-2022-49395)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.56.1.el8_10.x86_64.rpm
604cf9e0365160b6e1d697ed81c2fe10224349f8f925a40c317db5c470c3321e
kernel-4.18.0-553.56.1.el8_10.x86_64.rpm
1386cc8c10c108eb2a2afdbf72992983bbf4f31a0712a3f025610fd10bf654c1
kernel-abi-stablelists-4.18.0-553.56.1.el8_10.noarch.rpm
baee2ec5ee37fe233dbf3f3345079bcf2b419b92c002913e9c4ecfea462bbcc1
kernel-abi-stablelists-4.18.0-553.56.1.el8_10.noarch.rpm
baee2ec5ee37fe233dbf3f3345079bcf2b419b92c002913e9c4ecfea462bbcc1
kernel-core-4.18.0-553.56.1.el8_10.x86_64.rpm
260854aff7ec7b51b90a11629f4cbd7db628e604a9230f9f05cf36f20e7ac255
kernel-cross-headers-4.18.0-553.56.1.el8_10.x86_64.rpm
154b1e8e833b630214dbe21ed2457c82c2c540b38c7f0c2664c5220faff5a3a6
kernel-debug-4.18.0-553.56.1.el8_10.x86_64.rpm
19000cbb1c657e1c6c924a63e474df97fbdb619221a31fd26c074cb221083250
kernel-debug-core-4.18.0-553.56.1.el8_10.x86_64.rpm
3d745ae33bf29b2de1744ff24954391fc326219ed8b1f2f0b956afc5c3d229d4
kernel-debug-devel-4.18.0-553.56.1.el8_10.x86_64.rpm
6c0f5f6963ec64b79ae4f40b92684daf89df0c76fa3636bfa2ff7af6f03fee02
kernel-debuginfo-common-x86_64-4.18.0-553.56.1.el8_10.x86_64.rpm
c5b38678e97de61c18742075e35bdd9ba1a9f3cfceea9778c667d3bf6d629ca5
kernel-debug-modules-4.18.0-553.56.1.el8_10.x86_64.rpm
809278848ca92539ee971e20c41f00f64ce9973b5b53220acd3d34f9f475ff36
kernel-debug-modules-extra-4.18.0-553.56.1.el8_10.x86_64.rpm
8831b80dd7fc290263721013623b7db9c1d2c1e8e2ffe53cbcb35d31d2c5953a
kernel-devel-4.18.0-553.56.1.el8_10.x86_64.rpm
ec824a16a6abf5b505b8afc7f1a48c02345750cbe53268f8508f0b2966e5614e
kernel-doc-4.18.0-553.56.1.el8_10.noarch.rpm
d9df3a0d389de1108e11227cad7ebf1c15bc481c121d267e1e40618e2d037c1f
kernel-doc-4.18.0-553.56.1.el8_10.noarch.rpm
d9df3a0d389de1108e11227cad7ebf1c15bc481c121d267e1e40618e2d037c1f
kernel-headers-4.18.0-553.56.1.el8_10.x86_64.rpm
9412ffddb7a39bb692a53236bc608571ab205e0c49663025862fea1b2e23a5f5
kernel-modules-4.18.0-553.56.1.el8_10.x86_64.rpm
a1023f4ffab44bc2188592decbe9effe56dddad8685395ff2db8799a113e8df6
kernel-modules-extra-4.18.0-553.56.1.el8_10.x86_64.rpm
43b9d9d77591c9975fd750ee718f461018f2ca26ad25ca9451c1e195e37ba942
kernel-tools-4.18.0-553.56.1.el8_10.x86_64.rpm
3c5fdb9e29f2738086abbc53d6a7467cacfb7ef405f45e7f447312e0a361b920
kernel-tools-libs-4.18.0-553.56.1.el8_10.x86_64.rpm
0ca6717084dbc8555e0cc996a94b9c72659c5eec1d3cb7fa73b11621088e83a6
perf-4.18.0-553.56.1.el8_10.x86_64.rpm
62a3d36c921de53c70c910eac011412c733cac00f32c2078b5b8506edd0b33fc
python3-perf-4.18.0-553.56.1.el8_10.x86_64.rpm
fdfcc4e5b91938145b8c142edacfed84c3e5d47269875bc9249759d7e8054dd1
RLSA-2025:8958
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-20.el8_10.i686.rpm
5879d1ecd79273f984b85fa8b88372b5beaad73370ea335460a85dca9fc7622a
libxml2-2.9.7-20.el8_10.x86_64.rpm
4b072fa85ebdfdc21bccd6a766c9c44ae361df0d448464192a831f1ca5f032c9
python3-libxml2-2.9.7-20.el8_10.x86_64.rpm
10c01b17311a6554bf54ccd5c4eb2e9127b68a3ee5beebd0923949973c088654
RLSA-2025:9580
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: cifs: fix double free race when mount fails in cifs_get_root() (CVE-2022-48919)
* kernel: security/keys: fix slab-out-of-bounds in key_task_permission (CVE-2024-50301)
* kernel: idpf: fix idpf_vc_core_init error path (CVE-2024-53064)
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.58.1.el8_10.x86_64.rpm
6248d2192674c2030661ae825279dd9050c911fadbb4e07653da096b4b39e494
kernel-4.18.0-553.58.1.el8_10.x86_64.rpm
4a15706a1ff8a86077712ef579b6cdeb72c082752cc37adc8095807f76242249
kernel-abi-stablelists-4.18.0-553.58.1.el8_10.noarch.rpm
9d1d22ecfbac61f90e927582450756d4034d60b301eaf0cffeba07182b809d2a
kernel-abi-stablelists-4.18.0-553.58.1.el8_10.noarch.rpm
9d1d22ecfbac61f90e927582450756d4034d60b301eaf0cffeba07182b809d2a
kernel-core-4.18.0-553.58.1.el8_10.x86_64.rpm
a40ac1bc2f8328f482a0dba23e81f6d4ba44757f1e386302c7ad6819ac5f7b42
kernel-cross-headers-4.18.0-553.58.1.el8_10.x86_64.rpm
4aef814306f049949d3db6f7c8759a0bfbe380886d6643776ebea19a79b328b1
kernel-debug-4.18.0-553.58.1.el8_10.x86_64.rpm
9134fe839134a0b65cdc88db5c8924fc88e891ab3984ed3d2438111de67173f7
kernel-debug-core-4.18.0-553.58.1.el8_10.x86_64.rpm
a1ab2328ddb9d22bbe3ea86406405f7c15b12d35264f62740defc4ff10f17ef6
kernel-debug-devel-4.18.0-553.58.1.el8_10.x86_64.rpm
49f87a37f6936bc010c0c16774e30260c8fe62620dee0dc5ac9998690bee98d4
kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64.rpm
4b2c5d3d09f830e544f5dba818abb200079ccf262a86b01944ebbd28a2c1dd41
kernel-debug-modules-4.18.0-553.58.1.el8_10.x86_64.rpm
aafa779e1e616a5910b5265a02f00d0bb1d6dc1abee5714540d624f9becfc1b4
kernel-debug-modules-extra-4.18.0-553.58.1.el8_10.x86_64.rpm
4eaed24907447979516ac345d0e5cc3cfe6f35400160327b615b1234fa20f6cd
kernel-devel-4.18.0-553.58.1.el8_10.x86_64.rpm
f6b41f72620ec36e320f4105eed854aa47355371e5c0187006c108ee2f8d58ee
kernel-doc-4.18.0-553.58.1.el8_10.noarch.rpm
58014ac9df298cd5c32c548a196f4cc9c0ca08e823a5098cc0ac688db639660b
kernel-doc-4.18.0-553.58.1.el8_10.noarch.rpm
58014ac9df298cd5c32c548a196f4cc9c0ca08e823a5098cc0ac688db639660b
kernel-headers-4.18.0-553.58.1.el8_10.x86_64.rpm
7d3e898ef9b66e01972a8c4b577ed0840d8a0e1675339e993d8d818dd5f00eeb
kernel-modules-4.18.0-553.58.1.el8_10.x86_64.rpm
9a2f1df27afa74cb85b4b0035dd21e33267d475abb83def578bbc591be946825
kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64.rpm
5c8bf92aca792c326abe55b6a2baf53e666b1cb6d277a76ed9fecd8c1d7a3eb4
kernel-tools-4.18.0-553.58.1.el8_10.x86_64.rpm
29c7eac49f3416214f09c7018a556608aef80771af720230fb2013b42f8ab389
kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64.rpm
039f45d7ed4c1d71955fa2ed66cbb2ace486bf19c13f92934edb75876e97bb89
perf-4.18.0-553.58.1.el8_10.x86_64.rpm
aee39f2edef7090d245bd6493f112694292e3485b8a5879ceeab9baf54fa6164
python3-perf-4.18.0-553.58.1.el8_10.x86_64.rpm
1ec3bc8a54ef878a522cbc267747e344b94fabf62a612394976a9126f4c0a233
RLSA-2025:10027
Important: pam security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* linux-pam: Linux-pam directory Traversal (CVE-2025-6020)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
pam-1.3.1-37.el8_10.i686.rpm
23ffc234f3835ca1041b5af932c87cb7f6571d9325be2d455e4bbba157b4a6b7
pam-1.3.1-37.el8_10.x86_64.rpm
f95c0c5397094135cefd5d56199fe4c14f006b0ec9014574a2710a2085d3cbb6
pam-devel-1.3.1-37.el8_10.i686.rpm
bf7798fdd3404f5af9fda6e5db53b4195dd0538f31235f61e570f2dfc3bff721
pam-devel-1.3.1-37.el8_10.x86_64.rpm
598d383a88be122cf7499e14e3a963688b992c7574bada803a35c284e1257e3d
RLSA-2025:10110
Important: sudo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for sudo.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: LPE via host option (CVE-2025-32462)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sudo-1.9.5p2-1.el8_10.1.x86_64.rpm
1d9df4e7074df487a5b5fbc2ad0a9127b70b6fc85d9aadcc5ae45aeb17f25c8b
RLSA-2025:10698
Important: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-21.el8_10.1.i686.rpm
74c74abf1b93967e7ce0d674af1896407da936f4e7bc3de9ba8ccd57b6942bf3
libxml2-2.9.7-21.el8_10.1.x86_64.rpm
6b67e3b8587d10b45c0f27ed070f35443f5a5938982beb7da618933e6775da61
python3-libxml2-2.9.7-21.el8_10.1.x86_64.rpm
5ce1dffd23a7e565884502df6ee3484044d079647cd59261ef74236ff5ca9d91
RLSA-2025:10991
Moderate: microcode_ctl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for microcode_ctl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The microcode_ctl packages provide microcode updates for Intel and AMD processors.
Security Fix(es):
* microcode_ctl: From CVEorg collector (CVE-2024-28956)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
microcode_ctl-20250512-1.el8_10.x86_64.rpm
36c4b4068e3f8fbf614006e6f6a3851011198dfb3c3ce12e8034cab73428650b
RLSA-2025:11036
Moderate: python-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
platform-python-setuptools-39.2.0-9.el8_10.noarch.rpm
1f0a67a8989bc1028d717d701af6d7f2b79ab26534454739f728c04e158cd956
platform-python-setuptools-39.2.0-9.el8_10.noarch.rpm
1f0a67a8989bc1028d717d701af6d7f2b79ab26534454739f728c04e158cd956
python3-setuptools-39.2.0-9.el8_10.noarch.rpm
94ff8297900c1d7b6904f46b839ddb3892eeca7b28897419facfc06a9fd03ae1
python3-setuptools-39.2.0-9.el8_10.noarch.rpm
94ff8297900c1d7b6904f46b839ddb3892eeca7b28897419facfc06a9fd03ae1
python3-setuptools-wheel-39.2.0-9.el8_10.noarch.rpm
32b9fcb95afa24fbd24c5cc653847d2c235acade1423d1441f1658a83c8725f9
python3-setuptools-wheel-39.2.0-9.el8_10.noarch.rpm
32b9fcb95afa24fbd24c5cc653847d2c235acade1423d1441f1658a83c8725f9
RLSA-2025:11030
Moderate: emacs security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for emacs.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news.
Security Fix(es):
* emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
emacs-filesystem-26.1-15.el8_10.noarch.rpm
206c53ad11e5c2d26e959af4af07ba78fd4f67a6dbc8624ba90d1030f41aaf23
emacs-filesystem-26.1-15.el8_10.noarch.rpm
206c53ad11e5c2d26e959af4af07ba78fd4f67a6dbc8624ba90d1030f41aaf23
RLSA-2025:11035
Moderate: lz4 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for lz4.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems.
Security Fix(es):
* lz4: heap-based buffer overflow in LZ4_write32 (CVE-2019-17543)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
lz4-1.8.3-5.el8_10.x86_64.rpm
cd6a6b7e9cb0dca93e0cc7a146768d76a0a21b5bb8dcac806ffba26864862225
lz4-devel-1.8.3-5.el8_10.i686.rpm
f698986b251b6d5e09b1cf1b8249ac3ccf2ff63ddbaabd4953bf2dc168187be5
lz4-devel-1.8.3-5.el8_10.x86_64.rpm
7e03c693755702fe50897945466be6eac4aeb20f36c90a1b772c1669465979c1
lz4-libs-1.8.3-5.el8_10.i686.rpm
6680f7ba224cd16236bb267a2d25dd2d688c1718f2e718c1893f5c2c7fe04fb5
lz4-libs-1.8.3-5.el8_10.x86_64.rpm
d093c42b6784901b035d84394ef2bcab2ffd9c1b51ad5ee8cb62c2a14c0234ed
RLSA-2025:11298
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: cifs: potential buffer overflow in handling symlinks (CVE-2022-49058)
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
* kernel: net: atm: fix use after free in lec_send() (CVE-2025-22004)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
* kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.62.1.el8_10.x86_64.rpm
e74067986931eab767cbdad7238e4d3329a9ecb53cfc0d691e8e4e62d81bbed8
kernel-4.18.0-553.62.1.el8_10.x86_64.rpm
fd05d041a6576cf55dd0cad55b50880d0b73f9f143e77df2afefcc0fa9b47d66
kernel-abi-stablelists-4.18.0-553.62.1.el8_10.noarch.rpm
2d3a3752e49cb9af2f7957199ef966829269fbeccb81027267edf53d3327b06d
kernel-abi-stablelists-4.18.0-553.62.1.el8_10.noarch.rpm
2d3a3752e49cb9af2f7957199ef966829269fbeccb81027267edf53d3327b06d
kernel-core-4.18.0-553.62.1.el8_10.x86_64.rpm
90ad78e9214b30274af16e265ea04afe592cab92271f2fe2c1bf7451007c34bf
kernel-cross-headers-4.18.0-553.62.1.el8_10.x86_64.rpm
9dcdd6707360f39670b9dc628cfe4f8c5572364f07567408245ddfebbefe4d50
kernel-debug-4.18.0-553.62.1.el8_10.x86_64.rpm
8b3082a588048cc609aca0fcf541a7f80a5166e09828887106877a975e94a62d
kernel-debug-core-4.18.0-553.62.1.el8_10.x86_64.rpm
b45f59f4e77a61f7b25493aa29cd9e62cf5d10a627ee29a5463c974f811a996b
kernel-debug-devel-4.18.0-553.62.1.el8_10.x86_64.rpm
86430abb83d11d7a5e236509a9ad470794105ea8098b5a660fd2bcce49cc9369
kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64.rpm
b71aee6674b699ee39faee7920c37ea153a2e4fd390b90a7cf74b849ad8c369f
kernel-debug-modules-4.18.0-553.62.1.el8_10.x86_64.rpm
2797cd70ca3e3b2d8ae1e6061392a08ff9d7e6c7326bb08db0f9dad3b9777b57
kernel-debug-modules-extra-4.18.0-553.62.1.el8_10.x86_64.rpm
56c9d162e9a971b442aaaf486714880b0a993a6839e7c9c2351e9e091e377130
kernel-devel-4.18.0-553.62.1.el8_10.x86_64.rpm
5a54ecd2b083ff0d5ccbac1f692e230500548910fc00abf1a30e8ce9d72c90bf
kernel-doc-4.18.0-553.62.1.el8_10.noarch.rpm
7bb183971b8c53b8cfc6481bb5d062aad23a327dbfe37df5d988aa7f7ab608a7
kernel-doc-4.18.0-553.62.1.el8_10.noarch.rpm
7bb183971b8c53b8cfc6481bb5d062aad23a327dbfe37df5d988aa7f7ab608a7
kernel-headers-4.18.0-553.62.1.el8_10.x86_64.rpm
b466eb70f040ae959f17173b69624d210d180aacd5523a9ca67a1c38c4255ddd
kernel-modules-4.18.0-553.62.1.el8_10.x86_64.rpm
524659ad74bd147dc6e406618640540b4b28551f5547ac7dc48162ff11536a3a
kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64.rpm
156161bc422e171a01d78af49b565fa2e38c5d94fb36082de9c73ae869d79cee
kernel-tools-4.18.0-553.62.1.el8_10.x86_64.rpm
9abed0e254c25b1ffe4c3071d4d932af32636a43cc036b3f687a3abbf977e368
kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64.rpm
bf977b36a867a2b9f3e363c691e43fe62b0f21b0d6ff7bbcf768b098ce9274cc
perf-4.18.0-553.62.1.el8_10.x86_64.rpm
a35fe7af34c9f98fba344bb6284e257279f62086e1d9c94f975c7197fa201bf0
python3-perf-4.18.0-553.62.1.el8_10.x86_64.rpm
6f138322e0f6e338a54be3fe7eb500421f6ba88b506d08194cba159a1016998b
RLSA-2025:11327
Moderate: glib2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib2: Signal subscription vulnerabilities (CVE-2024-34397)
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
glib2-2.56.4-166.el8_10.i686.rpm
ac981ea0dd82ac2f9917f227a5f64cfbba5497580a2b764f4005379a45b8e529
glib2-2.56.4-166.el8_10.x86_64.rpm
e9aa1c4a6790f4a9bc1bf6181d23143918d123e7b624a65c707f7e53917bde71
glib2-devel-2.56.4-166.el8_10.i686.rpm
b6d2f323717315602682e2794eff33b27bd9c7c09fdfe71f32dcc0513fae8572
glib2-devel-2.56.4-166.el8_10.x86_64.rpm
b398da54165d5213e07cbd62ce9799d2925e64d44ae186cfa72f5943281c3691
glib2-fam-2.56.4-166.el8_10.x86_64.rpm
3be44eb01e776b8f2614e8606c96d978f4fd5173876b0c9bbe3539ab46e43ff2
glib2-tests-2.56.4-166.el8_10.x86_64.rpm
d08f80863476d0ff2859fa5a2cc43767d4c8bdb5108e4c59608f657c480bf523
RLSA-2025:11455
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). (CVE-2024-50154)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
kernel-doc-4.18.0-553.63.1.el8_10.noarch.rpm
5ebc564fe4daa2da2fc9a358c51b594e7f4ebf11a4274c4adc5b45a170913216
bpftool-4.18.0-553.63.1.el8_10.x86_64.rpm
fe68d9b27357b30892853097aae562177ab4d0c1cd53902e62f23b503607e846
kernel-4.18.0-553.63.1.el8_10.x86_64.rpm
9d87615fb66e97256c424e1300da4a47677cf1c13b7ecf7a6a0fee5bd1ef176e
kernel-abi-stablelists-4.18.0-553.63.1.el8_10.noarch.rpm
58b98a071a1c2cf9f151700169425ca5a6ccfe6ee537450bc67653ad1c462102
kernel-abi-stablelists-4.18.0-553.63.1.el8_10.noarch.rpm
58b98a071a1c2cf9f151700169425ca5a6ccfe6ee537450bc67653ad1c462102
kernel-core-4.18.0-553.63.1.el8_10.x86_64.rpm
cb0ac7b1c19bf7b270dfbb8a83b5c693344079ebfb5b6ce040b3d4a6c633415c
kernel-cross-headers-4.18.0-553.63.1.el8_10.x86_64.rpm
631ce1495e14d1a798ce62e3dd3b7a049e124e49d99688e77a7ceb307776a163
kernel-debug-4.18.0-553.63.1.el8_10.x86_64.rpm
169015eeb4de6a7696f186e2cb1a26fdecbff300a282cfaaa04c5e18727cc8c9
kernel-debug-core-4.18.0-553.63.1.el8_10.x86_64.rpm
8202c48f89c89f0281d75c18ba387e4368a6fcc39e4ccb9c148911d10a90d200
kernel-debug-devel-4.18.0-553.63.1.el8_10.x86_64.rpm
1d854780ecdd5035394ec5a66c86224bb3196dc49cf027e419fdd83e3371f9da
kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64.rpm
c2b8df1314a6f5a7105df430564be2c3b07a55abfbd4640070fbe92a69fe8698
kernel-debug-modules-4.18.0-553.63.1.el8_10.x86_64.rpm
92fcc06c550fd053fb18fb6398e727f7931e3fb6c4558444443ff9df5409d986
kernel-debug-modules-extra-4.18.0-553.63.1.el8_10.x86_64.rpm
2cffc40f412e0e426c9a9fc27b4bac2c237fea7013d29497d9940b514c68bc3c
kernel-devel-4.18.0-553.63.1.el8_10.x86_64.rpm
e1d9dc1475b476c1451c72d6e1fc3ce138760f0ce85e5e13c7b642581840ba69
kernel-doc-4.18.0-553.63.1.el8_10.noarch.rpm
5ebc564fe4daa2da2fc9a358c51b594e7f4ebf11a4274c4adc5b45a170913216
kernel-headers-4.18.0-553.63.1.el8_10.x86_64.rpm
dc21af25edc01a82441fc629ff8dc51da2ed701103543d6be0c52b4984785d51
kernel-modules-4.18.0-553.63.1.el8_10.x86_64.rpm
8e76d97fa9b1de899b894db881d5fd59f6a20792048f200a94e3b40e59b7061a
kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64.rpm
ecc771d4c22410496370e263d78acb8a0d75f3e387be558c6bb9ddfebbe0ec40
kernel-tools-4.18.0-553.63.1.el8_10.x86_64.rpm
21846e9b1355fc31c4697970dbc1566916ef5f9da64e7284970fcc5256897e21
kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64.rpm
4a9cecb7460501a9d178996fb8c03b9ea47a06c672733c10142dc383ec17dc5c
perf-4.18.0-553.63.1.el8_10.x86_64.rpm
4ebb4a935655da37e327071b6614f7953e0f1cefb74082ef48005169b129ac5b
python3-perf-4.18.0-553.63.1.el8_10.x86_64.rpm
27bf3b16e245ad262954a0a6ed8ba82959ed0dbbc0282f44580deb20b5a5dc1d
RLSA-2025:11805
Moderate: perl security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for perl.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system administration utilities and web programming.
Security Fix(es):
* perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
perl-Errno-1.28-423.el8_10.x86_64.rpm
7d00eb67be2c1a11395e00442f1321fc5a37aca79e73079969b37049f053c344
perl-interpreter-5.26.3-423.el8_10.x86_64.rpm
730ee023c312dc84219be2d4ff89ae2d37f4be12032d26a65bbce4e8724b5756
perl-IO-1.38-423.el8_10.x86_64.rpm
0efce4ae32f741188ea40b6003abd0cf06b1af1d00c627822828bc5533763f27
perl-IO-Zlib-1.10-423.el8_10.noarch.rpm
97105f2df8b7d3d26b05101aef650b47cecb873bdb7a5b410f9cfad7d1239b1e
perl-IO-Zlib-1.10-423.el8_10.noarch.rpm
97105f2df8b7d3d26b05101aef650b47cecb873bdb7a5b410f9cfad7d1239b1e
perl-libs-5.26.3-423.el8_10.i686.rpm
2968cc069f4feca21cb7de4ab5c6084f029ad6edf7b790e5f2c1cc7a4ef84a23
perl-libs-5.26.3-423.el8_10.x86_64.rpm
60e05b11af9d5ec16b0a6fcbeb1a5d43c893d0e21f4291c1c083873cba8611c1
perl-macros-5.26.3-423.el8_10.x86_64.rpm
56a4d7d59cc5e2018618082c9815b2c93a80a4667c98cfe0eb055bb2f363732e
perl-Math-Complex-1.59-423.el8_10.noarch.rpm
7bf723ed6ef8d5e6019169111eda75d32d5e4613a9b4ad57d6342a23fc30bd66
perl-Math-Complex-1.59-423.el8_10.noarch.rpm
7bf723ed6ef8d5e6019169111eda75d32d5e4613a9b4ad57d6342a23fc30bd66
RLSA-2025:12010
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for sqlite.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Integer Truncation in SQLite (CVE-2025-6965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
sqlite-3.26.0-20.el8_10.i686.rpm
eae5400fe0bc06601dda8e85c7be27f0c0262510d84d9f1f51f2287ca419e982
sqlite-3.26.0-20.el8_10.x86_64.rpm
0ad7d10fe613415fb056a16f0699e39cb4182271300a0c353137b744671b3c78
sqlite-devel-3.26.0-20.el8_10.i686.rpm
b23bf57b334b24866b93da8dfce525d9f7f1c30db0a34d7102b772b4907dbf37
sqlite-devel-3.26.0-20.el8_10.x86_64.rpm
c5a717cee3810e746f7013e3aced579486156ba01e02f73606e9ad3c678bf2f2
sqlite-doc-3.26.0-20.el8_10.noarch.rpm
517f519ae4de356e0cbceb4fa62a56072d682f8e7853c5eb4942492301c55850
sqlite-doc-3.26.0-20.el8_10.noarch.rpm
517f519ae4de356e0cbceb4fa62a56072d682f8e7853c5eb4942492301c55850
sqlite-libs-3.26.0-20.el8_10.i686.rpm
de6e2c7340290dbcd64637576cce5ded935c4de75bb20e831ec34d57f451924b
sqlite-libs-3.26.0-20.el8_10.x86_64.rpm
c298ecf3b81f87410ac1be3b85b44d64f361ce2620652fd9d911a7bbf7d91e5c
RLSA-2025:21917
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: NFS: Fix a race when updating an existing write (CVE-2025-39697)
* kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.85.1.el8_10.x86_64.rpm
86d520f11683d8776c1e8e45f73dc26a9633b38c22f6d4ac788ec984c00df9ae
kernel-4.18.0-553.85.1.el8_10.x86_64.rpm
d18d7a15033f7474fffa2c2eef4bde1db6de661fbad8bca37e1ff55bb324f0cd
kernel-abi-stablelists-4.18.0-553.85.1.el8_10.noarch.rpm
39d431868a55a595d177fcfeacb49eca56a3034aa68e8bfa60ced65206333871
kernel-abi-stablelists-4.18.0-553.85.1.el8_10.noarch.rpm
39d431868a55a595d177fcfeacb49eca56a3034aa68e8bfa60ced65206333871
kernel-core-4.18.0-553.85.1.el8_10.x86_64.rpm
77eaac32172b35232fc321ac914e8528e61d99a7a276f8675602fe70d198a068
kernel-debug-4.18.0-553.85.1.el8_10.x86_64.rpm
63461ec04dda852f41d408fecaa67046765936bb08be8ad26e78d136427014dd
kernel-debug-core-4.18.0-553.85.1.el8_10.x86_64.rpm
59a18280bdd2062cd6f8c632156734345c00e4271e1bbd7b76f4cf9d0e544f0f
kernel-debug-devel-4.18.0-553.85.1.el8_10.x86_64.rpm
3e91d4054f7439e7a720b00f497e7eb5cdfe9c9752e70441e0ffb17db50bacb2
kernel-debuginfo-common-x86_64-4.18.0-553.85.1.el8_10.x86_64.rpm
0021e9d1c472884cbea7b43dc3d8958263edf179a717321e21b2896a5b849e16
kernel-debug-modules-4.18.0-553.85.1.el8_10.x86_64.rpm
1350336f5f7948973889737493b8a738535ff134302b1099ef63ad03be564fd6
kernel-debug-modules-extra-4.18.0-553.85.1.el8_10.x86_64.rpm
359bf7be187106dd4e7023244d9e1c5b6ee1289d70c5109da6b7aab167887798
kernel-devel-4.18.0-553.85.1.el8_10.x86_64.rpm
66e446977775e87f04fa7f9b388c4ca21e1c39d027786293eb9ae98824987a4d
kernel-doc-4.18.0-553.85.1.el8_10.noarch.rpm
317f8eeab45491f4bcf390dbaf959ae4075874e856dd9255a819f409cf418270
kernel-doc-4.18.0-553.85.1.el8_10.noarch.rpm
317f8eeab45491f4bcf390dbaf959ae4075874e856dd9255a819f409cf418270
kernel-modules-4.18.0-553.85.1.el8_10.x86_64.rpm
82dcf753d2677e68b0adc2252bd349f798f48b0a6bf2918b9fbb6d9a7d959fde
kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64.rpm
87d449e2b8e4a37d65f48ee4da4ea9ea2a51b2702e76c33e17999f14b1f91af8
kernel-tools-4.18.0-553.85.1.el8_10.x86_64.rpm
0066b1d1da2b5f4a658e6a114db6272d71f02640ae83024d0132b7b75b3371ff
kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64.rpm
f3c10a34d2f078d1a747c54ab0e293ee7a4c114810202b25a675fe67e4dbd2cb
perf-4.18.0-553.85.1.el8_10.x86_64.rpm
cc1367312da514b06b8b9b4b4b0209c2f96e585ab58be678d88c2fd4555865b9
python3-perf-4.18.0-553.85.1.el8_10.x86_64.rpm
df67355c3d674e6ae099229d6dd9e7349edfa45225661dd3a02b8c1f69a71e64
RLSA-2025:19610
Important: sssd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for sssd.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems (CVE-2025-11561)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libipa_hbac-2.9.4-5.el8_10.3.i686.rpm
06741be4c3c046ad423c23b638a65887bff7787dde7e871de7b6faec24644737
libipa_hbac-2.9.4-5.el8_10.3.x86_64.rpm
7218e7b28edac03983a31806600ade81a04808459f44d794d033ade43578cba2
libsss_autofs-2.9.4-5.el8_10.3.x86_64.rpm
8627929ff3076ef23f543a45617eb1199ba844bc64dde1d4061b4ff6466702b4
libsss_certmap-2.9.4-5.el8_10.3.i686.rpm
e592c2faaf8ee1a4563529258551fbe4183d7f810ac8431377eb4b5bf061a269
libsss_certmap-2.9.4-5.el8_10.3.x86_64.rpm
5b7b944fd0494d2252f29271e769d349960d4eb99eb59b90746420ad1bb95761
libsss_idmap-2.9.4-5.el8_10.3.i686.rpm
b8fe640034cbe17081a28be0ac389d5c65512e50d019208a80adb25e5df4dab7
libsss_idmap-2.9.4-5.el8_10.3.x86_64.rpm
a4b3a648fcfbe3dfd7ca42227c6529210458f9f1795fad435e4bb3b82afb7e9c
libsss_nss_idmap-2.9.4-5.el8_10.3.i686.rpm
9d8e5894aba3747935bcfebd69197440a5fa0bd98deb61ffbbdacac1e642738e
libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64.rpm
8765871fb71c84d6771071b8f854e40d41ee867d9be464bd5392b0f106a91413
libsss_simpleifp-2.9.4-5.el8_10.3.i686.rpm
79728a4b046d78f623601e536b2c24915b84ac0287f54ec91a45c175be17d058
libsss_simpleifp-2.9.4-5.el8_10.3.x86_64.rpm
5dc7b639d9e63e5c016963596961a60763deaa51ea9ca958f66d6cadf23f812e
libsss_sudo-2.9.4-5.el8_10.3.x86_64.rpm
3de3e9388ec9bab5d38e7fa31fdcd300be13cdb4061f8084f7e716262aadc655
python3-libipa_hbac-2.9.4-5.el8_10.3.x86_64.rpm
c2e50558c0f070158e35f560b4051260145a93865450f14c31da1fd591725b03
python3-libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64.rpm
eb19ab0cf5f8cfb349b8dc7786a167e6f4a2435caba7e3b71def489f93c507dd
python3-sss-2.9.4-5.el8_10.3.x86_64.rpm
b80fb642a6ce8df0e5dd795856ec515243692c257b10587cc5fb9f08605f2300
python3-sssdconfig-2.9.4-5.el8_10.3.noarch.rpm
085d93d407bba2486045998698cfde5f80905572d1c3fd7792f6d8125cd7d35a
python3-sssdconfig-2.9.4-5.el8_10.3.noarch.rpm
085d93d407bba2486045998698cfde5f80905572d1c3fd7792f6d8125cd7d35a
python3-sss-murmur-2.9.4-5.el8_10.3.x86_64.rpm
f1a4e25c736941ca5e3b40550ad32a84de39dbf0e9928080257d6f484a506600
sssd-2.9.4-5.el8_10.3.x86_64.rpm
8039e2d3e9d972054d87bc1eee3a03128deaf11ff78f1ca68358a195cd87e1eb
sssd-ad-2.9.4-5.el8_10.3.x86_64.rpm
2bfdad59840f0b19d4853818d3c5ccbb3a5428255d05a7fd8bbb77b96ed4fd11
sssd-client-2.9.4-5.el8_10.3.i686.rpm
67d4dd584c47b360ec2a4a5dff19298fdc9434d6cc009c73a81203920e8d1394
sssd-client-2.9.4-5.el8_10.3.x86_64.rpm
326acbe2cafda8a83ab4023ba96ea44c22f944fcf01aef8071c02af866f033e5
sssd-common-2.9.4-5.el8_10.3.x86_64.rpm
d019f4cab39c83843b40fde22f0d62787ac5f16231828e5c09d97eca3b79eec1
sssd-common-pac-2.9.4-5.el8_10.3.x86_64.rpm
4367c7249e70270beef3caac21b3314915ed7479a30fcdeb547458529e785e1d
sssd-dbus-2.9.4-5.el8_10.3.x86_64.rpm
a1a38eb131faf03c74a11839d9f731bcc81efaafa0af21bbd681a512cd08faf3
sssd-ipa-2.9.4-5.el8_10.3.x86_64.rpm
8345abd81f6772e6c0cdbcd3bc053242be693654689575859994fcd88089faf1
sssd-kcm-2.9.4-5.el8_10.3.x86_64.rpm
3d337797aae851007ffc7a1fbd2b146507c3a96b901885d134a0054cab41d207
sssd-krb5-2.9.4-5.el8_10.3.x86_64.rpm
8335c9bfc674ba147a61b7da762a22370f03efa9dfba5b488f15090d70603737
sssd-krb5-common-2.9.4-5.el8_10.3.x86_64.rpm
e0f09fad6d6b83d2cd39dff0e4483fe296e8d33bb990630259e8e285d1739de6
sssd-ldap-2.9.4-5.el8_10.3.x86_64.rpm
428f82526bd89292bd1721f3880c4626c8b089468668302f868b48f702576998
sssd-nfs-idmap-2.9.4-5.el8_10.3.x86_64.rpm
d9824ca20194889e3fddfb72172ebb75f7b2d92996c618d8665f4a0075012bc5
sssd-polkit-rules-2.9.4-5.el8_10.3.x86_64.rpm
79cc3d5c58e2ed157efb0ccecbb72f7e73259c33a185042e6305c53431dcbd19
sssd-proxy-2.9.4-5.el8_10.3.x86_64.rpm
84be02790ecf9dc911f316b3005899b668aeffac7a59541242ec8aa36e82e2aa
sssd-tools-2.9.4-5.el8_10.3.x86_64.rpm
88f8131a3711f77931a2950c0ec89e2977d25a48c147afed3f6fa7c3f855d07e
sssd-winbind-idmap-2.9.4-5.el8_10.3.x86_64.rpm
893aa7e56d6a3c3e9f41805b302e945ddbbfeee05268c0272345073324ee5122
RLSA-2025:19714
Important: libsoup security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libsoup.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libsoup packages provide an HTTP client and server library for GNOME.
Security Fix(es):
* libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945)
* libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libsoup-2.62.3-10.el8_10.i686.rpm
eefadb0b819becaa9e635074006798c66643b89c745d8e9edecd72e550eec1ea
libsoup-2.62.3-10.el8_10.x86_64.rpm
4d618da0a7e1d136cc372720160dfc43e9b1a0438fc501f6868ec3bd08c56b18
RLSA-2025:21977
Moderate: libssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libssh is a library which implements the SSH protocol. It can be used to implement client and server applications.
Security Fix(es):
* libssh: Incorrect Return Code Handling in ssh_kdf() in libssh (CVE-2025-5372)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libssh-0.9.6-16.el8_10.i686.rpm
f37b2f56c9881af84e7101fc7c808c6b944aacdacee2e6910a85e73dde3569eb
libssh-0.9.6-16.el8_10.x86_64.rpm
705a868ebd42ad071cbf39573334be48e7afd66902f6946232746dd2b8b79e4c
libssh-config-0.9.6-16.el8_10.noarch.rpm
309e16b9330a518cee8c9df1ecde89c8d784a47d89d077c10e6c24472de59fd8
libssh-config-0.9.6-16.el8_10.noarch.rpm
309e16b9330a518cee8c9df1ecde89c8d784a47d89d077c10e6c24472de59fd8
RLSA-2025:21776
Important: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for expat.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing (CVE-2025-59375)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
expat-2.5.0-1.el8_10.i686.rpm
5b31875f22e9d826e84491bd6866f6e3ac4ff6fd30e441cf75c139c48fb40772
expat-2.5.0-1.el8_10.x86_64.rpm
50803be2d258ee405b06c5ef422cc5775794c9d5d67d82f432bc6cb8082a5c69
expat-devel-2.5.0-1.el8_10.i686.rpm
07d26a7489064c985c10968b473c6c11c0fcc8c5c014b2d66cb20c8527bf48e2
expat-devel-2.5.0-1.el8_10.x86_64.rpm
ad4f26c87e4b216d83055ea9be2a8d052e9cede16b4cd5db1ad1ee8a7da8c2ba
RLSA-2025:13203
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
libxml2-2.9.7-21.el8_10.3.i686.rpm
782094325763fa745656e828a08006bad2574d2c52f245f872463473a8867429
libxml2-2.9.7-21.el8_10.3.x86_64.rpm
ca8befdace2d7934478cc79803c097f25544fd34573982df4f1a0389fc8a51b6
python3-libxml2-2.9.7-21.el8_10.3.x86_64.rpm
1e2a4e44134da68de9c19a62f1072ec2f150600c6ece3706a480434f40e08c70
RLSA-2025:13234
Moderate: python-requests security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-requests-2.20.0-6.el8_10.noarch.rpm
49b1777749e84a626a98ab655426d19824cc20437e34d00378247df9e5ae8d4c
python3-requests-2.20.0-6.el8_10.noarch.rpm
49b1777749e84a626a98ab655426d19824cc20437e34d00378247df9e5ae8d4c
RLSA-2025:13315
Moderate: gdk-pixbuf2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter.
Security Fix(es):
* gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
gdk-pixbuf2-2.36.12-7.el8_10.i686.rpm
4e1e14ea82371149e12a73cc51cdafac3e0691770ebd519a232818ccd9a19539
gdk-pixbuf2-2.36.12-7.el8_10.x86_64.rpm
57dba414d8f7a88c61769835eb11577df6f26877b29701740d527cb4600f19f7
RLSA-2025:13589
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.69.1.el8_10.x86_64.rpm
4c67f9957fcaa07eae255e084688a39656fe96514d00f51a9b0f1b47d7e1436a
kernel-4.18.0-553.69.1.el8_10.x86_64.rpm
89b1c3e0d5ef9cdee9d2dcaef391613d9447c0ec38c41c27798a3cbe2d918575
kernel-abi-stablelists-4.18.0-553.69.1.el8_10.noarch.rpm
10d0d2ef8e66b7d1887b221ed725cc6b9c64ede67c4a4c2893a45d23313979a6
kernel-abi-stablelists-4.18.0-553.69.1.el8_10.noarch.rpm
10d0d2ef8e66b7d1887b221ed725cc6b9c64ede67c4a4c2893a45d23313979a6
kernel-core-4.18.0-553.69.1.el8_10.x86_64.rpm
0bc596d3b12fbddbd8b22c9159075fafb16173bd1b266824d625ca3f2e33e7f6
kernel-cross-headers-4.18.0-553.69.1.el8_10.x86_64.rpm
fe66a4063bad3677dc2318db153f693d0f70eff196e2e25ce78c16d088a93401
kernel-debug-4.18.0-553.69.1.el8_10.x86_64.rpm
fd215cc214f08beef6e9eb5d6d4ff19c12fa532ddea6fda7c63315f759ceffb4
kernel-debug-core-4.18.0-553.69.1.el8_10.x86_64.rpm
2e133d2fa7bf2d61cde236f60fd3fa6deb1a43c01ba38783cb97c403d7f25dfe
kernel-debug-devel-4.18.0-553.69.1.el8_10.x86_64.rpm
e49fc3ccf7b17cf4c70133b61a7004f632721d310efacf2a52fd8c3ae73b97a0
kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64.rpm
1cc70c6f04dea0d73a432faaba424620a612d02dc6c9340e5c4165ad19abc007
kernel-debug-modules-4.18.0-553.69.1.el8_10.x86_64.rpm
31cbaccf9487fde5eccd6d7a6a0ed0bdd2f34829067639053a75af7a06610a7f
kernel-debug-modules-extra-4.18.0-553.69.1.el8_10.x86_64.rpm
17fae47bac2bb30adacdc509a5593be2ec50df603228291f1aa77fe460def4c5
kernel-devel-4.18.0-553.69.1.el8_10.x86_64.rpm
9675f940a51a3fd6ea97715bdabdb82e52d705d223e537e247359ed8fce1e979
kernel-doc-4.18.0-553.69.1.el8_10.noarch.rpm
bd61043ae7342adc5fc62ca83a5792d239f2e9bf9756964fe12162774d0f40f2
kernel-doc-4.18.0-553.69.1.el8_10.noarch.rpm
bd61043ae7342adc5fc62ca83a5792d239f2e9bf9756964fe12162774d0f40f2
kernel-headers-4.18.0-553.69.1.el8_10.x86_64.rpm
e3d38f85ce3c17c0f4aeafc586ff117fe014d6623fcfa193a51a09ae66c42f17
kernel-modules-4.18.0-553.69.1.el8_10.x86_64.rpm
2459575017cb8eb539f38d2261d547ed57ec80c64384060075c78ee471201528
kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64.rpm
bb8ae3c57824afb6f9924353510a9fb6f51605d87f9cc2f259f66ec88ae11098
kernel-tools-4.18.0-553.69.1.el8_10.x86_64.rpm
4b1299fe25913ecaf51961c19fb27e0a6fcce4437eb48698755b77db183ba94d
kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64.rpm
c5636690e76af83997ba477afc60b8ebaa5165dddac9992be186b071b984c01d
perf-4.18.0-553.69.1.el8_10.x86_64.rpm
cb43e6b49130d1b4a90415a319aaa2e627d5cac60ca4906bad83083a8a24877d
python3-perf-4.18.0-553.69.1.el8_10.x86_64.rpm
1b0e87676cae4f366ff7389e711aca7b18a251765637d10f22520626f2e7011f
RLSA-2025:14135
Important: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for libarchive.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bsdtar-3.3.3-6.el8_10.x86_64.rpm
6e818979a3f59712da750ffb72289b8bea7466ab5175d385a79cd24bc9de1e1a
libarchive-3.3.3-6.el8_10.i686.rpm
d2a0d2aad23312aea1bc155f3134a8fa150f8bef34130c00257fc2ecd6765860
libarchive-3.3.3-6.el8_10.x86_64.rpm
5565ed4cced6ef0c4ae485075282132b9a78f77561e2b180ccaef8f78e1fae2a
RLSA-2025:14553
Moderate: python-cryptography security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for python-cryptography.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-cryptography: NULL-dereference when loading PKCS7 certificates (CVE-2023-49083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
python3-cryptography-3.2.1-8.el8_10.x86_64.rpm
9d7dbb782dfd5115b45c354ff9bd4514a1ae5a62781a5f9b853df8d96bf1ff44
RLSA-2025:14557
Important: pam security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for pam.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication.
Security Fix(es):
* linux-pam: Linux-pam directory Traversal (CVE-2025-6020)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
pam-1.3.1-38.el8_10.i686.rpm
3151864067f2b2475a99623c2103b8234311609d1919374ca58b990ea860de96
pam-1.3.1-38.el8_10.x86_64.rpm
6560d3de369dd994d4b0cbf07517357a95a2422f42f6855eac502229b96ace0d
pam-devel-1.3.1-38.el8_10.i686.rpm
72e5c329090e97ac8327b1c523e7d86bfa421a1b6e7899d19e18e35649fc61a3
pam-devel-1.3.1-38.el8_10.x86_64.rpm
07800dc2954bfa42bffe97f06b0a6fc34b353975647b5317ac0bbe6cb5d80681
RLSA-2025:15008
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: net/sched: sch_qfq: Fix race condition on qfq_aggregate (CVE-2025-38477)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.72.1.el8_10.x86_64.rpm
813d981c25d6676db1d80412824ff2666ed91437a6b70d95f2e9d75a9e27e6ee
kernel-4.18.0-553.72.1.el8_10.x86_64.rpm
a276ff3d3f6a0a522c32e16766245059d628d9a723e607bd817a058eac17ab8d
kernel-abi-stablelists-4.18.0-553.72.1.el8_10.noarch.rpm
c16150610cc3b1c4853b89e952c6864f11c6e92ce9f4511793471b09ee4eb6b9
kernel-abi-stablelists-4.18.0-553.72.1.el8_10.noarch.rpm
c16150610cc3b1c4853b89e952c6864f11c6e92ce9f4511793471b09ee4eb6b9
kernel-core-4.18.0-553.72.1.el8_10.x86_64.rpm
d34d0af60ae9d94e09b4b49930eccbbc85a71684cb86444477f0680bde3ed1f0
kernel-debug-4.18.0-553.72.1.el8_10.x86_64.rpm
5214122bd04bec4eab9747d1bd86c9625f90ff5189807c535652d5beea3a3663
kernel-debug-core-4.18.0-553.72.1.el8_10.x86_64.rpm
e872031beb4fafdae5da37df70cbb67bb9c3dd59ba23e93e197a545b061046bd
kernel-debug-devel-4.18.0-553.72.1.el8_10.x86_64.rpm
742dc0f7796e8cb6dab31206bc3106cde3b43f9129d85dc07891985aaa3153a2
kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64.rpm
fed697feb0ace16b356147f17771a1c94e13b7f4161c431f4cabcf4c85c8d1bb
kernel-debug-modules-4.18.0-553.72.1.el8_10.x86_64.rpm
d158cb4758194c0a0d0c1f0484ff1d1b7b25e400c10e692e839d5b44b9d13470
kernel-debug-modules-extra-4.18.0-553.72.1.el8_10.x86_64.rpm
6f0d5e4b7465d67fda139d965b94749c10a019468765e6c6b656e6044cc3f180
kernel-devel-4.18.0-553.72.1.el8_10.x86_64.rpm
2b5704abf9f770df6f57cd36f2e70eda13ceb7bfa86e96143a613e7b3c9dcd06
kernel-doc-4.18.0-553.72.1.el8_10.noarch.rpm
292231efaddf13cb349b6b781ef8ec14f8126b035f2f87181dd2b2bd60247eb9
kernel-doc-4.18.0-553.72.1.el8_10.noarch.rpm
292231efaddf13cb349b6b781ef8ec14f8126b035f2f87181dd2b2bd60247eb9
kernel-modules-4.18.0-553.72.1.el8_10.x86_64.rpm
4aa3990f9fdf8fbef26e5661c431eafedc878d70e57aa6a5e28a18f2a277dea2
kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64.rpm
4e57ef4006bec9012b4cef8054a84436dd584573262e067fc654e7ac3d0641d8
kernel-tools-4.18.0-553.72.1.el8_10.x86_64.rpm
5eec4937afdb2b29669b50677a5dccc1e20640557067f448f05d269e3e2f1df4
kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64.rpm
a280171e2807a6f2d0594b4610633d74a03cedf11459c069bd806424cfb8488d
perf-4.18.0-553.72.1.el8_10.x86_64.rpm
c5116d1e1bd98a5bf9e61cefe82e75b97d70e31b2b66bf2b8414f4d4008879ae
python3-perf-4.18.0-553.72.1.el8_10.x86_64.rpm
9a52192275628958f71a3e90f6af11ce47e007029790ee34e33645c4b4f2592f
RLSA-2025:15471
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: bpf: Don't use tnum_range on array range checking for poke descriptors (CVE-2022-49985)
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.74.1.el8_10.x86_64.rpm
bc1d43dae1a2da5b07ac13f4007bf94fa7659dfa3d2f3263dd7475467bfdaa5d
kernel-4.18.0-553.74.1.el8_10.x86_64.rpm
cefd59b46f3dd7d0991c4e0ecd972fb622bbe2949a6b30b5ac2f7e0becafd445
kernel-abi-stablelists-4.18.0-553.74.1.el8_10.noarch.rpm
a3a22e0867a850c2b184770b5a2ee3810fe54550c28e621ad8e580008c9c560c
kernel-abi-stablelists-4.18.0-553.74.1.el8_10.noarch.rpm
a3a22e0867a850c2b184770b5a2ee3810fe54550c28e621ad8e580008c9c560c
kernel-core-4.18.0-553.74.1.el8_10.x86_64.rpm
d1a74b6a8d66c87b84cb244c5c532b4e1b5f86156f3acb7f58135dad3e6790d7
kernel-debug-4.18.0-553.74.1.el8_10.x86_64.rpm
cbca2cb7502e1e7e3e1476f8a99dd91f76f76b752b54d216bb28d09a42ab6d9b
kernel-debug-core-4.18.0-553.74.1.el8_10.x86_64.rpm
d4b91f1d48106f6168e010b5bdd688118d11b4193b6b0cc2561e983c6d17aa1c
kernel-debug-devel-4.18.0-553.74.1.el8_10.x86_64.rpm
d80b4b7648ea7b4fad84ebe54dd86f191f3b47c55d71f6d659841d6d108bab91
kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64.rpm
af06806594038720eccbb810bfaa80d6b7b973e84be8bc0799d783f89b5e968f
kernel-debug-modules-4.18.0-553.74.1.el8_10.x86_64.rpm
3dc5c3271fa9f3e000847563d9fd1700870b07dacf23c2df27efa7e0db65c7ce
kernel-debug-modules-extra-4.18.0-553.74.1.el8_10.x86_64.rpm
560827a6b43341066b59b25b68ecefb583b76ea3032995ff2153660de33d5264
kernel-devel-4.18.0-553.74.1.el8_10.x86_64.rpm
b38529bfc71e3fc06d39bf008405c5e8f946b9c618080500636096843ffc0053
kernel-doc-4.18.0-553.74.1.el8_10.noarch.rpm
47fc846d9ea867588d7b2501fc1f6f001f91d6923ac540455a28291f2b651cdf
kernel-doc-4.18.0-553.74.1.el8_10.noarch.rpm
47fc846d9ea867588d7b2501fc1f6f001f91d6923ac540455a28291f2b651cdf
kernel-modules-4.18.0-553.74.1.el8_10.x86_64.rpm
a18ea5e0b06bc2ba008a2ded06b3779bf70b68bba98e64be9745ba145e613133
kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64.rpm
236657f08b8bd4f3ca9d4623c4bf7fb4304f175976eba27b4ee1a56a442c5cb0
kernel-tools-4.18.0-553.74.1.el8_10.x86_64.rpm
a9e1c7006bf32a3131029a4f44162b01f8592b49ac7f87844b8cce7d8222f82b
kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64.rpm
73d855363eb050473a4a92f06d5417ff980024801ec4b81389d3d33b3e01735c
perf-4.18.0-553.74.1.el8_10.x86_64.rpm
199e788eb335e873350eb73c362d8e5469ae6541d1965b6baaf54db250f7dc5d
python3-perf-4.18.0-553.74.1.el8_10.x86_64.rpm
2a9ed45daad0e9a54ecf71267fe759e1d3b7e9fb3087e2379de927e06d701f75
RLSA-2025:15702
Important: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Important
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
none-baseos-rpms
cups-libs-2.2.6-63.el8_10.i686.rpm
028605658db3710d570ac1516fcead7766cd13984b67db2d9910f6d5c391178c
cups-libs-2.2.6-63.el8_10.x86_64.rpm
269e866b0e63b561ae1a1d267114062d4a320f4544ca2b2b627b1331b62cf6bb
RLSA-2025:16372
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: do_change_type(): refuse to operate on unmounted/not ours mounts (CVE-2025-38498)
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.76.1.el8_10.x86_64.rpm
45ff0f629c218322fff243367922f5f74acfe433b69be8942d6f6d47a837418a
kernel-4.18.0-553.76.1.el8_10.x86_64.rpm
da022a2f5bfa2cce2abb8811908c6d58030b72995ff7d8e11d3c09c996287534
kernel-abi-stablelists-4.18.0-553.76.1.el8_10.noarch.rpm
a0d37578f050e3a792106308c88c730383cd4b6729ecc6c7a64dca5d84a6ac90
kernel-abi-stablelists-4.18.0-553.76.1.el8_10.noarch.rpm
a0d37578f050e3a792106308c88c730383cd4b6729ecc6c7a64dca5d84a6ac90
kernel-core-4.18.0-553.76.1.el8_10.x86_64.rpm
8e9c9902be0947ae6cd5a1c166b664466c485bd2691f3d5241cdc8eac8625380
kernel-debug-4.18.0-553.76.1.el8_10.x86_64.rpm
47181af752841ebe82a9aebccd56d1d17cdcbbbbb5017c19ffae347f01cf1b49
kernel-debug-core-4.18.0-553.76.1.el8_10.x86_64.rpm
6bac00359f90ddf719c8de3707601612f8cf9a488234b1b6689f02e4d1e011dd
kernel-debug-devel-4.18.0-553.76.1.el8_10.x86_64.rpm
1ecc1329a65c520e757ddfd98b647a0dc605cb88a74b1734eb7970a593dea769
kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64.rpm
00ad8175bb6a47c8d1aec9b9277a7bd2ece7361c8da1358131f5a88aa16b699f
kernel-debug-modules-4.18.0-553.76.1.el8_10.x86_64.rpm
9003d545993dddfd6898cf8045a2c85021ea1e79e4969aac424ed167f26092b6
kernel-debug-modules-extra-4.18.0-553.76.1.el8_10.x86_64.rpm
62e0176b63f4922917bb68f524fd0f1e38fcf3006be5ad1b6a259bb8052e498d
kernel-devel-4.18.0-553.76.1.el8_10.x86_64.rpm
11220185b3fd42b8ffbcdaa8b2603d5486922d5aca08256d5b5ec0a68fa0b69e
kernel-doc-4.18.0-553.76.1.el8_10.noarch.rpm
d82c21b6930b6108cfb2153806a1a3a30a2fa44a94c91dab9889d540ef6574eb
kernel-doc-4.18.0-553.76.1.el8_10.noarch.rpm
d82c21b6930b6108cfb2153806a1a3a30a2fa44a94c91dab9889d540ef6574eb
kernel-modules-4.18.0-553.76.1.el8_10.x86_64.rpm
0da4f067530460ea565d69ff5b9934ef77a5884748bdc32f11a1b1443bb4d961
kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64.rpm
bac49ec6dbccd38d6b5def190e0c40d55fdfd1edb9eccfc1343cbff9760fd0a6
kernel-tools-4.18.0-553.76.1.el8_10.x86_64.rpm
fb5b67541717a9f41138e43b7d94608d6299f2e554bb22d4a907944e5d426ab2
kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64.rpm
8089a9272628b4f2c1430f1eb31c5ccd19ace1fee1fb50f2225d090205e1d906
perf-4.18.0-553.76.1.el8_10.x86_64.rpm
27503987be3508c29841130abc5435798cefdd60af2a99e7589bd921b29f98eb
python3-perf-4.18.0-553.76.1.el8_10.x86_64.rpm
534c1048c1f66df87bf8a6fa6e8acfa2bfd2c39941efe932c30c34fafe338398
RLSA-2025:16823
Moderate: openssh security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for openssh.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled (CVE-2025-26465)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
openssh-8.0p1-26.el8_10.x86_64.rpm
b1d86cc4c5f4dcd80a627f8c52b2d028360148cf3908e310f37f15b3bc12dcff
openssh-cavs-8.0p1-26.el8_10.x86_64.rpm
5c0b6a013c1d3bbd92a7bd6704f5468c39e96ac7525ea58572bd0425832ed559
openssh-clients-8.0p1-26.el8_10.x86_64.rpm
9f8c4e77a9f32c3e9de9eb9c815ba3fb1a94683b4dcfafb1bbdca797c1a69d34
openssh-keycat-8.0p1-26.el8_10.x86_64.rpm
3024b51da52dc50fbf3ca03341306050305af635b9159e9749bbed8cb365166f
openssh-ldap-8.0p1-26.el8_10.x86_64.rpm
16a6bc33bb6416be82a64c702875c3f970c5921cf38c676b4c21f139955f8f73
openssh-server-8.0p1-26.el8_10.x86_64.rpm
37ebc081f1aa88f52c6d1fa544fe7c7175ad9826a5ea7038c729f0b5ecaabdb7
pam_ssh_agent_auth-0.10.3-7.26.el8_10.x86_64.rpm
4294c836633d6bef8f88778c1c19fac9288181763408376537345333e7f0cb6a
RLSA-2025:22388
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (CVE-2025-38724)
* kernel: smb: client: fix race with concurrent opens in rename(2) (CVE-2025-39825)
* kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory (CVE-2025-39883)
* kernel: e1000e: fix heap overflow in e1000_set_eeprom (CVE-2025-39898)
* kernel: nbd: fix incomplete validation of ioctl arg (CVE-2023-53513)
* kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (CVE-2025-39955)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.87.1.el8_10.x86_64.rpm
4cbd68cea491cd90ee7b9a043a3a1081a867cfbfbc1558040ead239995ed4356
kernel-4.18.0-553.87.1.el8_10.x86_64.rpm
54bd7b8c611d4690df52a5fc9cdd972cde8281276568aa7ce9a30bea0a13afc8
kernel-abi-stablelists-4.18.0-553.87.1.el8_10.noarch.rpm
37ad4a7b4db63220873d17c1a5463f69ea929dba5f2c239e3a457f4ca9cf82c1
kernel-abi-stablelists-4.18.0-553.87.1.el8_10.noarch.rpm
37ad4a7b4db63220873d17c1a5463f69ea929dba5f2c239e3a457f4ca9cf82c1
kernel-core-4.18.0-553.87.1.el8_10.x86_64.rpm
3794fca8e9d30a76e223a021a01c5dd1dd5be0adae02146a5c2ff3ca4cb925f4
kernel-debug-4.18.0-553.87.1.el8_10.x86_64.rpm
618573969b67857078eafe44bc8fa23fc6a17a95790544ffe095de8e38d02f6a
kernel-debug-core-4.18.0-553.87.1.el8_10.x86_64.rpm
78ec329d85beaf1f8daacec069d774e991208601caefe9b981a6493b25953519
kernel-debug-devel-4.18.0-553.87.1.el8_10.x86_64.rpm
2d57940947c4872979a115e87cf4a724781db602c767a5abad077cbf0c254e95
kernel-debuginfo-common-x86_64-4.18.0-553.87.1.el8_10.x86_64.rpm
d75b0a1511d161ee4951f244e48cc8879d6515e31f056c21047398f8a22ccc56
kernel-debug-modules-4.18.0-553.87.1.el8_10.x86_64.rpm
bc6f04630e18bb37452b0dee6d0957e8f17e6ee2c85793cc39c7f1eed5383d80
kernel-debug-modules-extra-4.18.0-553.87.1.el8_10.x86_64.rpm
2fcb63e24a89fe93245621ab1a8f413979a20b05c53d082a25d519f8d48cf188
kernel-devel-4.18.0-553.87.1.el8_10.x86_64.rpm
1b18998b4a4aee22ecc224c027d06a8a3cf983933c2b9c6c5f9d541e916e188d
kernel-doc-4.18.0-553.87.1.el8_10.noarch.rpm
b27a41bc2557f2bae0c11d4e3d6d692db4a7b4b0d016e58dfa89ff4e9cd987d9
kernel-doc-4.18.0-553.87.1.el8_10.noarch.rpm
b27a41bc2557f2bae0c11d4e3d6d692db4a7b4b0d016e58dfa89ff4e9cd987d9
kernel-modules-4.18.0-553.87.1.el8_10.x86_64.rpm
c8639ca46353de0c053501040533622906ee4e4007b0a37c92813d602bb6bc9d
kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64.rpm
87603fd06b57d2cec3cfb3386f622d8958d2d4ab9c8c39ecac0024476f987192
kernel-tools-4.18.0-553.87.1.el8_10.x86_64.rpm
2aa6083f4c2c09d1c46bed0125f7ad77cab2753b25c33a14036b574d1cbb5a98
kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64.rpm
e9b149e70f5bc8fa593fe76c7bed8cedc351bcffdc23dafaec8cc613ad4c0cd9
perf-4.18.0-553.87.1.el8_10.x86_64.rpm
8a38ba23f32cb2d86e180fdedb53df51fa90f015972f83744f2c15e7d8ea4041
python3-perf-4.18.0-553.87.1.el8_10.x86_64.rpm
48ef8b954e7410875bd2e3f3d2e7d4295d5098a786cf7fc97d2585c5a065462d
RLSA-2025:22063
Moderate: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for cups.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
cups-libs-2.2.6-64.el8_10.i686.rpm
e30a1465dd841df7f1e5719993f59cbfd9be81a4042fa96f9eb8046f04e6bc74
cups-libs-2.2.6-64.el8_10.x86_64.rpm
37a371b4f3a827c4ed1667e9be20c8491c91881e34155f3aea7daa7cece1f01d
RLSA-2025:22801
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 8
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() (CVE-2023-53401)
* kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539)
* kernel: RDMA/rxe: Fix mr->map double free (CVE-2022-50543)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-baseos-rpms
bpftool-4.18.0-553.89.1.el8_10.x86_64.rpm
308e5413423f060758c9717c79d9a1363d6676ba39f12f4635ae18544864ec1e
kernel-4.18.0-553.89.1.el8_10.x86_64.rpm
ea6198d62d90577744c710f5ab66df621f61c6bdac56a4acdeedb93b59e279d4
kernel-abi-stablelists-4.18.0-553.89.1.el8_10.noarch.rpm
d2713b0805bef9c348da4a50eb846db158c130ecf54fe4972968d430dee6a29a
kernel-abi-stablelists-4.18.0-553.89.1.el8_10.noarch.rpm
d2713b0805bef9c348da4a50eb846db158c130ecf54fe4972968d430dee6a29a
kernel-core-4.18.0-553.89.1.el8_10.x86_64.rpm
6dfd1771feed41b60e3411b30bfb9a3fe2c2c4cf68c88f9e9c8a8abf38845491
kernel-debug-4.18.0-553.89.1.el8_10.x86_64.rpm
995a1bd104f46d8e9fe9a333a2870226501ab550922bd29fef3da705fc117512
kernel-debug-core-4.18.0-553.89.1.el8_10.x86_64.rpm
7e94d1b1f514cf95e6bffd47bd841f00a580252b256249089518c2226014e0f5
kernel-debug-devel-4.18.0-553.89.1.el8_10.x86_64.rpm
c9abbe26d5250723610b8b8edc66d7d544b413a91464d48610fd937af0d516ca
kernel-debuginfo-common-x86_64-4.18.0-553.89.1.el8_10.x86_64.rpm
d2f863ea31b0910b3510b07e38f803278ab20ac87dfa043f921de00ab3f9ed6a
kernel-debug-modules-4.18.0-553.89.1.el8_10.x86_64.rpm
e6bb0a88e2532fd4d3fea8bc4925de49443f8d5ace0c3d22d5528af06527a00b
kernel-debug-modules-extra-4.18.0-553.89.1.el8_10.x86_64.rpm
95c7ea595896b0552ced2646be21b7e88d171975b4323dfe5f8136bcf59ceb0f
kernel-devel-4.18.0-553.89.1.el8_10.x86_64.rpm
b337830eddcf0b9abfe2378630ece33cee5782361ec4509e5967221f51143895
kernel-doc-4.18.0-553.89.1.el8_10.noarch.rpm
59b4b94d3b05e996c3bdda4434cc1b5fbfe07e04773a18134b26452716fbb466
kernel-doc-4.18.0-553.89.1.el8_10.noarch.rpm
59b4b94d3b05e996c3bdda4434cc1b5fbfe07e04773a18134b26452716fbb466
kernel-modules-4.18.0-553.89.1.el8_10.x86_64.rpm
4a4c5b6e3454d21d3f4e51d3c06b089b5e38e568b1ff35ef05d25f336ec3bd66
kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64.rpm
7ba898d88d078ea602fc02c03f9fa04dd7c3cd9ed79052b0ee16b32d43c44150
kernel-tools-4.18.0-553.89.1.el8_10.x86_64.rpm
c672bdd171bf498158f5210cb7e87159fa2955876af0ec08ff4bdf727f95d1e2
kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64.rpm
e81dbec3bac7bb43085dac1361085df415058dc32e9a87d93763f68655daea8b
perf-4.18.0-553.89.1.el8_10.x86_64.rpm
29d6c0df31ef25ab2f3505083a75ecbcddad49ec8888dc1103f222790d03c1df
python3-perf-4.18.0-553.89.1.el8_10.x86_64.rpm
8e1211adf6be4da45f9ab1773bcee4386be8e2b352f73a78cc66b1e7a08bb3e8