ENHC0004616Sl 7.7 Artwork UpdateScientific LinuxScientific Linux 7sl-logos-70.7.0-1.sl7.noarch.rpm84c525940c491793f6e3fa06f89a406848cc6db70a52b6865c11d9bc8282d6adRITM0891205Important: OpenafsSecurity Fixes: * Fix OPENAFS-SA-2019-001: information leakage in failed RPC output Generated RPC handler routines ran output variables through XDR encoding even when the call had failed and would shortly be aborted (and for which uninitialized output variables is common); any complete packets assembled in the process would be sent to the peer, leaking the contents of the uninitialized memory in question. * Fix OPENAFS-SA-2019-002: information leakage from uninitialized scalars Generated RPC handler routines did not initialize output variables of scalar (fixed-length) type, since they did not require dedicated logic to free. Such variables allocated on the stack could remain uninitialized in some cases (including those affected by OPENAFS-SA-2019-001), and the contents of uninitialized memory would be returned to the peer.importantScientific LinuxScientific Linux 7openafs-1.6-sl-authlibs-1.6.24-290.sl7.x86_64.rpm6f5887f818d41ef20b6ff4d6cb3a46024e52a86dfead62f8aa77ccb61f3aee70openafs-1.6-sl-client-1.6.24-290.sl7.x86_64.rpm89006ed4705a480fc5f899e6c7326fd2fd140f0824c98ac00c1fdddb3e991417openafs-1.6-sl-server-1.6.24-290.sl7.x86_64.rpm8350de2d12be45089e84d23b4290735bc6c06452a9014faf0151292d8998de5dopenafs-1.6-sl-module-tools-1.6.24-290.sl7.x86_64.rpm037c00b5808440bed112b91f2729e274a654835faeb662ce714de45d62e81faaopenafs-1.6-sl-compat-1.6.24-290.sl7.x86_64.rpm6959808badac12f4c3285a9ef94a331af588933e015e78be752ade5379263cc0openafs-1.6-sl-1.6.24-290.sl7.x86_64.rpmc965ad7022e8de31d7a8a5cad828b2820d723a0d7b4908ce39814332b1660b29openafs-1.6-sl-kpasswd-1.6.24-290.sl7.x86_64.rpmd3b934930755dabd732640cf2e63f67f8ac55db7ada2ac7a860d82816b5a4765kmod-openafs-1.6-sl-1062-1.6.24-290.sl7.1062.4.1.x86_64.rpm72b1c824de52ff3c093a2c84480521803d4be7e13c1f4a02f287da52ba7d39b6openafs-1.6-sl-krb5-1.6.24-290.sl7.x86_64.rpmef6f21f2ed5aac083ebd59c22434625744f42ec27d9577e6b853e712ec8b8490openafs-1.6-sl-kernel-source-1.6.24-290.sl7.x86_64.rpm4a808206ca7e0835f17f9842a24e31d3b6dc928900f82838fabf8d17809a1c1eopenafs-1.6-sl-plumbing-tools-1.6.24-290.sl7.x86_64.rpm3885ff49899e4ab65f69647d7404f01f70d553023ed348fd5bd1c11d9781666copenafs-1.6-sl-authlibs-devel-1.6.24-290.sl7.x86_64.rpmd00eeda3a3f8b1903939d7d828cb2fa9fb1e4a0056c5ba0edd9781aec55091bdopenafs-1.6-sl-devel-1.6.24-290.sl7.x86_64.rpme690cf873b434918bb3b5ac380d639ad383f31b2edb9e6e93c4e7c540e03bd35SLBA-2018:3340-1Selinux-Policy Bug Fix Update* Prior to this update of the SELinux policy, rules that allow user domains to use generic pseudoterminal interfaces were missing. As a consequence, the I/O logging function of the sudo utility did not work for SELinux-confined users. The missing rules have been added to the policy, and the I/O logging function no longer fails in the described scenario.Scientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-229.el7_6.5.noarch.rpm048059f8cb027baa5387f4f66fcfa8c8d56c150bafc87a3b659a2999c659a11cselinux-policy-sandbox-3.13.1-229.el7_6.5.noarch.rpm00b35e73c67aa00e176c116f3619794773634c0a739f77e9a7bdac099b400827selinux-policy-targeted-3.13.1-229.el7_6.5.noarch.rpm1d548981075af2a6975010c019138b6bf710ca34f83f192888430e382096d6f2selinux-policy-doc-3.13.1-229.el7_6.5.noarch.rpm3d6c6f44b7dd0de7a30ab26d3ccd267d0d9a20ad16926a94875d053fc5fffb76selinux-policy-mls-3.13.1-229.el7_6.5.noarch.rpm766547b29ab7d47df30420e0bcb5d6aeccbf7b43f856a3b12bd8ce419fb9a9bdselinux-policy-minimum-3.13.1-229.el7_6.5.noarch.rpm0e13eda8667b81166a3f4b6538b10f0f21e233f174a5ab476d12b99acebd2e0bselinux-policy-3.13.1-229.el7_6.5.noarch.rpma4482e90c279b9ad1d9c678e8d21564da888a3e515e60ec318e834d7d2f9d1f4SLBA-2018:3454-1Tzdata Enhancement UpdateScientific LinuxScientific Linux 7tzdata-java-2018g-1.el7.noarch.rpm60e988ad90a1fabefeb4077c643af4dd623276ae0308c52acd39ca05fea45deftzdata-2018g-1.el7.noarch.rpm9cff26eb8b25723083a96d1b4d5132f559730955e788054fe931899f9864212cSLBA-2018:3664-1Selinux-Policy Bug Fix Update* Previously, rules that allow the "sysstat_t" domain to read the /var/log/audit/ directory were missing in the SELinux policy. As a consequence, SELinux denied processes while registering a Red Hat Virtualization Host (RHVH) system to the Red Hat Virtualization Manager (RHVM). With this update, the missing rules have been added to the policy, and SELinux denials no longer occur in the described scenario.Scientific LinuxScientific Linux 7selinux-policy-3.13.1-229.el7_6.6.noarch.rpm66499baf191f64cc1006612eadb3a0778ae9efbc8b93c4c02091b98e451363f1selinux-policy-devel-3.13.1-229.el7_6.6.noarch.rpmfb9e0b2999595ed57e80b8ca654cc494e77fb88e648b2d897c3fce859a904d60selinux-policy-minimum-3.13.1-229.el7_6.6.noarch.rpm37bc92439c7b04d5f6f95edba8d4873160bb91081c68310b792c24326c0263bcselinux-policy-targeted-3.13.1-229.el7_6.6.noarch.rpmda0360686a2946348397dfbcc1949340e6fde91555a6f1612448c01724e27997selinux-policy-doc-3.13.1-229.el7_6.6.noarch.rpmc570dccb5d42f95a4ab09192b6544a44eaf370b4339cc010d1cb4e54f0e234c5selinux-policy-mls-3.13.1-229.el7_6.6.noarch.rpmab8480e2697c09e5248318480ad6608071a26ea9fd6d775ca985f6ffa551a3easelinux-policy-sandbox-3.13.1-229.el7_6.6.noarch.rpma0eb8d601c3b9911d04fefe47365bf6e9643edbd2853183f7e1635d17fcd1029SLBA-2019:0037-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated to version 2018i, which addresses recent time zone changes. Notably: * Africa/São Tomé and Príncipe changed from UTC+01 to UTC+00 on January 01, 2019. * Asia/Qyzylorda, Kazakhstan changed from UTC+06 to UTC+05 on December 21, 2018. * A new time zone, Asia/Qostanay, has been created because Qostanay, Kazakhstan did not transition with the Asia/Qyzylorda change. * America/Metlakatla, Alaska will observe Pacific Standard Time (PST) for this winter only. * Updates to Asia/Casablanca have been implemented based on a prediction that Morocco will continue to adjust clocks around Ramadan. * Changes to Asia/Tehran have been made based on predictions for Iran from 2038 through 2090.Scientific LinuxScientific Linux 7tzdata-java-2018i-1.el7.noarch.rpm9e0ccc63bc1e6dc3028327b66b0f27f828b73f890c27929cf0b9d6b5653eaceftzdata-2018i-1.el7.noarch.rpma94fbf60982380d77cd5ce879efe67ceb8a9f56ebe8244ba39fe49ca6a2c172fSLBA-2019:0689-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated to version 2019a, which addresses recent time zone changes. Notably: * The Asia/Hebron and Asia/Gaza zones will start DST on 2019-03-30, rather than 2019-03-23 as previously predicted. * Metlakatla rejoined Alaska time on 2019-01-20, ending its observances of Pacific standard time.Scientific LinuxScientific Linux 7tzdata-java-2019a-1.el7.noarch.rpm2731206a1abd2e3a7d980dc32f2deb143f5f43eae317ed00b50c29d9df12e984tzdata-2019a-1.el7.noarch.rpm355e009151006b634c77846009aba128388f366bced47a3a7a0e08773256a546SLBA-2019:1703-1Tzdata Enhancement Update* The 2019 spring DST transition for Palestine occurred on March 29, not March 30.Scientific LinuxScientific Linux 7tzdata-2019b-1.el7.noarch.rpmd3436e875cac36e8bcf40497e187a468ba7ce73acc64ddc8c363c9bbe500ab95tzdata-java-2019b-1.el7.noarch.rpme9bdde794ed5c29ae7ea1d943634249f6f65c99778006bb1932482bf28912637SLBA-2019:2044-1Gnome Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libkdcraw-4.10.5-7.el7.i686.rpme854d106a5c834be45845d382c6a7bed0a5a45971386dbec9f8e87de204e2f50shotwell-0.28.4-2.el7.x86_64.rpm3cf236264134a646e7585022be12452ad2a7d3ccb0eabeff573bc26f48fa9b00libkdcraw-devel-4.10.5-7.el7.i686.rpm86821c3afc927141490a210bb5994f2f0711e32ff15b106979738a1a0ea1f4c2libkdcraw-4.10.5-7.el7.x86_64.rpmfeff07dd01af764cf0f592ee5a0ad623d9085e3c7dec333d0f9183b8a0f72ea5libkdcraw-devel-4.10.5-7.el7.x86_64.rpmd8e0b4a8057651d2e9a967ab756146a75599184615aa1c34ed4e96b5606a21feshotwell-0.28.4-2.el7.i686.rpm7392d0d111394eb4d26b292cb0ff2e269c390af910726837aa42b753abe2cf15SLBA-2019:2064-1Libstoragemgmt Bug Fix UpdateScientific LinuxScientific Linux 7libstoragemgmt-1.7.3-3.el7.x86_64.rpmd5b43e017887b27fe0792b6eafe58eee5c5a4e1bbe803a037be622ce78eb7084libstoragemgmt-devel-1.7.3-3.el7.x86_64.rpm3e197c90cee9b5716c00394af3adbf2b1ceb54d7eaf0f3dc5ff67e76b68d28balibstoragemgmt-smis-plugin-1.7.3-3.el7.noarch.rpm526ee62cd3a968692423e330e7f2f338d01b04b84a963038568dae867b2ac395libstoragemgmt-devel-1.7.3-3.el7.i686.rpmc44560d58a682ffc6150bb2279198fd8e26f5b71a53ffdff40cfe5cb0cd3aec4libstoragemgmt-nstor-plugin-1.7.3-3.el7.noarch.rpmd8fdb1e13f2875bada7fdf36d07cbad00f4207a5abf84b693af9cc583b966fa3libstoragemgmt-local-plugin-1.7.3-3.el7.noarch.rpmd817be2343694b433241f6de2981f571c201661fdbc6cc20fbf4bdb30071aedelibstoragemgmt-udev-1.7.3-3.el7.x86_64.rpm512e8db6c7591852a0b06b5ac4ac9a6e25018c0f277517eb1f38bd09f8412a30libstoragemgmt-python-1.7.3-3.el7.noarch.rpmdd1b921630423848e85f956aa9aec0bbeafba6b33c85d306f4200ab92e71a25elibstoragemgmt-targetd-plugin-1.7.3-3.el7.noarch.rpm416ee5dfd7d803a40bdd63dce4f86cc740231b40f56131e19cc03622ea549f4blibstoragemgmt-python-clibs-1.7.3-3.el7.x86_64.rpm706d86fddb6aad743d6bb84b26dfc594ec61bcdaf3e3b7ba479877d01857108elibstoragemgmt-netapp-plugin-1.7.3-3.el7.noarch.rpm65214c0ba3ccda168dbfdacad9d26b12d8c044e90395cc0cc46f0684a56ef603libstoragemgmt-megaraid-plugin-1.7.3-3.el7.noarch.rpm32ad977aade18a5670ba110858f678b3d19234d80aed8647b0279c5988442eb3libstoragemgmt-arcconf-plugin-1.7.3-3.el7.noarch.rpm2bd2d69059ce49b8bbe4e61e645b4baa00c0b5459be4320f60e7e5e51313ba96libstoragemgmt-nfs-plugin-clibs-1.7.3-3.el7.x86_64.rpm0c48ce22414134ed567ac96a94646f9628740202d802ffb7acc17c2c31e079eclibstoragemgmt-1.7.3-3.el7.i686.rpm1e4059693022c5c6640b8b6f940afd90997ab23b555d5b798f0855966aead33blibstoragemgmt-hpsa-plugin-1.7.3-3.el7.noarch.rpm604a0aa27fdbb394e595a4ad3c6a1cff96090bbdf95653af01fb7b5e9e74dc5alibstoragemgmt-nfs-plugin-1.7.3-3.el7.noarch.rpmd64db63084cb8c1b67410cc3d1ad873059cf29314cd3278f7af1767edc87f6eeSLBA-2019:2083-1Qgnomeplatform Bug Fix UpdateScientific LinuxScientific Linux 7qgnomeplatform-0.3-5.el7.x86_64.rpm4ab53c707b8292a49aebb2cd5594eb23037d10c91863047635e94a9d13b91122qgnomeplatform-0.3-5.el7.i686.rpmf73484daea8bd76d0f9ef3f66b903dbe11b07dae83f7b01dbc3a780abb8e5928SLBA-2019:2100-1Rdma And Stack Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libpsm2-compat-11.2.78-1.el7.x86_64.rpm201903bf9e6914a1ec4799f553d9bd4334239188b179d9b627d8b369d12cfaf9compat-openmpi16-devel-1.6.4-10.7.2.el7.i686.rpmb89bf320cd1bba6a9ea681a799386fa4d047be8b7835d9a7ab9f9b16c06ad7a3compat-opensm-libs-3.3.15-3.el7.x86_64.rpm9bfd1142ca027ce7699c11921e7bdf4a474c529a4297e79e76c32a7ba3b08722openmpi-devel-1.10.7-5.el7.x86_64.rpm287840f81dc9a3b99ef129915f42cead8a2b06cfc537bb41d4dee067348e5010libfabric-1.7.0-1.el7.i686.rpmd025b2f95721ed02c1ba287a0f9ae89bacaf0d9418b41ad613e06a74c0c425f6compat-openmpi16-1.6.4-10.7.2.el7.x86_64.rpmf7bb6de271831703638cbd078d9466b1612ea55e41459a3a57d1cca872c04832compat-opensm-libs-3.3.15-3.el7.i686.rpmcfa132fcbdd58b95729ea533b4beebb55613ce4cbceac6b5c9c25367b195df25libfabric-1.7.0-1.el7.x86_64.rpm28ea9e99108872eaf8ef519ec48b204ddc6091367afa5f497a515b2f0f02fd9copenmpi3-devel-3.1.3-2.el7.i686.rpmbe1d01cccb8c272a115f94697eedf28c31ccb30cf8bd95cefc4f18b22f7c43fdopenmpi3-3.1.3-2.el7.i686.rpmd42a86e851b5bab260b6e227efdace1daba61a2c6f5f080b1be942ac0ca1f475opensm-devel-3.3.21-2.el7.i686.rpm662b26c3b73674fd68ab7c1614657b5411a07f4009007f75d7d68ad3e13dfe09libpsm2-devel-11.2.78-1.el7.x86_64.rpm409832b9bda98bd1d4f13e798a2d3a8b8115666a81633ab05c8ae7844dae18a8compat-openmpi16-devel-1.6.4-10.7.2.el7.x86_64.rpmfea87251607aaf00878b132b9f16b896031346680ce309bcfcacce7722750bb0libfabric-devel-1.7.0-1.el7.i686.rpm3810e53e3de31cbd71973485365d063b90ded1519008a90fdc673804bfc7c217ibutils-libs-1.5.7-14.el7.i686.rpm4e1fdf40d4bd65e645d3ee03ebe9f620a7c18946ef17fbf184d8896b0465981bopenmpi-1.10.7-5.el7.i686.rpm96b6b5adebaabcc75e5aa7e0a9a1efb6c164dcbef731eeb8de0a4cc07f467fcalibfabric-devel-1.7.0-1.el7.x86_64.rpm8771a3f59c27f5ade454369416bad33d63675a028f548bbf4edf08d0bf5d80f3opensm-static-3.3.21-2.el7.x86_64.rpm0b488f28e77c4c984bf253f84c4bf3db55309986dfabe1474bbec21c0bf663a3ibutils-1.5.7-14.el7.x86_64.rpm6fb396f05e1f637c276349430f5c24df16f5ec080a0162b99d4618596dcca930openmpi-1.10.7-5.el7.x86_64.rpmafef957b29b87fbd8b6c9530302df2f1c284b2dce53776e030f9e789b539c52dopenmpi3-devel-3.1.3-2.el7.x86_64.rpm82d4e4c670e068d06bc083e5cf4141104a6205e86470b39944275432a99c74f7compat-openmpi16-1.6.4-10.7.2.el7.i686.rpm529c358e79418eb7c939596321c9c5c716ed1f8a2ed8a54829ec84303b83ce50opensm-3.3.21-2.el7.x86_64.rpma7bb92ecbe0ccf174204d0a3327b3121adcab295b0ce54a0c04afea1fd6dcc40opensm-libs-3.3.21-2.el7.i686.rpma9946c04fe43af5303590d1b8d892eb078dd48acaf303e08f10c361bb6b1eb03openmpi3-3.1.3-2.el7.x86_64.rpmbb184f29e53a90100614c9711f66deb9246954f88cda7c9484779b81ecfa51c1ibutils-devel-1.5.7-14.el7.x86_64.rpmc0b343a6adfab38fd9b1fcc9eb4a9f3d2510c9fcbeea728ecf1af2d6ad7a2627opensm-devel-3.3.21-2.el7.x86_64.rpma96c1f4256c774056223949919e6d55ebc6d4d3ca8dd84bffff641ab78d2b824ibutils-libs-1.5.7-14.el7.x86_64.rpmefdc80d9120172ab71c1b0a3291cd11c371427a194b21f0cf008b8fc8e1fba28openmpi-devel-1.10.7-5.el7.i686.rpm0a329d26c069dabf530e14485092d25235a5c0a0d094b096ecf371f26e4a2d17libpsm2-11.2.78-1.el7.x86_64.rpm85b045867d8d69c9406d38f788155b9b13ffbc729f665dc0d9180b4f4a3c60a3opensm-libs-3.3.21-2.el7.x86_64.rpm959234c8a5c0e8b6a2adcb469499c94af5358c1df9c29296efbd57118c2a9139ibutils-devel-1.5.7-14.el7.i686.rpmff3165253407ede96f55a736fc597c833cb6229369e52b21d1efbe2a765c9bf3opensm-static-3.3.21-2.el7.i686.rpm3fd7c0c4851cd534a56f27f633005e7baf7f15477f7ee7aead4ab422026bd20cSLBA-2019:2107-1Llvm-Private Bug Fix UpdateScientific LinuxScientific Linux 7llvm-private-7.0.1-1.el7.x86_64.rpmaed704e1be4abe86f92f15d6db78e1495251a74cf56eb3f632224928a0f53260llvm-private-devel-7.0.1-1.el7.x86_64.rpm2d211bf0346c792990edc6827d12e2fab61275b92307f72fd358696e740753c6llvm-private-devel-7.0.1-1.el7.i686.rpma167bf41553925bd84717cde9e11549013667da44b5e37441e27b7e54626072ellvm-private-7.0.1-1.el7.i686.rpm8c77b75b25a3b788d9fd9246cfdc7e6c73d186d096b06cc5dc26d858abd0c2b1SLBA-2019:2144-1Compat-Libgfortran-41 Bug Fix UpdateScientific LinuxScientific Linux 7compat-libgfortran-41-4.1.2-45.el7.x86_64.rpm01576b5fa0c2cb04b28f7995fa60765895339067476afb9820ba5e55c44130bccompat-libgfortran-41-4.1.2-45.el7.i686.rpm9820e13d0d93cc747b29c65935bd0b3b35adbf1c631dc179ac9f71bb40ea439fSLBA-2019:2146-1Python-Rpm-Macros Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7python3-rpm-macros-3-32.el7.noarch.rpm82c2e86ef85fa8b7d030ddb872fe461a84037109befd20e4959638efe8633c28python2-rpm-macros-3-32.el7.noarch.rpma1716f66e41b546de6e62c951aa52e7031381f29f38bc0120fb48b04aef527a5python-rpm-macros-3-32.el7.noarch.rpm5e582562081f13d7efc1391c19509803ed58bd33cd9ca7a3dc89da1fc0b52dcepython-srpm-macros-3-32.el7.noarch.rpm2b3afc3399639a9ea2aa3e1ea4a1d3a26b68774d05610ac998e339799738c2d9SLBA-2019:2195-1Bind-Dyndb-Ldap Bug Fix UpdateScientific LinuxScientific Linux 7bind-dyndb-ldap-11.1-6.el7.x86_64.rpmd9d034e7d69930023056524093855e51c6e9fb96d05f30ff053a3c59b11aae90SLBA-2019:2198-1Scap-Security-Guide Bug Fix UpdateScientific LinuxScientific Linux 7scap-security-guide-doc-0.1.43-13.sl7_7.noarch.rpmf25b6ede00cc937bde81bd7096c3a8fb50d689ca21f21425a05764e57da22c41scap-security-guide-0.1.43-13.sl7_7.noarch.rpm06bbee1345c58ad9a7f21ef814b1eddc3b09d198b87ea86f202635826bf91c06SLBA-2019:2228-1Pki-Core Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7pki-base-java-10.5.16-3.el7.noarch.rpme62bd49288dbe394a8f5a64d26c181ffc88e8acec8d939680234eb1ff1c91c19pki-tools-10.5.16-3.el7.x86_64.rpmac9483c5c9e3f7d5f7c599b58a4f0b358f0a2120a5b8f851fb0dfbd7c34b203cpki-ca-10.5.16-3.el7.noarch.rpm3f2148690fe5ad8cec88d954ddca2b0080e0fbb759df3ae7ba449ec02b920e38pki-javadoc-10.5.16-3.el7.noarch.rpm101f11be61218a2b11adb1031d8c6458c3b799f0fcf4cc10d65e27f864b84d07pki-server-10.5.16-3.el7.noarch.rpm67c904e85e56df5370bbb293b561b5d3ec87934f3965b4c6a7f5f75ce34112e2pki-symkey-10.5.16-3.el7.x86_64.rpmbf1a0b95ad04744f91f383ecaa24049c3fc68aa98cde39dd5a7170cbb18e97c8pki-base-10.5.16-3.el7.noarch.rpme04e8aaeace93fec4e8748285380160270619608fac2e7d4d6e36149a7582269pki-kra-10.5.16-3.el7.noarch.rpm112318d9e922e9c3f8f7633bc1ef5af9521c96d5a882e3f35101185d4c005f0eSLBA-2019:2234-1New Package: Adobe-Mappings-CmapAll users who require adobe-mappings-cmap are advised to install this new package.Scientific LinuxScientific Linux 7adobe-mappings-cmap-devel-20171205-3.el7.noarch.rpm091b2685be7ea465d06f0a0918e454d29b0734962376c4dcf79687e447660998adobe-mappings-cmap-deprecated-20171205-3.el7.noarch.rpm59b5e032e9da6e5eae0919b71f2c9aee70d9e87612887671d3037eafd84f0086adobe-mappings-cmap-20171205-3.el7.noarch.rpm29abb5030459b75f5c9bfa1a1c9f0722ef7d220ffa38deb3bfe1ee89c961d61bSLBA-2019:2235-1New Package: Adobe-Mappings-PdfAll users who require adobe-mappings-pdf are advised to install this new package.Scientific LinuxScientific Linux 7adobe-mappings-pdf-20180407-1.el7.noarch.rpm6cca064bb7c9bc2fefa399afe49bacf902eacfce37fcb701b1d45f23fed7b28aadobe-mappings-pdf-devel-20180407-1.el7.noarch.rpm312e7630478d8abf12cf59b2ba1df5bd1e32504f59eca70e58ca1cf848a885abSLBA-2019:2236-1New Package: Urw-Base35-FontsAll users who require urw-base35-fonts are advised to install this new package.Scientific LinuxScientific Linux 7urw-base35-fonts-common-20170801-10.el7.noarch.rpm1a73e7035f7c0f43a813e42deacba4afa592f6e185dcdb15523535809681332curw-base35-fonts-20170801-10.el7.noarch.rpmf685be2f5e3b07d9c32b5752f69e81a641581fe7de87925209f64ba3b64ffc4furw-base35-bookman-fonts-20170801-10.el7.noarch.rpm2515d06faf24097f8da059e9e503ae05fb06409d15160d0d07b5a5fd19471d66urw-base35-z003-fonts-20170801-10.el7.noarch.rpmfca2bf3b92dc906e639dab9c656786d8e5a5fe642e3ba90dbb662b549a715c9durw-base35-d050000l-fonts-20170801-10.el7.noarch.rpm46ee054337fdb51390e3da8352ade4302189f5d486c10a813c7679eb72e1da2aurw-base35-nimbus-sans-fonts-20170801-10.el7.noarch.rpm820c07f4da410e70d0d73203f162143ef150a7ee0b0968eacdaad1eb5591fb1curw-base35-gothic-fonts-20170801-10.el7.noarch.rpm8b84c732768c2969db7300d9f0ade946b5a109bb1e4388de6771a17b0bd269b2urw-base35-c059-fonts-20170801-10.el7.noarch.rpm17bebfd8e13a612ec8aaf37d6d43c155496cc52a8acebf3eca211c601afd8db4urw-base35-nimbus-roman-fonts-20170801-10.el7.noarch.rpm137720abcbcd1726d15b8f36834cdb452649380ddc0b0a2be56f48062a69eec0urw-base35-standard-symbols-ps-fonts-20170801-10.el7.noarch.rpm041e850e7b649b1041fd0cdc0d1cc17cf60db5779ee988adfa5976aa983012cdurw-base35-fonts-devel-20170801-10.el7.noarch.rpm1fb9c9eaf819198f3bea11f2219ae390954bab6e91b2d1b6c29bb417857f09d9urw-base35-nimbus-mono-ps-fonts-20170801-10.el7.noarch.rpmae3a987dd2acbc77e69e74f4b5b2b5eece9a1f55db19c8b5ba52901df707d40furw-base35-p052-fonts-20170801-10.el7.noarch.rpm1e79cb5b05498a34f059ca4cdc4d59cb162ddde3132a1fb0b8a37a381b67dc30urw-base35-fonts-legacy-20170801-10.el7.noarch.rpmeaf98259619a6fac07b30dd22baa52eab68b144dcac9f016a1fb0b1385d1c000SLBA-2019:2341-1Openscap Bug Fix UpdateScientific LinuxScientific Linux 7openscap-scanner-1.2.17-4.el7.x86_64.rpme59d78e8a591c99975084d799215fbbc80d8fff07206ae07051d2c04b4e07676openscap-engine-sce-1.2.17-4.el7.x86_64.rpmd1f33b40613a191e7b2e53341971f903b8b809b785e071f481a5e862eb2d2d64openscap-engine-sce-devel-1.2.17-4.el7.x86_64.rpm4f52b3f5f9ec896deb0f5c514e82ee1964eda1d69abd5bfad9d07197a290fe77openscap-1.2.17-4.el7.i686.rpm90e8aaa70fb89d58b068a2fdec73c2a985381c31b46e4a0e6654476652f51ebfopenscap-utils-1.2.17-4.el7.x86_64.rpmaa6fe9389bc5b0c3d3a3d6632fa9caddf20c0063f22f6eaf79dbc51db3d03e0fopenscap-devel-1.2.17-4.el7.x86_64.rpm0beb7095bd8713c5f1aa0c5d7a3c2eb462e7903591ef8eded035fbbac1f151afopenscap-devel-1.2.17-4.el7.i686.rpm6da51ad4de35df9b91f9775c6ee4cd918f2dfe8f4c3651216c6c7d4217b98ca7openscap-extra-probes-1.2.17-4.el7.x86_64.rpm44e9e019d6e6045f7c107e11eb4fa51e63d449a92adcba23cde05fa48054dbadopenscap-engine-sce-devel-1.2.17-4.el7.i686.rpma7ad6546ba63dc2906879e3921cf2796e902245c255d975720009bfd2c9996a5openscap-1.2.17-4.el7.x86_64.rpm9795ce698d4dfbe2f04e68b3040a8b51df341e98c08009d4d8ad4ae1ae5e6c43openscap-python-1.2.17-4.el7.x86_64.rpm1f894a63a7efa3170a1c248f0d5c6d62cd8fd41364054635d0a9eebf56ad6314openscap-engine-sce-1.2.17-4.el7.i686.rpma16a43e476ddc8b3fff02c9bdc0dd8c85f6b70756af59fd12b9b3fd6fd78490eopenscap-containers-1.2.17-4.el7.noarch.rpm24e48e3d60fc2c41c2bcdbf7297b126c6a251fb2d526fb1879836d40ea9e8d86SLBA-2019:2350-1New Package: Compat-Exiv2-026This update adds the compat-exiv2-026 package to Scientific Linux 7.Scientific LinuxScientific Linux 7compat-exiv2-026-0.26-1.el7.i686.rpmd9d8853d3466c52b93b0aca7dddcff3c9c8d17b60315287742f118ae6feb556acompat-exiv2-026-0.26-1.el7.x86_64.rpm9d513b6fbda6a6d24045dfcf50b05a0953e4910549bf24d61943a0c9ce939b0eSLBA-2019:2355-1Selinux-Policy Bug Fix UpdateThis update fixes the following bug: * avc errors reported when using sbd fencingScientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-252.el7.1.noarch.rpmfa669426199fc0220d157ab5b6f267f3d0760946a26db2c3308d51f88c22ea71selinux-policy-doc-3.13.1-252.el7.1.noarch.rpm21eadd6dc1e6f58cf657f863981f3abd9d2e04d1009d62e91f5122bc18d45cf4selinux-policy-targeted-3.13.1-252.el7.1.noarch.rpm8fa15bbdfae5fd9f9241e449ae05dbd5f1bc6a3f8f2d16666f66c39c50a5e089selinux-policy-mls-3.13.1-252.el7.1.noarch.rpm651b0bbd9557c5bad41d3cae6bcc8165fc8584838a7b2eb97a50b7b0429adccaselinux-policy-minimum-3.13.1-252.el7.1.noarch.rpm1c6b98ef50cdb95c03092c9ad7b2f7ca7f863d18a8241f17bdb42c153418375dselinux-policy-3.13.1-252.el7.1.noarch.rpm98f82227c3863abc00ea3e6041b50e95328a1de0f1da69a79f17b8b63eae976fselinux-policy-sandbox-3.13.1-252.el7.1.noarch.rpm0dbbdc4b51e811a936eacb82a513dc23ef01a54eaf3eac62f2990c78eb9a706bSLBA-2019:2871-1Tzdata Enhancement UpdateThe tzdata packages have been updated to version 2019c, which addresses recent time zone changes. Notably: * Fiji will observe the daylight saving time (DST) from November 10, 2019 to January 12, 2020. * Norfolk Island will start to observe Australian-style DST on November 06, 2019.Scientific LinuxScientific Linux 7tzdata-java-2019c-1.el7.noarch.rpm25ea4f06b9de07be4a69e4641b69eb39029d49dfa6bd453a717b6a6bcdf15897tzdata-2019c-1.el7.noarch.rpm2aed8f444cc16c1a7c2033e0b94afb7868a8dd2b547f8c9a07ffbdd75967fa52SLBA-2019:3062-1Kpatch Bug Fix UpdateThis update fixes the following bug: * kpatch: clarify that "kpatch unload" isn't supportedScientific LinuxScientific Linux 7kpatch-0.6.1-5.el7_7.noarch.rpm248170e30031314538f11da067205704744e821a40df4b4deba4f958da3b25a1SLBA-2019:3982-1Selinux-Policy Bug Fix UpdateThis update fixes the following bug: * AVCs seen on "fuser" when "tmpwatch --fuser ..." is used as a system cron jobScientific LinuxScientific Linux 7selinux-policy-doc-3.13.1-252.el7_7.6.noarch.rpm65ff701326e363fcacfc65d6ce5a80af991c3ba9362abd8fbf1e292b7243d725selinux-policy-targeted-3.13.1-252.el7_7.6.noarch.rpm05180e34b1952b23bc88e61dad1155a0892605d7e87f36135bd4288a3f159c97selinux-policy-devel-3.13.1-252.el7_7.6.noarch.rpm7f20544af0535ca7cc09eb415be4736adfb2f41ee91f284f93213b7d734dc9d3selinux-policy-3.13.1-252.el7_7.6.noarch.rpm86b5f248b85caa826d8e564e1d18fdb4919f015c0d2f48b522394f2cd3c54311selinux-policy-minimum-3.13.1-252.el7_7.6.noarch.rpm42431e2c31afb2a1c93ce9297cf295103294fc658d7bcfae3efa561fe36e6988selinux-policy-sandbox-3.13.1-252.el7_7.6.noarch.rpm8020318fb1ee7cc88ab8a932bbca9bc4aa40ec17c08822ecb4b4629642220444selinux-policy-mls-3.13.1-252.el7_7.6.noarch.rpm3b5a1995a7c0f173b3c5c79b7a6de0709826175d470ed92478ebada108171473SLBA-2020:0991-1Libtalloc Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libtalloc-devel-2.1.16-1.el7.i686.rpma98926e7cf0376ec2ca75db51c964aa900e3ae1fe69e04a9d1fee08f2fe6ea72libtalloc-2.1.16-1.el7.x86_64.rpm2da1603b64a260885615e3589386be9f9941c5c3d1b3d31f77a4c2275a3d0b6epytalloc-2.1.16-1.el7.x86_64.rpmc6862e9c3ab8939dddae843fc610653aa0e6f803e82493ab700c080e1cb0da00libtalloc-devel-2.1.16-1.el7.x86_64.rpmef554ef7cafb18aef7ca04d8f401090a31e59a79f2e891cccd0fc335f51a218dlibtalloc-2.1.16-1.el7.i686.rpmfb69cccc4077d4915453e6feb35f56e5b77283b699bc1792c04c237aba344af1pytalloc-devel-2.1.16-1.el7.i686.rpmecf6f5126434bd87f16417a44d562dac3932d41df43fbaf83bad2dc75433af4fpytalloc-devel-2.1.16-1.el7.x86_64.rpm3796e011aae01468a4cc1080dfd545cc7e5bb1eb38ba1de4abd3edbf1c393ba2pytalloc-2.1.16-1.el7.i686.rpm22828299404e989ddf87ab406a3dadda02f2a852f8f7664d0ae2e5983d837ac5SLBA-2020:1001-1Libtdb Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7tdb-tools-1.3.18-1.el7.x86_64.rpm571d522d63620a132ebf6b615453f887ea4d256f45204e19eab80ff30d7af734python-tdb-1.3.18-1.el7.x86_64.rpmc8805e391f94da88276eb660d646d5470bf441192d3150c761a9b61a3dd71c69libtdb-devel-1.3.18-1.el7.i686.rpm58be27ba7d8f74087fc106838de89bb97d8162085983ca03e69526f5df86dbb7python-tdb-1.3.18-1.el7.i686.rpm50bee6db25486d21add75cd4ec70aba9ddf1c94b0c9558fcce9db4626419393blibtdb-devel-1.3.18-1.el7.x86_64.rpm9ab0b0c83c5209d07f8982c6d08d8394f43e97fa7265528e918374da68cc5360libtdb-1.3.18-1.el7.i686.rpm482b7ef769828f728c2bd39249ba8291516643c0641b02ca64533c3fed0866e3libtdb-1.3.18-1.el7.x86_64.rpm148868a33a99c530b598589256ae5596f47da6e1f5d444cb98ad0afc871f1544SLBA-2020:1012-1Bcc Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7bcc-devel-0.10.0-1.el7.x86_64.rpm4914a980e6f9b92cf98d80aabf7bb7e87ffc4c66f9f89e6b79f138bca8ef847ebcc-tools-0.10.0-1.el7.x86_64.rpm182f51dc408fcb82875d80410ce35a54aa062e689c3cc4c80c882bdc5d20edd8python-bcc-0.10.0-1.el7.x86_64.rpm7e50bf01dba9aaeee79ac762ec2d192db08dab2ff958764d11c35d610494ed04bcc-doc-0.10.0-1.el7.noarch.rpmb402475b9480e8e1660e7965606a56376c8c23e0e6055fbf5c1b3e6619711b5dbcc-0.10.0-1.el7.x86_64.rpm66e814087bf69fdfdbe152521646a017129c65dbe514b2162b4ba84046e6a37fSLBA-2020:1030-1Nuxwdog Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7nuxwdog-devel-1.0.5-1.el7.i686.rpm7a5d595a260d23e2d1a15f5398edd5df496ab336eb49721116b172c3fba5ff82nuxwdog-devel-1.0.5-1.el7.x86_64.rpmf2d745e465bb96dfda42838ca95a9e7b3f55b46ba8e33dd002e27670a59d097dnuxwdog-1.0.5-1.el7.x86_64.rpm888f7b5e5f08b841b62876eaa8872c224e81ad9d9de081a945c63dca1e8091c3nuxwdog-client-perl-1.0.5-1.el7.x86_64.rpm43699a9166fadff4e6fcad822777d3abd027c54b77f1b28f1bab70a6ea160279nuxwdog-1.0.5-1.el7.i686.rpm406750ff3ab35401faf838b44209ece9bca6f87e27c2cfdca5f5e272dcff48fcnuxwdog-client-java-1.0.5-1.el7.x86_64.rpmbdd13dd32cf2a75bef793291cdd67b1e717b5412a2322942b4fd61e61f11dad5SLBA-2020:1038-1Glusterfs Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7glusterfs-fuse-6.0-29.sl7.x86_64.rpm7577618930b287706dfd2e4755ed30ba27d895b19fd21117f139d60e0ac92861glusterfs-resource-agents-6.0-29.sl7.noarch.rpmf3bced8a363247633563c1b7eb88da93f04752e51ce5932511a048bba80acf4cglusterfs-geo-replication-6.0-29.sl7.x86_64.rpmfba9cf990d557dd7c06cf95b76609a4b627377bd5632fd56a506c5034aac4121glusterfs-api-devel-6.0-29.sl7.x86_64.rpm6a87b2f402cf0ec23bdbeb1db9282a5a639aac090237022bc599b4afecb78b59glusterfs-server-6.0-29.sl7.x86_64.rpm6398a553d2bc216e853fa4a6b6b99c650076e96b1d9f08bea90c6790b6fa06a3glusterfs-rdma-6.0-29.sl7.x86_64.rpm1a47229b8de276bb6939b93f7a6f3747a599498f63e63c52e1e30cbcab5da5c8glusterfs-6.0-29.sl7.x86_64.rpm36f41c262247ded5b9597a793c07c20dbb45df06cddc1b18546bd50b2c66bc0bglusterfs-api-6.0-29.sl7.x86_64.rpm37df7d89ba07246418a0bfc89993a829ee0f8fd4e701a74e59f9bad2b9d542cdglusterfs-libs-6.0-29.sl7.x86_64.rpm6e7368c5d7de3b77767187267ee4c69f147e5c7e8140d809c29fd2f18174a4c9glusterfs-client-xlators-6.0-29.sl7.x86_64.rpm446f3025e4a925e63528998fd33a3a0b1c46885a20441ba8a4bf882cfd2a533bpython2-gluster-6.0-29.sl7.x86_64.rpm13b8d7e408319169ca7703631246c5840139973787dec5685529d105537961d6glusterfs-devel-6.0-29.sl7.x86_64.rpm6229cb2f52700df46f323bfdaa36f5ba381ba7dd40160d1bb24e8bc3f01c2defglusterfs-cli-6.0-29.sl7.x86_64.rpm5b57babd5811bf3cf5029015a9c7b8934ff88216d64de66481fbdc43bd915013glusterfs-cloudsync-plugins-6.0-29.sl7.x86_64.rpmb1437cefc49c69541059d74db54cb16c0782a8eeb24a982868d0d6b89db9de94glusterfs-events-6.0-29.sl7.x86_64.rpm735dbce6751c700e7a3eb8240db6deb96bb5014ec387b590a0b0044ee280cae2SLBA-2020:1056-1Libtevent Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libtevent-0.9.39-1.el7.x86_64.rpm07adeafab452983bae66a5b81321271a28426c20c9cc557f5463a87aa44a80edlibtevent-devel-0.9.39-1.el7.i686.rpmb8786f5696f25ff3d141b48d4f15ba3ab6add2d895943d06f0befada4185e278libtevent-0.9.39-1.el7.i686.rpmd6138c1ad3ccec3e01ba8838ac30502352988291b408661eb6b6475e8eee341elibtevent-devel-0.9.39-1.el7.x86_64.rpm52ec549fedb3b205ac00332951a34f4f7682bc514c0b08e7bb7f040528c33141python-tevent-0.9.39-1.el7.x86_64.rpm69a608b41dd0ec2d684ce916352f8b5320bc341bfb9181a6d768f234c60ec29cSLBA-2020:1073-1Tomcatjss Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7tomcatjss-7.2.5-1.el7.noarch.rpmc612860830a18587c3ba8c7183f5410390a24ae58b740115e01967a203664871SLBA-2020:1083-1Ipa Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7python2-ipalib-4.6.6-11.sl7.noarch.rpm10a9fa1010a1e3cd2edcbed601fdb4ae144f05da8592fe11c1cec2492ee3d798ipa-server-common-4.6.6-11.sl7.noarch.rpm3fdead3dfe03fb2fa147257a6a6c28b580998519fd43565e9ddd2feadd2fed9dipa-client-4.6.6-11.sl7.x86_64.rpm738130e18b24dfe02d91e666924417d8e9ae47570f125ef4ac980a7fbde70fd3ipa-server-trust-ad-4.6.6-11.sl7.x86_64.rpme51b3250fac0b152a600c2fbb9b494bc1ad939fe8bb4c16ce6b621bcf9a03a06ipa-server-dns-4.6.6-11.sl7.noarch.rpm6c108edd0827ca167c9d5f2a49091b7feebe2ac4c6de96e4ac59bbd419dfa64epython2-ipaclient-4.6.6-11.sl7.noarch.rpm1d968a4cc0f4946172e7c9789058c6ce650b2cb4e5d94a93ae546465e9f428b9python2-ipaserver-4.6.6-11.sl7.noarch.rpmf8c16c14764c1ea1de5288800f22af97cd8059b866bc0246d2b9196d10cc69b8ipa-common-4.6.6-11.sl7.noarch.rpm50a93f6b4220130eec236e2db732a5c5112c487b40def6d033314d86fc761760ipa-server-4.6.6-11.sl7.x86_64.rpm64999ded44313501fd9218568f349cea6316ea5afdca6c3c825823187531429eipa-python-compat-4.6.6-11.sl7.noarch.rpm5071d18831bba1e3b6800ad8240cd1b550337c5fc94b6669acd35531a276733bipa-client-common-4.6.6-11.sl7.noarch.rpm6df989b4940a925d7d284ed6a3e66374259c15a7bc9a02b2d52b308b2d42c185SLBA-2020:1098-1Libblockdev Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libblockdev-lvm-devel-2.18-5.el7.x86_64.rpm87f56a4b78471c6321fbb6f695c94226cd3daf9bb27cda307104e417de5aa57dlibblockdev-part-devel-2.18-5.el7.x86_64.rpm4de94252128d2859aab9c7db5caa17bd5d9306b5aa5c19fd09e011ed7624f332libblockdev-vdo-2.18-5.el7.x86_64.rpm9e85ac1f5a2e68fa0252c2bf4085ef9af680f197838df8650df73e5a5ffb9304libblockdev-lvm-devel-2.18-5.el7.i686.rpm5e0ff5ae21a2e7c2819f0d099a9265fcf23a28866806c573eb4d9d9d1797af16libblockdev-part-devel-2.18-5.el7.i686.rpm6cac8be467cd8d6779ae916d42c49247be60ad8593a2d8b6aa2a7c6860ef2d61libblockdev-lvm-2.18-5.el7.i686.rpma31002cc66bf8df5046c5ad0de424d5716c59d20f9b52daaed43a3063be1271fpython2-blockdev-2.18-5.el7.x86_64.rpm7213b4a9db922a22314a8f60a50de641c1082da8fd7e9700e74c10da90bd6eeblibblockdev-swap-devel-2.18-5.el7.i686.rpmd1daa5f616e12bddae77a52dd4657729dc847baae3f696a95e599f4dd9b102dclibblockdev-mpath-2.18-5.el7.x86_64.rpm7795c2f3c9b99d183d6634cbb1b2d6a7bf6503ca607f70a75e42a194505c1f2alibblockdev-dm-devel-2.18-5.el7.i686.rpm69bb367d7158eff505d09e292d1b49a906b7f84ac666dc93da66d02b73355539libblockdev-fs-2.18-5.el7.x86_64.rpm4c184bd9c04e8a312d314ec37c8b24fdcce9078505ea378f9861c668272422ealibblockdev-mpath-devel-2.18-5.el7.i686.rpma159b3a7750681aabd2c696fbbd5ce1deebebe88860f284c469673af9d6f9c7elibblockdev-swap-2.18-5.el7.x86_64.rpmf8b5b35f3dbf2a5c3d2323876dd8c79002050bf91d7fbabb6edda4dfd9b5734elibblockdev-2.18-5.el7.i686.rpm19537dd3699bb7f160358aeec85c1d11195774053eb89dc53a7852585632c410libblockdev-utils-devel-2.18-5.el7.i686.rpm43c3a4fa5edfec0ec3b636a117fe6224792b1c7e34b50db86093c081e9bf8be3libblockdev-lvm-2.18-5.el7.x86_64.rpm4be75d8b3c5a61b9ac5891b48e2aef546bc04111e00350573f433bf34070f116libblockdev-nvdimm-devel-2.18-5.el7.x86_64.rpm649218abb4b5e5acaffd3d11be658399104ced6e85d8c53fc23509935db04354libblockdev-part-2.18-5.el7.x86_64.rpm031aaf9af92d8ce6deb2da3bcca95986847f3d9e6ea7efe864e308382c795b99libblockdev-mdraid-devel-2.18-5.el7.x86_64.rpm260e276d172d7059eb7c25b99e7fe9ffa9b0551c1505e8eba8cbc7de00ea4f9alibblockdev-mdraid-2.18-5.el7.i686.rpm714c633d578db20c0295103851f20113db9406c4275329a4b495f36d04bb6c9flibblockdev-fs-devel-2.18-5.el7.x86_64.rpma36ec2cd0e25f82acb2518dff50e98d09570e97ab7b46796ee245ebcd83cfec6libblockdev-vdo-devel-2.18-5.el7.x86_64.rpmed7fb7f87b353df35c399f6baf19860a355cee9740531ce2252e82ced5da5de2libblockdev-utils-2.18-5.el7.x86_64.rpmbd6dfd48540fdf99b17b462bc27499a2100e7c2f79f0feae671ae668ccfd9c1blibblockdev-devel-2.18-5.el7.x86_64.rpmae81f4d2a731b36db9a7d8db4a8a5af22d7779748f6b649c2bbed67c09caed8dlibblockdev-dm-2.18-5.el7.i686.rpm473d883cecf3c6935830f305209d535aa06b9acff057e7c30ce4798ea88d0b4blibblockdev-mpath-devel-2.18-5.el7.x86_64.rpm04f2ee52cf19d9f49ab5e8e4c9aae414cfbcf7666f9f5bbed600eeb21bacd8b9libblockdev-mpath-2.18-5.el7.i686.rpm5c56d570e69330eebdca63494fac22ca49371a1df2f8319f5180605f742bb495libblockdev-btrfs-devel-2.18-5.el7.i686.rpm7d099bbb69be16a9a1eea10f14365be1a3b963edde268ba14e5633f9f215c7b7libblockdev-swap-2.18-5.el7.i686.rpm7014fb0747c9ba598a3519298e9b280adf96acbf7274389a8d02055d35f899b4libblockdev-fs-2.18-5.el7.i686.rpma92ebcc0e66c3e90006635abb9950586d3abdc8b74fa6c7fd7512e8a985ef245libblockdev-dm-2.18-5.el7.x86_64.rpm2c6f9c29f9d7092a9a11418d0bb192d2c8461a8c23d028906e758d56031eb5fflibblockdev-loop-devel-2.18-5.el7.x86_64.rpm2489ebd2d6714192ee9fd43163686a32916036b296485b2d2e317736e1575b0alibblockdev-dm-devel-2.18-5.el7.x86_64.rpm815493e0bfe6174de6047550e8af0520fb5b33f9756ce4acddcc4aab4c67e67alibblockdev-crypto-devel-2.18-5.el7.x86_64.rpmdd57368a94dcf86b464abe6cc02759b6f985dc1853befaf5ca6254b6466c3abalibblockdev-nvdimm-2.18-5.el7.i686.rpm06fea248aaee92046fd9be56bdbab9b37013e008f98051b84b212c6c6411a3a5libblockdev-2.18-5.el7.x86_64.rpmfacdc8ed2a383cb6e804aa6748066ab7538a4e10cb68a7365b49b74a04a09585libblockdev-part-2.18-5.el7.i686.rpm4063b08465737a677db55066af37f71e759fe2ccbbe0c916d7c9b4a84bd59dd3libblockdev-swap-devel-2.18-5.el7.x86_64.rpm09355a77a3dc7cd721ece009ef6279d6389d999e1457625cb811421a5bb8d0e4libblockdev-crypto-devel-2.18-5.el7.i686.rpm68357e4106a541bc11d5c67b1f286ba901da875ce083891fae940b7dd836e57alibblockdev-mdraid-2.18-5.el7.x86_64.rpm8d2968b488c32eb5e092e42e67ca76f480e3337c7dd03c6b58c0c6db4c48f12blibblockdev-utils-2.18-5.el7.i686.rpm7780c98ea2752bdb862d64b3957fc311a6a94d176bed772411b944f8f6d1b343libblockdev-crypto-2.18-5.el7.x86_64.rpm9e8c95558b0b705b1d93b66e8a4690be8c6d26e961bd5bf652678fd651764bd3libblockdev-crypto-2.18-5.el7.i686.rpm936a815a32259d181a4dc96bbb8a8df72cb553962703321bec4d7fc8db1c0984libblockdev-btrfs-2.18-5.el7.i686.rpm84a8f6f4274b9c32f02703bb8fc732f3c0023486835445bae0a7370ee74e4cc1libblockdev-kbd-2.18-5.el7.x86_64.rpmda292b5979d8bff5d6b20e5de91ac62f47492d7390364966955324b169af7cd7libblockdev-btrfs-devel-2.18-5.el7.x86_64.rpm0e427685393a5161a09ebe90a8d534edbecebffd3716a0dee5d0fd6a9fbda96elibblockdev-loop-2.18-5.el7.x86_64.rpm732fbe59336b9cf67e93ec6753d4c6a55adb12d3b738d4a74a693c45122e63e1libblockdev-kbd-2.18-5.el7.i686.rpm2e695f9ebff02c46d73cecb712ea268062c622700b59de9525cd6d41bf506064libblockdev-utils-devel-2.18-5.el7.x86_64.rpm425c336195ddfeff458c778e69c4a0e5e256778ae55560f0b121521ba0f5c545libblockdev-devel-2.18-5.el7.i686.rpmf137548051f95bb8261e109f4879c363fd146a4df4c48eb1a0276527218bb895libblockdev-kbd-devel-2.18-5.el7.i686.rpm0c64ee3a83b5235ddd7b75b7d09a812f93b57ed446ba11196cf9803e283f25balibblockdev-nvdimm-devel-2.18-5.el7.i686.rpm2c69a579cf1091e9e8b31469d50e57cf7bd649ed221a6ee2c7b219922b3cab1flibblockdev-loop-devel-2.18-5.el7.i686.rpmba78bf4b240a6a45e63b6ec65dfff6684cf911d173d28a31d8590b55a82c38eelibblockdev-mdraid-devel-2.18-5.el7.i686.rpma79cedc914211fde2eab0c2a0cf07a9aa96ec7b924b6d56935bd0903c937da71libblockdev-fs-devel-2.18-5.el7.i686.rpme75f6bcf78dd5644723d6d0c7e3117bd57b3d7d32270a60cfdf123fe7ba47fa3libblockdev-kbd-devel-2.18-5.el7.x86_64.rpm10278e2f346a5b4baae79314ac8dec5d7855e8b5c776925467a2b8189a0092b8libblockdev-loop-2.18-5.el7.i686.rpm3189a8d60c5145ac8fce3b200701a90f4d77b38a0a70b9b1224981439bc43a58libblockdev-plugins-all-2.18-5.el7.x86_64.rpm95fab152ac3334b58b77fb1db204938fdfbfb24226a36f99aa6f81d4ce85c79flibblockdev-btrfs-2.18-5.el7.x86_64.rpm9e9bd9f8c03dc47f75920d70ab76432466abc2bf0667605c3353ecc953bfb3a0libblockdev-nvdimm-2.18-5.el7.x86_64.rpm49ccd8daf3a78b101898e3233e17c440f597c99128bcfe6b90c2869647060c50SLBA-2020:1105-1Vdo And Kmod-Kvdo Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7kmod-kvdo-6.1.3.7-5.el7.x86_64.rpm66a4cb37e3feadea748d85322a787430018def0f3d1268788c455e7ee25943d6vdo-6.1.3.4-4.el7.x86_64.rpm43715263c3d8d5e5311d2377efd26184667d2c7e913dce542f57ef6fdd04c5ccSLBA-2020:1154-1Nfs-Utils Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7nfs-utils-1.3.0-0.66.el7.x86_64.rpm6f149c1a542a438828823c4beea9c8586402a03e1a973a551528a2e8903a9897SLBA-2020:1982-1Tzdata Enhancement UpdateThe tzdata packages have been updated to version 2020a, which addresses recent time zone changes. Notably: In Morocco (the Africa/Casablanca time zone), daylight saving time starts on 2020-05-31 instead of on 2020-05-24. Canada's Yukon region (the America/Whitehorse and America/Dawson time zones) changed to a year-round UTC-07 time on 2020-03-08. The America/Godthab time zone has been renamed to America/Nuuk.Scientific LinuxScientific Linux 7tzdata-java-2020a-1.el7.noarch.rpm669adb9c38cf19e0a6927d67d63921cc074c44a004cc853a98a148b3964ab3fftzdata-2020a-1.el7.noarch.rpme3408dd82c51df8101216dce2cc2a4ac0757a80d95390db6cd2031e372919bbdSLBA-2020:2662-1Selinux-Policy Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * Nagios/nrpe no longer allowed to check mail queueScientific LinuxScientific Linux 7selinux-policy-targeted-3.13.1-266.el7_8.1.noarch.rpm7e06967b2d42f96c52f257cdf6476d99808853e0d4479f2d452d87f2e86948a2selinux-policy-doc-3.13.1-266.el7_8.1.noarch.rpm66c77252389e0ad284c9e4b3f5f16ada69dea1ccfd086cb81461d82258f3ee7fselinux-policy-3.13.1-266.el7_8.1.noarch.rpm7030b3132be3700e7ea6cee104b81813d46b5e96d17f6e57b4b9df01d1f9d61fselinux-policy-mls-3.13.1-266.el7_8.1.noarch.rpmaf35a987fd3383ec2a469b9b85206ca8d49e44aca0f83ea4288b10742f7e98d5selinux-policy-minimum-3.13.1-266.el7_8.1.noarch.rpm803fc78199485f14ee354c724d026783ed49fda34413e0da2977803c251faa11selinux-policy-sandbox-3.13.1-266.el7_8.1.noarch.rpm8ad9144c37917688807f089fc60e2b3e3bd5c4570414ad01c94ba03531931f80selinux-policy-devel-3.13.1-266.el7_8.1.noarch.rpm869c1d1377f718666448a2e475ccded680758fe87735cb59b08ae5f58e2af63bSLBA-2020:3265-1Shim Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * Fix crash on some systems during boot up.Scientific LinuxScientific Linux 7shim-unsigned-ia32-15-8.el7.x86_64.rpm925f47111dd10b1902e268618733805a7e133e9028655be775ed9605e6333731shim-unsigned-x64-15-8.el7.x86_64.rpmcf7d4b671310a5f320876f7916fd3434463ca9292be1c834489d3529e5a3d0d1SLBA-2020:3904-1Sssd Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7libsss_simpleifp-devel-1.16.5-10.el7.i686.rpmb6ad09cd762f7c0f9d31aeb021c80f3deb28150434a7ba2ebf2075194901e8c7python-libipa_hbac-1.16.5-10.el7.x86_64.rpmbfb5c319c528fb4a438ca756b55bfcf5b3437e72d040b4bc71c9e4ba776f110dsssd-krb5-common-1.16.5-10.el7.x86_64.rpm94075fad1ed400d85fede47d3430fd92c30a52cf9fdda56dbf6be393bfe4cf56libsss_certmap-devel-1.16.5-10.el7.i686.rpmef30bd623ce6771df6aa383cda4124ace90ce726e8e3481fc5e61e643c105c4elibsss_certmap-devel-1.16.5-10.el7.x86_64.rpm71c4e59346c4971c2691239d58f3ce8518f5db9ebdcd951ee7c37e440f27a9bdsssd-client-1.16.5-10.el7.i686.rpm4f8617434e11247650ffb0ce727e3f5038b587c12d2635330f054d7a7a1f77f5sssd-ldap-1.16.5-10.el7.x86_64.rpmc70e67210e2a11b6c07f7f6ce409977ba623a8bcc924adf92d36d475ddb7ddf6libsss_nss_idmap-devel-1.16.5-10.el7.x86_64.rpmcee913763ba7c946da161254194d4813cafa7e22521e9c777a068d87089d95d9sssd-common-1.16.5-10.el7.x86_64.rpmb00a2e0101ae1ce0dfe47eb0789a75f37ffa6fec6bbb482e13e17cf9656b6490sssd-krb5-1.16.5-10.el7.x86_64.rpm5aadcd7a4b722450ab2e7f293f8e951c1209eb90e2fcd83c6f949ca19d21c466python-sss-1.16.5-10.el7.x86_64.rpmcea1a8153fe4dc35563a5191b7182b8181113efa89653742b23d6e65c3473eaepython-sss-murmur-1.16.5-10.el7.x86_64.rpm1d817c0758ce55eba4693073589512c7abb8002dc1a7fadcbdd0a46ac7bfcec8sssd-proxy-1.16.5-10.el7.x86_64.rpm6c0eedb41607c1e7c089250258d295716ed0dba4394ddf5e99f87b4042a1a1aalibsss_nss_idmap-1.16.5-10.el7.x86_64.rpm7de43beef8408f3adea65aa52d68999eb41e8be477f5f4a61bbaf77958bd45a0libipa_hbac-devel-1.16.5-10.el7.i686.rpm230c3396a490f480e3166912f9baefb94171a242703db84c77e9829021cfe7fdlibipa_hbac-1.16.5-10.el7.x86_64.rpm8f07b60bb80ec160a01ac2fa139605099154ef161aa616e8f2b82ffb8ecbe0c5sssd-polkit-rules-1.16.5-10.el7.x86_64.rpm1380cbfd195f71ff2850774e9443be5067ee2a7287741ac43d78c2b491a98bd6libsss_nss_idmap-1.16.5-10.el7.i686.rpm6272c5ce9d04babaa08ba323936e82e2fcae39df41b237e5923206f931e2c369libsss_autofs-1.16.5-10.el7.x86_64.rpm0d89e298936f270ab1711cae70d43e5455cb6bc7e12bc9b7a3525b2ebf0e1082sssd-common-pac-1.16.5-10.el7.x86_64.rpmd6a3586ae72b0ffe472615b009618cd8b3ecc704a736baf920eb8a646862a7b5libsss_simpleifp-devel-1.16.5-10.el7.x86_64.rpmac3491913ea9478a5743b02fc9f2b21d61a2540db4df0426c2a8b8544ec59f24sssd-kcm-1.16.5-10.el7.x86_64.rpm8d5f30e1f1ed1440239cd912fb101f9112909a1385da61a71cb4073f92a7f539sssd-ipa-1.16.5-10.el7.x86_64.rpm748cde649eb550a724b4261401b29fad1e2c21c4123497d1f80bd2dd0eaec406libsss_certmap-1.16.5-10.el7.i686.rpm2ba1adc110b1fe52315431ce7e168f62fbc777708083caf59c24453b7759fa5dsssd-ad-1.16.5-10.el7.x86_64.rpm27c1e64d5a2fa00752b78a1f330d336c23d6a1f2c34010c09aaf8650f7bc81eesssd-client-1.16.5-10.el7.x86_64.rpm7e12ee2d7c78991cc66c43562cb663158192413f3a065a6ade10aecd736477e5sssd-1.16.5-10.el7.x86_64.rpm7c177b59ca9993ed13a5ebfd0284261feb600b83c905469bcfd4806929ece70dlibsss_idmap-1.16.5-10.el7.i686.rpm8df4148e9b940c311035310320c561513b76698bf6f59d25f4f687310c1a0c46sssd-libwbclient-devel-1.16.5-10.el7.x86_64.rpm2774474c57023faba365973c87890d09b433f4703185681d4ac33199ee9d7d52libsss_idmap-1.16.5-10.el7.x86_64.rpm46927507311208d6f890916295b1fe2f188a33a9b31b69aa09a1b00efcfd7c27libsss_simpleifp-1.16.5-10.el7.i686.rpm40430368c1f2f2dd32efb263f2a0d0063952f0d6faa436faf7ba4c0475c6478dlibsss_idmap-devel-1.16.5-10.el7.i686.rpm06c942ed290379ec4ef526b04628bde59fcc799dd82cdbcd1203be7b99e743f6sssd-dbus-1.16.5-10.el7.x86_64.rpmed5989c76b9a6b84461a2b827a4cb311bb0aba4de34997486afcdbe16455f55dlibipa_hbac-1.16.5-10.el7.i686.rpm1ec8549c97feae0e23c0f8ba6908769abef1599dae5a1d1cf3e88f0ba852f3e7libsss_certmap-1.16.5-10.el7.x86_64.rpm5977fb5991f46125ea4b8a1c218b1570543bc389518110ed4cd14336443b023alibsss_sudo-1.16.5-10.el7.x86_64.rpmcabb426062d8ee3fc4ec3fdd43706417ef64b3604605d9efe1ae6559c9768194libsss_nss_idmap-devel-1.16.5-10.el7.i686.rpmc26f6ee86a4dcea5d06a3c7a62075a3c96a8178346176c2b77bde6bafae034edpython-libsss_nss_idmap-1.16.5-10.el7.x86_64.rpmbfc4726d4b72440e527bb8c92d79de9b00f4069ca0edc3ef8b82f1e0fcd33e53sssd-libwbclient-devel-1.16.5-10.el7.i686.rpmff4f2f781dd34237de3e565049fdbf751b03fc77f41a729b82d9907fd6afb6f9sssd-tools-1.16.5-10.el7.x86_64.rpm48e11e1de67d905e4fbd5840b018b4dacb1d1c3ae9e515d52541145b69d1bd86libsss_idmap-devel-1.16.5-10.el7.x86_64.rpm7af4431d59f5b89ef70447dadefe647df67aff10b6b97bc831f8220b237ebe6esssd-winbind-idmap-1.16.5-10.el7.x86_64.rpmd3bbccaf0c4a33abd594aeb9da9042fde0399ad9b1844edc6987529074d02861libsss_simpleifp-1.16.5-10.el7.x86_64.rpm2000b33f01b9a0f2c89cdc72f984eb68f173b0f509c226b76e18b09b02c26d9bsssd-libwbclient-1.16.5-10.el7.x86_64.rpmbc96272fa09064f0185ca371bcf124578864bdbbae8107826bdb4c3e5f21aebblibipa_hbac-devel-1.16.5-10.el7.x86_64.rpmcb62befff8b7761a9468259a6e920b172ebc74026bc14870096e26321a0572a5python-sssdconfig-1.16.5-10.el7.noarch.rpm51ba1016cdb1060babab5efb9631e32153eb613dd33c812ba50ac5a1ca85739bSLBA-2020:3909-1Scap-Security-Guide Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7scap-security-guide-0.1.49-13.sl7.noarch.rpmed1530365ae6c625a79c06864835f0af3db3bd80f989cb62d0d315646ecba957scap-security-guide-doc-0.1.49-13.sl7.noarch.rpm355d05da740b6bf25b55801b1b52b87ac9df389c19b6e5aa7e8bc5586bcef65aSLBA-2020:3914-1Openscap Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7openscap-devel-1.2.17-11.el7.i686.rpm5f16a3af77db983ac3a0f5c17a5664f0252f129caf1a54f2e189a549331dc770openscap-python-1.2.17-11.el7.x86_64.rpm5adbaa50cbc340d9d8ad54704c8b5fbc58d49a4eeca65983f161ab014601b4bfopenscap-extra-probes-1.2.17-11.el7.x86_64.rpm90ce2ded320b9ba224b241f5a84c8ee3393ac380899755e165b92000ed0b9380openscap-engine-sce-devel-1.2.17-11.el7.x86_64.rpmdd39e29e3c6413d14e4c945164f0db6c16272fa7c33aec47a01a97e2f7cb5925openscap-1.2.17-11.el7.i686.rpmc1bef430a1cbb4947078fb8367ebe6b97d55a6f2bc080f0894e3c958cf23e892openscap-engine-sce-1.2.17-11.el7.i686.rpm4db722c7ef92a16b04ed9b46367dbad108bc23db12b13fae36666366d5fc2408openscap-scanner-1.2.17-11.el7.x86_64.rpm84a0793e05b3055291d75259a7a43200e42b30c237ddb33d858ed1df04519418openscap-engine-sce-devel-1.2.17-11.el7.i686.rpm954c57cefbd274046e95f0f9e35f3dfe674f203dc4e3b39bda46d72343963f72openscap-engine-sce-1.2.17-11.el7.x86_64.rpm7cca309204759e1dcdd6c129a541b28d16067f00120ee0c4c81c54a5d050f2f0openscap-utils-1.2.17-11.el7.x86_64.rpma76dd94183111f060ee049c919c6bbf4ac99ef7a8fac2431c0921af9f3c76780openscap-containers-1.2.17-11.el7.noarch.rpm81f96ef394b91625ce5216521944902389300695be8c3da85e0b37f6750ad391openscap-devel-1.2.17-11.el7.x86_64.rpm8a2160ba8b1f0cc260177a418cc9bbe9cc3da2a712f07ec78de15ccf12f5b262openscap-1.2.17-11.el7.x86_64.rpm0c7ebd8f421b7471c3a5442eb6b9d48abc9c10941349130d6720dfc1ea269f27SLBA-2020:3925-1Selinux-Policy Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-268.el7.noarch.rpm6f9e1e4c8beeca7c1d9e661ab2ae35f6ecb6a53b0cdc3ee4ba421a44552e2bf4selinux-policy-3.13.1-268.el7.noarch.rpmac85f9475feb4c91f58d886a500196603e8436d4846ae4f92c139b48a47569e1selinux-policy-sandbox-3.13.1-268.el7.noarch.rpm959a2efd8d68e27b2dfe4019beac808c07176b399e4d1fa395436719e7c2f030selinux-policy-mls-3.13.1-268.el7.noarch.rpme71dde05a3abfb984e13302667dabc14a114da914f7b8adc31070bbe11ef84d9selinux-policy-minimum-3.13.1-268.el7.noarch.rpmbd08f54777b5f6991f4956c0321c542c80bcbaf0aa914d5035c2a5980a23be4aselinux-policy-doc-3.13.1-268.el7.noarch.rpm1d0a6325ec4552c2a148378b529c6e1b2e542f4f5ec459768c1a8a151c6bf4easelinux-policy-targeted-3.13.1-268.el7.noarch.rpm53087bdf24d08cd7310a9037f7d3767c473bde3c75318084f6a9036b3e2fccfdSLBA-2020:3938-1Jss Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7jss-4.4.9-3.el7.x86_64.rpm100a543a99455b3593ff688cb43e28b179ae8dcd189096979852c03872bead93jss-javadoc-4.4.9-3.el7.x86_64.rpm4e137c200d7f44c21a2e4a5642c37bac068805f42e3dc56c48a898cb7f014c19SLBA-2020:3961-1Gssproxy Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7gssproxy-0.7.0-29.el7.x86_64.rpm3675d375a146d150b5fb0aaed6a9b4ad4e0574c737e77e4cebb8449dfa586ee4SLBA-2020:3990-1Mesa Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7mesa-libGLES-18.3.4-10.el7.i686.rpm41b45b56bfa5930bf6a3c679ca594ec3a966da8f5216b794f1102553a4dc4864mesa-khr-devel-18.3.4-10.el7.i686.rpmc85f4b5a8ad57bde4a5a089911989e7ab3dd653f96868b1653d63b1af4812cebmesa-libGLES-18.3.4-10.el7.x86_64.rpm79794d4968a5f72fcbe19138a774dc18cfad04e5cfb875bc5acbcf5abbb64c74mesa-libgbm-devel-18.3.4-10.el7.x86_64.rpmbc0105a5f0f598340aeb5d02fe846572a7914c819c13110dcda30d743b2b58c0mesa-vdpau-drivers-18.3.4-10.el7.i686.rpm0c043f6b4c530b251f59d3ae79475ea475bd2d7c6bcf8a36a6b1f90f08187300mesa-libGLES-devel-18.3.4-10.el7.x86_64.rpmf96a30b81d462af6bb0a2c9787cbd998c357aa53aa91e26c04d1ed2a99377879mesa-libxatracker-18.3.4-10.el7.i686.rpm1daafe96d0b1b72716947243bb4391eb5f1e1b3eff336552330c6edcbadce7bdmesa-libglapi-18.3.4-10.el7.x86_64.rpm26c2b1f2976e5fd7617c0fd53e0c0fe6f80569f1920ae0d45d834fc496e78f51mesa-libEGL-18.3.4-10.el7.i686.rpmd4be5fd3df3465dba0227523c6b527da5e1427df1cd532e9f57a79721fbee997mesa-vulkan-drivers-18.3.4-10.el7.i686.rpm9b7e191ab94d033b8e2757a97e7973da180ff3434edf6f5c7e43e5be3cc93238mesa-libGL-devel-18.3.4-10.el7.x86_64.rpmc3f4e9e29548909283ee1d61cb5efedf81b5d2da148b20c555aff5e379992f30mesa-khr-devel-18.3.4-10.el7.x86_64.rpm0dfae6c8b5f70289b624b8aea5607a6ecc711ffa17a0509562210d298afdb9f3mesa-libGL-devel-18.3.4-10.el7.i686.rpm5aa9001775ce4a2c5720e80f57d33be287e9286fe3fc771d5d09f0795854247bmesa-dri-drivers-18.3.4-10.el7.x86_64.rpm066a833a964b516df838faaba5b827b06895c645c1bc8503d6c670204a13284fmesa-libEGL-devel-18.3.4-10.el7.x86_64.rpm64ad09b0b632ab255b990f4d680fe04f7c3eb30c2175e9212f507f378b418f48mesa-libOSMesa-devel-18.3.4-10.el7.i686.rpm262347f806287bba6b9d6fda186e2e9934352059f09eec5106bcf43b413fa33dmesa-dri-drivers-18.3.4-10.el7.i686.rpm2d1a64a7c9fead5feb9d16246d6e7d0c49f70008da11c80a226f504bedb28e24mesa-libGLES-devel-18.3.4-10.el7.i686.rpm10b4387ca836295b14b3f06fd0adf567ab3420b5ee68f0985b2dea52dfc0779dmesa-libGL-18.3.4-10.el7.i686.rpm5ac49f3393ec87c6b089b2cba390df5c778ce547c073454316c0fe87c224b69bmesa-libEGL-18.3.4-10.el7.x86_64.rpmfe5fe2947b1fbeb80d1d2e072108df41f981ea0c267482362fedb4ff77c1c95bmesa-libxatracker-devel-18.3.4-10.el7.i686.rpmfd8477fbe2e619c309abe7011b4f1544c40a446a3267bf5d9f72713246ef00femesa-vdpau-drivers-18.3.4-10.el7.x86_64.rpm764ce6fbd92b18856ee9322db9426a5666ab448dacf4a741e60e823e5e7b44cfmesa-libGL-18.3.4-10.el7.x86_64.rpmab274b94ac80af76c948c29b20541897e6789ebf7484e7f3f8d66342fdf9a011mesa-filesystem-18.3.4-10.el7.x86_64.rpmd53c74ecb12d5916f1890868e86f729f1e19582d09f0649ec2e7580d66ed6362mesa-libgbm-18.3.4-10.el7.x86_64.rpmd7b656c429f154db0885d0edd57e0a7720c26e37fb12ada34d692515e8430eb5mesa-libgbm-18.3.4-10.el7.i686.rpm3004a5009e8aa50d641126acb450397eff4235ee9a92e62376583c41c661389bmesa-libglapi-18.3.4-10.el7.i686.rpm9f8f448ea0cc2d2f5629f7d6400ea34d5bf3c985d2f7446920a72074a5856b32mesa-libOSMesa-18.3.4-10.el7.x86_64.rpm388697bc4c4f6f35465ab9722efd32098b561c77066f3d51b6e955def6c6f781mesa-filesystem-18.3.4-10.el7.i686.rpmc072a0a8caa2ff2ed30ba75d45d30cc55ffb1c4b51074c698df36f7bd073e470mesa-libEGL-devel-18.3.4-10.el7.i686.rpm1c19628db4b3e3f47b6bef6996f1a4bcc24d58cfced9591a76cde5c2afe9ee70mesa-libxatracker-devel-18.3.4-10.el7.x86_64.rpm3262c507521b2b0b0c7f337a964cccf89a9b7ee7261de0cd5f86bfcce66d904bmesa-libOSMesa-devel-18.3.4-10.el7.x86_64.rpm240ba79f360e197a848a9cfa1a80812f25e929215953b5a2e8cafe123877a074mesa-libOSMesa-18.3.4-10.el7.i686.rpm4ec4c5964661a7f4a2bee627560eab424b4372a4e9ab3013ad4fea08332f0bd0mesa-vulkan-drivers-18.3.4-10.el7.x86_64.rpmb9079ff60ce2179710b8fda6c157380b65c3e5f88bc61eca514c17cc24ae0bf9mesa-libxatracker-18.3.4-10.el7.x86_64.rpm00112f5405635a25c888d837e579cc619f5d38cbffbe45429a7aa36b84508807mesa-libgbm-devel-18.3.4-10.el7.i686.rpm890d72575971988fc9647778e9d577c6c96c99e5ee03e945dd82953813b51982SLBA-2020:4045-1Shim Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7shim-unsigned-ia32-15-9.el7.x86_64.rpmeb5461acd44f5c417de7bac321eb8b4c6740f0aa141957e3a716e9cfda8b4843fwupdate-12-6.sl7.x86_64.rpm4fa835008eaba7ecd258a12a50c7edc2c262dc91b9f57ef7ab0b68a3f230e5cfmokutil-15-11.sl7.x86_64.rpmd30740543fd917ca84498aaae16dc3ae1e02dc0e435557bd2b1a79ea70683ac2fwupdate-devel-12-6.sl7.x86_64.rpm9c2ce6e2180c22510fde878ad56abfcacdcf6e7fc1e4fcb8433d06826a5aa096shim-ia32-15-11.sl7.x86_64.rpmc7666614ad7283b1c36eb793c49b3b93b626d77401fdd99494a2ec20f8c722f0fwupdate-efi-12-6.sl7.x86_64.rpm18eafdb03a82cbea9831d61b934bca5e521c92f02831b9d85bd409d159b3eb02shim-unsigned-x64-15-9.el7.x86_64.rpmac97d4bbc89cbe4a2867a15b4c5a80b238032fc96f20a097f8ab5eea1826a5f8fwupdate-libs-12-6.sl7.x86_64.rpmbee8d631ee0009cd3fec3b278011294aff1ea944c5ba0a4c404bd008b46f68d0shim-x64-15-11.sl7.x86_64.rpm717fb66d267e396cd41eab8585900e45a2b457a95afd82bd20a461b81c53d6c8SLBA-2020:4046-1Grub2 Bug Fix And Enhancement UpdateScientific LinuxScientific Linux 7grub2-efi-x64-cdboot-2.02-0.87.sl7.x86_64.rpm26f1493108bcf32bcb33ce424772e962c86d311a24695fd87dd4291bf432bb51grub2-tools-minimal-2.02-0.87.sl7.x86_64.rpm9654a6edd1745435bf775e6bef3c9a49e476381564c420919d10a65da8e3d770grub2-efi-ia32-cdboot-2.02-0.87.sl7.x86_64.rpm293f8036a24e2e14d29bc0daafbff547bb3c96b38173fed1465cfc346a512683grub2-pc-2.02-0.87.sl7.x86_64.rpm6817637dc99e043a6e591f4b7e9fd1449085d3cebfaba565bb7a21b199da87f1grub2-tools-2.02-0.87.sl7.x86_64.rpm5ca499bac3cc7f39168d4d6dc3440a2942278d213aca164cdec039727fbf97b6grub2-pc-modules-2.02-0.87.sl7.noarch.rpmb941d64d188dfa6d10000be0ee58870eac7bf1a2ac311859c090f7c393266c6agrub2-efi-x64-modules-2.02-0.87.sl7.noarch.rpmf067e1ce69f25cdbe8673cb80d9f3c16eae49fac7029d20388baa149dc0e3fbbgrub2-2.02-0.87.sl7.x86_64.rpm467add357c1a4bccb041d872365fa84fcdf72cdf83bc172377ff167c6bb91de1grub2-efi-x64-2.02-0.87.sl7.x86_64.rpm34f05e3a10f2fd1572df65eb075d02d5edccec1c6c761933c49ffa55b0255e7fgrub2-common-2.02-0.87.sl7.noarch.rpmd4a7df3ae98c2a5817e531af29c5525f47ac123d13df835760448d77d22040begrub2-efi-ia32-modules-2.02-0.87.sl7.noarch.rpm0c3359bb8b97ef527f9ef247bee46e3f991f6458ab0622ed9442933b5a9dd036grub2-tools-extra-2.02-0.87.sl7.x86_64.rpm0848767975cfdf7f5e942e607355ac050f3e272baaf9d499ad8982bc4438541bgrub2-efi-ia32-2.02-0.87.sl7.x86_64.rpme802633c2d6655fcdcfdc3d6c75cf853ba51733c06d6425115a7016c374ea80fSLBA-2020:4180-1Kernel Bug Fix UpdateThis update fixes the following bugs: * kernel: scsi: ses: don't ask for diagnostic pages repeatedly during probe * OVS drops secondary SCTP connection * Unable to insert 'i10nm_edac.ko' EDAC kernel module on JVL after CPU upgraded * File corruption when a 1 MB (or bigger) file is pulled from a container running memory mapped AF_PACKET TX ring * [mlx5] kernel crash at mlx5e_encap_take() The system must be rebooted for this update to take effect.Scientific LinuxtrueScientific Linux 7kernel-abi-whitelists-3.10.0-1160.2.1.el7.noarch.rpmee38276592d03247c195503a3a84bb788acf4f2375852d5e37e53aa10e5e14eckernel-headers-3.10.0-1160.2.1.el7.x86_64.rpm305ee7b1e141efb86dad88ce8f64d891d4499515a0b86cc2492a7afe7354f2cckernel-tools-3.10.0-1160.2.1.el7.x86_64.rpm47e102d549470ebe722222c158bf8bbe23ce7edaa9f6dbcf3ac2522f29f4f841kernel-tools-libs-devel-3.10.0-1160.2.1.el7.x86_64.rpm05238fa7733a2854c8da926c1cfc153aefeb49566288f67f02062c65d3f5d183python-perf-3.10.0-1160.2.1.el7.x86_64.rpmddca29711b7c5250cc0031df2c682dc3642d51de1ba6b31c4d3fee300d97abdekernel-3.10.0-1160.2.1.el7.x86_64.rpmf64734816b193587747ba3f6f37cef54cb714507a9a60de8dcd9de5e30f6174bkernel-debug-devel-3.10.0-1160.2.1.el7.x86_64.rpm12e0cf4a6ac5e1725da5c23f45471c5137290387f7dc775f1a3ab186307231cbperf-3.10.0-1160.2.1.el7.x86_64.rpme1e87432d6037c047a0c13b2fa71288d378d6cf91d2cd94f3d7298c4b980c1a1kernel-devel-3.10.0-1160.2.1.el7.x86_64.rpm72a1ee6bb71ce33bc004874f657bbdb022ac6f31d44a5f9b87164617d4693673kernel-debug-3.10.0-1160.2.1.el7.x86_64.rpm5134deda0899e9a38e7e47fd0e23fe5b02271f2c23fc669bc6716c59f0a46170kernel-tools-libs-3.10.0-1160.2.1.el7.x86_64.rpm542cbe64be29e0eee7ba6662f92806774a6f86524e5857bb9ebe2a35d9cb552dkernel-doc-3.10.0-1160.2.1.el7.noarch.rpm367bf3076424250e2b5a936305fd9d34309323521cbc12c90ccd88ec4f96a989bpftool-3.10.0-1160.2.1.el7.x86_64.rpmcbd170a26667e7100abca4aabfa06d0d24d6bd8ab65264cfb8e8e767de442a5cSLBA-2020:4282-1Tzdata Enhancement UpdateThe tzdata packages have been updated to version 2020b, which addresses recent time zone changes. Notably: * Yukon timezones represented by America/Whitehorse and America/Dawson will change time zone rules from -08/-07 to permanent -07 on November 01, 2020, not on August 03, 2020, contrary to what was in the version 2020a. * The most recent winter(+08)/summer(+11) transition for Casey Station, Antarctica was on April 04, 2020 at 00:01. * Obsolete pacificnew, systemv, and yearistype.sh files have been removed from the distribution.Scientific LinuxScientific Linux 7tzdata-java-2020b-3.el7.noarch.rpme2e2a484a6f1ee84161056075eb83c7c1fb9608b45fb487cfa3ccf4623f5629ctzdata-2020b-3.el7.noarch.rpmbae5d3ba085cab34024698659c79a9f30feb14b936052f6a4e1ad4af87ac9ce0SLBA-2020:4329-1Tzdata Enhancement UpdateThe tzdata packages have been updated to version 2020d, which addresses recent time zone changes. Notably: * Fiji starts the daylight saving time (DST) later than usual on December 20, 2020, rather than the predicted November O8, 2020. * Palestine will end summer time on October 24, 2020 rather than the predicted October 31, 2020.Scientific LinuxScientific Linux 7tzdata-java-2020d-2.el7.noarch.rpme86d66eb32256341996577a3468858f80ccc4b9e24f0049daf6bb64f596d23e6tzdata-2020d-2.el7.noarch.rpm32dcd49fca4845c52d8522bcd6ee06a92751dbd5bf2f8449c49d779f56716432SLBA-2020:5017-1Openscap Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * Huge memory leak in probe_rpmverifyfile * OpenSCAP doesn't take advantage of gzip compression when downloading remote content.Scientific LinuxScientific Linux 7openscap-engine-sce-1.2.17-13.el7_9.x86_64.rpm26a432b346c85143df5fdde282d9c47924e375ed738a6d801c45e1889c8bfbb0openscap-engine-sce-devel-1.2.17-13.el7_9.i686.rpm55deefdf2b8baccf6dcfe7257b32da1358ffad07cf45c4774b6d2da7f42958f4openscap-scanner-1.2.17-13.el7_9.x86_64.rpm88b70d5aff9e78052b1ef48e3ef10e440554a5c0306783325f1f213c1b5f2de1openscap-containers-1.2.17-13.el7_9.noarch.rpmc1ace00cb7cc2d0d459c60346f512dd63fc382408c65f15647f43f0fd262d2cdopenscap-devel-1.2.17-13.el7_9.x86_64.rpm64a29549d82f9078cb03fd0e266169dcfbab9789a34103b1a314a26944eec89aopenscap-utils-1.2.17-13.el7_9.x86_64.rpmb589b72959da4539156217de78bc14092ecd190bf5d5b9959e6850117fe6124dopenscap-engine-sce-devel-1.2.17-13.el7_9.x86_64.rpm3adb46260adf0b3729fb688454a01a951bef015104991962f74a481da3628919openscap-extra-probes-1.2.17-13.el7_9.x86_64.rpm3d8d218227e06c86640e9048c0727f9448126b03d50998f86968af7a7fba4e02openscap-devel-1.2.17-13.el7_9.i686.rpm6611815a691ea4ef9286b3dbe25ca75872e61dd1b821777aa27898bc7e926549openscap-python-1.2.17-13.el7_9.x86_64.rpm9eda95b4bf068a4dd42578893cec8d34023919dcc2d6d1e5f43e9ae2e04c3f3bopenscap-1.2.17-13.el7_9.x86_64.rpm0f431fc0de2d54d27ef73e8763305530fdafe7e75e8d14971ef6d6dd456740ecopenscap-engine-sce-1.2.17-13.el7_9.i686.rpm02a2970fe161c63ce93bba1e1800f38b3e7bf320f728029a7a08e948297071d7openscap-1.2.17-13.el7_9.i686.rpme172cb1bfb4d2cb42fdf435dbc33fce6ffb9db9419388628508591f6d41530f3SLBA-2020:5027-1Selinux-Policy Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * [SL-7.9]- Selinux policy need to be updated for RHGS to fix permission issues * Selinux prevents nss from creating directory inside the certs directory.Scientific LinuxScientific Linux 7selinux-policy-devel-3.13.1-268.el7_9.2.noarch.rpmbf544dffd42e2c80a47b65fbfb4490df371130b42ec4467e85b20839b3ffb0d0selinux-policy-doc-3.13.1-268.el7_9.2.noarch.rpmff9576077bc32507c027488b37dc29449d1687a5859e8c9dd6183804f2f65cd8selinux-policy-minimum-3.13.1-268.el7_9.2.noarch.rpm4c4425d26098ce827f3d90fb9055b74ad86caaf510c5786578f15f3e97a9ad42selinux-policy-sandbox-3.13.1-268.el7_9.2.noarch.rpmd30d91abee991346cbe1e380d0ec23b629bfe2e39cdaf821f892963542506751selinux-policy-mls-3.13.1-268.el7_9.2.noarch.rpma7e1b16a3019fe3300dafdd834094cc64b70668c4afb1e2a448a5afe3774a0b2selinux-policy-targeted-3.13.1-268.el7_9.2.noarch.rpmb55b489fad47589263e056c0967fb2386b7504d965aff36c7beb7a936e3cb5e7selinux-policy-3.13.1-268.el7_9.2.noarch.rpm57914f4194867a8f2455b8d04689c9b5b7f83402a400a1ec5183b01ff64d8533SLBA-2020:5032-1Python-Blivet Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * Not closing the fd if blivet fails to read the deviceScientific LinuxScientific Linux 7python-blivet-0.61.15.76-1.el7_9.noarch.rpm4ae70a3b7c5aa57c7c8b891f6d4cd92afd4f8e708e75955cbc5e3414fabcc366SLBA-2020:5451-1Scap-Security-Guide Bug Fix And Enhancement UpdateBug Fix(es) and Enhancement(s): * The "DISA STIG for Scientific Linux 7" profile in the SCAP Security Guide has been updated to the latest version V3R1. This update adds more coverage and fixes reference problems. The profile is now also more stable and better aligns with the SL7 STIG benchmark provided by the Defense Information Systems Agency (DISA). You should use only the current version of this profile because the older versions of this profile are no longer valid. The OVAL checks for several rules have changed, and scans using the V3R1 version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide. WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first. The following rules have been changed: CCE-80224-9:: The default value of this SSHD configuration has changed from "delayed" to "yes". You must now provide a value according to recommendations. Check the rule description for information about fixing this problem or run the remediation to fix it automatically. CCE-80393-2:: xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon CCE-80394-0:: xccdf_org.ssgproject.content_rule_audit_rules_execution_restorecon CCE-80391-6:: xccdf_org.ssgproject.content_rule_audit_rules_execution_semanage CCE-80660-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setfiles CCE-80392-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setsebool CCE-82362-5:: xccdf_org.ssgproject.content_rule_audit_rules_execution_seunshare CCE-80398-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage CCE-80404-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh CCE-80410-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_crontab CCE-80397-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd CCE-80403-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp CCE-80411-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_pam_timestamp_check CCE-27437-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands CCE-80395-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd CCE-80406-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postdrop CCE-80407-0:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_postqueue CCE-80408-8:: xccdf_org.ssgproject.content_rule_audit_rule s_privileged_commands_ssh_keysign CCE-80402-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit CCE-80401-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo CCE-80400-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su CCE-80405-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_umount CCE-80396-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_unix_chkpwd CCE-80399-9:: xccdf_org.ssgproject.content_rule_audit_ru les_privileged_commands_userhelperScientific LinuxScientific Linux 7scap-security-guide-doc-0.1.52-2.sl7_9.noarch.rpma76226596f9cf1af0cf1fb7a48a9bd48b064fb4ea543aa8bf5672aad2b08c5bcscap-security-guide-0.1.52-2.sl7_9.noarch.rpmc3f704db0ab1790e4b3b80c95b321134d3fd4bef2ad363890a0892ff8f12a9d2SLBA-2021:0013-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated to version 2020f, which addresses recent time zone changes. Notably: * Europe/Volgograd will change from UTC+04 to UTC+03 on December 27, 2020.Scientific LinuxScientific Linux 7tzdata-2020f-1.el7.noarch.rpmc37375a99001e0ec3742ba21f8b5a51f2034945b5b7e54a211166c3e76ad451dtzdata-java-2020f-1.el7.noarch.rpm8539392e7e8de6c9aecd029b448821e59301400a279fd44b232bc6f76473cfccSLBA-2021:0276-1Tzdata Bug Fix And Enhancement UpdateThe tzdata packages have been updated to version 2021a, which addresses recent time zone changes. Notably: * South Sudan will change from UTC+03 to UTC+02 on February 1, 2021.Scientific LinuxScientific Linux 7tzdata-2021a-1.el7.noarch.rpme4e436444c61697321d0ce5167151f9c6997ad25cbb4f76b349d4096c59d127atzdata-java-2021a-1.el7.noarch.rpm665540ad82981076b64025f9f7818c8e13241edc37cc0917f95d810de3efdccdSLBA-2021:1383Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * [RFE] Add ANSSI-BP-028 to SSG (Minimal, Intermediary and Enhanced Levels) (BZ#1497415) * Remove deprecated follow argument from Ansible remediations (BZ#1890111) * Rules of type Service Disabled do not have clear description on which actions the user should take (BZ#1891435) * Latest RHEL7 STIG (V3R2) is not present in latest version of scap-security-guide. (BZ#1921643) Scientific Linux 7scap-security-guide-doc-0.1.54-3.sl7_9.noarch.rpm5a48575cc47a52dd21176c83682cf6d2b6e69970bd2f7569345a06e0ec89b86bscap-security-guide-0.1.54-3.sl7_9.noarch.rpm490f4f763d6c2bf415fa620bde6d30e05157b264820ed1e75c62f520297a507aSLBA-2021:2803Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * Update ANSSI-BP-028 High level profile (BZ#1955180) * Update rhel7 DISA STIG profile to v3r3 (BZ#1958789) * dconf_gnome_login_retries remediation results in error and breaks dconf configuration file (BZ#1967566) * Add STIG variant for GUI installations (BZ#1970131) Scientific Linux 7scap-security-guide-0.1.54-7.sl7_9.noarch.rpm8584a00307740e79f24152cf8b271df7208391b14b97be9e8822560e49e0deb5scap-security-guide-rule-playbooks-0.1.54-7.sl7_9.noarch.rpmed957b3e66f6be580be168f954918d6951e1a392d9adc7585299604e799b4825scap-security-guide-doc-0.1.54-7.sl7_9.noarch.rpm1fb811204dae05a886079d275760ae5ca800b6dd46b9bb4d384e1b2a99e676fbSLBA-2021:3326Gvfs Bug Fix And Enhancement UpdateGVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. Bug Fix(es) and Enhancement(s): * memory leak in gvfs-udisks2-volume-monitor (BZ#1944813) Scientific Linux 7gvfs-archive-1.36.2-5.el7_9.x86_64.rpm1aca23e2697140a6da45b00779021a5b231a22b372bcc3edab121535d926fb40gvfs-fuse-1.36.2-5.el7_9.x86_64.rpm0434109b9834c6c9f679d7458edd323cc168a42c0c326e32cdeecb44cef57ee0gvfs-gphoto2-1.36.2-5.el7_9.x86_64.rpm11560e5bbd54521ea0e6bca0318491d2b8673269f5d4fdc9c084e67c90273e47gvfs-afc-1.36.2-5.el7_9.x86_64.rpmafc98b4b4e1ac910f4abefffaf5cf30cb0b545709e78fa080fa79ba7f258ed33gvfs-tests-1.36.2-5.el7_9.x86_64.rpmc4f5fa9a22e86bec97bb0afd34278b0631e8c84d6dbcdb266469105fd0cca994gvfs-client-1.36.2-5.el7_9.i686.rpmae3ea04777b15e748e136d4348277956668010867cb6a6fdb656ff397497801egvfs-devel-1.36.2-5.el7_9.x86_64.rpm50886aff29128c7b0486408a3b5dd822e447fb844d03755370c2c5a151dcef9egvfs-goa-1.36.2-5.el7_9.x86_64.rpm8a74d5afc3a4679e176ccc0dd4ac8142f23d75065afef64ed61368b3fdb7f559gvfs-client-1.36.2-5.el7_9.x86_64.rpm9ea4e39482d284454fc7ff5b2256de153dd924e105c3400370510a1689922337gvfs-smb-1.36.2-5.el7_9.x86_64.rpm8d525cd93e3ea2a99271db99f09ad4d564cb9e886613805250d55be1ad9a936dgvfs-afp-1.36.2-5.el7_9.x86_64.rpm2b7bd38e06c8d0a25e04a78ebb8d92536aa223b8d39954f117dd48e4155bb4a2gvfs-mtp-1.36.2-5.el7_9.x86_64.rpm6b2a6a73ad2c7d30b771ba301e2652e2dde4f927f70f54bc64e7fe05f162633cgvfs-1.36.2-5.el7_9.x86_64.rpmdeda765e131121c287f623ddef5a409121c54a309045dfbc75169e2da558ffb1gvfs-1.36.2-5.el7_9.i686.rpm3f349a1203324c6f5455398298324f6820f42183960f4c215f9ea981b3dc0df2gvfs-devel-1.36.2-5.el7_9.i686.rpm7a4f19f435a83650765bc7d3568d477bf165fd943c5ec2d3b3db02a753181914SLBA-2021:3790Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2021c, which addresses recent time zone changes. Notably: * Samoa does not switch to the daylight saving time (DST) in 2021. (BZ#2007732, BZ#2007785, BZ#2008251, BZ#2010126, BZ#2010127, BZ#2010312) Scientific Linux 7tzdata-java-2021c-1.el7.noarch.rpmce1f65142b07a7c2f539e818e24356a5ababcfa788fe29d9410d9ebb9ea1080ctzdata-2021c-1.el7.noarch.rpm39eb52d8920c1d74883252f632751e5fee35f70add925cbee7199855ace9e2c9SLBA-2021:3793Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement UpdateNetwork Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Integrity protection is not active on all database fields (BZ#1879933) * NSS sometimes causes CURL deadlocks (BZ#1896808) * yum gets deadlocked/hung up (indefinitely) waiting for urlgrabber-ext-down (BZ#1909150) * Recursive locks observed in nss-3.53.1 (BZ#1909261) * Need to rebase to NSS 3.66 for Firefox 91 Release [RHEL 7.9] (BZ#1966816) * NSS cannot use SQL databases created by specific versions of NSS (BZ#1978433) * Inconsistent handling of malformed CertificateRequest messages [rhel-7.9z] (BZ#1980046) Scientific Linux 7nss-devel-3.67.0-3.el7_9.x86_64.rpm2c0f670ad48cb9ba882fdfeacdc869245ff97cb2320eb484022798efa965a473nss-devel-3.67.0-3.el7_9.i686.rpm87fd30874b2b8b6ea451e0478c5ab0f71c3357ac0524e5197f2d9171912b34d3nss-softokn-freebl-3.67.0-3.el7_9.x86_64.rpmab996e4b9cdc0e5c0495805a72d005f6bcf3e6c1b7c9f1df9c1c91b85e1ec57fnspr-devel-4.32.0-1.el7_9.i686.rpme36ace0b56dfefa947060cb4e2390383264e9d6a1c072b832cb55c35b11b8b94nss-softokn-devel-3.67.0-3.el7_9.x86_64.rpm7beddb7631518604b4e3cff8364e1ab5daff98ecae28da3b679247b241026a1cnss-util-devel-3.67.0-1.el7_9.i686.rpme2619a570f375cc27050a73e1be344665a8ec0cd78341148a74adfdbeb382b47nss-softokn-freebl-devel-3.67.0-3.el7_9.x86_64.rpm9bc2727ee996d4b8b416648ccbcc7aa3959454c3dadb7b35c6921ba4ddb73a0dnss-util-devel-3.67.0-1.el7_9.x86_64.rpm649f82efb3ff7a7b30bbb14bafad86e6003fe023b4de9813ed2525a61ee801fbnss-softokn-freebl-devel-3.67.0-3.el7_9.i686.rpme6ad52307f29b631f9c6bdb14fd5436628349a751beab2462a2b72bf55dee53bnss-util-3.67.0-1.el7_9.i686.rpmf9f20cb196069ff6fc17ded3d73b7631d948cfcfd718565148b7459eb0a3639cnss-tools-3.67.0-3.el7_9.x86_64.rpm82b5608db91380a02c78ba181395f8263fa772615f25d2dddf58193b096bac18nss-softokn-devel-3.67.0-3.el7_9.i686.rpmd1a9c51ad1cc93aa7cdef20cd6c93bf5d1da6ff3520ad02419b6f83b7cd54af2nss-3.67.0-3.el7_9.x86_64.rpmeda6cfbb071aab353de25677b3b0e107b5ad7e3f59951407bd45450effc0d453nss-sysinit-3.67.0-3.el7_9.x86_64.rpm02f8ef2ecaa45b41bbb4ac0debc3d8cddf92bd8f4c975dc8d01b3074f1c83003nss-softokn-freebl-3.67.0-3.el7_9.i686.rpm1d42d82366258ade1c349216ae1f9b90526982e2e2961cec7657a2114e1a5426nss-softokn-3.67.0-3.el7_9.x86_64.rpmf71e7ed72ba31abcb53eb5f0c3203e03eaafe5d7f248cd8abbf9603288dedebdnss-pkcs11-devel-3.67.0-3.el7_9.x86_64.rpm298b690f8d2735e8fe7b477ecd2defaab30edfd913e692635636320c4201f4d4nspr-4.32.0-1.el7_9.i686.rpm58b6fb3d52922d32614c80d2e4376e4bfa7cdd632cf8529cbae89ec994874dc9nss-3.67.0-3.el7_9.i686.rpm237b8d5deabaeee02c7336476b9136567cbd8f5234849d5672d36f4e98f3e894nspr-devel-4.32.0-1.el7_9.x86_64.rpm6489403e07ebd577f870a4568713fbbbb883e5a59a7d8ffe4635d32a84e02ec3nss-util-3.67.0-1.el7_9.x86_64.rpm7eafc5254ebcce4f3ed8e5a99677e1a6c714789347e30e1a288b47fac43cbf5enss-softokn-3.67.0-3.el7_9.i686.rpmec1f4772a2e82eaaf1e00b556efdf57a3d602819fb2ed1fe813d72cbe3895f71nss-pkcs11-devel-3.67.0-3.el7_9.i686.rpm6da92c396cd6ce357ecfb3faf406ee21f61118003201c1c15997a242b4425999nspr-4.32.0-1.el7_9.x86_64.rpm8f352f7a82a458922db56d82dc8d63d1b6e66069cf73a7f4a56e790945c58bd0SLBA-2021:3800Ipa Bug Fix And Enhancement UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Bug Fix(es) and Enhancement(s): * extdom: LDAP_INVALID_SYNTAX returned instead of LDAP_NO_SUCH_OBJECT (BZ#2000261) Scientific Linux 7python2-ipaserver-4.6.8-5.sl7_9.9.noarch.rpm41e0b47432858828cc2106f9874b762fdb184614a04f4726a4236dc8fa4dd7aaipa-client-4.6.8-5.sl7_9.9.x86_64.rpmef17cc21eec485fbe0692bc7a7590be3248479273a74a5545c4c59ac43483971python2-ipaclient-4.6.8-5.sl7_9.9.noarch.rpma0c91e360b47fb9f3c9642044c349d3b6985bde9261712151d1e2c37705c5bcdipa-server-trust-ad-4.6.8-5.sl7_9.9.x86_64.rpm95cad1c2465c7cd71b6931c1e54f48dab469d3bd75a26743d3edddadaa08c6efpython2-ipalib-4.6.8-5.sl7_9.9.noarch.rpm84d4c7cf560d79075edc1a42b6c9ddc5fa12d371ccf80d15f662efd1d209fd4cipa-python-compat-4.6.8-5.sl7_9.9.noarch.rpme4e7127bb63d889f2044cd811cff7a8d141a6f20110f919ca2332852b4e3a301ipa-server-4.6.8-5.sl7_9.9.x86_64.rpm62d0456d32a15daea2e8aed6b63d3fe97c75f82f5f11465be5331e7d25765316ipa-server-common-4.6.8-5.sl7_9.9.noarch.rpm67bc072b25687f470b5ff797415ec5e7cc911d1d31cded229a95d80450c34015ipa-client-common-4.6.8-5.sl7_9.9.noarch.rpm80f987c27a87872d59c18c0b4d98af6629791fab56c1e5c97d36a7944bb8a069ipa-common-4.6.8-5.sl7_9.9.noarch.rpmda28eee5f08704830533dcbfbe02070114d97443c679e331e87133a799f511f4ipa-server-dns-4.6.8-5.sl7_9.9.noarch.rpm6a032b03a786c53d33b95aa6f53af6c35d69b76cb6a1d25ff429b638c357b431SLBA-2021:3804Pki-Core Bug Fix And Enhancement UpdateThe Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System. Bug Fix: * ipa: ERROR: Request failed with status 500: Non-2xx response from CA REST API: 500 (BZ#1958788) Scientific Linux 7pki-ca-10.5.18-17.el7_9.noarch.rpmf13c8a17bd7ad06b0ff1a7f99c4d952ce8c3d27a8439ba4b821557a3246286d7pki-javadoc-10.5.18-17.el7_9.noarch.rpm9fb683639d340b9802f01086cdb14ef026bbb4f243f14240b5b1dc4ca5fbf903pki-tools-10.5.18-17.el7_9.x86_64.rpm3761340e411df2efeb62821c5fb549f3d0ca5765d3a67dc7dbdcc874cfdc96fapki-server-10.5.18-17.el7_9.noarch.rpm3e0bc224483605ed81901ddbbaf0ab507896add15347603bdc55710f5c9714edpki-symkey-10.5.18-17.el7_9.x86_64.rpmcfad3f2a0cba4a572bfa4ed7cb7de3336c7e25dd6a44237a7c12e1e2c862445epki-base-10.5.18-17.el7_9.noarch.rpm9a69fd8ca9191ce9765dca7e90ac0d7676e0457eb56f3bbf662f528aff23200apki-base-java-10.5.18-17.el7_9.noarch.rpm293585ab40dfbecb575e73bd5834c00225d9b0168c02aad8d9852451198debccpki-kra-10.5.18-17.el7_9.noarch.rpma53dd9436b90bdfca04f79ee43c97898bcfe380022b4edfe07745b6933ecf1b4SLBA-2021:4003Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2021e, which addresses recent time zone changes. Notably: * The Pacific/Fiji timezone has suspended daylight saving time (DST) for the 2021/2022 season. * The 'zic -r' command now marks unspecified timestamps with "-00". * Palestine will end daylight saving time (DST) on October 29, 2021 at 01:00, rather than the predicted October 30, 2021. (BZ#2015242, BZ#2015246, BZ#2016369) Scientific Linux 7tzdata-java-2021e-1.el7.noarch.rpm9d885a3f4ea1b9ee78acda35303ce6d7ddc39c5414ff955017dabaa410d9b371tzdata-2021e-1.el7.noarch.rpm502a8d632f40de778a2c065bd63517e81f6afd7354c9188b9872859877f35a34SLBA-2021:4780Openscap Bug Fix And Enhancement UpdateThe OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * Report shows "pass" while command output shows "fail" items (BZ#1858502) * Memory leaks in probe_file (BZ#1861793) * oscap dies with segfault when using --stig-viewer option and latest XML file from DoD (BZ#1911999) * probe_file consumes all the RAM of the system (128GB) (BZ#1932833) * Ansible playbooks for profiles have duplicate variable definitions (BZ#1944683) Scientific Linux 7openscap-utils-1.2.17-14.el7_9.x86_64.rpm3d799ea31e47c7922e5cfe2fbbf4686e570d0a127189ea8e806604ffb3a74298openscap-1.2.17-14.el7_9.i686.rpmbc4661a363dab8a8c703267149be0e9218834cec03de3c7b9243f2de476c8afbopenscap-engine-sce-1.2.17-14.el7_9.i686.rpm1bc26a17f1599a69c7104b9a7f02b833edbb7a3d9efe3b62e439813a1f4b39c7openscap-1.2.17-14.el7_9.x86_64.rpmbd74786e781b5514f67db81b5a657b47b2c804fb640fb1dc6481d3d1692c383eopenscap-devel-1.2.17-14.el7_9.i686.rpm1a127768c1bd492614f5bdbd5318f52cf7eafedfcdd910557915a00bcaf45a29openscap-engine-sce-devel-1.2.17-14.el7_9.i686.rpma17c9d9cc19b0a06f3d8ea7164f329b2c113e6a9ffd91a4386568ee3a6818e6fopenscap-scanner-1.2.17-14.el7_9.x86_64.rpm37f640cc29d3c6e8915c6041e8d9b4df67db84e701148845bc09bddb2f9bce79openscap-devel-1.2.17-14.el7_9.x86_64.rpm7094e2f5a6e417455d4bc02eb74f68e4b91b5239492dfd64fb32162c0c5b4f8eopenscap-python-1.2.17-14.el7_9.x86_64.rpmf405937b54e1ebb9762fcc33aa9f922e79a92c243bf92fbf46955187a02eb93fopenscap-engine-sce-devel-1.2.17-14.el7_9.x86_64.rpm4ce5595b4468787dc8e5ab4b62438002307e760a34f8e8241ba2122a68a3166fopenscap-engine-sce-1.2.17-14.el7_9.x86_64.rpm3a0a404fa4b80b779631cfeab831338037a2a4f23652bf1cbd92d28b96fb6951openscap-extra-probes-1.2.17-14.el7_9.x86_64.rpm90c44cabcea4e43996ec4a90e757d7a294f2b0b5fc5b4a1604ef1b3ad1fc0cbaopenscap-containers-1.2.17-14.el7_9.noarch.rpm78fa0b4b21a1a3642d66229f016c2db3e7dd37fa25972a201d264a4689c8d479SLBA-2021:4781Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * xccdf_org.ssgproject.content_rule_package_MFEhiplsm_installed does not properly check for SELinux (BZ#1944297) * Insights does not use latest benchmark for CIS compliance (BZ#1953787) * Ansible remediations of 3 dconf_gnome related rules don't work properly (BZ#1976123) * Update rhel7 DISA STIG profile to v3r5 (BZ#1996678) Scientific Linux 7scap-security-guide-0.1.57-4.sl7_9.noarch.rpm34b51c5bc4b0fdcb126de54e516c912ae49536a750759fa5eb10b185df31f716scap-security-guide-rule-playbooks-0.1.57-4.sl7_9.noarch.rpmf9f68aa9f3fb47b03571e50bacf7d612945de926bf71212d965d2de3a973bb7escap-security-guide-doc-0.1.57-4.sl7_9.noarch.rpmb7c847545012d13dfdffe57a3189942a91879a02fae26daf176ef346382ee2f9SLBA-2022:0156Openssl Bug Fix UpdateOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Bug Fix(es): * httpd fails to start with double free after updating to openssl-1.0.2k-23.el7_9 (BZ#2039993) Scientific Linux 7openssl-perl-1.0.2k-24.el7_9.x86_64.rpmd1aebf2a5bc3c316d2c83ac2356bda30edc90f0bcfea12880457f2253793ac2aopenssl-static-1.0.2k-24.el7_9.i686.rpm802945ef14687804c65a5ab6575c29d1283ece79cda956a1404b811ae8edd1daopenssl-devel-1.0.2k-24.el7_9.x86_64.rpm39dc3f28c58da872fb5cfe9b993755e4b9e8e2d524d5a7c1b9707b59833830a7openssl-devel-1.0.2k-24.el7_9.i686.rpm74bacb9457163a747581bf48c74b83077f3522b3ac5b9d5bc6bdf70f29903ea7openssl-static-1.0.2k-24.el7_9.x86_64.rpm7c9b4e1adb114e8aa1863aadfe9def96e5c024e2a2b1384e35db36f8c9bfcd27openssl-libs-1.0.2k-24.el7_9.i686.rpm46836801d59aeab63ec927592fc2441705d340b49b08e6f3d6c5727a457537a5openssl-1.0.2k-24.el7_9.x86_64.rpmb2ab8b852aade7509bb4b1b3653143efdecc58c50fd9abeb3b0cb9893332fcdeopenssl-libs-1.0.2k-24.el7_9.x86_64.rpm1082492dc5c94ea8089e3109cadc6719b4dc557ce6588c4e890a2331a583c660SLBA-2022:0701Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * Update RHEL7 DISA STIG profile to V3R6 (BZ#2049532) Scientific Linux 7scap-security-guide-rule-playbooks-0.1.57-6.sl7_9.noarch.rpm6cfae01e405036fc6c9bc1dad1f1b2af3cf0b0d0a3527f39a267908754069cf7scap-security-guide-doc-0.1.57-6.sl7_9.noarch.rpm3ccacefd6ea02017cec03049ebeab09181953aed25356068f40ca92f92fb8531scap-security-guide-0.1.57-6.sl7_9.noarch.rpm4df0bc8bcdcc1bea9da053779deef090e5f179f6b302c0d6d54efdef352b3a69SLBA-2022:1032Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022a, which addresses recent time zone changes. Notably: * In Palestine the daylight saving time (DST) starts on March 27, 2022, not on March 26. * The zdump -v command now outputs better failure information. * This update provides fixes for a code that read corrupted TZif data. Scientific Linux 7tzdata-2022a-1.el7.noarch.rpm2bd81e7c3b4b394094d0ff8d122a291ca35556608f8141093ea7aaac2b16c70etzdata-java-2022a-1.el7.noarch.rpm151cfed56b482c8d1befbb66f69fe3839eee9334e1c283fbb3f6d3da36531141SLBA-2022:4647Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * McAfee packages not detected properly by the RHEL7 rules (BZ#2066321) * Update RHEL7 DISA STIG profile to V3R7 (BZ#2079217) Scientific Linux 7scap-security-guide-doc-0.1.57-8.sl7_9.noarch.rpm408202f740301c34e37133d0bba9c8c79e27ea0366a76dfedd262f2bc63d5cebscap-security-guide-0.1.57-8.sl7_9.noarch.rpm208aebc50b47c17f0d0a4753624c24b0fd4ed743c6fac58bcd0d48ce3ab528fdscap-security-guide-rule-playbooks-0.1.57-8.sl7_9.noarch.rpma7d8dfb326f66727f85327ebe37848008a74d7f20797a6ece46466ad90686083SLBA-2022:6138Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022c, which addresses recent time zone changes. Notably: * In Chile (the America/Santiago time zone), the daylight saving time (DST) starts on September 11, 2022 instead of September 4. Scientific Linux 7tzdata-2022c-1.el7.noarch.rpm2526692b84bdac51c09de6cee75a9740d154f258e3f1ad4e7c7539b537c5a510tzdata-java-2022c-1.el7.noarch.rpmdb8d6f0b1278aa4cdec8aa873f85d6fc25e37b02c372b78b01922680ef29c6f9SLBA-2022:6572Ca-Certificates Bug Fix And Enhancement UpdateThe ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Annual 2022 ca-certificates update version 2.54 from NSS 3.79 for Firefox 103 (BZ#2099892) * ca-certificates need to add support for signing certs for .NET (BZ#2117796) Scientific Linux 7ca-certificates-2022.2.54-74.el7_9.noarch.rpmd7edb786d191c4fefcb03be72b64bef01cb89aac2e81f77f386986058ba9d30dSLBA-2022:6576Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * Align RHEL 7 STIG profile with DISA STIG Benchmark (BZ#1967950) * content_rule_audit_basic_configuration enforces using default buffer size (8192) for audit, which isn't always suitable on busy systems (BZ#1993822) * Rule file_permissions_sshd_private_key fails after kickstart installation (BZ#2021258) * Update source of CVE data in data stream (BZ#2028432) * Remove PCI-DSS-centric XCCDF Benchmark from scap-security-guide (BZ#2038165) * Update RHEL7 DISA STIG profile to V3R8 (BZ#2112939) * Rebase scap-security-guide in Red Hat Enterprise Linux 7.9 to latest upstream version (BZ#2116359) Scientific Linux 7scap-security-guide-rule-playbooks-0.1.63-1.sl7_9.noarch.rpmf52637667eb5a2187f932a8a5a05586283f500d28d628501fcd653d4d25edec8scap-security-guide-doc-0.1.63-1.sl7_9.noarch.rpm94a85061d97a42f352b1f371ac22a05bec5536c421266a08e6361b5360d91890scap-security-guide-0.1.63-1.sl7_9.noarch.rpmdac6ee364834b698e57df24a4eccb73de0db2fe69172681f54532edaf4bfa706SLBA-2022:6577Samba Bug Fix UpdateSamba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * Fix possible crash bug in winbind (BZ#2119058) Scientific Linux 7samba-client-libs-4.10.16-20.el7_9.x86_64.rpmcacc282e68d55a8a4df7bdd1d389e5c33ff3eefde6ab7fa892c56f1a03c6d7f8samba-common-libs-4.10.16-20.el7_9.x86_64.rpm2a22d8bf7e49ace37c1836bb6dffc293100d603845800a5a7a00a8934d7307cdctdb-tests-4.10.16-20.el7_9.x86_64.rpmf8d3f5de5d78d57c24f877ab16955ba73987426e386f8ba993cd7c9bc7a3792asamba-pidl-4.10.16-20.el7_9.noarch.rpm09893b38eca1472f8d54d6ae51d1880e4fd68e7a4271cb71d3ae92e73e68ca8fsamba-4.10.16-20.el7_9.x86_64.rpm7ac313df927797c05b41436e42e604cbd43161be21fd68cdd96d0ecae30d9acflibwbclient-4.10.16-20.el7_9.x86_64.rpmc5d60bee506bcb302ece1a17611f829ba892e4220d5c8f9c060ff74fc230eb38samba-dc-4.10.16-20.el7_9.x86_64.rpmcec3a3e3bf74d55202d85ffb3be0f8c2456381013381e66067f6375101a942ebsamba-common-4.10.16-20.el7_9.noarch.rpm44a6459695c6006ad82c374924f9f42f0666af0ffb5ce60c07c6f4ae970bce53samba-winbind-modules-4.10.16-20.el7_9.i686.rpmdf8572b335939df919a32ef8bff3ca1b55651cc8fe2ea023eac2ca4fde67fa00samba-client-4.10.16-20.el7_9.x86_64.rpmabb13fc44bf00e6e8e05a15171a49ad22adf187e18a32c41ec75fa7f9b2048a3samba-client-libs-4.10.16-20.el7_9.i686.rpm735fb48a6b667643771efd8f4082fde5fee9571925e0b6ba0364f444c094a479samba-python-test-4.10.16-20.el7_9.x86_64.rpm84c7a9f5130dd17ef7829c5028c94134cebca4eae40d69d47f2fce2381b58eeblibwbclient-4.10.16-20.el7_9.i686.rpm19466f49d3d87d055974d9b450b0bfacca1de8a5d7e4a247488f52f48433fb8clibsmbclient-devel-4.10.16-20.el7_9.i686.rpm661414a845a083cac5b3e441a3b4d217b7f90ad66360c013ea11b525fc51d75asamba-winbind-modules-4.10.16-20.el7_9.x86_64.rpm15d8c7f0ed898c85e546550b168b365f6cf730c57f9b9986da2a1a4c29d1eff7libsmbclient-4.10.16-20.el7_9.i686.rpm6f8ce0108a5f7d6346ac6a2aff0a646978840494f6b4a74da36da7fded21c4dblibwbclient-devel-4.10.16-20.el7_9.x86_64.rpmc6e8739d3f7024b2c898c6b7d8ea9e580c0122bc467430c5ea453821822c6bfblibsmbclient-4.10.16-20.el7_9.x86_64.rpmdc1a9465eb7fb4114846196fe2e5c3d33fbc3975f899338b00ca89592e825e26samba-devel-4.10.16-20.el7_9.i686.rpm7a6b86056ceb34ad19d83caefe29f0ba504db426f62aaf5d4da89ec59db0268asamba-libs-4.10.16-20.el7_9.i686.rpm4dd2497954144c5af89e132a94c2108670d0a4c11ca680e0cabe76d4e7502333samba-vfs-glusterfs-4.10.16-20.el7_9.x86_64.rpmf397cc045c0190a87e463e87f86ae18a178e1aae0b5f60c2694a7751c84d3daflibsmbclient-devel-4.10.16-20.el7_9.x86_64.rpm3660a1bebf97db29376d4bbc2c74e9e146d91dc0f9255c9f59f9bec430ba0447samba-winbind-clients-4.10.16-20.el7_9.x86_64.rpm255996be29ce489ef14234d31a7f1bb4db363760379ad326b76900222d95030asamba-winbind-4.10.16-20.el7_9.x86_64.rpm0633bba0bdbe5435adc07edbb268e2961ea1c47533d4926264ed5861f3561ab4samba-test-4.10.16-20.el7_9.x86_64.rpma94585adfd140fc3d138f715ad7c9953a047cd8e750af9ceecd08293f1f375e4ctdb-4.10.16-20.el7_9.x86_64.rpm46a9e0c3831feec611855045a6424b31e7fd60804974f249b613de9fe2ced97dsamba-krb5-printing-4.10.16-20.el7_9.x86_64.rpm0b38802866912cf2a4cbea96ffa954393582a6de922bb2554ed16975926eec76samba-libs-4.10.16-20.el7_9.x86_64.rpm5a8440321cd0edde5dcd44d28dfe703e734447b3f2af301b009ffe3f85c6fb9dsamba-common-tools-4.10.16-20.el7_9.x86_64.rpm61a4a9c9929462af1d399b9fbf7974f91a67bf8506124f29447d9931c38ccb84samba-python-4.10.16-20.el7_9.x86_64.rpmf3139f49bed0ef0301fc615f023d797cd653216f38a551e6f6e4fa9e4b4d6398samba-winbind-krb5-locator-4.10.16-20.el7_9.x86_64.rpm1f076b7c3d04cd7a81c3b287f238b6daf628b3adb75ec1813de275a73e4badacsamba-common-libs-4.10.16-20.el7_9.i686.rpm9dbfa5fd8bb1eb6ed8b84dcd57cd0b1b71c7e20ff7f7ecd44b3b4a6f3866cfdesamba-dc-libs-4.10.16-20.el7_9.x86_64.rpmf5d8689b8fc2b40e39898be7390a5f496ed7f04cd4a2035e0456bb06344a9475samba-test-libs-4.10.16-20.el7_9.i686.rpm91e0191180ab976e905b15cf945888f31ae2a79a3e211d42d366cd23408c416alibwbclient-devel-4.10.16-20.el7_9.i686.rpm6db2d2f59f78e800c9e2e03c678771f064d1afb70b8fe9cf27edc47b94f119e0samba-test-libs-4.10.16-20.el7_9.x86_64.rpmf42aef1f809c15b39b535bd178d6a76df4068d9e4f3cc1ca9f299d6a7d36f482samba-python-4.10.16-20.el7_9.i686.rpm0f6fde71a4536f44b6dc4f43b3733a167fa2a745296da54bf854a7e5565968e2samba-devel-4.10.16-20.el7_9.x86_64.rpm7e9a75e73ebe7cea8c107131cdd29cc9dc10563c3643388bc6e049002516abefSLBA-2022:6712Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement UpdateNetwork Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. The nss-softokn package provides the Network Security Services Softoken Cryptographic Module. The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Bug Fix(es) and Enhancement(s): * Import of PKCS#12 files with Camellia encryption is not supported (BZ#1462297) * Rebase nss to 3.79 for Firefox 103 ESR (BZ#2064364) * NSS sometimes causes hang for customer application (BZ#2066679) * Rebase nss-util to 3.79 for Firefox 103 ESR (BZ#2093506) * Rebase nss-softokn to 3.79 for Firefox 103 ESR (BZ#2093507) * Rebase nspr to 3.79 for Firefox 103 ESR (BZ#2093508) * update-ca-trust fails with /usr/bin/p11-kit extract calls getting aborted (BZ#2096268) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097811) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (nss) (BZ#2097842) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (nspr) (BZ#2097904) * curl segfaults (BZ#2103706) Scientific Linux 7nss-sysinit-3.79.0-4.el7_9.x86_64.rpm717eea39d2aa9e9184975eeed842014f45b14c444f53f59de786621ab7ed2734nss-softokn-devel-3.79.0-4.el7_9.i686.rpm5476523c29380f539332b29dc5309a868c2ff52a91096115d6028f6137883294nspr-4.34.0-3.1.el7_9.i686.rpm7dbdc6ee9f0f8f77fb4b7bcd7ac52016207b3edab103060b5d61050a9c3570d2nss-softokn-freebl-3.79.0-4.el7_9.i686.rpma353095c518f10d49c7e80ea897ad387b21e25854313d534075b7b5f2f6465d2nss-3.79.0-4.el7_9.x86_64.rpm13b925723c08f99571a2097f97ee70a74fda215aee270a4c8e620242d73ee852nss-util-3.79.0-1.el7_9.i686.rpm8d197cc06e73cbe55bfd20060eacc65685601555f77dc85568f5bb490e83fe3anss-softokn-devel-3.79.0-4.el7_9.x86_64.rpm2ca839847c5550bc4f5ddf11e3535fa8e46b0943ac3a65f9b89ca157da090d26nss-softokn-3.79.0-4.el7_9.x86_64.rpm167f0a4aeb1c09264bb4ef61f7a6c59de588e06a08195ab7b3e67e52aa2cd101nspr-devel-4.34.0-3.1.el7_9.i686.rpm5402ff5f1241395f94fb3e604641b0b68ca43d1d61a08cf7f806e075df949132nspr-devel-4.34.0-3.1.el7_9.x86_64.rpm55e256f8ae60657b3a61612b1991bb4981554b794c75335970a7cb2595f4b6c1nss-util-3.79.0-1.el7_9.x86_64.rpm3142083148f43ab008bce4419a7289209620b024ee7091fa8a9d73a379f56451nss-util-devel-3.79.0-1.el7_9.x86_64.rpm6dcaeaf3e23cd6e103685d1ec84ff38d94c89e7d600bd14b87211b7390f2e222nss-tools-3.79.0-4.el7_9.x86_64.rpm1713aec9855779538668e46177c7e738d0a0892ac2078dd0c538cf154cbb3b3dnss-devel-3.79.0-4.el7_9.x86_64.rpm63584668c447eb2c6b01095d7f6aba35b6a09dac00efaee4964d5c9f0fcfe0ednss-pkcs11-devel-3.79.0-4.el7_9.x86_64.rpm9b0f709efaf08e35bb9eac6973c3d433a4b011a42b860954588e1599105d1d41nss-devel-3.79.0-4.el7_9.i686.rpm590e47b59ca6cd7241939955196bf27599dde733c01a0fc20a52c5b4861206f1nss-softokn-3.79.0-4.el7_9.i686.rpm72187c2f765bb749d6088a6446d14bbd7ba12da8774af35b2deb35d35b2abae8nss-pkcs11-devel-3.79.0-4.el7_9.i686.rpm1c83452ff7cc28a33974a11b8e12dea9218f1fd01f632307b37241a6ddf60e12nss-util-devel-3.79.0-1.el7_9.i686.rpmfff77c933cf38500888db2bf93fc4340097877874490438b3418897cc0937cb5nss-softokn-freebl-devel-3.79.0-4.el7_9.x86_64.rpmdb7bbda5be560f602b5594716e7b92829d1f1c41bd9b428eb44f00a44559b9ecnspr-4.34.0-3.1.el7_9.x86_64.rpm48b4e6653da1eb4229713d7c9241bc50f81a9d67f2a7e2e14e94d24251b331e0nss-softokn-freebl-3.79.0-4.el7_9.x86_64.rpmc911e5c946a25f1b2a978735330881ecfafd5b1f7f805b1584c866aaa076046bnss-3.79.0-4.el7_9.i686.rpmee4b3aed756beb4b69e7cf12635c63492af12edb727fc74b29f0f2ef39291190nss-softokn-freebl-devel-3.79.0-4.el7_9.i686.rpm561cba4e0ccb895de95856af3ce838de7cfabafcf6db99c36e4d74f2b4243173SLBA-2022:6827Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022d, which addresses recent time zone changes. Notably: * Palestine will transition to daylight saving time (DST) on October 29, 2022 instead of October 28, 2022. * Europe/Uzhgorod and Europe/Zaporozhye are moved to the 'backzone' file. Scientific Linux 7tzdata-2022d-1.el7.noarch.rpme29657e0ab4a9adfc968a48499f95dabe2c9b1b55b91307237bd9ef79589f1d5tzdata-java-2022d-1.el7.noarch.rpmaa8c2791f3c77330bdde1873e5dc9aa039495379b9e49c9bd539636e1453cc3dSLBA-2022:7067Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022e, which addresses recent time zone changes. Notably: * Jordan and Syria cancelled the daylight saving time (DST) transition planned for October 28 2022 and will remain at time offset of +03:00 from the coordinated universal time (UTC) permanently. Scientific Linux 7tzdata-2022e-1.el7.noarch.rpmbb921010ac58172a3a2ded25bde14eeb0b515ba6faef765dea2efb1e10e7256dtzdata-java-2022e-1.el7.noarch.rpmf964a856c27ee43d19659d570924fc1cfe1104b018c8e052165488217e60b08dSLBA-2022:7404Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). Scientific Linux 7tzdata-java-2022f-1.el7.noarch.rpm419a66f43a09d2d55dad85fe19134693e98ea63126303accf356fbe0d2cb977etzdata-2022f-1.el7.noarch.rpm2f62960f7056adb2aa0c6f6aa3da568a6588baae81dc6de89e438d64258c0078SLBA-2022:8785Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. Scientific Linux 7tzdata-java-2022g-1.el7.noarch.rpm68f3b82080120841f4ad82d719ee4570f9fa63177d69fde1ba0aa173448abcf2tzdata-2022g-1.el7.noarch.rpmbb123b23987cd20416556db907bd9564418cfa6e78e9ed20f3a719a4eadc32a7SLBA-2023:1094Openscap Bug Fix And Enhancement UpdateThe OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities. Bug Fix(es) and Enhancement(s): * Potential invalid scan results in OpenSCAP. (BZ#2111041) Scientific Linux 7openscap-engine-sce-devel-1.2.17-15.el7_9.i686.rpmda53f46a4c67f90b223ab07a1f586c1eba98630e728315fc0f32a28834c7c960openscap-engine-sce-1.2.17-15.el7_9.x86_64.rpm9eaffc2d4b0b1066f9fd6c24e4d8e060ead83958d736cc3079b4ed8ede000bbdopenscap-devel-1.2.17-15.el7_9.x86_64.rpmb51ca8653da9180796ccb42b29054f561c6e56bc9c4d0b56d9a4d7d36006399bopenscap-scanner-1.2.17-15.el7_9.x86_64.rpmf0261e7d1cfa92d6fe9e9abd07b22a07067312cdf0390f6a4b4240ed6e6e9545openscap-containers-1.2.17-15.el7_9.noarch.rpm501eb0d76ddd27ce2d3915947213e39cea80ebe499dc423ab3b590fcd88606b2openscap-engine-sce-devel-1.2.17-15.el7_9.x86_64.rpm2d1d4ce394f8c1b0afc66d49d335f168cab5bbd3f96425edf8698f5e2aa0de9bopenscap-python-1.2.17-15.el7_9.x86_64.rpma7d7997bc2aa8a38b5eb3b000c0b4fa96150a9658f55c84651cd6127f2bcc37fopenscap-extra-probes-1.2.17-15.el7_9.x86_64.rpm204a8cba807ba67c41efda5b48f0a2d2e7e0ff5a15688e3cbd3ad2e687735fa7openscap-utils-1.2.17-15.el7_9.x86_64.rpmdc2c0db93642b89ee53df753654d9314ae61eaeaf111f35c2d43780482928c45openscap-1.2.17-15.el7_9.x86_64.rpmc7927ed6542837c5713897ed63c49d7bbdc10e4b4713ae7a018d41c1f55d847fopenscap-engine-sce-1.2.17-15.el7_9.i686.rpm799ee42a178599fb8fabccbcb8d18289129dcd4654b8de0445f1d033046f9931openscap-1.2.17-15.el7_9.i686.rpmcfc2f5c78d541ba22f88885b732a1b652d64d330709a388aa72647fb622cb13bopenscap-devel-1.2.17-15.el7_9.i686.rpm2af9e67de95817b3a9afba1fde15e4e09e71ba5d8356417d8753ec55bd66b846SLBA-2023:1099Scap-Security-Guide Bug Fix And Enhancement UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es) and Enhancement(s): * file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2123284) * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2123367) * Update RHEL7 DISA STIG profile to V3R10 (BZ#2152657) * Rebase SSG to latest upstream version in RHEL 7.9 (BZ#2158410) * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2170038) Scientific Linux 7scap-security-guide-rule-playbooks-0.1.66-1.sl7_9.noarch.rpm8c896e9b2af0229b23afe8b3b521d6edecf8f758349df435ed63be14bb9a19c5scap-security-guide-0.1.66-1.sl7_9.noarch.rpm51c20f7783a416005f490dd4757723c285cbc4574923a141e6549a56996d089cscap-security-guide-doc-0.1.66-1.sl7_9.noarch.rpmc77812f9eba2fa7464fd7744d0cd653deb1014d23ec906498f320863a2c2121bSLBA-2023:1491Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023b, which addresses recent time zone changes. Notably: * Egypt will reintroduce daylight saving time (DST) from April through October. * Morocco will observe DST from April 23, 2023 instead of April 30. * This year, Palestine is delaying the start of DST. * This year, Lebanon is delaying the start of DST until April 20. Scientific Linux 7tzdata-2023b-1.el7.noarch.rpma6eecba20da600ff330d091e2cf2a518e167cb6a256bb05c7c460e3e52e0b380tzdata-java-2023b-1.el7.noarch.rpma3326ac04c1bf1f60a6717458e915ce1d654bc263f8c2f8d0828b38f77898feeSLBA-2023:1534Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably: * The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25. Scientific Linux 7tzdata-java-2023c-1.el7.noarch.rpmd7986e88f5938d15b2cdb0725f9baa8d5d795f83fde52f1732b3412f4448ed15tzdata-2023c-1.el7.noarch.rpmdb1001e6ec93cfa2f1804ca3e89c41cfa944eb81bdff04df3383ca1d3ba15529SLBA-2023:1991Shim Bug Fix And Enhancement UpdateThe shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Bug Fix(es) and Enhancement(s): * Shim refuses to boot the system when TPM event logging fails. (BZ#2002648) * Shim loops indefinitely processing certificates when space in mok is smaller than certificate size. (BZ#2007084) Scientific Linux 7mokutil-15.6-3.sl7.x86_64.rpmd8932c49f75ea8f4f398e9eeaa80eef43d3f8e48cb174d8da9ef754a43db7cffshim-unsigned-x64-15.6-3.el7.x86_64.rpmd4e013392e4e29f8a7d58bb378abd82acb48084535a350ca8a90e591371a6403shim-unsigned-ia32-15.6-3.el7.x86_64.rpm28cad241c3839168fa5f00d1f4c70a73860eb8bb2c0e4640b3ae258c33622d5fSLBA-2023:4598Firefox Bug Fix UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Bug Fix: * Updating Firefox to 102.14.0 prevents all pages from loading. (BZ#2230023) Scientific Linux 7firefox-102.14.0-3.el7_9.i686.rpm8a33ccae5f36446832cdebfee806a98620b32eb271ffa4913d5dbf57cd9cd8c0firefox-102.14.0-3.el7_9.x86_64.rpmca47117b220a0bbd5c8083dada38c466ccff34032000a9c2cdd83be018c5bcccSLBA-2023:4599Thunderbird Bug Fix UpdateMozilla Thunderbird is a standalone mail and newsgroup client. Bug Fix: * TLS broken for POP3 and SMTP connections. (BZ#2229981) Scientific Linux 7thunderbird-102.14.0-3.el7_9.x86_64.rpm950ffadc0560f6aee5fc3c3f0202ebd7023c4bc086bbbfb7af5e05fa99f89d59SLBA-2023:4824Scap-Security-Guide Bug Fix UpdateThe scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines. Bug Fix(es): * Update ANSSI BP-028 in RHEL7 to v2.0 (BZ#2155793) * openscap shows IPv6 as enabled even if it is disabled (BZ#2210276) * Rebase scap-security-guide in Red Hat Enterprise Linux 7.9 to latest upstream version (BZ#2221694) * Remote resource referenced from datastream is missing https://access.redhat.com/security/data/oval/com.redhat.rhsa-RHEL7.xml.bz2 (BZ#2223817) Scientific Linux 7scap-security-guide-0.1.69-1.sl7_9.noarch.rpmf127d4b826901e47d24dc9a99c48f66343f06f7d8a2090a14bd23c4fac296b0bscap-security-guide-rule-playbooks-0.1.69-1.sl7_9.noarch.rpm6b6f66cddc9c2482a484b76671b21ae1e39d264deca43657ab958a269f01eaadscap-security-guide-doc-0.1.69-1.sl7_9.noarch.rpm74e0ee0a5e07d64aa98a46657247ec14c067dc34caa2ea2cbc40b6d52f3d2518SLBA-2023:5478Nss And Nspr Bug Fix And Enhancement UpdateNetwork Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.90), nss-softokn (3.90), nss-util (3.90), nspr (4.35). (BZ#2211859) Scientific Linux 7nss-pkcs11-devel-3.90.0-2.el7_9.x86_64.rpm833cd6c91d1a08aa3ebe685b7aea647ce01d5a1ffb483ec74587013cdcd51ad8nss-softokn-devel-3.90.0-6.el7_9.x86_64.rpme6a5c1b405b29c400e4f2d2f24853391ecb784004266e870c50e85090e570412nss-pkcs11-devel-3.90.0-2.el7_9.i686.rpm6fd9b7e03da8401e9b539f86845c53c9206853efc5b8aa081fbf7d4e9a1e57fanss-softokn-devel-3.90.0-6.el7_9.i686.rpmb00a9b8bf9847ca51a49f00b861d392d6f0f3d6b9230072a10a760e7014897e1nspr-devel-4.35.0-1.el7_9.x86_64.rpm3ec2bf3d3161853724c484fea24801c07e9d5e62428b300c5fdeafb7a4d75ce3nss-devel-3.90.0-2.el7_9.i686.rpme0a5d74373fb9ca4da0adf92664deae1f36e575acc5b7a3789b24aed50b95548nss-softokn-freebl-3.90.0-6.el7_9.x86_64.rpma9b91349cf9aff0bd4bcd70493ddbf1e17e67977c72865b1d0c6f79898778c38nspr-4.35.0-1.el7_9.x86_64.rpma8e5282a90fa724da81caf2f08726b6ef455b2249b9232d455db53a784dd92acnss-util-3.90.0-1.el7_9.x86_64.rpm7cf1a5b624097801b794c4c63213821ba51c841f207b6706ab173add0abb3759nss-sysinit-3.90.0-2.el7_9.x86_64.rpm2c506d27cf3ef2869f5aa4c98bc9fc7cc57cfc6ceb333dfad8102c1a24e1df1bnss-softokn-freebl-devel-3.90.0-6.el7_9.i686.rpm5160dd7b34539accf4e74613c5645d6999a9367c1e04fad393c8426a31876929nss-util-devel-3.90.0-1.el7_9.i686.rpm6bf03cc81b4f1241c7611802a7c7f27279e6be39ceb3f1892024fb1fd54c3fe8nss-softokn-3.90.0-6.el7_9.i686.rpm18241dca1d91129301c8556a8b62ffefb6a424b5db11c601fe0462ca61d34f85nss-3.90.0-2.el7_9.x86_64.rpm1648b5a87b74c820c9aed6eb6a1d10d1498a2bbd6976445cf34be8c657a3b32fnss-softokn-3.90.0-6.el7_9.x86_64.rpmc384ccf712d2130439a9fe5c98f3d0d73b3b0b8e603927073425a7f65197294enss-softokn-freebl-3.90.0-6.el7_9.i686.rpmfb670a39ad0ac44f9739100ef1eb8fe3dbb82c9ca6d4e874598e5597997c8a1anss-3.90.0-2.el7_9.i686.rpmd6b591087318537794a40f4dc5921268e0467eb57ccf341a78aaa01aff79228bnss-util-3.90.0-1.el7_9.i686.rpmfa85b3c8810ce262d235b22bbb0e4ede00c0aecca5772ffb60129a8c7c3b8dd1nss-util-devel-3.90.0-1.el7_9.x86_64.rpm2df03fb85e1abc6dcd8cceca2311aaa12c2c60dcc42c2228a70031b4d4f61915nss-devel-3.90.0-2.el7_9.x86_64.rpm144718bcc1de8e2e2d3933fdc91e926a0451b51102c883d7ebbc7a3ba8584519nspr-4.35.0-1.el7_9.i686.rpme7517a5cb57ad2758aa5cd91085301e4b16ae5cfe3b2e2d03cfdab3d5134f3e9nspr-devel-4.35.0-1.el7_9.i686.rpm210cdbbea75730caea5849bb61ec1926957562090f3e4259b68810f2c0070449nss-softokn-freebl-devel-3.90.0-6.el7_9.x86_64.rpm047aa93f55583f55c64b2592ba7b00f67b106f93540b1b6b0c08bba1bd1b0f10nss-tools-3.90.0-2.el7_9.x86_64.rpm0d827bd967e29c6c8012e7cf1de16fa724ba482f60039dd2578c26519e5b45e2SLBA-2023:5620Microcode_Ctl Bug Fix And Enhancement UpdateThe microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20230808 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2223994) Scientific Linux 7microcode_ctl-2.1-73.19.el7_9.x86_64.rpm547fb7118701708094c3b5c00ffe046269ed859553dbf86cf402c5302828f3c2SLBA-2024:0350Net-Snmp Bug Fix UpdateThe net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es): * net-snmp: fix a crash triggered by wrong passphrase (JIRA:RHEL-2882) Scientific Linux 7net-snmp-devel-5.7.2-49.el7_9.4.i686.rpmc658da0ffb451524e8fc09eadad31e74ce67eab1d7a25030959b1a41ba9763c1net-snmp-agent-libs-5.7.2-49.el7_9.4.i686.rpme1810e0e60ef8ff20aa9bd2dde94c85b892ec99d28be6aeac23e789a8c71a6e0net-snmp-5.7.2-49.el7_9.4.x86_64.rpmc1e7bb09e847ce3bb6c454756a753a7d4d4dad85c7906763daa6306c56563480net-snmp-devel-5.7.2-49.el7_9.4.x86_64.rpm8ec73a83612f455a74445026b1cd2daa1dfea073c7c8c2d124a3ec0af77468f2net-snmp-agent-libs-5.7.2-49.el7_9.4.x86_64.rpm671aae63d47d6e21cb4352f75ad02f588ffa53700a552842d721ab4ac3de261enet-snmp-perl-5.7.2-49.el7_9.4.x86_64.rpmba1aaf9cc68fe79d17116b8d9c12c19c8e92bf8a264baf936cb628d71e34ea88net-snmp-libs-5.7.2-49.el7_9.4.i686.rpm89c86951e7ec026c2d82738ca5c9e597ab13002e329a31e39ea7710144063363net-snmp-libs-5.7.2-49.el7_9.4.x86_64.rpm5e27b4aa992324800c76d1fad361a54d1a9d667a281fd98f24830a68c5db564enet-snmp-gui-5.7.2-49.el7_9.4.x86_64.rpm332d57d5e8b8be75894169db2389a1b5d15a86f1d8653de1449baff44b8c043bnet-snmp-sysvinit-5.7.2-49.el7_9.4.x86_64.rpmbb3fb2524a52f113142385015bd9636ef9dd05293bb0bdaf0e3194d63528b110net-snmp-utils-5.7.2-49.el7_9.4.x86_64.rpmf41bfd2bedb28d96c91a6426110db9c28e5d468234adb2a3c8c1b2d0c3fbfa36net-snmp-python-5.7.2-49.el7_9.4.x86_64.rpm77eebfe70b4d96f9e590e535bb09c068d3100e7a465e306fb0f266a9a2ec6426SLBA-2024:0762Tzdata Bug Fix And Enhancement UpdateThe tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2024a, which addresses recent time zone changes. Notably: * Kazakhstan will transition from UTC+6 to UTC+5 on March 1 2024. * Palestine will transition to the daylight saving time (DST) a week later than previously predicted. Scientific Linux 7tzdata-2024a-1.el7.noarch.rpm269866c2e28a43307abef7ef8968f108fbf18c61bc4da8b5fdf9cbf83425c9c6tzdata-java-2024a-1.el7.noarch.rpm2fbe19464f1e459fda37277248976644b1e9de5afd43ccf1c60472a896b94548SLBA-2024:0987Scap-Security-Guide Bug Fix And Enhancement UpdateFor detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section. Scientific Linux 7scap-security-guide-0.1.72-2.sl7_9.noarch.rpmb16440341a0b9327f3148a5ba31d74ced89f48a9706a5a62d4bf199041026f0dscap-security-guide-rule-playbooks-0.1.72-2.sl7_9.noarch.rpm9c4b957b491174811c87df2dbccc1a326f8f405d95700a2cd1bd53ebbc8fadc7scap-security-guide-doc-0.1.72-2.sl7_9.noarch.rpmc28c2c7bb50773bc3f4d71efd4dd7cc7da4a1c6aad6221ce3aeae71538c68166SLBA-2024:1274Fence-Agents Bug Fix And Enhancement UpdateThe fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Scientific Linux 7fence-agents-heuristics-ping-4.2.1-41.el7_9.8.x86_64.rpm6e56f8d888db37626adf4a5cf03fa719f0d9c3ef25efd0075f1663040facf774fence-agents-lpar-4.2.1-41.el7_9.8.x86_64.rpm638d58d089706a31d2be0c25025bd35e01e7a9278ede03309aa6b85e944d5ea5fence-agents-vmware-rest-4.2.1-41.el7_9.8.x86_64.rpma871063f9cce3bcc66cd3cf2ac25c9d70bf602e25bb921155dab40ea1781c8d2fence-agents-apc-4.2.1-41.el7_9.8.x86_64.rpmd7ea45cebf43de8427192eccad9ecda108c7fd10ceeb278435d18460b45d6c50fence-agents-apc-snmp-4.2.1-41.el7_9.8.x86_64.rpm6e2a06f356530081982acb223a1c2be6a48bf5baed4bcfd3104b7edf13b39334fence-agents-ilo-moonshot-4.2.1-41.el7_9.8.x86_64.rpm6a6ad2c66b11c9cdf2ddea5bbe82370d9b6b164708b9bb7dbf9d1dac1cb7c98efence-agents-ifmib-4.2.1-41.el7_9.8.x86_64.rpmf4a1666e35f1265dd53678906f6609c66f520382785b8e1031e0dcc3a934883ffence-agents-aws-4.2.1-41.el7_9.8.x86_64.rpm729d3d4b42073cdf02f841c8576d5fad1fd8a19a3564a22769d8f85c6eb086cffence-agents-bladecenter-4.2.1-41.el7_9.8.x86_64.rpm5b60eb76228587229ca3d8e5d4d0ea90e486cba8783f40e04d11665ffa514a30fence-agents-ipmilan-4.2.1-41.el7_9.8.x86_64.rpm5395bbaa7a5fb8a4da8f5653520324c9aa9900fd809ad450cc1ebacffd3c68bbfence-agents-intelmodular-4.2.1-41.el7_9.8.x86_64.rpmb0615c8baf5e9497ae674cda01e793c1d1fc2287aa785c2167c8d820a2b152d9fence-agents-cisco-ucs-4.2.1-41.el7_9.8.x86_64.rpm45916e68682a06cd43ddc70f88be74f3127bdb259999e8f37596f9e71a60188ffence-agents-ibmblade-4.2.1-41.el7_9.8.x86_64.rpm093720a4cf018a240f7b3cfdf9980be6bd71ae0deb28f17c54057a497312b51efence-agents-wti-4.2.1-41.el7_9.8.x86_64.rpmc6e1df867d64b9d8c575cdc5c8f20d521fe9a480035b6efe13abab6b75d61671fence-agents-vmware-soap-4.2.1-41.el7_9.8.x86_64.rpmad313e2f86f7f9f15a30074797454e54402bdc725710b1e4d3da594ccc86572dfence-agents-ilo2-4.2.1-41.el7_9.8.x86_64.rpm1a31a065be1222982bb005b03e7bff8eeb2050ac501c0e2111029ba51597e615fence-agents-common-4.2.1-41.el7_9.8.x86_64.rpm24fea275d60c79dce58a7176383cad072cf7c8e473d3a5ed72fda27b240c3f5bfence-agents-brocade-4.2.1-41.el7_9.8.x86_64.rpmf74ccc9a9ccabc9bc94afebdaf1a5437409e45caa7dd4a6222fce6dcd87771f8fence-agents-ipdu-4.2.1-41.el7_9.8.x86_64.rpm88090b817eeace0a716c473bed7160a08270a41126dba116dd8a12841e13134bfence-agents-eps-4.2.1-41.el7_9.8.x86_64.rpm03180c0590e56a549fcaba9758a0b02f3f7e61aba1dde1b1b98ecc4d326ebfe6fence-agents-hpblade-4.2.1-41.el7_9.8.x86_64.rpm0db1dbfebaa6b67cdaba3e67577b527b64e56698eaea4cf2a589d0df79168460fence-agents-kdump-4.2.1-41.el7_9.8.x86_64.rpm6f026bb6d5cb6dd57133c3569200c8ec9ed027fcbd5ee5307cef771a6abd9292fence-agents-rsb-4.2.1-41.el7_9.8.x86_64.rpm7bebb8c1064787a555a4469ff40e48554d16918a871eb16b671974aa13595ab1fence-agents-emerson-4.2.1-41.el7_9.8.x86_64.rpm3007100b95d7d09f310dce9b0c25925888df5ccb168c662b8275b29834eb2f76fence-agents-ilo-ssh-4.2.1-41.el7_9.8.x86_64.rpm8d7480844b7751c1187271ea7625d3e8c5a400ed5233bb15cba956a7793e31aefence-agents-cisco-mds-4.2.1-41.el7_9.8.x86_64.rpm2d56dca534bc0d47cbf0005dfa7f06aa5db6f605aa404644d40cabe02382d7bcfence-agents-amt-ws-4.2.1-41.el7_9.8.x86_64.rpm44ddedeb3c563db97154db842d530ee79dd8722bfdb79cd38a6a47abb617bdf3fence-agents-redfish-4.2.1-41.el7_9.8.x86_64.rpm9e536929558a3814dc846afef01a0f62e69f42a7fa076dbfcc28a7a56a42198efence-agents-gce-4.2.1-41.el7_9.8.x86_64.rpm00c3412047b847277ecc5f83e6780032d98ae9542573b634509d9fedba40254dfence-agents-rhevm-4.2.1-41.el7_9.8.x86_64.rpm44d71a555f1ec4e61d0a5429eafba7110715373e8c9f50cc1e983dea5f820e99fence-agents-sbd-4.2.1-41.el7_9.8.x86_64.rpm65d81bacfec1b46c22c11750fc9f71c068c11979a038189cf443c66726b6e133fence-agents-compute-4.2.1-41.el7_9.8.x86_64.rpmbe05fc5bf2b2a646e9002fb0c6ed1addb25de9770e84e58e32629068cfc97702fence-agents-virsh-4.2.1-41.el7_9.8.x86_64.rpm64f37eb5102cb2d5d582cef7a63e7e0b15948d75854fdc957bb34f870bc7fa13fence-agents-mpath-4.2.1-41.el7_9.8.x86_64.rpm5565c5379ce59d1b14416c2451fb3378584a774e5389109fb9d2037ae638217dfence-agents-aliyun-4.2.1-41.el7_9.8.x86_64.rpmf4422b189daadf84e733ea25db0584641130f12dfc81367fa0cbf9e84235a25cfence-agents-scsi-4.2.1-41.el7_9.8.x86_64.rpmdd41cac9d96fd46b02b5cc93ec0ef4679c1a81764123f52134f9a5269efd832dfence-agents-ilo-mp-4.2.1-41.el7_9.8.x86_64.rpmfb3c799dde831fd12ff6ba60173548d714ca0efe70b2dd78a77c675b0f4d31f4fence-agents-rsa-4.2.1-41.el7_9.8.x86_64.rpm1e475576002fd26c9356e09caa762ca00dc258d81774a0fb014ed4b8a23f7eb6fence-agents-all-4.2.1-41.el7_9.8.x86_64.rpm55862915cc9ceee1964cf8abe31bfff5ec229b4775a0c96f9f98ffa73f9b35eafence-agents-drac5-4.2.1-41.el7_9.8.x86_64.rpma508fb4976a9d173c6d4bfa170ac15e6430deebc08fee08b25012a237dee4948fence-agents-eaton-snmp-4.2.1-41.el7_9.8.x86_64.rpm514ccd0b7f308a16c1eb0ecf498ef88312dc0360ac546574b469e09db0f8ed08fence-agents-azure-arm-4.2.1-41.el7_9.8.x86_64.rpm70007684834fe70c8880f3d5c9370e618dc11ec0117a42898c52831007704510SLBA-2024:1276Resource-Agents Bug Fix And Enhancement UpdateThe resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment. Scientific Linux 7resource-agents-aliyun-4.1.1-61.el7_9.20.x86_64.rpme841523b6d12bfb7e7bf38dbce2dc0dbc0dd3aeca1c9cfe8de269ea3736577f0resource-agents-gcp-4.1.1-61.el7_9.20.x86_64.rpm92053d13004094b1d5f374d585c4b055e4de5d81c36fe8af96d84849ac02ed17resource-agents-4.1.1-61.el7_9.20.x86_64.rpmc7814974ccf16878f7a15f38101bd8cfc432a27b11ff3e7a5a316a7dd68c966bSLEA-2019:1210-1Microcode_Ctl Enhancement UpdateThis update adds the following enhancement: * The Intel CPU microcode has been updated to the latest upstream version to mitigate CVE-2018-12126, CVE-2018-12126, CVE-2018-12126, and CVE-2019-11091.Scientific LinuxScientific Linux 7microcode_ctl-2.1-47.2.el7_6.x86_64.rpmcc1dfbc5bd107925854f47c0d30f8346cc3ce73ded3f6e32a220b85cdcd85205SLEA-2019:2089-1Libtevent Bug Fix UpdateScientific LinuxScientific Linux 7python-tevent-0.9.37-1.el7.x86_64.rpma19805f4912358f434e5ab7485c55e7e5bffd96841bb54042a11278db3dd2e5blibtevent-0.9.37-1.el7.x86_64.rpmb812067ca114682b822ae4843675e1aaaf5c2c2df8a8f90170bbc3a66d15d25dlibtevent-devel-0.9.37-1.el7.i686.rpm0ef440f15815de159163caca7154e65349c286e31a6421de56afcbbd730b63e9libtevent-0.9.37-1.el7.i686.rpm420a44e9f8d0960bbfc86612b539b7ec1121fae5646dd4da25cc7415dc45441flibtevent-devel-0.9.37-1.el7.x86_64.rpme09ff59c3dc41a33bb3b083b8583947de1245c402c28a78893bebd9700ad38afSLEA-2019:2185-1New Packages: Python3This enhancement update adds the python3 packages to Scientific Linux 7.Scientific LinuxScientific Linux 7python3-tkinter-3.6.8-10.el7.i686.rpmccb93ae4c1398bdd757036db184019a93a155915c357b494e801b3157abf313epython3-3.6.8-10.el7.x86_64.rpm0e1f2ed25cfd6c967730b0b31b367c42e7f0c358e85e17a1dffbc9f46b377adepython3-3.6.8-10.el7.i686.rpm7eced73b1bc289757efff3f7a4506928f00873625c4f02a7d509c2e3ebc76627python3-test-3.6.8-10.el7.x86_64.rpmc28c789b8b177b330cad5da06a72561d5bc89ad687a64b1417988188493c864cpython3-debug-3.6.8-10.el7.i686.rpm844d073015d8f3f65f4fbbe8b528c8eb8b55b1cada78f78f94cb5c6fd3060e23python3-wheel-0.31.1-4.el7.noarch.rpmbc4622be1ed2e62ff1254c7dd4eddc4ec2dd568cb8e3344d013540ee2c72a418python3-libs-3.6.8-10.el7.x86_64.rpm5fcd811833b81c5751c10b22d4f6b899438fb1eecd6c790ff84dbe0b7158d3c2python3-idle-3.6.8-10.el7.x86_64.rpm7262db1fab04cc90c9b34b4f5e4382bebc8993034fbe18f14f25f41a4ff06221python3-devel-3.6.8-10.el7.i686.rpmcf97c11e4415073830a8cac9e15f57a3f455ff4147dff715e42f9fd236f14f6dpython3-libs-3.6.8-10.el7.i686.rpm7066426c62d11ba7eeeb86eee2ad95485d1ea19395b55e0f5583685edc9a50ccpython3-devel-3.6.8-10.el7.x86_64.rpm20537fd79fbef40fbb0d1afeda1cf999cdfd4898072db1723262f6f39fe1539apython3-idle-3.6.8-10.el7.i686.rpmd6eb3e5bac8b4f0840bbd2134f1dcf762df514c94ba0c196ca1866cee0aab352python3-test-3.6.8-10.el7.i686.rpm16536aeea75e91705634288a27290aeaae540d39a650d388982ac2a9611e0a8fpython3-tkinter-3.6.8-10.el7.x86_64.rpm05c561000a29c7f9a94887678d22a02ed353c16f79edeaad4908bb50ce9dce16python3-debug-3.6.8-10.el7.x86_64.rpm58a588be705506e17e9714fdba14258786fd878e15fe3e587fca1e1e8bc31b03SLEA-2019:2186-1Python3-SetuptoolsScientific LinuxScientific Linux 7python3-setuptools-39.2.0-10.el7.noarch.rpme68119b88286632cae95b2b8689b460575fc976183fce8391293c766200794c0SLEA-2019:2187-1Python-PipScientific LinuxScientific Linux 7python3-pip-9.0.3-5.el7.noarch.rpm17bad2f75b7844f37ad5808e3c4827bd07473657328efc70c02c83e15ea9cc86SLEA-2019:2212-1Python-Rpm-GeneratorsScientific LinuxScientific Linux 7python3-rpm-generators-6-2.el7.noarch.rpm9bf54a89f4e8982025f5165e8a1543f6d035574c2304a2b4c9cfe3c3632a9850SLEA-2019:2270-1Openjpeg2 Bug Fix AndScientific LinuxScientific Linux 7openjpeg2-tools-2.3.1-1.el7.x86_64.rpm7555935b0fdf42cf8bba7b7b40bdcc662f66a8e9961df862a0879e5238210ccfopenjpeg2-tools-2.3.1-1.el7.i686.rpme3b84f080a1c9c55710a94000939ef6e5c5700f27c161da155d30761fb6764b5openjpeg2-devel-docs-2.3.1-1.el7.noarch.rpm410aa4acd2f0a84c10412324e3f6de0ade3e9d1670177b93b09911a5b2d243a3openjpeg2-devel-2.3.1-1.el7.i686.rpmc3cbea41896f0b652241aba058c089b9efa509f68a5dff529e30f527b60c4485openjpeg2-2.3.1-1.el7.i686.rpme902144a9f34975cd95d295d561739d208ee24402618f5da91feb51e7727247aopenjpeg2-devel-2.3.1-1.el7.x86_64.rpm1a371d5a62f87b1fb589772abd0ec709d709fb61fef8307557e0b785c38aee6fopenjpeg2-2.3.1-1.el7.x86_64.rpm01a99c07fd675aa6c61ba33e6dd88c422cd6680e80ed042d5744c347f2721c25SLEA-2019:2279-1New Packages: UcxThis enhancement update adds the ucx packages to Scientific Linux 7.Scientific LinuxScientific Linux 7ucx-1.4.0-1.el7.x86_64.rpm99084531fe40d583eb5ef0828401c7cf0552b9a3136c5f4f084c212b5377417cucx-static-1.4.0-1.el7.x86_64.rpm2f9a10838e0cbaca6190cdc5a2a4044f37e2d5dc72ae73ee0e80d9ddf1c4828cucx-devel-1.4.0-1.el7.x86_64.rpmfecb6557b460d46748f32a0e9c0a811374b57b76ebdd36ef03834ae1ab4f9464SLEA-2019:2323-1Python-AdalScientific LinuxScientific Linux 7python-adal-0.6.0-1.el7.noarch.rpm1ae7ea0cffad288486e131a7a3fef849001b7ce5e0a048b93169153bae40419eSLEA-2019:2324-1Python-MsrestScientific LinuxScientific Linux 7python-msrest-0.5.4-1.el7.noarch.rpmeb3fb38801d51a8df29e7a92dc0b4d05a3eadd11b2e0e3436cf2522413db2729SLEA-2019:2325-1Python-MsrestazureScientific LinuxScientific Linux 7python-msrestazure-0.5.1-1.el7.noarch.rpm40dc42bb0f00b2592a956d9cc8f3945e3b8044cd9d11e564f40912b68206ad21SLEA-2019:2326-1Python-Azure-SdkScientific LinuxScientific Linux 7python-azure-sdk-4.0.0-1.el7.noarch.rpm16e2a20fb3f1e1fd3a690bb47a90e9733c24c3930d47314b3dc57b842bee2983SLEA-2023:7283Microcode_Ctl Bug Fix And Enhancement UpdateThe microcode_ctl packages provide microcode updates for Intel processors. Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (RHEL-3920) Scientific Linux 7microcode_ctl-2.1-73.20.el7_9.x86_64.rpm5923cdb7d020178f9cbd103fcf7ca35481fb5db52ccfeb2fd18940c86ee0a80fSLSA-2018:3347-1Python-ParamikoSecurity Fix(es): * python-paramiko: Authentication bypass in auth_handler.py (CVE-2018-1000805)criticalScientific LinuxScientific Linux 7python-paramiko-2.1.1-9.el7.noarch.rpm163333de11151d34d19dd0bc92ee065fd468cb3357b88875936137d21bd904f0python-paramiko-doc-2.1.1-9.el7.noarch.rpmc1a319b808524d3760d2290e9877c30194a6680aedf5a92edc9b6a8da9cc5022SLSA-2018:3350-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) * OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) * OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) (CVE-2018-3136) * OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) * OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180) * OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) (CVE-2018-3214)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm2cda12ecc6c85550947c3e028b184365edb6d55336f4b8fcc5fd63e17116e799java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm05f0933e124ce5234e4f6a1bf68e9a1fdb86e28664d0fbb78cffa8e4a02d9934java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm49f8afc058695bc5b35a601d7aab5f63fdd122e39de2c34f7127198450a3a419java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6.noarch.rpm7fcd7b28d65ed30742676171a4af091980aa1459cd36f7a009a06ffbfd8571b3java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6.x86_64.rpmcc950008190bf00804f8e57529d60989887bf351afa32635d59c06dbf08d207ajava-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm7f961baf89755117c3af3b1c6f64b6d91d805b6b46ccf3829a3890a9e9b54a99java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm14f905dd0ad753837e5dbbc085d2b0ea3d1699f025a8ac6242cca04a0856bc67SLSA-2018:3408-1GitSecurity Fix(es): * git: arbitrary code execution via .gitmodules (CVE-2018-17456)importantScientific LinuxScientific Linux 7git-cvs-1.8.3.1-20.el7.noarch.rpmed9ad545f85b9af42abd5facf1dec041152a185b65ce97b55c33588cbf88e83bgit-email-1.8.3.1-20.el7.noarch.rpmb1dadd9ec2cd94d8da3294e5c7c501f4a0123fdf952e18e20149e4138505f366gitweb-1.8.3.1-20.el7.noarch.rpmd819e8a0fcd5c975e7875ff0f8fb981c964cced4319408c51e7c805727fcd002git-gui-1.8.3.1-20.el7.noarch.rpm54423a2bb1c372e9453751a17344732c692641af25799c161b2adfe13163cc96git-all-1.8.3.1-20.el7.noarch.rpm5d93e8676559fab8147f78afcc1910dd9f97024eb2fd69e1f1a4db0ef9be2288git-gnome-keyring-1.8.3.1-20.el7.x86_64.rpm6383dada61789d6a7e0bb66351b88f2fe5b07bc44d4beeae54f47f9594aa52e8gitk-1.8.3.1-20.el7.noarch.rpm88a0c506df25e5098b6a6d844cd1434cc78ec075ec382b2e3702d15a7d8f3b6egit-daemon-1.8.3.1-20.el7.x86_64.rpmdc0b6c43349c6e2d30edca273ea38587280354e9e903ef330473685ff3a87668git-hg-1.8.3.1-20.el7.noarch.rpm2b6e72215f871e4789a7fa40b2194f615dfe37065e9181a075b91b49d91630b8git-bzr-1.8.3.1-20.el7.noarch.rpm0652c9749c101484f00072daefc5632117b3d4aade9de7e180f935db79dcb466emacs-git-el-1.8.3.1-20.el7.noarch.rpm6dcbe5f701092a5ad0ba639cb87721d50a25937922105274e4e22f8298a9ff30git-p4-1.8.3.1-20.el7.noarch.rpm0f3895e1a4f35a3179fc8d7cebee5edea722f1768437e16b9d1434b685c59494git-svn-1.8.3.1-20.el7.x86_64.rpme8ed3fc06411d16c905b90fa1e3023d494e2cd3e2b2515896c4efdb2da0efe4cgit-instaweb-1.8.3.1-20.el7.noarch.rpmac2936c4a3614752db1ec7ed6e94b3200c5f4ee3e645a7eb571e1b6f46e558d6git-1.8.3.1-20.el7.x86_64.rpmf232866b27d752251df914743ec4c542af7e7923487880b2149cda4bb38a37c3perl-Git-SVN-1.8.3.1-20.el7.noarch.rpm8d4f850b0d1d9ef7b994dae5b68114836a52e255bc468cf827ec12fea9bb70afemacs-git-1.8.3.1-20.el7.noarch.rpmdbfcbde4d3a41427c3042e154c13a6d16ef976acd379ee8325a05977e95343b1perl-Git-1.8.3.1-20.el7.noarch.rpm927a1a86f854100acc9d34e757607b87c97ef4436b6e7c9236522c21fbc54586SLSA-2018:3410-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: Incorrect permission check in Xorg X server allows for privilege escalation (CVE-2018-14665) The SL Team added a fix for upstream bug 1650634importantScientific LinuxScientific Linux 7xorg-x11-server-Xwayland-1.20.1-5.1.sl7.x86_64.rpmdfb2688d91a032762fc983a12967443e173945251c9c89de925c503f4b67639exorg-x11-server-Xdmx-1.20.1-5.1.sl7.x86_64.rpm6f225a1f76d3de77f26a837a35866f7fade1065797f30b12149133d9737b1765xorg-x11-server-Xvfb-1.20.1-5.1.el7.x86_64.rpme1f38699fdb847a5282ccbbf49d1aee2ab7307a8ad6590cef80a66b6f571516cxorg-x11-server-source-1.20.1-5.1.el7.noarch.rpm42e8ddca54dea120887e8ea550f237d76ca111a454b65fb8489e48bc6c2646ddxorg-x11-server-devel-1.20.1-5.1.sl7.i686.rpm5579da64d74c5025330d744dc337a259f5d6863e654bd4bc5474650e458fb6d9xorg-x11-server-devel-1.20.1-5.1.sl7.x86_64.rpmb8dc71307f1cce161fe8a3e9cc8cedde63a6fe3950728bb786b806a70ac330c9xorg-x11-server-Xephyr-1.20.1-5.1.sl7.x86_64.rpm5d3a23734f021af5ac87a2b496bccc2b18558f7a0a058a94e42bbf6940e842d5xorg-x11-server-Xwayland-1.20.1-5.1.el7.x86_64.rpme6f34ffd59a536979d7c2d15235dc53aee7bd7370abf1f98fb1b7efdf0b3d897xorg-x11-server-Xnest-1.20.1-5.1.sl7.x86_64.rpma63717983f32cd0250cfabca472616fb809952f4e83c4d1b127b32274e5f59dbxorg-x11-server-devel-1.20.1-5.1.el7.x86_64.rpm33f85b0d6444e53caab5819554210ab616d0f4bbfd97cd300db1bf82a6b0a66dxorg-x11-server-source-1.20.1-5.1.sl7.noarch.rpm3d66bff48dab8650e90aa0aac5d014066423f890144573f17b91260adca96624xorg-x11-server-Xephyr-1.20.1-5.1.el7.x86_64.rpm668bc0c194df9439d05cf5bd598ae590dfc8ae9298952f928191cce0b96385b6xorg-x11-server-common-1.20.1-5.1.sl7.x86_64.rpm3a11363058a8a57a1d3cb9161b97311e9a87d84e5b58f31969e50a10fbe0bd5dxorg-x11-server-Xvfb-1.20.1-5.1.sl7.x86_64.rpm01be74b1baac677b56fc8adc084f54d3535af7b706c5664130ad69719c313505xorg-x11-server-common-1.20.1-5.1.el7.x86_64.rpmc18d7ad11bf7add9deb67b969b4346878b528c66aecfd8787cff7233620404f7xorg-x11-server-Xnest-1.20.1-5.1.el7.x86_64.rpm0c09cdb9b0cfaac8dd4fe2f961474bbc6966659ad154f6a91c4f5c2686620535xorg-x11-server-Xorg-1.20.1-5.1.sl7.x86_64.rpmcd23ead7edc16c8bd336940228c847202ab8bf645a3c83140dee6dcbb8adfbd5xorg-x11-server-devel-1.20.1-5.1.el7.i686.rpm303060d3e29d3127e604c88f5fa1c7d77b7439dec9fb6bb1a4ea500e17319354xorg-x11-server-Xorg-1.20.1-5.1.el7.x86_64.rpm7771ec60c6ce6fc49814ccf5b3762309cb1de386721d5891970f86d0198d9d64xorg-x11-server-Xdmx-1.20.1-5.1.el7.x86_64.rpmcc1a634c018f347e81cb1404c90cd22000ca49ce11214759e76691b54e57d749SLSA-2018:3521-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) * OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) (CVE-2018-3183) * OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) * OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) (CVE-2018-3136) * OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) * OpenJDK: Multi-Release attribute read from outside of the main manifest attributes (Utility, 8199171) (CVE-2018-3150) * OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180)criticalScientific LinuxScientific Linux 7java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6.i686.rpmaae2e77b682233a2592f3c3e3c723ba762bf6740cce4ecd81cd6c3c650f324dajava-11-openjdk-src-11.0.1.13-3.el7_6.i686.rpmdb842b0abb5bdf6df5b6c20f1cf3194de34d9e04d0f679a6d498e9b2e68fe55fjava-11-openjdk-headless-11.0.1.13-3.el7_6.i686.rpm0494cd4adebe3531e7c45790b0bc4c517b4e01eb7a8162364bb0815418568b55java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6.x86_64.rpmc67ca01cb120b6d4a32ff6bf52fd151f0a26d698c1411460614c205d7302a3cejava-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6.x86_64.rpm90bea36f5ca51899ea677dfdeb41c289eaca5ed995ce40d4981958ec46b8b40cjava-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6.i686.rpma6b73297524bd362a95e52a46980cb755cca3ddfc6ad09569a7635fedc186e52java-11-openjdk-headless-debug-11.0.1.13-3.el7_6.i686.rpmf5ea633f64e770dfa5a3eddb9b79cd78f448c99a56d4c50d07a70d1a188b2c77java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6.x86_64.rpmed2392901295b29ad2ec5df3279c73e86cc378f1479398bfedbef59ca11dc5cejava-11-openjdk-demo-11.0.1.13-3.el7_6.i686.rpm312c342d9d926ef56134cb8c3fdf8564ba74d2a903dd6f707ee5a5e750d549f6java-11-openjdk-jmods-11.0.1.13-3.el7_6.i686.rpmc7e80b516f06365b3f2b180ac7c0f7744a940c0ccfe5481099a7f5d80e91348fjava-11-openjdk-javadoc-11.0.1.13-3.el7_6.x86_64.rpm267c6ce7d5ad0efd882cdad0a7c4ed5ebeb67614a78e31d420eb85363efb36a8java-11-openjdk-devel-debug-11.0.1.13-3.el7_6.x86_64.rpm8b961983ad4699cff32e05cf6ea9248b606447bacd5d24205911886ba3bc097fjava-11-openjdk-devel-11.0.1.13-3.el7_6.x86_64.rpm9c276f0c8c133f58744191be03661ea5cd785448d3bc9f690a26db8c1c87f8c1java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6.i686.rpm62a9b3ed3bbd467121ce2e0c253ea19e4195d6259b3b34f1119168c3967b66b5java-11-openjdk-headless-debug-11.0.1.13-3.el7_6.x86_64.rpm7f7496db12dcd72f262378a58a56c401e2cc749252e44814a443fee952ec4f18java-11-openjdk-src-debug-11.0.1.13-3.el7_6.x86_64.rpmbc670e40ddc319cac90272eb44c4b2de3a5f20b05bd8b6c576823c84e59ff24bjava-11-openjdk-src-11.0.1.13-3.el7_6.x86_64.rpm98b4e7ab0b4d53f103fc90e7dd601adeb9f0b6872708b1cd944bd431b470f94cjava-11-openjdk-debug-11.0.1.13-3.el7_6.x86_64.rpm3715d208d9ae78ac24baf3609ae4510b51c9179664ca8f669e670fdf67bdf8a5java-11-openjdk-devel-11.0.1.13-3.el7_6.i686.rpma9e078ffc42bd5421cc7e04048851f06fdf7ec71831e5ea557772bf6f40ee74ajava-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6.x86_64.rpm595a39015564fbe89e7ea47c53b1c341d2562325a14ccf860780ad99cef47e5fjava-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6.i686.rpmcbb26cb2eff855380476b7361603592d2b29579396434c58bcad3f32e5890cc6java-11-openjdk-javadoc-11.0.1.13-3.el7_6.i686.rpmfb3aab8662bf3e6bdee13a4311305a385cdc63bf16678642295e4b30d67e5781java-11-openjdk-headless-11.0.1.13-3.el7_6.x86_64.rpmcb01913ce4fe42d219922f8329c4736cf39ac6f8fb88e91bbd1275b64f359708java-11-openjdk-11.0.1.13-3.el7_6.i686.rpmd2fc0a4684284114ea8e85ed50b85d4738471b723cc8847503f5bab5d86d99aajava-11-openjdk-debug-11.0.1.13-3.el7_6.i686.rpm0542f1802017aad996920972b0867cae67eb54af09b24833183451cb4ebeb18cjava-11-openjdk-jmods-11.0.1.13-3.el7_6.x86_64.rpme124fff57e94dcb0294d9ff5d95ddf4e27fbfbcd390419bc656cff8c2cf97f1fjava-11-openjdk-11.0.1.13-3.el7_6.x86_64.rpm46564bcfbbfa90c0cdb0d29a42195a7810d049c9f734057ff58041f0fcd509f3java-11-openjdk-demo-debug-11.0.1.13-3.el7_6.x86_64.rpm3ebfb677c214fc7ee7930514b6facf770cf6338890aa04a36023fb8231921494java-11-openjdk-src-debug-11.0.1.13-3.el7_6.i686.rpm3d05c7faa365effaf29999fb761c3e159c317c7accb7c63e227205f294cf1c5ajava-11-openjdk-devel-debug-11.0.1.13-3.el7_6.i686.rpmfeee703445a7b896efac763a7209abfce649c91fb8594c22c4f692cf9ae002e2java-11-openjdk-demo-debug-11.0.1.13-3.el7_6.i686.rpm087087ff7da271c09833f42084cc2efcb023cbb947c10d498a2fc866d1cb2a40java-11-openjdk-demo-11.0.1.13-3.el7_6.x86_64.rpma727b5226f02d199bc9548d97bde6cc841c698336a1bf6781ecea19d34f71a11SLSA-2018:3532-1ThunderbirdThis update upgrades Thunderbird to version 60.3.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 (CVE-2018-12390) * Mozilla: Crash with nested event loops (CVE-2018-12392) * Mozilla: Integer overflow during Unicode conversion while loading JavaScript (CVE-2018-12393) * Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 (CVE-2018-12389)importantScientific LinuxScientific Linux 7thunderbird-60.3.0-1.el7_5.x86_64.rpmdc4869db80e22d4a09c4aeeb8cbfd47281069f03fc154647fc3827f68cd7ce9bSLSA-2018:3650-1GhostscriptSecurity Fix(es): * ghostscript: .tempfile file permission issues (699657) (CVE-2018-15908) * ghostscript: shading_param incomplete type checking (699660) (CVE-2018-15909) * ghostscript: missing type check in type checker (699659) (CVE-2018-16511) * ghostscript: incorrect access checking in temp file handling to disclose contents of files (699658) (CVE-2018-16539)importantScientific LinuxScientific Linux 7ghostscript-gtk-9.07-31.el7_6.1.x86_64.rpm928ffc2cedfc74b24941c6b6f2e4f493cb0bb987069a08ef6acf884339919222ghostscript-devel-9.07-31.el7_6.1.i686.rpmc90fc3e31e652af4a42d91dde2ed7c49de9ed91f39977e6441f41de7f2484d64ghostscript-doc-9.07-31.el7_6.1.noarch.rpm34992ea2f3fe48ec7032bf2ad141f6cc73d87faf34f406000d8a2d8b3dfd34e5ghostscript-9.07-31.el7_6.1.x86_64.rpm7b665b6fbb6f96940ced10e74e065a9b4a484a651c5cdf91a06310e89dbd79dcghostscript-devel-9.07-31.el7_6.1.x86_64.rpmf31b5ce3f3e6fee4d218b60271a10ef8c8c8ba6798621d42cc6ce10fdbf9bdddghostscript-9.07-31.el7_6.1.i686.rpm00a99b8b0a1b52888ec123237258e0f7d90c23488f5874d0b166ae4a4604089fghostscript-cups-9.07-31.el7_6.1.x86_64.rpmd7537f4995456f80b56b9fec02d369b4c0a189c30fb0d2a8675cfeefb448b537SLSA-2018:3651-1KernelSecurity Fix(es): * kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target (CVE-2018-14633) * kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service (CVE-2018-14646) Bug Fix(es): See the descriptions in the related Knowledge Article:moderateScientific LinuxScientific Linux 7kernel-debug-3.10.0-957.1.3.el7.x86_64.rpmdae10016b577b02bb693c080a11f4647711a7c9cbec103fa4747a351e9e3d27ekernel-tools-3.10.0-957.1.3.el7.x86_64.rpmf072ed86a9102143c4a0aa579a2c47943bd6603769f5b248a2de8cd917df0dc0kernel-tools-libs-3.10.0-957.1.3.el7.x86_64.rpmf7e3682fbb0faba8b81a7118798495bf63429cee14a76816a80c284e6cd15d6fkernel-abi-whitelists-3.10.0-957.1.3.el7.noarch.rpm5c41090d02ee0e582c84e29843a6a3c40cfa6f23bf5a697d2728c3ba5b2ec919kernel-debug-devel-3.10.0-957.1.3.el7.x86_64.rpmadfd95a42637421b8bf8651575c936cd93f088d353b05d11466cee973efad895kernel-headers-3.10.0-957.1.3.el7.x86_64.rpm068033ebdf2a264105012de02832051a2b51f8246374b699e59150a0af004d13kernel-devel-3.10.0-957.1.3.el7.x86_64.rpm5b7d103154d005372aa611f72680065e714930c9f9ed0c745e7bcce258d68673python-perf-3.10.0-957.1.3.el7.x86_64.rpm4c82bc35d4ec344d5d10a0082abc2141b43d691655d3308844e229e931786d8fkernel-doc-3.10.0-957.1.3.el7.noarch.rpmd1db2a307d557e69f7342d5af1ef223c459bd41e49458161ce2031fa9498e1caperf-3.10.0-957.1.3.el7.x86_64.rpm1ec39a44903aa41f352c82169a6942472034e95cb097cd1381884072618ea748kernel-tools-libs-devel-3.10.0-957.1.3.el7.x86_64.rpm1779b6a9e4f33475766f09924bbda67d77f598343fafe70e737b8ec5b110edbabpftool-3.10.0-957.1.3.el7.x86_64.rpmd45b917fadf2d9517abc3178a05e7156d36593b3162075097bc2a142942d21bfkernel-3.10.0-957.1.3.el7.x86_64.rpmb78a415148da4a95885a7efa8521adde4cbce548220bc1ad255890ed5f4ec9b0SLSA-2018:3663-1Sos-CollectorThe following packages have been upgraded to a later upstream version: sos-collector (1.5). Security Fix(es): * sos-collector: incorrect permissions set on newly created files (CVE-2018-14650) This issue was discovered by Riccardo Schirone (Red Hat Product Security).moderateScientific LinuxScientific Linux 7sos-collector-1.5-3.el7_6.noarch.rpm3bb29005767545a674824c0fdef96a53e5e202dc9549c4982965c879c6cab48cSLSA-2018:3665-1NetworkmanagerSecurity Fix(es): * systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling (CVE-2018-15688)importantScientific LinuxScientific Linux 7NetworkManager-glib-devel-1.12.0-8.el7_6.x86_64.rpm71a65001e23353156cc80d68b62246ba4f1537434f35c8a61067f60f451ce19eNetworkManager-libnm-1.12.0-8.el7_6.i686.rpm02c80598bb10afce9d886aa042de2b94ddfec1d200c541c28c68ea6f788c0fc8NetworkManager-glib-1.12.0-8.el7_6.i686.rpm24f4b7741f5db37c47070e70cc3f5ba04a2574fb823be26fd24a59eb10140a0aNetworkManager-team-1.12.0-8.el7_6.x86_64.rpmfab545bbbb859f10ed41bd5361622990c8b29f80622f8e6c95fe3a66bd6e4a9aNetworkManager-ppp-1.12.0-8.el7_6.x86_64.rpm02137bd22c95de1e78210b25e717d8841ebbbbf025063c5d2cec8c6daa2860c6NetworkManager-adsl-1.12.0-8.el7_6.x86_64.rpmd3ae72cd0f7ed2aaf0bee9af504756a3b963a8dc24587e4af3f08c27ae373253NetworkManager-glib-1.12.0-8.el7_6.x86_64.rpm3362cd5ee27a690adfeba59bf556f68ada7c29052b93df5da000a115b5f2b2a8NetworkManager-dispatcher-routing-rules-1.12.0-8.el7_6.noarch.rpmc4eb225da61338c054b54a6439cb83f70b4dca80c106083e1ee0e68e3459d202NetworkManager-tui-1.12.0-8.el7_6.x86_64.rpm9019a638357b8a846b7418a66008496690a48392b17184679f5e174fbc220db7NetworkManager-wwan-1.12.0-8.el7_6.x86_64.rpm476aa0e351bb97efcf742596cf080c26bf5c1c4c9ded6cb983a3f234ba0a93cdNetworkManager-libnm-devel-1.12.0-8.el7_6.x86_64.rpm91df2817a7cb6eda0494700502396bca44bbdbbb3df9518c60a31dbe96efe8e1NetworkManager-wifi-1.12.0-8.el7_6.x86_64.rpmdd8b2b17cfc90e1106f6b92ab1b8a37324accf414a89b54043aa96e5659edfffNetworkManager-glib-devel-1.12.0-8.el7_6.i686.rpmf0c473945818a2a6d019cd2241a0bb17ff40834a4892fd21662b0553a6a2041dNetworkManager-1.12.0-8.el7_6.x86_64.rpm9616db8513bc1793576a3a92a0af18839ba522e54ba73e88a14920db7765419cNetworkManager-libnm-devel-1.12.0-8.el7_6.i686.rpme7561c497d0a076b2c2c20e9e2bd3826125901c3a20c7355d07d3515a7ce5a1dNetworkManager-libnm-1.12.0-8.el7_6.x86_64.rpma62b170a0bfab3ffed2a8870f1a39fa819b19e7c2ea05a38e66a612a27b1adaaNetworkManager-config-server-1.12.0-8.el7_6.noarch.rpm162fe886ccb3a82da23d6e4af79c98a8a31c36d79a869d655d311df9af7b28ceNetworkManager-bluetooth-1.12.0-8.el7_6.x86_64.rpm6c088e0fed8bcf08ed6b41f213738d36425de88d72515584a0f602d124c9dd93NetworkManager-ovs-1.12.0-8.el7_6.x86_64.rpmd3ba5331ff1663af9ae3f7ce5bc3af6fb8711467022c5e03679ee48d4b24a60bSLSA-2018:3738-1RubySecurity Fix(es): * ruby: OpenSSL::X509::Name equality check does not work correctly (CVE-2018-16395)importantScientific LinuxScientific Linux 7rubygem-rake-0.9.6-34.el7_6.noarch.rpmbfbb8086592edfdaeb0170fd0ccd43610d8e037b1759c2ddf363ce063146b751ruby-doc-2.0.0.648-34.el7_6.noarch.rpm972ccc5b81d71898fafe3f75fb5fd7b5f6cb60f3334375e2c9e251d702d96432ruby-2.0.0.648-34.el7_6.x86_64.rpm3dd0692e353d20ad99e2734a6dcf4b7644289a1da3191df958131624539312ffruby-irb-2.0.0.648-34.el7_6.noarch.rpm2e7c26b03c574095a475aaa68594b255d908bf5a9e0c325025178f5c48615b74ruby-libs-2.0.0.648-34.el7_6.i686.rpmb850a343c83e25e9e3518b41fdcbc7d475f7d36286d516682b7ab5cac0ad93d4rubygem-rdoc-4.0.0-34.el7_6.noarch.rpm29c666387d7cfe9086c09ff244b5c20434c0e32d1c76a9bdf4191dcb6eb8db29rubygem-json-1.7.7-34.el7_6.x86_64.rpmb27ec8c22c2f1aa281b1e30886a8d9f5613f98270a3ade2bae5b542151253307ruby-libs-2.0.0.648-34.el7_6.x86_64.rpmc1a4edbb5f8f2209ef882c60cadc2904f5d4c1a936111d83351e634e780db074rubygem-minitest-4.3.2-34.el7_6.noarch.rpmcecd8891eecab06a7d3ab4ca7a3fc2349b2a749cc7cd011cc8d9d3e064adcd2drubygems-2.0.14.1-34.el7_6.noarch.rpm3a72e31cf0b11a6176c2e7aac0cdefbda78f0b74ca272a8cacf7f0bbd89134a9rubygem-bigdecimal-1.2.0-34.el7_6.x86_64.rpme584dd299fae6dd23f6e4fc8d16edfb235e342166a31f149aa560f62a48a52f4rubygem-io-console-0.4.2-34.el7_6.x86_64.rpmc52f0078ecd28580ee48fa21bf55090413d05a4bf8eb9a602fe2df15a59c7974rubygem-psych-2.0.0-34.el7_6.x86_64.rpm20a5080298421b2d0ebf5046f79d3ae70e4b2aa9f3caeff652a5617d64d49187rubygems-devel-2.0.14.1-34.el7_6.noarch.rpm742177ea1f7ce738a0e3cb82645547655dd4655f68495f51b6c02d29478e816aruby-tcltk-2.0.0.648-34.el7_6.x86_64.rpm47ab6a3e1708c664474dbf4c7eb6d34dc7a783ce2eb37fb30fc92853623483c0ruby-devel-2.0.0.648-34.el7_6.x86_64.rpm26e639ce3df021bfc0316bb14549c326d3d8964365dc7813b565ffbf12c11247SLSA-2018:3761-1GhostscriptSecurity Fix(es): * ghostscript: incomplete fix for CVE-2018-16509 (CVE-2018-16863) Bug Fix(es): * Previously, the flushpage operator has been removed as part of a major clean-up of a non-standard operator. However, flushpage has been found to be used in a few specific use cases. With this update, it has been re- added to support those use cases.importantScientific LinuxScientific Linux 7ghostscript-doc-9.07-31.el7_6.3.noarch.rpmdc8bde86c77f68aaed7c4b8db632451c2aeffd58ef201cd14f3f6dbd646287aeghostscript-devel-9.07-31.el7_6.3.x86_64.rpm1b2255a9120c2e1b73690073beedab024c623fc366b65cc190538a3b86afcc64ghostscript-devel-9.07-31.el7_6.3.i686.rpmdd17f3411e714c137c18ad94c20d6352b1234c13baa0844ab2a9c95105e6b661ghostscript-gtk-9.07-31.el7_6.3.x86_64.rpmba399aa168c484cbbaf2624d5d97f6af07ee7158147b6e97894787ec398c2c60ghostscript-9.07-31.el7_6.3.i686.rpmf1b46bf7d7f6342f996c36fe02bdb37f51a6a048b8cca7001c7e862e76129608ghostscript-9.07-31.el7_6.3.x86_64.rpma7f571bdb4fe1cc653a586dee11ec80fe6d7b81fdd327a6a1883f1031846e751ghostscript-cups-9.07-31.el7_6.3.x86_64.rpm3b467817c1ce92283417ea6229b46a225bf181fbcbd72c53efca5c4cb61fb8faSLSA-2018:3833-1FirefoxThis update upgrades Firefox to version 60.4.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 (CVE-2018-12405) * Mozilla: Memory corruption in Angle (CVE-2018-17466) * Mozilla: Use-after-free with select element (CVE-2018-18492) * Mozilla: Buffer overflow in accelerated 2D canvas with Skia (CVE-2018-18493) * Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs (CVE-2018-18494) * Mozilla: Integer overflow when calculating buffer sizes for images (CVE-2018-18498)criticalScientific LinuxScientific Linux 7firefox-60.4.0-1.el7.i686.rpmd112f50633333a750e33ee4ae53901045672d1e9ea52c66a4ac0e1e3a5ccc522firefox-60.4.0-1.el7.x86_64.rpm7aa3478c46c5825dbe9d9c40f52760dd050615774e2742c2758dc4e51aea2134SLSA-2018:3834-1GhostscriptSecurity Fix(es): * ghostscript: Incorrect free logic in pagedevice replacement (699664) (CVE-2018-16541) * ghostscript: Incorrect "restoration of privilege" checking when running out of stack during exception handling (CVE-2018-16802) * ghostscript: User-writable error exception table (CVE-2018-17183) * ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) (CVE-2018-17961) * ghostscript: Saved execution stacks can leak operator arrays (CVE-2018-18073) * ghostscript: 1Policy operator allows a sandbox protection bypass (CVE-2018-18284) * ghostscript: Type confusion in setpattern (700141) (CVE-2018-19134) * ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c (CVE-2018-19409) * ghostscript: Uninitialized memory access in the aesdecode operator (699665) (CVE-2018-15911) Bug Fix(es): * It has been found that ghostscript-9.07-31.el7_6.1 introduced regression during the handling of shading objects, causing a "Dropping incorrect smooth shading object" warning. With this update, the regression has been fixed and the described problem no longer occurs.importantScientific LinuxScientific Linux 7ghostscript-9.07-31.el7_6.6.x86_64.rpm71a2b5b66410e23b951c33f0c0a8273cb3749c992b6415ed1ef19488256a96f2ghostscript-9.07-31.el7_6.6.i686.rpm90ce694187d10a88bb142771ca9c6f0909d42b1a0bcf61125acf080ec1bdc509ghostscript-cups-9.07-31.el7_6.6.x86_64.rpm55dba389eaaacb6f70ab14e0fa7e02ef91cb915b62a3f9422aaf52b1a45a7362ghostscript-gtk-9.07-31.el7_6.6.x86_64.rpma8a0797d405c078c2f1ed98e918814b5d1749ad6b5650ed41cca0e9ea835ca42ghostscript-doc-9.07-31.el7_6.6.noarch.rpm6a7e555ab2210b1b948912c7c0c92e8237a9793c9c0ac5c9e2a4cb9550ea09b1ghostscript-devel-9.07-31.el7_6.6.i686.rpm5861277b6e5e33fcc38de3debf3ede9cae23c27a60b29c98968e586a9404af4bghostscript-devel-9.07-31.el7_6.6.x86_64.rpm76add74c2facaa92f53d27021c56a85569f761765ca184bfbdb7bda54dba36ecSLSA-2019:0022-1KeepalivedSecurity Fix(es): * keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution (CVE-2018-19115)importantScientific LinuxScientific Linux 7keepalived-1.3.5-8.el7_6.x86_64.rpmb942ab03efa6dcf9a580aa10b128328b86e273c961a0f56ce3102dd055c409b5SLSA-2019:0049-1SystemdSecurity Fix(es): * systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling (CVE-2018-15688) * systemd: stack overflow when calling syslog from a command with long cmdline (CVE-2018-16864) * systemd: stack overflow when receiving many journald entries (CVE-2018-16865)importantScientific LinuxScientific Linux 7libgudev1-devel-219-62.el7_6.2.x86_64.rpm22607bc4a1fa8202d0b226d56d738aadd6f752b766965aadf64e6c77adfcadf9systemd-libs-219-62.el7_6.2.i686.rpm65dbbcbf02b651a11e568989f5efb2ad152ea20a63e23f5d15ba109f20de950bsystemd-sysv-219-62.el7_6.2.x86_64.rpmec86080f6a609344b77cad72f32fdf54342378a0ff8300d90776a7c65097c57fsystemd-libs-219-62.el7_6.2.x86_64.rpmfa41c657cd5cda8d950b73949cbfc80b4efec6dfa64e5047431c1dab4a848080systemd-resolved-219-62.el7_6.2.i686.rpm9ea3631370d0d0b263070377f242a25ceb214a215b2b5002ce1cea0b680a6df4libgudev1-devel-219-62.el7_6.2.i686.rpm9d8dfac998956e1e91270b6af0657194441a3eefeeb0ef3c1fda99c47c5265b4libgudev1-219-62.el7_6.2.x86_64.rpmeafe889b8092a3420f5cf6bd787daa2a402fb285c5024e8b43383c8ecbe72930systemd-journal-gateway-219-62.el7_6.2.x86_64.rpm6250ad9f8dd5a33851da21eace739a3190ce4c03952ad8f620f8cec5ec548b9csystemd-resolved-219-62.el7_6.2.x86_64.rpm7dd30c557ed0d3dffb41314b737b8d5dd5d7a32397ae089d58050de3f8692971systemd-219-62.el7_6.2.x86_64.rpmb53511456522c9ccbb8780a9df82eeea19f585da266782add8dde11d1985f8ddlibgudev1-219-62.el7_6.2.i686.rpma8670ff0727c24dbfe4617a89a2e255a7170b6a402e1d91985eab5f7911b032esystemd-python-219-62.el7_6.2.x86_64.rpm0625de7759c3863ee71af805e7259961014e1f3a95d14a7f9e66133e12926890systemd-networkd-219-62.el7_6.2.x86_64.rpmc994f96329501be7cc1cce348bb643cb686129a63af4fc52d23b777ce76c2af9systemd-devel-219-62.el7_6.2.i686.rpm048a5988f8370c6b5d16be82ae7420f075c27460fe6f0fa8f90977551d640a89systemd-devel-219-62.el7_6.2.x86_64.rpme930f1f3e086b549f0bf310cccee04b8f2c6ad9bd4c78ff9d6a1f55cf45141c8SLSA-2019:0059-1LibvncserverSecurity Fix(es): * libvncserver: Heap out-of-bounds write in rfbserver.c in rfbProcessFileTransferReadBuffer() allows for potential code execution (CVE-2018-15127)importantScientific LinuxScientific Linux 7libvncserver-0.9.9-13.el7_6.i686.rpm5d8595e3c342f850867d601329e6994331a19f46d5abb00fa4ba27e35b1962edlibvncserver-0.9.9-13.el7_6.x86_64.rpmf1eba77a642d5c5e7aa2d082713cb03dbd1f57d47f9dac983d3b4c8a11d2b53alibvncserver-devel-0.9.9-13.el7_6.x86_64.rpm34ed18dc8410927f0d8b9bc75d9c6b63cf17b80717a6ff273e9682979a47258dlibvncserver-devel-0.9.9-13.el7_6.i686.rpmf0fcd95a91d8979c86977c522eff61360ef5899dd00d417158d03afb115e2726SLSA-2019:0109-1PerlSecurity Fix(es): * perl: Integer overflow leading to buffer overflow in Perl_my_setenv() (CVE-2018-18311)importantScientific LinuxScientific Linux 7perl-IO-Zlib-1.10-294.el7_6.noarch.rpmedf4f9693c82e4b6bd2b0a9893d649c24267d6be14309b97e62678914da88791perl-devel-5.16.3-294.el7_6.i686.rpm57cec55b2efe28598509fb6a97c590e0060f1d93e6ead02f59575d5225c4e0dfperl-Package-Constants-0.02-294.el7_6.noarch.rpm6e4b4b3761593923c8da62e5c4c848f0d6d04345b19e25bb41b8b58540ae2d17perl-ExtUtils-Install-1.58-294.el7_6.noarch.rpm2b72fc269df845e6d70129ff60ae5682799b26dbd0eff416726cd27388884630perl-ExtUtils-CBuilder-0.28.2.6-294.el7_6.noarch.rpm91b8aaf71189e97e5e65817363089d8c61a443831065d6e1cbc6afbcbf499d48perl-Pod-Escapes-1.04-294.el7_6.noarch.rpm30969fba71886faba27f8f3e0ff0b62f71423a7f1b6604331d0ee6655f7436faperl-devel-5.16.3-294.el7_6.x86_64.rpm5cdc80ba74a730a2701cb4d43a889cee11a31874d762123eb84cca8183c68f95perl-tests-5.16.3-294.el7_6.x86_64.rpm9903361400d7705bc9c76ca668d271e010f05b5507c08afd2b718f460e2f3e03perl-ExtUtils-Embed-1.30-294.el7_6.noarch.rpmc5bff862e7ff2d44b1955eb8e6d54aa2d5c588e1afbd8633c30aabea1a493a03perl-libs-5.16.3-294.el7_6.i686.rpm89ac0b813a69a4e34605fea3d6d481d47287603326eb92192902d5c7a40b3845perl-CPAN-1.9800-294.el7_6.noarch.rpmb07be44b857f347df2c06828b1ba4d051b8699e303ffbb0c38816108be20f193perl-Module-Loaded-0.08-294.el7_6.noarch.rpma708fbe29bea7f70b6f50df5fc903b51de95070dcdeea6e47197ff1abbae564cperl-macros-5.16.3-294.el7_6.x86_64.rpm49343b448f3fc5ca059b97f684f77bb0ecb38a82396e7c111aeb45fd15c4b668perl-Object-Accessor-0.42-294.el7_6.noarch.rpm3365e80482b492d739cdc7273c28a540d03b3d4fcb6ea649a7425d97b8a68166perl-Module-CoreList-2.76.02-294.el7_6.noarch.rpmc273663c4cbc2e355af58fc91f8da82a92b3af7c4d25bf913f341482b225b1c3perl-core-5.16.3-294.el7_6.x86_64.rpm91cd3a6358392659b355f0a334e7935cf45ad1f8e953b1bf4ba1f39121c44856perl-5.16.3-294.el7_6.x86_64.rpm9a5cd5bc7c3c47e167361587d143ae971756a8a38064e8ba72a1adbff0d66ae3perl-Time-Piece-1.20.1-294.el7_6.x86_64.rpm752e6dbd357ed4c126431c5473a93467cfdabb14aa9cec89d93f07e44e88ba0fperl-libs-5.16.3-294.el7_6.x86_64.rpmc449b53461bd02dd4cff8b7c24a6a73ad675fe6b3657c8d85528d8890d146b4bperl-Locale-Maketext-Simple-0.21-294.el7_6.noarch.rpm506d9886d3246b412f6825b9b3a23af17246618e1c84f7e4d87ac71d1b648f92SLSA-2019:0160-1ThunderbirdThis update upgrades Thunderbird to version 60.4.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 (CVE-2018-12405) * chromium-browser, firefox: Memory corruption in Angle (CVE-2018-17466) * Mozilla: Use-after-free with select element (CVE-2018-18492) * Mozilla: Buffer overflow in accelerated 2D canvas with Skia (CVE-2018-18493) * Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs (CVE-2018-18494) * Mozilla: Integer overflow when calculating buffer sizes for images (CVE-2018-18498)importantScientific LinuxScientific Linux 7thunderbird-60.4.0-1.el7_6.x86_64.rpm06a305bd4d99477d05f1b0f98cd40e92b8a90bfde854c1803c2c1dd57d5ed768SLSA-2019:0163-1KernelSecurity Fix(es): * kernel: Use-after-free due to race condition in AF_PACKET implementation (CVE-2018-18559) * kernel: userfaultfd bypasses tmpfs file permissions (CVE-2018-18397) Bug Fix(es): See the descriptions in the related Knowledge Article:importantScientific LinuxScientific Linux 7perf-3.10.0-957.5.1.el7.x86_64.rpmb2b2dfe5bb937a4eab8c3b73ab4a1a4ed5eeac352c3af512baf5f45a656235a5python-perf-3.10.0-957.5.1.el7.x86_64.rpm548dfb513c253164978d82eca968ac2ad036a4d5dd0189b9dcf897358e8c5964kernel-devel-3.10.0-957.5.1.el7.x86_64.rpm9e7283070955b09f75f825b9ecc946c78145dd70ef16db762c6bec201c70ba2ekernel-headers-3.10.0-957.5.1.el7.x86_64.rpm840a21209e828818b4d136a39571e8b8555d1195280766aae033e0e00a544994kernel-debug-devel-3.10.0-957.5.1.el7.x86_64.rpm6ae15aaedf396c08ec1f036d049a1236c743b2ab8c6445de20cf7f8da60e0c94bpftool-3.10.0-957.5.1.el7.x86_64.rpm83c5d209e53326b595137fcf77c6eb99ae7d9ad0d44d92665dc4757effd8eb5dkernel-abi-whitelists-3.10.0-957.5.1.el7.noarch.rpma4c61af0157259f0b9dde3f00da697a67fbeafa3c552ca96a4812b0594662f46kernel-3.10.0-957.5.1.el7.x86_64.rpmdfd2208d0b34e63350b196b510f1ed3da7722572a9cc5a15686cbc18508591a8kernel-doc-3.10.0-957.5.1.el7.noarch.rpm012a4ac238ffe9dcf9a6000e7437ca9352a87202dc9d0d32fc6d2c9ec48873f7kernel-tools-3.10.0-957.5.1.el7.x86_64.rpm507f3c0f796bfa153cc9c01f956457c3d35a3b81d18174e0d06147a8567b0b38kernel-tools-libs-devel-3.10.0-957.5.1.el7.x86_64.rpm15e2231d7d0a55f0b839fe5f0cd48befc6dd02876cffa4d840969dcab2fb4a2ckernel-debug-3.10.0-957.5.1.el7.x86_64.rpmef58b84aeadbd614eb766961143ac00c17d634a9d4df0d818597a35f2d7af84ckernel-tools-libs-3.10.0-957.5.1.el7.x86_64.rpm95f8ef248b61f15b6a199d915d52456e2d61521eae7f9e7be81939afb9af74c5SLSA-2019:0194-1BindSecurity Fix(es): * bind: Crash from assertion error when debug log level is 10 and log entries meet buffer boundary (CVE-2018-5742)moderateScientific LinuxScientific Linux 7bind-license-9.9.4-73.el7_6.noarch.rpm2cbbf9763155101ca4b0699c36eb2efef7cadc8cfc23d4d462cc9cd9ea339daabind-chroot-9.9.4-73.el7_6.x86_64.rpmf37a10f7b2f4812cd5da7d7b5a490394cea0479ecf76c24ad8826284142f76b0bind-pkcs11-devel-9.9.4-73.el7_6.i686.rpm1c3c07dc71c42d46e8293ba8c6e6c1659d0a74eacf70d8928f4a0ead56f4882bbind-pkcs11-9.9.4-73.el7_6.x86_64.rpmf535de09ae4a95bc1449d82a6122cff6064daf43d6618bc59eb4928acbc64a2bbind-pkcs11-libs-9.9.4-73.el7_6.x86_64.rpm51efa7ba9062d266303f0b784cfc2d7d6ff3ef8ef6dc3202a5b75368209c19f3bind-libs-lite-9.9.4-73.el7_6.x86_64.rpm9823437c25ebfa56d9a1882c376a01609213f428cbc64b2df31373fa210e048abind-sdb-9.9.4-73.el7_6.x86_64.rpm1a9da3d0d4a4a6b6cea4c33fc9516a30a7e291ad8bee531eebf1e9c4c27445cebind-devel-9.9.4-73.el7_6.x86_64.rpm913a83e5492dfaf7a9f7352cf8443d0ebd26e790171ca4a3fd678bb2da7cdc5ebind-libs-9.9.4-73.el7_6.i686.rpmb23628bf0c701e73b761210100ea613cbb9a002b878335e3ed15416f0cd6004abind-libs-9.9.4-73.el7_6.x86_64.rpmd3721fb8ca503fea5a6d93d8fb44d7cb4f15ae930e5aa20977da7916e35a57f0bind-libs-lite-9.9.4-73.el7_6.i686.rpm1c2dee46025a60931d0fa57fe43c3fbbdac4ce74f26a6692de637c4d7a2b0654bind-pkcs11-devel-9.9.4-73.el7_6.x86_64.rpme16a55490c423c7b35ae6599954443825df8c3d1782863c2aa9237b85ad689d3bind-pkcs11-libs-9.9.4-73.el7_6.i686.rpmf0b8e5b4477bafba2d6ef0c0a51eda0b9ebe2e46d8e296a76fa824a12fb1bfb0bind-utils-9.9.4-73.el7_6.x86_64.rpm2a110da2d6c841a72aba898e09b38a8861296ca982d82e3baf872d7eda41b47bbind-lite-devel-9.9.4-73.el7_6.i686.rpm3fa394e241ecfe90c68fc2dbf107a76aae501beb4c00329a0b5d1e08fd3c501bbind-devel-9.9.4-73.el7_6.i686.rpm0a5e76dc91d115ba1ad743c4c8d46aa22fa4513d97d92a74085ffcd128362fa6bind-pkcs11-utils-9.9.4-73.el7_6.x86_64.rpm807947dfd1ea3dea4a0073e87dc3f6cdb338a5e676ead4c0337220b2ac9b08aabind-sdb-chroot-9.9.4-73.el7_6.x86_64.rpm95ac7fb80835ff0352b341771b5c2c7871c645d8366557eb48929d1eb1b003dfbind-9.9.4-73.el7_6.x86_64.rpmcb9e450e99af6d99da1dd02c83e9b590cecd033bec732c96738cb58d6c003fbfbind-lite-devel-9.9.4-73.el7_6.x86_64.rpm38676046a766151eea148552368c8c0216cf043486df2f507a6d697bc1d7d23bSLSA-2019:0201-1SystemdSecurity Fix(es): * systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864 (CVE-2019-3815)lowScientific LinuxScientific Linux 7systemd-resolved-219-62.el7_6.3.i686.rpm72d45808e5a3f9cfc61be4c01f38c95c0637a5af2c9896da9cb90daaa3a01377systemd-networkd-219-62.el7_6.3.x86_64.rpm1aa58f3dc5d0ee43f6e194fe4b78186fed43d594eb4bff4067d29576144e48d0systemd-python-219-62.el7_6.3.x86_64.rpm11ca08f4b489f4a281ed57700399bf327224264ff7cbb0925c56084a04e41787libgudev1-219-62.el7_6.3.i686.rpm1d00b6696fd06472873d1ddefe0a255c99026cff55cda70ebb7a08bb1a9308ebsystemd-journal-gateway-219-62.el7_6.3.x86_64.rpm36916fdc6130e4372d01176be674323ff4cd0335f7cd83c663405f9c9a68660asystemd-resolved-219-62.el7_6.3.x86_64.rpmafdc719e149703d994f80eb8540e3b29d66aa9862263a6f4969ba8a69462d858systemd-libs-219-62.el7_6.3.i686.rpm7ba9527407079df8cc48b95987cd7d17b1373377dce4acd76f8bfb7755fde33esystemd-devel-219-62.el7_6.3.x86_64.rpm4d0d69c7c6d588ee85b090ad63cfa970cd8f9e3c09a9d7910492e322580b0761systemd-219-62.el7_6.3.x86_64.rpmd90b348c3e41c029a595b32d0794eabc559c86301e11972ca598b139ec9c9071systemd-libs-219-62.el7_6.3.x86_64.rpm3ca659f933505799dabfa9ef668f16b7eedd663fb6b4fefa3c06d70a1803015flibgudev1-devel-219-62.el7_6.3.x86_64.rpm028697d040b359f1bb0b5ad649a1232458dda401d113178372c70cf74ced8af3libgudev1-219-62.el7_6.3.x86_64.rpma71d10739b2e66fee55a55acaf3a6aa1e81aae9b53d9115bb707934a1a5249c6libgudev1-devel-219-62.el7_6.3.i686.rpmc452c85d8bc6ab488511d29b70167a74e8b9a7fa64506b03024234518a340557systemd-sysv-219-62.el7_6.3.x86_64.rpmdfac0ce057468029c5fe008bd909ee696f8d7f431cf0880815dce8e8c92bc0b7systemd-devel-219-62.el7_6.3.i686.rpm384534799736607e48176f74c6ff03464e59343652757a7d8553290e17c27eacSLSA-2019:0219-1FirefoxThis update upgrades Firefox to version 60.5.0 ESR. Security Fix(es): * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505)criticalScientific LinuxScientific Linux 7firefox-60.5.0-2.el7.i686.rpmaec7d2072cc8bd01786e91a974c7865a0b69d0b7936ae8db1e616e9b137e51e2firefox-60.5.0-2.el7.x86_64.rpm132bdea7250ad963598418fe366ec62e54c9a241a8ef8b5acbb1f31c7350372bSLSA-2019:0229-1GhostscriptSecurity Fix(es): * ghostscript: use-after-free in copydevice handling (699661) (CVE-2018-16540) * ghostscript: access bypass in psi/zdevice2.c (700153) (CVE-2018-19475) * ghostscript: access bypass in psi/zicc.c (700169) (CVE-2018-19476) * ghostscript: access bypass in psi/zfjbig2.c (700168) (CVE-2018-19477) * ghostscript: subroutines within pseudo-operators must themselves be pseudo-operators (700317) (CVE-2019-6116) Bug Fix(es): * Previously, ghostscript-9.07-31.el7_6.1 introduced a regression during the standard input reading, causing a "/invalidfileaccess in --run--" error. With this update, the regression has been fixed and the described error no longer occurs.importantScientific LinuxScientific Linux 7ghostscript-9.07-31.el7_6.9.i686.rpm57c9536f144184b674d066ceca43f613c9afd0a5838e16478d221be5c54a2109ghostscript-cups-9.07-31.el7_6.9.x86_64.rpmf0947a84149a0a8191b31c42fa55019c07766295a45df68c89c34dc6b5a49adeghostscript-devel-9.07-31.el7_6.9.i686.rpm34aad672b1d7aceec306a59e329be7985f14075be6c4c46ad8c3f6a725b282d6ghostscript-9.07-31.el7_6.9.x86_64.rpm6d0483d59f86cc3bced027543fe6e511c126dad5110596c63b28c585cd2511e1ghostscript-doc-9.07-31.el7_6.9.noarch.rpmdba5befc5adb895e5b1ab4788197d6e588c431501bf432cf1d333145ff5a930bghostscript-devel-9.07-31.el7_6.9.x86_64.rpmefb676257f0d34683d7077250b59e1e8f774285435f0de11c56d24ea0365391eghostscript-gtk-9.07-31.el7_6.9.x86_64.rpmf04116841e31feb5cafa8db65f0b2586e8a1064aa1cd800a098fc411eccc7172SLSA-2019:0230-1PolkitSecurity Fix(es): * polkit: Temporary auth hijacking via PID reuse and non-atomic fork (CVE-2019-6133)importantScientific LinuxScientific Linux 7polkit-0.112-18.el7_6.1.i686.rpmf0f294939b799b7e5b866bb33e7bc90cd7a37ad1ad19ac3cac908b06e0cc4e24polkit-0.112-18.el7_6.1.x86_64.rpm1186403496b22e7be1deabb2cea2587c77d9ae7214e79dda9b73128af89a7b1bpolkit-docs-0.112-18.el7_6.1.noarch.rpm1ba9c5e5c382c31d5e0993b1b1111a13e8a4793daf4fe1bea32f9a4c9551feeepolkit-devel-0.112-18.el7_6.1.x86_64.rpm7f27e195fc9f392168e36af97e5768861b82b3a72a5e756d8b180b52fb472a85polkit-devel-0.112-18.el7_6.1.i686.rpm127495e03bc0126eee9c29dfb284dc8cf661e659b7eecd72b94faea7ce87a0b7SLSA-2019:0231-1SpiceSecurity Fix(es): * spice: Off-by-one error in array access in spice/server/memslot.c (CVE-2019-3813)importantScientific LinuxScientific Linux 7spice-server-devel-0.14.0-6.el7_6.1.x86_64.rpmb40a43290816336fb8e755225d5712cd2c18732e540a1369a9e9cf16102a65easpice-server-0.14.0-6.el7_6.1.x86_64.rpm520734166c2a080ff024951a16029b3f3a1326a65003eb6791a0bdd951d2d2e0SLSA-2019:0270-1ThunderbirdThis update upgrades Thunderbird to version 60.5.0. Security Fix(es): * Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) * Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) * Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) * libical: Multiple use-after-free vulnerabilities (CVE-2016-5824)importantScientific LinuxScientific Linux 7thunderbird-60.5.0-1.el7_6.x86_64.rpm2f873ebe7e2ec619b89a814650c62512a350900732811175764c24fb3d0af840SLSA-2019:0368-1SystemdSecurity Fix(es): * systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash (CVE-2019-6454)importantScientific LinuxScientific Linux 7libgudev1-devel-219-62.el7_6.5.i686.rpm3d1c03bf86f8c31cfcc812bdbf6c533d0a3bad905a1bd2b6dfdfa67554cda738systemd-devel-219-62.el7_6.5.x86_64.rpm455687ef620ee03c6db755046593450b8ae09f51e9aef84435ea0f798c6ab8c1libgudev1-219-62.el7_6.5.i686.rpmeec2fa91ee5e26224a06997d850af9cb272d29c37402c3dc9e395389054ae935libgudev1-devel-219-62.el7_6.5.x86_64.rpm3583afc88cd9d2cac8727f724f12c868507e3aac1ce34014b183d0cbb6cc8360systemd-219-62.el7_6.5.x86_64.rpm4115483c8ec35d6f5342359c6887ff05b03150021cea6e76c15c74a50129a060systemd-libs-219-62.el7_6.5.x86_64.rpmf8c623b1283d1d8012496690208f5dc6048546169982896155750336d3026900systemd-devel-219-62.el7_6.5.i686.rpmbfec30cd13fa07f488909525ceb837c2a670f3254e796a6fd8bd3cae045ee2a4systemd-networkd-219-62.el7_6.5.x86_64.rpm0523fb3e5541505fc86fb2ed1891dd18cdc5a1557c1e7e15a07603ac83f0ab11systemd-resolved-219-62.el7_6.5.i686.rpmd53f19dffa30a7a9eeedfee06d668b60dda33001f4904d75bfde2196cbe35a45systemd-resolved-219-62.el7_6.5.x86_64.rpm5f3cd94ecf66db375dc0e924ccb2a391ae681a1ad5b930afc7c716c08746183esystemd-sysv-219-62.el7_6.5.x86_64.rpm65721f80987c26e90799a4aaa44255c000f38c1bfa2aceae6d1595634c0f4733libgudev1-219-62.el7_6.5.x86_64.rpm38ed300d14673fbd51920183aae79e48376816764273e6b6333d34673d79ce0esystemd-python-219-62.el7_6.5.x86_64.rpm0198f0c5c3f3673d92cd51bf40aad50ec938678238cbe6b9807f7cc5deaa77e0systemd-libs-219-62.el7_6.5.i686.rpmca90f41423d04222a1b538fd587038fef54fe2d2c591087688637577f1e2740fsystemd-journal-gateway-219-62.el7_6.5.x86_64.rpma7a1125c9f89f20155e415b4d22062033eaa5c7749007c95a32f14a84e1bd40bSLSA-2019:0375-1FlatpakSecurity Fix(es): * flatpak: potential /proc based sandbox escape (CVE-2019-8308)importantScientific LinuxScientific Linux 7firefox-60.5.1-1.el7_6.x86_64.rpm0d6d881c5ee9dd40267f169009ba68086b3aefc16fea5ce4a9bb86125c6e3ce5flatpak-libs-1.0.2-4.el7_6.x86_64.rpmc7c0233233e2feed16b6e28bc2fae7cce6a185d8bb91e4ed3aa3722ca4fe60a6flatpak-devel-1.0.2-4.el7_6.x86_64.rpm747df7171f6fea8dbdf37add1291aab3b9382b279f5e45929005a4ee00b10d15flatpak-1.0.2-4.el7_6.x86_64.rpmb72f402752a545037886b8da47ec7d5978b6491d1b5fad6a087053d93d8f16a8flatpak-builder-1.0.0-4.el7_6.x86_64.rpm5500731153aae9f0ab075cf17b0d09f3753f55d9130ea191cbfc6a1d4d96e487firefox-60.5.1-1.el7_6.i686.rpmfd15ca749282f0b222c69a3ecddf0dffe62cefab320d33c5feec1ac16f024e95SLSA-2019:0435-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-devel-1.8.0.201.b09-0.el7_6.i686.rpmae3e135fc63155f038bcbd7cb17c29979a7fa4475368e8dfb15024ac61a1534djava-1.8.0-openjdk-accessibility-1.8.0.201.b09-0.el7_6.x86_64.rpm64df5984bb65e41da88fe2a558b3105c8847d03a0fb15f46602014e70f7760a3java-1.8.0-openjdk-src-debug-1.8.0.201.b09-0.el7_6.i686.rpmfbea38a8b1593c627a801e1e2d1a7f9209c637e64709fc6509455b0e99a2cbc2java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.i686.rpm2a43d3a9d4adc08b49afc366cc0eb5b15c21fe3848639cfe9581ee999bbf6223java-1.8.0-openjdk-javadoc-1.8.0.201.b09-0.el7_6.noarch.rpm203897aeca04c37ae3fe24fa25c35b09f20a80fca2dd8d217f0b72c2c1ef2fcdjava-1.8.0-openjdk-accessibility-debug-1.8.0.201.b09-0.el7_6.x86_64.rpmf2288036bc63664a34226623366a884243ca3e7910894dbfe73e7b9087b3b08cjava-1.8.0-openjdk-headless-1.8.0.201.b09-0.el7_6.i686.rpm824f5e7fe0b6a5454713b20c87dd0626bb496a4713f640e98361d6b6a0a68942java-1.8.0-openjdk-devel-debug-1.8.0.201.b09-0.el7_6.i686.rpm176ec27a417ab43c9d3268009faa20aa7c02c8099a8ac7b3ff42211778d5b318java-1.8.0-openjdk-demo-1.8.0.201.b09-0.el7_6.i686.rpm75bb036c896de5c0ba70b530196f48abcf81a852f45dc3d9d132700f47c84a3ajava-1.8.0-openjdk-headless-debug-1.8.0.201.b09-0.el7_6.i686.rpmc052ce72ed7b273fe38034d549b310fdb44c3e6dbf3df11de6f7a626ce646ad7java-1.8.0-openjdk-src-1.8.0.201.b09-0.el7_6.i686.rpm331428ec521a2ef3b6cb64b2bc956058f51ab82a9f4bd073c0d916d462317fb7java-1.8.0-openjdk-demo-1.8.0.201.b09-0.el7_6.x86_64.rpm53fe35b0fbe519e63457850b76876340300f753fd80ce3c70db423976cd74edbjava-1.8.0-openjdk-javadoc-debug-1.8.0.201.b09-0.el7_6.noarch.rpm3ffe74b81c73e37ed8bce998d3827cc72e2a01756d1ad81d915ffc7b39482a2fjava-1.8.0-openjdk-javadoc-zip-1.8.0.201.b09-0.el7_6.noarch.rpmd5f2761915d49f8ef78a242aec082f6b19e97d66f2e97f31336e382f4c6a88b6java-1.8.0-openjdk-devel-debug-1.8.0.201.b09-0.el7_6.x86_64.rpmc6ccf80c8d953429de9336bebd0ccd7052ab770331a4ba98457fdb073455ea34java-1.8.0-openjdk-headless-1.8.0.201.b09-0.el7_6.x86_64.rpm81254faec19c63949ef07bbcbf8f283c0f9948a141d4320b20256b4289a2c188java-1.8.0-openjdk-demo-debug-1.8.0.201.b09-0.el7_6.i686.rpm0c39bd0f3f5b57e9e19b40f7f924a8df985f732ebfe25344c756e46058cd31a9java-1.8.0-openjdk-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm5055493a1c6e8aeb74bec7e205f274e2053ee8f6a297dbefd2f8d3723a87dd3ejava-1.8.0-openjdk-src-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm3434d2c0b3fb3193a86a6044cd8396c2bdd341dc1892016c68b90ead280f8948java-1.8.0-openjdk-accessibility-debug-1.8.0.201.b09-0.el7_6.i686.rpm7b07fcc2429d6d4255256b3b376e8f9fc6a18c58ae1b65eef1138af022752555java-1.8.0-openjdk-debug-1.8.0.201.b09-0.el7_6.i686.rpm730c5955ad2fa7a19189601668f7ac273a8db0b97064c13803c8ce79c8e695c5java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.x86_64.rpmddef671401d149766abbc1001ca27d9939238bd2dfdc39a33f29b3d7d50d0215java-1.8.0-openjdk-headless-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm2bbd0bc30eb879f40dca7c06dcce8c0f90c5a531a7a70faad62b3e11ea1c561ejava-1.8.0-openjdk-src-1.8.0.201.b09-0.el7_6.x86_64.rpm66424dc25b4308e76e38e2d36026b2f1280202ce1a2049bc146ee64929a672dbjava-1.8.0-openjdk-javadoc-zip-debug-1.8.0.201.b09-0.el7_6.noarch.rpmecd4802fcc7897c7b00b7cd648c2cb0e2c54654d3582ce5f1134e2cf36380683java-1.8.0-openjdk-devel-1.8.0.201.b09-0.el7_6.x86_64.rpm612272297085bdbf9917518199586d8ba40db2d9b9308a2af30de181b5ca6accjava-1.8.0-openjdk-demo-debug-1.8.0.201.b09-0.el7_6.x86_64.rpmd77f12786f96d438c9c4d7622220d45845edc82c2b6f4aabafa694aea112789bjava-1.8.0-openjdk-accessibility-1.8.0.201.b09-0.el7_6.i686.rpmf9637ae53d74bb326eac9274b766f35b84804895600ed4adfe9cff40d13c263aSLSA-2019:0436-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)moderateScientific LinuxScientific Linux 7java-11-openjdk-debug-11.0.2.7-0.el7_6.x86_64.rpm9e6d226ba7de34e66841596377d22da8071f388dee49a3c848359984e24ef7e4java-11-openjdk-devel-11.0.2.7-0.el7_6.i686.rpm0880e44ef033479d3abb3fac34b5f89e56c91c3904bd05344286126278d4d5e4java-11-openjdk-jmods-debug-11.0.2.7-0.el7_6.i686.rpmfa260754069e01c3e8e60232562c52850d68c255d841e66e20becace158fd3afjava-11-openjdk-devel-debug-11.0.2.7-0.el7_6.i686.rpmebddbf4a7903c282a14adae0ccab35d87e24a259e52bdc35075602ae39c2ea55java-11-openjdk-src-11.0.2.7-0.el7_6.i686.rpmf7a114ef59b3249d3270a8e28be23b8869543562ff0e4b9dc9268afe0fda44d0java-11-openjdk-javadoc-11.0.2.7-0.el7_6.x86_64.rpma0646831347fa8e18e0cc73cc6cd057d0d41513a5a11172cb8ce4bda4254e03cjava-11-openjdk-devel-11.0.2.7-0.el7_6.x86_64.rpmccc4b51dbeb1ef7371ffba8f2b132ae88f0fa593ae9d0ded7b95f2deb0989b53java-11-openjdk-11.0.2.7-0.el7_6.x86_64.rpma3fc47154227450cb16413908dafbfa38469c09e0e907e7f290d8ab7141e168fjava-11-openjdk-demo-11.0.2.7-0.el7_6.i686.rpme7eec0123b8bf9d0175869d98043ff8c51f9ec754b09c0ab5f0bddb326bf7ba3java-11-openjdk-headless-debug-11.0.2.7-0.el7_6.x86_64.rpm8d35f24a89907a347938a1499c75336e609edde927299651aea8aabe90712d53java-11-openjdk-demo-debug-11.0.2.7-0.el7_6.i686.rpme49ba4c71a9818dede2f40751d37ad4acac3daee0ee0b05045d516b6872676a9java-11-openjdk-headless-debug-11.0.2.7-0.el7_6.i686.rpm5497a1a99c508ad5f15befaa1dff4adfae40f2538a923792d5be7f3cc3535c31java-11-openjdk-javadoc-zip-11.0.2.7-0.el7_6.i686.rpmefbf307521d2881991b0b5168daadc0e4b1cd832e5c26e60e229ea7d2e0af3bfjava-11-openjdk-debug-11.0.2.7-0.el7_6.i686.rpm52a5fe74db459503c3b489fbd6c403e184cec2e521a0df2dcfe6147a48c7b563java-11-openjdk-src-11.0.2.7-0.el7_6.x86_64.rpm1c20dec163f6aebf49bd7d6d519bcf80381083aaf499498ef1011190a87216cfjava-11-openjdk-src-debug-11.0.2.7-0.el7_6.i686.rpm408195bab79684f69cec2e5e598b0db98dd090dc10fe4ca11b9e4c49ac1ae7b9java-11-openjdk-javadoc-zip-11.0.2.7-0.el7_6.x86_64.rpmd0571efe9e428574404ce2fd06523a93e13699b61b4e1513dddc271d1f663528java-11-openjdk-demo-debug-11.0.2.7-0.el7_6.x86_64.rpm9c241704df9182e427cf52a7d30b13b41718076e675b96b301d6e9e2e91d3b22java-11-openjdk-jmods-11.0.2.7-0.el7_6.x86_64.rpm3fe1fc680a3f6cdefcbda4f17b10121067a288ba8dab149195b8445b4f41d66djava-11-openjdk-javadoc-zip-debug-11.0.2.7-0.el7_6.i686.rpm580fca4bbe811cd70ce931cf5bd7998138102a2e48bfc9b7663c8f10c0575732java-11-openjdk-headless-11.0.2.7-0.el7_6.x86_64.rpm55d9ba8bb266d29e9a953012b8eca09c0f0726bdf9b8a29c93e06f0461706754java-11-openjdk-headless-11.0.2.7-0.el7_6.i686.rpm392b798a8089920ccee373cd74e88e04dc0f4cc8a7ce77a48f0e68f9fe10b1cbjava-11-openjdk-devel-debug-11.0.2.7-0.el7_6.x86_64.rpm8f4e0a1327056f8a1d1cfb96925ab8da8ecd05f5ef3a2c37a2ccc4ac4e0f889cjava-11-openjdk-11.0.2.7-0.el7_6.i686.rpm1fc48553b5b68b7943cfb010d59a2402829a2bda3f29b2d54583d36f9291fb0cjava-11-openjdk-javadoc-debug-11.0.2.7-0.el7_6.x86_64.rpm6676bc5a2be0239f73435df30f8eba5b71dfeac7b188eb93150e423c8bad1eb3java-11-openjdk-javadoc-zip-debug-11.0.2.7-0.el7_6.x86_64.rpm7357cce01ecae6d595e0841c665635e50451c2b911a47bc67247249d131aa25fjava-11-openjdk-jmods-debug-11.0.2.7-0.el7_6.x86_64.rpme9329b7d0f43bf857886269debad503ba7bcd2d3d69f12b8ab0cf27ebcc0e108java-11-openjdk-demo-11.0.2.7-0.el7_6.x86_64.rpma89abcf7afad5e354e932328e95bf3e9bd5fe0d10352824efb6a8884d30f8664java-11-openjdk-src-debug-11.0.2.7-0.el7_6.x86_64.rpmc7f6359672b6c5bfd2392c7808033c6ef2a1ab6a694970e4eb34bb598b14fc11java-11-openjdk-javadoc-debug-11.0.2.7-0.el7_6.i686.rpmb8143e95505dbb93fe6cfdcf877d7ffbaa25c7a7736468779a4667e9c5a0d014java-11-openjdk-jmods-11.0.2.7-0.el7_6.i686.rpm9940e3917e4c7389e6bb7216cf2231f130ac33b31d68dcf0d7bd06541fd7c24bjava-11-openjdk-javadoc-11.0.2.7-0.el7_6.i686.rpmf5659ae86f022dd0d417e566b9f3112aa6829b34b345a2dbd29b2a90cc1ef5f4SLSA-2019:0464-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)moderateScientific LinuxScientific Linux 7java-1.7.0-openjdk-devel-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm4429e009259290af76470d0ce741a0ecc9c93e1e5c1d35156898f63a1676ae4cjava-1.7.0-openjdk-accessibility-1.7.0.211-2.6.17.1.el7_6.x86_64.rpme24d876407ac634fd60b6acfda0e572e5d0d442681c3a63b527e744051b8aeb9java-1.7.0-openjdk-headless-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm4a12a36ed0243fcc293b12a59bbdfff803e8af55da344919641af80550947c19java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm253f200360f946add2654512a27249cb881d8046f28c85877ff05b4483b34486java-1.7.0-openjdk-demo-1.7.0.211-2.6.17.1.el7_6.x86_64.rpmbf697711b9eed49a03a9c26e2069f08cfd76950057da2e7d6d26af357a38e974java-1.7.0-openjdk-src-1.7.0.211-2.6.17.1.el7_6.x86_64.rpmdff4b851e82eb967bedb8afbac5486ffa414aa05886094dacf0e73ccac855853java-1.7.0-openjdk-javadoc-1.7.0.211-2.6.17.1.el7_6.noarch.rpm6b6d4e38c7033f7ecde729902ff5efbd072a273b465a5d21dd1de41e13afc55fSLSA-2019:0482-1CockpitSecurity Fix(es): * cockpit: Crash when parsing invalid base64 headers (CVE-2019-3804)moderateScientific LinuxScientific Linux 7cockpit-doc-173.2-1.sl7.x86_64.rpm4ac82cab19bb35a20cc50ee49107a2c916a342fb0614e676e032a437e567ec3acockpit-system-173.2-1.sl7.noarch.rpma1565c03d1789c1f4f7fdac03438bd19b3f0985f037de4dae6521b0406704979cockpit-networkmanager-173.2-1.sl7.noarch.rpm3c2e1b20953a6f640f3eabfda2fa91225decbdaa756e0f7dc67f875d2c72ff3dcockpit-ws-173.2-1.sl7.x86_64.rpmd4ea4688d7a2df121c837d72d0cbd57b2d1924e129af9167d8463a9da09aa419cockpit-sosreport-173.2-1.sl7.noarch.rpm075d7342d406cb8c07b96a1119fbe492bbc8a52ce76ac117ea177333aa568dc6cockpit-machines-173.2-1.sl7.noarch.rpma542e06135dac9ce3834b90bded5246e4c748271a0cb81f736e286424984abdfcockpit-bridge-173.2-1.sl7.x86_64.rpm2d713ca025acedbb219aeb98f20f1f903b34941e35fa897b4984b80a5d41089bcockpit-173.2-1.sl7.x86_64.rpm0eee8501f565da58c3f1d11d51d4ef03440abedb3b16fa7dfcfa4b0d48eb8995cockpit-ws-173.2-1.sl7.i686.rpm364138329723e9b38178bbe49a0a80091aca0401843d873cbd847dbf541c184ecockpit-kdump-173.2-1.sl7.noarch.rpmbf484e47cd94cae941ddd0f17cca229d29208c75fc802db8b48ad6f661730df9cockpit-machines-ovirt-173.2-1.sl7.noarch.rpmf047892fa5f3949bc2bdb5efea717b99fb448ae7f90c649990ec7178356b3146SLSA-2019:0483-1OpensslSecurity Fix(es): * openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) Bug Fix(es): * Perform the RSA signature self-tests with SHA-256moderateScientific LinuxScientific Linux 7openssl-libs-1.0.2k-16.el7_6.1.i686.rpmfb62f00e11cb18f98c62295b720f8f381566cefa6abe827023a1e9500449e363openssl-libs-1.0.2k-16.el7_6.1.x86_64.rpm7f512e48117ef051328210c438b1cf6d9f610a8c2f5412b9a2b288cfd9cacdaaopenssl-perl-1.0.2k-16.el7_6.1.x86_64.rpm6e06287b60ff22c1464d586b3c974b9048d1a03bccdf660d0cf1effdd1cd82b8openssl-static-1.0.2k-16.el7_6.1.x86_64.rpm59edee442d24df6c63caa9024d3912ff53666a893afaf6e01944acb1a6a8dd00openssl-devel-1.0.2k-16.el7_6.1.x86_64.rpm9e090eaee93a39e4fd202c2a07cd0dbebd985ce36599e34242d4a6a099f6e85aopenssl-static-1.0.2k-16.el7_6.1.i686.rpmb0b93902b639423f2f54b94338149c88157ae3d1051c5ec0a3ba1958827049f2openssl-1.0.2k-16.el7_6.1.x86_64.rpm93a925f453b1fc746bed138c58f2c1e4ca4582758a92e51c9972d9a5630811daopenssl-devel-1.0.2k-16.el7_6.1.i686.rpm09c691b507f8ab62c1de0c1ec01f7869b1825162ddc904d84bd9c44149597abbSLSA-2019:0485-1TomcatSecurity Fix(es): * tomcat: Open redirect in default servlet (CVE-2018-11784)moderateScientific LinuxScientific Linux 7tomcat-admin-webapps-7.0.76-9.el7_6.noarch.rpmdbc504cdcf2be911ddd3939bca17aeee0ce432f9542467d915546264a0ed1a4atomcat-jsp-2.2-api-7.0.76-9.el7_6.noarch.rpm6b185f28a02bfdb739f1423559fe6f76011c4d9c994d82691a431902523bbd59tomcat-el-2.2-api-7.0.76-9.el7_6.noarch.rpmb0c84c0462cc46802d19dc1b3b0c8bb007d9026a9965eb200ba699671d9649c7tomcat-7.0.76-9.el7_6.noarch.rpmfe320d6229b720c4ff81e1784df07de317d33688dfdf32ad79767798f3556248tomcat-webapps-7.0.76-9.el7_6.noarch.rpmce679422b631255c06badbfec18d096a297a327a362e7310dc807f673c1efcf5tomcat-docs-webapp-7.0.76-9.el7_6.noarch.rpma37fdc9fa5a0293da1c87ae43ff6504d78bee99ab6cea306ff1d6a43916cdbcctomcat-servlet-3.0-api-7.0.76-9.el7_6.noarch.rpm81949bd783568c08ac12c046871e23f41d9378e349bdf6c57f62e814efa78906tomcat-lib-7.0.76-9.el7_6.noarch.rpme0292d5a66431e1f3f61c899a3e456c29f8eb05316f0b7df1720567af30977eetomcat-jsvc-7.0.76-9.el7_6.noarch.rpm9d5e0214b279408bc8fd76f805bec025bed3968c51df6023eda4ace341dd8ad6tomcat-javadoc-7.0.76-9.el7_6.noarch.rpm40f42562007589bf0b920d46ca64550cd2aee6b981bb45dc2f3cd03f5d9be69eSLSA-2019:0512-1KernelSecurity Fix(es): * kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568) * kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972) * kernel: Faulty computation of numberic bounds in the BPF verifier (CVE-2018-18445) Bug Fix(es) and Enhancement(s): * kernel fuse invalidates cached attributes during reads * [NetApp-FC-NVMe] SL7.6: nvme reset gets hung indefinitely * Memory reclaim deadlock calling __sock_create() after memalloc_noio_save() * hardened usercopy is causing crash * Backport: xfrm: policy: init locks early * AWS m5 instance type loses NVMe mounted volumes [was: Unable to Mount StatefulSet PV in AWS EBS] * SL 7.6 running on a VirtualBox guest with a GUI has a mouse problem * Kernel bug report in cgroups on heavily contested 3.10 node * [PCIe] SHPC probe crash on Non-ACPI/Non-SHPC ports * [Cavium 7.7 Feat] qla2xxx: Update to latest upstream. * Regression in lpfc and the CNE1000 (BE2 FCoE) adapters that no longer initialize * [csiostor] call trace after command: modprobe csiostor * libceph: fall back to sendmsg for slab pages * Deadlock between stop_one_cpu_nowait() and stop_two_cpus() * Soft lockups occur when the sd driver passes a device size of 1 sector to string_get_size() * [SL7.7] BUG: unable to handle kernel paging request at ffffffffffffffff * SL7.6 - powerpc/pseries: Disable CPU hotplug across migrations / powerpc/rtas: Fix a potential race between CPU-Offline & Migration (LPM) * blk-mq: fix corruption with direct issue * [SL7][patch] iscsi driver can block reboot/shutdown * [DELL EMC 7.6 BUG] Unable to create-namespace over Dell NVDIMM-N * efi_bgrt_init fails to ioremap error during boot * Unable to mount a share on kernel- 3.10.0-957.el7. The share can be mounted on kernel-3.10.0-862.14.4.el7 * System crash with RIP nfs_readpage_async+0x43 -- BUG: unable to handle kernel NULL pointer dereferenceimportantScientific LinuxScientific Linux 7kernel-tools-3.10.0-957.10.1.el7.x86_64.rpmb3189219a31a13535c73af90eb74d42563d76438e19e26debc91130668cb4b51kernel-headers-3.10.0-957.10.1.el7.x86_64.rpm0c0c9f94faec904d71bacbbe0c4881c6704a9bba2396ce358fa73f287876d5adkernel-tools-libs-3.10.0-957.10.1.el7.x86_64.rpmfb3c44824368f96d19a86f985f3b24772823c977546e638250f811a36eb7f844kernel-abi-whitelists-3.10.0-957.10.1.el7.noarch.rpmd11ff48bb8d35a721cf6ddcf4bd4c6286e667c63bd55f77e270091dc9bd906fckernel-doc-3.10.0-957.10.1.el7.noarch.rpmca06a39d9bf6b4830d0246a93f287018cae3819e63884340bb9002459d44e5b2python-perf-3.10.0-957.10.1.el7.x86_64.rpmd7f25b2df17bbaded6717359faf0a6ca8d5ae08373ca9133d19a3f6e4a71344dkernel-tools-libs-devel-3.10.0-957.10.1.el7.x86_64.rpmcfdbdfc2936e79f9fcb2a6db69088dc46eaaf1a2ae2c19eef5c76ee31436f08ckernel-devel-3.10.0-957.10.1.el7.x86_64.rpma6f8318ac294af003ba5763c5deda7009f6e4cb7a4d8038171a05f6559e10f4dkernel-debug-3.10.0-957.10.1.el7.x86_64.rpmedb31ac2e58969c93c8a9b64731e0d399bdf5bff603800ac304bd81db2494651kernel-debug-devel-3.10.0-957.10.1.el7.x86_64.rpm8da47207bb3594034475773d0746e520f7c57d3f96f0182802e6a292eb53ca2eperf-3.10.0-957.10.1.el7.x86_64.rpma028d79edf1d8e73e1dd4d76aa7234476f0a12c871c0248a3e1081a93a675ed5bpftool-3.10.0-957.10.1.el7.x86_64.rpm918022d1c9c415597941fc66f0b7659b64ef24ad3fb0e39f912dab855b4a63d9kernel-3.10.0-957.10.1.el7.x86_64.rpmeced336da7b8646bd436a66a1925b62f4d64fae85505bdbbd79dc32c97488271SLSA-2019:0597-1Cloud-InitSecurity Fix(es): * cloud-init: extra ssh keys added to authorized_keys on the Azure platform (CVE-2019-0816)moderateScientific LinuxScientific Linux 7cloud-init-18.2-1.el7_6.2.x86_64.rpm99f088a9d17057b54ef385661c383d6749a55aa0152ff4bb4a166c1fe3938cb7SLSA-2019:0622-1FirefoxThis update upgrades Firefox to version 60.6.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788) * Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790) * Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791) * Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792) * Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793) * Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795) * Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796) * Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)criticalScientific LinuxScientific Linux 7firefox-60.6.0-3.el7_6.x86_64.rpmb7c3a0b58dc0611eba85a761e10bb94a632c1848c065feec3d4f843e4542df9efirefox-60.6.0-3.el7_6.i686.rpm09129c74ae205620b102e17a760b049070300952bb84f32bf1249b1144f57a2dSLSA-2019:0633-1GhostscriptSecurity Fix(es): * ghostscript: superexec operator is available (700585) (CVE-2019-3835) * ghostscript: forceput in DefineResource is still accessible (700576) (CVE-2019-3838) Bug Fix(es): * ghostscript: Regression: double comment chars '%%' in gs_init.ps leading to missing metadataimportantScientific LinuxScientific Linux 7ghostscript-cups-9.07-31.el7_6.10.x86_64.rpm1b39698f40c0645fc72aa59830fbc1675a9680c8ad3c2a1858801a507ee4844aghostscript-9.07-31.el7_6.10.i686.rpm0f7805708fea743249811805bfc803e79ab013aba67fe30c24419d68f80ba3faghostscript-gtk-9.07-31.el7_6.10.x86_64.rpmc9a2d2be99fd545df814e25f14c817475ccefe037fd8cea707404f5acfa6fbedghostscript-devel-9.07-31.el7_6.10.x86_64.rpm01fb43e60c66e40b1c261856c29f27dac1aa6681b3f8ee1fcfa854935863df3fghostscript-devel-9.07-31.el7_6.10.i686.rpm0ce9aec8dd093f1214857fc99268889723d4127c3c930f72d83c1af2f26a4a3bghostscript-9.07-31.el7_6.10.x86_64.rpm60a83340c0c6f5720b7ad211ed616da442ec94e68040e315999b4c281fd5829bghostscript-doc-9.07-31.el7_6.10.noarch.rpmceb24d96b786c2c32f72398746dc3f08aef27b82ab7b9f19eb02a7a783027544SLSA-2019:0638-1OpenwsmanSecurity Fix(es): * openwsman: Disclosure of arbitrary files outside of the registered URIs (CVE-2019-3816)importantScientific LinuxScientific Linux 7libwsman-devel-2.6.3-6.git4391e5c.el7_6.i686.rpm9de6e0bdb43295e0d84881f337147d133147f1296a99cfdedae974664248a3b5openwsman-server-2.6.3-6.git4391e5c.el7_6.i686.rpm49bda66322eb8411f3ab740dee8fb85bcd13fb4bc63330a56cea6179d75bc823openwsman-server-2.6.3-6.git4391e5c.el7_6.x86_64.rpm47cd6398ee55c24c6e00fdd1a4cc1646105d36eb888ba10bc87b59c5ad1fe551libwsman-devel-2.6.3-6.git4391e5c.el7_6.x86_64.rpmb6ed9e1b2239e7be5e6bb3b3fdb7e9a31ec12b0563798ed7eb23c2267831bbe8openwsman-perl-2.6.3-6.git4391e5c.el7_6.x86_64.rpm2cb799a098edca75e278de2920bb8da55953198bfd31c767bbe373de9856c20eopenwsman-ruby-2.6.3-6.git4391e5c.el7_6.x86_64.rpm7e7c0382ce8b9d55438255aae94796cd21faf0794250c8c1c7f13873d24f54b8openwsman-python-2.6.3-6.git4391e5c.el7_6.x86_64.rpm83f3988ca4591e0d643ea7b4773192cc9985df9f47923ec322d988b1188a5e02openwsman-client-2.6.3-6.git4391e5c.el7_6.x86_64.rpm7e6a7c87dacc0ac3b543425961526dd10392819ea235f67ee2f713634ea9ec22openwsman-client-2.6.3-6.git4391e5c.el7_6.i686.rpmc992c9345c75ab8319a5e055845e4dca704a67ee9c64c85e57ca19fa942815dblibwsman1-2.6.3-6.git4391e5c.el7_6.i686.rpm1ecf0be1dd93351c7984fe3b6369b146ac696520c37713b5b36e856ffa008263libwsman1-2.6.3-6.git4391e5c.el7_6.x86_64.rpm42fee976fa11762a49e92a6a81a5ef05210e325c4693fe7ba3c428805391d3f8SLSA-2019:0671-1FirefoxThis update upgrades Firefox to version 60.6.1 ESR. Security Fix(es): * Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810) * Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813)criticalScientific LinuxScientific Linux 7firefox-60.6.1-1.el7_6.i686.rpm040abb0f461433a35b0924b2162302b68f5009fb2d68830241aef8993b2c5487firefox-60.6.1-1.el7_6.x86_64.rpm06d0c6b0245f0fb7a91a168ce54c770dab4526291311afd1c0fff67c401effccSLSA-2019:0679-1Libssh2Security Fix(es): * libssh2: Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855) * libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856) * libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857) * libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)importantScientific LinuxScientific Linux 7libssh2-1.4.3-12.el7_6.2.i686.rpmf9b48ebf4e8582d74b7ed10dee5773f555d23fa4b750e3c63b5b64b0f1b6d332libssh2-devel-1.4.3-12.el7_6.2.x86_64.rpm9fe8e1baa72f8a733f15748cb07e99587e5418c90af32769ad178c9eb20050eclibssh2-docs-1.4.3-12.el7_6.2.noarch.rpm0382f14ffa5ce3c2ea8f200652173f3557dfccc4b3f911003ee5e362e490f242libssh2-1.4.3-12.el7_6.2.x86_64.rpm20e45215aada48dd80bbfffcc7d36ea8c0120b66a559aa51c410b74a80f2ee08libssh2-devel-1.4.3-12.el7_6.2.i686.rpmc18c8b615afb7083aeb3e3a74aa69b8d67338aac0c2b2b2f2a6fff3af9b2d062SLSA-2019:0681-1ThunderbirdSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788) * Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790) * Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791) * Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792) * Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810) * Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813) * Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793) * Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795) * Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796) * Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)importantScientific LinuxScientific Linux 7thunderbird-60.6.1-1.el7_6.x86_64.rpm55bfbe1468e50d3bc7b597e7c8db3b072c9195046e246ff4c2e8d3215cacd5c6SLSA-2019:0697-1FreerdpSecurity Fix(es): * freerdp: Integer truncation leading to heap-based buffer overflow in update_read_bitmap_update() function (CVE-2018-8786) * freerdp: Integer overflow leading to heap-based buffer overflow in gdi_Bitmap_Decompress() function (CVE-2018-8787) * freerdp: Out-of-bounds write in nsc_rle_decode() function (CVE-2018-8788)importantScientific LinuxScientific Linux 7freerdp-libs-1.0.2-15.el7_6.1.x86_64.rpmebbb8eeee1a1bb76c92edb75a197cb6ae93b73c3f8718b3ba5603c8eee50d67ffreerdp-plugins-1.0.2-15.el7_6.1.x86_64.rpmabc3e4c6bb656f9796093503e67d8a1eb8c26455e6286c15e986dce44cd53afdfreerdp-libs-1.0.2-15.el7_6.1.i686.rpmddc4690e74c126527914ca3221901e4de4018846ce526b0ae75c1174be447f9cfreerdp-devel-1.0.2-15.el7_6.1.x86_64.rpm56ef20463588f4a740ff98d1cc0d140a3143ea1184f619995fcd736773ebae1efreerdp-devel-1.0.2-15.el7_6.1.i686.rpm88c38764349d320b95f20881529ded2b552f1dc48fa732f5042f24c28e813b14freerdp-1.0.2-15.el7_6.1.x86_64.rpmfafd3bb9a585c2f151b6907f1571b9e58ad2ef8b905a8a50c538aaf9de0fa9e1SLSA-2019:0710-1PythonSecurity Fix(es): * python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)importantScientific LinuxScientific Linux 7tkinter-2.7.5-77.el7_6.x86_64.rpmce38b53c066b340b29536e6f63b0c9fb33e75a7ea8d1f5b593be6ce834bb004cpython-libs-2.7.5-77.el7_6.x86_64.rpme02e345bf0334c8d15125e44ad79fa159203aeb276e7f79a3fe49fc0d6f73063python-tools-2.7.5-77.el7_6.x86_64.rpm53f0522796f666d6beadea1b447d4a4233bc73439f9a564ccea0678444d93f99python-devel-2.7.5-77.el7_6.x86_64.rpm7cfd3a6e9e5a6cffe60cc000580a846ffef8ec6adbf1ee4b8303c4aa808919c4python-2.7.5-77.el7_6.x86_64.rpm85ef11e2b65b6f0596084173b68569c3e483bd66d521df1c51050cd67839107epython-test-2.7.5-77.el7_6.x86_64.rpm405ec0c6dc07c1599f7252d353735e51d7ccd4635b6f755470653706672d4f65python-debug-2.7.5-77.el7_6.x86_64.rpm15adca5eeedc0f2d352e01a13b5174462a120a8360c5866cfe9412d0f2675fccpython-libs-2.7.5-77.el7_6.i686.rpmfdcbd66649b171da99e57d9b77794c03059098658e0514b7121a3a6f492d21abSLSA-2019:0766-1Mod_Auth_MellonSecurity Fix(es): * mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878) * mod_auth_mellon: open redirect in logout url when using URLs with backslashes (CVE-2019-3877) Bug Fix(es): * mod_auth_mellon Cert files name wrong when hostname contains a number (fixed in upstream package)importantScientific LinuxScientific Linux 7mod_auth_mellon-0.14.0-2.el7_6.4.x86_64.rpmbdf769a3b872c261041eaab8921365e9adf92161276ee0c6306a792d9ab5487amod_auth_mellon-diagnostics-0.14.0-2.el7_6.4.x86_64.rpm0a14432a03fd1fb34b2361188315f105ce55e09f29791e1f46f6863881646d61SLSA-2019:0775-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698) * OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) * OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6.i686.rpm665072b093c93f268f633d94e2c9a3025d1a9c903945fdb079190c897e9f0c24java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6.i686.rpm2114354508847058c90a71b26393a9bfe3c8bbc1393320d238029cfc8b5bb7d8java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm33cd5095d99b143d439351651a931aabb06af3893f6a7faaa19e364677f8f7b3java-1.8.0-openjdk-javadoc-debug-1.8.0.212.b04-0.el7_6.noarch.rpm269af0eaae6cdf8a741ada9c6ff0853b26d2696d4010aecb856dd626b5c0f85bjava-1.8.0-openjdk-javadoc-1.8.0.212.b04-0.el7_6.noarch.rpma75aee7e2b483d9aea4dd3f76172a38cc9141b698405e15cea3acdedfcd72bcfjava-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6.i686.rpmc29ea595b100005c18ecb0e13f0490c4c2e5963462cf56d25e19c46274dd539djava-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.x86_64.rpm1d3076c9b33215bd3f852d80ad0f676671ee1f4151f26ee2bf28ea57dad39f3fjava-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6.x86_64.rpmb5185d6cc04e39eaae67ee4303e4ca03e3d8eaaa48c30f0baf10dd0da33ce009java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm01e91369f052d5728ce9f37786c1798433984ae3f3ec5d34b4d9f270512646dfjava-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6.x86_64.rpmd2454ddd0caf0b3ffd07ad79a7fc5811a6fb542b2accf95987a3f155ff94fdddjava-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6.i686.rpm32f959b5be2120fa008cede538784324a57f41db3a8de6991bf837b833e636a5java-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6.x86_64.rpmd9967e4e4492cb59555fa5669a6d74e090a0a30f66c0386b00018ae2764cbe93java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6.i686.rpm9a14c7b1f9fd137029a8aae12ad7dd992a6c2461c709f5807a45b33220561807java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6.i686.rpm283f70b1cd787bbbfd1071554a7c1efa53590d7eaa1f41a7f4be34567a37d31bjava-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6.x86_64.rpm88919d86c5cacb51b9894dd9e195e292aad55e5f99cc53f5c2e7aa21e3215acdjava-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6.i686.rpme08de1e77f4f4b95734a50912f98fc115fe0ec8ea0687bbed36f88ba161e8d2cjava-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm2aad9ab252446ae667d32ca0a39225b969cdd72a5689d8efa49d3211bc1e665cjava-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6.x86_64.rpm1c62d701ec0aee5b8df4b4b97f5b2dae3d6bb5322a07e989a51901783b3dd923java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6.i686.rpm53934f02cb09cc42933d6eb266b0e5a5fd0989e50c7eb3708cfbc72819fb7c12java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6.x86_64.rpma8664b2b3f5cfda06e5c193b333b80d040dc3ac4345dadb26f82be9c9b4f47f7java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.i686.rpm5a86ac62be08b9ac6cbb2c79ce0826e3a0693266ed7e026dbf960e430ca5c187java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm356e9128dae444492b4ea7ac923487c46ebe5cea1f9e1cd55d2a0e802e49b68fjava-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6.i686.rpmfa11f0d21c31416bc110cd2f6b641091e85124e2283223e2aa15e6358a61306fjava-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6.i686.rpmbbf00dca7691b00912dce58ac4e8f0501206e5e0b91b16c8dfe6e5e07fcedf74java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.212.b04-0.el7_6.noarch.rpm68d4c227154b800d0ef1fab85e6e6ab9f19c66a947fb6bb95a80952c2afbeef9java-1.8.0-openjdk-javadoc-zip-1.8.0.212.b04-0.el7_6.noarch.rpma49dd1d2609690271976e1dc6eee6254aa59bf74c3fb484ee8b3d84ed4de89cbjava-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6.i686.rpmf3a78c6086eeee3653d24ff51c5bd2f57c25d0133e8fb1c62c8d3c6a04ab5659java-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6.x86_64.rpme48ff823a7f9214067a3fd967e85345b521b6bd5469642be8806e5b4ec428dcfSLSA-2019:0778-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) * OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)moderateScientific LinuxScientific Linux 7java-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6.i686.rpmf5127fa75fffea1567eb879da84d5576fbc26bccd4ba7468d84665bc4d46683fjava-11-openjdk-jmods-debug-11.0.3.7-0.el7_6.x86_64.rpmb9101b84dc74289d5ecc4f770058c208bab23870bc0461b993de4012bacfc89ejava-11-openjdk-headless-debug-11.0.3.7-0.el7_6.i686.rpmd96a15392c2846b8e9aad856b4e8ceccb1dcb8ac52f153013b8133a531deda60java-11-openjdk-demo-debug-11.0.3.7-0.el7_6.x86_64.rpm3f92382f2594d9bd7c4a1cd27dadd055fecf28d51dd03a9e417e0555f7c707ffjava-11-openjdk-javadoc-11.0.3.7-0.el7_6.x86_64.rpm224a41424f45a3423d20a27c9fd9d15d31831f05cf17875b4f9914c20f660dbdjava-11-openjdk-src-11.0.3.7-0.el7_6.x86_64.rpm9f2b32154868aff67192245e5616acec3fa9d953eb35005d356cfc3bf0659bacjava-11-openjdk-debug-11.0.3.7-0.el7_6.i686.rpm41426a8195e66438d9ef3213828355099a2f48a75a306d5450be7de4a9d0e6e1java-11-openjdk-headless-debug-11.0.3.7-0.el7_6.x86_64.rpme423189d7a22ca773a97341eec9db015e89acf3e242eace0210a1585eddd5730java-11-openjdk-src-debug-11.0.3.7-0.el7_6.x86_64.rpm3d6d01445574930e7b764b415a60479b0cb791b9854b495e126a1bc1365c50e2java-11-openjdk-src-11.0.3.7-0.el7_6.i686.rpm4d9172f0b0d16ad4b4d305eebbea98adc938e71be2025163f4a0a9fadc211086java-11-openjdk-devel-11.0.3.7-0.el7_6.x86_64.rpm8d71ddfc72d9727de98a5743da890fbe5be786c9c899846ae4ea96a0859515eejava-11-openjdk-javadoc-11.0.3.7-0.el7_6.i686.rpm1364fcf16fca65a3e6204ddbcec4d56a5eb0e7d47f69bf88ead2f28ee5c88270java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6.i686.rpm4c34413a22797fa3dc9765b731e09bef46e8549e52249bbe863d347978d816f6java-11-openjdk-jmods-11.0.3.7-0.el7_6.x86_64.rpm85d384caf5cc5d86643486470e5938c3f86231f254ac45f925ca54001c900507java-11-openjdk-11.0.3.7-0.el7_6.i686.rpm02e9d5607d1ba7ba5a931fe4f62eb2578ee8768544f234f1690dbb5f44271df6java-11-openjdk-headless-11.0.3.7-0.el7_6.x86_64.rpm5bc1c1362951f15154211df35fefc2db621c2643d0a968b528687708e93a13e1java-11-openjdk-devel-debug-11.0.3.7-0.el7_6.x86_64.rpm465f1e16baba3098956df9d4b546bc44950441d01405a92a205aaa84e3092f81java-11-openjdk-demo-11.0.3.7-0.el7_6.i686.rpmc865f80be10daf1edcb361562c46e3af2f7f3de7c97f26ecefa8a1f4113dbe0fjava-11-openjdk-jmods-debug-11.0.3.7-0.el7_6.i686.rpm39f1fe9ddd80939cb6dc7a3df7b91f6d2fdbd61afc2bde67fcf386c4e4bc4de2java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6.x86_64.rpm2d03f2986f66d10d3f319c25441b4886266f55f5ff185a8ba75f9426d736a07bjava-11-openjdk-src-debug-11.0.3.7-0.el7_6.i686.rpm04842dfe23aac36ed74d567416c4331f8283dc1521039b7e0bd13941eae75c05java-11-openjdk-demo-11.0.3.7-0.el7_6.x86_64.rpm75ab5781279abe13d80d948840891802695bb321bbad2cc6fef390f5a68b6712java-11-openjdk-demo-debug-11.0.3.7-0.el7_6.i686.rpmae8997f7a1e21f8642d8d44502bbc0c83c135b5908a93b2603e3723caaa4552ejava-11-openjdk-devel-11.0.3.7-0.el7_6.i686.rpmbac7e931416340179b334c751b548ba8f268d17e7e222e95a1b4ddaa574cca6djava-11-openjdk-headless-11.0.3.7-0.el7_6.i686.rpmb8283c82db02ebb02e05717f7e1b63afd83d85ca249c6385617a2ea3a30ad7bdjava-11-openjdk-jmods-11.0.3.7-0.el7_6.i686.rpm14d528e8da64a869989d84d5d343a94a6995daaad9293961b89556fe9a0ea0f8java-11-openjdk-devel-debug-11.0.3.7-0.el7_6.i686.rpmfd876058d65c149c245fe3b2c94ccb6e639347bed4c724d9daa6d466ae6bf751java-11-openjdk-debug-11.0.3.7-0.el7_6.x86_64.rpm8a67bf17de1bc75b94db5d8029464d91e2f9300101e8c5e920574f8bb774768ajava-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6.x86_64.rpmff3ad2242e5e651cfcf7733d821531695be4aa2657c5434dce295bab55a9ee79java-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6.i686.rpm7e7a255743db9eb93692ec1a1dc68c8222d5a985f564d4fe0978595c86f8f0eajava-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6.x86_64.rpm9ad53b58c6e4a29fe2a844917d7714cca7832dd846d38accff1dd837c935ebf6java-11-openjdk-11.0.3.7-0.el7_6.x86_64.rpm65beb2f348165979798c7b3ce2956f899bbf6a3601a03871184e58e4c72de1bcSLSA-2019:0791-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698) * OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) * OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-headless-1.7.0.221-2.6.18.0.el7_6.x86_64.rpmbad0c78033a01a8df6c59d4b40d43be15b92474b2c780e8f17e0b12176a666dbjava-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm500f5afcf8a7aa18fa804be05576940cc077a157c29ceba71381f21519a07bcejava-1.7.0-openjdk-demo-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm73541f10ca5612593d8c297436de6633f97c6a592b5f81bd5517577c3bcf2640java-1.7.0-openjdk-accessibility-1.7.0.221-2.6.18.0.el7_6.x86_64.rpmbccebef46b073ecf242aea1d6849020c5519653c85ebf4769ce818b85e0859dcjava-1.7.0-openjdk-javadoc-1.7.0.221-2.6.18.0.el7_6.noarch.rpmf0077781738a08e30c0bcfcf429f4360e0e6d3d27d78a3f44877028e3be73d88java-1.7.0-openjdk-devel-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm23e65c2d02e42a1fe54ead6f9c773a90a60e620123cc82ba6df72e4f54d1c242java-1.7.0-openjdk-src-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm5580b16943635baa3160d34b47b3508a2528af41973cd34639475366726e27fbSLSA-2019:0809-1OvmfSecurity Fix(es): * edk2: Buffer Overflow in BlockIo service for RAM disk (CVE-2018-12180)importantScientific LinuxScientific Linux 7OVMF-20180508-3.gitee3198e672e2.el7_6.1.noarch.rpm0b2b8b842427d64cccf82c245857c15b5f70f89e1b7576edf44b02cb08477be3SLSA-2019:0818-1KernelSecurity Fix(es): * Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974) * Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer (CVE-2019-7221) Bug Fix(es): * rbd: avoid corruption on partially completed bios [rhel-7.6.z] * xfs_vm_writepages deadly embrace between kworker and user task. [rhel-7.6.z] * Offload Connections always get vlan priority 0 [rhel-7.6.z] * [NOKIA] SL sends flood of Neighbour Solicitations under specific conditions [rhel-7.6.z] * SL 7.6 - Host crash occurred on NVMe/IB system while running controller reset [rhel-7.6.z] * [rhel7] raid0 md workqueue deadlock with stacked md devices [rhel-7.6.z] * [PureStorage7.6]nvme disconnect following an unsuccessful Admin queue creation causes kernel panic [rhel-7.6.z] * RFC: Regression with -fstack-check in 'backport upstream large stack guard patch to SL6' patch [rhel-7.6.z] * [Hyper-V] [SL 7.6]hv_netvsc: Fix a network regression after ifdown/ifup [rhel-7.6.z] * rtc_cmos: probe of 00:01 failed with error -16 [rhel-7.6.z] * ACPI WDAT watchdog update [rhel-7.6.z] * high ovs-vswitchd CPU usage when VRRP over VXLAN tunnel causing qrouter fail-over [rhel-7.6.z] * Openshift node drops outgoing POD traffic due to NAT hashtable race in __ip_conntrack_confirm() [rhel-7.6.z] * [Backport] [v3,2/2] net: igmp: Allow user-space configuration of igmp unsolicited report interval [rhel-7.6.z] * [SL7.6]: Intermittently seen FIFO parity error on T6225-SO adapter [rhel-7.6.z] * The number of unsolict report about IGMP is incorrect [rhel-7.6.z] * RDT driver causing failure to boot on AMD Rome system with more than 255 CPUs [rhel-7.6.z] * mpt3sas_cm0: fault_state(0x2100)! [rhel-7.6.z] * rwsem in inconsistent state leading system to hung [rhel-7.6.z]importantScientific LinuxScientific Linux 7perf-3.10.0-957.12.1.el7.x86_64.rpmebec746e5a0bed80812e8d2ee33cd9aa53a35e0421813bc9e39d8872fecb294ekernel-tools-libs-3.10.0-957.12.1.el7.x86_64.rpmd250bded11467317fb39df173dbeb2f382a430d341d4a14842b0439ef2f54e3ekernel-doc-3.10.0-957.12.1.el7.noarch.rpmede561e07a0122870bb385d6323111c81d9e7a63b2976cf06152e266ee3418d5kernel-tools-libs-devel-3.10.0-957.12.1.el7.x86_64.rpm7813a42f81726d58700faeddbc95ebb144bb8249bbcd649b0246b1c38768d564kernel-abi-whitelists-3.10.0-957.12.1.el7.noarch.rpmcfda2ac951006767cf2a47f4c9bf5a5f9861ab8955edc1b8973cde1274559560kernel-debug-devel-3.10.0-957.12.1.el7.x86_64.rpm2a62f350980e29fc3d55e703a6359b6986bd717332b3b71b4418be0d3a4725f9kernel-devel-3.10.0-957.12.1.el7.x86_64.rpm3293b007fed10f2592dcdea42b6313bf7689e5163bbbced2feb36c089ff7f472python-perf-3.10.0-957.12.1.el7.x86_64.rpm5b70a532572cd6612d29ae11f458932753a5779a2f75d78d717a459d2af4ad8dkernel-headers-3.10.0-957.12.1.el7.x86_64.rpmae0f3a3152e5acf4b8459c97c8428ca118d8e2ede9583f95f5927e0445747a27bpftool-3.10.0-957.12.1.el7.x86_64.rpmb485941f1a4110b47e0db06db5f4bef4ae0fb4ec19eb79eca8053316390255a8kernel-3.10.0-957.12.1.el7.x86_64.rpme2540a0570b30dd8e6d0dfc52fc445fc61e4e9d6f828a63aa248bcaeb878628ckernel-tools-3.10.0-957.12.1.el7.x86_64.rpm8547b2bbe480ed22e84fe8a34ee132127d110c0eacd121214f6508af3f76ee51kernel-debug-3.10.0-957.12.1.el7.x86_64.rpmd18a4250f6aaeefa019a71c849aec0c248c6f033a63408c76c18a22662f5e22eSLSA-2019:1017-1GhostscriptSecurity Fix(es): * ghostscript: missing attack vector protections for CVE-2019-6116 (CVE-2019-3839)importantScientific LinuxScientific Linux 7ghostscript-9.07-31.el7_6.11.i686.rpm47c27cfcf3168ebebea339e114f4a3dd9ed05de0b4c5975ca117545b2d1b31b3ghostscript-doc-9.07-31.el7_6.11.noarch.rpm1941374265a4470de35749e18d78086ea022fce0db058d1183280da4d38b9713ghostscript-cups-9.07-31.el7_6.11.x86_64.rpm77fc2e5b1245a94a0b4b86dee3b91bb2bd2d204ead18db872a322041c0277e40ghostscript-gtk-9.07-31.el7_6.11.x86_64.rpm2cf96a18433bfcbd53147fd01692bb2d8f22c41194aa42bc1a67bf585a3e8e25ghostscript-9.07-31.el7_6.11.x86_64.rpmc1403617434b8cff6a1c9b2bd1f2586c9c7cc37702c3c50a8714b00b0992e394ghostscript-devel-9.07-31.el7_6.11.x86_64.rpme9b1d95cec502945d6330ff1161160fa87d67d74d30cd58e905929c8f377d1d1ghostscript-devel-9.07-31.el7_6.11.i686.rpm5ebfe57239815f0f06fd8457d688ae29b4442ed55190d06271e5a3809bd02d19SLSA-2019:1022-1Python-Jinja2* python-jinja2: Sandbox escape due to information disclosure via str.format (CVE-2016-10745)importantScientific LinuxScientific Linux 7python-jinja2-2.7.2-3.el7_6.noarch.rpm2d478961299f05460deb5e51e8417d8bc6075b610d5d372bba0f83023172e7b1SLSA-2019:1024-1FlatpakSecurity Fix(es): * flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226) (CVE-2019-10063)importantScientific LinuxScientific Linux 7flatpak-libs-1.0.2-5.el7_6.x86_64.rpm1f1cc9383f43a10df4576c274925ed0fe9635e3cab34fa8d8b3c692dc5e590a4flatpak-devel-1.0.2-5.el7_6.x86_64.rpm303fa037ae1bdfafb826e829b0ece1fda938458a409e5b9ec1d60e7307ab1083flatpak-builder-1.0.0-5.el7_6.x86_64.rpmc2d3eebd529963eaeb94a4d08d2552aa98c56ccedc0eca88874781abe6540ffdflatpak-1.0.2-5.el7_6.x86_64.rpm3aeb197909f940c7a11dc8f984b03a8827febd1201a8dc1341988d29b33d8464SLSA-2019:1131-1FreeradiusSecurity Fix(es): * freeradius: eap-pwd: authentication bypass via an invalid curve attack (CVE-2019-11235) * freeradius: eap-pwd: fake authentication using reflection (CVE-2019-11234)importantScientific LinuxScientific Linux 7freeradius-devel-3.0.13-10.el7_6.x86_64.rpmc633458bc8613ec9fde6495c1fe7f7d1b1b70b60dda0606cf894638dcc2ee07ffreeradius-unixODBC-3.0.13-10.el7_6.x86_64.rpm15bc23b5addb30f53551fd75a33ae7e54c388476d9ea786856656e8f4726b1abfreeradius-devel-3.0.13-10.el7_6.i686.rpm35ddb1ae298cbf0866ec66065b9bd7e2d0e5d4fccc6e9ca1502db4c855563b44freeradius-krb5-3.0.13-10.el7_6.x86_64.rpmb2be6c1fc13d8748c8f385728d5b5e529aac8f4f0dc496b6a00859793faa9f9bfreeradius-mysql-3.0.13-10.el7_6.x86_64.rpma1d849372b5fbf6e3172644292246008d0eb79ca25ebc9ec099123c6549ce9b2freeradius-python-3.0.13-10.el7_6.x86_64.rpmfef90b82488dc559054209e854f1402deaee15bba8e2a20724c61a5536c901a6freeradius-perl-3.0.13-10.el7_6.x86_64.rpmcf5933e25a545e34353283ba02a711cfd9aaa8bd9a6fb13fc141ced8416cf8dffreeradius-sqlite-3.0.13-10.el7_6.x86_64.rpm4184971fe0e08dbe6407da48ada294599727400e5423babd4e6f7efede9b571efreeradius-postgresql-3.0.13-10.el7_6.x86_64.rpm2336ecde76f7d187460ebca640a228b4db03e8260c0c8c92e6a5fa6b0192cdd7freeradius-utils-3.0.13-10.el7_6.x86_64.rpmdee4192c6e8dad5634caa5bc4f6dbcfda5c477e277635d7ca65a620a75f27f58freeradius-doc-3.0.13-10.el7_6.x86_64.rpmcb611c09b8cdd525ee82585ac6da8b514ccfd906dc3850e29c66e4d9d18164befreeradius-ldap-3.0.13-10.el7_6.x86_64.rpmafae6c3615d4430f6af2da1612e389d4009c675e2d30935086aaca30cdf63097freeradius-3.0.13-10.el7_6.x86_64.rpm2464c41b4fb36ff8b5e84a2f1c8023efc78a12c743c88f30977d051b0abd17ceSLSA-2019:1168-1KernelSecurity Fix(es): * A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) * Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) * Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) * Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-957.12.2.el7.x86_64.rpmde1414227fa5d20a8611823daf4b1f865ebd235db18c246af078c41b171c6d59kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm4d43a011799d448f47fa4e8147fed519628d724f2f085ffc26d3546c3d591faakernel-doc-3.10.0-957.12.2.el7.noarch.rpme46758550b8d2b718b9bac7b58d15de9ea18e9218ccd18cf9f01572dce9f321fkernel-headers-3.10.0-957.12.2.el7.x86_64.rpmb71994c1ab412a08e126f54f162f70c042a4d7ffd200ef21f4bd15ba9eebc59akernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm4cd3e8a1835f4a33ba7e80a2863f309407bb2060954a9e7b9110a80ca4f07b19python-perf-3.10.0-957.12.2.el7.x86_64.rpm3527c40314b65183bc36eaa21b1c54260c012f1edd7365965dd57604a14af2c4kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm1949f57000d28f7c2769a702ec83f62b051c12e1bfdbea3e832d959625effcefkernel-debug-3.10.0-957.12.2.el7.x86_64.rpme589fa81b473807cd63f3f57a13ea6f910150110be919872da18ab8589930bfdkernel-3.10.0-957.12.2.el7.x86_64.rpm772d9c37e24593b0879a89b5e84f1e0c707082238cef9374ae7ebc56da21f853perf-3.10.0-957.12.2.el7.x86_64.rpmc4612d7839e6734704a2ccb75db141913dd9f735f102c407de5ae45c1abba8a7kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm9ffb55c71e06ea6a551bb6ad52b2baf4f2571508ba4e3bfd6c6127f3fdee055dbpftool-3.10.0-957.12.2.el7.x86_64.rpmebf1daf0a2bcc9fcc30677fcb93fa83dbcfc3e9d47a80c3f3c489165064f7260kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpmb1b208a4a420b953d3c3354772e2bff79731073cb5d66e639158a4401839cb00SLSA-2019:1177-1LibvirtSecurity Fix(es): * A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) * Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) * Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) * Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)importantScientific LinuxScientific Linux 7libvirt-bash-completion-4.5.0-10.el7_6.9.x86_64.rpm5b52a9f779aa6aac684f5ce573f91f5fe92d3f9d187d8401f5aa1b1345df7d0clibvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9.x86_64.rpm991fab546cc4fcc0579a5c5c770bf12b8bb90bdf42cb046382e9a5f60d4c5012libvirt-admin-4.5.0-10.el7_6.9.x86_64.rpmab568c9f71a41b24e08e9a1b544bf7191a71513bed4c78d2eb923e6dec42d8b5libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.x86_64.rpmb486b009b2a18d94448e21b63fe6c86f1edc8074d74e64b1b84139a46366ae3elibvirt-lock-sanlock-4.5.0-10.el7_6.9.x86_64.rpm5fc3718c23be4bfa83a63502ba61fe085a9e9b461b195c504146657ef1c23c59libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.x86_64.rpma4e68cccd4ca063538f448add745d3dee8c7c59104e42bdf71df9d84b39b3c52libvirt-nss-4.5.0-10.el7_6.9.i686.rpmaae902e29b0ef0a864747eabd8fd62d41693e51370688ba73d9140decdd13241libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.x86_64.rpma2f9bbd0ac81c63f4aa16530c0ad9976d4144219a647bc2c420eeb22840ec7e5libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9.x86_64.rpm2b16a055fb1a282499d62c55617b1d63617e1ce5fee436753cce59a5b7b8a95elibvirt-daemon-config-network-4.5.0-10.el7_6.9.x86_64.rpm4c6f6a50e1632be0960e1f82d58122f6d3ded6138c39e0cc7b74bbdccb066758libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.x86_64.rpm4c34a81697bfa96d2cea705ecb266daee02969e640c77d172e5025ff655c6998libvirt-devel-4.5.0-10.el7_6.9.i686.rpmb6da9e08e583d38f71452dd0eea0f6b4d9a945180f4b2d8845b6394c34727850libvirt-devel-4.5.0-10.el7_6.9.x86_64.rpmb52007bf454a35ca1e75d4f6427b7200b53e30be21e09cfd0972fe3c673fc142libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.x86_64.rpm3d5c69b78035235813d6b93ec0b39c7475d5ccd542d7d41c0801388983feb9f2libvirt-libs-4.5.0-10.el7_6.9.i686.rpmb803b7a397c010700e19a4137e7c7e10498b5ea4dd24d65e840d1f40dfb98550libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.x86_64.rpm59fbf0f545d8519e88d18b8e3af4c41e81a95ab7807383a1308a601b6cb70d44libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.x86_64.rpmf705d0a5b2cfc76f4e086530bb0214368f5ceb5f6073bccb0377cc9f28e792c4libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.x86_64.rpm902a6ae23b5a862f7727476bb2f2b905908800883f04e79c5d870ccde538dae0libvirt-nss-4.5.0-10.el7_6.9.x86_64.rpme1966584ae1e97346d374e03ce9ab72c405ac9af3db6a44a484b35bdd559fc7elibvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.x86_64.rpmf196fe7c7a1c0c82af35e585e8e16f8959efa279ab443eddfbb3e4b5326d69c1libvirt-daemon-driver-network-4.5.0-10.el7_6.9.x86_64.rpm208e0b2565c9242ca171d6754b3f23e01f7f6b854d93f7a6421063ebdfdcce06libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.x86_64.rpm8af321fb574a928ec5d0c1659d06b1d94a4f7c89d5afd2f953f3bc96e4c0907elibvirt-client-4.5.0-10.el7_6.9.i686.rpmb4b5bdf76e75af572e899c4d69458b0d1d4e5f04dd923730ef60a9f523fc6a50libvirt-login-shell-4.5.0-10.el7_6.9.x86_64.rpm4136bf7cfe31e92d9d7cb4ebc186f47214e2df535a1ef71d80be1caeb89c44fclibvirt-daemon-lxc-4.5.0-10.el7_6.9.x86_64.rpm65bba7d6c7ff53809db96d45dc418785a53d983f00be9580d34cb45d71d7042dlibvirt-docs-4.5.0-10.el7_6.9.x86_64.rpm2a3fbdccc7bccb0ac05a6da716004d688bb739888873bb6eb24e868b97e5d1c9libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.x86_64.rpm60b57dcec7742b3242e938eec6f47844466e39d6b6a35fcb44c601bfbcf6e33flibvirt-libs-4.5.0-10.el7_6.9.x86_64.rpm78453a128cae9d62dcb8a5286dc525294ee9fbf9e39e80465056eefcc75544e6libvirt-client-4.5.0-10.el7_6.9.x86_64.rpmd5c92bd706ba1c347e20dc75cedcdb8a28e43e848e78d79ce0c405048472995elibvirt-4.5.0-10.el7_6.9.x86_64.rpmfd0713f515a79a0adef43cdd347c244bd5441e3692b92ddbcdf4104054c536bflibvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.x86_64.rpm224bbc0dcc361a2c3a98edea297d168e43682de604d369a1bc5fdfdd97d3cb6dlibvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.x86_64.rpmb39b175c40db2c3116f71a2ec93b2a23b3185f406c870c82c9f35fd5f5f9f083libvirt-daemon-4.5.0-10.el7_6.9.x86_64.rpmef7bec9a13cafedaf41de52793b21a19cac0ebd266c23e734621088ac1072794libvirt-daemon-kvm-4.5.0-10.el7_6.9.x86_64.rpm03a41d758775fddf912385e7873974f35ec4892b5b5862535ea054c507ad45edlibvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.x86_64.rpm0ddf1988af2e5fb27eb9e36576c49f0abb12d3efd317b9a5ea6f74b8064159fdSLSA-2019:1178-1Qemu-KvmSecurity Fix(es): * A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) * Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) * Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) * Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)importantScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpmeaa61e274ad8fd9fd15ba5c82d21b72f7e0471b8bf03504c2d1c42a13960b80bqemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm8a13d3c875c37c25cb5e54c281470eb11594dc1326e2ccca57c7c4127ff27502qemu-img-1.5.3-160.el7_6.2.x86_64.rpma9e701fc822b168b857867da9a03760bbb2a3ab4a381130a9ee23eabb6cb47f2qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm108208506e233873a7d4c082ac1989cc2b23a8cefcbdf3fe7199dc9162d7c5dfSLSA-2019:1228-1WgetSecurity Fix(es): * wget: do_conversion() heap-based buffer overflow vulnerability (CVE-2019-5953)importantScientific LinuxScientific Linux 7wget-1.14-18.el7_6.1.x86_64.rpm0ff361a85649c75fa5922cee2d526dca51f34a7f6bf126751f60c6946d45c1d7SLSA-2019:1235-1RubySecurity Fix(es): * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) * rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) * rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) * rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)importantScientific LinuxScientific Linux 7rubygem-json-1.7.7-35.el7_6.x86_64.rpm7279e9cd2b567127b61a8545338cd06d91b1ef8b6071f4155147861b456f2276rubygem-minitest-4.3.2-35.el7_6.noarch.rpmaa376d4923bf63759802df72bd786b6876f066861bebeacacce2f6e96ab6f701rubygems-2.0.14.1-35.el7_6.noarch.rpmc778b0f790dc43d2fb4e1e3dfdb12e2ea665915ab197de362a81fd835ddafaeerubygem-rake-0.9.6-35.el7_6.noarch.rpmcb26dbf95a982b8824eeabd880c26752738aa50b98d65b62f49a1ee04ce5ad32ruby-libs-2.0.0.648-35.el7_6.x86_64.rpm9c7903cc877da8693dd30978f1a8e7a7f71470ef96b30bb1f039b4aee38b40f4ruby-doc-2.0.0.648-35.el7_6.noarch.rpmb306f18adf247063945e7a94bf7cb50a28a71aab1fe26c0ddced9767a4e6340fruby-tcltk-2.0.0.648-35.el7_6.x86_64.rpmfb29d26609cf39238f7e03e065450498b91a0c1f9376e49da3ed8f5a04cdb653rubygem-rdoc-4.0.0-35.el7_6.noarch.rpmb77e8464f018e412cdc789e85f100a3791f091b1fe8deeaca595084ab98816f7ruby-irb-2.0.0.648-35.el7_6.noarch.rpm536e9c0d345efb6a5d0f886e360aa02a0283492c66633e2bf65bf47f8570e829ruby-libs-2.0.0.648-35.el7_6.i686.rpm7533642f70d979272d598b597471794c665f60af9f7157d73117e1c3791fcbe0rubygem-io-console-0.4.2-35.el7_6.x86_64.rpm32cfeb7cf0b32e4178fb6b17de2c50ba4b9eb59b81f30c6c5638dff940e13bd2ruby-2.0.0.648-35.el7_6.x86_64.rpmfdb67e9a754544c02a472c4c8e52e0c3cb82d7b91c41da187a60616c9dd91ddcruby-devel-2.0.0.648-35.el7_6.x86_64.rpmb2a106f9864a2005b3a8a75d908d546db731aa30d5cc9ebb1f62a3fdf3240088rubygem-bigdecimal-1.2.0-35.el7_6.x86_64.rpm9873fc81ca531750d007d1b882c6b9d78b284ff21da9e947da830ed1c7d58264rubygem-psych-2.0.0-35.el7_6.x86_64.rpm4de7035b00bb284a79113dbabdee30edb9ff4dc5f68642eb5fa968155fbd1550rubygems-devel-2.0.14.1-35.el7_6.noarch.rpmc1327e2498427d06987358764eebb5e4b32967ad2bc4becc371b3b2fb5723a2eSLSA-2019:1264-1LibvirtSecurity Fix(es): * libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter (CVE-2019-10132) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * libvirt terminates and core-dumps with SIGABRT as a result of a invalid pointer error trying to free memory in virNWFilterBindingDefFree()importantScientific LinuxScientific Linux 7libvirt-daemon-driver-lxc-4.5.0-10.el7_6.10.x86_64.rpm537f081e0750436ea0947abd1b77cb54d482816c380757a9fb6b9bdd5d8e0709libvirt-4.5.0-10.el7_6.10.x86_64.rpmf92fcb9ee0d1b675275e1deb5c6f74b77582d57c9c6de09e9420e4a54db83033libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.10.x86_64.rpm53e14765bb70f24b629a8521b709c0551bb7b5aa5a68a2487b27f99462f82985libvirt-daemon-driver-secret-4.5.0-10.el7_6.10.x86_64.rpm1cf6877d71aa4ab25d95b18f16bbd34f980aeedb7bd9dfe3dd0f4b591f398a2dlibvirt-daemon-driver-network-4.5.0-10.el7_6.10.x86_64.rpm96fc96848ee4d9811a48a2559703c0562cb6d3614e098d54830ae00a1a643fdalibvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.10.x86_64.rpmacff8175a789843d74eb785eb3951c7abf133833aed7312c2e432994a4f120c6libvirt-daemon-driver-interface-4.5.0-10.el7_6.10.x86_64.rpmee9fa5e5999fb6952f1c7eac2c717f40a655e2fa4494f3e3661d66c32f99f2a6libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.10.x86_64.rpma92f781f23095a94267d420a9022703927b0c896437a5965de6577347df620b4libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.10.x86_64.rpmb91b95dcff1f1e04b627ed966804f7202f8ac764f0e1b14cd0925f50596f578blibvirt-libs-4.5.0-10.el7_6.10.i686.rpma3365f17b6afa3bc322dc65b0c0b2314613d8fd3c3b7fdfcd993b383f993f059libvirt-daemon-config-network-4.5.0-10.el7_6.10.x86_64.rpm34532fa5936b53bed74dd17570cebb57aaa1c793ef1e9be2474286e8017af9eflibvirt-client-4.5.0-10.el7_6.10.i686.rpmc30b44316df811f04067c78a228332bf7fa31d56b56434c7834766215a9d3d0elibvirt-daemon-lxc-4.5.0-10.el7_6.10.x86_64.rpm2828deb2605ed571a77e92273ad1ec1bdc27f9fbb3598d13384a0e4bb0b45300libvirt-nss-4.5.0-10.el7_6.10.x86_64.rpm7ada5f035406a2b30d6f6d16105aef561cf044a940f2a2a85c3d0f17034a9492libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.10.x86_64.rpmd9265d60430e9d85a3eda8078cc7e1a1d86c12e8f9403c5dc9998c9f1187bb7alibvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.10.x86_64.rpme010d8c0708bf86b98f065574dffb83ca45d5b455c356540c5cf67d9d07b0585libvirt-daemon-4.5.0-10.el7_6.10.x86_64.rpm76ca534c4ec42a7ec8990a20799e1c1a949c109de3ebf124012c034d7321968flibvirt-daemon-kvm-4.5.0-10.el7_6.10.x86_64.rpm57c70d0e750cd2ffebb920faa699c85e3f550a7e92b3b79f18d93e1f0a1753edlibvirt-lock-sanlock-4.5.0-10.el7_6.10.x86_64.rpm87f78fe0dbb2501313b8e84ed1d0ae637c461ee4521c4f3cb756c71d4d14905blibvirt-admin-4.5.0-10.el7_6.10.x86_64.rpmd858fd15df74144625490c763233dcdb17bb453f8994333940478bf7f36ab46clibvirt-bash-completion-4.5.0-10.el7_6.10.x86_64.rpm7c5ad77b4ee39e80a4666192cbac2690ba9cfe1871115a4eed61baed88e16cd6libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.10.x86_64.rpm8a32c7dc9531b6772d06f443ca23fdb46436c2ecb0015ea37b5c6c43b3bcddf6libvirt-libs-4.5.0-10.el7_6.10.x86_64.rpmfb12eef2e5cde3bc5437b7b798a2c74bca681c0156afa31d9b990af7d8f28ccflibvirt-nss-4.5.0-10.el7_6.10.i686.rpme0a2724f169967e5dbe617971cb87246867c7e7d5168534c490d340491e09af7libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.10.x86_64.rpmbbb7c225413ceeb3a9ca042bb611a04ed309d3746e8b92c2df95fe81851d0753libvirt-login-shell-4.5.0-10.el7_6.10.x86_64.rpma774009064fe9734d05c1ee7cb4c03297e2ee9fddf1379831929dc0a3d4764bdlibvirt-daemon-driver-qemu-4.5.0-10.el7_6.10.x86_64.rpma788a72440f9e085f18cbb3a85573ae7fe76a2f9a118b970087d5087a4451461libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.10.x86_64.rpm1b764fb2157b3a4e842352a97e92d6aae2a5dfd33c80d8ee06e3f2f367124c4dlibvirt-client-4.5.0-10.el7_6.10.x86_64.rpm8bf27fb075ceeb36733a9ccaae8b524b68603abc24b4f98d0e39ce5ec11993bflibvirt-daemon-driver-storage-4.5.0-10.el7_6.10.x86_64.rpmdb7433d13d5c0ae01617676688117bd2569273a5048f17f56d523b2959bf9afflibvirt-devel-4.5.0-10.el7_6.10.x86_64.rpmdc25ad116f573b040e7dc52bc193b3af6db4b6644f15a320a7a5b614942734e8libvirt-docs-4.5.0-10.el7_6.10.x86_64.rpmd1a391b4fa465ebc9d4a633f2f79bac5f96e7c038aa8e8243133d439b16e7918libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.10.x86_64.rpm89c49e17e51815b36863b192b4e6f066ec72dac81b29e670f7bb3e9749d04a50libvirt-devel-4.5.0-10.el7_6.10.i686.rpm1c9b9490016436ede0c9c6028b1e76937cedd2ac064def9f8849864d77e9ceaclibvirt-daemon-driver-storage-core-4.5.0-10.el7_6.10.x86_64.rpmbb03f6cbb46115b71efe9ec5c73e03cc5cb8d9ac1a3d80bf9048acf960acad70SLSA-2019:1265-1FirefoxThis update upgrades Firefox to version 60.7.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800) * Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797) * Mozilla: Type confusion with object groups and UnboxedObjects (CVE-2019-9816) * Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817) * Mozilla: Compartment mismatch with fetch API (CVE-2019-9819) * Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820) * Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691) * Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692) * Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693) * mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511) * chromium-browser: Out of bounds read in Skia (CVE-2019-5798) * Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698) * libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)criticalScientific LinuxScientific Linux 7firefox-60.7.0-1.el7_6.x86_64.rpme9407ff8f3ea071cb5d1929f7764978fbaf0b559fc1c638b8649506e0b15de99firefox-60.7.0-1.el7_6.i686.rpmc23dd1c4bf8d4e3a521848f837101a7814af5b37604d4e97fe528f962e7cb928SLSA-2019:1278-1PacemakerSecurity Fix(es): * pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc (CVE-2018-16877) * pacemaker: Insufficient verification inflicted preference of uncontrolled processes can lead to DoS (CVE-2018-16878) * pacemaker: Information disclosure through use-after-free (CVE-2019-3885)importantScientific LinuxScientific Linux 7pacemaker-1.1.19-8.el7_6.5.x86_64.rpmec37f4ee1c380907ff719907922f0acacb4e64230697b6e4c0ff0287f73127c2pacemaker-libs-devel-1.1.19-8.el7_6.5.i686.rpm7c34ef3fdc9f5e66b460f541dc7869bc050bd986809e7e76f68bc6f1c529c516pacemaker-cts-1.1.19-8.el7_6.5.x86_64.rpmfa4b409673858ab8a57af41f0cf78d6663157c4429ed71a048ae9a770fad21e6pacemaker-cli-1.1.19-8.el7_6.5.x86_64.rpm37eb53034a38c11e43defd9e965fc5807fd21d7289b4598072b66afe4d8245d6pacemaker-libs-devel-1.1.19-8.el7_6.5.x86_64.rpm764a2a583a17f35e97d2c4819d99ec9ef8f5a65df74e14218387d5efd44d6f3epacemaker-cluster-libs-1.1.19-8.el7_6.5.x86_64.rpmf06aa4c8b4efd60b11c705892db3080782c5f78e3b905a6046a255ece2cd8a48pacemaker-libs-1.1.19-8.el7_6.5.x86_64.rpm0ce1e80e6347ec65ca00b6082de830865b033d0b794fd0051bb6e5709abd784fpacemaker-doc-1.1.19-8.el7_6.5.x86_64.rpm9d272537a81a3673f9c8a8d4717a895cef7b1fd9ba16a984c52df335b89c0df8pacemaker-cluster-libs-1.1.19-8.el7_6.5.i686.rpmc92ceaeb32f8cbd9b07919b011e216362931f3a930cc9a2a725cc7a1cac6270cpacemaker-libs-1.1.19-8.el7_6.5.i686.rpm0472e488b9730b087f70a196820ddf6c7a597d2bd8d0a25a150fa6b686fcf27fpacemaker-nagios-plugins-metadata-1.1.19-8.el7_6.5.x86_64.rpm2a80198e19e0e93d4e19cd888d4f3338036fe738fe04d7d6acc6d9dded6f7997pacemaker-remote-1.1.19-8.el7_6.5.x86_64.rpm31f44e53637c49a3d47696f0be94fc8ced32781abc8cefbbcf741a49f7e51b5dSLSA-2019:1294-1BindSecurity Fix(es): * bind: Limiting simultaneous TCP clients is ineffective (CVE-2018-5743)importantScientific LinuxScientific Linux 7bind-libs-9.9.4-74.el7_6.1.x86_64.rpm48a2d864e994c75ea6922f7d9f3d1aa501b71b8f9244a28ce485826388070d63bind-libs-9.9.4-74.el7_6.1.i686.rpm25a28249d1365dbd14d2e5f6af0b14f888474bb9f56999e1eaf12b89a66b185bbind-chroot-9.9.4-74.el7_6.1.x86_64.rpm9ca236b4031ba707dd7b6bda1e5ed820ab41f54c58220ed49e57d34b709534cfbind-sdb-chroot-9.9.4-74.el7_6.1.x86_64.rpm4fd1498a3a6d28a41a9fac502a47f81628f0f974d54ad1fa66943d381c57f015bind-lite-devel-9.9.4-74.el7_6.1.x86_64.rpm3c6ea898e4a570a405a829d7404a14a0e2ba5102385a98e1ef9588b92c1065fabind-utils-9.9.4-74.el7_6.1.x86_64.rpm683c4d6bd308b941b28e3583456c35109c6a033cbff5c655c12704a6d7f384b7bind-sdb-9.9.4-74.el7_6.1.x86_64.rpm7eb12e39c51e0ca6fe899b6eacfeadc3204a727d0175de469ccbe51b90f51c21bind-9.9.4-74.el7_6.1.x86_64.rpmc178a5d00e94bb0cbd653b5b2dea28b76bb377b417a179d554b91d505abdb44bbind-pkcs11-libs-9.9.4-74.el7_6.1.i686.rpmd1075d9b79bee1bc278e798c52836132885c6fbf4a2e5ee9f009bae7c3e22996bind-pkcs11-devel-9.9.4-74.el7_6.1.i686.rpmf9f23356c93cb5b5914eac5ba2975074528188e97119ccca180b41224cc961c9bind-pkcs11-libs-9.9.4-74.el7_6.1.x86_64.rpmecc2e012d441136886b9bfadeb78a30e3ffce3d92f69f8d3738c4172a38571d7bind-license-9.9.4-74.el7_6.1.noarch.rpm72c7108c7301a8c1d58c2ea3b6351c3fd552bcd395c77fa4cd4cd38ba6e7953dbind-lite-devel-9.9.4-74.el7_6.1.i686.rpm747b12d2e7988e12f428a83bb434cb3f15cc51e7cba982d7fd08f2a5759c956fbind-libs-lite-9.9.4-74.el7_6.1.i686.rpma68d38ccd7f8f7a243b1f799d456cf0dac853ee12a94ae2d333a98cc56446abdbind-pkcs11-devel-9.9.4-74.el7_6.1.x86_64.rpm54297d827a4afdb659a6ab28bee6dfa38b444ce79f9b11d1a7e0279c9582ec5fbind-devel-9.9.4-74.el7_6.1.i686.rpmc347ad7e18e81dc998861eb65eb8cee81ca52d721ef1f81be8974eb9d71ed6e5bind-pkcs11-9.9.4-74.el7_6.1.x86_64.rpm1a05d44a674f5471862b93748495d62d10be67057d9df1cc5748e3faf3930084bind-libs-lite-9.9.4-74.el7_6.1.x86_64.rpm5e5bcd0733401d5700895a9bd0f7f312433488624c576df206ee10fcb6fa2cc4bind-devel-9.9.4-74.el7_6.1.x86_64.rpm8554468e82eb597ad7062526c5ca1fc9ccc93871eafe4aa3a2b6d1013e67f348bind-pkcs11-utils-9.9.4-74.el7_6.1.x86_64.rpmb6cc9defb9459c461ed467a569b019f3325ab6fb0b27ddfe5a9dd9eaac087cdfSLSA-2019:1309-1ThunderbirdSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800) * Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797) * Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817) * Mozilla: Compartment mismatch with fetch API (CVE-2019-9819) * Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820) * Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691) * Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692) * Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693) * mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511) * chromium-browser: Out of bounds read in Skia (CVE-2019-5798) * Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698) * libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)importantScientific LinuxScientific Linux 7thunderbird-60.7.0-1.el7_6.x86_64.rpmea1e8b4a567a62ac2dc1b588c656d4c62026a29f08ffeb3b7098022d92108639SLSA-2019:1481-1KernelSecurity Fix(es): * An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477) * Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478) * Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)importantScientific LinuxScientific Linux 7kernel-3.10.0-957.21.3.el7.x86_64.rpmfdce6241396d5fab1469a3f74d436880054d30b118f167ffba895a8d5dd4c5d9perf-3.10.0-957.21.3.el7.x86_64.rpmf64687cb62ba001be7b229968d51a36cade320115fbd9e8cf5c94b25d639a6ackernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpmdbf39b1c7d5aab5519d0b0b8b376764aa69803d257573fb0af368876b2eb7351kernel-debug-3.10.0-957.21.3.el7.x86_64.rpm9e8c0a9e4e2a3829e6c5234a58c2fb905036edbfcf74be1047c3a71050bc4529kernel-doc-3.10.0-957.21.3.el7.noarch.rpmd46baf9c8e5239d4e90410f051c4e114f476a8f44865438e801fba54b5bc53debpftool-3.10.0-957.21.3.el7.x86_64.rpmb2380aa3a2b0cb3cf7d4fb2eee4d80d121082848b89839ec744afbfe0cd4dfeakernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm3a370cd8239d4dee746f48171831b364e2a7333e4aeeeded88c440af074be2a8kernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm3dff7f67ebd35452d43c81505e938bcae26acb75cd66bbbd217e4489ba95c8a9kernel-tools-3.10.0-957.21.3.el7.x86_64.rpm937aa465c9fdf80c7ab6647f81440a5ae2a28cd0217167c7a18537493ec4aca1kernel-devel-3.10.0-957.21.3.el7.x86_64.rpm5d0a7985e620a34088d66627e0151fcf18c207b12e3f8deb3fcad6c5d7b9a838python-perf-3.10.0-957.21.3.el7.x86_64.rpm8d0343cb0be308d6241a4b00a6da3a070b131ea6cd12b7946ab5c9b76264ac9bkernel-headers-3.10.0-957.21.3.el7.x86_64.rpm2648ca7cd42a68ee0d95308850050694fb42ede86f8cc4bd0c4fa40fff32c5cfkernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpmfab63c06e1fc0a6c6c488bf0424f53b712f2d45470fc98572a515a713ad6e84bSLSA-2019:1579-1LibvirtSecurity Fix(es): * libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) * libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) * libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) * libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) Bug Fix(es): * Live migration fail with unsafe error when GPFS is used as shared filesystemimportantScientific LinuxScientific Linux 7libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.12.x86_64.rpm1aca865b0035fdd857202b8738bed3c2bd51f192ffa2c6b85f1d97a2fe5b1523libvirt-libs-4.5.0-10.el7_6.12.i686.rpme18e409b43d76c3dcb2e186e367d999484ca92afdd509f738ff5bfdc1fccb72elibvirt-daemon-driver-lxc-4.5.0-10.el7_6.12.x86_64.rpm595955e0d3f5624da3a2bd5ec6df02bf9676506197ef5a7f56a541d0037a207flibvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.12.x86_64.rpm31b7ff2af663df4659c67dc0085b3548e5ccef2b34d2e3faedd56ef2ee46835clibvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.12.x86_64.rpmf9b07d5f59ef0d0e5cba1a696ddb053709c32556e4133d2bd39f30695752aa7dlibvirt-docs-4.5.0-10.el7_6.12.x86_64.rpm1125987ec0118264b0aed6ac479535426aca2384797acdcbf7ffb78dd7f9b76clibvirt-daemon-driver-interface-4.5.0-10.el7_6.12.x86_64.rpm2c2195bde021c9b323954b5a81bf735881aaa327c9cbeb95810ac5937b39afa6libvirt-4.5.0-10.el7_6.12.x86_64.rpm652bded0dcf0e8b21d0bf76750417d0e65dda9e6cab49701c6f00f80c0dcc206libvirt-daemon-driver-storage-4.5.0-10.el7_6.12.x86_64.rpm887051482df0e00cd6304c085dcdc1c4558120930822cc1a716a783f9ed852ablibvirt-lock-sanlock-4.5.0-10.el7_6.12.x86_64.rpm54d9fc3236cb39cbfb23dfcc8e7a48e85b1e8bd81fd79cb460050143b1f26aadlibvirt-daemon-config-nwfilter-4.5.0-10.el7_6.12.x86_64.rpmc7add86df6c9b49b154728b2978c7e9778b6717df09c3ffbbf8778ba710d1b29libvirt-daemon-driver-qemu-4.5.0-10.el7_6.12.x86_64.rpmadb0c9914c67132301b4a869bf5c28461457791903fb71e8818cc9ba87a9c991libvirt-daemon-driver-secret-4.5.0-10.el7_6.12.x86_64.rpm1fdfbf6fa4145baf0bb9eb1945ae0da4d8d67a65e216006892c106a7e8a8160dlibvirt-daemon-kvm-4.5.0-10.el7_6.12.x86_64.rpmc52ee6d9ef7b3282d82c7b5a7e120f96546499972354c4ba55e02da7c02e9939libvirt-devel-4.5.0-10.el7_6.12.x86_64.rpma20a1effeb3467fa5814bbc875150c425423a7787911266c45c66e9d6ada26e1libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.12.x86_64.rpmf7460a2cd4a41e2a152ea3769ae767d41a477f0b9a89669c413601abe2645fc7libvirt-daemon-4.5.0-10.el7_6.12.x86_64.rpm9f0c12bfc01d65873182ca1cf7cae8fb8a4c80d7b3b6f591ae19f80ed4ddf506libvirt-nss-4.5.0-10.el7_6.12.x86_64.rpmdccf69350fa243d5437290ba82f49dd708f2418b2d348ddaf45d3e87fa922a4dlibvirt-client-4.5.0-10.el7_6.12.i686.rpm49cd89a2edc15503fe96bc8ab03357ecb7833ec6ea0cf68fa054a05b75d6894blibvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.12.x86_64.rpm6917613d33d365ac4dc6892a62de817e178eda467f6d4bd021d71020487884aalibvirt-daemon-driver-network-4.5.0-10.el7_6.12.x86_64.rpmdacb29e152dd707e81751759f1a5030ead22e27aa6951d345a368b8651456a14libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.12.x86_64.rpm035eea4e11a51bb104908a9c41cface86445b4e0ef8114ba1a8d71766dfba83dlibvirt-devel-4.5.0-10.el7_6.12.i686.rpma989250839aaafa49f2a4720be37f443c0a0e85963e24705d467cf3cb0a54d59libvirt-client-4.5.0-10.el7_6.12.x86_64.rpm7bda9f96f4300bbfd022f24098d821c9e7259cb873ca2ec1a78da56beea9098alibvirt-daemon-driver-nodedev-4.5.0-10.el7_6.12.x86_64.rpm46bd20e2d26fd300dfd6fc57e18ac840d54c597a72792eb054a7fcffa89d0c14libvirt-bash-completion-4.5.0-10.el7_6.12.x86_64.rpm2df3a9952c83fdb852a44bdcfaa771e036765936e9a7df6c07f6ffe484d32e26libvirt-nss-4.5.0-10.el7_6.12.i686.rpmfc0dbe6acd827873194549d2dd8180e2af59379114515be0c8b46e96a006268elibvirt-admin-4.5.0-10.el7_6.12.x86_64.rpmc2c8504ee143860ad3a5753130d73da137af14c43081b75cd402e20a12d1a727libvirt-libs-4.5.0-10.el7_6.12.x86_64.rpm1e4895093dc1ccd0a15c44d57c17c903aed0994db0cfd023c6f436e85d7a61cclibvirt-daemon-driver-storage-core-4.5.0-10.el7_6.12.x86_64.rpm076afa165a66a81ecdd3a0b3b876d10ca3ad308771de9e12284cbe4c2addbcd6libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.12.x86_64.rpm6cf4fd98e1b5a6718d5ad1f8d574627aded9b1b305ec300534a483c4b52c2df0libvirt-daemon-lxc-4.5.0-10.el7_6.12.x86_64.rpmec83f01f9f277a337973eb46ee588ecd7be61099d22cd5f7bacc03cb4e6c6283libvirt-daemon-config-network-4.5.0-10.el7_6.12.x86_64.rpm7b1c0245f22127511bbe1dcb17c2f246330794d2b211997d232bb646abaa33c3libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.12.x86_64.rpm224c8b899a9628d8de8d98e0bbb2ea03abafb344d6dfc2b7bd9aa1817142c017libvirt-login-shell-4.5.0-10.el7_6.12.x86_64.rpm146273525d617530f1db044ac75e4b48ff7a202f2ff3eb08dd89f334fc3a1fc2SLSA-2019:1587-1PythonSecurity Fix(es): * python: regression of CVE-2019-9636 due to functional fix to allow port numbers in netloc (CVE-2019-10160)importantScientific LinuxScientific Linux 7python-libs-2.7.5-80.el7_6.i686.rpm6e9ed1c38f12914035607bbd2457e21e9a67a0ee3e8a032b6ae3ac7cbb27a85apython-test-2.7.5-80.el7_6.x86_64.rpm528c913a2d15ded6a6b32a677962baf4b01c1d4d39b0b01802dd4ed4686997a8python-libs-2.7.5-80.el7_6.x86_64.rpmbbd51ab9d415a54ebe7aef31aed1b79fd6bf99e1a268132726e9ab93599a3755python-tools-2.7.5-80.el7_6.x86_64.rpmef63bbf1a473c814bc895a0d16274495f11c781d4f047294796ba12654a82213python-devel-2.7.5-80.el7_6.x86_64.rpm4cd8fb7fbabe886b053361334544ea27283d816dad47c856b04ad6861468b373python-debug-2.7.5-80.el7_6.x86_64.rpmfc6960e7ca5aa68f9a7135f40700e7c022f8db0581fa43476cf723f09fb75c3dtkinter-2.7.5-80.el7_6.x86_64.rpm49f60f381de93f4f84486c25ea629334c86131f565ae90b04090008367ea78e7python-2.7.5-80.el7_6.x86_64.rpm3e9ede77b07cb13ae29b43e08893b7c515af062ccfbec0c8b4f5c5036d1c8c94SLSA-2019:1603-1FirefoxSecurity Fix(es): * Mozilla: Type confusion in Array.pop (CVE-2019-11707) * Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708)criticalScientific LinuxScientific Linux 7firefox-60.7.2-1.el7_6.i686.rpm2c3f8cc3afd4791520447ccda510055af35b12c13b8f05f1028332f70708bef8firefox-60.7.2-1.el7_6.x86_64.rpm51e0bbea0a60e05c04ceb0a1211f73e449e8172b58e367d275793436af42510cSLSA-2019:1619-1VimSecurity Fix(es): * vim/neovim: ':source!' command allows arbitrary command execution via modelines (CVE-2019-12735)importantScientific LinuxScientific Linux 7vim-common-7.4.160-6.el7_6.x86_64.rpm61634e49e75686731b93201d8b96cceb817cfaf8ad2779c53cd54d7e4983854bvim-X11-7.4.160-6.el7_6.x86_64.rpm7b9d087111b99bd158d1e217f5b5874d3316ee7e1585b08ebbba65b4f2565015vim-minimal-7.4.160-6.el7_6.x86_64.rpmee1ad0f96a80cd5be71d53643293c3d64c9358eba745ebf7569e1f9c6e444f19vim-filesystem-7.4.160-6.el7_6.x86_64.rpm173891f6d8127e720099dc85b2f4b10de9a61a9ad37be98451f6aa089bdc7a57vim-enhanced-7.4.160-6.el7_6.x86_64.rpm62677c87b13e49e65ed5f1d1d04f08e5e629e02ba305809b948a9c46b8c4eaa1SLSA-2019:1626-1ThunderbirdSecurity Fix(es): * Mozilla: Type confusion in Array.pop (CVE-2019-11707) * thunderbird: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c (CVE-2019-11705) * Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708) * thunderbird: Heap buffer over read in icalparser.c parser_get_next_char (CVE-2019-11703) * thunderbird: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c (CVE-2019-11704) * thunderbird: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c (CVE-2019-11706)importantScientific LinuxScientific Linux 7thunderbird-60.7.2-2.el7_6.x86_64.rpm72252b9ff5bf5cb1105ba687c1776ec857a8d105caa982ea7d6fb3e688c4f558SLSA-2019:1763-1FirefoxThis update upgrades Firefox to version 60.8.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709) * Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811) * Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711) * Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712) * Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713) * Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715) * Mozilla: Caret character improperly escaped in origins (CVE-2019-11717) * Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)criticalScientific LinuxScientific Linux 7firefox-60.8.0-1.el7_6.x86_64.rpm126d2d55613f87f38b26e139743d94f4ea356ff6d23f10df2a79560af6853a90firefox-60.8.0-1.el7_6.i686.rpm42fe07b65fc07271919a4f9094875ebbc188f0e72bb2d9cc2377034312a594f8SLSA-2019:1775-1ThunderbirdThis update upgrades Thunderbird to version 60.8.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709) * Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811) * Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711) * Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712) * Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713) * Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715) * Mozilla: Caret character improperly escaped in origins (CVE-2019-11717) * Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)importantScientific LinuxScientific Linux 7thunderbird-60.8.0-1.el7_6.x86_64.rpm6bddb08175b85dfab59de5c769b765e7dc52a41c82b211e0d34a1434ef6d994dSLSA-2019:1810-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * OpenJDK: Incorrect handling of certificate status messages during TLS handshake (JSSE, 8222678) (CVE-2019-2821) * OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786) * OpenJDK: Non-constant time comparison in ChaCha20Cipher (Security, 8221344) (CVE-2019-2818)moderateScientific LinuxScientific Linux 7java-11-openjdk-demo-11.0.4.11-0.el7_6.x86_64.rpm591112f9c6f767f6065415cd5f74da8c9863bd89d520bf7d9b0aa200276a626fjava-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6.x86_64.rpmc384e407a554b78430ec59934fb2a8790ef0c7a2b716a17a799593f80e7747bajava-11-openjdk-jmods-11.0.4.11-0.el7_6.x86_64.rpmca7334eec7ae2bf61f24432512268242d216b749b9e1f25ec46d9f49bc4fcab3java-11-openjdk-demo-debug-11.0.4.11-0.el7_6.x86_64.rpma0a57e7fd9030d01cf64e0d15da2744f722be2fc605ded9185b2b49b03ec4169java-11-openjdk-src-11.0.4.11-0.el7_6.i686.rpm1a99ac65e1a3ededd24434ce1489915228a34f2b8c0b7cffe96d975a21092c49java-11-openjdk-demo-debug-11.0.4.11-0.el7_6.i686.rpmc4200636f0372d5c1f54330be4f33677d7b8c55a9d8487c418290f17e189cb99java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6.x86_64.rpm1c6de5ff1ef8540789a59a3b9747ce1e504a9f11f9214f13257d1256d30b9c03java-11-openjdk-11.0.4.11-0.el7_6.i686.rpmd2b76f737398a0914201c6c2f0b627b7c11ff8007a684d9c910d6aea9a04f5e8java-11-openjdk-src-debug-11.0.4.11-0.el7_6.x86_64.rpm56ad1d89a116654ad45b6b6fdbfaddf7beebddd18c609980b564b6c15ecb0871java-11-openjdk-javadoc-11.0.4.11-0.el7_6.i686.rpme80c662ca88ac4820132f765946842fd9e60dbbcf1a442c2eea0eabaa74e757ajava-11-openjdk-devel-11.0.4.11-0.el7_6.i686.rpm5f9ebf70ca546fb96e0f1ba46fe8739c5dce60e44de08d83fb17a4c721cdf4adjava-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6.i686.rpm2d620d14044937a11d1e2f135d968bc5d98addd60a05f8ba6d5faccb18f7bab7java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6.x86_64.rpmcb6d00e20df4f47d8fd89e0a491468c6e11237e8ee6b3272c6ffb6a41e5250c6java-11-openjdk-javadoc-11.0.4.11-0.el7_6.x86_64.rpm1c0371dca43650ac57a7f2d7570f562dba90ca8748fc7b603b763bc49d1ee07ajava-11-openjdk-headless-11.0.4.11-0.el7_6.i686.rpmda38f1c58a045cf357683cd04d5f95e45756a92e81ea62d5ea5daebd19273619java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6.x86_64.rpma348435446548799dae825f30b6f267cfc4a9766c4b808662c09ff1ba15f3dcfjava-11-openjdk-devel-debug-11.0.4.11-0.el7_6.x86_64.rpme8f959a5249202a78dd92e58dccff88fa7ccf213f69928d4534524a3fe82d082java-11-openjdk-headless-debug-11.0.4.11-0.el7_6.i686.rpm3a8a865d8efa5eff0d33e72286396e646d74c9f497ecf1911d86c91ee735f814java-11-openjdk-debug-11.0.4.11-0.el7_6.x86_64.rpmeade03a37958bdeb8e59c1aa131d891fb654296ea6ff9ae7f43524537fd1a6dcjava-11-openjdk-src-debug-11.0.4.11-0.el7_6.i686.rpmdf599f4cdc496007e38b55940e0395567fd76a0210d81aa1811221b4e67adce7java-11-openjdk-debug-11.0.4.11-0.el7_6.i686.rpm5f5f175aaef45b1136c0e38eba4aea22a70b534a7a3c1870aae91e7f29b13d02java-11-openjdk-demo-11.0.4.11-0.el7_6.i686.rpm44c697ec5c3a2952470fecd68ea09fc811f312d7945e0f502fbaf31ed0602405java-11-openjdk-devel-debug-11.0.4.11-0.el7_6.i686.rpm7145db8aaebdc9e114dc662a4d761f29e17165a51c7b3d4c08ba50896c746bbfjava-11-openjdk-jmods-11.0.4.11-0.el7_6.i686.rpmb1bb884e9deca1691385f837f77b09d71747b6107cc535f89345e9d68044a6ecjava-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6.i686.rpm489d33b9684186906536b26471d618234866c5d3da352efe341c18cb2e9b5147java-11-openjdk-11.0.4.11-0.el7_6.x86_64.rpm84dd3ba2f40feaa50f28b50e5e92e74908c13262b349b22135ecb1d706a7b06cjava-11-openjdk-headless-debug-11.0.4.11-0.el7_6.x86_64.rpm4003ce94d07d075f945dc7049be87b71983376df48ff3f695922d28a70a469d9java-11-openjdk-src-11.0.4.11-0.el7_6.x86_64.rpm456d551aad1ba2b75b1d38480c7acd73f0df988891d8068f4ead088366f6eaf0java-11-openjdk-headless-11.0.4.11-0.el7_6.x86_64.rpmafb061b2fcc72d53b087807e9e833f417f4cf7a30a6e0800e645302719d4c348java-11-openjdk-devel-11.0.4.11-0.el7_6.x86_64.rpm315bca265bde1c28b5cd536b53a329352970fee1d3476cf4dcc4e06eeb97ea1ejava-11-openjdk-jmods-debug-11.0.4.11-0.el7_6.i686.rpm1d0260405ecaa737cdfaa945b1d940a6e7bbc1d2045c4b4e1b0aa083e8eb6778java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6.i686.rpm59d8166727801bbf05e4004e8942f4f9d1df4e72431159352392ff0b35cf14ccSLSA-2019:1815-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842) * OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6.x86_64.rpm6958e54fe909aeed091e34e34e7f3077944df3bd573eff8d775fb277ac8387ddjava-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6.x86_64.rpme189f5eceec525d6f899e70c627f7b66e0316bd8fdf94a4c29037343698b153ajava-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6.x86_64.rpm1cb1bc4b155ef266ebe999c799073a5f882e8d3f206e02b949ad041a226acdffjava-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6.i686.rpmcbe296b528243af76a218cee48f6f450aff571e6f49e3ed0b0f0768eb9f54c51java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm58893f399cd12fc27b5e7161a80cbf152a464fe65a809204f50371706417029ajava-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm9392ad8778e79613124abe925c99a6775beca760b28232b7343d27b2dc6cdf29java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.x86_64.rpme3f297c39952ea8096bbdf8249d2b6ba4e24a92f2de1b7b9bddd990b5b28f8b5java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6.i686.rpm93cb00a9e9b2dd7edbae23654ff53e3968146bff466d4faacc4ec2dfb66d1c52java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6.noarch.rpmcceff5db39e1c6f09f7bec4f4e23315b92ee8d3226193da6fc5228ca982a2439java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6.noarch.rpmbaed0d18bfde493dd9358001c53920a26d2a7b70bbf473a8bdf0c29632846f50java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6.i686.rpm003c780db610898b83bfaaed98e426a1b022475bc6adade08ec27c7ccfba733ejava-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6.x86_64.rpm379cd6f3dcf6d1c4d49e1e16fd3acce8c440a205d9d63dcd0a33354f4f41131ejava-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6.i686.rpmfcfc1267fb0e17d5ad5afdb17923ee06e18d6cbcfa5420ae22ae8e658e92c9aajava-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6.x86_64.rpmaf7d23d108936d15f9d42ee27da11197d7861314faf808b2c1cd44e2b5d57370java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.i686.rpm66632d331752a80faf6d53057297516b6107ee7689200b1f46ca2e1ed79a051bjava-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6.i686.rpm58be1052a7a0d5c0791c0620b2877acba24f7481711d4dae8e008b9f7facde33java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6.i686.rpmcd7c5d159594c45e1e5c9a7be7daaf9853e476ebb6e9fafd4ccae1ef5fade5cejava-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6.i686.rpma93d71fe77604e55ba0f699370a20c51645df4772d51e19dcaea10efd55a4116java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6.i686.rpme65808deba1032fe727fa95f9a48f3aa758db00a35dc3844b1abc7f8b304ac28java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6.x86_64.rpma91691a0a7cf2927aa6be4ead72dac18dea0230d14b8e4a62b5e79f94d2f538cjava-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6.noarch.rpmaf47b3b7e2250e4e81425430f22301a0a2315f24f2947a47a4ecb087d22eda0djava-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6.i686.rpmc9654f0466b6695f7feb47b3bf03145d3b91dcc015816e2411c9a7404c834deajava-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm5091228b50317c85f07de6d66522170a8f831ea37a67df02bcba49b234d7432ejava-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6.x86_64.rpm30fbdad254274f2a7441256d005e6322a8a980dd5e79f43441819f355cab65c7java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6.i686.rpme6739e1f685e9c5a2a505eef857f1b813590b2a5f37287d3a20c7f3972383b42java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6.noarch.rpm98a2588a5b26b9625a4d8ab649088317e324c3ed927a598d5ec49655dc7dba17java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6.x86_64.rpmbde458f89e120666f4da3bf6beb10c1082ed76223103d1865d84ad90d608ca46java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6.i686.rpma00b98c01d91c947648f66435f3112d5000285042e0771c6860a9403af513b20SLSA-2019:1839-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) * OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) * OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) * OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) * OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842) * OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)moderateScientific LinuxScientific Linux 7java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6.x86_64.rpmfd33308664f1eb7cb9d01032bf57ae755492150a5b0c96389d3c3547284158e6java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6.noarch.rpmc01077f4ec163c99b46eb92dad5a53b8435acc6c52f4ed74943a0997704f05c3java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm711170051ba2c38457007cd7b61646c61bcb40d276db3cdf8e3d14dd3d0f145djava-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm83af3ec05112d04234172651a750ae62dfa84ded6dc89ebb18394584a18e5c9ajava-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6.x86_64.rpmec3fe358bfc6253f1247a3e1f6784321d82145e2a977a051bc91844b11e2f641java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm5a74e703616c0b7b504452b210712857fb32c11f8aa0b747d13355d2becf1274java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6.x86_64.rpmf82d2d747293eca0a0c6749bda353f0a1852a4ae6b3197f8a096a3cebbbe22a5SLSA-2019:1873-1KernelSecurity Fix(es): * kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884) * kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085) * kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871) * kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-957.27.2.el7.x86_64.rpmfbd81b85f33663aaaed9c8e44a029db15bdbf12c2f335fc6830fbb0af4440059kernel-devel-3.10.0-957.27.2.el7.x86_64.rpm30bd158da247ef12560097a6d2a2dac254af2c6b6aef396c91517465d4effe41kernel-tools-libs-devel-3.10.0-957.27.2.el7.x86_64.rpm542fd050935f7360ecbba7b619198e1409d57da315c19096bf5fff070a622639kernel-tools-libs-3.10.0-957.27.2.el7.x86_64.rpm31fa9142927360b24a193e04038443d1d32d8fe8179cf2b5ee15d3569414ed2ekernel-doc-3.10.0-957.27.2.el7.noarch.rpm5f3b220c9c914c58bf725ffbafedac93c8831c374c00341f4fc034bb7a5c060fkernel-debug-3.10.0-957.27.2.el7.x86_64.rpmdadc7b68a925b62101a8e92ef74be2d974f65c1e7930392e44c1c5cc54904cbcperf-3.10.0-957.27.2.el7.x86_64.rpm8bc1774319c3d9477c4c5dc3c4a0ba10161f6389efcf9c57631597b747b97267python-perf-3.10.0-957.27.2.el7.x86_64.rpm896ff9245dec061c2ff291e0345ec43009cf06cca3aa63875b341614f95dc49bkernel-abi-whitelists-3.10.0-957.27.2.el7.noarch.rpmf72d5bef3f7131fe040f2760bab7cc38cfe6fb7382e17d5359313ffcd96dbf44bpftool-3.10.0-957.27.2.el7.x86_64.rpmd9c5be02c096c1dae2a97c6826f631fbc468614944a4af2d80b601734b8be412kernel-debug-devel-3.10.0-957.27.2.el7.x86_64.rpm48151e15e31a991a06ea0e33c193a1df6a16ee5f2b84983ee970758d27e71446kernel-3.10.0-957.27.2.el7.x86_64.rpme8ebba191ac42937be0f1d79f3da7405344d5f1a2e96566ecbc41f324e6d783ckernel-headers-3.10.0-957.27.2.el7.x86_64.rpm3b57a3ff7658bd3355534e71bda9c01cd1747dd47df5b55f7a7524e922117325SLSA-2019:1880-1CurlThe curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: NTLM password overflow via integer overflow (CVE-2018-14618) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * baseurl with file:// hangs and then timeout in yum repo * curl crashes on http links with rate-limitlowScientific LinuxScientific Linux 7libcurl-devel-7.29.0-51.el7_6.3.i686.rpm064aba008b886dc82c669739a936e2b077c0f07114409a68cc29031f90c5a8cbcurl-7.29.0-51.el7_6.3.x86_64.rpm39fea7925843be06418a77ad97de0f42a0537712c0c3515e39d007164c9983d0libcurl-devel-7.29.0-51.el7_6.3.x86_64.rpm870aa45eb5eea12e6ce3b20c2a7cc56487ee9de13abeb960629e7f3271c934ealibcurl-7.29.0-51.el7_6.3.x86_64.rpm8db528f7d40eae727d1efbf4658c621ce58e8379903f5b6ff03dc0802b4ddbaelibcurl-7.29.0-51.el7_6.3.i686.rpm44330507a6dcc830b8efe5647ff6c0d484cf7ec972734da3af8566971723deebSLSA-2019:1883-1Qemu-KvmKernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Security Fix(es): * QEMU: device_tree: heap buffer overflow while loading device tree blob (CVE-2018-20815) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * As newer machine remove csske feature, detection of the processor fail and machine used old version as fallback. This update make feature conditional so detection of newer cpu works properly.importantScientific LinuxScientific Linux 7qemu-img-1.5.3-160.el7_6.3.x86_64.rpm8b94e5d1de94d04960aba1aa74974a7025a2bfa7605974afb1b7f0d74b0744b8qemu-kvm-1.5.3-160.el7_6.3.x86_64.rpm20a9cdb53e9496722ecb2528acb49f46f93f4bedc5a01a69f4895e26d392b6a0qemu-kvm-tools-1.5.3-160.el7_6.3.x86_64.rpmdef2bb682462b27dade792d679828a6e977f1f8e53d457875c0c624478066d92qemu-kvm-common-1.5.3-160.el7_6.3.x86_64.rpme42dcec36b1576d41577c3a236b50a6bcc9afd4ce3aff0b62ead5fe7d0461f55SLSA-2019:1884-1Libssh2Security Fix(es): * libssh2: Out-of-bounds memory comparison with specially crafted message channel request (CVE-2019-3862)moderateScientific LinuxScientific Linux 7libssh2-devel-1.4.3-12.el7_6.3.i686.rpm453feab9a385bb6072cf1f4808efa14e65ad46332dc01218bef585cd513360eflibssh2-docs-1.4.3-12.el7_6.3.noarch.rpm401daeed4d9a4c2796c9b1a465d23fd6cfa6a03ad68d4f0d5d2b141b09ca41f8libssh2-1.4.3-12.el7_6.3.i686.rpm896c52d7ea00d3852fede7f3f0d45b08abb271637a8c7de0e3eae016fe7ae75flibssh2-1.4.3-12.el7_6.3.x86_64.rpm046e551216c6acdde2a969c2ebbfdee9bb0d511eba18cc93472fe5956df5b292libssh2-devel-1.4.3-12.el7_6.3.x86_64.rpmf5b1bd332e10125d3e265711aeb5de576d549f2de7fe02dcb3c353170926a6a7SLSA-2019:1896-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: DoS via hanging secured connections (CVE-2019-3883) Bug Fix(es): * Previously, if you were using the PAM plugin and attempted to bind as a dn that doesn't exist, the server would crash. This has now been fixed.moderateScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.8.4-25.1.el7_6.x86_64.rpm5c646b6ef5e62fd672beb6c637d70b93e6391bc7315e79b305d2b0b39065bf85389-ds-base-1.3.8.4-25.1.el7_6.x86_64.rpm3fb74196e4750e8466f1b8e59fb45d5dfbcbd2ffbb0030be1293cd72efaecfda389-ds-base-libs-1.3.8.4-25.1.el7_6.x86_64.rpm16cd8ae8acb33a8b76e6c09d38a17a01632b8f4be6740cfde00c789525a3eee1389-ds-base-devel-1.3.8.4-25.1.el7_6.x86_64.rpm318e8242e366e9b5cde1ef702a67db599af87a8313594e6c922b03fed515ae99SLSA-2019:1898-1HttpdSecurity Fix(es): * httpd: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312)lowScientific LinuxScientific Linux 7mod_ldap-2.4.6-89.sl7_6.1.x86_64.rpm2fd74f29430f70f58fde1ed5560f52c2c6e8c27ebcc562717045f3cfe0824d0bhttpd-2.4.6-89.sl7_6.1.x86_64.rpmbcd9b2517876a2268c285b0033813966392de1c306fba030be7453c18ae5b983mod_session-2.4.6-89.sl7_6.1.x86_64.rpmab0f6d24e6f4aaed8afb0e0d47208c57226a52563b1f0ae0467d8ab4a51fafc8mod_ssl-2.4.6-89.sl7_6.1.x86_64.rpma5efe103d3defcdde5521a32e146a587b35ba33f82c969c22b6afd69c80b7f28httpd-devel-2.4.6-89.sl7_6.1.x86_64.rpm5ad32a07a1dfe5a6798de2f0604acd0c0fc77ee7a6cf1c0164973a64ff085f2ehttpd-manual-2.4.6-89.sl7_6.1.noarch.rpm65283214519aee248d29a0ae40afb98389550f1811c57e7283a426653f96f7e9mod_proxy_html-2.4.6-89.sl7_6.1.x86_64.rpm1d3cee7bff485654792a8f1c0547193f5703ae15ecfc85cfcf916a395c95cc3fhttpd-tools-2.4.6-89.sl7_6.1.x86_64.rpm568115c0fed0bca38a1291992b389c2776d29483a4d0da6218625a28aa276df3SLSA-2019:2003-1Icedtea-WebSecurity Fix(es): * icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite (CVE-2019-10182) * icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite (CVE-2019-10185) * icedtea-web: unsigned code injection in a signed JAR file (CVE-2019-10181)importantScientific LinuxScientific Linux 7icedtea-web-1.7.1-2.el7_6.x86_64.rpmbf2fb0b95b6afef5b1af87084fd9ce50f321a4fb050b935178f7a0948b40b1faicedtea-web-devel-1.7.1-2.el7_6.noarch.rpm4b91d96aa1d50beef9712d1381b50bd349de36a35da0be6923e688e3b6b4b901icedtea-web-javadoc-1.7.1-2.el7_6.noarch.rpmc40e35eeeb53ceb78c3f14736562136e39b14735c8436aef499129dad0a6788fSLSA-2019:2017-1ZshSecurity Fix(es): * zsh: Improper handling of shebang line longer than 64 (CVE-2018-13259)moderateScientific LinuxScientific Linux 7zsh-5.0.2-33.el7.x86_64.rpm2d9e03c821560e782b684bd40f4a2659b6b4ea4c05ea6e43503e8b1b88a336abzsh-html-5.0.2-33.el7.x86_64.rpm3efc548c5c41e574afb2a743f5a5c18c24c228adb8ee509269ee83a25cc7b12dSLSA-2019:2022-1PopplerSecurity Fix(es): * poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc (CVE-2019-7310) * poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc (CVE-2019-9200) * poppler: infinite recursion in Parser::getObj function in Parser.cc (CVE-2018-16646) * poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc (CVE-2018-18897) * poppler: reachable abort in Object.h (CVE-2018-19058) * poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc (CVE-2018-19059) * poppler: pdfdetach utility does not validate save paths (CVE-2018-19060) * poppler: NULL pointer dereference in _poppler_attachment_new (CVE-2018-19149) * poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc (CVE-2018-20481) * poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc (CVE-2018-20650) * poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc (CVE-2018-20662) * poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc (CVE-2019-9631)moderateScientific LinuxScientific Linux 7evince-nautilus-3.28.2-8.el7.x86_64.rpmb7a799cc5aed5b4042832fa62141170173c2c98d2bd0a15572632cb9a080744apoppler-qt-devel-0.26.5-38.el7.i686.rpma29f5eb61e317b4043d8d0a28094ae796d9d47ac461246680cba6b3aeb1baea6okular-devel-4.10.5-7.el7.x86_64.rpmd8e5b42ebc3238b377fd16ec19017e200bba3372003525e5a764933dc0cdab57evince-dvi-3.28.2-8.el7.x86_64.rpm17f89371b60aa34cbff04cd2e634d59347701401552fa183bd8e6f2ed91939d0poppler-demos-0.26.5-38.el7.x86_64.rpm6062a3ec00a2a3baf5df980748ce731b0a0749bc450dc7d000bb50d4d1acb448poppler-glib-0.26.5-38.el7.x86_64.rpm01eb9039559921deac7d2e1122beb73f595638255031b6d602e3948c71754d6dpoppler-qt-0.26.5-38.el7.i686.rpmc58fddc7174d01b547d70085d396afa0dc826a6d1c7ed6d1e09701497c49b50fokular-libs-4.10.5-7.el7.x86_64.rpmcfbcbd6300401f7b7c911ee731db76b984d539da663a9a6a6b907f2f7b25a34cokular-part-4.10.5-7.el7.x86_64.rpm5523de9c70076af86f5fad1d61ffa3d284715539416f4bcb727f1ad7a317ef48evince-libs-3.28.2-8.el7.x86_64.rpm057199893ce80be695189754730b354b053e2cb00ce5be43f350284312cab88cpoppler-cpp-0.26.5-38.el7.x86_64.rpm6b14b1965247d10ad9ae1743e147bad7332512cd2e07ee868290cff31e7b5b12evince-libs-3.28.2-8.el7.i686.rpmefb195b9f6effd1fc3f2f7c2b6057c033b10aa3a741c7d403b1b6f1e908a39aepoppler-utils-0.26.5-38.el7.x86_64.rpm98f8ba6ba84e3e36cdef5aa98e89b619cd1ffe1f8055795e1a105bc3469df01fevince-devel-3.28.2-8.el7.x86_64.rpm414787fe1287b350803cb08195cb526a8503e008ea92ec153847ca42fdd8dd9aokular-4.10.5-7.el7.x86_64.rpmba04b42268808c767d17c76ed25681b55b31d92a9517faa7d3f0bb20391ae8fbpoppler-qt-0.26.5-38.el7.x86_64.rpm8f58ac013e48fd6305a1389577e8c295e5eff13f21c2bda7bb526a5c285521depoppler-glib-0.26.5-38.el7.i686.rpmbba01f17055d6e1204aa1c9dca450f535f3abb92debb23cad2030e3f77ce3409poppler-cpp-devel-0.26.5-38.el7.x86_64.rpm6f49a6a0a97976854f6816df359957ed2998255f1985d1758d062a3d0a0ba6d4poppler-devel-0.26.5-38.el7.i686.rpmac8be02a59af5e6691b656ba67acc7d5774e1092d6f687966af1d9fb1bb0402bpoppler-0.26.5-38.el7.x86_64.rpme0820defb8f7748951bbe8e5702d21efd444f38eeac7e6663df33cdf3ee7d1bbokular-devel-4.10.5-7.el7.i686.rpmb72f2f9a2c812c8d699785b3eced579695e5303b99e7740b76638b86001a853apoppler-glib-devel-0.26.5-38.el7.i686.rpm9530a383ce211d677b204797bbbfc0d806f550933bc770412b07ea12f7dd389cevince-devel-3.28.2-8.el7.i686.rpm2518412c39b1bc73fd39bf9412ee48cc7cbe2bb026adeecbc9c13c3c93dcf137poppler-devel-0.26.5-38.el7.x86_64.rpm3d0daffda0292b9a716143192c078f8c2df5dfecdcdfda38e730cfa6fc688ea5poppler-cpp-devel-0.26.5-38.el7.i686.rpm449607645576b117484fc0b8b9361382e2c76e27c6a10579db4f959754df5d33okular-libs-4.10.5-7.el7.i686.rpmd5b61b01d976a3f7cc4c85c51d13b6317cdcb47dd594c09ae499a2190edb22b3poppler-cpp-0.26.5-38.el7.i686.rpmd5585933b406ba245ed58235088086077909c4912bfdb0806014e25e8add3277poppler-qt-devel-0.26.5-38.el7.x86_64.rpm84431ef7f6134ef3d44bc38f201e17e390dbaffad035d2253d0f55ee3afe1130evince-browser-plugin-3.28.2-8.el7.x86_64.rpme8cd1f672f49f2beb546591a14f716168db85716fb7e528d9ffaa3faefe3f110evince-3.28.2-8.el7.x86_64.rpm7c12c47b7a003b8f3223ab303c7e2bc2ddcd5ee562bbf6bf84209dc57b69a880poppler-0.26.5-38.el7.i686.rpm830ddf2a436ddd6e4c8494bcc50ea6b6e6faf4a9432fc11f2d5301a4cbd6f8fepoppler-glib-devel-0.26.5-38.el7.x86_64.rpmadd4ff127888e439171b57c8fda81e8a20b4e4bdfb51d8392e618150133f177dSLSA-2019:2028-1RubySecurity Fix(es): * ruby: HTTP response splitting in WEBrick (CVE-2017-17742) * ruby: DoS by large request in WEBrick (CVE-2018-8777) * ruby: Buffer under-read in String#unpack (CVE-2018-8778) * ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780) * ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives (CVE-2018-16396) * rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073) * rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074) * rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076) * rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077) * rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078) * rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079) * ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (CVE-2018-6914) * ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket (CVE-2018-8779) * rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)moderateScientific LinuxScientific Linux 7rubygem-json-1.7.7-36.el7.x86_64.rpm9cc88d73fdcae3886babf646cc72000689ddfa033e9156ea8ac4bc12d1c61e4eruby-tcltk-2.0.0.648-36.el7.x86_64.rpm6783cdba73b27585cc8c7d077b49a3cb5d4c9008176ebe44352cc1d2e362eeb1rubygems-2.0.14.1-36.el7.noarch.rpm51c49312c71a5d4e2ef6f2bd9971bb717eb0f926dcf6d86f6814e35704f01729rubygem-bigdecimal-1.2.0-36.el7.x86_64.rpm56d9f180d32a28067e57062c660b3f0e4380e6ca8559b79699a81af362796cbdruby-irb-2.0.0.648-36.el7.noarch.rpm483d9daadf9768362fc76c852a6e9a7f5cabe569d9cfc36599326b1c43573853ruby-devel-2.0.0.648-36.el7.x86_64.rpmaaa51d3c7b1470b3d636d1bd584c90e57f9e34e50823bfe9d60c7689ec5b35ecrubygem-minitest-4.3.2-36.el7.noarch.rpm6fb491f42f071742aab4c0f904edcd35c82b05359f5e80133dd75b238f6af1d7rubygem-io-console-0.4.2-36.el7.x86_64.rpm4170a71a95d28025d087c2ca253d5bad9b9919b3addec2ea6274e6d98f640f64rubygems-devel-2.0.14.1-36.el7.noarch.rpmdc1d1c67ad9a0c176bf2481065e19d59e95f5d9f6a500afd4a67d1cbb70da987ruby-doc-2.0.0.648-36.el7.noarch.rpmfebc35c03b1a1f3c8bde8bcafaf9fe7b7fc0f58de3981639c070bd2e7b7e431brubygem-psych-2.0.0-36.el7.x86_64.rpmf15f4e5bdb98d281c73808d2990fbf729b562781a462e5ee89fa6c42f95338e4ruby-2.0.0.648-36.el7.x86_64.rpm4df96e6080a3043371e9ce57d0ec9994458553b7f694c3b56d602223931edea0rubygem-rake-0.9.6-36.el7.noarch.rpm4834b8b3a6ee4debcb21fddc04692e37f8cf488fcecede6ea747bcc290ea8d69ruby-libs-2.0.0.648-36.el7.i686.rpmd9fb759df79a9feaac6e810a0237f3c318b270e25d7fb7bd65584895f41be5d4rubygem-rdoc-4.0.0-36.el7.noarch.rpme922d2bb4bf096a628c049b90e8277a14fab06bc646ec156bf37e68421b1e077ruby-libs-2.0.0.648-36.el7.x86_64.rpm0350f7109b6ac9cb061ad65ebd0d707d4db0075064b950c593704f2fca1b1c3dSLSA-2019:2029-1KernelSecurity Fix(es): * Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900) * Kernel: page cache side channel attacks (CVE-2019-5489) * kernel: Buffer overflow in hidp_process_report (CVE-2018-9363) * kernel: l2tp: Race condition between pppol2tp_session_create() and l2tp_eth_create() (CVE-2018-9517) * kernel: kvm: guest userspace to guest kernel write (CVE-2018-10853) * kernel: use-after-free Read in vhost_transport_send_pkt (CVE-2018-14625) * kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c (CVE-2018-14734) * kernel: Mishandling of indirect calls weakens Spectre mitigation for paravirtual guests (CVE-2018-15594) * kernel: TLB flush happens too late on mremap (CVE-2018-18281) * kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459) * kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460) * kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882) * kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599) * kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810) * kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833) * kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c (CVE-2018-7755) * kernel: Memory leak in drivers/net/wireless/mac80211_hwsim.c:hwsim_new_radio_nl() can lead to potential denial of service (CVE-2018-8087) * kernel: HID: debug: Buffer overflow in hid_debug_events_read() in drivers/hid/hid-debug.c (CVE-2018-9516) * kernel: Integer overflow in the alarm_timer_nsleep function (CVE-2018-13053) * kernel: NULL pointer dereference in lookup_slow function (CVE-2018-13093) * kernel: NULL pointer dereference in xfs_da_shrink_inode function (CVE-2018-13094) * kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c (CVE-2018-13095) * kernel: Information leak in cdrom_ioctl_drive_status (CVE-2018-16658) * kernel: out-of-bound read in memcpy_fromiovecend() (CVE-2018-16885) * Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)importantScientific LinuxtrueScientific Linux 7kernel-debug-devel-3.10.0-1062.el7.x86_64.rpmca5071e03205bdd59a39910d8a4a3d2c03bcf781dab15c5584391bcbefac3895kernel-tools-3.10.0-1062.el7.x86_64.rpm9ca20b7e947f841582326738db014c285ed2cfd49a5be7a0899c084439d38744python-perf-3.10.0-1062.el7.x86_64.rpmefd0a024c2f25d004ed387e821a54f69d4bb7867a68970e4aa6943629d871041kernel-abi-whitelists-3.10.0-1062.el7.noarch.rpm4cf0e67b1f31d87e3f690aed1d952572709d77b487109e4261794cae45b6dc71kernel-debug-3.10.0-1062.el7.x86_64.rpm6ce355a234754990e6b0f95868c2718dc92b20922078f0afbfbba77517bcbc28kmod-openafs-1.6-sl-1.6.23-1.SL77.el7.noarch.rpm58feb7290fc3b6fc3633d50c1b99f4df58aafc5f3db17a6bda5145b4653c275aperf-3.10.0-1062.el7.x86_64.rpm9a622fd2efcf0053b2f12e6ff725293f6d258ad925ab8aa157aa2503f035d2ffkernel-devel-3.10.0-1062.el7.x86_64.rpmf46bd7b2ff6f7d9b974f35c6fb5f481bf459cd092f0f3e0a482ae1d0314f6341kernel-3.10.0-1062.el7.x86_64.rpma4ca9692fef93553fdae43550a0fc44c187d1df55c3315ef07d262d62d394779kernel-headers-3.10.0-1062.el7.x86_64.rpmc3673dc08f46f8bd50c6ba8e33ffbd8b0737882ca5b8fee4de720aff3fb96b59kernel-tools-libs-3.10.0-1062.el7.x86_64.rpm799fac0269040859fe62acd4dc5f5ef8a65b68db6519abec5c302952789dca44bpftool-3.10.0-1062.el7.x86_64.rpma0b7aa9b79176e8eabc4c7966cf246ee439de04847d623c7b6cb9d7f1480d61akernel-tools-libs-devel-3.10.0-1062.el7.x86_64.rpm51c372a008839238d24af9d8ac023996bc0b35b4474abe2ca6f448e6c677ddffkmod-openafs-1.6-sl-1062-1.6.23-289.sl7.1062.x86_64.rpm941d17a6fa3eb287b00224bb15c0ecebddd60512cf8d06584a2819f5e998a4efkernel-doc-3.10.0-1062.el7.noarch.rpmf3d9bde4872ee4f712e2f262528987ea7253d620542446fca63e33cbce808bebSLSA-2019:2030-1PythonSecurity Fix(es): * python: Missing salt initialization in _elementtree.c module (CVE-2018-14647) * python: NULL pointer dereference using a specially crafted X509 certificate (CVE-2019-5010) * python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) * python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) * python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)moderateScientific LinuxScientific Linux 7python-libs-2.7.5-86.el7.x86_64.rpm2cec35cc90145ccc1a33a1f44dd5d3a54eb9fd49e603a8687d3f4fad9562de13python-2.7.5-86.el7.x86_64.rpme9b6d35bc58428e5d112039dfad510c1c54239568063c5ef716fbe8e07be3404python-test-2.7.5-86.el7.x86_64.rpm38be9321e392383e78a223f56488d2736d9f1a6b569d0a9b029b285b7771a80fpython-debug-2.7.5-86.el7.x86_64.rpm61ea66c8bb37394e425be7b386d9e3cad40f02460a277b3c62c162ec7ead0b9ctkinter-2.7.5-86.el7.x86_64.rpm12d3c7178b77149b5c1dde2af90e961059dd99414c21fd2186935f0251caf976python-libs-2.7.5-86.el7.i686.rpm5e596aa85f4be3af24e4c7b69bde9b47d5f4308f5fe3e84b7e1b6084aefce768python-devel-2.7.5-86.el7.x86_64.rpmbbfd5b99b5eb9834756ddbcd2d0aff1c6a6c3b792e4e3694d73cdc3a632d5f70python-tools-2.7.5-86.el7.x86_64.rpm3aedf53ea720c6f8b73a3f8eeaf359e857b36830b2ad17c2d13cd730addb7c64SLSA-2019:2033-1PatchSecurity Fix(es): * patch: Out-of-bounds access in pch_write_line function in pch.c (CVE-2016-10713) * patch: Double free of memory in pch.c:another_hunk() causes a crash (CVE-2018-6952)lowScientific LinuxScientific Linux 7patch-2.7.1-11.el7.x86_64.rpm17c48e5349e58b0f84080293a7ffd33116f6efc011c6b5ca0c7e944ae3363ef0SLSA-2019:2035-1Python-RequestsSecurity Fix(es): * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)lowScientific LinuxScientific Linux 7python-requests-2.6.0-5.el7.noarch.rpm5abf96a77b98ef4a701287ee83c569440787b4d004ce880f2cfee3ceead945cfSLSA-2019:2037-1Fence-Agents* fence-agents: mis-handling of non-ASCII characters in guest comment fields (CVE-2019-10153)moderateScientific LinuxScientific Linux 7fence-agents-amt-ws-4.2.1-24.el7.x86_64.rpmd5360918cadc0cb719c82c1256f60468909f4178ab506152977a46ab17ea8675fence-agents-redfish-4.2.1-24.el7.x86_64.rpm97036dd151bcd17f287ba7286a3b24421ebf66a68d2327b90d3aee8e4797aff0fence-agents-gce-4.2.1-24.el7.x86_64.rpmfc7bae26e7521d5fd4f2ec66362c3e2ac0a1ceb4309748b78fc920ea969357c2fence-agents-hpblade-4.2.1-24.el7.x86_64.rpm193dd0f1fc048eaada935d4cecbd95aee6d83972f81682bb1d109da5f20906c6fence-agents-rsb-4.2.1-24.el7.x86_64.rpmbbed2e8a0045036da940102052a6579c343085a418cf071b4860252c0526b4e7fence-agents-aws-4.2.1-24.el7.x86_64.rpm4bc0fefe2f6e1ceba779a2f62aec4aa7e735cbd4fe84a6730176604d5129a8a3fence-agents-ibmblade-4.2.1-24.el7.x86_64.rpmab7b259cd10819d57d20d833c1230d7317caca04ed5012025d58d2da4edf40fafence-agents-rsa-4.2.1-24.el7.x86_64.rpm9a459db7d49e3af9390402e7f63661cf809f822d17c3ac903073737bf7606f81fence-agents-mpath-4.2.1-24.el7.x86_64.rpm1f6007303a59797807a2e3e9f05437caa202726b5babd976da3d6a06f06d6715fence-agents-eaton-snmp-4.2.1-24.el7.x86_64.rpm00675282f039541328c2a76e1b8453dc79d8c250f7e26eaa2c13685658f9a272fence-agents-brocade-4.2.1-24.el7.x86_64.rpmce19052315c8728b5e41a674cc7b39a5bfdeddeec4bad2780ee2cced6b9d6b7afence-agents-intelmodular-4.2.1-24.el7.x86_64.rpm09bb551c7b6a1816014f20b1f6e15d9981e1b1e52eec0dfe5911d7ce38fc85acfence-agents-sbd-4.2.1-24.el7.x86_64.rpm341b3ab294f764dca9bbf7e0aa654d62b6237c3ae002ca1aa7d98bb6353f5ddffence-agents-ipmilan-4.2.1-24.el7.x86_64.rpmf2476f79c4bf545d828f56402bd07cc7446dc2c073de5d8162224bd350f78abffence-agents-kdump-4.2.1-24.el7.x86_64.rpm8c1d6edbb220a468e36d24e3bccca7288844498b75afc5853e33e431796a922afence-agents-cisco-mds-4.2.1-24.el7.x86_64.rpm35226a958d4a8d0bdc0c0566232d7af4878863ba87768f3f2b93fa0ed9cda2d9fence-agents-eps-4.2.1-24.el7.x86_64.rpm0958d9cd3c0896f279b5fafd77e6d320e1a633ecfda5d63a4ac0313ffafa9818fence-agents-cisco-ucs-4.2.1-24.el7.x86_64.rpm86ad2c1fd68096c949b8f3db3cbcc16fbe06a53ba0f3d0ff26d9cd2aed7f77bafence-agents-apc-snmp-4.2.1-24.el7.x86_64.rpm45ab566340ecc97b25f521b20ce37fac8198b2c3cfb42dabcc19ec9d959fe4bbfence-agents-vmware-rest-4.2.1-24.el7.x86_64.rpm0737ed30a112a743db45f853f18b7a67e4b1657f2a6cef6864b3dbe5582fdb25fence-agents-scsi-4.2.1-24.el7.x86_64.rpmab7bc939a8ef703ff10bdd6e27771834ea876d60a92973a254c065d8d6f54264fence-agents-virsh-4.2.1-24.el7.x86_64.rpmec9874436205ec8876f568b3fe3c6d620218766671b39e7e22956ad558bfb123fence-agents-all-4.2.1-24.el7.x86_64.rpm163298feb249c4d5f1719112694a13dc19a3d8940add4f4958b2622f611c47b9fence-agents-apc-4.2.1-24.el7.x86_64.rpm6b486c4445561a166eae13bb49159ba909dfd9d1d4853fafd33ba6beaa3a0d50fence-agents-ilo2-4.2.1-24.el7.x86_64.rpm4a246dcfee4aaa667f1c372f0917b15ca03d6b91b50bc5a31e5a75e2baa13118fence-agents-ifmib-4.2.1-24.el7.x86_64.rpm504904b836865efb011ae7dd809de147180ba959af7a8b0a79dfe830531284fcfence-agents-heuristics-ping-4.2.1-24.el7.x86_64.rpm5e99c9c22d631debc82780b27225761a62087fdc92020c1a851458fbe210d90dfence-agents-emerson-4.2.1-24.el7.x86_64.rpm1ec60bc3d868f74ad4e895867477048a7543a4e30a116ccbd7f8da185eb76e82fence-agents-common-4.2.1-24.el7.x86_64.rpm6c357358f7745321f05487a6990891155de10575686c51ec41179b2ac3255ef6fence-agents-bladecenter-4.2.1-24.el7.x86_64.rpm5f783c947c43e915f99631b9fbabc8d39665e0cf7ce11617506c8e832e9e8070fence-agents-vmware-soap-4.2.1-24.el7.x86_64.rpm2fa583f92d997c6a46e3bf1e135ae0bd27a93acacdf4bfdeab18bcd6b8e6c5e6fence-agents-rhevm-4.2.1-24.el7.x86_64.rpmd46009074c2015d1bc5c64ca6c25fdd63156ef86bae67d0b7f77621061857f76fence-agents-azure-arm-4.2.1-24.el7.x86_64.rpm92b29d4fd0481a13e16cb849effe49c9ca682a4bac691332bfb28b2ce81651dffence-agents-drac5-4.2.1-24.el7.x86_64.rpma055853dbee87977dc6f4a49fd2eff90478aa6016121d50ed968160c12e6b263fence-agents-compute-4.2.1-24.el7.x86_64.rpma5fd3ea32d7f5e2e9e4f0e5825c40f213091bf755cefdb0cfa55efeb75db5e76fence-agents-ilo-mp-4.2.1-24.el7.x86_64.rpm4eb9ae3e87d3cdcc281169f900dfe86aa93cb902d9adc7c4272cb0f4fc3cffe3fence-agents-ilo-ssh-4.2.1-24.el7.x86_64.rpm2c3b79fddbe8919b3dfc188dd0b966d44f8f27db3949b2164275ee7b857eea43fence-agents-ilo-moonshot-4.2.1-24.el7.x86_64.rpm6edc29e4e1b98cc7fe0a30498edcebae36ab420a6dd455e04d14b45f3600a4f1fence-agents-aliyun-4.2.1-24.el7.x86_64.rpm9f165d0f821ca154e68abc4b2cbbe1f56db94e86deee0b455fdd97d507e41f36fence-agents-ipdu-4.2.1-24.el7.x86_64.rpm5a38a2b7958c880eb318bc718d469c7c373c35450a91f82975b8cd41e6bfcaa0fence-agents-wti-4.2.1-24.el7.x86_64.rpm8b6562b8029edc5a2fd24c1352b689ee22f9ff44e9b557e52dbe17aea9e7a091SLSA-2019:2046-1PolkitSecurity Fix(es): * polkit: Improper handling of user with uid > INT_MAX leading to authentication bypass (CVE-2018-19788)moderateScientific LinuxScientific Linux 7polkit-devel-0.112-22.el7.x86_64.rpm593234726ad9d0a1c7951568108bd730059c12cd68ac9cb9fa29ce63fb729299polkit-docs-0.112-22.el7.noarch.rpmd8398e382bbf16b99dd40e97bf473591ad944538242325b0da65a0ed9ad5142epolkit-0.112-22.el7.x86_64.rpm44a769568ca617b47151aba4253ce8d805f2b6b4ba100ad4bae73818db152c47polkit-0.112-22.el7.i686.rpm76279d1a9e4975730f3bb04c25af91b5e83c49a78552cc04f6e8df5085129f9fpolkit-devel-0.112-22.el7.i686.rpm3c04a46041ef2b7e995e31f3e3f36cb4889235f5634752d789f8ca831dbf980cSLSA-2019:2047-1LibcgroupSecurity Fix(es): * libcgroup: cgrulesengd creates log files with insecure permissions (CVE-2018-14348)moderateScientific LinuxScientific Linux 7libcgroup-pam-0.41-21.el7.x86_64.rpmbef14fb8755e7a1fe33b3741969931c6d71b91318d8ba7df94aa449d3c159985libcgroup-0.41-21.el7.i686.rpm7656ddd7d02318c43947836395dd425f938ab2577836e0939e7c66a83a4e04d1libcgroup-devel-0.41-21.el7.x86_64.rpm05a6cda0c377cfcc847242f424594f7c503a0ff1c798c21d07ea5c719d79952elibcgroup-tools-0.41-21.el7.x86_64.rpmd15d295f687f20a6cf2f394166dce74a0431688ff0abffd33bbe5fad76463a39libcgroup-devel-0.41-21.el7.i686.rpm8525a8f00d62826b904340935358a2ee87f0d058434a642bc61e2077ef236a80libcgroup-0.41-21.el7.x86_64.rpma518e2fd6ee1012aa24be0467012b3ce43567099732b868e22a8144d4db8ed45libcgroup-pam-0.41-21.el7.i686.rpm6e3b2d1bb35bb27d5b78baa7673b466efc0d6b6278d2976f2a5d442cbbce3f0aSLSA-2019:2048-1ExempiSecurity Fix(es): * exempi: Infinite Loop in Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp (CVE-2017-18233) * exempi: Use after free via a PDF file containing JPEG data (CVE-2017-18234) * exempi: Infinite loop in ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp (CVE-2017-18236) * exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp (CVE-2017-18238) * exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for denial of service via crafted XLS file (CVE-2018-7730)lowScientific LinuxScientific Linux 7exempi-2.2.0-9.el7.i686.rpm25394520590874140f7aa18c143ddfa3f0210f8670b3c6fe122b01b1ce2b09f1exempi-devel-2.2.0-9.el7.i686.rpm16dd7be33385d6e9b7cc15dd0cc80b46d8898b95e8bca9ca73dcb8ec1e83b8d2exempi-2.2.0-9.el7.x86_64.rpma975084cedd91d858c3a11a9acfe001f07f2ee3a2088a4f0d7eb43b10e82dc09exempi-devel-2.2.0-9.el7.x86_64.rpme318f7b6e35ff75e294e231c0ed3ae86346085235947a50b42ad278380dcf3b7SLSA-2019:2049-1LibmspackSecurity Fix(es): * libmspack: Out-of-bounds write in mspack/cab.h (CVE-2018-18584) * libmspack: chmd_read_headers() fails to reject filenames containing NULL bytes (CVE-2018-18585)moderateScientific LinuxScientific Linux 7libmspack-0.5-0.7.alpha.el7.i686.rpmed481c31b5dcd954a4f9b17f15413090233198db358229aaf304f56ea005348clibmspack-0.5-0.7.alpha.el7.x86_64.rpmf02ba305946c08a543d80a5923f171bea17b657b1ae93f917f922a3f513269fdlibmspack-devel-0.5-0.7.alpha.el7.x86_64.rpmfed7e74e45dbfb3d53f1e47c88aae7e059c19f2a3deeab3511c0f94e80a8238flibmspack-devel-0.5-0.7.alpha.el7.i686.rpm11ff2e0f577ad3457978cf06788ddcc4454659dfe3e9b8bbcf1f15239ba90a4aSLSA-2019:2051-1Compat-Libtiff3Security Fix(es): * libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service (CVE-2018-7456)lowScientific LinuxScientific Linux 7compat-libtiff3-3.9.4-12.el7.i686.rpm0dbc48ddd384bfbe3e80413c9fbc8d8b856dcbe69141ca119d2d58c1f1959ddfcompat-libtiff3-3.9.4-12.el7.x86_64.rpme2f56b9eab6ab38140c40de97247b9edd2e6b426cb4cf7625b55f53e2e65fbaeSLSA-2019:2052-1Libjpeg-TurboSecurity Fix(es): * libjpeg: null pointer dereference in cjpeg (CVE-2016-3616) * libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service (CVE-2018-14498) * libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212) * libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c (CVE-2018-11213) * libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c (CVE-2018-11214) * libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF (CVE-2018-11813)moderateScientific LinuxScientific Linux 7libjpeg-turbo-static-1.2.90-8.el7.x86_64.rpm679208e525c3cae714a7f71b029182a307a26647c160160301da90eb71662dcdturbojpeg-devel-1.2.90-8.el7.i686.rpm642cb0655b9144b2de73bb5da105933a7d92320b1543309652eade31349a5df8turbojpeg-1.2.90-8.el7.x86_64.rpm1a41a3c83d3f43a339eea99a6d6df43ec4d66f7cd40fcdb8cd7f18e518cf8ee9libjpeg-turbo-devel-1.2.90-8.el7.i686.rpmd897738481a4e8574f7089273a351cbd0be3a12a9369cef45219f7e33f450b94libjpeg-turbo-utils-1.2.90-8.el7.x86_64.rpmfd57b64abde40ed19079e33df00ba662acd1933288975f59977d2b35143578d8turbojpeg-devel-1.2.90-8.el7.x86_64.rpmf299409f4c53d1f699a2b34670db6af67b4fe7029579372dd43fd43d5b7c4629libjpeg-turbo-devel-1.2.90-8.el7.x86_64.rpm5d2f5eaf2f05cf2b89ad26a7a7fb90b6426aedce93df5d56380e1193b24d3012turbojpeg-1.2.90-8.el7.i686.rpme4216c0137e9a983f5eb8d7c7c0089143599c3a664ddfaa4638c2bf4a34e2fa2libjpeg-turbo-1.2.90-8.el7.i686.rpm3d18d4c23312ac9fbe7e497e9313d310faf77e063fa83a28f98c6505782a4be1libjpeg-turbo-static-1.2.90-8.el7.i686.rpm2e3e42756a73003ced383a18aaa234d51393154230f51b6f670dd41d9a3267aclibjpeg-turbo-1.2.90-8.el7.x86_64.rpm3c912244cdd5e94707a35f394cb4e5327c1e5519976352970728ed647d9d3103SLSA-2019:2053-1LibtiffSecurity Fix(es): * libtiff: buffer overflow in gif2tiff (CVE-2016-3186) * libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution (CVE-2018-12900) * libtiff: Out-of-bounds write in tif_jbig.c (CVE-2018-18557) * libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service (CVE-2018-7456) * libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service (CVE-2018-8905) * libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c (CVE-2018-10779) * libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c (CVE-2018-10963) * libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c (CVE-2018-17100) * libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c (CVE-2018-17101) * libtiff: tiff2bw tool failed memory allocation leads to crash (CVE-2018-18661)moderateScientific LinuxScientific Linux 7libtiff-devel-4.0.3-32.el7.i686.rpm409a3f85e272254896f9cda8bf09412f6ff4831e46193ceac02fd9b358d4c1f9libtiff-4.0.3-32.el7.i686.rpmd679df3b5d55b8f7aa5519fb2ab85187baf6a49645aa305caebf4b91f7870be0libtiff-static-4.0.3-32.el7.x86_64.rpm5d6e4b3177989105899f2d2c5e560d045468ff697b0ae4384a2243676fac2221libtiff-devel-4.0.3-32.el7.x86_64.rpm60cc34093bf4f7cc31b5f6e72cd73cc927ea6545e37b302ceb2bdd155de679fflibtiff-4.0.3-32.el7.x86_64.rpm004f9399979a65c6027e4f891790505a36656e79b5981e1405912aebff254613libtiff-static-4.0.3-32.el7.i686.rpm42dd6b45af27dc78696762c980f62a3493433d287d9f8bacd5a6053f9341fcaalibtiff-tools-4.0.3-32.el7.x86_64.rpm7bea8ee091862ca222bbcfda38275bed5348f381166fdfc9f5f1f39997419528SLSA-2019:2057-1BindThe following packages have been upgraded to a later upstream version: bind (9.11.4). Security Fix(es): * bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741)moderateScientific LinuxScientific Linux 7bind-9.11.4-9.P2.el7.x86_64.rpm1e747576450b306fd44dc35c12b21e2ea89cdc68f8fe2d73e1fc7892581def02bind-chroot-9.11.4-9.P2.el7.x86_64.rpm3d9d3b7024d8109f4b53db78e8f41220fd8ed79489262590685dbc87a8d42ba7bind-license-9.11.4-9.P2.el7.noarch.rpm710bfa21b7be185487418ad3703d316262fa19490ced3fc51a4aee95453a07adbind-sdb-9.11.4-9.P2.el7.x86_64.rpmaba22b0045efa6620c0f2c6e951b55c6a84d15c8ff7398f262cd4237135bbf62bind-lite-devel-9.11.4-9.P2.el7.x86_64.rpmf894d2964d4e05dc52364106657aa5ce97401b281e0aa50a8f1709586d533534bind-export-libs-9.11.4-9.P2.el7.i686.rpmd48d493ea03c8d848889c59a6f5c34c15ce8f0bc85460b9f4cb3a6e3424e76c7bind-devel-9.11.4-9.P2.el7.i686.rpma3d2fc224fceeab1a47594f5b9423cd1fcaf9bce566735e5a5b611c85d1ed52fbind-pkcs11-utils-9.11.4-9.P2.el7.x86_64.rpm16e84b5a2871fc52eae749d37f502b526866682e5719ff308eaa029fd3916e75bind-lite-devel-9.11.4-9.P2.el7.i686.rpme73fcb276e2dd481f68f0722cbe36f01f776f5aaf24a42a67c605663c3b4dd5abind-utils-9.11.4-9.P2.el7.x86_64.rpm2235c369edf68efdaf875afd448544f7880086016925571f6001cd993171205fbind-pkcs11-libs-9.11.4-9.P2.el7.x86_64.rpme8ce3b78c784eac2b5e1d339412ee0e6260b16e63d9ab209c2551a84b93aff05bind-libs-lite-9.11.4-9.P2.el7.i686.rpm310374f182f34550c34d36d4a1d2888365ae608e04efb9617f66d2c0f988b05cbind-export-devel-9.11.4-9.P2.el7.x86_64.rpm41f9010cc0ddbd6d023a941716e70b42124a48421bbff57065875b1babe64882bind-pkcs11-9.11.4-9.P2.el7.x86_64.rpm778aa56f823ee3f2f9da73fd659d42e9788c9654b84d15f239bd23ea5d4c7b11bind-libs-9.11.4-9.P2.el7.x86_64.rpm71829fc942974d6c8565d8f15173b5d746ef12e8499bc4dd92cf7ccbf9b49f61bind-libs-lite-9.11.4-9.P2.el7.x86_64.rpm40f6bf6c7f91027e8c10eadefdd22e25401c2ced8f9cbdbac57b5f8fc6a23af0bind-export-devel-9.11.4-9.P2.el7.i686.rpm337c0047175ed7068d077ff5f190cb4f8608a97946d38b36456fa071ce80e89fbind-export-libs-9.11.4-9.P2.el7.x86_64.rpmd2a9e4e3b6df7ee5c079ab98d2a6b41089718325af4e2183d930ad237d7fc841bind-pkcs11-devel-9.11.4-9.P2.el7.x86_64.rpma60a63f69302dd2e2637119ef6458a2c4c4e301b8b566a425a1bca2f23eba03dbind-devel-9.11.4-9.P2.el7.x86_64.rpm36ca856375317548bcfd9acecd9f280051503a3d2f78239cf9707809ed296ff2bind-pkcs11-devel-9.11.4-9.P2.el7.i686.rpm61abe33a603ac7c8fd2810655173598176ec0548bcda1970558ff65da7ed30e3bind-sdb-chroot-9.11.4-9.P2.el7.x86_64.rpm9dda045215e7b7623535996b4dcbd1c47061d96123b81e4fd0c2df8a9f42639cbind-pkcs11-libs-9.11.4-9.P2.el7.i686.rpm82400dfea91a07ce5b877fb74c92b6efdc5203c5a0204469f1c10ad31f994d15bind-libs-9.11.4-9.P2.el7.i686.rpmd00dd97941c6f973f66a9c2e2f12acce418488e38d012aee91dc7e2caf1794edSLSA-2019:2060-1DhcpSecurity Fix(es): * dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470)moderateScientific LinuxScientific Linux 7dhcp-common-4.2.5-77.sl7.x86_64.rpm5865ec15f45ec81d0b40e23d55428b92cc519c26096e9a0969b2c00f34a6e216dhcp-devel-4.2.5-77.sl7.x86_64.rpm83eff4bbbf960f2e6eba6aceac399ade55c5db539d64d1c6dcc83637db639b78dhclient-4.2.5-77.sl7.x86_64.rpmb4e198ba533ed6e69e6aaef2a4993e3f5cd285276759ce954bf81447065e95ebdhcp-libs-4.2.5-77.sl7.x86_64.rpme35df8a762fed441e029c6f560f8976bce8115bd3a21be7069f37876946531f8dhcp-libs-4.2.5-77.sl7.i686.rpm77483ade12fd99f9ed47dad5064007eed957185851aeed6cdc85e5616b6facf3dhcp-devel-4.2.5-77.sl7.i686.rpma0c59989fc999e407d935b903e31a397222e9a0e9b391d3a083bc1dce6f7306edhcp-4.2.5-77.sl7.x86_64.rpm94b415d6a2271f40f8361c75af907936f77998ee859cb3812ffb311a5e957bb1SLSA-2019:2075-1BinutilsSecurity Fix(es): * binutils: integer overflow leads to heap-based buffer overflow in objdump (CVE-2018-1000876) * binutils: Stack Exhaustion in the demangling functions provided by libiberty (CVE-2018-12641) * binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus- dem.c. (CVE-2018-12697)moderateScientific LinuxScientific Linux 7binutils-devel-2.27-41.base.el7.i686.rpm58a33f3df9d8d1ff800fad12c24ecae4444ff14d80ef07c032ece079d8ef21d0binutils-2.27-41.base.el7.x86_64.rpmb16aef9ddf8d212343bad96bb41af4908bf503693eb0b471f1e70254c20fed83binutils-devel-2.27-41.base.el7.x86_64.rpm241f249d38afebf4db8bbe0d1cacfd4d69eb0ba8d22fa715a360a9dcedc0c4abSLSA-2019:2077-1NtpSecurity Fix(es): * ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution (CVE-2018-12327)lowScientific LinuxScientific Linux 7ntp-doc-4.2.6p5-29.el7.noarch.rpm10bd2e9e78e9f68f9862319885e4b39c71e7afa026738e378eceb4f0b2a0be40sntp-4.2.6p5-29.el7.x86_64.rpm6a1d74a67c26d2865b769d01cec6008189de9a3468d7b70c0b950e5e15b33da6ntp-4.2.6p5-29.el7.x86_64.rpma3d1b723213098195e119adb864f806566b2e393b31242ba3b1012358babc856ntp-perl-4.2.6p5-29.el7.noarch.rpm96050106e75f675389902209714d73600585be8beb1dcc6295d9c6a2f626b9c9ntpdate-4.2.6p5-29.el7.x86_64.rpma1639fb30d51ecc198232bed1b60058309db02a580afccb0c92b1e4b3827d6bcSLSA-2019:2078-1Qemu-KvmSecurity Fix(es): * QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)lowScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-167.el7.x86_64.rpm4dadf9034add07c6ba471fc8d9af885bbb854a771312e5177b2eba130b37c436qemu-kvm-tools-1.5.3-167.el7.x86_64.rpmdc107fa62a41cfd2508bfcca57e5793cc67efdb9ec72376f1bc379866dc33a69qemu-img-1.5.3-167.el7.x86_64.rpmd20cfd994cab77aa1d0628f94a4369adf4229f9d067274f59bdd12c9d1b2133dqemu-kvm-1.5.3-167.el7.x86_64.rpmf8d6e871854394ef265d4f15117a25762e13e3b02e05e7ebbcf7d36994a80d44SLSA-2019:2079-1XorgSecurity Fix(es): * libX11: Crash on invalid reply in XListExtensions in ListExt.c (CVE-2018-14598) * libX11: Off-by-one error in XListExtensions in ListExt.c (CVE-2018-14599) * libX11: Out of Bounds write in XListExtensions in ListExt.c (CVE-2018-14600) * libxkbcommon: Invalid free in ExprAppendMultiKeysymList resulting in a crash (CVE-2018-15857) * libxkbcommon: Endless recursion in xkbcomp/expr.c resulting in a crash (CVE-2018-15853) * libxkbcommon: NULL pointer dereference resulting in a crash (CVE-2018-15854) * libxkbcommon: NULL pointer dereference when handling xkb_geometry (CVE-2018-15855) * libxkbcommon: Infinite loop when reaching EOL unexpectedly resulting in a crash (CVE-2018-15856) * libxkbcommon: NULL pointer dereference when parsing invalid atoms in ExprResolveLhs resulting in a crash (CVE-2018-15859) * libxkbcommon: NULL pointer dereference in ExprResolveLhs resulting in a crash (CVE-2018-15861) * libxkbcommon: NULL pointer dereference in LookupModMask resulting in a crash (CVE-2018-15862) * libxkbcommon: NULL pointer dereference in ResolveStateAndPredicate resulting in a crash (CVE-2018-15863) * libxkbcommon: NULL pointer dereference in resolve_keysym resulting in a crash (CVE-2018-15864)moderateScientific LinuxScientific Linux 7xorg-x11-drv-ati-19.0.1-2.el7.x86_64.rpmd49904af575d427945d5dfe7ad7d4ce208512db2f7aec82fff138a4003eb62c5libxkbcommon-x11-0.7.1-3.el7.x86_64.rpmcd4daf47a4b371d75ddb6dbac951a847050dfe67c68868dccb09290860947853mesa-libGLw-devel-8.0.0-5.el7.x86_64.rpm1d63beb80e0e1291d305a3e75909fb711ea5196eaf7605a4fbd4a375d3882280libX11-devel-1.6.7-2.el7.i686.rpm8f659c533c8a51353f254fb03f10e2bc5828127d7332943ad43399c1027370c1xorg-x11-server-devel-1.20.4-7.el7.i686.rpm824e719e037cff7c48cad7703b448431a01f0bc51e4e1fc6ff0917a74892b670libxkbcommon-x11-0.7.1-3.el7.i686.rpm9dafc5f1f6c39f1e723c71aa3dfc43763cb4eec143ad983a2f8b30b2e7d068a3libxkbcommon-x11-devel-0.7.1-3.el7.x86_64.rpmb73bd5f3b2521d6c1c44d280d3722517e73f9b5025267cdb668f879db01c1948xorg-x11-server-Xorg-1.20.4-7.el7.x86_64.rpm09756f301958e6d427b6f6ce2e250c7def16332de7fb2ff4d220ae24c6515e2fgdm-devel-3.28.2-16.el7.x86_64.rpm420fd8f5035a74aa1d4124d2d443e0eb6ab1ece4b2743ba35eb5e746eadf49a9libxkbcommon-devel-0.7.1-3.el7.i686.rpm80da18324acb830e34ecafab3af92ad1b235e0efae0f819c3492bbc84d32675bmesa-libGLw-devel-8.0.0-5.el7.i686.rpm154d620ab9dfa702a6ffe254ec1d05634b243f12c44773944038cdd0584a1f6cxorg-x11-drv-wacom-0.36.1-3.el7.x86_64.rpmb3fbf0026c73bce3c42c8223ca7e9b4c977f7312ec3e067404cb4ad422fda068gdm-3.28.2-16.el7.i686.rpmb6d9ec2cbe608ceb486a46bb355819e6cb173c303c043040efacb0542ac644cblibxkbcommon-0.7.1-3.el7.i686.rpm93f8e484981911cd4a44647815e70cf003ae1c00cd84c826506375f18de67d08libX11-1.6.7-2.el7.x86_64.rpmf3e76ba41f4a744fe50ba37d9feb7836a6bb33d5519f1c6b7b340bf8ea70ea63xorg-x11-server-devel-1.20.4-7.el7.x86_64.rpmdbb7353e9ff1d79092d04c7e0723acacec935d4e6f359a249bf2c2ae74e80a7elibxkbcommon-x11-devel-0.7.1-3.el7.i686.rpm92d1e0613446b46d272346cad5c4b40c99c14f471209e7d5dde7676468827fb2xorg-x11-server-common-1.20.4-7.el7.x86_64.rpmfb84aa3e3cdb84937e3a431b2e2c26b705b9eecfc70408576af3cc40e6e29658gdm-pam-extensions-devel-3.28.2-16.el7.x86_64.rpme8c5fb34d5bce9dfc5bf458689d6f4bf54f7ef0245e97162ef635f921b4b9c95gdm-pam-extensions-devel-3.28.2-16.el7.i686.rpm9b680e6218e0cdd67763de96299deeff9a9e08ea72e9167fd31d0c1c9c54a5e9libxkbcommon-devel-0.7.1-3.el7.x86_64.rpm17d5b89129bc3dc9d7cabfe05a1f8c6e3c21326aa9c7a21cf1acb69c87f6bf4dlibX11-1.6.7-2.el7.i686.rpm92d7b388f5dc8881aef0455879eaf520837e101068b4c70298cbebf7aeb73d18libX11-common-1.6.7-2.el7.noarch.rpm9b2675f6e611922d7f0771e8ba88cd1252a190e71387a6076a5bcac988b15dc7mesa-libGLw-8.0.0-5.el7.i686.rpm90bb80b8ef51b9f3fde8b9fff63952b38619c679f91386a16c47f0546c4b0941xorg-x11-server-source-1.20.4-7.el7.noarch.rpmbb783221f8291f03a3a71274bfa7d5310e5f9af8b2762994a9bfca7c0c1226adxorg-x11-drv-wacom-devel-0.36.1-3.el7.i686.rpmab300556a07abeaa6bfee14bad024b2722a80fcfbb1f9a332cad47189af1dd11xorg-x11-drv-vesa-2.4.0-3.el7.x86_64.rpm5e005325f5c50fa0b99320840002a22c199e9f1fa90802fbfca9215c83d7a3cbxorg-x11-server-Xephyr-1.20.4-7.el7.x86_64.rpm0785a1c8f1fd65b1454708896f5bad35babfc60d27f24957fcc2c52d43c3c31blibxkbcommon-0.7.1-3.el7.x86_64.rpmc216b93ba3637913e65a9ff19f93715d1f57995f96a605fd67c84fe8977bc27fgdm-devel-3.28.2-16.el7.i686.rpmf0bbd6772932cef5c2825b5ab81d97ea2644310aa50a43c31059a36df421b92bxorg-x11-drv-wacom-devel-0.36.1-3.el7.x86_64.rpmba51b64c9770dcaa4741f0ac711b81938b21baa5d99709ef6a87bc6c9f8140bfxorg-x11-server-Xvfb-1.20.4-7.el7.x86_64.rpmb3e187fbce2f08b11a09341b2a0ac4bbf08680bde3f355df3eb461d1b6755434xorg-x11-server-Xdmx-1.20.4-7.el7.x86_64.rpm86c24c4033cc92493cd4a829e5ce592df4d4c6b0abaf75737963d46ef1fc9368xorg-x11-server-Xwayland-1.20.4-7.el7.x86_64.rpmf3f376dda5b1f80d3008ee182b66385680b78dd2e6abae9be4ff765b0aac8d9fxorg-x11-server-Xnest-1.20.4-7.el7.x86_64.rpm1d0783681519fb367db1ce05b220f231dd1e6047764966af0e0ae7178e787941mesa-libGLw-8.0.0-5.el7.x86_64.rpm22991fef470328c675a012ac05aa468bcbb2c95bb6f1dd10ab263e658a88486bgdm-3.28.2-16.el7.x86_64.rpmf1268435099b72ffec6896f8fc62eb1756eee988ae95bd28c3ca5cd05f8639eflibX11-devel-1.6.7-2.el7.x86_64.rpm0c9c313498d6f0aba65f1ed3dc1312ff068d383cfa9460807a6d02fa666a239bSLSA-2019:2091-1SystemdSecurity Fix(es): * systemd: line splitting via fgets() allows for state injection during daemon-reexec (CVE-2018-15686) * systemd: out-of-bounds read when parsing a crafted syslog message (CVE-2018-16866) * systemd: kills privileged process if unprivileged PIDFile was tampered (CVE-2018-16888)moderateScientific LinuxtrueScientific Linux 7systemd-devel-219-67.el7.i686.rpm4ef6d97d7dd7f34ee5f5ec57055ec3c94cf0a8ea9df16d0a6fb2d44d7303e396systemd-resolved-219-67.el7.x86_64.rpm906017985af93b0c23e4800b93fa650c90492acbd028380288c11588d124d7afsystemd-resolved-219-67.el7.i686.rpm33ec641b5d13cafd797bbd6385ae6b8d49a270377cf67bb025625d44b5fe2d39systemd-devel-219-67.el7.x86_64.rpmfc60baaea372f841c8af9db84b62ebc63a006ca4cd58719dd76a561a788dfb69systemd-libs-219-67.el7.i686.rpm3c0eea3c162cae9caed859fc1f73cb2bf57fa8bf18f0c693ed73b04f67bcbb2alibgudev1-devel-219-67.el7.x86_64.rpm70af9fa3915d73ca6972d414ce56e40c6f3b74c904a8aa9c104689f7a776474elibgudev1-devel-219-67.el7.i686.rpm83d533c2d778ad6f524833b0a8d45aaae0b44e2e0a5c5e381634467c00184e39libgudev1-219-67.el7.x86_64.rpm897be3abab6330ce4b2a2f6ad65e5e84bd1dc853914589a2936c095b34da1f8asystemd-journal-gateway-219-67.el7.x86_64.rpmec1775a504933b373b77a6bf1bad8e805c5763a8a910961cc784a36e840e4971systemd-219-67.el7.x86_64.rpmde0f8741b86d4366ced0fc81c17d312236eef97bd34419c7a320bbedcde2d43csystemd-networkd-219-67.el7.x86_64.rpm5daf17091083732100c069c7584401694b53e8eb14ebb13fd487316a1c8930efsystemd-python-219-67.el7.x86_64.rpmda2bbeeb76b0a7a4f97f76e8c70ba6f38a7d4d38055a3fdcf0c530d30b07cb62systemd-sysv-219-67.el7.x86_64.rpmac76adc4ecaeab1a19961b947cf8192eddad79009a8474ac9e846b77c9a4549elibgudev1-219-67.el7.i686.rpmf7c867bc896abdc5fc8589b0a61d7b89a58eaf5e4a2e5b9ff5db160f8ecd5dcfsystemd-libs-219-67.el7.x86_64.rpm911685a941d85d3054ae5132cbc444d4ffb65ba50a0d571106b110ec5944f3e5SLSA-2019:2097-1Perl-Archive-TarSecurity Fix(es): * perl: Directory traversal in Archive::Tar (CVE-2018-12015)moderateScientific LinuxScientific Linux 7perl-Archive-Tar-1.92-3.el7.noarch.rpmebda773d8d103ae64a2b2096975c46cb109cc65311b9b205fa3305644dd24f5fSLSA-2019:2099-1SambaThe following packages have been upgraded to a later upstream version: samba (4.9.1). Security Fix(es): * samba: save registry file outside share as unprivileged user (CVE-2019-3880)moderateScientific LinuxScientific Linux 7samba-test-libs-4.9.1-6.el7.i686.rpm3d79e5aad6f604ad2dccc8be2fc6f358a95fdc7559743db51ebed4541fce716dsamba-pidl-4.9.1-6.el7.noarch.rpmcdfe300c74c4576114842fcf15928d80077ab441666545780d78fd555499dd28samba-test-libs-4.9.1-6.el7.x86_64.rpmf937dc596cd93b2910fed00b649bafd009b122c039bfa642ab19064978c5cb93samba-devel-4.9.1-6.el7.i686.rpmbd3a459bd8531ebce6bf5d09ad765b6d7ac8d9a9621e5b06cb7cfd3fd2aef15csamba-dc-libs-4.9.1-6.el7.x86_64.rpmccba60e648429919f9280826cb8c1f98c4b5efd0d0ee345070214a1780409276samba-common-4.9.1-6.el7.noarch.rpm1b41d6355469473f7a279808dc5d2ff1fa22b8aa1532748b936f47db80256d14samba-client-4.9.1-6.el7.x86_64.rpm00b41585952124978ca99a8deb29362d1ccbb73d522d4205579d18c9d8b789e4samba-vfs-glusterfs-4.9.1-6.el7.x86_64.rpm67130377e73c20fe4e384eb2d068f212d3c893498c0d23d2c4ffe35c0ae1e860samba-winbind-clients-4.9.1-6.el7.x86_64.rpmd7813ed6342677d755b2b8fb31ede4773f8866d9f77a8057df12c6c6709757e9samba-devel-4.9.1-6.el7.x86_64.rpmf3c86a12d5e46b9de71c9ce6cd46a94f2feefcec8eaca7ac6b8471d739ce9e9fsamba-winbind-modules-4.9.1-6.el7.x86_64.rpm3f76de7592478b1e619b2e3e9efcef47cd25dbda3f01e40f720b5347db248dbcsamba-dc-4.9.1-6.el7.x86_64.rpmd7db5cdc0c4b298193d8fde2577b1d2ae68c052a26227d89b9fd07224c3c4d79samba-client-libs-4.9.1-6.el7.x86_64.rpmdcc2147d54af5e33dee2ccf83202e90dcc3d857df58d70f79a35ac7d393797fcsamba-client-libs-4.9.1-6.el7.i686.rpma166c2b09c6f97a640e46f351a9b5c6fe25f60ba4f79196feedc5e74cc37658csamba-winbind-krb5-locator-4.9.1-6.el7.x86_64.rpmee018d59665d90fe5dea7163418395799db16712d49d213a46c40375f2ec7fd0libsmbclient-devel-4.9.1-6.el7.i686.rpm8b242cfa519373668beec55123054fc0038143f74e1d4e8fd83f62157d7c329esamba-test-4.9.1-6.el7.x86_64.rpmac0c143479ce47a6fbd6a8f6c47ef34787cb7ff3daf22149894e62ea193885a9samba-4.9.1-6.el7.x86_64.rpm2cee54a66475e3528b20491b47efb75a949b63b805ec0cb455595be86a990f33samba-common-libs-4.9.1-6.el7.x86_64.rpm107dd5a8f472b093b3f0303ea4fa5bc0d238c61db135687c39a12d12c8cdd022libsmbclient-4.9.1-6.el7.i686.rpma0e0bcb99d12848c5ff34d705c26d46eefa00b0175e4536685da32b7165941aclibwbclient-devel-4.9.1-6.el7.x86_64.rpm3526a6c271cc93ba318c706e7dccb2f01de14aa819e55b5cd58bd58c4508cc5actdb-tests-4.9.1-6.el7.x86_64.rpmf2b4f05b97b24d473899db0ab94bb300760d6a232e19f9129fa04042474d1eealibwbclient-devel-4.9.1-6.el7.i686.rpmc890ac9e1edb9fc414ebd54a041a92edbaab251e9657b936a9701b502c7989fdlibwbclient-4.9.1-6.el7.i686.rpm5b304a1dba64d52f6c75e1576d18ccbbb93094cf832ec51d574bf66f332cbc3actdb-4.9.1-6.el7.x86_64.rpm089fc01403a66b1988970d94de79b42dcb2618899b93cc0369d8250cdecad4c8samba-libs-4.9.1-6.el7.x86_64.rpmf3111dccd7dc68fdd875ab92241ce6034a867154bbcfbad1569c93534d06100dsamba-krb5-printing-4.9.1-6.el7.x86_64.rpmc5a49497b00c9d4309c6356f56f4f81327c157b19d2f6e5422c8cc56f430a01esamba-python-4.9.1-6.el7.i686.rpmd738ab6f4113cf117b1a88a632f886ee750393a86efeb08bdb06ddad3d79b1a3libwbclient-4.9.1-6.el7.x86_64.rpmbdb16d2ffb586915f5efa4372d6efb00159986e2e4f004721dc7a61bfc8f53f9samba-winbind-modules-4.9.1-6.el7.i686.rpmc82c3b1b82cdcaba8ca65773a52a95953b021167f853a5abe4d9b559f5b9e3d8samba-python-test-4.9.1-6.el7.x86_64.rpmde371479d4d90474281ac7383278a409f822883bbe6ce9cfd1c28a7fae6fd556samba-winbind-4.9.1-6.el7.x86_64.rpme524e939230876fc9c36c75cf4963268f2410cba0d0c7c3e152e1876e93f7fc2samba-common-tools-4.9.1-6.el7.x86_64.rpme9b4f20159532525ba3a49fae2e2fb6e57fe44e427c9349e54ae86a43513233blibsmbclient-4.9.1-6.el7.x86_64.rpm2277e412060a0f70ae58a46996168f9b166e96aa7752172ed482f9ef551c40b1libsmbclient-devel-4.9.1-6.el7.x86_64.rpme9ed78f4b54767e43c02c37fe2207aef254dc8d52560fabf7e7018ac58452036samba-libs-4.9.1-6.el7.i686.rpmbfa0de6a5285721610f55ae458810206baae441489e6ed4eb4668595b63b76c6samba-python-4.9.1-6.el7.x86_64.rpm289c0dd007bd8a0a5e223217de1726459fe1c7db56d9657c053990389d0004f8SLSA-2019:2101-1Exiv2The following packages have been upgraded to a later upstream version: exiv2 (0.27.0). Security Fix(es): * exiv2: heap-buffer-overflow in Exiv2::IptcData::printStructure in src/iptc.cpp (CVE-2017-17724) * exiv2: out-of-bounds read in Exiv2::Internal::stringFormat image.cpp (CVE-2018-8976) * exiv2: invalid memory access in Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp (CVE-2018-8977) * exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) * exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) * exiv2: SIGABRT caused by memory allocation in types.cpp:Exiv2::Internal::PngChunk::zlibUncompress() (CVE-2018-10958) * exiv2: SIGABRT by triggering an incorrect Safe::add call (CVE-2018-10998) * exiv2: information leak via a crafted file (CVE-2018-11037) * exiv2: integer overflow in getData function in preview.cpp (CVE-2018-12264) * exiv2: integer overflow in the LoaderExifJpeg class in preview.cpp (CVE-2018-12265) * exiv2: heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp (CVE-2018-14046) * exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) * exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) * exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) * exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) * exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) * exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) * exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) * exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) * exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) * exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) * exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)lowScientific LinuxScientific Linux 7exiv2-devel-0.27.0-2.el7_6.i686.rpm00af42e53ccdcdd2bcf83a6c1bafe45e33b78a4b6677410843516b4556ffd7e6exiv2-libs-0.27.0-2.el7_6.x86_64.rpmf5571a2cfeb70941bc3cfec25e7f90532f4ff6c0fe1e164edab5f88102bbe97aexiv2-libs-0.27.0-2.el7_6.i686.rpme7abba1a703cffdba30effc95a3b055c697a781ef9741a5c03991f71e0d10c25exiv2-doc-0.27.0-2.el7_6.noarch.rpmd881733ce982d42838762b1ec41a6ce2d324b511a628b5cecd3186a762c74cd9exiv2-devel-0.27.0-2.el7_6.x86_64.rpmabab0f13d029090bb4f6b0ffa4778dba54c66d46be672319a3f5f31d60aead86exiv2-0.27.0-2.el7_6.x86_64.rpmc56e4688f298c0b951ab918cec5e7e96b7f55d12c9b727422be846cb0043a0b3SLSA-2019:2110-1RsyslogSecurity Fix(es): * rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled (CVE-2018-16881)moderateScientific LinuxScientific Linux 7rsyslog-snmp-8.24.0-38.el7.x86_64.rpm09709fc9f836967294fad47de4fc79fe585fb7c2e07b378b74d242e750cb7dbbrsyslog-libdbi-8.24.0-38.el7.x86_64.rpm6079522192a516eea69b9a5277c326261653e1eecca2ca74336face581e141b2rsyslog-mmnormalize-8.24.0-38.el7.x86_64.rpmd47851ca4bab1e493ad7fe65117f02e3d8397aae75236519cd1c4a478b5a70bbrsyslog-doc-8.24.0-38.el7.noarch.rpm42bd47d23b1ad297e032c24d530b0f9bf321fafac6c38957d1b726f91e2fdc01rsyslog-pgsql-8.24.0-38.el7.x86_64.rpm62cba1d5efcab7e8e7567beea50cda8e639dcd1d380db4d3856779bc0bbe565arsyslog-mmkubernetes-8.24.0-38.el7.x86_64.rpm19aacc88f31bf9668cb3f5e0c08b70b35c7aca33e6efea79e94289ff205a76c9rsyslog-relp-8.24.0-38.el7.x86_64.rpmd3638b10f1887931b3116ef8216b99434fcb1375edec4a599e3ac991bc20575crsyslog-gnutls-8.24.0-38.el7.x86_64.rpmc6e4fa256c7e27a59a197c411e3e69740f7ece7fcd520adbb471812938ee1855rsyslog-gssapi-8.24.0-38.el7.x86_64.rpmb0ab139172cabd78d30b861199a665600b234c7a6f4ea0a7250db245b4c60c04rsyslog-udpspoof-8.24.0-38.el7.x86_64.rpmf5e5b31f4eeb083ebd8801a8d36668af1f6ef43e9402cd25a56a46e887de1903rsyslog-mmsnmptrapd-8.24.0-38.el7.x86_64.rpmab5753660d9d1526a26e9807b382802ded37833a8044dcf41db6b40c72d8cdb4rsyslog-8.24.0-38.el7.x86_64.rpme04d1cd2a6beb5ab0a0d4a700286023bea5561a7f99d87e079ef6ec5794fd9aersyslog-mmaudit-8.24.0-38.el7.x86_64.rpmdf447d46c271b458ac5ba3835c1be567926303a483ba8ad0888e809fa5553df8rsyslog-mysql-8.24.0-38.el7.x86_64.rpm5e696e1d24aea3d71dd40026bd2f50913c34f5eb8ce9ca3d9a18269f301a566brsyslog-crypto-8.24.0-38.el7.x86_64.rpm00d5be89a18cdd8fba27d17babdc88c11947f00d93a76ef6b5a55f3917aabc96rsyslog-elasticsearch-8.24.0-38.el7.x86_64.rpmb68107ce4fd6dd1914b256350baa197ae8d07383375e56bc6ee9063a9a6b76c2rsyslog-kafka-8.24.0-38.el7.x86_64.rpm4f9574a4ed06f86aeada79196323cc12d2dcd88c6adf517e2b0fc2cef46cf2b9rsyslog-mmjsonparse-8.24.0-38.el7.x86_64.rpm7c7dee5078444cf6d50e941860e2c852e5e2e62488309ed2302e05d8c02a1abcSLSA-2019:2112-1Mod_Auth_OpenidcSecurity Fix(es): * mod_auth_openidc: OIDC_CLAIM and OIDCAuthNHeader not skipped in an "AuthType oauth20" configuration (CVE-2017-6413) * mod_auth_openidc: Shows user-supplied content on error pages (CVE-2017-6059)moderateScientific LinuxScientific Linux 7mod_auth_openidc-1.8.8-5.el7.x86_64.rpm69a346bba4e4e38726f20404f022bcd466fb61e2804e7581bf7b40090d5f206eSLSA-2019:2118-1GlibcSecurity Fix(es): * glibc: getaddrinfo should reject IP addresses with trailing characters (CVE-2016-10739)moderateScientific LinuxtrueScientific Linux 7glibc-static-2.17-292.el7.x86_64.rpm49f50e24c589507e9948f025d230b6f5f3aab59ca3dca3c55952e331765782d1glibc-static-2.17-292.el7.i686.rpme17b5c3a9562cecb4e984394b253b220976c2f8a3be926f6de24a8d0c5f2e08aglibc-2.17-292.el7.x86_64.rpmd3e151b8844cf0a2e5de3becc0f1370ab03483557183708d253056bec02fc41dglibc-devel-2.17-292.el7.i686.rpm3db541f4a94f12b984d0f0ba2f7ef094c44aaf6c4b70558d49147c7ebc969a9aglibc-2.17-292.el7.i686.rpm1e16dc712b3f311bc6e1b718b663ef99ebbbfd71753885c83f5d5f79fb9accd3glibc-common-2.17-292.el7.x86_64.rpma2c0792213f3a012200a3bc98f855e5244dd18bf90da7cfa7d6ce04757c62767glibc-headers-2.17-292.el7.x86_64.rpm07d519db92765b4a2c23be932f112900626e49ea1b295181c27077285170e73bnscd-2.17-292.el7.x86_64.rpmac8a77010a3a1c77b70b03b4f0584e0b463874f53c69723c9c39da99e2b62ceeglibc-utils-2.17-292.el7.x86_64.rpmb8ce41ff6a007893f2c0b2092261080ca9fdad6f58f656bcd2433fefb5730cf9glibc-devel-2.17-292.el7.x86_64.rpm5845234ec70c0d6f90bc93bad5db3ce91bdd2eafbdf352717fac4b8955331856SLSA-2019:2125-1OvmfSecurity Fix(es): * edk2: Privilege escalation via processing of malformed files in TianoCompress.c (CVE-2017-5731) * edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c (CVE-2017-5732) * edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function (CVE-2017-5733) * edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function (CVE-2017-5734) * edk2: Privilege escalation via heap-based buffer overflow in Decode() function (CVE-2017-5735) * edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users (CVE-2018-3613) * openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) * edk2: Stack buffer overflow with corrupted BMP (CVE-2018-12181) * edk2: buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media (CVE-2019-0160) * edk2: stack overflow in XHCI causing denial of service (CVE-2019-0161)moderateScientific LinuxScientific Linux 7OVMF-20180508-6.gitee3198e672e2.el7.noarch.rpmec69ea1f27f537059545320e0eda6dea912a1771e185175a4c25e743b4276721SLSA-2019:2126-1LibwpdSecurity Fix(es): * libwpd: NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp (CVE-2018-19208)lowScientific LinuxScientific Linux 7libwpd-doc-0.10.0-2.el7.noarch.rpm4bd2834daaf2ca681fc73cdc0286504163f267404d46b841166cfd69b559c5calibwpd-0.10.0-2.el7.x86_64.rpm6ff7c5cd7ba79e1d8c8cc3375e9c3dbc501e911151fa66f33a8ecfa6106fcf37libwpd-0.10.0-2.el7.i686.rpm27f175af92cbd09b8e456dac3fdbe0106c89cfce3d56ce4cafb36c33a580e9b6libwpd-devel-0.10.0-2.el7.i686.rpm0030d67a739d64f4e82df0f13c63db9ad121e3d7292f485ae1f903d76bb18037libwpd-tools-0.10.0-2.el7.x86_64.rpm56d920c6ead371974caf2c9ec2ecea04f3afeb4d65ef2eee1734d79818a867balibwpd-devel-0.10.0-2.el7.x86_64.rpm4c6b4cecd1d0f36108be65affa6c638c163173e8935b1b13a18475ba35312366SLSA-2019:2130-1LibreofficeSecurity Fix(es): * libreoffice: Arbitrary python functions in arbitrary modules on the filesystem can be executed without warning (CVE-2018-16858)lowScientific LinuxScientific Linux 7libreofficekit-5.3.6.1-21.el7.x86_64.rpm359d0d3480c60e2c2a3ec2e8ea77b042fe78eacb11b42acb3659cd008df7a143libreoffice-help-es-5.3.6.1-21.el7.x86_64.rpme2c9dc8a4bc0e53a2543dbf9ee88cd2de120b26ccc13b1fc79343ef948978f50libreoffice-pdfimport-5.3.6.1-21.el7.x86_64.rpm9c1bdfdd6e22e5d44968e5f88f0e75600ab67daa34bab4c42a498dbb31767159libreoffice-help-pt-BR-5.3.6.1-21.el7.x86_64.rpm38475197be1b168c0878bc770dfb901ed9c5fa55c4247d0a93a56cc564bd673clibreoffice-help-fi-5.3.6.1-21.el7.x86_64.rpm25436276053b726333ce380b8eda618b3d5276d138d28411169b349cc72e60cclibreoffice-langpack-pt-BR-5.3.6.1-21.el7.x86_64.rpm9686f6305b96bbd5dbde438182b09937eb6750d708d2aae69a16f9c207791069libreoffice-help-zh-Hant-5.3.6.1-21.el7.x86_64.rpm74b8b653d527d02ad223e2cc5c06cc91ebc0312368c3e7de0e8c1f010074bb91libreoffice-help-lt-5.3.6.1-21.el7.x86_64.rpmb6d30d63169a471b70624ccd4293242d22506f1d91ca70475a1e342623b7e510libreoffice-langpack-si-5.3.6.1-21.el7.x86_64.rpm22b7dafd02eb7ff9d85173735d535e206d9e760366057ecadf479d2ead2409b5autocorr-mn-5.3.6.1-21.el7.noarch.rpm2999f81a0feab81b620684d162523325ce36286938128b3b8381e4005a408321libreoffice-langpack-eu-5.3.6.1-21.el7.x86_64.rpmee62c670383f3ded3158b5c414672a677cf0069f668d5a1244bff6b86f924f50libreoffice-base-5.3.6.1-21.el7.x86_64.rpmd90fd63a397d29f58e89acc5283ed5e1ed96e9715a8870bfc15f696ee3f07e58libreoffice-wiki-publisher-5.3.6.1-21.el7.x86_64.rpmb61cc3c373b7b7cab2f22dfcaa59226f5340ce28b128250c8ca6fdb7a2a44edblibreoffice-ogltrans-5.3.6.1-21.el7.x86_64.rpm7c4641b081ef706280009bc386b9ecb5732a568dc4371321d551a40cf3978034libreoffice-help-nn-5.3.6.1-21.el7.x86_64.rpm045c4ca6baa37df39ddae7ba1e5657cafe7599b55795a01781e89de234ce605dlibreoffice-help-tr-5.3.6.1-21.el7.x86_64.rpm92cb5aa3990e088ca5414ad5b4f5cf2e17f8ee4dbc042400e340ce76888bb737libreoffice-help-pl-5.3.6.1-21.el7.x86_64.rpm3ccae46b13a796ff91d0920e65e6dd93723362ac0796be13d0dbc68163c04b0dlibreoffice-langpack-he-5.3.6.1-21.el7.x86_64.rpmf2f041c8e2bdd7a2574ed3826e79b2d53c4cbe5b538505b9b46c814bf506cb49autocorr-hu-5.3.6.1-21.el7.noarch.rpm41e2586b409b74fa1561b39a45f9f1247625fd383aefdf13b8dc2300638e0a2blibreoffice-langpack-or-5.3.6.1-21.el7.x86_64.rpm2d7359cd90ce76eba177140d54b3a204ad0c58c2f7b480282bffb6ee79ffa119libreoffice-langpack-ro-5.3.6.1-21.el7.x86_64.rpmb786240efa527af84255a12112c03ce52731c4511f748305d6a0aa8fbca0610alibreoffice-langpack-af-5.3.6.1-21.el7.x86_64.rpm6b2cf436d02b00818f9ceea71bc8a95367252b3d1e4c6d2716c3dc8c7bda9642libreoffice-help-el-5.3.6.1-21.el7.x86_64.rpmc5c05d323597f55d5ae9d243fe0ae5cfbca9b0a5a31fd45dd18a13b78e036e25libreoffice-bsh-5.3.6.1-21.el7.x86_64.rpm4d2ad2c7e546cc5936cffd9aa5a476ac6ff9555fcf05131e71fe6d0241f4974flibreoffice-langpack-bg-5.3.6.1-21.el7.x86_64.rpm01d4cc371d9df5f3bb0f2aa75dbeca33d364263c4f166f03173867a78e4f47c7libreoffice-langpack-nr-5.3.6.1-21.el7.x86_64.rpm40739a1dab273421e038973fea094d137e3678a0dc452a96d3edbc6e0601dc0alibreoffice-help-it-5.3.6.1-21.el7.x86_64.rpm985d9eda812ada7a2dc22c386b1514ab971ab0f1d8f290d549fa9f74cc72ec55libreoffice-help-bg-5.3.6.1-21.el7.x86_64.rpm9f44cbe347305d0836df44c20c342d37c8c1900b0e98056d82ac51c2107cbc74autocorr-pl-5.3.6.1-21.el7.noarch.rpm8e5725ea7eed2f7948638c5f74f070e44bd3905ada09b75221925f04127b3f00libreoffice-help-si-5.3.6.1-21.el7.x86_64.rpm456d07bfd5f72c275da09ac8eb0c52a30a1b16714f2f8bfb8be55c430e9f1693libreoffice-emailmerge-5.3.6.1-21.el7.x86_64.rpm696615a18cf5dacf60eb30dc9a22abd42324823781b118d36bb22933fcc0c54dlibreoffice-help-ja-5.3.6.1-21.el7.x86_64.rpm15a8798d79d2f4b4badacdea433e106007fbf716db429a02095246395eaa0718libreoffice-help-gu-5.3.6.1-21.el7.x86_64.rpm0f4ee67b2347c98f3904a8e672b16f3f48111dbc5a811db77533d964be5d1218libreoffice-langpack-nn-5.3.6.1-21.el7.x86_64.rpm57e63cb2f1d9a3df3c1b9094980f5d2c9c3b4621c84c5989c28473ee734a404alibreoffice-langpack-hr-5.3.6.1-21.el7.x86_64.rpm19959489b91e46402fbd8a8287efa79858e88abeb10501698492656c659fda5elibreoffice-langpack-tr-5.3.6.1-21.el7.x86_64.rpmaa6c19707493dc8dd34c7a37232377870fb9d1ac417a27d7d76418723749de7dautocorr-bg-5.3.6.1-21.el7.noarch.rpm020d50e50a22ef80bb79a6f7e3c412268c38ec060e14993195d854830ab22923libreoffice-help-sl-5.3.6.1-21.el7.x86_64.rpm334b22e1e465618741f7039db513cb567995002a0bcd00ecb0259ef4b6bf6076libreoffice-langpack-mr-5.3.6.1-21.el7.x86_64.rpma278308946ca8b4abd21baaaf29609560ca343dbe9f1bc9a0c7ea43c7b2270cbautocorr-ca-5.3.6.1-21.el7.noarch.rpm8b7cf066402c88c176c619c30c8f6415dce7b51aca3035daa5225e2ea9d5ea5flibreoffice-help-lv-5.3.6.1-21.el7.x86_64.rpmea444a5c4f5656eb61e57ac7703e14a94b2b169a2da6ec7e9097dd3245c175a3libreoffice-ure-5.3.6.1-21.el7.x86_64.rpmcc70ec2915baaccc6fa1824515eb3efc6295120b921e07fa2e108cff8a1a3d65libreoffice-langpack-xh-5.3.6.1-21.el7.x86_64.rpm5060ad112ff966dcd75105bff9f2142a058143a937a3ea84a42143c5198c6784libreoffice-langpack-fr-5.3.6.1-21.el7.x86_64.rpm3da4ce3bbb5cb2bd4c585193ddfdd13c4a96711a135e2c7abbd30942319acf7fautocorr-ja-5.3.6.1-21.el7.noarch.rpm2261a184af543fab88aeff61403b1c621922770b910e1a53e9b1c3218ea21c96libreoffice-help-ca-5.3.6.1-21.el7.x86_64.rpmb44b70b6805da3957c6aeb16667c93d74c092d3e536b60829b39202fb6ea4d91libreoffice-langpack-te-5.3.6.1-21.el7.x86_64.rpm17aaf54d67e7324cba8ef0ad7a29582bba6faeca2c30899fabfcd6f30cf052d4libreoffice-langpack-zu-5.3.6.1-21.el7.x86_64.rpmfba19878e9b260f6c42081b1d88c7e8fbbbf598f672d2b17148782ceef77f827libreoffice-sdk-5.3.6.1-21.el7.x86_64.rpmdf5765d9f98151db4d55c4e686c62acda6c5fedf1559a34cd2c0e514853bd4bflibreoffice-filters-5.3.6.1-21.el7.x86_64.rpm18593c36e66210f031e19f862ac3b998b1472f3baa3c41b2937e8a13df2012bclibreoffice-xsltfilter-5.3.6.1-21.el7.x86_64.rpm5fee3acf9f01c12b7d04fafc55592f90379d3f457e18e21b6a9b198175ed9eeblibreoffice-langpack-ml-5.3.6.1-21.el7.x86_64.rpm83402c0dade8888c578a5279ee61003753cd8664db9f1e04a4c1ed319796172elibreoffice-help-fr-5.3.6.1-21.el7.x86_64.rpm33e04864a273383d6ae17499bb4db86248a3cac9e36dfb0eb6c9f0f1067432c6autocorr-sl-5.3.6.1-21.el7.noarch.rpm766ff158b19e7c58c6cf9cc9435da6b1359887024ed9b50607f0546fafdb322flibreoffice-impress-5.3.6.1-21.el7.x86_64.rpm297ffdfe23ddd2ca5b00e5bdc5c57b5ec3d88dd6cf38f86890ed7df5a7655f4blibreoffice-langpack-st-5.3.6.1-21.el7.x86_64.rpmf0cdb03fa345ed2f07ea64d15aa23b5d8c1b8b1fca3a1c82fa67bf6e23f7cdbclibreoffice-langpack-cs-5.3.6.1-21.el7.x86_64.rpm28efca78cf611e1194eeabef322e72bec3890e7fae3912b47fb79b1da525c42flibreoffice-help-uk-5.3.6.1-21.el7.x86_64.rpm2cf842c343f92e3c50e7766fc0cb7ed97bd18225bbec6ca953b0d4329b324642libreoffice-langpack-as-5.3.6.1-21.el7.x86_64.rpm0f4de6a007f90b69b979f88521dfa39528f382f6a8eb2d4f41d9688ac0304343libreoffice-langpack-gu-5.3.6.1-21.el7.x86_64.rpm17f092a4badb5d0a40a940201087397d7bf22fc96911631995278028ed772330autocorr-hr-5.3.6.1-21.el7.noarch.rpm85ab9cd94bd58cd29fbd6b2afd06278abce9b2781f880546d5d6d7690c7881f1libreoffice-langpack-mai-5.3.6.1-21.el7.x86_64.rpm38b176702daa7d52bf2f25affe56a62b38d35a5868b4d8c3d4bf71bd99f3ad5dautocorr-ru-5.3.6.1-21.el7.noarch.rpmf32d4e63a6a040caf6ecf60b1ad46a9649d6b9a3eb56ad69612c710eb7ba3476autocorr-tr-5.3.6.1-21.el7.noarch.rpm3aa1519f86f5eb495e3847d884c6322269b012817049a0bafb3e248653897f8flibreoffice-langpack-it-5.3.6.1-21.el7.x86_64.rpm4b224554ba2a41745d16ff9748f8e233fb94b847b1bbb0aecc6560c7415682c6libreoffice-langpack-pl-5.3.6.1-21.el7.x86_64.rpm2bf6037aa76d33320effdf3db24bc3fdbea97f5cd25afe0d2070a339bfa82c63libreoffice-langpack-ve-5.3.6.1-21.el7.x86_64.rpm2aff83d400da26ca5f56a5960ac77c5007e924f726eaea2150aa6bebc3db213alibreoffice-langpack-cy-5.3.6.1-21.el7.x86_64.rpmfcff4b7da1c4bbbb0f674decf2ac45c0b6ef1a87f450e0f0a9f22f72ccbf3c2dlibreoffice-help-pt-PT-5.3.6.1-21.el7.x86_64.rpm55b46a96a9734663af698008f0e0815a4daa7eea0db75c200a724918488a57fblibreoffice-5.3.6.1-21.el7.x86_64.rpm86e4df83bdd52355799bb793dc8e4645d0d57f9c78511ada3647115a785693ddautocorr-it-5.3.6.1-21.el7.noarch.rpm0ca9e449408c536a24cefe153cfb9fbb27e4080c07a76f1e86e752aed0c812b6libreoffice-rhino-5.3.6.1-21.el7.x86_64.rpmce13c6c9f4ae229a58e934f8554f3a3a136cf4c0dbfaf6ee0ec16d182d264969libreoffice-help-hu-5.3.6.1-21.el7.x86_64.rpmdcc343cbc4c6fe52a93415224b136c90c359429a742fffb4b3e9817cd5dc69f2libreoffice-langpack-ar-5.3.6.1-21.el7.x86_64.rpm03ef77b264dfdfbca603ee81043b109a3f1d40ce1d37f3b73c37d751868daee3libreoffice-help-sv-5.3.6.1-21.el7.x86_64.rpmc86d0fc59234d7182cefae772b565d5d8b18027fc7f7b2a343d323fdd289b325autocorr-is-5.3.6.1-21.el7.noarch.rpme23b8834dff6c6f455b6de3504d735f7b335789b798e341c8f8cb5dfbb2b01aclibreoffice-glade-5.3.6.1-21.el7.x86_64.rpme45cf1325152f4e6d40a047ac1c4b3f940d069c86db271bbfa5fe118371f9352autocorr-ko-5.3.6.1-21.el7.noarch.rpm6f6372e4562118073db59136e68a2cc7e0f5fde6e37e0c83eab4441402533a99libreoffice-calc-5.3.6.1-21.el7.x86_64.rpm85d620eba8ec99765637954a29e873b9966b8f08f0cee2039acfcbcff48ff49flibreoffice-langpack-ca-5.3.6.1-21.el7.x86_64.rpm9e5939d61d20c1b94ce9019787976959dfd1e1c91bf441eb176b885a584dba60libreoffice-langpack-nl-5.3.6.1-21.el7.x86_64.rpm365fc9a9bc019be9de532bbbf6c146a55852489e00b1a1972904b62f7badc865libreoffice-opensymbol-fonts-5.3.6.1-21.el7.noarch.rpm22ff16c3b248df8aaaad8c60dcfbe8624a8a70980dfaf77fe6cb9d154315b51alibreoffice-postgresql-5.3.6.1-21.el7.x86_64.rpm31f984b0c909ba1990344e3687c412348df9b99fcc2bd85eb98277fc3d429829libreoffice-gdb-debug-support-5.3.6.1-21.el7.x86_64.rpmfcb9d32b1bc34cf53b2acfc4872c105c6b6482ceee655074064d8bbdb4ffa7e4libreoffice-ure-common-5.3.6.1-21.el7.noarch.rpmb36bf4766ebeb10b177f41ca6eb75e668d93f675788456020ef8506c81c1c4b6libreoffice-langpack-ga-5.3.6.1-21.el7.x86_64.rpm8b23d8dd2d8659488fbac897b95e3f811eccc1c5b0027206827f252cab81882dlibreoffice-langpack-et-5.3.6.1-21.el7.x86_64.rpm37fd2e31532397c6364f72593ef2461791e1ab92145035a1cb7985d6a3b35fd6autocorr-sr-5.3.6.1-21.el7.noarch.rpma47140c802427c27788666e24c0ea80a591f6b0c9886f3808892bfaac2205a4aautocorr-sv-5.3.6.1-21.el7.noarch.rpmb0a5ddd0c846334ee34400b0351fe365249af1465eb72f46dbeb81cf5c01fb9dlibreoffice-help-sk-5.3.6.1-21.el7.x86_64.rpm70ce7d3b9963aba4e8a7aeb23d59a8e650c88b005bee9a9e1bed207968666b43autocorr-lt-5.3.6.1-21.el7.noarch.rpmf65ef377a6bab1f3fb17f2a448171bcb331cdccff4c51bff5a280c83f6fd98a3libreoffice-help-hr-5.3.6.1-21.el7.x86_64.rpm62543e3cf4969b1d8cd6ed56a01a0dc5bd4357eb8a26e091f582a312f6526768libreoffice-langpack-kn-5.3.6.1-21.el7.x86_64.rpm80c58fc78e8831df1311d06b15fa8abe568893c0ad9280dd6ca1aba6ef3e904cautocorr-lb-5.3.6.1-21.el7.noarch.rpm3392664b47338be628db482c94b29003ec28619a6f555f39798fc718622a6d85libreoffice-langpack-zh-Hans-5.3.6.1-21.el7.x86_64.rpm0a64e443581f77688425161f50de79438d34632c8fc45c46a2dbeee26f8cb62blibreoffice-langpack-es-5.3.6.1-21.el7.x86_64.rpmf99cdb436be48453133cf7c047fdb6b357387497861eb8d3a50f0555c950dee2libreoffice-langpack-dz-5.3.6.1-21.el7.x86_64.rpmcb2b07eea10129af10ae0be24d83e08ef1fbef045f28e3bd24aa0e6288b2f372libreoffice-langpack-uk-5.3.6.1-21.el7.x86_64.rpmd39d1bf6ae53a53eb40a2b4e9a05420f1fbc22a53d97c514ec2ae69da76e9768autocorr-de-5.3.6.1-21.el7.noarch.rpm5de780d72868c2b960925e383d8441dff579b64fea3aecc486f34454a81b7b84libreoffice-officebean-common-5.3.6.1-21.el7.noarch.rpmba9855b11a469811efdf7c0e0bdbc16475dbefa5c3c1c603edbabc93e1967ac5libreoffice-langpack-nso-5.3.6.1-21.el7.x86_64.rpm971752a84593a5fc223c998161333fec2f6434e352c8fa103ac588f8b79cc899autocorr-da-5.3.6.1-21.el7.noarch.rpmc91c3bdfbd2321083f497bdf28acf166804c5ee9d6a400d7539c1b91a9b06f4dlibreoffice-langpack-br-5.3.6.1-21.el7.x86_64.rpm08d0d0ae636a8ea2c9ca80668a1ce61a06517ac28d774c309aefd2be36f00eb9libreoffice-nlpsolver-5.3.6.1-21.el7.x86_64.rpmb6ebccecb1d6e254ac6ea7f57de0a5ebcc8203989653c3cea85d07048f2f5398libreofficekit-devel-5.3.6.1-21.el7.x86_64.rpm1876975595c9e777865966dba1b44b6c9725394eccfb1841d2d861f54112ac53libreoffice-help-ar-5.3.6.1-21.el7.x86_64.rpm28528b3f407a786cc06481fd7a16c2fb8e136b984c0f0552518b91744b250eb1libreoffice-librelogo-5.3.6.1-21.el7.x86_64.rpm723deed94495ed8d4b880ce5c4b3b02612444c6e0a3cfb9ac279cfeb1e27ee07libreoffice-langpack-pt-PT-5.3.6.1-21.el7.x86_64.rpmd1435220e18eaaba95b0c77d25452925a22776b5004044b484e4632d36f6086clibreoffice-help-ko-5.3.6.1-21.el7.x86_64.rpm91714041dbd319fdbb4eccb36a5d1db6fd29ebc94745561698748ee10e74f60dlibreoffice-langpack-hu-5.3.6.1-21.el7.x86_64.rpm8ca22a96d591af6f97abbbd10dc8d2805c19db216164d8d0d522b1e128be1c91autocorr-ga-5.3.6.1-21.el7.noarch.rpm300f0500edbdcc2f8c1afe3b7a88a48183e1ea8506f4fb3a64f5b36a4d7e2a32libreoffice-pyuno-5.3.6.1-21.el7.x86_64.rpm8943bba4f3c697a3fbc346616b06b3262f235eb5696d39fdc5594f8a9ae2ed9clibreoffice-help-ta-5.3.6.1-21.el7.x86_64.rpm16e42ee3e6847dce27d58b93348bed32c15298e01be5fd36e3cbe96df9fb067dautocorr-af-5.3.6.1-21.el7.noarch.rpm154769b7e49ba7dbd3702b79db1fa764badc12492d06b38d57226d54533149cblibreoffice-langpack-pa-5.3.6.1-21.el7.x86_64.rpm4c98d4ba3f31d799c1668c228e142e9a6785cc6b8ee28cef1eea9a072299bdealibreoffice-langpack-tn-5.3.6.1-21.el7.x86_64.rpm4f65f186b9babf20db43e28b751efa39436d9a259dddcf7c4f160013e4f99c3elibreoffice-x11-5.3.6.1-21.el7.x86_64.rpmc41cfa24dc9a67e4408c12e2373fb86f588039ef6db6541698766e891c594030libreoffice-help-he-5.3.6.1-21.el7.x86_64.rpmeb33875b380a6aca7a873bda6fc5d977ad4ae5bae76088123731f8bdab07a517libreoffice-data-5.3.6.1-21.el7.noarch.rpm85eb7c760770c2355617601075abb806322ee5d32df7b06267c96bbc1fc736a7libreoffice-langpack-sr-5.3.6.1-21.el7.x86_64.rpm1a371769195584e03527a66d5115614aeb8e055f3b1086c605e9f2c8d13afad2libreoffice-help-zh-Hans-5.3.6.1-21.el7.x86_64.rpm0dc9ddb783a9465a7790f0cfc1e45d6810a9d8b2e4a6f4c73e023fb2de98547dlibreoffice-sdk-doc-5.3.6.1-21.el7.x86_64.rpm3aab3291d1b01b0e005a2f9c07c499966c05aa25a4bea9fae0cde867e834f47clibreoffice-langpack-ko-5.3.6.1-21.el7.x86_64.rpmebb6accd522624a2e8917b233344d91690f84f17bf6b9a8bf4099a21444a61eclibreoffice-langpack-sv-5.3.6.1-21.el7.x86_64.rpm4dd72c073b55dc04487c8c72709f25c01724ef6d6cb0deb02732776e3605fe54libreoffice-langpack-ts-5.3.6.1-21.el7.x86_64.rpma2089f5630652830a219d18dc6067b19997c494a03a41d51e96e568aa8935623autocorr-nl-5.3.6.1-21.el7.noarch.rpm092a6e14137f6a8b1bd63360b05d59eeab0280cbeae1501b257a5fc3e4d02eabautocorr-ro-5.3.6.1-21.el7.noarch.rpmc552b1ec3907083693bfe7a9c04cbed751fdb8be211fd7737a4a5d94c389f34alibreoffice-help-hi-5.3.6.1-21.el7.x86_64.rpm1f6e55ae9cad0ecebed298966c3e6041223e5fd3c96b9b201c3e393317c9f972libreoffice-langpack-kk-5.3.6.1-21.el7.x86_64.rpm82339ca3adf16847d112b88737e20d769227d70c9b777469a76288c793ed5875libreoffice-langpack-th-5.3.6.1-21.el7.x86_64.rpmca0cc16fb189717a478c060795008592e625eddaa51401ee6e07d01f25c3de16libreoffice-langpack-ta-5.3.6.1-21.el7.x86_64.rpm008882dcd84ac646950c9b960dac2de62d13dce95b84e117c3c9d57ad42afecelibreoffice-langpack-fi-5.3.6.1-21.el7.x86_64.rpm73f665b23905bcd7aacb63fbbaa5180a191e4c294169a09238f0eb775275e60flibreoffice-langpack-lv-5.3.6.1-21.el7.x86_64.rpm01da12ee23a698aae6aa0c7a8642508380a877f18da0819893e508e363890170libreoffice-draw-5.3.6.1-21.el7.x86_64.rpm8f55f125d42a3b569f578d9e15d9d4bf2c3d045fd29ee4f1b461b599a67dda0dlibreoffice-langpack-nb-5.3.6.1-21.el7.x86_64.rpm9bb0a7c214d2ef9da0b022df88a5a568306a74cf2ef4434a220a9999bc41b91clibreoffice-langpack-ss-5.3.6.1-21.el7.x86_64.rpmd8213fefb56a9072a263a929370793d1313c5f2d9ecc099123520f2720151af8libreoffice-langpack-da-5.3.6.1-21.el7.x86_64.rpm3202d5d924482d74ef0b02d023b090004a27d1055bcfda762f2aaf2e30ce424cautocorr-zh-5.3.6.1-21.el7.noarch.rpmb0b1869022819164c1c26e73c13c97ab78644415033d2195bd2ef71e0233c092libreoffice-help-dz-5.3.6.1-21.el7.x86_64.rpm06a7446fe3dd04ebe1168cc7e1f122d44a6ceeeed9fae771f8bee69ecb09d9beautocorr-sk-5.3.6.1-21.el7.noarch.rpm2931d9fb4c349e09750c2752367c97163d2d2874b8e446ffa90da0ff1c8b863blibreoffice-help-ro-5.3.6.1-21.el7.x86_64.rpmd628fd91045eccd48bf0e55d17e8e55805a22e11ac664b8517b260b008377aaelibreoffice-langpack-en-5.3.6.1-21.el7.x86_64.rpme1528d3106bd3625e6fb8528e3875124966b2b0d31223a3e96bd2b92a9d638ffautocorr-es-5.3.6.1-21.el7.noarch.rpmd6320aafabee518b11ee8ce8a36443b2b04cbe7aae57bc5d05dc6fc71f68eccclibreoffice-langpack-lt-5.3.6.1-21.el7.x86_64.rpme35e3486c35c0dde70e72898294c71347558f3ea41ee6473a69dc45b8074546alibreoffice-langpack-de-5.3.6.1-21.el7.x86_64.rpm9b89a9a29b0eccb2e1777c91cee430ce6a0992fb3dc4297e15293893febe40aclibreoffice-help-gl-5.3.6.1-21.el7.x86_64.rpm04dab2e090da3dae910f10ffa67b0cd9adc0253672925dcbdcf81506d75d9239autocorr-pt-5.3.6.1-21.el7.noarch.rpm1685982c38c444ffa69c850b91dab217e33c5647d376acea4b88a5467090ceddautocorr-fr-5.3.6.1-21.el7.noarch.rpmbc067f1603aaadcda348dc0d36cb98d229b7189f32ca2c4b84442b1cfe0e936alibreoffice-langpack-fa-5.3.6.1-21.el7.x86_64.rpm32c8c161486782dfba2feb2e06d6bb60872e7dc5a7c948b36f5925764c523e76libreoffice-core-5.3.6.1-21.el7.x86_64.rpm1ae88e968658b4497a52a5d6ac863d72b672ff478c7df87043409d8670c4da2dautocorr-cs-5.3.6.1-21.el7.noarch.rpm363a409cfaa7b37e982bf73f286ffe1c3b6f4e2d972964833b2a118d5178f9e2libreoffice-math-5.3.6.1-21.el7.x86_64.rpmce8a6c1a856595197239715070e61a117aa293b2ed3c080978a73a1a694a70f1libreoffice-writer-5.3.6.1-21.el7.x86_64.rpmac1fa31cfdc1d0dabca9907bcc2c5432884b045f708e619630416dd17afe86aclibreoffice-help-de-5.3.6.1-21.el7.x86_64.rpmc8e2c72625181bc372236c75940404fbf15ec00da8e2ecb1b171f98f0e591acalibreoffice-help-bn-5.3.6.1-21.el7.x86_64.rpmc23f7cf99667175101cbcfc8e715d91a3e427469b42747ba4008772d61636ea8libreoffice-langpack-bn-5.3.6.1-21.el7.x86_64.rpm4554f93c5198b5a64e8831f4c7c14dd745900e2c0ce1d782670d6b399fd4e1f5libreoffice-langpack-hi-5.3.6.1-21.el7.x86_64.rpm038d9dd821212278918a0e2929034f103402cbe006ed53de34990a1ca6155a59libreoffice-langpack-ja-5.3.6.1-21.el7.x86_64.rpmefa46fd9eac871f3ee7e2c0ecaaf8e4fcfdd317f54c88ec75476c7cda1235e53libreoffice-help-et-5.3.6.1-21.el7.x86_64.rpm3ee20df121414db1b36034c1f519885362ca0ac70d07934defd35dd66e401889libreoffice-help-id-5.3.6.1-21.el7.x86_64.rpm8cbe1d83ca6469d35d234fe7c8f626f0dd769f57c86b47f0ca7ded04f680d51clibreoffice-help-eu-5.3.6.1-21.el7.x86_64.rpmc6d36abec441ea41037daac8de37539e48352caa2ac669bad17b5bf7f1108be5libreoffice-help-cs-5.3.6.1-21.el7.x86_64.rpm59cbc09835fbd5e0e1f6670b365950e40b501a4cbdf6ccdd7561c14ae33033edautocorr-fi-5.3.6.1-21.el7.noarch.rpm168b94c7602fdee50cf0ad431f358ef1fe7a31b485bcb93323ee0e6c82fc34eeautocorr-vi-5.3.6.1-21.el7.noarch.rpm43155f401e218709fa09056969a7f17ae274c1b49b926b6c660e44562197a14blibreoffice-langpack-gl-5.3.6.1-21.el7.x86_64.rpma2569128224323862f1160e4b9c61e081e9a003cd5b9b8495fb37bc0be4c6e26libreoffice-help-nl-5.3.6.1-21.el7.x86_64.rpmed423aecdf21de0005b254842dd2ecadd4f45ad322852b6198cd9b2cc6ca1ee1libreoffice-officebean-5.3.6.1-21.el7.x86_64.rpme53512f879c5f4ac5c63a60b5ab4de3c2e403e0a0515ab5f3beed0ed6c86537cautocorr-fa-5.3.6.1-21.el7.noarch.rpm977d3bf675bf2fdd77c67db851d6a9f0f4fd08e4f63cd8b8fc8b816efe1ecf57libreoffice-langpack-zh-Hant-5.3.6.1-21.el7.x86_64.rpme0a2c4a62455ad36985dcbd5f2a5948a6718cf5a195b76cc6a8946c708a4da05libreoffice-langpack-el-5.3.6.1-21.el7.x86_64.rpmd474a4184414809f6c98cd9d02fdbffabd7ee718b4f045517ec9ada0e0a6e15clibreoffice-help-da-5.3.6.1-21.el7.x86_64.rpm348d3339ff3fa6fe916ec4aa1768686502849c41f737c95ed5d064e883d3e823libreoffice-gtk3-5.3.6.1-21.el7.x86_64.rpmde11fc19c78875e62c81b669af6d3e49bf6799081c1167b509f6fb1c0d82a24cautocorr-en-5.3.6.1-21.el7.noarch.rpmda5cf942bbe7a53bf578034c2378281f0aa01061d50cdc35d238e073fde74d69libreoffice-langpack-sl-5.3.6.1-21.el7.x86_64.rpm35152ad20e0871cc07954b5ebaa1e9fca9812c47c12c2a5346d30c51a9e3d822libreoffice-gtk2-5.3.6.1-21.el7.x86_64.rpmbd47ae987cd6e04bbc871dd485992bf88a37d6be98167873843bd50fd1dc25dflibreoffice-help-nb-5.3.6.1-21.el7.x86_64.rpm6926d9baa39f6651c01abe4f69ad746c8ed576e5397cada1a4ed4bf2388e6d2flibreoffice-graphicfilter-5.3.6.1-21.el7.x86_64.rpm00130ac5aba73b94bac0b7af38f71d57ffefb7df82a8c45e553cc3271bddca1alibreoffice-langpack-ru-5.3.6.1-21.el7.x86_64.rpmbd96623c4dd7e42d9d7790604be6cec1f37277aa257f37295265d6645c7f4e1blibreoffice-help-ru-5.3.6.1-21.el7.x86_64.rpmfb51bcc49dda3e48b0c64ee35c284dc5e2c14bd45d0a545c31cf4ebeab06f6b6libreoffice-langpack-sk-5.3.6.1-21.el7.x86_64.rpmf0088df61485ca68f6daf023b827e74f25c00aac63132da9e0444b53299dd279libreoffice-langpack-id-5.3.6.1-21.el7.x86_64.rpm4e8279770c27dfcae60ddce213b20804e6f8b9cab60552948ffddd12c0645687SLSA-2019:2135-1Qt5The following packages have been upgraded to a later upstream version: qt5-qt3d (5.9.7), qt5-qtbase (5.9.7), qt5-qtcanvas3d (5.9.7), qt5-qtconnectivity (5.9.7), qt5-qtdeclarative (5.9.7), qt5-qtdoc (5.9.7), qt5-qtgraphicaleffects (5.9.7), qt5-qtimageformats (5.9.7), qt5-qtlocation (5.9.7), qt5-qtmultimedia (5.9.7), qt5-qtquickcontrols (5.9.7), qt5-qtquickcontrols2 (5.9.7), qt5-qtscript (5.9.7), qt5-qtsensors (5.9.7), qt5-qtserialbus (5.9.7), qt5-qtserialport (5.9.7), qt5-qtsvg (5.9.7), qt5-qttools (5.9.7), qt5-qttranslations (5.9.7), qt5-qtwayland (5.9.7), qt5-qtwebchannel (5.9.7), qt5-qtwebsockets (5.9.7), qt5-qtx11extras (5.9.7), qt5-qtxmlpatterns (5.9.7). Security Fix(es): * qt5-qtbase: Double free in QXmlStreamReader (CVE-2018-15518) * qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service (CVE-2018-19869) * qt5-qtbase: QImage allocation failure in qgifhandler (CVE-2018-19870) * qt5-qtimageformats: QTgaFile CPU exhaustion (CVE-2018-19871) * qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file (CVE-2018-19873)moderateScientific LinuxScientific Linux 7qt5-qtwayland-5.9.7-1.el7.i686.rpmfba68ee7116ffaeb761d93d27ab13ec6c3dce6977ae826a648bfc76fe5aba661qt5-qtconnectivity-devel-5.9.7-1.el7.i686.rpm2fd4a0514e144955fd3a669482adb898a535bef4f34d9183d49591971e6c1b94qt5-qtmultimedia-5.9.7-1.el7.i686.rpmc927e0ee756f670ee5742647106cae5892b7b20500c7bfda953f2ea9847ed27aqt5-qtserialport-5.9.7-1.el7.i686.rpmcdfa41fe64fdfe8bbb17c64050769933b873a1c7dd37dc0b41d0bdd4524edb90qt5-qttools-common-5.9.7-1.el7.noarch.rpm754b3c169de6debc6b08b4dccc22656a64798c955d65c936ebc9ace8f357470cqt5-qtwebsockets-examples-5.9.7-1.el7.x86_64.rpm1aacd2cfd657d0426b9b9b4da680a7bd12d739fcbaa6aa08067b85d8c6b4ac11qt5-designer-5.9.7-1.el7.i686.rpm4c6d434711267f05c9dcea1c27e78e084f025e837507e57c3eafc10f8952b27dqt5-qtconnectivity-devel-5.9.7-1.el7.x86_64.rpm927aeb7ae6c5d0280f3005a210d964f7730a87611695f93ac8f95022c1739faeqt5-qtscript-doc-5.9.7-1.el7.noarch.rpm51a442f8bd9bf31ddf4184291cff8f9a7e41be213f9cf5f246506eb88b076089qt5-qtquickcontrols2-doc-5.9.7-1.el7.x86_64.rpm647b0d2e93e29a67e6ad8800f92291069daea92071ee44e7a9793373b432a7fcqt5-qtserialport-5.9.7-1.el7.x86_64.rpmee6779cda4e8bad1de3e95a3863f1a0a07e7a64ba6727c077ded218b2e9886e1qt5-qtwebchannel-devel-5.9.7-1.el7.i686.rpm7e05ae0432aa93a2aef0917868c5372c36cf63211974a6f4baa1befa9f66588bqt5-qtbase-doc-5.9.7-2.el7.x86_64.rpm8b6e0f1fbb7778cd11dfb81ee688575bf22319e2a60418acc5e3bff150af85deqt5-qtx11extras-5.9.7-1.el7.x86_64.rpm3213f297554619066cc74845c09e8977fb262cfedd2c9f3ffa1e12e336b161aaqt5-qt3d-5.9.7-1.el7.x86_64.rpmb85798f5dd0c8573cdf4916fef96c87133f6f162657192e8b89a777e33710c4eqt5-qtlocation-devel-5.9.7-1.el7.x86_64.rpm071416ab0b16bd1a8772c8404eed1442be817dd94773300e0c703d230521313dqt5-qtwebsockets-devel-5.9.7-1.el7.i686.rpme95df498574fed70f9df8c1ea70a9b2ace35f2cfdb87fa19c107bcdfda20cd3bqt5-qtmultimedia-doc-5.9.7-1.el7.noarch.rpmc28d6ea768fbe848d3e9adb0bb5d9924100603449e3d4dd3f0564783b65623b4qt5-qtquickcontrols2-devel-5.9.7-1.el7.i686.rpm996f79a2063f12c9d5fa2b0c84f2585ebe250b726d0115846d3674fd8a4fcb70qt5-qtwebsockets-devel-5.9.7-1.el7.x86_64.rpm8cb758227b83e440dd950a45a1e2c5f29b1c4fc77dd723fea0a56d1ebb2a1ec0qt5-qttools-static-5.9.7-1.el7.i686.rpm37bbb85e7507a17737c8907c95e3f1280ed89316050ae5f5b516978764931b2cqt5-qtsensors-devel-5.9.7-1.el7.i686.rpma73d315c05df9ff90d670aaae8fdb1c464e2a50088cfa8e39cf52c431a5bc9a3qt5-qt3d-doc-5.9.7-1.el7.noarch.rpm869f6e90e2e6aa08ed4379b6797e163e6cc2870a2acefb27b898b315f32701cdqt5-qtdoc-5.9.7-1.el7.noarch.rpm1aa1d66f59d21cfc6afa8a5142062a442a1e0e71622629b45f2b86d37c41969bqt5-qtwebchannel-devel-5.9.7-1.el7.x86_64.rpmc30c9e35d6fc54370a039429bf418d6d599b7c131c332511b7c6613d8fe0efabqt5-qttools-libs-designercomponents-5.9.7-1.el7.x86_64.rpm0f4f91c633c4c7c4ede915bdfb34076a1291760e3661122c38740fd7f81b17caqt5-qtdeclarative-5.9.7-1.el7.x86_64.rpm897111207b0ba1e24f0983e3870e9c566d4b151b84927deaeb287b6098d6c002qt5-qtmultimedia-examples-5.9.7-1.el7.x86_64.rpmce434a402e5ffe17e2f5483ebd4a809ab5b9f8f4c688906878e00d3cd57aec27qt5-qttools-doc-5.9.7-1.el7.noarch.rpmf0ded8755e8cbe06141c347a0e427f755c460596a9e374850eccf7c0b1e72c37qt5-qtsvg-doc-5.9.7-1.el7.noarch.rpm19c113f6826dc55fa7b75bf1b7f1c0ed7772d330f9ef14d987197236f995bf87qt5-qtimageformats-5.9.7-1.el7.i686.rpm590bf51630f86b11208c68b78aa96cb35e4ecc0242f5b991516afa2b7e6eedcbqt5-qtbase-mysql-5.9.7-2.el7.x86_64.rpm98190178faa9fd320b300fb2ad20f50422f7bcc405332ebf79d6f5429bbec3c3qt5-qttools-libs-help-5.9.7-1.el7.x86_64.rpm55115acb856cae8ccc2b2263092872273e42a4d9b16c3b428d018d0b267d516aqt5-qtbase-gui-5.9.7-2.el7.i686.rpm4b831754b5f0884a93e18b2ff810a84e9baa9b78841d6e76643921c2f6f6cb01qt5-qtscript-5.9.7-1.el7.i686.rpme2429ba227f355de76267d23e7a740d3fa6edbee952b2ffce46aa20831e353a5qt5-qtsensors-5.9.7-1.el7.i686.rpm8bab2eaa6b8240bf8785be16263848304bed9b2c8378fc21c97a80e54233e2afqt5-qtbase-odbc-5.9.7-2.el7.i686.rpm58fc91f964dd089a8b732a5096029fb3da7dc2a3924b0e8ef1f9f9930ec2dd46qt5-qtquickcontrols-doc-5.9.7-1.el7.noarch.rpmdd6866d2d67f160d720e984d6ec50218188ce3b5156af568a968fe78395de0ebqt5-qtquickcontrols2-devel-5.9.7-1.el7.x86_64.rpm68ffcac74b90546d411f7a808d261a5cb6eff92d4dfd30201acbf3d8ffa05ad6qt5-qtlocation-devel-5.9.7-1.el7.i686.rpmbd68ba42dec78d2acb7ab7cfb5c3ac212609dc0958be4a9e71abaea9adea33cdqt5-qtxmlpatterns-devel-5.9.7-1.el7.x86_64.rpm1dd97f0222e3d5cb35cdc07236f9f50fa7e390b0f44af290d19811a3b3a84d55qt5-qtdeclarative-devel-5.9.7-1.el7.x86_64.rpm94fb265781559bd009314db8ec622689b35b1a9b52f08fb1e3b94ca8bb4c6501qt5-qtwebchannel-examples-5.9.7-1.el7.x86_64.rpmd94cdb49b3bb60c0b0f21028ba1a589621ac8b48a2a72338671ecb053548ab7eqt5-qtwayland-devel-5.9.7-1.el7.x86_64.rpmdcd688c9a5603da6c3452b16c01d29e3c0f93e2bb87b3766a888e822527d8e9dqt5-qtwebchannel-5.9.7-1.el7.x86_64.rpm4f67b3468978e8ea40fa1d9ff4e964bcce7b779a56b75e580101a76f131b06fdqt5-qtlocation-doc-5.9.7-1.el7.noarch.rpm3111f0697fe6d5f2075caf1af8e35f5c342b44cded42c4e1f91707e16f96325bqt5-qdbusviewer-5.9.7-1.el7.x86_64.rpmbc55922bdf091e323dbee6632c380352543cafa5b25d457fb3be77006b330eb6qt5-qtlocation-examples-5.9.7-1.el7.x86_64.rpm042b22741a88015f7a1ed535956b591132d3d5624cf5332610b234aedc3908ebqt5-qtgraphicaleffects-5.9.7-1.el7.i686.rpm5126eef2595496c3fb17391fad205be5dc810e1f46c8d2c864813de23609f5ecqt5-qtscript-examples-5.9.7-1.el7.x86_64.rpmfb7734fb678a1014064df19cacea63e60196a65e7f3664e85307ced40910fa76qt5-qtquickcontrols2-5.9.7-1.el7.x86_64.rpm87837187078c0093e398cff0c1c57905885c5e709b14fd477c0c5b9dde70a590qt5-qtbase-static-5.9.7-2.el7.x86_64.rpm14b81b0868fa881ee77750c2049ee046f44eb3923db69b345a046eeedfcc27e9qt5-qtx11extras-devel-5.9.7-1.el7.i686.rpm2e810b306d02008f0bfb642d2940eba45012a89ea69640f3960dae42e046078dqt5-qtserialbus-5.9.7-1.el7.i686.rpmd62738c358e60ea776873f0b5a73836e1c83318ed4004a44a6a5838661ef7db8qt5-qtwayland-5.9.7-1.el7.x86_64.rpme867f8f072e4ecf5f376e304f0a8e60af9ae8c7acdc4bdfda801cb89902e116dqt5-qtsensors-doc-5.9.7-1.el7.noarch.rpmc5f7783c1caa527b9e43ab9e2a88db733a07ceb348c510468545953467cae959qt5-qtquickcontrols2-5.9.7-1.el7.i686.rpm3fad049c05f32df1bdbe72849e6d8cc68ac9bafac5a28ea664ef804303bf3331qt5-qtdeclarative-5.9.7-1.el7.i686.rpm419eb0ee21dfd735763ad7a6a8953c7d718cc8887222cfae565f8ee9d31495aeqt5-qtbase-5.9.7-2.el7.i686.rpm9c619179ffd3944647aa55a8526e40518d8d5bd96d8df7a39c57646a307bfd4dqt5-qtwayland-examples-5.9.7-1.el7.x86_64.rpm1a609016ebc7581578ba3ae38a1827ec709de08e96577a3ea61abd2a98c76d29qt5-qtimageformats-5.9.7-1.el7.x86_64.rpm4732252ea01c7934395d52f79da1bfb73c6362619044924d906782828f1ba498qt5-qtsvg-devel-5.9.7-1.el7.i686.rpm35d0731d51b7c2945d9507a534e3e05ebe110ecf88491d8c7ce9670146cd03fbqt5-qtbase-postgresql-5.9.7-2.el7.x86_64.rpm21be3f89fa15c79cabe52d5f77a21972e12cd5ca2485df6089ac31ff0c08517eqt5-designer-5.9.7-1.el7.x86_64.rpm333d29edcb2046a513358bcd00238868e883e6e7926ba856ed41a8b67fb9a7c6qt5-qtcanvas3d-5.9.7-1.el7.x86_64.rpm167384d8db00574f7a7d66416419b907ef7e90f99498c34f087fb097077fc61bqt5-qtwayland-devel-5.9.7-1.el7.i686.rpmcbd2db4a2c3fa5b672abfb030591a21bbd0c2f64db5709c83cd9ea4b3903560aqt5-qtdeclarative-doc-5.9.7-1.el7.x86_64.rpm953aa28ac1499509af2f60504d11781226ec3402eed4aa9d3d44f5f290bec3a4qt5-qtmultimedia-devel-5.9.7-1.el7.x86_64.rpm2d7ae744c299bfef24be0e335cba47ebf4eaaa54727c17ea5203265bb1c8086bqt5-qtwebchannel-5.9.7-1.el7.i686.rpm37d772cb746059ce5411967d49eb14ce1f58aeb926c1903ce912285e6c719723qt5-qtxmlpatterns-devel-5.9.7-1.el7.i686.rpmbf5ba826ac856957646467dfe46db277757d198000654779f4025c8f8d363ba4qt5-assistant-5.9.7-1.el7.x86_64.rpmd46462a77d6c8465772f7b3203238d275d8f9d088cc99155b34a933fd132bd5bqt5-rpm-macros-5.9.7-2.el7.noarch.rpmcddbf0a2e603acb62fcb6f5020d70139df067c74e8039d660f1ad53e1fb1ae68qt5-qtserialbus-5.9.7-1.el7.x86_64.rpm29d6fd2ec31ecc7419cda93e42643e691bcc1034d3d1655565f1d1bf4f928ad5qt5-qtserialport-examples-5.9.7-1.el7.x86_64.rpmcee8d36e5e9e6bb34d4563afadea2e91e2f0d9cf168f2d9d67c00794a1029487qt5-qtx11extras-devel-5.9.7-1.el7.x86_64.rpm9865c70b7e024a74775c7250cacd662132bd71848d7a12992b7755a47eea67bfqt5-qtscript-devel-5.9.7-1.el7.i686.rpmc17b309751f9c0e10ffcff2dff9fae87e846cafb52a629a7994bea35528721e9qt5-qttools-5.9.7-1.el7.x86_64.rpmca1e9888f650085cca8cd2448e76b105c9a663a592f150a72c55b1cf80952991qt5-qtmultimedia-examples-5.9.7-1.el7.i686.rpm1802b39844da23760f6e3a9503e2c27d66493bfb44820266955ecb32ce138d17qt5-qtmultimedia-5.9.7-1.el7.x86_64.rpm5e433526b7d314ae4e8fc9d39875b1527917f864488032bb8fb1ebb25cb37cf3qt5-qtserialport-devel-5.9.7-1.el7.x86_64.rpmd0e6eac8b961a7ce6da95adebc428a7aff56b79d3f28221468231ce2ed23c0b1qt5-qt3d-5.9.7-1.el7.i686.rpm622bad27697f5835693c8badd8c8da1aa63ac83180926007e5aaefc0d4013037qt5-qtconnectivity-5.9.7-1.el7.x86_64.rpmc15d72bd942510ca35328e5ea558c961d3d1f8ccd5e894e1caa9d5a22f6dfc24qt5-qtimageformats-doc-5.9.7-1.el7.noarch.rpmcec80015cb94b9ab2e8905baed2f8117badb0d24dbfecd4e45d9bfe3464ae328qt5-qtbase-odbc-5.9.7-2.el7.x86_64.rpm2a57e17c284ab461003772f31bfd96d122b9d2a78d2e385a03c0ba11dc2b6edeqt5-qtbase-mysql-5.9.7-2.el7.i686.rpm2ff8c920e23fca558e153f51c0cb6a033c3384e3037a73f479a2512a4cbb9ba8qt5-qtxmlpatterns-5.9.7-1.el7.i686.rpmaa14ad7f5792151c6176a0a84a4f6d44449e815a3acd0e8551621931ffd2f62eqt5-qtbase-postgresql-5.9.7-2.el7.i686.rpm7d11651119d37e3071eadc48ff82044c82aea6953371b541d9b0ec4b36609d13qt5-qtconnectivity-doc-5.9.7-1.el7.noarch.rpm2e7852b49bde000b6c7acbd250f269a6807308c7db176d634639efc00ea11cb1qt5-qttools-libs-designer-5.9.7-1.el7.x86_64.rpm66482b0fd967f4e0c5801068b556f79c9cb02c119556904f42061e7dbfda2c43qt5-qttranslations-5.9.7-1.el7.noarch.rpm46c62d89fa98d272b0505885f33b10317e1f5bcdf9ed5d9859cc1a7117a9f2baqt5-qtscript-devel-5.9.7-1.el7.x86_64.rpm4f6ae7e0f0fcf96d76aecf2d0ff9b0e736af3831a4c1b861a22d9c9cc6a286abqt5-qtserialbus-devel-5.9.7-1.el7.i686.rpm4dbcf0e0964c13928180ac90a4d421e2d957c0c4543d29fb575181eba48690dbqt5-qtsensors-examples-5.9.7-1.el7.i686.rpm5c94e368958478eafe68cd3f6f91c5ecddff6d2735ebacfb6190fb75bcf9253dqt5-qtwebsockets-5.9.7-1.el7.i686.rpmb30b2bf01bffeda4d08e2477aeea811459be19684a76f68cccb5625d1b313109qt5-qtbase-devel-5.9.7-2.el7.i686.rpm1934ffa71693ff138852c0685d8560aff4db0f72ff735792eaff4b7963b23327qt5-qtbase-gui-5.9.7-2.el7.x86_64.rpmae7e469a60db967bd584fa96f72fcceaf56218c2acb1467406c81450a11c4179qt5-qtsvg-devel-5.9.7-1.el7.x86_64.rpm5724d27be0a4907beb48b96a14715c0ef73ceee8ac4f93397216cfccbc489209qt5-qtbase-common-5.9.7-2.el7.noarch.rpmc7a59f50c8858ea91d49a0b657d24e837f6360300e6ce7974eb46010e06deabfqt5-qtserialbus-doc-5.9.7-1.el7.noarch.rpm338401e894fccab9e9b293b7efc336a83ca7c8afe0e8d88b0de6af50d3621759qt5-qtbase-devel-5.9.7-2.el7.x86_64.rpm43a44ded6a8e97bd7caf2cc2cf6da2aa700fcab7ed810b105d5a09ba8332c4c3qt5-qtx11extras-5.9.7-1.el7.i686.rpm3f9bd2022681404ddd7b12e798e53c17dfce91c0f07debdfaca4e51ae9b40287qt5-qtlocation-5.9.7-1.el7.x86_64.rpmc2c4cbdd5bc4f5ac890473d57de112edab473cb140b766cba199223721b00e43qt5-qtquickcontrols-examples-5.9.7-1.el7.x86_64.rpm47cc2b6dc703103136d49634abffbe90efcaaaedf6c8e3b26bdaf513161e5787qt5-qtserialbus-devel-5.9.7-1.el7.x86_64.rpmc760d18c75277028d4e5f76840e8ce27ce416f875a4d554633f82b0dc25893bfqt5-qtdeclarative-static-5.9.7-1.el7.i686.rpm25a5b34b17367f470fabba947cdbb56e3c8881ad81214698325f26076c7d0497qt5-qtxmlpatterns-5.9.7-1.el7.x86_64.rpm6fe7fd8ec7cf634c0ab29988f8845ea5cc67c6a2001da0a44b246be1a2d9d262qt5-qtsvg-5.9.7-1.el7.x86_64.rpm441fb0a4b698fe0acc967e704a18c3966de8bcef4ed84566a05c50bf90e1a8a1qt5-qtlocation-5.9.7-1.el7.i686.rpmd2b203f4f2ff3a5067c34021f3a37849c30a0a89a330010d12191976bcabd329qt5-qttools-static-5.9.7-1.el7.x86_64.rpm55b58ed4c8e221426b90e65a64b2f936c87854087df35e39428a394577eb65aeqt5-qtsensors-devel-5.9.7-1.el7.x86_64.rpmf4524a1285d2079633eef148bb06c4747d13361f4b257e1e3c53af4bf3e9b5cbqt5-qt3d-devel-5.9.7-1.el7.i686.rpm7088fbceb837ad24e1710bdaab95a050a1769a84ab87be8205a0943a4c2c00c4qt5-qtgraphicaleffects-5.9.7-1.el7.x86_64.rpm7ed5081e3bd7543d00f79590be1423c13d289c842d5a90c46b802de56daf6003qt5-qtwebchannel-doc-5.9.7-1.el7.noarch.rpm986a237c485a0001e7ecf4818de44fc4d8c5a73dc4d0aef1a6b57e8f4bc2f2c3qt5-qtx11extras-doc-5.9.7-1.el7.noarch.rpmc3d936cf5602154ab0d7b9d1e18e16434e4229074db82a2d853add796d3ba04aqt5-qtscript-5.9.7-1.el7.x86_64.rpm7f86e5ccd249bafd215ad9e2e6526a2c65c84bc0a786a4692ec567db3d68aaadqt5-qtcanvas3d-examples-5.9.7-1.el7.x86_64.rpmf53f554082bf23440efed1139078dbfcc7a3d0c6d4c8ab712ab38c3e3247cf9cqt5-qtconnectivity-5.9.7-1.el7.i686.rpm7b3181923a83fab33dfdad9c5bef4b507b23c593dca11903474b0347895b2508qt5-linguist-5.9.7-1.el7.x86_64.rpma555e5d9ac765386fd1cc244398eae99e6310d4bd9ea7f2661cd944ccdf8f7b7qt5-qtsensors-5.9.7-1.el7.x86_64.rpm222cf4577430eb8190ba758fca5b5979ade13b40fabf37fad5f2ba65c95470e7qt5-qtserialbus-examples-5.9.7-1.el7.x86_64.rpm820be6ef8df2621bb44aa42310c9872ee9246d990db8fe3f6adc8e1622fa5e23qt5-qtwayland-doc-5.9.7-1.el7.noarch.rpmf7c17c276b28c2b38e9b2114b0e22b54335a7406553368792ce9010478f032ceqt5-qttools-devel-5.9.7-1.el7.x86_64.rpmf6a864729a577bfa20b4ca5454956854886527f0eeaf3ce1ecd69540f749c895qt5-qtcanvas3d-doc-5.9.7-1.el7.noarch.rpm1c8a398b66274a323cb13a4df9dc76c2cf8dfa3552b1f7bd8663cde61dae1357qt5-qtdeclarative-static-5.9.7-1.el7.x86_64.rpm6090171c2eac076fd5162c398f3083625fa56b5fb40082622c7141cc79e80980qt5-qtquickcontrols2-examples-5.9.7-1.el7.x86_64.rpm3c246fe62d13d1004419fc6f21497ae2cfba5b578d10da711fd7ad89299a6ffbqt5-qtconnectivity-examples-5.9.7-1.el7.x86_64.rpmd10ba4bb75e410b8710f4b24bafd11117357b25a00c8931fe08b8d41d5d9dba4qt5-qttools-examples-5.9.7-1.el7.x86_64.rpm00629a7ed26649f683e79cd2f928ce2e8e28d78013109f901e0896333416c84bqt5-qtdeclarative-examples-5.9.7-1.el7.x86_64.rpmd301ae6b33fa805613130e818c3d24a2ba7a28c5d57bc9712d589926cb3bc09eqt5-qttools-devel-5.9.7-1.el7.i686.rpm0832f57b12b62e1477df19cffa1b6bed4944722f03570f58b6c26623b1d8d1a5qt5-qttools-libs-help-5.9.7-1.el7.i686.rpm27014b3a8b5959addf228a44accc8bbedd609c82d469d20a958b25afdcb198afqt5-qtxmlpatterns-doc-5.9.7-1.el7.noarch.rpmff051d42b731c82dd7689395af94178c4e741651624b227499d8ff9be72dbba5qt5-qttools-libs-designercomponents-5.9.7-1.el7.i686.rpm6ae08a47cffa168d53e30b63a57b5ed67e0f4267d8ca2baa9c7ffcc3fa3e3ea4qt5-qtdeclarative-devel-5.9.7-1.el7.i686.rpm9b09a9aa69371975f2a151a90450e7a7d2d651a9a3f1c154a736087a217e1338qt5-qtserialport-devel-5.9.7-1.el7.i686.rpm84f615f1b5b17af8f82d8666ebde9dc3dbe6492bff61ffdd4f950cb3f493e73fqt5-qtwebsockets-5.9.7-1.el7.x86_64.rpm61b5eff50d6e2d07c05363161d6d6073bff27279da4a19053b892bf7172def67qt5-qtbase-5.9.7-2.el7.x86_64.rpma24c6ad30164f0fb0a36ec016044a2d7749c37268d0f1c5620402f73a3e3f2c5qt5-doctools-5.9.7-1.el7.x86_64.rpm16c30added32c2136bb593cb9f9aa0e985b4a206628b87d07f5affb42c248c98qt5-qtserialport-doc-5.9.7-1.el7.noarch.rpme056080ce51741014fdc20b7ae33a32ee45ede2e3b17a9f7bc9471c57047ef37qt5-qt3d-examples-5.9.7-1.el7.x86_64.rpmc95842bc388fde5deb86dc3c6f0537c66929bd5bfa12d2fba1df40153664ab0eqt5-qtwebsockets-doc-5.9.7-1.el7.noarch.rpm82d498ac0842998280a82d7bd4a96b7c676596b87079495bf80795cdfdcbffa4qt5-qtmultimedia-devel-5.9.7-1.el7.i686.rpm14ff83cb6c7d6c28623b404a69927491f6ea6d199eebc106eb53cd519ff15db0qt5-qtsvg-5.9.7-1.el7.i686.rpma1fadc9d7d88ab5f2fb822c934c000ccb72d2f8d526da13a49da91e5dcc6a2bbqt5-qt3d-devel-5.9.7-1.el7.x86_64.rpm0f5658a5caaa96b8bf7a03c464eac9931655c670e068ccbfcc12db4166b9f96bqt5-qtquickcontrols-5.9.7-1.el7.x86_64.rpm688604e813d93a29785e4f454f847d5d8a793333445c6abf70f2e8f73c8b432fqt5-qtsensors-examples-5.9.7-1.el7.x86_64.rpm10ac5cfb99f28868e7839e06531cd067fb61c5dfd656cd5db8b8f1af1ee15221qt5-qtbase-static-5.9.7-2.el7.i686.rpm597607bd478df57af12ef119960a955d6ce9882da0699f8beaba83957a90349dqt5-qtbase-examples-5.9.7-2.el7.x86_64.rpma25a5220ee9637359439582a438f1286041a0d5dcd3c7a52c72f503fb3d2f2ccqt5-qtxmlpatterns-examples-5.9.7-1.el7.x86_64.rpm485eb94b84c0775f08f59fb7f6f6bf9a9ba6ba5bd2f3c936f0a5eaea89e7bf9bqt5-qtgraphicaleffects-doc-5.9.7-1.el7.noarch.rpm32fad95c365861c5452df4e2e3caee0e8a3212abb917a4fa4cd3376df298ed93qt5-qtsvg-examples-5.9.7-1.el7.x86_64.rpmb09f14eaec9152a99835dc7eb9d1631b159b78516587fe4247dfd2cc0d27e336qt5-qttools-libs-designer-5.9.7-1.el7.i686.rpma8457673837e6ccae99d1846037ee88edce183b368707b7e870061de02f1b854SLSA-2019:2136-1Libssh2The following packages have been upgraded to a later upstream version: libssh2 (1.8.0). Security Fix(es): * libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read (CVE-2019-3858) * libssh2: Out-of-bounds reads with specially crafted SSH packets (CVE-2019-3861)moderateScientific LinuxScientific Linux 7libssh2-devel-1.8.0-3.el7.x86_64.rpm6d94121c0103d571eef4da43d6d9dea23d6e86afeb032b803b696d5f869206cdlibssh2-1.8.0-3.el7.x86_64.rpma9ecfcc252676e16e0ff42b631a4d75aa19459ed0ff38d27dd8602e225fdb1dalibssh2-devel-1.8.0-3.el7.i686.rpm3e204ddbe1fb56aa52bcc1aba2f232bb4345208e11f5f68e323c1a99071f002clibssh2-1.8.0-3.el7.i686.rpm23107e0287d7035121fed766677292739b521b18f44c2dc3e0f59f7bcbe85a1dlibssh2-docs-1.8.0-3.el7.noarch.rpmdcb0775c5f82b23c88445f06b1d094b0cdcf6428796a02df443dbd0867068afcSLSA-2019:2137-1Keycloak-Httpd-Client-InstallSecurity Fix(es): * keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py (CVE-2017-15111) * keycloak-httpd-client-install: unsafe use of -p/--admin-password on command line (CVE-2017-15112)lowScientific LinuxScientific Linux 7python2-keycloak-httpd-client-install-0.8-1.el7.noarch.rpm82ad5aa0e83d6dcc902c4c88a5b244783cb126217831aeeceaefcd2ca55f3b8ekeycloak-httpd-client-install-0.8-1.el7.noarch.rpm51002e27d278f90359a2c58415293935c31b183aee693f295d6cd90480206b52SLSA-2019:2141-1Kde-WorkspaceSecurity Fix(es): * kde-workspace: Missing sanitization of notifications allows to leak client IP address via IMG element (CVE-2018-6790)lowScientific LinuxScientific Linux 7libkworkspace-4.11.19-13.el7.x86_64.rpme5acae8c05cb2469856efaee2fff457aad9ef0478d807259ec11872a7d3cb821kde-settings-19-23.9.el7.noarch.rpmdb52778332ef52245665115de3884cb57f0ae999b23abbe1322969454528a2edkde-settings-pulseaudio-19-23.9.el7.noarch.rpm960d26a0d1547505bfe7a7198ef3b157fc14bca0a49749ec878021a8e131f29bksysguardd-4.11.19-13.el7.x86_64.rpm3b67687f188674983ba506130de0579f50a5b8aee3d7bce499cd288d0ea44c95kinfocenter-4.11.19-13.el7.x86_64.rpmf7d8da3efa52d147819737f595c2f23230b2b193a21e27c1ce9f56e5d187d99bkhotkeys-4.11.19-13.el7.x86_64.rpm59e735418cf2dd64a7b3cfb8f26d732459cc35142057d50a5b1fe2639c9fdd38libkworkspace-4.11.19-13.el7.i686.rpm05955900e945defab673e81c1868397ef7a58d6ea2bb1667f7995c1bc45687fbkdelibs-devel-4.14.8-10.el7.x86_64.rpm237fcf540b5d2caa815d384a05a81c4c8117542397139e109a5aaaa96870fa06kcm_colors-4.11.19-13.el7.x86_64.rpm2eddff740ce84692c943edaac9591af1a41ddec57918929ba2d490fec69c3ccakmenuedit-4.11.19-13.el7.x86_64.rpm5261cb9edaba0899e93ea2bcf8eab511651fb0e27b4b67d894792bb0ebd1ab31kde-workspace-devel-4.11.19-13.el7.x86_64.rpma27814f357216aa6e4968b7d66f4a7dfbf417775acc44f50755bf9e3a3f6a7ffplasma-scriptengine-python-4.11.19-13.el7.x86_64.rpm1cf15b53c2e7934b2b4df41702d49c739605007ea6e0c6eb955606ef82748883kde-workspace-devel-4.11.19-13.el7.i686.rpm5941575a985a489724938b0cea25bbde258622297af1822d07de8d57c9d7941ekde-workspace-ksplash-themes-4.11.19-13.el7.noarch.rpm47c1dbe94d975538a75327511c943b789f19352fbb570fcf99c53f1f7f49eef1kwin-libs-4.11.19-13.el7.x86_64.rpm4f2a52b368a86b28ae388b1a065cf8c0522fe5f69374c935aab14c2750ed6bcekdelibs-4.14.8-10.el7.i686.rpm618ad8e45950e483d7b506c16c20d1058c0541a24c55e019697b7f1d0a87e3a2kmag-4.10.5-4.el7.x86_64.rpm81467d39e4fa1f3b3f405ff79547b7feec7a392082939707dc8d1a9b6b8d1881kde-settings-minimal-19-23.9.el7.noarch.rpm94dbe0ed97b50196ae27ff21da066112201f224fbe21084260acb0e822f8ab5dvirtuoso-opensource-6.1.6-7.el7.x86_64.rpmcd108e7b4f0a8d9fef122a588f9d1ed7ed8b27a5acb57095d695ecc8afb4434fkde-settings-ksplash-19-23.9.el7.noarch.rpm469126160a647135bef42c2323f258ec16d5a20a745933492500182d5bdb9596kde-style-oxygen-4.11.19-13.el7.x86_64.rpmd244beb32997a14e6d4412dd203c2a2680d14aeddc67466e8a8c4293d63c3604kdelibs-ktexteditor-4.14.8-10.el7.i686.rpm3de74bcab91626b4b1a865167440b5aae92b5f2d929a5d42d4b20892f0028bbcvirtuoso-opensource-utils-6.1.6-7.el7.x86_64.rpm94558b5102e358ca477d0a1fe7d0efd822782a0f0fcdc121cc048676a94606dcksysguard-libs-4.11.19-13.el7.i686.rpm8bbccfca7abed3e1fcce9ae0aaeaf55d9d1544f779a0a23a1f505f5f63a82939kdelibs-ktexteditor-4.14.8-10.el7.x86_64.rpm2c03843cda651628d174ab0cc705de1f14be8a014be21fde008b2f868174869fkde-settings-plasma-19-23.9.el7.noarch.rpm13757123ed49bc24b9301467cc076d07ebfacc14f5616635c611574f6c8d0df9kwin-gles-libs-4.11.19-13.el7.i686.rpm95a3073616f1446403162770dd6eb4327f046e36cdbc05a067de5653162fb9baksysguard-libs-4.11.19-13.el7.x86_64.rpm70b1b00f16fefebc81d41db17ffe4210010a002eaa2a4bb458c74552a94d60f1ksysguard-4.11.19-13.el7.x86_64.rpm4caea1f9485f665804f6ac52ade15111d7ba2a70c25da023e2b978dd434da680kdelibs-devel-4.14.8-10.el7.i686.rpmbc4b018ab60badb8cf37419aced770a35dd0e95d61031895c23099765bf375c4kdeclassic-cursor-theme-4.11.19-13.el7.noarch.rpmbf70ad86f2c1789e6c84072ffad1846da654db06c6863dfb7f7fe68a6fcec0b3plasma-scriptengine-ruby-4.11.19-13.el7.x86_64.rpm2775ac37df99e333a4057ff995fc54970be80959243be8cccdeff29a3b8b83f3kwin-4.11.19-13.el7.x86_64.rpma23be23d8577bd5230c8ef417d5c8b7838b97534a77e2bd56e42f86c5cb4acf4kde-workspace-libs-4.11.19-13.el7.x86_64.rpm5871bc039e1157bed8332f7f5f669926bd99a070e72d6b8d0702eb608c293b8dkwin-libs-4.11.19-13.el7.i686.rpm8ac6b6be8b2a51a2d6b2ce09f787b3e8c25012d0652d2c990d93e83d1f7381f8kwin-gles-4.11.19-13.el7.x86_64.rpm8c009042e8952fa28424329b1213560b13a5a801323baff6bc73f5ac47706088oxygen-cursor-themes-4.11.19-13.el7.noarch.rpmb8635675befb9260a0db65e4b2cf529854106f37a635aecb1776ee1012e988d0kgreeter-plugins-4.11.19-13.el7.x86_64.rpmde0c5d9f051d4b4007f309d96dee4e89e09fd929cfc466a1d449e56137801f0fkde-workspace-4.11.19-13.el7.x86_64.rpm89e0b8e2766d40a0e3b0144ad4b83be530e4f3f78e35aacb8cadeaf56dcd4651kwin-gles-libs-4.11.19-13.el7.x86_64.rpmb2f581a57adefe8586e1a5052fd14a26ed3f3ed80deb1d3e3c025d8e4e347125kde-workspace-libs-4.11.19-13.el7.i686.rpmb03a574058bbe7888ca3b0bcb18e5403a1c50387b6c8c4cf38a33a5e8cadee46kdelibs-apidocs-4.14.8-10.el7.noarch.rpm8a9f3b2f0b8041f2ad538f35a3079356954f5aacdd119f1d3617250011c5db75qt-settings-19-23.9.el7.noarch.rpma614df3e97398e5752c3afb31858b00b51b98df0ef3a66e9964d8f077fc7fa86khotkeys-libs-4.11.19-13.el7.x86_64.rpmcab6338479ead61bc41c2ddcb84ef8695eb913c59f52e3926ce05f830d5ba2aekde-style-oxygen-4.11.19-13.el7.i686.rpm2f79e2360c03928e20998b6dd3db53b0479eafde609c3af819a0194f0040eae6khotkeys-libs-4.11.19-13.el7.i686.rpm032f739a1b24c8f8d1fa2f4a4e6c0747b87a64de4b23ad61f9a4a64a4c66e861kdelibs-4.14.8-10.el7.x86_64.rpm25cf28e9cd8b51fd64238d684a58485d35b66ff1be5c2b8747fec04a2c53ee06kdelibs-common-4.14.8-10.el7.x86_64.rpm3f5274b0111bc32b23dacf5b93e24a165ade4c5b36f9190265f2c45fd090b31bSLSA-2019:2143-1OpensshSecurity Fix(es): * openssh: User enumeration via malformed packets in authentication requests (CVE-2018-15473)lowScientific LinuxScientific Linux 7openssh-7.4p1-21.el7.x86_64.rpme427038224b39894087d00c6966d2f77b7ff3b729c581e652124b61d8bd7a4d6openssh-server-7.4p1-21.el7.x86_64.rpm2b8361a9434ee5f0e89c72e57924df7757fc61ce7c9aa5a83a9f3d323b5cfad0openssh-ldap-7.4p1-21.el7.x86_64.rpm52488e9d113f207b4ffa25e3e5bd902b92bef8bfd2a125d65c02375ba8d4d26cpam_ssh_agent_auth-0.10.3-2.21.el7.x86_64.rpm1c3dd63661d5c10b28fe3078edc3603c151ccda85e877bcf02b495b79ec79daeopenssh-clients-7.4p1-21.el7.x86_64.rpmd81c1e0fae411968ee7cc0643000f5307782058154ce123135e74a13da9c7ce1openssh-keycat-7.4p1-21.el7.x86_64.rpmf233a5aa174371c7ce61f80f034cb874af70cae43d7dc0ec00f5df769ce7b2a8pam_ssh_agent_auth-0.10.3-2.21.el7.i686.rpmd93795d096e593240b86221ad5e272e463ec525f01ed92c53dd0883cc6a73a88openssh-askpass-7.4p1-21.el7.x86_64.rpm7cca2c139407f9f62cae44acb305dfd6413ec86ee5b37348e48a53c1a08bb502openssh-server-sysvinit-7.4p1-21.el7.x86_64.rpm5d409c02055b2fdaa756acbcd0d8da1dff60aa747725057892f38ed6db242613openssh-cavs-7.4p1-21.el7.x86_64.rpm151938ecf48e4be538ecbe770f1c141c925dd9a6429c332a79f0e56f724a5ab7SLSA-2019:2145-1GvfsSecurity Fix(es): * gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password (CVE-2019-3827)moderateScientific LinuxScientific Linux 7gvfs-mtp-1.36.2-3.el7.x86_64.rpm9546dc42ff20344a9d3c5810250f8a1fc3442df5ffec88cfac3e8db8ef6e20afgvfs-smb-1.36.2-3.el7.x86_64.rpmf77684f83ec2c10e0e6287afcd42ed147c8d3fdb16ed77f545bf1a77a114533cgvfs-afp-1.36.2-3.el7.x86_64.rpm49700d11bb00674c78912692a2715b6bf9e136f82a5eac8aaa2d2bc15a7876f9gvfs-1.36.2-3.el7.i686.rpm479486d976c4e82f012c0edc858256393130c06c48191d1969285e586b6fe94dgvfs-devel-1.36.2-3.el7.x86_64.rpm3eb6dad7a391cbe1dcafbf205686a50555a71a26d39d36cf4a410dc268ef4bcfgvfs-client-1.36.2-3.el7.x86_64.rpmb3c77d044e087efb74870ec65d017cc17db8c1fe985286bb5b26b35bdca69125gvfs-gphoto2-1.36.2-3.el7.x86_64.rpm6d215e6e725b4a90fd3ec35d5292904e27b8a6dce1a4b4900111e8b9b2cc0666gvfs-1.36.2-3.el7.x86_64.rpm13f31748e59249c2ffffee8632802db7dadc8f8405a31f4bbb20457a39bc0086gvfs-devel-1.36.2-3.el7.i686.rpm4432e56a9cbe48fd370b4a3c288ce0b52273b018a685eccfa4f38bd73e8ab034gvfs-client-1.36.2-3.el7.i686.rpma8b252b84e278b68773e7ffe5bcd309c5faf587901b3a7f350b2fea2915a5da7gvfs-afc-1.36.2-3.el7.x86_64.rpm13ddd76fef29b2e31a993dd12e0871e48e2331fe73f5f45e6964408d82c0e6afgvfs-tests-1.36.2-3.el7.x86_64.rpm5506cce40692d41d463c2afc225ef4c39c8b4b650026413264c3f57f5067b827gvfs-goa-1.36.2-3.el7.x86_64.rpm75c2cec84e9037d8ce82a540a844aefa578b529f2946198961a489fe0852b56fgvfs-fuse-1.36.2-3.el7.x86_64.rpmab66732c6e0fa050d6e8b89f0e1ba67f1d439616434b23f536661f8b47699707gvfs-archive-1.36.2-3.el7.x86_64.rpm8c49e288984cab70c2eaad07dfd1fd99a2c63637b32a58ccbb07039baf776666SLSA-2019:2154-1OpenscThe following packages have been upgraded to a later upstream version: opensc (0.19.0). Security Fix(es): * opensc: Buffer overflows handling responses from Muscle Cards in card- muscle.c:muscle_list_files() (CVE-2018-16391) * opensc: Buffer overflows handling responses from TCOS Cards in card- tcos.c:tcos_select_file() (CVE-2018-16392) * opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len() (CVE-2018-16393) * opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str() (CVE-2018-16418) * opensc: Buffer overflow handling responses from Cryptoflex cards in cryptoflex-tool.c:read_public_key() (CVE-2018-16419) * opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response() (CVE-2018-16420) * opensc: Buffer overflows handling responses from CAC Cards in card- cac.c:cac_get_serial_nr_from_CUID() (CVE-2018-16421) * opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init() (CVE-2018-16422) * opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr() (CVE-2018-16423) * opensc: Out of bounds reads handling responses from smartcards (CVE-2018-16427) * opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file() (CVE-2018-16426)moderateScientific LinuxScientific Linux 7opensc-0.19.0-3.el7.x86_64.rpm93a0e753b95c345df793d57cb2d55333df6d66ade5a1afc7ed5553d5b531b279opensc-0.19.0-3.el7.i686.rpm4dd5b2e34f970043f6cc87da460f4a132a2dec5eedd0acdd2666d95c643cce04SLSA-2019:2157-1Freerdp And VinagreThe vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. The following packages have been upgraded to a later upstream version: freerdp (2.0.0). Security Fix(es): * freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)lowScientific LinuxScientific Linux 7vinagre-3.22.0-12.el7.i686.rpm558b3cf0c619417434f88dc42847303ed4438b2ee9d47a669e9cd6f4eb27a4f5freerdp-devel-2.0.0-1.rc4.el7.i686.rpmdbc731671dd96f884ed646524030ed4624d67f55737ceb077e7af6f47a9ca60alibwinpr-devel-2.0.0-1.rc4.el7.x86_64.rpm81bead18205364de3c76ecb92c7200ab6ec98f5e9526a47e57a3ba5362d0afaefreerdp-libs-2.0.0-1.rc4.el7.x86_64.rpm404485a3c405a1393abe5b832ae5f7d5a34b1553e24d3c252ae3cd96af7c11d4freerdp-devel-2.0.0-1.rc4.el7.x86_64.rpm5e7dbbda4176d39b07d667ebafc411aeb790effa61fd173574a251cfb92e6972libwinpr-devel-2.0.0-1.rc4.el7.i686.rpmaf91fdf08aa80d3ab366b4e77077567a3b9c9d3889f6f15431e5660f8872aeeelibwinpr-2.0.0-1.rc4.el7.x86_64.rpm003ee7f09bb739a3719a71751eb0186600a875f4d67ff672f38a344eb572feedvinagre-3.22.0-12.el7.x86_64.rpm795fbb77a21737d404bbd2730b4c80b9a8f328349050ce52b18c19be8273e913freerdp-2.0.0-1.rc4.el7.x86_64.rpm081a81b6a78262fe7b216b1212eb38a3149f7a4e706c8c07a28e139d73556df3libwinpr-2.0.0-1.rc4.el7.i686.rpm337652bd0852c1cc96d11d75491c4e0c199188602448e6772722964f57187494freerdp-libs-2.0.0-1.rc4.el7.i686.rpmf0c42e5774329f88c823b3fa459aede050a4c80535cc77004c303156a3447e25SLSA-2019:2159-1UnzipSecurity Fix(es): * unzip: Buffer overflow in list.c resulting in a denial of service (CVE-2018-18384)lowScientific LinuxScientific Linux 7unzip-6.0-20.el7.x86_64.rpmf3d4a89a956bc341c528d7f064da771d1bf0c6406ed9e8d9b364ec3c71329355SLSA-2019:2162-1BlktraceSecurity Fix(es): * blktrace: buffer overflow in the dev_map_read function in btt/devmap.c (CVE-2018-10689)lowScientific LinuxScientific Linux 7blktrace-1.0.5-9.el7.x86_64.rpmbe81d8e4a095fcc4c87787a898a1fba4dd8afb6496ee1430695fd4274d7d4c53SLSA-2019:2169-1Linux-FirmwareSecurity Fix(es): * kernel: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange (CVE-2018-5383)importantScientific LinuxtrueScientific Linux 7iwl2030-firmware-18.168.6.1-72.el7.noarch.rpm5b18d972510fdf9f94f9ea5e5cb804a56509271dbc23b8e5a91fdbb6fb208120iwl135-firmware-18.168.6.1-72.el7.noarch.rpm43d6c48540cc9c8e917dde2fb8e23266c1172a1cbf0feec8353f0ee94f370542iwl4965-firmware-228.61.2.24-72.el7.noarch.rpm5243e5201c96448beb7bae63abf1be584edfd98d58c1d54466a051a0f4dc5593iwl3160-firmware-22.0.7.0-72.el7.noarch.rpm9b14a898d58c7d8bd550baa5782816f7adbb97115e2ef7dd0f9f7e834f20417biwl7265-firmware-22.0.7.0-72.el7.noarch.rpm60ae7c0c429a560243ff047847067446df8a9759c24a397b859593f7752bd851iwl3945-firmware-15.32.2.9-72.el7.noarch.rpm70be41dac087d7416959c5e3241159c960e59026053f3919055187cfac8821a3iwl7260-firmware-22.0.7.0-72.el7.noarch.rpm331bb8d1bd194dc53ade0f993fa86faa716f0c275027fd7b2427c1515ad6d193iwl6000g2a-firmware-17.168.5.3-72.el7.noarch.rpme96cd2773f9ec06f457fc37d2cbaa4e61282060a69788a85d6c2e95218b99c0fiwl6000-firmware-9.221.4.1-72.el7.noarch.rpme53bf45f0422f5ffede6431bfea4ad7d6c77ec2aff1dd748892f7aeb3e229149iwl2000-firmware-18.168.6.1-72.el7.noarch.rpm919b26331adaa4ab21a99f6b94b9aa28e17872f6d4ab884c10ce403ceb76b760iwl1000-firmware-39.31.5.1-72.el7.noarch.rpm00b2cfe9c9dc60d6fe742433501c272e42a1b2a4278233553cc29a6405ca1287linux-firmware-20190429-72.gitddde598.el7.noarch.rpm1c9f36285117e6639365f9de2363365fd2d8d930c4c1c04e71198a507e897798iwl5000-firmware-8.83.5.1_1-72.el7.noarch.rpm75972082bd982c590759c3000776b72ef4e3dea2031ab8c678864e1b88f86377iwl105-firmware-18.168.6.1-72.el7.noarch.rpmd5b7be32de7144f85f9565e45674ea36df2d8f802803f06c56c2679a14f4185aiwl100-firmware-39.31.5.1-72.el7.noarch.rpma804828ae01930099e12f476540a420a2e8fa0187e523b807dc7f7d7a3e3c164iwl6000g2b-firmware-17.168.5.2-72.el7.noarch.rpm195b7d77e4899d62a097f698c2efc6e9447eef4ea1008322a5f4841b2efe86feiwl6050-firmware-41.28.5.1-72.el7.noarch.rpmf8ebd2e82e1790efa33ea2e48375a63a56c2934ed34cc91eb40e02c585c06febiwl5150-firmware-8.24.2.2-72.el7.noarch.rpmd9585771e78955802c159825bda08bf60fec22cf18511023e81c48ce8930aa6bSLSA-2019:2177-1SssdThe following packages have been upgraded to a later upstream version: sssd (1.16.4). Security Fix(es): * sssd: fallback_homedir returns '/' for empty home directories in passwd file (CVE-2019-3811) * sssd: improper implementation of GPOs due to too restrictive permissions (CVE-2018-16838)moderateScientific LinuxScientific Linux 7sssd-polkit-rules-1.16.4-21.el7.x86_64.rpm25c6faa267fe14c7ecde40fcaafebaea2a00d7ab6bd8cab0a518ef3f4286fa45sssd-proxy-1.16.4-21.el7.x86_64.rpm5fef42ae0361a37b158d7e03805c1faaef56762863223c01a92f1899265150c0libsss_certmap-devel-1.16.4-21.el7.i686.rpm93306e7a9df2e31a7bdbb67c02b582899632d2f4172bc66de0dab7222a934fa9libsss_nss_idmap-devel-1.16.4-21.el7.x86_64.rpm0f561505d8fc74b731efd49d3df05f264a616d04c48693b8a785ffc9bca09cdblibsss_nss_idmap-devel-1.16.4-21.el7.i686.rpm4a6e73e2e41cbd191655b4067fcde2db9973d1712852f7283799a38eac3eaf20libsss_idmap-devel-1.16.4-21.el7.x86_64.rpm1ee3e735bfec09f8c3a93674cc98efb94695ab8ff5c24f5e06be3018d752940dlibsss_certmap-devel-1.16.4-21.el7.x86_64.rpm3698196727d6a4785a08c72b593b97123361f47c8b0afa61b7cd92721c498ce3libsss_certmap-1.16.4-21.el7.x86_64.rpmcdad6f6e440805980254d09764e6de0c1e200bcaa2577b48323f882fc536fa09libipa_hbac-devel-1.16.4-21.el7.i686.rpma3aa82c5f14e90e0e0498b742c47af09ed04f54ba3f0e56bd35f25501ca87c0csssd-1.16.4-21.el7.x86_64.rpm15fcded7444bce08443cc157a387380e5e288155215fc05fe0948f7358eb5f9asssd-ipa-1.16.4-21.el7.x86_64.rpm5c2a0902b40412691818983eb6bacf794e782c876b83536a60e6c871aaf12b9blibipa_hbac-1.16.4-21.el7.x86_64.rpm27c9a1fbe06053b4d42549502c11e8f8474be3a3c3cc9aea56c3017f883f6dfcsssd-client-1.16.4-21.el7.x86_64.rpmffd79fc44f062efde47ad3d23457062b8cf683cb944d90a7c9e5d3627bb9fef5libsss_sudo-1.16.4-21.el7.x86_64.rpmc67c6d27920b36caa413e2908e97b75314351c7ba148cc42b72f0463303eaec9sssd-dbus-1.16.4-21.el7.x86_64.rpm87aa2cb4ccda61001c05800923feb0196045cc196f118c152709f05ec1525b13python-sssdconfig-1.16.4-21.el7.noarch.rpm54f965a0503ccab3c558c1c4d50fb2f6ef95692bc6c2aa334a31855b4bfaaa0elibsss_idmap-1.16.4-21.el7.i686.rpm8e4f08523cf4a373f69d06a266301c1ba1a0eb2e6d7756ab6e3ddf2579e29035libsss_nss_idmap-1.16.4-21.el7.i686.rpm721a911c8960b7849e629cbdfbb56f01dcef5d05e6ea4670b8d4815d69d0a6fblibsss_simpleifp-devel-1.16.4-21.el7.i686.rpm2e6f41bfe745e2dd97eaac14d99430089e945473f355567ba8bf1625788c7a36libsss_autofs-1.16.4-21.el7.x86_64.rpm6913ea836b1366888798fdf2e75daeb7a2311f497951245469a638137841e949libsss_idmap-1.16.4-21.el7.x86_64.rpm5dca16fa549eccfba77ad0ff079cb3d6ab2be44227e38aa7b833b70d7d2b2527libsss_certmap-1.16.4-21.el7.i686.rpm934295c20ff242018ee09b5d51ffe95c62bb0d6aeb80bdac82af9411e63cf6b6libipa_hbac-1.16.4-21.el7.i686.rpm21f8bd29c49398a5f3b8cda6d5e9b7ee446d28d7ec0942ba047be9616d743bd5sssd-client-1.16.4-21.el7.i686.rpmca1edb2e0706dbc57c82951405cf206708f48a17f267e8dfb0c233c5a20d9f72libsss_simpleifp-1.16.4-21.el7.x86_64.rpm2e1f87b69ea9991453fe3df1a3a8426cee9a3c15d27940951e4e4f61ae6b8d64libsss_idmap-devel-1.16.4-21.el7.i686.rpm234aa1bd5ed29f907f3df9a985ae5150e1f50bfed33f25026d4a390c76d0ac89sssd-libwbclient-devel-1.16.4-21.el7.x86_64.rpm422e2540c461f8d3981305d3d62bf261cfbe7b947ba7036dfcf5c68c4cad828asssd-krb5-common-1.16.4-21.el7.x86_64.rpmc09e70ce8d3a8d8e6f5daf9935ab6b538cd87f221ed55994c7f64cf89ca9566bpython-sss-1.16.4-21.el7.x86_64.rpm6d2c4249b14cf5b4bc1029960cbf02c3cdef69c793aa9c1a34be837eacaedb54sssd-krb5-1.16.4-21.el7.x86_64.rpm563b406e42a62bf19f57091536dd2442ca655870b4a5bd6b124d52abda28d1dbsssd-common-1.16.4-21.el7.x86_64.rpmedce2b5c409af1535155d46766d8f26025e49aa4aeada37e9c00c736f5c32260python-libipa_hbac-1.16.4-21.el7.x86_64.rpme64a40026d7316dcba68f6b683787ffe700250af14054a5349ee18eed3a1f47bsssd-common-pac-1.16.4-21.el7.x86_64.rpm4d85ced2f6770354df7be9d41b5bfc345a1ce21247a6806ff548e288b372e0e6sssd-winbind-idmap-1.16.4-21.el7.x86_64.rpm240c62805c74d3916edf2a6e6b0b78aad81fb9274e45f9a30bb5900119a2a683sssd-ad-1.16.4-21.el7.x86_64.rpm0ef260b336080dd9b55c5f48e6fa565ab6104260b74a77a10b0c52961dafe509libsss_simpleifp-1.16.4-21.el7.i686.rpmb4051d37b1c16b63c628abfbdba0df3b23d6dc501279792aedc42aa29d4fc9fesssd-tools-1.16.4-21.el7.x86_64.rpm60209f3e02fb70b45c5f590dbca8d88ed0526f540c71d689ad10bfa7fb16a716sssd-libwbclient-devel-1.16.4-21.el7.i686.rpm8cd66da996986184b741e5e625f1ff391471706416040629afacb3655f84312fpython-libsss_nss_idmap-1.16.4-21.el7.x86_64.rpm51fdd7f9716d7b96efab4687a195bc633540d7444ec3a48102fa7ea029f2d235sssd-libwbclient-1.16.4-21.el7.x86_64.rpm9dfad753a409df6d2e2504d6f32da49756d74e961aea7b4162d8150ad493ff4clibipa_hbac-devel-1.16.4-21.el7.x86_64.rpm11f0a6b994be43b40a4608b2680bce027d5d21e469770e40df634f20e8209dd9sssd-ldap-1.16.4-21.el7.x86_64.rpme2145c276e0871cf7bb6d0e45c036eb77327389d7589c4719abb3e3d74fbb160python-sss-murmur-1.16.4-21.el7.x86_64.rpme622affbebee15c3e37ac63ce7981c2ced45e0bddb85f4fc8bf30bca40b288e8libsss_simpleifp-devel-1.16.4-21.el7.x86_64.rpm77a7aeafb66c7de4585c98183c960be777a68b125832ee6bf8fc3604dd008979sssd-kcm-1.16.4-21.el7.x86_64.rpm7512db1643fac76189a0decf405348851af9dce04dd9ba21baaa789f2928cef1libsss_nss_idmap-1.16.4-21.el7.x86_64.rpm673996d00a59add58c5ae648c1c64322696d115e21a5b1a5a058289f2455d562SLSA-2019:2178-1Udisks2Security Fix(es): * udisks: Format string vulnerability in udisks_log in udiskslogging.c (CVE-2018-17336)moderateScientific LinuxScientific Linux 7udisks2-lvm2-2.7.3-9.el7.x86_64.rpm2c2f64a68ab09e18bda038c2294d285927e0393d38043e1497d467847424026budisks2-2.7.3-9.el7.x86_64.rpm9099ee1dc754900e4b5c2b93b7a30d0dfd21f7de59ff88eb9230116d8a4e5326libudisks2-devel-2.7.3-9.el7.x86_64.rpm6acf30af273f190b9843721949c1eff0a429b2ba8adbb57307794d8dea682a77udisks2-lsm-2.7.3-9.el7.x86_64.rpm026261e258efa4f334b530b2caf600d6677dd4babe729f3e87127b4d92875b4eudisks2-iscsi-2.7.3-9.el7.x86_64.rpmc80474df53b0a481bd1ce080cda220a9b0b0e9698699422ac780c199b65a1460libudisks2-devel-2.7.3-9.el7.i686.rpm5fed46879d7a498128575616cb45ee4ea9da3c1c4ec77b58a95962688efe1947libudisks2-2.7.3-9.el7.i686.rpm47fee8b93cd2a17707cb3878a45ee63a4067667b5563b8811d2c179af93c562blibudisks2-2.7.3-9.el7.x86_64.rpm39ee5aa547850d13ca3ad0bba3a4ade65a43a379d0121810799ae6ba01f90520SLSA-2019:2181-1CurlSecurity Fix(es): * curl: Heap-based buffer over-read in the curl tool warning formatting (CVE-2018-16842)lowScientific LinuxScientific Linux 7curl-7.29.0-54.el7.x86_64.rpmeba04f278b4e6b3063e6872f04f134c6c7c4d5bb4e20dc361a0d0f1b84d593dblibcurl-devel-7.29.0-54.el7.i686.rpm93b8ab80da1a536a9812786c912eb9a2962eab0656ad9f0a572a8fe5f3789b23libcurl-7.29.0-54.el7.x86_64.rpmfa683a257866522bc5f029fbd8bf0b19b3feacb0091d6673735c53c55f4dd14alibcurl-7.29.0-54.el7.i686.rpm20267e94fb8a5c723daf193e2a426feab9bbf7ec710a1c23bc1a99a3226106d7libcurl-devel-7.29.0-54.el7.x86_64.rpm2b3acef1c65037fac0beb8fb076d479a2a9ac8800cd9f5343b42220a3834da70SLSA-2019:2189-1Procps-NgSecurity Fix(es): * procps-ng, procps: Local privilege escalation in top (CVE-2018-1122)moderateScientific LinuxScientific Linux 7procps-ng-3.3.10-26.el7.x86_64.rpm876f9050e44129dac4efa03e3e48a0c11b460d7c3fcfb204b7a6ce2ad632297eprocps-ng-i18n-3.3.10-26.el7.x86_64.rpm3374a9e82d434cc84350c7c80cafd06dab78335c7ef160b675f902b7fdfb71e1procps-ng-devel-3.3.10-26.el7.x86_64.rpm014f5cc26127c9f075ce066168010133bbf03326d4c793a037831d47690835a4procps-ng-3.3.10-26.el7.i686.rpmc6a8e6d442666a657018a1ff611c9f664858c357ac03a984e12e4f777f87607cprocps-ng-devel-3.3.10-26.el7.i686.rpm371c579d6b29ddc191149d79f615b69d0cdd9638ebfdc836206a2675b153a640SLSA-2019:2196-1ZziplibSecurity Fix(es): * zziplib: Bus error caused by loading of a misaligned address inzzip/zip.c (CVE-2018-6541) * zziplib: Memory leak triggered in the function __zzip_parse_root_directory in zip.c (CVE-2018-16548)lowScientific LinuxScientific Linux 7zziplib-0.13.62-11.el7.i686.rpm977e14c37a992d871a2cf119601c300c1a8fac7e4c5840e64fbc2c5931503df2zziplib-0.13.62-11.el7.x86_64.rpmd3324d50a0df992e625199e127bb7e791e27105d32bcc136fa458409c59b579ezziplib-devel-0.13.62-11.el7.x86_64.rpme851e0b0bc58416f41b3a33e02ad891dcbe1e964f2ae3bda53ea88605feb6613zziplib-utils-0.13.62-11.el7.x86_64.rpmde62ace322bf8c575626c21ab1fc8afcb64dc50b3d5a89100c05d5d40dcd6799zziplib-devel-0.13.62-11.el7.i686.rpm8008989b12129a125ce2f3e8b47eae0414ad4d617bbe3d7d29b7a7b2762a1fb3SLSA-2019:2197-1ElfutilsThe following packages have been upgraded to a later upstream version: elfutils (0.176). Security Fix(es): * elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file (CVE-2018-16062) * elfutils: Double-free due to double decompression of sections in crafted ELF causes crash (CVE-2018-16402) * elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash (CVE-2018-16403) * elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl (CVE-2018-18310) * elfutils: eu-size cannot handle recursive ar files (CVE-2018-18520) * elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c (CVE-2018-18521) * elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw (CVE-2019-7149) * elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c (CVE-2019-7150) * elfutils: Out of bound write in elf_cvt_note in libelf/note_xlate.h (CVE-2019-7664) * elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c (CVE-2019-7665)lowScientific LinuxScientific Linux 7elfutils-libs-0.176-2.el7.i686.rpm1c58fb5f2d15a8ab28ff74ad37f524ae14bc78ef4697205c6c6a66b6160dbe9delfutils-libelf-devel-static-0.176-2.el7.x86_64.rpm154ba76a017a045028509260fe689b706460df8453613efc0eba26ee135804f8elfutils-devel-static-0.176-2.el7.x86_64.rpmeabd22e44d35ec6c1d9589d82f358040f5ce451127dca0f0f04dda0a4c13df0belfutils-libelf-devel-0.176-2.el7.i686.rpmdfbee40e24223f5153725d56226ee26c586c5c8cfcd2606f8272f49f5558492delfutils-default-yama-scope-0.176-2.el7.noarch.rpm012f95e89b352215a93a3f2e021cbbc5242b1bb6984328e5252d0fa4bd8d64d3elfutils-libelf-devel-0.176-2.el7.x86_64.rpm57e2023dfff8636deb25ca44b6696e758e3f921e718c7b6e8aec53d47cd7a9feelfutils-libelf-0.176-2.el7.x86_64.rpm178df255df91b7ac6fc2145410acd5b73facfd8fce4e8bd17719df3bd10552d5elfutils-devel-static-0.176-2.el7.i686.rpm73288f6efd2d3561fe78c17f4d3df4afccb29006733822c24354c72c456526bbelfutils-0.176-2.el7.x86_64.rpm4cb85a1e910cb449b6b2cb1f696371738a7bddd1d2150d19ba9530f157725079elfutils-libs-0.176-2.el7.x86_64.rpm0a70cdf59cb533854696f6b4713319b0b7d0070634c80bfc64b41586f55b3b94elfutils-devel-0.176-2.el7.i686.rpm238bcd68e55cfc4e8a90b03ec2cdce9f976ea7d71e7e0b61538c276c55635397elfutils-libelf-0.176-2.el7.i686.rpm05229aade9def1e7ba7cc63b4d6e197a3dc42ab8a7b452c746ae82b20d972b30elfutils-libelf-devel-static-0.176-2.el7.i686.rpm1d8b665c6700565aeec69c802d7812f711d0532fdd4d80b6d08f44c8317a6434elfutils-devel-0.176-2.el7.x86_64.rpmc7c80b236167b2a2d2e1e5c1f8dc967dbb0809a75a979659df2a7b09204e220cSLSA-2019:2205-1TomcatSecurity Fix(es): * tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) * tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305) * tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) * tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)moderateScientific LinuxScientific Linux 7tomcat-docs-webapp-7.0.76-9.el7.noarch.rpm74a7cbfe82daace38212731d02be4068fed88088097e894c1e8db23f298bd105tomcat-7.0.76-9.el7.noarch.rpm91fe1cfb599c72f1f944735aae9b0dbee21b701dcd0bd338dcea5418c0f9a5d5tomcat-jsvc-7.0.76-9.el7.noarch.rpme78654e4904e1fcc98012caac5348122dbd3c093effa7f76e869f334996f36a2tomcat-jsp-2.2-api-7.0.76-9.el7.noarch.rpm498cb473cf01690492d233dedd0cf3f9ef4d8c1a0e5b3e493a160b364b0dd8a3tomcat-admin-webapps-7.0.76-9.el7.noarch.rpm7d713ef41d520749fe2b0ef011206d49380a1348c1406938e34621d0d512cafftomcat-javadoc-7.0.76-9.el7.noarch.rpmcc9612dc527478821d5b1bf93ecc8631f350133409006e5ff4ce965231674242tomcat-el-2.2-api-7.0.76-9.el7.noarch.rpmc97fc1b7a9b5d1f9badd68f9d759622054912089cf2402b7c9178bb8835574dctomcat-servlet-3.0-api-7.0.76-9.el7.noarch.rpm2c5f2909daddc5b36ee6d6266a07b173911d9efa258674fc9faf8ef1d9017b8btomcat-lib-7.0.76-9.el7.noarch.rpmc5b46f1a64280e7212590fba523393d1a9218e89919f03822fdcb560d01cf94dtomcat-webapps-7.0.76-9.el7.noarch.rpmd60acefc27c055da431682c97fac87cefcb4d1f092ab88fb8490883dc385dd24SLSA-2019:2229-1Spice-GtkThe libgovirt packages contain a library that allows applications to use the oVirt Representational State Transfer (REST) API to list virtual machines (VMs) managed by an oVirt instance. The library is also used to get the connection parameters needed to establish a connection to the VMs using Simple Protocol For Independent Computing Environments (SPICE) or Virtual Network Computing (VNC). The spice-vdagent packages provide a SPICE agent for Linux guests. The virt-viewer packages provide Virtual Machine Viewer, which is a lightweight interface for interacting with the graphical display of a virtualized guest. Security Fix(es): * spice-client: Insufficient encoding checks for LZ can cause different integer/buffer overflows (CVE-2018-10893)moderateScientific LinuxScientific Linux 7spice-gtk3-vala-0.35-4.el7.x86_64.rpmec708b84a8e8ce5ff04840b6fe9f1cf1860ddbda6ee0018dfc9f5e6ca59d51e2spice-gtk3-devel-0.35-4.el7.x86_64.rpme8f15392a140e9e2f17dabda7144a5eb457e4f6535f74218618353b75eeee533spice-gtk3-devel-0.35-4.el7.i686.rpmd4436a6bb39022d2efc6977adcd7bdaaea6be70d908abd11d413f49716092358libgovirt-0.3.4-3.el7.i686.rpmbe275b364e4b402f6c60a610be093b8dc4c9b259760325679aae10557c84a09fspice-gtk3-0.35-4.el7.x86_64.rpm569b44c8a85e075eef107c7c20c9a41271b445cbdf4f6067b1557d13b4b7afe9spice-gtk3-0.35-4.el7.i686.rpm7b9fd2dfaf4edb714ff319e9e4547581746351f6f78e34bae84f492f784de5a6libgovirt-devel-0.3.4-3.el7.x86_64.rpm562ff91b1d0c38bef5261a0f714ceb32bb7ae59f59843eb9c12e07b9c5b0c6c0virt-viewer-5.0-15.el7.x86_64.rpm75974baff920eb162199b78b3ec8a545c47b69b5c5ce9cb6c4541d2fb35c83d8libgovirt-0.3.4-3.el7.x86_64.rpmc139a5196f632f840856d1c6268411a4976416b308b5ec9f47ece07e75f168b8spice-vdagent-0.14.0-18.el7.x86_64.rpmcb431b071406fc028747be8ebecead529c935003330082b36aa90c15976995felibgovirt-devel-0.3.4-3.el7.i686.rpm207f2291369165880a389aee83d5165bbc9fb29de623916502bec0fbfe44f69cspice-glib-devel-0.35-4.el7.i686.rpm23bd0a72fe8f5829241d6a95f79d9fafc56dca87d0d7c4efea8a5267a4324bf2spice-glib-devel-0.35-4.el7.x86_64.rpmd988c92f5d1152dedda8feb25958f08f24829a035f9807ba6e5aabe0eb626e1cspice-gtk-tools-0.35-4.el7.x86_64.rpmc8313f20e593682c8989ddcb048f8936eb8bf50bbe7e67daa09bf714f763db67spice-glib-0.35-4.el7.x86_64.rpm1870fa90d3a83d01e2c901a1caaf9b0aafeafa32d492011d93dea831ba57f477spice-glib-0.35-4.el7.i686.rpmf50be60b197a60cb70f4d09e26a2f2f5f3d7be811324acc69a125bdd9dc64c1bSLSA-2019:2237-1Nss, Nss-Softokn, Nss-Util, And NsprNetscape Portable Runtime (NSPR) provides platform independence for non- GUI operating system facilities. The following packages have been upgraded to a later upstream version: nss (3.44.0), nss-softokn (3.44.0), nss-util (3.44.0), nspr (4.21.0). Security Fix(es): * ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495) * nss: Cache side-channel variant of the Bleichenbacher attack (CVE-2018-12404)moderateScientific LinuxScientific Linux 7nss-softokn-3.44.0-5.el7.x86_64.rpm146c05085a965a06f8f830390f193e790e6f360d0ea5fbff1585ea6e3c434cbdnss-devel-3.44.0-4.el7.i686.rpm1369795b9a89ef6e4bf74edf32270b91115c760d5de1b6b98aa2a9e0e1c48782nss-softokn-freebl-3.44.0-5.el7.i686.rpm9e413d12915178d4416a35501077485121e50ebadcb3e2d29e09e4a42a04ccbbnss-util-devel-3.44.0-3.el7.x86_64.rpmbfb1a54266db5dd4494ff302b5ed1be3ee9798b10ab24b2f893bccf5f2f150e1nss-devel-3.44.0-4.el7.x86_64.rpm085e6392c89c788ac8815f53160ac93f3cc608884cda542022b3410eea3d5b26nss-tools-3.44.0-4.el7.x86_64.rpmca3b70a0bb881e2d7469a4605f6da954bd8ed601fb4ebd5bb650a7b0c2a346a4nss-pkcs11-devel-3.44.0-4.el7.x86_64.rpmd794c60e34298070d9754e0fe4629576a1bc753de6ec18c05499eaa4800d7dacnss-softokn-devel-3.44.0-5.el7.i686.rpmf0c2f053dbbf6c7b664e354bdfc27236f7d8fbf706a2cf82d459b289986d5987nss-sysinit-3.44.0-4.el7.x86_64.rpm86995364e3943b0e206c11a64cb7e71be12289d2d5fd898a47999e8de4bc459dnspr-devel-4.21.0-1.el7.i686.rpm864c539df80fc3f1db33e511518ebcdd54c3b336d7f1af6faf7b5e50f1f4f034nspr-4.21.0-1.el7.x86_64.rpm6ac4ab8db58e7aa40a62354f44607267d82d472eca91b205a35f01091f4046d0nspr-devel-4.21.0-1.el7.x86_64.rpmdde4719aa2f67f866a4ae1afdb9fb4ce46fe3bdba785b85e20ae54445b47564fnss-util-3.44.0-3.el7.x86_64.rpmd00efa3be2125bac037dc35adc7fbf35a11938609b6fad6e0f17097cb92396dbnss-softokn-freebl-devel-3.44.0-5.el7.x86_64.rpm89514ba2276782a76fb459308d2bfa5d943c8c7fbce78c16496915a0ef4968c3nss-pkcs11-devel-3.44.0-4.el7.i686.rpmbf0a3a04f309e10f4ca1dfa4162dd6dcc9906bdc1f319c83020d976d0c8a1e1fnss-softokn-freebl-devel-3.44.0-5.el7.i686.rpma75c14e4735e51dd21e9b54fae7912728968048037a534f024437e26bef17e5bnss-softokn-3.44.0-5.el7.i686.rpm31920d1b61ece4c377ee87445a951de89be853a14eeefbf6cdc20f3be7f25542nss-util-devel-3.44.0-3.el7.i686.rpm97b8b4fc7e3ad07de2af30be4037554789b8bab990113aafa897e6c5ca31ce34nss-softokn-devel-3.44.0-5.el7.x86_64.rpm11ece7f154d3c52942b0d0e3f697cca36839b48b9adfb5870e33893151c81d84nss-3.44.0-4.el7.i686.rpmcfb646ff03c5e18929e6ecdaf35142cf9da0ed953df9381aa8629c773829b04dnspr-4.21.0-1.el7.i686.rpmad99e36575c53ad86217025e3e5796f7d8f046c1defd1a3f10b62a1794caa9c8nss-3.44.0-4.el7.x86_64.rpmd16d0ebcabf0078678d2e94b89240e8ed0764bbac4619a53de7c019c4b9b10cbnss-util-3.44.0-3.el7.i686.rpme0be655623edc1c0b405fa712aedf9121d4585748ebfa028f2c90b02a5258e13nss-softokn-freebl-3.44.0-5.el7.x86_64.rpm819800bfc96b48f23364d69262b17296b919023c8c900a1496aa97899efc1873SLSA-2019:2258-1Http-ParserSecurity Fix(es): * nodejs: Denial of Service with large HTTP headers (CVE-2018-12121) * nodejs: HTTP parser allowed for spaces inside Content-Length header values (CVE-2018-7159)moderateScientific LinuxScientific Linux 7http-parser-devel-2.7.1-8.el7.x86_64.rpm586f539c645af9f5b7b0eecd063f8ecec47a86cf28b582d18c5614a769435fdfhttp-parser-2.7.1-8.el7.i686.rpme9255b46da5640ef0ab2b4f6fed9abb58f6cdeab08cec0235162531c35c0ccd7http-parser-devel-2.7.1-8.el7.i686.rpm7f85b9ac2fc7a9801a90cfc392b1a775621ac7401c471b20e82ba3584d5de836http-parser-2.7.1-8.el7.x86_64.rpmf29e27f4df29f183916edd892ca42f91a5185b06e5de3d45e6334f4aedbaa334SLSA-2019:2272-1Python-Urllib3Security Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)moderateScientific LinuxScientific Linux 7python-urllib3-1.10.2-7.el7.noarch.rpm301138848f3705220b04a9363064f84d50dfdda8266e1475aa90da0c263f10fdSLSA-2019:2276-1MercurialSecurity Fix(es): * mercurial: Buffer underflow in mpatch.c:mpatch_apply() (CVE-2018-13347) * mercurial: HTTP server permissions bypass (CVE-2018-1000132) * mercurial: Missing check for fragment start position in mpatch.c:mpatch_apply() (CVE-2018-13346)moderateScientific LinuxScientific Linux 7emacs-mercurial-el-2.6.2-10.el7.x86_64.rpmbc2a89a871354b8b67e46b89018a5cb180bd20ac7650ecc83f0617dacb456fc9emacs-mercurial-2.6.2-10.el7.x86_64.rpm8ae7810144e78ae2c6f00c87d6c09254cfec7d1759ff9a3f4a265984e3c292e2mercurial-2.6.2-10.el7.x86_64.rpm7df7c7eb0ebc2a89b3db5fe99774ef4006b3fa28d3fca7c161a011a46f87fe80mercurial-hgk-2.6.2-10.el7.x86_64.rpmf02a8a6b49f71038d52712acfbe7d0d4d9f83515696399c22a207115cb7d3b05SLSA-2019:2280-1Uriparser* uriparser: Out-of-bounds write via uriComposeQuery* or uriComposeQueryEx* function (CVE-2018-19198) * uriparser: Integer overflow via uriComposeQuery* or uriComposeQueryEx* function (CVE-2018-19199)moderateScientific LinuxScientific Linux 7uriparser-0.7.5-10.el7.x86_64.rpm8b41cc10ea7188c7e5aab68d1c35b690e7691b85ed1d94883fae432d8788a885uriparser-devel-0.7.5-10.el7.x86_64.rpm2b6d4bbb162ddfce3bd6bcd38169025c2e18b06b98bd3ff69a5bf0954acbe832uriparser-devel-0.7.5-10.el7.i686.rpm0b74b7ba5608f9314639afb5bfec5d8e294d98fdd7df76dc3edcd0f9a949b41buriparser-0.7.5-10.el7.i686.rpmb6250ba3e1e12713b15609e41f2182b020f4dc61743eb75726f47a5086ba2406SLSA-2019:2281-1GhostscriptThe following packages have been upgraded to a later upstream version: ghostscript (9.25). Security Fix(es): * ghostscript: status command permitted with -dSAFER in psi/zfile.c allowing attackers to identify the size and existence of files (CVE-2018-11645)lowScientific LinuxScientific Linux 7ghostscript-doc-9.25-2.el7.noarch.rpm8d5ee86fd50d0addcd8702ebc40e2258acf6e96127441d7016df1a7d03ac47bdghostscript-9.25-2.el7.i686.rpm9280d7c7b2d75d42cd33977487059454428813f259d43c363386b1476a6f05aelibgs-9.25-2.el7.x86_64.rpmd9d2f10ceb28a86acfda1ba01ce8c5f7318a2d2e1f5f73771c14239cd098fe6elibgs-devel-9.25-2.el7.x86_64.rpm34d907a4d8cfc20e882b180db19fe9725b8f1f88a51873e874ab72c1b67bd96bghostscript-cups-9.25-2.el7.x86_64.rpm05979f8ad296db4d04d83e01b724a839996027e92157ed61d7e56da1d3444a81ghostscript-9.25-2.el7.x86_64.rpmc59d8a179a31f338177f81630175a9941a09583c1b8a95b4cd226b8dbd6c9f1eghostscript-gtk-9.25-2.el7.x86_64.rpmd91c6d09d35e2f0d779311148639b0a933d6b704626bd86fc801f28dcaa834e3libgs-devel-9.25-2.el7.i686.rpmd610f5c4902c17a83e17dfe7a84e144d395b88ac9769b821e16ca3ec06a5e5d7libgs-9.25-2.el7.i686.rpm4393d6ec6eac856e7f4d9bd9d20dbafac469b8e1d76d49c53dbbd93de145fde3SLSA-2019:2283-1SoxSecurity Fix(es): * sox: NULL pointer dereference in startread function in xa.c (CVE-2017-18189)lowScientific LinuxScientific Linux 7sox-14.4.1-7.el7.x86_64.rpm326d37a578f9e655acaac2e66b4b9d038c1f925bc7a7a530f20e4abeabf01670sox-devel-14.4.1-7.el7.i686.rpm4d432a674ef5dd0ddb7df0b29d5a19f79ab5b93b034fdb0e08c07cf1e4932d83sox-14.4.1-7.el7.i686.rpme0cfa4615cc81336bc6596faf71eb26bb5ddffdfbe6dfebece9edc2724419fc5sox-devel-14.4.1-7.el7.x86_64.rpm43f1f775215b8fa8348328267cb92e11503fd2021db021b192b8b58294734ad8SLSA-2019:2285-1KeepalivedSecurity Fix(es): * keepalived: Improper pathname validation allows for overwrite of arbitrary filenames via symlinks (CVE-2018-19044)moderateScientific LinuxScientific Linux 7keepalived-1.3.5-16.el7.x86_64.rpmc25e76d995e1eb6587e7b1d962fa72fd05f29229a8a495d877fd1cd52fb9a184SLSA-2019:2290-1LibsolvSecurity Fix(es): * libsolv: NULL pointer dereference in function testcase_read (CVE-2018-20532) * libsolv: NULL pointer dereference in function testcase_str2dep_complex (CVE-2018-20533) * libsolv: illegal address access in pool_whatprovides in src/pool.h (CVE-2018-20534)lowScientific LinuxScientific Linux 7libsolv-devel-0.6.34-4.el7.i686.rpm9617b121e9d2d6090eb520c191b384d1e21255f35773c070c3eac3f68f7ff2bblibsolv-tools-0.6.34-4.el7.x86_64.rpme611fd3e093e996c644b414df52eadf9ffe3fbacd89b7c83b608b62f3ab76778libsolv-demo-0.6.34-4.el7.x86_64.rpm5004290a4325c6fd1b9ce014977dd1cb61fa9f9048055ee5283e817e589428a4python2-solv-0.6.34-4.el7.x86_64.rpmd7acf68f149ceeb96bfe0fff1dbed64d9db8c7aadb0bcc5e0e7ff5fb1a3c08eblibsolv-devel-0.6.34-4.el7.x86_64.rpm45f5d16ae91bd2b2acc9a4d5b7b874dde742026ec31f84ad227a37106a368a09libsolv-tools-0.6.34-4.el7.i686.rpm5f5c85dc730640e7d1302b1ed020b53cdad66016b8b34b1980b2ed2d39aa03a0libsolv-0.6.34-4.el7.x86_64.rpmeda429e432e0c1d94763fa7d9b27050aa13a4b4bed5fa23dbd7be4252c9fb9bflibsolv-0.6.34-4.el7.i686.rpm23ff2d693f0c3284add7d63425dadaf7e22481fb456d4c6a961c0fe231d3cb56SLSA-2019:2294-1LibvirtSecurity Fix(es): * libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function (CVE-2019-3840)moderateScientific LinuxScientific Linux 7libvirt-bash-completion-4.5.0-23.el7.x86_64.rpm3f4c0c0d26d46fc34ca52b7a312592e108525bbc29bebb7e274a3055ded832a1libvirt-login-shell-4.5.0-23.el7.x86_64.rpm8e82e1d8a73a3caa12acdc074e4ee147045e85ecba7e6b9170eff471259ad142libvirt-daemon-driver-storage-mpath-4.5.0-23.el7.x86_64.rpm87bfaf7abf83cb5adcb71aa4a5494ae65c18982373a76a9a71ca2ce3fc2a8c5alibvirt-daemon-driver-storage-core-4.5.0-23.el7.x86_64.rpm3ae659d672cd6555a9af1af15d0f6f73356631268fa030bf55e23a6f04666eedlibvirt-daemon-config-nwfilter-4.5.0-23.el7.x86_64.rpm7d3424ae3bf92cee36192d24255f0dba257373073d0ed7630341dfe512fa94b2libvirt-client-4.5.0-23.el7.x86_64.rpm489f6ca067d091d9b7b48979f88e703220307d273a9c264f0e74c2c80acfac9alibvirt-nss-4.5.0-23.el7.i686.rpm2f713eef42902927c7b44b8c7793d3d30343baaf95b82396e3c0152cd45d9b82libvirt-admin-4.5.0-23.el7.x86_64.rpm7baaf3f212b43f434d3d4d6e08ea4e9e27b87577234ff84b9ed807035c48bbe9libvirt-daemon-4.5.0-23.el7.x86_64.rpmf0208b2a1e8f18a0957c13db8e13238e8273094a2613bae0b7f5b9c6e2d4baablibvirt-daemon-kvm-4.5.0-23.el7.x86_64.rpmda9cfbb0a753ee0033cd612ac658f3962487fe61c3bb3183dfcca2ca79fed20dlibvirt-daemon-driver-storage-scsi-4.5.0-23.el7.x86_64.rpmbc49a8498fc4402220baa314a86018537a31a6c82906e24d8af666e041c64949libvirt-4.5.0-23.el7.x86_64.rpm61161019662f3d343b704314b204b71bac7c8e58cf22b1dcf3ad40b818981a76libvirt-daemon-driver-nodedev-4.5.0-23.el7.x86_64.rpmaa20a12eabc1fe27cbae8c44a4eeb30d7f435dc3bb8d1acd00b0e5d83e613ae2libvirt-daemon-driver-storage-gluster-4.5.0-23.el7.x86_64.rpm265cc43228cbb5a9a7d07d26e4e79470c0384913b8ebb0ece15e364d5556708dlibvirt-daemon-driver-storage-logical-4.5.0-23.el7.x86_64.rpmda0e5dc32766bb5574db4a50032f9f270b2b33e5e8a2234f550f4850eb3da4d5libvirt-daemon-lxc-4.5.0-23.el7.x86_64.rpm9d38499f320775f4400984b7cc71cdafcb386aebefaabee4e51dee5b9847f15flibvirt-daemon-config-network-4.5.0-23.el7.x86_64.rpm02f52f1a65c104a662613d6d0ac66d60e403e27ae9e249f6b7acb28a9360994flibvirt-daemon-driver-storage-rbd-4.5.0-23.el7.x86_64.rpm8147b039f8b514caa839d0aa7d47f2b3dd24dab1eb213eef9639cb03d0dd8336libvirt-daemon-driver-network-4.5.0-23.el7.x86_64.rpma6f4bdd6fac53dd34a8798ebf027c66fb09796833241568aee6522fa3f640c01libvirt-daemon-driver-lxc-4.5.0-23.el7.x86_64.rpma9a9c6db3b4cd30116991505c8a871c241fcc91ed0306c8ef8ef4037ee3d9751libvirt-daemon-driver-qemu-4.5.0-23.el7.x86_64.rpmf6468be0c8202c0231767acd60c55afbf0f3096497ca853224af892a6c3151dalibvirt-client-4.5.0-23.el7.i686.rpmcbd0153393bdc70231bca080a3c007180b5c16e5767688db256f1323314cc1c1libvirt-daemon-driver-nwfilter-4.5.0-23.el7.x86_64.rpm08cd87bc73d9f76b1e986e3d8ca0052de47cc249df6b17fa6f19c90299efd75clibvirt-daemon-driver-storage-4.5.0-23.el7.x86_64.rpmdd689f79fd7b1691e5d03f3a2c2afaaa2d23d11f59d5e4482f5db8614c5d2da8libvirt-nss-4.5.0-23.el7.x86_64.rpmb83e3af5dc590f5b47dbd02f3bb34f992ea8a579ddea16c8fee9c8e1bc2dbd2blibvirt-daemon-driver-secret-4.5.0-23.el7.x86_64.rpmaa31f78a33060cf8d6231fbf0566e31e84963ddd032676e95db3a7b2dea62bf8libvirt-devel-4.5.0-23.el7.x86_64.rpmda5fa2aeb548ae46ee2939e83704e0b87609a40fe328c232771bbab24102a000libvirt-libs-4.5.0-23.el7.x86_64.rpm8e174b55ec3d927e5d437ad30187265416f8edd0d8824412eae6e910c97b6aaflibvirt-devel-4.5.0-23.el7.i686.rpmc554295552fd975eaa681f6d92099c3c0904f5961b6c1c92e503b23a92ece213libvirt-daemon-driver-storage-disk-4.5.0-23.el7.x86_64.rpm561fa6bcc30ce74a729d9cb2cb7d8c1ca3f252f019ab188b20d4ed034516f3d0libvirt-daemon-driver-interface-4.5.0-23.el7.x86_64.rpm241582692d7b5e2329b7c71af7ef172e2892d6adca670299d8903b00258c791elibvirt-lock-sanlock-4.5.0-23.el7.x86_64.rpm39fb152238b5c9c3c8d14b7cfcb138dbd549acf93834e1a7f379bd929fa58652libvirt-docs-4.5.0-23.el7.x86_64.rpm95d18ae2fb90c8eb933f3e9e4450f59ee89fca1aca1b5a557b0089010f289a52libvirt-daemon-driver-storage-iscsi-4.5.0-23.el7.x86_64.rpmc4a1c272520be2b2954a8b0a500827cc40f8d5de481eca1bcf414e8adddcc8bclibvirt-libs-4.5.0-23.el7.i686.rpm598a354ab72d7f1bf01d99de785a039cb01e17edc4ac9746334919ea339ec510SLSA-2019:2298-1LibarchiveSecurity Fix(es): * libarchive: Double free in RAR decoder resulting in a denial of service (CVE-2018-1000877) * libarchive: Use after free in RAR decoder resulting in a denial of service (CVE-2018-1000878) * libarchive: Out of bounds read in archive_read_support_format_7zip.c resulting in a denial of service (CVE-2019-1000019) * libarchive: Infinite recursion in archive_read_support_format_iso9660.c resulting in denial of service (CVE-2019-1000020) * libarchive: Out-of-bounds read in lha_read_data_none (CVE-2017-14503)moderateScientific LinuxScientific Linux 7libarchive-devel-3.1.2-12.el7.i686.rpmb78ed3d6a7c5c20c733b8991f61ab5ff7283c1d08b870d871b48abdc84d4c9a0bsdcpio-3.1.2-12.el7.x86_64.rpmbdbb977457b9f0b160303ce2ee7332ea4a40dcf9fe89e3df60192efd2bcb83d8libarchive-3.1.2-12.el7.i686.rpm3d34ee4691ecbb75791cdeb5c3cb4e13db3acc4a8141a229a2e584cbd3ce5310libarchive-3.1.2-12.el7.x86_64.rpm549ea2c82b13329869197988028c69745170b30208495a131fff60c46c908ed8bsdtar-3.1.2-12.el7.x86_64.rpme79dd4fd6c9cf943b41cc05837a416845ebb092ad6e8d6ce732e223114a77e54libarchive-devel-3.1.2-12.el7.x86_64.rpmb95b9e14331fafea490d2dd6e7b100a81d93438565784b4b71c690c418e093d4SLSA-2019:2304-1OpensslSecurity Fix(es): * openssl: 0-byte record padding oracle (CVE-2019-1559) * openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734)moderateScientific LinuxScientific Linux 7openssl-1.0.2k-19.el7.x86_64.rpmf1d57b3a15f280720a5bbdc2669906efa55d763a1ae72d3a8e39c73c11abc371openssl-perl-1.0.2k-19.el7.x86_64.rpmdc23e2311234dc17947a558c6a965a0700023d6428c86740e5009fc413c16145openssl-libs-1.0.2k-19.el7.x86_64.rpm91c9b330d9ce694388e566a45fcf3068b039e3f815be2f5c717a3a88f8c7f3b5openssl-libs-1.0.2k-19.el7.i686.rpm9066e02688f238a76a6823230b33622171170bead7c363c013cc706defd2a4eaopenssl-static-1.0.2k-19.el7.i686.rpm913443f58cfa01bad45d2394be858087722d483620f178beec696092a25e0734openssl-devel-1.0.2k-19.el7.x86_64.rpmb04c37db6bc04e3fdcbbe2b3ba4d35471922916b0058f21e916b2e8f5f4d352fopenssl-static-1.0.2k-19.el7.x86_64.rpm894d2f90b1b60ff96bef99a9a92df116c03bffaa8e8028e410a2241a1d5412f7openssl-devel-1.0.2k-19.el7.i686.rpm6bd3b43823c8e8c2a2b60fe30b7a02ada40cb8ade796ddd541517bf8f924c73dSLSA-2019:2308-1Libguestfs-WinsupportSecurity Fix(es): * ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755)lowScientific LinuxScientific Linux 7libguestfs-winsupport-7.2-3.el7.x86_64.rpm92618e79d4015060f695f4d9f0d706149829986bb4b8ea80867ab09ce10210b4SLSA-2019:2327-1MariadbSecurity Fix(es): * mysql: MyISAM unspecified vulnerability (CPU Jul 2018) (CVE-2018-3058) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) (CVE-2018-3063) * mysql: Client programs unspecified vulnerability (CPU Jul 2018) (CVE-2018-3081) * mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) (CVE-2018-3282) * mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) (CVE-2019-2503) * mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) (CVE-2019-2529) * mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) * mysql: Server: Options unspecified vulnerability (CPU Jul 2018) (CVE-2018-3066)moderateScientific LinuxScientific Linux 7mariadb-bench-5.5.64-1.el7.x86_64.rpm10b9581a853f15b71be84ee31d55aebd20a01a25eee4e581b0a7a22c5683e882mariadb-5.5.64-1.el7.x86_64.rpm551ea44a2482fe8b00ce8ba99823d2ea75637d9953883b528b5172ca6934f556mariadb-devel-5.5.64-1.el7.i686.rpm55239eb77d23fd3db781dd56bd80682d77d3865dfb45084a5a7b94580b005a56mariadb-libs-5.5.64-1.el7.x86_64.rpm9e6abffac659fbac9b2d3efa14930b9cfbab53cfea0c4d1c1718e697d097156fmariadb-embedded-devel-5.5.64-1.el7.i686.rpm614153030ef846dceff49b9c2b1134673d1f1a57f71d35ef60d96d30ede1c72cmariadb-test-5.5.64-1.el7.x86_64.rpm383ad2e6ad307966a9a0c1496f3fc4e16ebc7e45e9ce8853d4f32a19470d2ce8mariadb-embedded-5.5.64-1.el7.x86_64.rpm3a4da368aa562970889a0b00a60fdbbd7680ae9165606ce1573ee872f6effdbcmariadb-embedded-devel-5.5.64-1.el7.x86_64.rpm9f4f4ad4559d50df6ea57d1df134d6e486d8cc6fd191cfdec397d211371e266amariadb-libs-5.5.64-1.el7.i686.rpmf7860872017cef08fa2b5de9ebfe12a0b6da621704b57d8e4dab304784accec4mariadb-server-5.5.64-1.el7.x86_64.rpmb6a969bdbb91564dda440fb66f7103303a6f353a6a4ebbabde9cd5253544f79fmariadb-embedded-5.5.64-1.el7.i686.rpm57d320919b4857f89561f51991c9f4e6031f052bbab42037afcb89d71147b869mariadb-devel-5.5.64-1.el7.x86_64.rpmb186bbdcee0604499acb6864cec672b0860aa6478b7a1fc0ec578668f65806f8SLSA-2019:2332-1AdvancecompSecurity Fix(es): * advancecomp: null pointer dereference in function be_uint32_read() in endianrw.h (CVE-2019-8379) * advancecomp: denial of service in function adv_png_unfilter_8 in lib/png.c (CVE-2019-8383)lowScientific LinuxScientific Linux 7advancecomp-1.15-21.el7.x86_64.rpm7d605f357f5f7f41cc02cd7e37d272f65f653c989cc99542b8b77bb5ae54240fSLSA-2019:2336-1UnixodbcSecurity Fix(es): * unixODBC: Buffer overflow in unicode_to_ansi_copy() can lead to crash or other unspecified impact (CVE-2018-7409) * unixODBC: Insecure buffer copy in SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c (CVE-2018-7485)moderateScientific LinuxScientific Linux 7unixODBC-devel-2.3.1-14.el7.x86_64.rpm66d93285c1c70a8ebf08eccc4582f8419ec48790563f8f945ee2cd2ed0344b5eunixODBC-2.3.1-14.el7.i686.rpm66643d81c538a4c70a773e47f70806460c1a72a5d3559c8423ac26b4c852ba93unixODBC-devel-2.3.1-14.el7.i686.rpm95ce183b513ebdd03df315d825ea44d4a9facac7fa4a433653d1ced86fecafcdunixODBC-2.3.1-14.el7.x86_64.rpmbdb238e90309237930883144902c1eddc3ab3dbf85dc430adb3eca10a920be42SLSA-2019:2343-1HttpdSecurity Fix(es): * httpd: mod_auth_digest: access control bypass due to race condition (CVE-2019-0217) * httpd: URL normalization inconsistency (CVE-2019-0220)moderateScientific LinuxScientific Linux 7httpd-2.4.6-90.sl7.x86_64.rpm9873a6acbf5f7c0e0745c99efaab202277fbf724f0cfb55a9b6f8f784bc5663cmod_ldap-2.4.6-90.sl7.x86_64.rpm3ea48c89f6cba16a2e955f75ecd9b425753fbd6fdca05ddd8bce6c61056a50ecmod_session-2.4.6-90.sl7.x86_64.rpmbf8f33ea4f916869ad49c92be8aa9d088a6170013357f50ca6f77a24c7761565mod_proxy_html-2.4.6-90.sl7.x86_64.rpmbeee4b311bbae9cf632e1cc707a403a9d7dd6bcfae2bd7ce5e2a623084593040httpd-manual-2.4.6-90.sl7.noarch.rpmdd42b269e561e231fc5f4f83b1991a6d4b3ab22a513e2d7d4bfdc6d9c38a6db8mod_ssl-2.4.6-90.sl7.x86_64.rpmb0ad732a61aa5373e1195103702d0ddc5cec09c3cbe637ae04c1af2e4b949c36httpd-devel-2.4.6-90.sl7.x86_64.rpm4e754ce2bfbe0419fa51bb7508e3540cceda3ca2f18295e490efe93caa24252dhttpd-tools-2.4.6-90.sl7.x86_64.rpmae80f01449c43cdde6eefd15a8270cce88f1cbeeeb0515e53cf81face144645cSLSA-2019:2462-1GhostscriptSecurity Fix(es): * ghostscript: -dSAFER escape via .buildfont1 (701394) (CVE-2019-10216)importantScientific LinuxScientific Linux 7ghostscript-9.25-2.el7_7.1.x86_64.rpm3467611d94328fd77643f6698059f4f2059760f5a3d0f873816332e8bd3ba3dclibgs-9.25-2.el7_7.1.i686.rpm83037955afd598a9adaf417cf933775a1ad5485b0391f971241aac2e5222b877ghostscript-doc-9.25-2.el7_7.1.noarch.rpm023b35b0a6f219e869f72285609a58ac50bee627b947373fa233f16abfd4a5adlibgs-devel-9.25-2.el7_7.1.i686.rpme688808b5b759f7a2e43208bcf1049dca008f32bed65667a827f5ed05979cb77ghostscript-9.25-2.el7_7.1.i686.rpmfd53f6804615a79e3ff5a882148d749a7806a877989ef4cceb3b4393b619aa6elibgs-9.25-2.el7_7.1.x86_64.rpm04a234ca5fcf6f6deb60fb900df709500a349c8e34dfa44445b8646f1dc3e351ghostscript-gtk-9.25-2.el7_7.1.x86_64.rpm6037e0c4e0606461e8a2d7f1bd3df580150fc4e6a68f5721c01ed97b31e64b37libgs-devel-9.25-2.el7_7.1.x86_64.rpmf50f2e8574431bd03375b27e4895c5d638933d869410ff675f39dc4644c5c645ghostscript-cups-9.25-2.el7_7.1.x86_64.rpm640485e1179500f23895c5803ce3259806735cfd57d5607cdfc6f8df26f914d8SLSA-2019:2571-1PangoSecurity Fix(es): * pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow (CVE-2019-1010238)importantScientific LinuxScientific Linux 7pango-devel-1.42.4-4.el7_7.x86_64.rpm321e3a8017466347ccf258b722e928e712633c797f46a11c97f24796d1bca066pango-tests-1.42.4-4.el7_7.x86_64.rpm35ae734d6175a4e94e13a13138209cea509bbd9439f640a404c58cd81b3f44c0pango-devel-1.42.4-4.el7_7.i686.rpm1769126a1a9c3e8f8c523d1623fcca33d52483d5c9c5cfe5e73d1d978b3fe84fpango-1.42.4-4.el7_7.x86_64.rpm73d58aeee40ae0884e2a2da6b7c36fcdcd5435093eb6826468718e6d43a4a680pango-1.42.4-4.el7_7.i686.rpm5594d56a8c595d630365467840fdd9e9abef47d3826d8587069bda20d568c49fSLSA-2019:2586-1GhostscriptSecurity Fix(es): * ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445) (CVE-2019-14811) * ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444) (CVE-2019-14812) * ghostscript: Safer mode bypass by .forceput exposure in setsystemparams (701443) (CVE-2019-14813) * ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) (CVE-2019-14817)importantScientific LinuxScientific Linux 7ghostscript-doc-9.25-2.el7_7.2.noarch.rpma937f757e1f1c554b6a294547b2829c163373bdf010c9606ae7485b258c7a024libgs-9.25-2.el7_7.2.x86_64.rpm54ce651a0d18f05e50ef5abbf07ec476dac9680e93f7d81907a7e00c33259cb5ghostscript-gtk-9.25-2.el7_7.2.x86_64.rpm12163e6188b41db4c53ffaf0923aab230cb9f8e4449c60377aa5d07264660d86libgs-9.25-2.el7_7.2.i686.rpmbacf91f9a401402c2b04bd4f48b79b7e2deeefb7ccbe563f386d1fda64416c06libgs-devel-9.25-2.el7_7.2.x86_64.rpm0fce5a3c13b8c22c57894b7536ec623fbe4b882b49e96d7397020c11bf20d999ghostscript-9.25-2.el7_7.2.x86_64.rpmf18c6a42e6272acbbd95b26c0beb472ce78270e48205513ddd8b6b80773c40fbghostscript-cups-9.25-2.el7_7.2.x86_64.rpm7dcdaeff50da16ce5083e7b1b2f9f099e50b8a90aad77755c371add328b3fcc0ghostscript-9.25-2.el7_7.2.i686.rpm182e2b5fe0fad66137327d8ea287594248ad0af7bfbb9eedf7db5596cb8a3cdblibgs-devel-9.25-2.el7_7.2.i686.rpma5b07e023836e7d20a529315f9d16d87eb44bd089faf464539aaec06ac4bd529SLSA-2019:2600-1KernelSecurity Fix(es): * kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125) * kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results (CVE-2019-9500) Bug Fix(es): * [mlx4] VXLAN over VLAN TCP segmentation * Race condition in /dev/sg due to missing synchronization causes corruption in RHV * panic handing smb2_reconnect due to a use after free * NFSv4.1 client stuck in infinite loop when received NFS4ERR_SEQ_MISORDERED error * Backport TCP follow-up for small buffersimportantScientific LinuxScientific Linux 7kernel-devel-3.10.0-1062.1.1.el7.x86_64.rpmd50b3920395e2e3fdf9ac37377810447b4f786de981163bc41e624f21942de46kernel-debug-3.10.0-1062.1.1.el7.x86_64.rpm457a73ab3ad2f477781544fa2427063fbd8d2264f8c49b416b47fb65e52c6c4dkernel-tools-libs-3.10.0-1062.1.1.el7.x86_64.rpm43004300794b17bbadf674aa2e9f0633ec5d4746fcbb39bc96a81bf2215f5075kernel-doc-3.10.0-1062.1.1.el7.noarch.rpm2e65aeff0093bdf9e38d58cb2443c6f22b173dc2aa3170466635e6a23aa163a7kernel-tools-3.10.0-1062.1.1.el7.x86_64.rpm9590a172d750a68a482c3209f5e766fd287bd022608545a2b6de215706a3f9ddpython-perf-3.10.0-1062.1.1.el7.x86_64.rpmda6be4ab037413ee83fb64b8bff188c06877fe4c49e219505ce7ddf7dfc3aa7akernel-debug-devel-3.10.0-1062.1.1.el7.x86_64.rpm72f436d4492b24a75602c98f0d7cd7bb2cb050d70b033c5674841049becc2f48bpftool-3.10.0-1062.1.1.el7.x86_64.rpmab0c1b357de43ecd9dd3d095f10406e529e3669e50835391bfe8bf0078f5312dkernel-abi-whitelists-3.10.0-1062.1.1.el7.noarch.rpm78692e0e8767c86d94a1320b70e2d3bc7bccea3e993591842f92bc259fba736dkernel-headers-3.10.0-1062.1.1.el7.x86_64.rpm908ac854e0a67b92fa902b293bc345a1ca9e75240aa02d79842380c87725c98akernel-tools-libs-devel-3.10.0-1062.1.1.el7.x86_64.rpmbd4f347030ea67c140eaa780df37232deaae8f381e60bc3c394dd6a8cd2cebfdkernel-3.10.0-1062.1.1.el7.x86_64.rpm9cd5ee440e0f4b78d7ef4f637a6f2a3cdf01bf10d530f9a955ef2c2338b1e144perf-3.10.0-1062.1.1.el7.x86_64.rpm9ab476f5889435c7dd6b444f405818b7b2baaa4c7e34f8d1f9284a3ce0bdba68SLSA-2019:2606-1Kdelibs And Kde-Settings* kdelibs: malicious desktop files and configuration files lead to code execution with minimal user interaction (CVE-2019-14744) Bug Fix(es): * kde.csh profile file contains bourne-shell codeimportantScientific LinuxScientific Linux 7qt-settings-19-23.10.el7_7.noarch.rpm37e3132c07c9f37e72384b7bcd9411ca8c61270252586becd40eae630f2f6153kdelibs-ktexteditor-4.14.8-11.el7_7.i686.rpm1d061db54509f4fce7e950d802f72f843c2b30a8b1a859d77d67e82feaf82c46kde-settings-pulseaudio-19-23.10.el7_7.noarch.rpmd1385efd9629e1cb33a702d8ded9eed41a83cd8f3de7aff257b9f1190084adeckdelibs-4.14.8-11.el7_7.i686.rpm3568dba998fcef4c10d864f37fbd16dc5b5492b61d19ac86461b4e55af0f0c8bkde-settings-19-23.10.el7_7.noarch.rpm2ee4b0a0c9e9dc41f1286d27f12389788d0f84032ab170ff54fd28a8af0a706ekde-settings-minimal-19-23.10.el7_7.noarch.rpmf68dc11e20d8523dcbe32318df7f9f98537f8eaab946e0df35f1b25d8aa94a6fkdelibs-ktexteditor-4.14.8-11.el7_7.x86_64.rpm9a072728a3dcb36c8343a2575c42d44e37a2bd955a5db7c043587dd29387e61akdelibs-devel-4.14.8-11.el7_7.x86_64.rpm840e8aed19076d738d7c6e534a345a6be78ae7d938fac731d4faad2b4594e4c0kdelibs-apidocs-4.14.8-11.el7_7.noarch.rpm53f7b5c39a35391d109a53b5fe69f63b87b62dd4a3f11a217a656c985abc191akde-settings-plasma-19-23.10.el7_7.noarch.rpmd146b28621c0573dd0ca4beb941e05d819432fbb950b0f7e31cd52fa6c732138kde-settings-ksplash-19-23.10.el7_7.noarch.rpm4bcea9b803c6e4156fd243c62b9ec7dd93312697d2d2203b06c458609a033682kdelibs-devel-4.14.8-11.el7_7.i686.rpmb71cbc362e5d335df428d3a385f5a70e4bf114ec7bffd34bcb01e13e3ab2258fkdelibs-common-4.14.8-11.el7_7.x86_64.rpme71f0e862c92bd8d85903615a5a4942ad723428709cd37aace459c8fd594ffc3kdelibs-4.14.8-11.el7_7.x86_64.rpm7dd31b48801c05e99d08900182811455fa193b98b39fb6fc3cfaf0ea6f6b336bSLSA-2019:2607-1Qemu-KvmSecurity Fix(es): * QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)lowScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-167.el7_7.1.x86_64.rpm6e675ebb9396dc99ee5ee21fff3d090f45cc53e37975a586eff161e0303efdcfqemu-kvm-common-1.5.3-167.el7_7.1.x86_64.rpma558b0a28593a639f76d75fc7e6c265d2ab7b4a025e4143bdc4a8de275249088qemu-img-1.5.3-167.el7_7.1.x86_64.rpm7ea40346c5ed7e0355053aee2f66c35b2e5ca10bf729a2fcb3081e0d99cea05eqemu-kvm-1.5.3-167.el7_7.1.x86_64.rpm09050b6b9de4892fc4b9212f68dee677acf68699d7aaec7057ae6ce61b5000d3SLSA-2019:2729-1FirefoxSecurity Fix(es): * Mozilla: Sandbox escape through Firefox Sync (CVE-2019-9812) * Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) * Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) * Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744) * Mozilla: Use-after-free while manipulating video (CVE-2019-11746) * Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752) * firefox: stored passwords in 'Saved Logins' can be copied without master password entry (CVE-2019-11733) * Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)criticalScientific LinuxScientific Linux 7firefox-60.9.0-1.el7_7.x86_64.rpm3f643b791b283370da25205b99f6537fb03b84c897e58e942a47c72dff291c63firefox-60.9.0-1.el7_7.i686.rpm1fe1e8874faddaf3516db69fd15071814cb63e56ea145d203a8fff0ca2cacf82SLSA-2019:2773-1ThunderbirdThis update upgrades Thunderbird to version 60.9.0. Security Fix(es): * Mozilla: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message (CVE-2019-11739) * Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) * Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) * Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744) * Mozilla: Use-after-free while manipulating video (CVE-2019-11746) * Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752) * Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)importantScientific LinuxScientific Linux 7thunderbird-60.9.0-1.el7_7.x86_64.rpmd3aafe990ff5989700a7dd3e49d0f66200500ae720af093340b019f6adc666d3SLSA-2019:2829-1KernelSecurity Fix(es): * A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835)importantScientific LinuxScientific Linux 7bpftool-3.10.0-1062.1.2.el7.x86_64.rpmdcefb8bda878f4600da21beef8e82de9dcccc62fb8b1403ec6d22ddd0209e846kernel-debug-3.10.0-1062.1.2.el7.x86_64.rpmddd736f5c034db246dcb6fc2ae9d078c715ae74f38a23a8c17e4514e18d33dc1kernel-tools-libs-devel-3.10.0-1062.1.2.el7.x86_64.rpm5a0ab7c7add7d332d95522c45fb37340a46216e309749ade4e640bc3fa122d10kernel-tools-3.10.0-1062.1.2.el7.x86_64.rpmd18c0c82630c2cbb91bfb11f678c9b5a09adc684307dc7c77e163b18a8c9b91fkernel-abi-whitelists-3.10.0-1062.1.2.el7.noarch.rpme5fb5262c12120cab02503a7fce1e421e89beeb060366c57278575a88f284537kernel-tools-libs-3.10.0-1062.1.2.el7.x86_64.rpmb83adaee3ef3db2a5043cc72d14435f3c8caf6ab8c60a43a8ae5ab8fc2588762kernel-debug-devel-3.10.0-1062.1.2.el7.x86_64.rpmc9c9197ea4660e8cf5d5818499274d0424541f48fdf3f4f798024c39bddd5625perf-3.10.0-1062.1.2.el7.x86_64.rpmb827b8094f1d550a74a300161e1889085a50d1e089aca2803e94245852e5d66ekernel-doc-3.10.0-1062.1.2.el7.noarch.rpm214eaff2430ee61e2d3261bb9c21b60f6f07f0440e13ba95acfea79c17825bdckernel-headers-3.10.0-1062.1.2.el7.x86_64.rpm06dc7edb6d99757f15db4a9f94a5471aae8b93976c39f227b80334d5948cfd4fkernel-3.10.0-1062.1.2.el7.x86_64.rpm7b874522c733adf3808ce18dc8cdf00f886a1d38b03b5509be1149169382480dpython-perf-3.10.0-1062.1.2.el7.x86_64.rpm89b314e0ec763f52f97c20b1afe4cebfbc63448b31b8c91f06fe14638c43193dkernel-devel-3.10.0-1062.1.2.el7.x86_64.rpm407f18fe00fb89661de019766d31ec3d6f12f59c95172105de7df6d8865caf72SLSA-2019:2836-1DovecotSecurity Fix(es): * dovecot: improper NULL byte handling in IMAP and ManageSieve protocol parsers leads to out of bounds writes (CVE-2019-11500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7dovecot-pgsql-2.2.36-3.el7_7.1.x86_64.rpmdccc18b6fad729aa0e34cbbc8c8a7d58de6124c68a7aba3fef1f37bfddb3c066dovecot-2.2.36-3.el7_7.1.i686.rpmd7da8c2f84a4db51e4d1c25aed5d43bd1521decae766ecf8908af7e00b564588dovecot-mysql-2.2.36-3.el7_7.1.x86_64.rpmaecefe12da6dbfe278c271d4e51caa6943a95cf455fa21c2006213c843833fd5dovecot-2.2.36-3.el7_7.1.x86_64.rpm10963fefe2a41c6147830d68b53d5a566c7df30da457a03ac80a711c934143c3dovecot-pigeonhole-2.2.36-3.el7_7.1.x86_64.rpmdb4018a2d22fb0328931edd7b56ce63c951cb2361973c7755f868a1a2f227e47dovecot-devel-2.2.36-3.el7_7.1.i686.rpm62e457c171ef6540ae69d62a832d60ef0d64a5a0c490bda5e30b1f4f60c6954cdovecot-devel-2.2.36-3.el7_7.1.x86_64.rpmd6b98470220073ee7f6b4fce454a7eaf28a1583eb95e950d8d50f6f35da7ce20SLSA-2019:2964-1PatchSecurity Fix(es): * patch: do_ed_script in pch.c does not block strings beginning with a ! character (CVE-2018-20969) * patch: OS shell command injection when processing crafted patch files (CVE-2019-13638)importantScientific LinuxScientific Linux 7patch-2.7.1-12.el7_7.x86_64.rpmde563b9bbcb3fabc14d814d6476e2e9bac5bfcb5dc6955a62e50ad4462f1e412SLSA-2019:3055-1KernelSecurity Fix(es): * kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c (CVE-2018-20856) * kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846) * hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506) * kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fixes: * gfs2: Fix iomap write page reclaim deadlock * [FJ7.6 Bug]: [REG] kernel: ipc: ipc_free should use kvfree * high update_cfs_rq_blocked_load contention * [Hyper-V][SL 7] kdump fails to start on a Hyper-V guest of Windows Server 2019. * kvm: backport cpuidle-haltpoll driver * Growing unreclaimable slab memory * [bnx2x] ping failed from pf to vf which has been attached to vm * [Hyper-V]vPCI devices cannot allocate IRQs vectors in a Hyper-V VM with > 240 vCPUs (i.e., when in x2APIC mode) * Macsec: inbound MACSEC frame is unexpectedly dropped with InPktsNotValid * SL 7.7 Beta - Hit error when trying to run nvme connect with IPv6 address * SL 7.6 SS4 - Paths lost when running straight I/O on NVMe/RoCE system * NFSv4.0 client sending a double CLOSE (leading to EIO application failure) * [Azure] CRI-RDOS | [SL 7.8] Live migration only takes 10 seconds, but the VM was unavailable for 2 hours * NFS client autodisconnect timer may fire immediately after TCP connection setup and may cause DoS type reconnect problem in complex network environments * [Inspur] SL7.6 ASPEED graphic card display issue * Allows macvlan to operated correctly over the active-backup mode to support bonding events. * [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group fix these bugs.importantScientific LinuxScientific Linux 7kernel-3.10.0-1062.4.1.el7.x86_64.rpm77f787e95ac70b444de3b0e953826dc1e41e67804f892cb6e28faf14f1afaebckernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm9f06a17bd53338df5d0ec0c1d04f57b5bf1138e68d7453e5cead277a59bb889fkernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpmf36afc74125b5bea5b1b587a4a60a83125db30283a28a96ce6863fba3d41e959kernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm8a9415d8373583918aaa0db4808c0d1c8759758587d7e1870d489857f6115e2eperf-3.10.0-1062.4.1.el7.x86_64.rpm0f4824143d4ea3e78175359a0d6c726a4b5b2d7041bcc4c65e0f233453e7c238kernel-doc-3.10.0-1062.4.1.el7.noarch.rpm04745765b47a9bcb00b4e46744c575812b67164aede8625da8b6bae23b6a91cdkernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpmdfc0c2b4f3a1e85fed98e4cf697aa65453be62d28d76c5ab4edb5d5482b56d67python-perf-3.10.0-1062.4.1.el7.x86_64.rpm11beccaac383ea2515cda98eea79ef1b776242448fc3ac83c5ecff8abb977a91kernel-devel-3.10.0-1062.4.1.el7.x86_64.rpmb0d29a5436058c09b3a4230610830067d3b7ce7816a365f16b8466b4bab295d3bpftool-3.10.0-1062.4.1.el7.x86_64.rpm0503c3ecf1dd7c8d0ed7d5842c08b3837a014347055f9600772e8a89671bfad4kernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm7a0034f13f3ae005c9058dbb95036a284297ceaa7ef660d405f86f1c86e5aa7dkernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm1a364ad571516dcf3767dba95256391663e42cfb0078ee7983eec994d3417d6ekernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm30d2d6fb0b7d18437448d1f839926497a0f6a9241abf75c393b4db1c08d3e8f9SLSA-2019:3067-1JssSecurity Fix(es): * JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificate (CVE-2019-14823) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7jss-javadoc-4.4.6-3.el7_7.x86_64.rpm390e4ecf669a37d7dcdb0c63d0a5fc243a54e3641dc72c81efb19636a8669b1cjss-4.4.6-3.el7_7.x86_64.rpm5eb8316da281593f4827463498f405eab6eaeacf09cec516db88fc566ea45a00SLSA-2019:3127-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) * OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) * OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062) (CVE-2019-2977) * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) * OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) * OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) * OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) * OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) * OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) * OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) * OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) * OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) * OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) * OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) * OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.i686.rpmb15bf5ba762fb696e36df4244f002217174f1d9fd1e981bf039f37a604245e91java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.i686.rpmc2f8c4e9e9575c6804f875905feb0065bb9ebcfbc35d5b9610cabc39a4f28c44java-11-openjdk-demo-debug-11.0.5.10-0.el7_7.x86_64.rpm605533f2353a458c96d0c3ba368cf8b6853755de28f7f2a5143722e85dc49660java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.x86_64.rpm43d80ddb3f061bcc70e6378a858527afb1125be04fb4497c59280f4e9540aed9java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.x86_64.rpma89f4802ab11b465b734a4bdbcf8114dc33bccdef15e8c05002a653ecacca66cjava-11-openjdk-jmods-11.0.5.10-0.el7_7.x86_64.rpm710d54f3af41dfa323f38e3543cfb6f67018759ed93a5a883b5095079044ca3ajava-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.i686.rpm4055766ee453898078c5f92811aa0ac1fff310ce1e5df473b28d756771035828java-11-openjdk-11.0.5.10-0.el7_7.x86_64.rpm4d0559baceb9d642bf3b84c3ab9d9ab97ba977e5874596904d5795ee6b2eeb14java-11-openjdk-src-11.0.5.10-0.el7_7.i686.rpm0e5f22d8153146f3115d61e70e09f69d764001b68a81b36da614bb4b0d82b2b3java-11-openjdk-headless-debug-11.0.5.10-0.el7_7.i686.rpm196075fc21a9b4b279095786ffee99317fa167b0b44242d9cbdec33fa503d04djava-11-openjdk-debug-11.0.5.10-0.el7_7.i686.rpmf2657eb8c512eea99b3b52989a0b96d15a37b8a3b2cefaab7856e2f451191ff4java-11-openjdk-demo-11.0.5.10-0.el7_7.i686.rpm7ea2dd5974763d4583453623946199267e0c8e45c5020d387bada72fdc9d20f5java-11-openjdk-src-11.0.5.10-0.el7_7.x86_64.rpma2f721f922cb3e0c1faf36fd6fc550193d573474a2047e9da7cab360f58e3301java-11-openjdk-11.0.5.10-0.el7_7.i686.rpmef12c024f9cdfb6679d5ddc85a78cb1b701c590cb2db73f95494b0e26667463ejava-11-openjdk-debug-11.0.5.10-0.el7_7.x86_64.rpm8111210a431e85db32bf7ecc8f5183e2c9ca2f71c08d5f013f832ebe25bba89ejava-11-openjdk-devel-debug-11.0.5.10-0.el7_7.x86_64.rpm3a2ad542f0313a2b0dbeb1fd4610605ea2ead806c3b9c806b3a413df7b746104java-11-openjdk-headless-11.0.5.10-0.el7_7.x86_64.rpmec45f955ee85cfe8dfd436616d39c126ff2463cde9385ac092cd14da493a72e8java-11-openjdk-jmods-11.0.5.10-0.el7_7.i686.rpm0020e636a9918e1d4b28f2054267f8deda43ef89ad4d2681e7594202e04eaf6fjava-11-openjdk-devel-11.0.5.10-0.el7_7.x86_64.rpm5549a3fd8ab3b77d387161970b928a1e7a89bff89c287e2917b4d3c08f1c658bjava-11-openjdk-src-debug-11.0.5.10-0.el7_7.x86_64.rpm47fbc6bcd7a71e10f610d317c531440c622cfdd3fc0bc5caee717040003b0886java-11-openjdk-headless-11.0.5.10-0.el7_7.i686.rpm427eb3a50a50966963b3ee9974d868a6091a218670366ce123ff7193bf2fe753java-11-openjdk-devel-11.0.5.10-0.el7_7.i686.rpmb5cd1324cc6fff88631564db9295cf2afeab2a064eacced749e851499f1adbcejava-11-openjdk-demo-debug-11.0.5.10-0.el7_7.i686.rpm9adfa3191f0299c96438dff11777cfb9ab611bd022961fa4c581083b31ffc90fjava-11-openjdk-devel-debug-11.0.5.10-0.el7_7.i686.rpm50f63fe72749e9a0358ad83900dd03d1b7ce4be3deff8fec8f49e9e9e2211c61java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.x86_64.rpm04b01056d583c79c7b459977fe2bad8d447a9f0c803be749a2c6598981a5db0bjava-11-openjdk-headless-debug-11.0.5.10-0.el7_7.x86_64.rpm0117e2b6f12ce9133bbfd1d48e86138a496aacc92ae8ac3d2b5010c42422bdfejava-11-openjdk-demo-11.0.5.10-0.el7_7.x86_64.rpmbb12875f7405ca73dce61dad02bf0f971eefee58e08504b220d01b27abd21c5ejava-11-openjdk-javadoc-11.0.5.10-0.el7_7.i686.rpm5554af2bca4ca7802df90524f4d9f15f68cd550f6c3bb84cd3ce0261efa59000java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.i686.rpm81fb7669d5e7dbdd7d19343625f73515ef01a635031679b1c5485600075cf9c0java-11-openjdk-src-debug-11.0.5.10-0.el7_7.i686.rpmf9ff1f47a541aa3f8b1e24e6f2f191cefc108d9802a9e3c10c3969e40261487fjava-11-openjdk-javadoc-11.0.5.10-0.el7_7.x86_64.rpm1dece4372aaf7de698cf2cfb9a8fcc3878f4edaaf5750df0514b9e420509b627java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.x86_64.rpmcdaec75b40d5204529e79cc62183dc5eaeb5b9ce9c9276e67434267db050efd6SLSA-2019:3128-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) * OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) * OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) * OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) * OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) * OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) * OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) * OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) * OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) * OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) * OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) * OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) * OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7.x86_64.rpmeee5aa2f880814e8c48c22e6da04622d1ef063275546b07a94d2a1143bc8562fjava-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7.x86_64.rpmc3eab471015223be9302c1cac082606f92c147dc2d1c7c7acb6c46468e4dd117java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7.i686.rpm66130f5d808fe7f9dc4b2339c69714eda5caf206a8ea1838491b944c38b59c77java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm1b4ce36d97d043767a7afe44c8a7fa153d105e8d3b12c3d1c9aa80c0b2463435java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7.noarch.rpm9e019e7c3c493be9b46ee48ce8d1c42efc634ad11d4d8432186037cf195bc911java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7.i686.rpme8846661780faf5bd4f183e22aa6ab1a97149d9eb2ecbc9c19100849db33e5fdjava-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7.i686.rpm042d4bb95c6420e28ebbee5e54d59a38da6aa411d3f3af64cde4c2f69b3c7585java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7.x86_64.rpmf17c3df298739e2c2c20f1a76e66b2f72353703c90da7bf656a1193f609edf9ejava-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7.x86_64.rpmd084b526e02a9541ee79a345267b54c11c4f3cb175dd2704bc0c9cfe6c7fbe77java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.x86_64.rpm7e993b1ec77019e1eabe0dbaa88bc1aa26941b2dda9c2f69db5847e44f373c11java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7.i686.rpm7d45e73a3886021f2735cb75ff4d85273278cd3afc4b3329a4a8b88ceafd4dddjava-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7.i686.rpm9a865f57772ad469a5bceb6495b57b3250d05c8ba112994e43b6dfc47c545f7djava-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7.i686.rpm7dfa1dd8c41a7df54e61a67cd908b54a753fe432a5da1ac583d916439aeea262java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7.i686.rpmb3a6b70c62326a6b8d3d6fdfbfd1c291a5678668fa970a1e7ce19b5d448de269java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7.noarch.rpmb319d93f0be48e33331bed6c09d537084abfa3da2a8dea882f3109aa12f7d9d2java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7.i686.rpmf2499d2a2669ac6f77f22c775853a322055a77025fe66ae8e5092c460a87ef1cjava-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7.i686.rpmd3776d3e409ef371a9e9a2c0a1cd1a0f4f2a09019124f1420e9133fbbf6d8fa1java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm80c6974857fb895661fec0b95b84b77b820a82eabe79aed3bce8a21245de6a39java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7.noarch.rpm820f990c80ee88ee377463b099e03bfbd98ca2bcdca2dc7fed6a95f6d15bcc1cjava-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7.x86_64.rpm53d089a42ce336786c277ae9505650a054d0e2bd1699cb6e267880c4958d2296java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7.i686.rpm604f241fc017191862eb2467b9cf7f34cafd3f3e75e3f89c7a793087cde5225ejava-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7.x86_64.rpm30d172a6905bd977abe7f710aa0872d5550e73f6e3c20625db9446d413e6fcedjava-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7.noarch.rpmebb50f9e2743723b4a7b3e58b4946540190f25c9b249832a4eababb6cee3e48cjava-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7.i686.rpm9e0b24c410374a16c15e4cd8562e6b712d88bbb157fbbda14a0569a06aac115bjava-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm873eee7ea3f02ff3b80a2b7e2786fdd8b02ae042829a4500dd2445206fd4b081java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm85bb6a28f9bfd9179d5b93251e6e5532891dce91ea2be7429ef830f54fa3afcejava-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm2b6e884d5bdaccefe61770d352b62da4277303e024ca99548669a821d8b0743djava-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.i686.rpmbf25d0aa5b9ab9cbba586b1f725ae291b02ae8762ea5f994da1959fedc05db67SLSA-2019:3157-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) * OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) * OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) * OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) * OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) * OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) * OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) * OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) * OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) * OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) * OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) * OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE moderateScientific LinuxScientific Linux 7java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm69af4c5976e160b428fbe9ba451c18880aa78fe478220e8e41a9529db05bae2fjava-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm12648738968dc63de3377e98a03742c843695c26c2d879c8978b7ddc5fa82c5cjava-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm81136ad8e52bf505b0b38ef42346e52299e03d5e6402a30cff1da7727dc3911ejava-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm31dc5fff76cafece75c1da203cab822e9c2f68750f6ca0efc253c0fcae907ef6java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7.x86_64.rpmcce3300e996da2a9df10c1efcb794404fe89b1342feab634bf3e86b871190131java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7.x86_64.rpmc1afdb9e26ad60c96d352b4fadbc7c7a4f44c6c992ec24bc647face89995fb48java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7.noarch.rpm488560baf5d511ef1f0119fb0a294fb219b0f60c54da46f4a6b7ea2a17ee0a32SLSA-2019:3193-1FirefoxThis update upgrades Firefox to version 68.2.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764) * Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757) * Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758) * Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759) * Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760) * Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761) * Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762) * Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)criticalScientific LinuxScientific Linux 7firefox-68.2.0-1.el7_7.x86_64.rpm9c684d5a8a4b035b9e2e51eb8c188566327505c5552d358032feee78b3d55de9firefox-68.2.0-1.el7_7.i686.rpmcd74722b0a295558189bb9662f1defbd8dfae81bdc546e75ad60c3167c03af94SLSA-2019:3197-1SudoSecurity Fix(es): * sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword (CVE-2019-14287)importantScientific LinuxScientific Linux 7sudo-1.8.23-4.el7_7.1.x86_64.rpmb2ed1fc10e8c8d2bdca725c05913497603429e559c8a1ea1a841eaadc01064edsudo-devel-1.8.23-4.el7_7.1.x86_64.rpme7b953a0023f2ed4e450fa34153cce3caebe400b4b6ce2195ed5de0649df7ca5SLSA-2019:3210-1ThunderbirdThis update upgrades Thunderbird to version 68.2.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764) * Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757) * Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758) * Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759) * Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760) * Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761) * Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762) * Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763) * expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)importantScientific LinuxScientific Linux 7thunderbird-68.2.0-1.el7_7.x86_64.rpmc3ab426a01ffc671ef54666b773d5b7216f1fd7f29f9bd78338afe87f7d64988SLSA-2019:3286-1PhpSecurity Fix(es): * php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)criticalScientific LinuxScientific Linux 7php-mysql-5.4.16-46.1.el7_7.x86_64.rpm3e876ca64724335cba3c44d43766cd39d1c027f4eaf9ba2dafe0e22c87cb6d7dphp-xml-5.4.16-46.1.el7_7.x86_64.rpm6b41c7bff5d0605c29847161a1d6d5a6dcefd85f58b66c8289957fd6ec65df20php-pspell-5.4.16-46.1.el7_7.x86_64.rpm2ca187d6f8d60a9ccf3eb0dcdac20fd2a8d379c97d0b6ed0742fb181a32595f1php-intl-5.4.16-46.1.el7_7.x86_64.rpm1d803470cf7230063896bb8d1b0af973d25159b5875739b46265ed68b65cadf0php-embedded-5.4.16-46.1.el7_7.x86_64.rpm763ea98fb1a17c4596037c7d885fa90d1c59299642efe871d61dea81c380a400php-process-5.4.16-46.1.el7_7.x86_64.rpm1e023c6a830155ce7bc64de5a85c5637b73831da265d3484e18d85f7b37ca1d6php-soap-5.4.16-46.1.el7_7.x86_64.rpm2c695f63ef1f9cf1f45430caf412037fd0378d1deffb44d3b61903172b976262php-odbc-5.4.16-46.1.el7_7.x86_64.rpm0377a81fadaf8cd07780f80fdae950b55c914a3ff50c1c6128aef974bb06fdd5php-snmp-5.4.16-46.1.el7_7.x86_64.rpm82b5b691c79e8a6e07760eb39fb98ddeea89502d6ff09773d8c5a73a209eb879php-pgsql-5.4.16-46.1.el7_7.x86_64.rpm4968f771e8b089ec312547cf7cf7fa3e78331deb664ebdb6514699d18be8b23cphp-dba-5.4.16-46.1.el7_7.x86_64.rpm3535f2edf7765c92aeaf338990c553b87857406ba9a3c5df39abe1eeb5999f9dphp-devel-5.4.16-46.1.el7_7.x86_64.rpm7bbb7e4697e879272a2cd99f6cb233c421d3c1c19f714a7871c7031915b92fa6php-common-5.4.16-46.1.el7_7.x86_64.rpm9e76932a4cf7c8a597f0aa8ed7fc6b9d1ff2085d8131303088ce93dd6ea52468php-bcmath-5.4.16-46.1.el7_7.x86_64.rpm62906137e65b9e36156ab21e920cfef86fc6e3361c54f4b7f6468b3b27731daephp-fpm-5.4.16-46.1.el7_7.x86_64.rpm072c8f559ad274bc5f83a545afe07e50b5645064d2221ac349d15a3c5508c447php-cli-5.4.16-46.1.el7_7.x86_64.rpmf6b6a774b17d9991b0dbf1b4d853e4f94beaba1de019b6efcd1c09e041f4159fphp-pdo-5.4.16-46.1.el7_7.x86_64.rpm7704f6f421bf9addcc612a077a2482d4da2be707d0ff16d3e4e4417f9124c9e2php-enchant-5.4.16-46.1.el7_7.x86_64.rpm9a206f4f477a79f96c37788e131fe8077143db65da66b3eff4d4f02a5041da95php-recode-5.4.16-46.1.el7_7.x86_64.rpme2320bc886ab362cc37fe347fbde0dc1e19bb70243f109b2f3e5fbb7912b1297php-mbstring-5.4.16-46.1.el7_7.x86_64.rpm0045419028ffc6eaa78638dc05a42ec9132dad50e7b694018180d795454b8634php-mysqlnd-5.4.16-46.1.el7_7.x86_64.rpmd5503139024849d4b05d3062b88d6dbbfe560dca097162bad0e525848246578aphp-ldap-5.4.16-46.1.el7_7.x86_64.rpmb7d4139addbe905196d3800173e5e63984d8e529db8b303d90ba68d7c161e867php-5.4.16-46.1.el7_7.x86_64.rpm772ef21a218686bc1bbd921cfdac7a978ddda26c8ba6dedcddbd7594f3f92c76php-xmlrpc-5.4.16-46.1.el7_7.x86_64.rpm15c3c049c21672d3c6bb30a2d3a5810514108a7aec20df7f25de1d82e369f770php-gd-5.4.16-46.1.el7_7.x86_64.rpm5f51b366ede557eb59a64377417bd770c49e9797ef027c663eaf4e63e133ecbbSLSA-2019:3834-1KernelSecurity Fix(es): * hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207) * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) * hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-1062.4.2.el7.x86_64.rpm7b9608da8b1cb20e6b8dc297a828061bcedc15bfaa667f805dd6dda4fe24aa55kernel-devel-3.10.0-1062.4.2.el7.x86_64.rpm55a97d7e1ab4882e82ddfa7268a2bbf24f796efe8d25a28e229fd570bd5c0812perf-3.10.0-1062.4.2.el7.x86_64.rpmd41766830378a6d44f2797272c2fc2bdd543de8a4bfbaae7b85da681202d87cfkernel-debug-devel-3.10.0-1062.4.2.el7.x86_64.rpm8483171ec11fb3f52fc1d6dea3803749206a260e80a34ded6a3eb2956aced9c3kernel-3.10.0-1062.4.2.el7.x86_64.rpm48f1b0ae96e25c773e04278cc0011e5587cd88ff19427a09ae66c3a2f6fa3c26kernel-tools-libs-devel-3.10.0-1062.4.2.el7.x86_64.rpmc4aa563a328a8bc141f850ffe21b512e764871be316a994c4563ecf75bcd35ebkernel-abi-whitelists-3.10.0-1062.4.2.el7.noarch.rpmc91bac3d5ec62965469a4f2de67fb1db2de9e49dd4e588315c8c0aa01329d0c4bpftool-3.10.0-1062.4.2.el7.x86_64.rpm0b8bd93edd676fd39d0fc2a7ccfd40b234ed64aeb0dbb256bb347f925b315f9fpython-perf-3.10.0-1062.4.2.el7.x86_64.rpm73b7252214dccb8dafd3073ceb79c5cf2a92419a8037ec4bfbf5d4338d5b4791kernel-doc-3.10.0-1062.4.2.el7.noarch.rpm76158ea0b39f4ec2837d4934dd8da5adf7767f80817d896a5d36cf70119f6b47kernel-headers-3.10.0-1062.4.2.el7.x86_64.rpmc788939de8beff6ccca85a53ef5feec0dd7630436474a8c3a344fbf3a21c5e25kernel-tools-3.10.0-1062.4.2.el7.x86_64.rpm7ea0b9ba581775e981983a98a948c095a6834b52f4d7972840d3663e42bb171fkernel-debug-3.10.0-1062.4.2.el7.x86_64.rpm2843f498464ecf9b4c26ca9347d772ee8e7e778e32206d6620f78ae951d2126cSLSA-2019:3872-1KernelSecurity Fix(es): * hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)importantScientific LinuxScientific Linux 7bpftool-3.10.0-1062.4.3.el7.x86_64.rpmfadc96c01c3eada90c238c4ba9338c515328023afeabe564943e084f318c904ekernel-abi-whitelists-3.10.0-1062.4.3.el7.noarch.rpm24d3c649a0b974970ae73f8b72a13e4ca815e5fe889e346ba008fc08cc600d25kernel-tools-libs-devel-3.10.0-1062.4.3.el7.x86_64.rpm5e1b5f5b39449ce1de02d8488d700a9f542cf9da7c8e6a1d3280021e5640df87kernel-tools-3.10.0-1062.4.3.el7.x86_64.rpmece90b29e9fb18a660568d2917f676f4e15ee9be29a5a5bf20963e22ec0af613python-perf-3.10.0-1062.4.3.el7.x86_64.rpma008b02b8e87ff3aab9f5ef6887d57868d46e3d4bb3abe0b20f10c0be29a936ckernel-debug-3.10.0-1062.4.3.el7.x86_64.rpm44ecb1da111c96092b3cf4867fffa9a3d2ee093b25d70f28e8587a52e6c4503ckernel-tools-libs-3.10.0-1062.4.3.el7.x86_64.rpm0403dd6b2d31d8cc20ac8654a22a18a6bc1e0697a512687b763596a199649c59kernel-headers-3.10.0-1062.4.3.el7.x86_64.rpm18387014feee8c0ab9ecb65fd18cc54add00f220429e3754d787dabab12ef416kernel-3.10.0-1062.4.3.el7.x86_64.rpm749683ed464154f60b612a6421e21ae716af98397aa0b7893602207dd402f056kernel-doc-3.10.0-1062.4.3.el7.noarch.rpmcf0612247202337ea6f2edbe36ac11bff53878d3ca28eaf1c17b3483a3e1303bkernel-debug-devel-3.10.0-1062.4.3.el7.x86_64.rpm6509dfe8428969e27f4dfde21206c3bf9682c50c89e06eee1d16a19a6884a9feperf-3.10.0-1062.4.3.el7.x86_64.rpmfcfed7cff267e6ebb4cc44a524009340ee925a0d06ab799ed766a49ac31fc590kernel-devel-3.10.0-1062.4.3.el7.x86_64.rpm7b463c4465adb7df3999bd90b1fedf9091df2ac31b8c5a6ebb965371ff8d73a1SLSA-2019:3888-1GhostscriptSecurity Fix(es): * ghostscript: -dSAFER escape in .charkeys (701841) (CVE-2019-14869)importantScientific LinuxScientific Linux 7ghostscript-9.25-2.el7_7.3.x86_64.rpmceb265008bc4c949408cccea197365896ca07576d7a4804b566e4754f3bafd68libgs-devel-9.25-2.el7_7.3.i686.rpm6ee4f5907ee50e370abf33ca181e4882995763ede699e797948483b3b032cdb6ghostscript-cups-9.25-2.el7_7.3.x86_64.rpmc317b4b6f81a110406f2b3c89824b5030b841c3a39fe254439fb4b0e8315971elibgs-9.25-2.el7_7.3.x86_64.rpm7020d4d7d3508197fc936b7ec0b5092001352b41114503434aaeca0b7053b460libgs-devel-9.25-2.el7_7.3.x86_64.rpmc7b64a1077134abd811636f6871b03f1bfe6d476da88bc70907f4212f9035d4aghostscript-gtk-9.25-2.el7_7.3.x86_64.rpm81b42b588f054534571a70bdc55c765044d9bfa9718c4644d64de50fa0e20d77libgs-9.25-2.el7_7.3.i686.rpm0f8d2279140e14480f3313c995c20fe5035b697306bd3835243c707e84a89823ghostscript-doc-9.25-2.el7_7.3.noarch.rpm67dc0fa1254d3e0aa16f95ce6dcc2f2ed542cf1a0586865f8bebece5cbaf5a53ghostscript-9.25-2.el7_7.3.i686.rpm6cd265e78bd8b71405eae320db4e68338bd3237b90a3f9a125f212313a293c88SLSA-2019:3976-1TcpdumpSecurity Fix(es): * tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix() via crafted pcap (CVE-2018-19519)lowScientific LinuxScientific Linux 7tcpdump-4.9.2-4.el7_7.1.x86_64.rpm0e998b4d908226530c1363ee88e0c8a57813486da5d1d18813c2ec1bca85d47aSLSA-2019:3979-1KernelSecurity Fix(es): * Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) * kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation (CVE-2019-15239) Bug Fix(es): * On SL 7.7 kernel SCSI VPD information for NVMe drives is missing (breaks InfoScale) * SL7 fnic spamming logs: Current vnic speed set to : 40000 * kernel build: parallelize redhat/mod-sign.sh * kernel build: speed up module compression step * Nested VirtualBox VMs on Windows guest has the potential of impacting memory region allocated to other KVM guests * NULL pointer dereference at check_preempt_wakeup+0x109 * Regression: panic in pick_next_task_rt * ixgbe reports "Detected Tx Unit Hang" with adapter reset on SL 7 * [Intel 7.8 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. * nvme: dead loop in blk_mq_tagset_wait_completed_request() when it is called from timeout handler * [mlx5] VF Representer naming is not consistent/persistent through reboots with OSPD deployment * OS getting restarted because of driver issue with QLogic Corp. ISP2532-based 8Gb Fibre Channel to PCI Express HBA [1077:2532] (rev 02). * mlx5: Load balancing not working over VF LAG configuration * SL7.8 - ISST-LTE: vimlp1: Running LTP af_alg04.c (crypto) crash the LPAR * SL7.5 - Fix security issues on crypto vmx * SL 7.7 RC1 - Host crashes about 4.5 hours into switch port bounce test * SL7.6 - cacheinfo code unsafe vs LPM * xfs hangs on acquiring xfs_buf semaphore * single CPU VM hangs during open_posix_testsuite * rcu_sched self-detected stall on CPU while booting with nohz_fullimportantScientific LinuxScientific Linux 7kernel-tools-3.10.0-1062.7.1.el7.x86_64.rpma05f3f703007285ffdc03adc54ba4bf7c26642c5a969245258229febcd1b2b8cbpftool-3.10.0-1062.7.1.el7.x86_64.rpmf59d52d8f5609dd918f9182341b25a0ca13584765df8e35b65a3c6c833956042kernel-doc-3.10.0-1062.7.1.el7.noarch.rpmfc11413f39840407354d49b4e38278e295ef2e30b207f431cd5bacf69b888287kernel-3.10.0-1062.7.1.el7.x86_64.rpm12f68c2dc34e2d7ccbc8bf156dd85f0316bf42db96c6e1510948a9d0fc0a288ckernel-tools-libs-devel-3.10.0-1062.7.1.el7.x86_64.rpm98eeefe7ecfacc0326e388561a01f8ee84a1d35de7f2701ba78cb62075d5db12perf-3.10.0-1062.7.1.el7.x86_64.rpm7e3c2e04003b37fc9768cae0a10c4a2ce40e8aaa779f2ca9652e5b94b5993b26kernel-abi-whitelists-3.10.0-1062.7.1.el7.noarch.rpma438b7b20c554eca776065b26d1d529ffef4b9aa43bbfff12130523f8778bbe1kernel-headers-3.10.0-1062.7.1.el7.x86_64.rpm3a32873cbbed8e5ebdb299796848c248ffb0d5a4f23f1ec6e9c41c731afba9a1kernel-tools-libs-3.10.0-1062.7.1.el7.x86_64.rpm2cc40436ce2a891e9876315d5e6717351b155214c383af466a6b3d74f0dac25bkernel-devel-3.10.0-1062.7.1.el7.x86_64.rpm91f31d186b219712f191dfd433a4b563a40502b905e292c9ca680bd206c15bfapython-perf-3.10.0-1062.7.1.el7.x86_64.rpm6de91cf17dd2e7280cd0981e013787e15d1ba0841da10b30d9084042e3cf588ekernel-debug-devel-3.10.0-1062.7.1.el7.x86_64.rpm2a948f8b38d105b33c4ccc795b37faf599e2f54dd0c5168aad7dbda3f8df8954kernel-debug-3.10.0-1062.7.1.el7.x86_64.rpm39abb1928dc778048af228989a613ed640475ad4b5b68b9238800d14f666b092SLSA-2019:3981-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: Read permission check bypass via the deref plugin (CVE-2019-14824)importantScientific LinuxScientific Linux 7389-ds-base-1.3.9.1-12.el7_7.x86_64.rpmb992265f3adeae49a77c83e5f54672cf6796ce98fd5448a3f26a986e15aa5107389-ds-base-libs-1.3.9.1-12.el7_7.x86_64.rpm55a99fc16001a415a752b2f20efc9e0772d9ebc6333ed708b908e1916a8e6601389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm58011db55e171d0323c3a46f9ba670eb7238f2ac237c0cc18edb5103d984d0b1389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm4019171a26172f2b674748bac8c13149a8ed54ad25277e5d739a41acec71be33SLSA-2019:4024-1SdlSecurity Fix(es): * SDL: CVE-2019-13616 not fixed in Red Hat Enterprise Linux 7 erratum SLSA-2019:3950 (CVE-2019-14906)importantScientific LinuxScientific Linux 7SDL-static-1.2.15-15.el7_7.x86_64.rpm293a9e77f42b6ac238dbc25a06ea0f92b38c120317f76020054303a62493da01SDL-devel-1.2.15-15.el7_7.i686.rpm3a76e50692d44dc09850bea3ff25b7c21ac7abebb91941c4138a4a33f694b2f9SDL-1.2.15-15.el7_7.x86_64.rpmcce6cd575ff5599bb662631eac9fa04f4eb40507f173f520e0351ea04a5b4d16SDL-1.2.15-15.el7_7.i686.rpme92de6951738ca492f73d919a50e030ea58ee36d3168a7e3efbec781e0e74de0SDL-devel-1.2.15-15.el7_7.x86_64.rpm01325c90ebbdf0c5c78d69ed74342c87433e2e6023d0684a09b57e5a1071a04fSDL-static-1.2.15-15.el7_7.i686.rpm9d23e24c6f4baa0c7071acd1bb6ae5c5cdd08d50baf2a5abe3bb6faeb3c47ad2SLSA-2019:4107-1FirefoxSecurity Fix(es): * Mozilla: Use-after-free in worker destruction (CVE-2019-17008) * Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) * Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) * Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-17011)criticalScientific LinuxScientific Linux 7firefox-68.3.0-1.el7_7.x86_64.rpm89abb1df077335d4923665277810732ccba6049222fc6a3e9ab1adb174ecc535firefox-68.3.0-1.el7_7.i686.rpmf09566293d1eb758bdbf38c42be97f21e9e34cf0671bd4e225cb29b79875b13cSLSA-2019:4148-1ThunderbirdThis update upgrades Thunderbird to version 68.3.0. Security Fix(es): * Mozilla: Use-after-free in worker destruction (CVE-2019-17008) * Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) * Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) * Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-17011)importantScientific LinuxScientific Linux 7thunderbird-68.3.0-1.el7_7.x86_64.rpm1b5f51e2be8e7df7bf6a3c91d9760cca15d48ed0a074839cab61032d237cbf2bSLSA-2019:4190-1Nss, Nss-Softokn, Nss-UtilSecurity Fix(es): * nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) * nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729)importantScientific LinuxScientific Linux 7nss-softokn-freebl-devel-3.44.0-8.el7_7.i686.rpm941f3150a0fa3ccb16d55ee2fa400f1ec1c6736431d9a94832837a494e929877nss-softokn-3.44.0-8.el7_7.i686.rpmefe0b2d8859df15c93ee8dba6852fe618aae28ff6ed5ec7ec577e4106456805cnss-devel-3.44.0-7.el7_7.x86_64.rpmf2819cfb2a896de0ff8fbefd23c70e828f220009f55b5aad5d9fe1a883f19b90nss-3.44.0-7.el7_7.i686.rpm4611534576064691157fece9d0c436568b23b63697b85c7bb2ad255e982f10fdnss-softokn-freebl-3.44.0-8.el7_7.x86_64.rpm523a80a6b06b06196ccc309739042570ed22193782f08f91e23d4da9d9fb76f7nss-softokn-freebl-3.44.0-8.el7_7.i686.rpm0311ef50716cc00cb2497c68d86f27e765edce722618602dd9b5305fe355ff54nss-tools-3.44.0-7.el7_7.x86_64.rpm26d5d9deac7d356e9f809c7a0cb6f6e37f59875afd950925bc60c4191e9a5931nss-softokn-freebl-devel-3.44.0-8.el7_7.x86_64.rpm4c5a91e43234e8234f4d56d570abb2d574cff79656d0a43dbb317f05109a5083nss-pkcs11-devel-3.44.0-7.el7_7.i686.rpme4ca8839e44d9578e63b9258b9ebcd81377a9ba88359506d1a09ffc8debcb859nss-util-3.44.0-4.el7_7.i686.rpma81be3bb2c1127550d8a0df16ac39da0e5502d6a3c9679b659f1fb092d316f19nss-sysinit-3.44.0-7.el7_7.x86_64.rpm154a6576cc083f1254a5c4870c6886c02030f68a8d10da6a726daed45f5d2434nss-softokn-3.44.0-8.el7_7.x86_64.rpme839b674ced6fa1a115538fdb0729959822343ce51163fa30bd8a01385e2bf3fnss-3.44.0-7.el7_7.x86_64.rpm7fa0c549868bbf6f4e408a65adf747dda0a339997016c38a5732d97f61cb5ff9nss-util-3.44.0-4.el7_7.x86_64.rpm467c3bcf5d2000a19f0f4aa15c02ccc73d484f4b393d0227183cccd1100ff3afnss-softokn-devel-3.44.0-8.el7_7.i686.rpm653c4ecb49f71731370c273ed96c936abcf825f6671d8b19b3390f159219c9f7nss-softokn-devel-3.44.0-8.el7_7.x86_64.rpmaf21dd3d1dda0da8f02f5f18ca35811c03dda3ea095f43f64aa348e254939265nss-util-devel-3.44.0-4.el7_7.x86_64.rpm66c639d5163020550f741153105c4d237d22926f9a5d2ef521c6e2c5d3679854nss-util-devel-3.44.0-4.el7_7.i686.rpm1f3429b800e8a585946ec771dfbfc21ad92519afb916a9965a7a0e709ddbff40nss-devel-3.44.0-7.el7_7.i686.rpmbf5c53e849f81348838a17a0e6a646767f6a62cbbb6cfe4b9d97a8ff5194f9c8nss-pkcs11-devel-3.44.0-7.el7_7.x86_64.rpm3a29745b29a90e8ff5abbf2d22a9b4cf3b152555e5a53ed7f65cd9c98f8c82ecSLSA-2019:4240-1OpenslpSecurity Fix(es): * openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution (CVE-2019-5544)criticalScientific LinuxScientific Linux 7openslp-devel-2.0.0-8.el7_7.x86_64.rpmc98df762efc91994747387a183e54d6365bfa83bfe74a608d1f42e5f42400d33openslp-server-2.0.0-8.el7_7.x86_64.rpmcf1e9b66622bea11895ee99e384bc573fc4c9f5bad886b420283fdb785ada711openslp-2.0.0-8.el7_7.x86_64.rpm9ac77cb21153493c097256a5a2ab983a048a715805813545403961f2638e2b13openslp-devel-2.0.0-8.el7_7.i686.rpm921ff9f839cf1f82ae10b5c90e9a38dfc83b31c8d855e190470a97ecaa0a4f7fopenslp-2.0.0-8.el7_7.i686.rpmd296cd473e61af81ef0f29f37c8bacf0375e8cb32d97d739b6544e8d78470d6bSLSA-2019:4326-1FribidiSecurity Fix(es): * fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib /fribidi-bidi.c leading to denial of service and possible code execution (CVE-2019-18397)importantScientific LinuxScientific Linux 7fribidi-1.0.2-1.el7_7.1.i686.rpmf23220491cb94364f5aaf4d7064d28a7911b651d5b9a764fb2030d30123e32cbfribidi-1.0.2-1.el7_7.1.x86_64.rpm89308ed4fcdf6775f0fb546d0dca2cb72ea07aeaa1e040cc1428128cff09b494fribidi-devel-1.0.2-1.el7_7.1.x86_64.rpmfe5002e289f8bd8a3608a2d08528783ef4ab112e493c2f30043fafded011856dfribidi-devel-1.0.2-1.el7_7.1.i686.rpm74ea2da2b06f1945a1675abf0e5141afdb4cb535555ff746917317843fa501acSLSA-2020:0085-1FirefoxThis update upgrades Firefox to version 68.4.1 ESR. Security Fix(es): * Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) * Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) * Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) * Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) * Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)criticalScientific LinuxScientific Linux 7firefox-68.4.1-1.el7_7.x86_64.rpm4aa490cb45ccc4e9fec6675b85f620cd1bfbcc04bd4aeb8dea448030d527a946firefox-68.4.1-1.el7_7.i686.rpm2431d0595402120a241cd3a5281390b60dfc94fbdd62e111b606eeaf49f57cf5SLSA-2020:0120-1ThunderbirdSecurity Fix(es): * Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) * Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) * Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) * Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) * Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)importantScientific LinuxScientific Linux 7thunderbird-68.4.1-2.el7_7.x86_64.rpm6c05501be4091d245f0153f8863cc3778983599079c9ae2b67d7e6bb580d9234SLSA-2020:0122-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) * OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) * OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780) (CVE-2020-2655) * OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)importantScientific LinuxScientific Linux 7java-11-openjdk-devel-debug-11.0.6.10-1.el7_7.i686.rpm97ae765cbeee8ec11956dfbdf238b7a66fa597391dfb0ec34928fd57c21656d4java-11-openjdk-headless-debug-11.0.6.10-1.el7_7.i686.rpm9466fe9386b85978f950a7a4bcbc2abfe3573c86e9de8c8221dc1fbf7f067b23java-11-openjdk-debug-11.0.6.10-1.el7_7.i686.rpm4fde268e1bea510d818ae7cba8f7cdd265e5589037ed57b38187fe2366379f3cjava-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7.x86_64.rpmee7e63a9f2f61c294f9d7f29f56962e4484b5a2f0f142d1a44f9de5e0cf628bfjava-11-openjdk-devel-11.0.6.10-1.el7_7.i686.rpm8f07b9baa8145f0aeaa46e4575bb3e444cd88877ed32e0df0de356b99643a003java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7.i686.rpmbba176e001406d67fda33722105fc510af8366905354aa41155ebb1d56f0f687java-11-openjdk-headless-debug-11.0.6.10-1.el7_7.x86_64.rpm782f5a98996b72ebb6489ad156950ef1bf60a355bec8b91c2bcacd880bf11f70java-11-openjdk-javadoc-11.0.6.10-1.el7_7.i686.rpm8f871e23c71789bad64af1f8feea12b366bdcd52387b725e3a1e3250c5c26afajava-11-openjdk-src-11.0.6.10-1.el7_7.i686.rpmf7bac68361b5f6749deff2f15bca09ce68f0e90345d1fc4ecd0f61ee33eb0d72java-11-openjdk-headless-11.0.6.10-1.el7_7.x86_64.rpm9508ca6aa6fe923e7f535804b2f7e3b4f4743d41c52248316e0947c5088eb550java-11-openjdk-jmods-11.0.6.10-1.el7_7.i686.rpmf432187e025460650af8ddd39f81271752131e6333fd147fee782184421e6c93java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7.i686.rpm03a18a3c29017750e221238a323af071cbd45791fa24fa37b81476cea48dd20ejava-11-openjdk-jmods-11.0.6.10-1.el7_7.x86_64.rpm583074faa25491cc042b28b6364763ee04796e0ed9a5de0762e04677a4b86966java-11-openjdk-src-11.0.6.10-1.el7_7.x86_64.rpm8aff8370d21a70b02e3a82c6816d9b3c891c469fa9e74e1c17bfe55d7a2b0e03java-11-openjdk-11.0.6.10-1.el7_7.x86_64.rpmad20cb7c66b78ebfd85edbeb9bbd30fbee2c443380fdffb866587aefcaa9f32bjava-11-openjdk-jmods-debug-11.0.6.10-1.el7_7.x86_64.rpm9cd1495b028add1aac2ece538889bebd80b76ca9c301f4c127bc30b83dbff8f5java-11-openjdk-demo-debug-11.0.6.10-1.el7_7.x86_64.rpm6b66d63dba28010b036df871aa158a1e9029b27c98d7467a246373e61a6b4635java-11-openjdk-demo-11.0.6.10-1.el7_7.i686.rpm982b457d0f4f444034db792078ed62dd4f942c6b608a00f292bd3f7f5e9e7100java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7.x86_64.rpm0104b3362fee91c162d2cde754448b2c94218fec823ef25ba2900f841dd914cdjava-11-openjdk-demo-11.0.6.10-1.el7_7.x86_64.rpm19c3c4c047d984c360d6a173b8f6e589abcbef395a491ed4805191a87510c725java-11-openjdk-javadoc-11.0.6.10-1.el7_7.x86_64.rpmc654e206ed4db458dfb49f7f7b8849a49e931694de95636149978abc2efac452java-11-openjdk-src-debug-11.0.6.10-1.el7_7.i686.rpm7fe91221d1054f71eb57406ffddb0270ccb9080bb3347236698a4b47e4e266fcjava-11-openjdk-devel-debug-11.0.6.10-1.el7_7.x86_64.rpm0b2697cc94e1ee86af1c9907291334fd0c818d15b3fe3e35ddd27979887f173djava-11-openjdk-devel-11.0.6.10-1.el7_7.x86_64.rpm68ef645650acffb65d6a2c5ae1cb4a97f5bda0f577f166c143fdc25cbfd8f4d1java-11-openjdk-debug-11.0.6.10-1.el7_7.x86_64.rpm8ad8632f4ef253fdcf6a9f28b008f0d450b485621334370f22bebbd7b933e181java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7.i686.rpma229a04f8ae72eee06af2aa012a1abc75b185c5aabfcdea2cf6f384e60fd988ejava-11-openjdk-demo-debug-11.0.6.10-1.el7_7.i686.rpmdbd47feefa9fae9e88d3327a9d707aa6141f6b6cdcc1ba4f076c1b73bc684154java-11-openjdk-src-debug-11.0.6.10-1.el7_7.x86_64.rpm0445e384bfb46d4f947d923911c1aee5d5146c27b92f8e95eb5b9b170d961795java-11-openjdk-headless-11.0.6.10-1.el7_7.i686.rpmda79afceedac1f62d98bd98f1df34e87e16fc677a018dc4f0803ec1cf0032cb4java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7.i686.rpmaadf5c6cc37786f2e77b4fd4d66901615ecc7ac8f736f64e847ac8752910f0bfjava-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7.x86_64.rpmf1320700ea6f52db3b6f48b7a7a0e0f328002ea4192228952b844a920699a705java-11-openjdk-11.0.6.10-1.el7_7.i686.rpmc116ade9eb3aaa4d988ab341a10c6c93b7f7405ef595946d00597ac69908ac8cSLSA-2020:0124-1GitSecurity Fix(es): * git: Remote code execution in recursive clones with nested submodules (CVE-2019-1387)importantScientific LinuxScientific Linux 7perl-Git-SVN-1.8.3.1-21.el7_7.noarch.rpm2162b4c4e3a4fe9429fb8f79b9cc60b51c936d81f98a12880db86ee82e5db6dfgit-cvs-1.8.3.1-21.el7_7.noarch.rpme3ddd2591519c91d33a7e6013b708b2aaf5cf0aa5f6913444b39ad32bbbb055bgitweb-1.8.3.1-21.el7_7.noarch.rpm7793132e4c0a4e8b2491e9981318b0e0590980d6197bcb160714ad3c4de34069git-email-1.8.3.1-21.el7_7.noarch.rpm8677bb51033b8e57cd430dcf3ba44fb615a86b4869c06e9ce498dcb4dd2f7254git-p4-1.8.3.1-21.el7_7.noarch.rpm59820b8ba25495b7537c5244a4c858a5ac32acfdab9273aad57b02cf458ef429git-gnome-keyring-1.8.3.1-21.el7_7.x86_64.rpma09ba4abf7020ac72edef850b93450ab580db4de8d4755dd80ca97d5f0705fd7git-daemon-1.8.3.1-21.el7_7.x86_64.rpmb52884597fee974fb795368aa996853bdec90aecb52d8f8f4add9d3720d2a6e6gitk-1.8.3.1-21.el7_7.noarch.rpm0342933206ac0bb2366a48dde0501437316b2b7637fd7354b49094920ee0a0d3emacs-git-el-1.8.3.1-21.el7_7.noarch.rpm88d3b6e815f9772b45905a3b0926c84bb2ea6f205059b65f046fe835f5646891git-bzr-1.8.3.1-21.el7_7.noarch.rpm212f7c7629db3c765683edd906cc286df814b6f875a53436a31366c14ac23484git-gui-1.8.3.1-21.el7_7.noarch.rpm82e75213647d7bf65cf382f79da4a8b6678ac9e837e9be0855b51ae40f91339cgit-all-1.8.3.1-21.el7_7.noarch.rpm9dde44bfdc20f5627cb4216183e9557699628cc83782cbf1b6e0df5287cec9dcgit-1.8.3.1-21.el7_7.x86_64.rpm1b445597abd8d68dcf18948d039addcfd692d8205d3eda3d1c5db6eff96d9ce5emacs-git-1.8.3.1-21.el7_7.noarch.rpm55fe3fcf0420f5ffb8c862609b1d0029075878d3d17f5fd5c25f684634169593git-svn-1.8.3.1-21.el7_7.x86_64.rpm12ed98b88a25be6a728aa8cd409024be313172dd2f371b9e4aa732c5471358d4git-instaweb-1.8.3.1-21.el7_7.noarch.rpmcae388a2afbaa98b888bfffcc9415a61d84f0b3eb034a6d2ee9bb16270b26f83git-hg-1.8.3.1-21.el7_7.noarch.rpm44751bed36d37955072044905935ea836a0b972b14ed6c952371c92112996073perl-Git-1.8.3.1-21.el7_7.noarch.rpm2b5d813c223b8790dde195188fe45200c3598ff53d6f5d401609a34023895f45SLSA-2020:0194-1Apache-Commons-BeanutilsSecurity Fix(es): * apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)importantScientific LinuxScientific Linux 7apache-commons-beanutils-javadoc-1.8.3-15.el7_7.noarch.rpm98b472b18fe8bce810c08ec0eb26380bb9d3ca4d7866497494c0b6dccfe96537apache-commons-beanutils-1.8.3-15.el7_7.noarch.rpmc99ec5164423f9a4793b49d48da92c1c593d3db669d7952c876d0e68be87774fSLSA-2020:0195-1Python-ReportlabSecurity Fix(es): * python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626)importantScientific LinuxScientific Linux 7python-reportlab-docs-2.5-9.el7_7.1.x86_64.rpm552b0e526e06517730dba733e3a0dddcb3b8fe8f8a0d506121a4035de8d18d47python-reportlab-2.5-9.el7_7.1.x86_64.rpm9b8b87477716bc1f8d3eb4606f506f551de3d2497707bbfcc687b73e0d3ca438SLSA-2020:0196-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) * OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) * OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) * OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7.i686.rpm717497708a7033e571f0f61b766dd9b821e28591865950ee91c75e439697d91cjava-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7.i686.rpm1e3f5120658683ef11266980fb73e716ce6f5ce5e85ceb70619361fdbe32f439java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm54f427fae1f961eeccdd6ce68781fc25e36c60cabceb5e463fd2f698f110ecd2java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm8e595ea034bbc56eabf461822f1fb05ee57189f13b8e89534dc92ee838aba601java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7.noarch.rpm2bf617aa79566f04338d46fd346890a0cbf2692a611969c924ccc250c334eb5ajava-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7.x86_64.rpm2f9f51b77cff48b013c101e4d0900d67f71d890f799c5fc1050e39b4cdc3460fjava-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7.i686.rpm1069f2a144663f0f77c4c8399dc3b204fae780c074cb68cbdd981ddf6dc10a4bjava-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm945ea95869f62cb6402a5627cb778c8a148dc630666f937df8375c59aa3bc123java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7.noarch.rpm409d3e08400259e30329c170048a427e1a2b646b6d77e7761c3c2a35d8e61660java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm8b46f74609d899f3b396168af5fdb47bfab16504d3382421dcaf0305d5fecad0java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7.i686.rpm70d7a907059f3e12da66053252d7410c3197a72d366896e61e57218a34170d23java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7.noarch.rpmb04084dddc589b56a6ae619e6ee1eaa28636c5b2aa84bed11548f84d8c819fcfjava-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7.x86_64.rpmecaafd42f5f76eea1ffb23f93266e2d0003f5de71b9236ed135d30a1bed32f1djava-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.x86_64.rpm828eff829769a5e9519e271dbbce2fb6cfb89519cd8b56f5224eeb6af62f9fb2java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7.i686.rpm9a167c41dd208870d7c4a3faf51063e782cb271f0d03e33bbc8a23d852bc8f0bjava-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7.i686.rpm97ede619a9fd73e4c82efa6ac461acfad400361cc7e277c031b492938f9b90dejava-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7.x86_64.rpmc7ff935e2150da10bff47654775843f2be10f7386240a46726d15b683d3b3180java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7.i686.rpm81535722a060ca73b844ccd67037288957ab4e34b004c56144283782ef9cdd21java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7.x86_64.rpmb9627b00aa20032ac92db4800e2a63052a707998240877f9f8741395ef171bf3java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7.noarch.rpmc43a14ff50e420e6082bac4a82779bd60007788385ff054e5ad1da323b28f166java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7.i686.rpmb5f0b5d6e2a6ef88c9f3d85e9a2eacbf49d11c76b98dbd431d627115bc9158aajava-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.i686.rpmbe1bab845e1ee4dbe1bf9489d05f087f960d62a912727003a32698cedd4fff79java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7.x86_64.rpmb4461162baf7612da51d42eda654400f705f5a9997dd83adabecc52394a4a54djava-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm555fd3f9099bb49f1086b7836e77bd53bc8e3a3a3a34de9f60a86bc9fdc46745java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7.i686.rpmf53471a410d34ac7af37504154b62f31db9956b19d66ef587284b7add44da770java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7.i686.rpm80ba983246e92994235e5e94124e153adf3500dd7de03a9a7a0848fcd927a680java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7.i686.rpmbce06ef2bbc9489fd94641c4b08dc21fc4a202467002cab62ccdbd621d7f2b4djava-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7.x86_64.rpme7d6174e3bce4adcc115f2a3b19931108e4dcac42d1c5a8a457306b8aff10371SLSA-2020:0203-1LibarchiveSecurity Fix(es): * libarchive: use-after-free in archive_read_format_rar_read_data when there is an error in the decompression of an archive entry (CVE-2019-18408)importantScientific LinuxScientific Linux 7libarchive-devel-3.1.2-14.el7_7.i686.rpm0cc2f7ac0c5642186c3bb5779bdfc5da651bedf7dea87c67a382a2f5f882c8c3bsdtar-3.1.2-14.el7_7.x86_64.rpm732525fbb720279190f83af5754f64c2250f78e82ab6313060bc0b341f595b3dbsdcpio-3.1.2-14.el7_7.x86_64.rpma64a51142a141052495c4650493174d99da67f794fb65e944a88b4081bb4b7cblibarchive-3.1.2-14.el7_7.x86_64.rpm653ab086e559d2ea562d3073828890e147e7cf1b8f91e5db63cee52891f78342libarchive-3.1.2-14.el7_7.i686.rpmaa6ab41a43076a37c860ee2cdd9d3487098b7c3b566a43e0092b0f9b168f2522libarchive-devel-3.1.2-14.el7_7.x86_64.rpm525e61608db869772013cdb15b5ce0b7545b244dae4cf25d1dd55848dcd83ef2SLSA-2020:0227-1SqliteSecurity Fix(es): * sqlite: fts3: improve shadow table corruption detection (CVE-2019-13734)importantScientific LinuxScientific Linux 7sqlite-devel-3.7.17-8.el7_7.1.x86_64.rpmb5a69b5f1a960930d0f34a03be888d4f4e2b6dd8fba5c9da541fb0bcb8456369sqlite-devel-3.7.17-8.el7_7.1.i686.rpmca45feae55907951d999f8818ee9865005e86c0500a16f622ccd3f7c375baf8alemon-3.7.17-8.el7_7.1.x86_64.rpmd6e23b6e2a6da0722a873983ff4d758feff99a4dbdd7a4f8647f758a848a9d52sqlite-doc-3.7.17-8.el7_7.1.noarch.rpm6c5be22ed80b7408119ab9e7f5c6f3d393d72b975fc20d05aeae0ce412d822absqlite-3.7.17-8.el7_7.1.i686.rpm3e0cd96e1b8cc53c760b2efc78c5d8360eefc98b8e1ad712adee4e7848d3fc8csqlite-3.7.17-8.el7_7.1.x86_64.rpmee7fbbd791f47640b5db00cfb874ea2f3f3cd0758ecbb80e2b04a8dc7c5fe91asqlite-tcl-3.7.17-8.el7_7.1.x86_64.rpm680e8ccf7fa92f2e7b687cb21f9283abe50a7c54dc473302113298a9e648eb1aSLSA-2020:0262-1Openjpeg2Security Fix(es): * openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor() (CVE-2020-6851)importantScientific LinuxScientific Linux 7openjpeg2-2.3.1-2.el7_7.i686.rpmf09c869a14d0330b165ab26324c5bbadb8029f032c0672157a42ef68193d675dopenjpeg2-devel-docs-2.3.1-2.el7_7.noarch.rpmbfa8c48a10425ac5047a8488da6103d0035e7ec9475414b1e0b1da54ffada79dopenjpeg2-tools-2.3.1-2.el7_7.i686.rpm153826fc6f578eb08adfd6a77557d883f21492db8fd9998307ef95ea81db4b6dopenjpeg2-2.3.1-2.el7_7.x86_64.rpm0443ad8a7880ca1f0988a3e112cf07f6285ec90f4012ada8c5452713470de4d5openjpeg2-devel-2.3.1-2.el7_7.x86_64.rpm40793a6523c6cfc309b1bdc3011668e172ab89d1dccebf401700f99f68e15341openjpeg2-tools-2.3.1-2.el7_7.x86_64.rpm9bb74281089d3b27094cd36f8af97785c1137618b330499117651ad701e3fd68openjpeg2-devel-2.3.1-2.el7_7.i686.rpm6fe1720011f65c9d1acfb6506fa903d786e062be3f3ff178bb3329dbcb7e5812SLSA-2020:0366-1Qemu-KvmSecurity Fix(es): * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) * QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)importantScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-167.el7_7.4.x86_64.rpm99adb41d4bfacb07a0f99829ece6b0f309d1953227001682f38b00d0a879ebabqemu-kvm-1.5.3-167.el7_7.4.x86_64.rpma6cc5f4fde94c75bc6a0d69d46703eb62937195ebd1fa5d9c4d12c4ae2051b17qemu-img-1.5.3-167.el7_7.4.x86_64.rpme4cb8aecb40be801731a1d7d39f14f967faac4f7795d78ce7b35160e02c690c8qemu-kvm-tools-1.5.3-167.el7_7.4.x86_64.rpm3b041f07cb95a6fd5a4a231ce47b8dba86e520510a53602ca794b093d4cf6777SLSA-2020:0374-1KernelSecurity Fix(es): * kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816) * kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895) * kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901) * kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c (CVE-2019-17133) * kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 (CVE-2019-14898) Bug Fix(es): * [Azure][7.8] Include patch "PCI: hv: Avoid use of hv_pci_dev->pci_slot after freeing it" * [Hyper-V][SL7.8] When accelerated networking is enabled on RedHat, network interface(eth0) moved to new network namespace does not obtain IP address. * [Azure][SL 7.6] hv_vmbus probe pass-through GPU card failed * SMB3: Do not error out on large file transfers if server responds with STATUS_INSUFFICIENT_RESOURCES * Since SL commit 5330f5d09820 high load can cause dm-multipath path failures * Hard lockup in free_one_page()->_raw_spin_lock() because sosreport command is reading from /proc/pagetypeinfo * patchset for x86/atomic: Fix smp_mb__{before,after}_atomic() * fix compat statfs64() returning EOVERFLOW for when _FILE_OFFSET_BITS=64 * Guest crash after load cpuidle-haltpoll driver * SL 7.7 long I/O stalls with bnx2fc from not masking off scope bits of retry delay value * Multiple "mv" processes hung on a gfs2 filesystem * Moving Egress IP will result in conntrack sessions being DESTROYED * core: backports from upstream * kernel BUG at arch/powerpc/platforms/pseries/lpar.c:482! * Race between tty_open() and flush_to_ldisc() using the tty_struct->driver_data field.importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-1062.12.1.el7.x86_64.rpm678df641a81fd93cbfcfd40920cedc1f3b7e3695150d5a6fbbbd6d0cf6047513kernel-tools-libs-3.10.0-1062.12.1.el7.x86_64.rpmc9b728fae4d85bbaa20e176cfb00f642e1bf1802b02cdfe9d39e04204b34098ekernel-headers-3.10.0-1062.12.1.el7.x86_64.rpm7c973327b37ca38c1e700823e7d01b0a8ad4155122feff8e419ec4693b9544d6kernel-doc-3.10.0-1062.12.1.el7.noarch.rpmac4ed5265d0c02061c41193a3e12bd3165ee5617ba628f7a410c51e799bbbeedkernel-3.10.0-1062.12.1.el7.x86_64.rpmfdc18e2f637c04eb92abb2650a37f186a50e15cbff8ae56ec296b36f445b3726kernel-devel-3.10.0-1062.12.1.el7.x86_64.rpm3615f4a9cb7aef285bba47f901242445161a4d16151a884dffa01b1d254ecbe1bpftool-3.10.0-1062.12.1.el7.x86_64.rpmba9aad83c3de995708bb3d7e5c4400567bced1b4a48e6dcbebec70a3554ade34python-perf-3.10.0-1062.12.1.el7.x86_64.rpm9a4501600513edf7980b6e201a2e836f68ec90cb6ebee4c664f0be81583675a1kernel-abi-whitelists-3.10.0-1062.12.1.el7.noarch.rpm398c5671cb36044813412900d10d37b55e14d95923c9aa7e6c34d2533e17074aperf-3.10.0-1062.12.1.el7.x86_64.rpm0b7fa3d1f43787e42f8e74e62e1ac0296eccac6c793f188f1c0b2a7dfeccf02fkernel-debug-devel-3.10.0-1062.12.1.el7.x86_64.rpm27c77dcaaa3fe4662dc2e6bc7352cdf3e6f9324aa2b7288f00c9770e93e41503kernel-debug-3.10.0-1062.12.1.el7.x86_64.rpm7f2d6bac01fefb630bb4ca6a05d83353c73f76da24066efbce6f3268dfcdd2ddkernel-tools-libs-devel-3.10.0-1062.12.1.el7.x86_64.rpm342c41e6e16dc17163d2267929ffa6f1491110dedfaaf35bab5a704936acbbdeSLSA-2020:0378-1IpaSecurity Fix(es): * ipa: Denial of service in IPA server due to wrong use of ber_scanf() (CVE-2019-14867) * ipa: Batch API logging user passwords to /var/log/httpd/error_log (CVE-2019-10195)importantScientific LinuxScientific Linux 7ipa-common-4.6.5-11.sl7_7.4.noarch.rpm7b1852d36bbbb09d30b24b0e293eccc434ddc2a65d3abc1d2c9ef5ba0e5ba9f2ipa-server-trust-ad-4.6.5-11.sl7_7.4.x86_64.rpmf5abcf4e281590b38d237213acc0e59332574d773c928d459351330dbf74508bpython2-ipaserver-4.6.5-11.sl7_7.4.noarch.rpm3cbd6ff946df6c34a43dfa8fb1615fdc67e8720d50472e55842135fd15ed29c2python2-ipaclient-4.6.5-11.sl7_7.4.noarch.rpm6479a9dc9ce9df5ecfaa1c2408f54463d7415548556c0baba3e578df3705b1b1ipa-server-4.6.5-11.sl7_7.4.x86_64.rpm180de961de0bbfd64888fe7cea257f8810a0d33f1988a676f3f3101209f39caeipa-client-common-4.6.5-11.sl7_7.4.noarch.rpm8eb3f12e3b3269fd7e2e1820d364f04e13b0ea3b9e1d942d3a949d095d531d96python2-ipalib-4.6.5-11.sl7_7.4.noarch.rpm3c48403dcaf45da4932abc0c519589dc679e551079e797d45f012c6508b2dd80ipa-server-dns-4.6.5-11.sl7_7.4.noarch.rpm0f822699bbbc6ae9a621e00d1ce688119df166a78d70b62f4017f745a87362a6ipa-server-common-4.6.5-11.sl7_7.4.noarch.rpme79c2d28aa6faea4ed498c4596a5e92002655dd4111c77196959179583bc2d45ipa-python-compat-4.6.5-11.sl7_7.4.noarch.rpm1bf34c8b0f25e6b952e5d5fd343547fac2794336494ce1b691ddf142e16b1aa8ipa-client-4.6.5-11.sl7_7.4.x86_64.rpm8e63051595bbc6af6bbe7b1983b42a7a1dee191f8abc0154e1b9ec0001cefcabSLSA-2020:0520-1FirefoxSecurity Fix(es): * Mozilla: Missing bounds check on shared memory read in the parent process (CVE-2020-6796) * Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800) * Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798)importantScientific LinuxScientific Linux 7firefox-68.5.0-2.el7_7.x86_64.rpm175699e39486c45858d9496ca1230e1c8e4e5463d9b10e1bde45897184fc2fa9firefox-68.5.0-2.el7_7.i686.rpm6e1418713ff4949b278fe5595f3765f83bb173b149ac7e7dfc6cdca2f4a3c371SLSA-2020:0540-1SudoSecurity Fix(es): * sudo: Stack based buffer overflow when pwfeedback is enabled (CVE-2019-18634)importantScientific LinuxScientific Linux 7sudo-1.8.23-4.el7_7.2.x86_64.rpm2a0983d382baccae0a2b20635df66f8b45e4e68d86ef99a6b50bb616dc918d54sudo-devel-1.8.23-4.el7_7.2.x86_64.rpma280d8794e307450fc85171837c769e3c856446f27f634156f3475d1ba08f08dSLSA-2020:0541-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) * OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) * OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) * OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7.x86_64.rpmf7ebfb5ed0c2c10ad6f70180fe640a0141b2d7065c2fb4c1b506e1e67c78e12bjava-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7.noarch.rpm74ecb156bebeb43b8cc843c9288642ad923b7a0e949874a79239a7b401df7509java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7.x86_64.rpmf7a70c4f7609c54b5b62dd0a3cad5056a67b02219804a1d3d16c5a7d07113aacjava-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm21039ad614cb33f7d1315a6d9d39d16f9ff72b64a3801eda4783ff2c24e6388fjava-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm1943f705c257331671a603efd1ad86f98bb4ecc5a5d84b4ce103fcd993dfa7c4java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.x86_64.rpmcee782279d763c673ae4068f27c6e7db66c7b109fd11fe02ba9196471ebc4594java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7.x86_64.rpmc8e3bd91e252b8f5e256f40f4e09a6cead43df4a8bef5c439f9576b9d7231520SLSA-2020:0550-1Openjpeg2Security Fix(es): * openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c (CVE-2020-8112)importantScientific LinuxScientific Linux 7openjpeg2-2.3.1-3.el7_7.i686.rpm059dde7537851f6dc7756c7bdf8aa7af0d7bb0ee04f3c0c8d9c409a9d2df8be5openjpeg2-tools-2.3.1-3.el7_7.x86_64.rpme03f2c1aba39f70bd1d7c9e3d77729393488fe0e990f2f2f3e7648fe46c13ee0openjpeg2-2.3.1-3.el7_7.x86_64.rpmc58a91b3d8572df5ec1035fb963a50ba14dcc86475cf50b3b834ac5aab1b0775openjpeg2-devel-docs-2.3.1-3.el7_7.noarch.rpm01290ac606e5820379fb688b6b0a05694ab57949d49ce3bda6dad2a29f45d69aopenjpeg2-devel-2.3.1-3.el7_7.i686.rpmef22a60d67a2ae98a63f471d8a7d5da921466f4207d65c24b9925de29980ffc4openjpeg2-devel-2.3.1-3.el7_7.x86_64.rpm126b0e9f6dc38e0a18205f32290e367a0428e2d8fe8f5ff4336fc5c30f87a040openjpeg2-tools-2.3.1-3.el7_7.i686.rpm9a42e995d4c9dab1bfd4a120a13374673ce443cf28352490c947ed06b7b19bc3SLSA-2020:0568-1KshSecurity Fix(es): ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection (CVE-2019-14868)importantScientific LinuxScientific Linux 7ksh-20120801-140.el7_7.x86_64.rpm93ea15c7942bc73a8cfe8a36c20d8304b5496c2167369b073240d5e6ae6df625SLSA-2020:0576-1ThunderbirdSecurity Fix(es): Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800) Mozilla: Out-of-bounds read when processing certain email messages (CVE-2020-6793) Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords (CVE-2020-6794) Mozilla: Crash processing S/MIME messages with multiple signatures (CVE-2020-6795) Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798) Mozilla: Message ID calculation was based on uninitialized data (CVE-2020-6792)importantScientific LinuxScientific Linux 7thunderbird-68.5.0-1.el7_7.x86_64.rpm6f1cf3ad1169f6cb72de7698056e27375e33b76776d55bb4d66b0f980a8cf0d7SLSA-2020:0578-1Python-PillowSecurity Fix(es): python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312) python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)importantScientific LinuxScientific Linux 7python-pillow-tk-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm9a01184939d4815d1cdf54eb3e445ae68eb4dd48a904fd4a7ea01a6dca75bdaepython-pillow-sane-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpmeb876da3a660b89a307f203226b1ff473d9b64fe3ddc0a15be72894c03045f28python-pillow-doc-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpmd59f714fb4d82265456809b87f7638150234709fc68f7f9c9bf3d083b28bdfe0python-pillow-devel-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm89d889079dd5ee2a4530d0515c42222630fb30d8943c6c2ee44c442fd8d58a49python-pillow-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpmcd338138e9b4f1fcf2af4c0f14634bcc575cf00a1f2d5eb75e8270b3507ce12bpython-pillow-devel-2.0.0-20.gitd1c6db8.el7_7.i686.rpm8ee0e753216a22e34ae1b1e71a2d14fe83e7e2fe98cc6bb91cd5233edbc39432python-pillow-2.0.0-20.gitd1c6db8.el7_7.i686.rpmeebb3e573fb8538d36ddfd7a8678b1924d86b045ffbe28e74cda0f2ec4cf1767python-pillow-qt-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm1ba70357d951b45b0ef0898a4703285e8bad8a63af13244cdc10e6949becaa77SLSA-2020:0630-1PppSecurity Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)importantScientific LinuxScientific Linux 7ppp-devel-2.4.5-34.el7_7.x86_64.rpme7c6832368636f2a647dbb994be772bb4f325bbd6f38c7895f3cd3ea56fd56e9ppp-devel-2.4.5-34.el7_7.i686.rpmbbcd5ab1611f1a4a2323afd1ba11d1cd870992757ee25b16ac785226d4d31b3cppp-2.4.5-34.el7_7.x86_64.rpm8468a95c88796f4c58d3a4f765c31f42cf7fe38d1a715e4a324316d28aa67c05SLSA-2020:0703-1Http-ParserSecurity Fix(es): * nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)importantScientific LinuxScientific Linux 7http-parser-devel-2.7.1-8.el7_7.2.x86_64.rpm6a61bc6d5de0d5f50ea54528de095131f9b4f07a7f8f0a41004b6fbdb56a9a3chttp-parser-2.7.1-8.el7_7.2.i686.rpm4a9b2db6354b8d42a3aac260c026d6a04ef1f6993c1a588c6d6e60e787b342f7http-parser-devel-2.7.1-8.el7_7.2.i686.rpmac4a73bc8cf0b942d7543272ee7c600262bb5572db23273638f60d9b3723e679http-parser-2.7.1-8.el7_7.2.x86_64.rpm6a50ce65455a4f6b584e1406473a4892f8c61a9d88e42865cb7f5f8b63fa30acSLSA-2020:0704-1Xerces-CSecurity Fix(es): * xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs (CVE-2018-1311)importantScientific LinuxScientific Linux 7xerces-c-devel-3.1.1-10.el7_7.x86_64.rpm9c6982620609b837e25da54ccf1372ab92a7560d05c0d4c46bbfa45e43187285xerces-c-devel-3.1.1-10.el7_7.i686.rpm9dcb5caccbdd245eaa140b4783824ba134030677850b03bc837eb816d54bf6d8xerces-c-3.1.1-10.el7_7.i686.rpm0c961eedcb6caadf75f6d2fedd84f5da31b524edc2aa77d223a71281d47262dfxerces-c-doc-3.1.1-10.el7_7.noarch.rpm2de81100d58f2179f44e8dab3a6b632ec359946a90c91bfd1f9e324bf9a9e258xerces-c-3.1.1-10.el7_7.x86_64.rpm187263e91b89b8e7563d2819ac02c758c7e06b7ffeecc222617d9c6b001d52bcSLSA-2020:0815-1FirefoxThis update upgrades Firefox to version 68.6.0 ESR. Security Fix(es): * Mozilla: Use-after-free when removing data about origins (CVE-2020-6805) * Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806) * Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807) * Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814) * Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503) * Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website- controlled data, potentially leading to command injection (CVE-2020-6811) * Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)importantScientific LinuxScientific Linux 7firefox-68.6.0-1.el7_7.i686.rpm88cb26207d17f77e32c4410bfe7397ce686f318d2750b82a29b190af4bde8f9afirefox-68.6.0-1.el7_7.x86_64.rpm58086f74ec53209bcfa1174c6501b4695ce714acb0a3fe0b6ce47640eaa58936SLSA-2020:0834-1KernelSecurity Fix(es): * kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487) * kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666) * Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135) (CVE-2019-19338) Bug Fix(es): * SL7.7 - default idle mishandles lazy irq state * Sanitize MM backported code for SL7 * A bio with a flush and write to an md device can be lost and never complete by the md layer * [FJ7.7 Bug]: [REG] Read from /proc/net/if_inet6 never stop. * SL7.7 - zfcp: fix reaction on bit error threshold notification * SL7.7 Snapshot3 - Kernel Panic when running LTP mm test on s390x * Leak in cachefiles driver * VFS: Busy inodes after unmount of loop0 when encountering duplicate directory inodes * Allocation failure in md's r10buf_pool_alloc function leads to a crash from accessing uninitialized pointers * [Hyper-V][SL7.6]Hyper-V guest waiting indefinitely for RCU callback when removing a mem cgroup * A bnx2fc abort attempt doesn't timeout from miscalculation causing a huge timeout value * scsi: libiscsi: fall back to sendmsg for slab pages * SL7.7 - kernel: avoid cpu yield in SMT environment * SL7.6 - kernel: jump label transformation performance * drm radeon power management warning on VERDE cards * Duplicate enum value in include/linux/blk_types.h * [HPE 7.7 Bug] hpsa: bug fix for reset issue * System Crash on vport creation (NPIV on FCoE) * [Hyper-V][SL 7.8] Four Mellanox Patches needed for kernels that have that have SRIOV * WARNING: CPU: 7 PID: 2049 at mm/slub.c:2296 ___slab_alloc+0x508/0x520 * fio with ioengine=pmemblk on fsdax failed * [HPE 7.7 Bug] hpsa: bug fixes * perf top -p PID does not show anything * Delay in RT task scheduled. Incorrect nr_scheduled value. * A directory on a gfs2 filesystem appears corrupt on nodeB after nodeA renames the directory * ixgbevf interface goes down on hypervisor and causes outage * Can't enable virt-ssbd on some AMD hosts * [HPEMC 7.8 BUG] x86/boot/64: Avoid mapping reserved ranges in early page tables Enhancement(s): * scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show'importantScientific LinuxScientific Linux 7bpftool-3.10.0-1062.18.1.el7.x86_64.rpm15b27b60c6abec50a3e579a2fbe9b44cc6a79e0822c38d319edecf5f47c781cdkernel-doc-3.10.0-1062.18.1.el7.noarch.rpm04fbe850802d58e3b2e3687f2140db4842e6a2054a6de580b8c43e7b4de6e461kernel-3.10.0-1062.18.1.el7.x86_64.rpmad2d3f07961fa26652945b0eefb2c831d1d31ab0aaaa424dd0f3bf5beef4ae9ckernel-debug-devel-3.10.0-1062.18.1.el7.x86_64.rpm384b51e810e0668328ba8b978c03167475cbb00c0b73ccf0bdd096d81582964ckernel-tools-libs-devel-3.10.0-1062.18.1.el7.x86_64.rpmfdcebc135c16d897fcebdc49df9bb55ef9163e12e98b36f62d7502fc4697e29fkernel-devel-3.10.0-1062.18.1.el7.x86_64.rpmc529d11d6cb3f355d9e270b8ef0a1bda91fa3e7b1615e6777897c084a047081dpython-perf-3.10.0-1062.18.1.el7.x86_64.rpm8d82ad81a6f1143e244f3e5e51401be1457b0c831d68f7ddf4bb4af9d318b0cekernel-headers-3.10.0-1062.18.1.el7.x86_64.rpm55a7bb9d091432175915295858c27501d3ecd67c827ab4cd67b36428aa83817fkernel-debug-3.10.0-1062.18.1.el7.x86_64.rpm4139f61327cbe9ce9d5fb33866ef7527ec0f0b1b63bd3870c16df70cdd279baekernel-tools-3.10.0-1062.18.1.el7.x86_64.rpme9512b3c7e9cd4dfab6d46b9bb16edd69daeb3db60ed86dc742272e123d6a1c1kernel-abi-whitelists-3.10.0-1062.18.1.el7.noarch.rpmb374b706c3ee5f983ad07eab2356a7cb81a67ca5731eff4c1bac1831cf863cf1perf-3.10.0-1062.18.1.el7.x86_64.rpm4d3ae0654a52d68aa7d5d98a45c85dbe69fa91882d4d9287af9c36799da54fdakernel-tools-libs-3.10.0-1062.18.1.el7.x86_64.rpm1ab2836bce97f4f239e4ede7fc9416cc514c5a6682eff353adebd449953c8430SLSA-2020:0850-1Python-PipSecurity Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)moderateScientific LinuxScientific Linux 7python3-pip-9.0.3-7.el7_7.noarch.rpmc18ccab066d89eae69c10565c5b66be611fe72b63f49403109a1f648343e2b7bSLSA-2020:0851-1Python-VirtualenvSecurity Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)moderateScientific LinuxScientific Linux 7python-virtualenv-15.1.0-4.el7_7.noarch.rpm0ab1fc8fa3937b844dc11e7fa58d53d520e7a13fdfebc29c41fc51d020b58e20SLSA-2020:0853-1ZshSecurity Fix(es): * zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044)importantScientific LinuxScientific Linux 7zsh-html-5.0.2-34.el7_7.2.x86_64.rpm4b38cf11956e7571e4bd366bee17882082d5408c8adf33c45a592237882f018azsh-5.0.2-34.el7_7.2.x86_64.rpma49b04839177e93a489a28b91e43e20d39d7b7cf27f0e9c167ec18ba9d979d42SLSA-2020:0855-1TomcatSecurity Fix(es): * tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability (CVE-2020-1938)importantScientific LinuxScientific Linux 7tomcat-servlet-3.0-api-7.0.76-11.el7_7.noarch.rpmd19028a7be2470720f852678cb19939ecc95dcc31619f9dda1334aeab787a650tomcat-javadoc-7.0.76-11.el7_7.noarch.rpm873bcf3de628f118510280491113f225bfa4d726037b3febafc573717974ef32tomcat-jsvc-7.0.76-11.el7_7.noarch.rpm8abadce8deeda47eb4c198ce7c4c1ae991751ae267d6ee08a73a0a32bd32e99btomcat-jsp-2.2-api-7.0.76-11.el7_7.noarch.rpmced0dc7fe005335b65b542207c35f1a7f9574420e10828ed1c258d5ee52e855atomcat-lib-7.0.76-11.el7_7.noarch.rpmc989defcba861abf249c8247e935ef77a6e24d8e03fbce9825fa7ca92073ca0btomcat-docs-webapp-7.0.76-11.el7_7.noarch.rpm91e5dafa58e19c0a6ab13d82ea86e462c388c60c0bbeeece2997c23ac8832e2atomcat-7.0.76-11.el7_7.noarch.rpm4936de1712d833283822d5515f50e5bbc45fcdb543be89d49d0078967f3a212ftomcat-webapps-7.0.76-11.el7_7.noarch.rpme22b22b10fba4b5aa6d22250bf2c5a112295c2e837ea81668d5c6e60db1912d4tomcat-admin-webapps-7.0.76-11.el7_7.noarch.rpmb4ce51368ed5943129e3f2a7d224992681588f7c48abf119d9ff3927ac943e80tomcat-el-2.2-api-7.0.76-11.el7_7.noarch.rpme23ae1f4532b4c933362efbdd98d1542c17fdebff5e81de942e60fcb83b9219aSLSA-2020:0897-1IcuSecurity Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)importantScientific LinuxScientific Linux 7libicu-devel-50.2-4.el7_7.i686.rpm40140bcf1a104ca5e33ea0a2e9c0c85d1fb3a50e666c196d8f9fe7e1c32089e2libicu-devel-50.2-4.el7_7.x86_64.rpmfad4a0d6535549306d65e54b12feb572aa25ac7879ed9e97f51c7e44ffef88aelibicu-50.2-4.el7_7.i686.rpm1133c8f24b2cef8f9ab8debac53cd6065f3ca89cab3ba8cef9b8ff5b6d441c64icu-50.2-4.el7_7.x86_64.rpm976e3b73467d16abcd82f0d2baeca50966ea2ce874eb8aed0b83789c5ee9ccb1libicu-50.2-4.el7_7.x86_64.rpm3e2eeea9ccf5b04619edd469f5154004fb07685af25ac99dd2cf6a2513d775bclibicu-doc-50.2-4.el7_7.noarch.rpm35aa86936a25bd792a8cdcd1fd9fb5ed0b2558fe51eea44067f84f51c1f50bfdSLSA-2020:0905-1ThunderbirdSecurity Fix(es): * Mozilla: Use-after-free when removing data about origins (CVE-2020-6805) * Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806) * Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807) * Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814) * Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503) * Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection (CVE-2020-6811) * Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)importantScientific LinuxScientific Linux 7thunderbird-68.6.0-1.el7_7.x86_64.rpm93f78377831f2a42bebf4510767fc96dbbc0786f91048358ac95199ce827959cSLSA-2020:0913-1LibvncserverSecurity Fix(es): * libvncserver: HandleCursorShape() integer overflow resulting in heap-based buffer overflow (CVE-2019-15690)importantScientific LinuxScientific Linux 7libvncserver-0.9.9-14.el7_7.x86_64.rpm4ce9bcc81c5e73162ec9317c66b66e39ad183df86a48f3c2c934f215c741cd0elibvncserver-devel-0.9.9-14.el7_7.x86_64.rpm44424e89b258932d51a2a4e1499ded842e05e45b8341a3ff53914ad9897c3e9flibvncserver-devel-0.9.9-14.el7_7.i686.rpm6c23b682e9efbfa7ed90e8d7c137792a3c5c496aba8b31284787482e6314cb43libvncserver-0.9.9-14.el7_7.i686.rpm517772e158f8ee469b9cb32761ec5baa384ea7739e108f3c3cc628f0d3d432b1SLSA-2020:0984-1IpmitoolSecurity Fix(es): * ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c (CVE-2020-5208)importantScientific LinuxScientific Linux 7bmc-snmp-proxy-1.8.18-9.el7_7.noarch.rpma983e96bea5aeb0b9563f65d7bf687142a9b7e8e3857976c9d9dd896d4faca79ipmitool-1.8.18-9.el7_7.x86_64.rpmf47b232bc0d2de0dfea63dc6d0987fc322026d1b73e6b3c4b8f3c1e9465ada8eexchange-bmc-os-info-1.8.18-9.el7_7.noarch.rpm7ea6f62e7c6e7d82eb5513ea02ce0dd433397289b60553a5e4494bdd67ec4ce7SLSA-2020:1000-1Rsyslog* rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c * rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.cmoderateScientific LinuxScientific Linux 7rsyslog-udpspoof-8.24.0-52.el7.x86_64.rpm054274aa227e4fe3b55ec71e6a3f7927150334c19eda2520e3035de8028e08c9rsyslog-snmp-8.24.0-52.el7.x86_64.rpm592719bab9955cc7930b8dcbaf72908c594e3f803440f48cad00d47144575486rsyslog-libdbi-8.24.0-52.el7.x86_64.rpm3c0fb154e76585e524848ea794ffdfbb48042344755f097804cfba7ed3e9fc86rsyslog-doc-8.24.0-52.el7.noarch.rpm13e0f961f1a1d3c61f9311e2ab7040c099cd75f1a416961edd9cfedea05b252crsyslog-mmaudit-8.24.0-52.el7.x86_64.rpmc7439980fc256f6155ea5f1b14b60f13c3421c3b65b33cdfbde7e62a58f252dfrsyslog-relp-8.24.0-52.el7.x86_64.rpmb23d8d2063183b677364a4f08a7cd2e35b8676ec7a3335582ca8d66057acb82drsyslog-mmkubernetes-8.24.0-52.el7.x86_64.rpm2f224c163f06583c0f9d99b2d6d215dca194512d97d98ee0a619febae2efd4ddrsyslog-gnutls-8.24.0-52.el7.x86_64.rpm70b15b27225a692912f388f13ba387a1ffa0fa64c633730a900b64d9cf134c31rsyslog-mmnormalize-8.24.0-52.el7.x86_64.rpme35a646f0ec31f7a423d74d74c339701f28704be8bc8546dde925701c62fd842rsyslog-crypto-8.24.0-52.el7.x86_64.rpm29d90d976c52475c09fdb8bb2e0f64bf7802a87c7af4bc826ce48a3038c9b47brsyslog-elasticsearch-8.24.0-52.el7.x86_64.rpme86d1b6835415282527fa2b42ec9d224ce8b15f40e782006f1b8fc6093221923rsyslog-mmjsonparse-8.24.0-52.el7.x86_64.rpm2838add15e23220dbe64fd66d3f8ceedf2fc76ae0878b97da5ab6713d374e846rsyslog-mysql-8.24.0-52.el7.x86_64.rpmdd107f8c819e4b43a78414cb4162764b79fc252f167a46c14a7da163e8d6bd9drsyslog-8.24.0-52.el7.x86_64.rpm53fc086d770d38f543be3d35860cebe34c5a0d571f4c79b92055a617e8bcc16frsyslog-pgsql-8.24.0-52.el7.x86_64.rpme56cfbd72ff9b1b7b73ac4ff602f2100d20cc7591ffcc77557bfa41b60a58744rsyslog-gssapi-8.24.0-52.el7.x86_64.rpmb9c6d4384a8bad53de6f964f45e0ecd9c53e69f5eab1cfa8185ab5cd9df34c93rsyslog-mmsnmptrapd-8.24.0-52.el7.x86_64.rpm9797bfee7e8453399ed24380cba0b1a12abbf647ea740b4931ecf8894f168150rsyslog-kafka-8.24.0-52.el7.x86_64.rpm379976f284bbf9fefab125dcbc7b7227576a9ff095c6c2e836d869b314714b43SLSA-2020:1003-1Mod_Auth_Mellon* mod_auth_mellon: Open Redirect via the login?ReturnTo= substring which could facilitate information theftmoderateScientific LinuxScientific Linux 7mod_auth_mellon-diagnostics-0.14.0-8.el7.x86_64.rpm22b333e13396e543dd8054d76e6e1c6985bee59ae305607f3ac5ddf28b38620cmod_auth_mellon-0.14.0-8.el7.x86_64.rpmc48105c86c2bbdbe32d4d82f4d8424b32ead66f663aecc1d1c9e8d0893aee87fSLSA-2020:1011-1Expat* expat: Integer overflow leading to buffer overflow in XML_GetBuffer()moderateScientific LinuxScientific Linux 7expat-devel-2.1.0-11.el7.x86_64.rpm3b30147bb8cc10ba6c987030e273b87e12fc62229dc55286097ac4af9127d7a1expat-2.1.0-11.el7.i686.rpm0d487af4044dc0998baefb06d2cf8e0bee06decaffe9e6c28f2e13f3d12ac41fexpat-2.1.0-11.el7.x86_64.rpm583fd88a4116685b83112e8332bc5bbbc7909ddf783e5f6fd0f0eea33e0eebedexpat-static-2.1.0-11.el7.x86_64.rpm6a4e066bcdbcc56c60ba96fc9415134eae09679ae1d5d347bdfd0785facd1abbexpat-static-2.1.0-11.el7.i686.rpm2db032c6d7fd89e1ea29ef8de7d74ea9f60f4b7d2a635b410afcb2a5e003f012expat-devel-2.1.0-11.el7.i686.rpmde6733bdeb210a9fd5b3ecd5ffaced0b6628576032a7426c38c38b6e42413b6eSLSA-2020:1016-1Kernel* kernel: out of bound read in DVB connexant driver. * kernel: Missing permissions check for request_key() destination allows local attackers to add keys to keyring without Write permission * kernel: denial of service via ioctl call in network tun handling * kernel: usb: missing size check in the __usb_get_extra_descriptor() * kernel: perf_event_open() and execve() race in setuid programs allows a data leak * kernel: brcmfmac frame validation bypass * kernel: null-pointer dereference in hci_uart_set_flow_control * kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command * kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service * kernel: use-after-free in arch/x86/lib/insn-eval.c * kernel: denial of service in arch/powerpc/kernel/signal_32.c and arch/powerpc/kernel/signal_64.c via sigreturn() system call * kernel: integer overflow and OOB read in drivers/block/floppy.c * kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service * kernel: buffer-overflow hardening in WiFi beacon validation code. * kernel: (powerpc) incomplete Spectre-RSB mitigation leads to information exposure * kernel: oob memory read in hso_probe in drivers/net/usb/hso.c * Kernel: net: weak IP ID generation leads to remote device tracking * Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR * kernel: ASLR bypass for setuid binaries due to late install_exec_creds()moderateScientific LinuxtrueScientific Linux 7kernel-3.10.0-1127.el7.x86_64.rpm9b69f31633dbbf7cc5b8476755e44b66134da547e005ec394e74542085a12088kernel-doc-3.10.0-1127.el7.noarch.rpmad45d86863e386e4c6f6fa1e47c1cc6ca322cc3b3a61ec2e79d3d48389a6aa88bpftool-3.10.0-1127.el7.x86_64.rpmf57740eef1d2994a9e51d90150cb8eb8e156b8631327d0451efae3aa7c595dc7kernel-tools-libs-devel-3.10.0-1127.el7.x86_64.rpma96fbcd14c2c295700cad30cf24e628edbef8568efc5fa9cf8df784bad38d429kmod-openafs-1.6-sl-1.6.24-1.SL78.el7.noarch.rpm93144a759115baea17333359192f2d53c724e385c2f9c6b9ac2b120179fd913dpython-perf-3.10.0-1127.el7.x86_64.rpmb2401a0b7be65c1130f0859cbb8d0379af68ab2a5fb54d27b29a119b11c0a585kmod-openafs-1.6-sl-1127-1.6.24-290.sl7.1127.x86_64.rpm65f2c381872b26afa49d2a71012b3cde549c7eedb5f948faaf108a52c52dd571kernel-tools-3.10.0-1127.el7.x86_64.rpm2bed1532028f0b9973105dfa8c468bda0a578283c20c7061a8225e572acb53aakernel-devel-3.10.0-1127.el7.x86_64.rpm6f4ea50495b4dd0e68b1658ef8f224afdd95610cd41de957faf9bae5b23f3068kernel-debug-3.10.0-1127.el7.x86_64.rpm5b44d9384ea4dffe424ff19963b690af34c19b6b6ff54abd47912f69379581b8kernel-headers-3.10.0-1127.el7.x86_64.rpmbdc747cbd76a1c5a2c113809af4073a6ca7f2519ee9e3dc68b26cc00ca40c5edkernel-debug-devel-3.10.0-1127.el7.x86_64.rpm39003cda3cad7f449a74ad954c0e4129d5808d27fc1479b3799e4c2a51d0c92aperf-3.10.0-1127.el7.x86_64.rpmaeeb0cd87014cc1fbf4ceb4d1885c9b1687fd2973e2098bdee041cb9420ad3cdkernel-abi-whitelists-3.10.0-1127.el7.noarch.rpmd0a1266e426c905094a6fe9c4c774add976a5ffbd7e390734f21659561c0de4ckernel-tools-libs-3.10.0-1127.el7.x86_64.rpm6beea5e777cf6b3223d7e5f11f38cb26eb4ca7bd3549ed6b0e67b0f8532d48fcSLSA-2020:1020-1Curl* curl: TFTP receive heap buffer overflow in tftp_receive_packet() functionlowScientific LinuxScientific Linux 7libcurl-devel-7.29.0-57.el7.x86_64.rpm4e7c5dadbdcd39272e42e1d40613428c158ec07372234918fceaf0192daab209curl-7.29.0-57.el7.x86_64.rpm89a176200d620756c6f014da326fbae32ece5bde0f57e58be17d908b53e6b5b7libcurl-7.29.0-57.el7.x86_64.rpmf14bb4c9533b4a31e2fb61afceca1fb659d3586cbe175f9f388ba839e28e7a9clibcurl-devel-7.29.0-57.el7.i686.rpmf4b33d4552a70977b1e3398259f43482200a7d0275453efcd3d04831cae0ff75libcurl-7.29.0-57.el7.i686.rpm62ca5dbe0401553c8eed177631be5c607eb676d65eb02eeaa717eb95226ad221SLSA-2020:1021-1Gnome* gnome-shell: partial lock screen bypassmoderateScientific LinuxScientific Linux 7gnome-shell-3.28.3-24.el7.x86_64.rpm71cf1edc3c01009a6aea8084769f212f61277a0af8edaecbfc0b2a0ab9d05df5gnome-online-accounts-3.28.2-1.el7.i686.rpm559f9f84ae7aee5af489eb81c35bc6f5de6aa1c27a4fd4c947ddcdfff565778ftracker-preferences-1.10.5-8.el7.x86_64.rpmdd5ce637f8dd23eb038a6341b51341be077a9cfa248ab631520925ebe4d9c064LibRaw-static-0.19.4-1.el7.i686.rpmc8198898ae3d0cd607b9e29b1f9f9ec66ce4edf661fd586392cea2a8ac0297begnome-shell-extension-auto-move-windows-3.28.1-11.el7.noarch.rpme83fbc8e369107edc149a99de75dc7ece6fa3fb59699fbcafc12d1f032cc4deagnome-shell-extension-native-window-placement-3.28.1-11.el7.noarch.rpm0a873608d038dc310d7347020e5579f6ebb3c11779ba91cc02a7e416244af848colord-libs-1.3.4-2.el7.x86_64.rpmd6fd1cb9ff2fa9021c557bc9127825d3383e838c4f1d51419de7fefb381a7ca7gnome-settings-daemon-devel-3.28.1-8.el7.x86_64.rpme70246e454f6c5d39d69b6180aa450cab341a22d6942e99bef74583c0b00a0b8shared-mime-info-1.8-5.el7.x86_64.rpm9595990593a1d9e96ba9249a541892b52708fb3a99f7b2370ade40a570eb427dgdm-pam-extensions-devel-3.28.2-22.el7.i686.rpma23bfc02e867114a490916e0759c97287afe9194536ac5bcf5548a977336f40emutter-devel-3.28.3-20.el7.i686.rpmddb957f060cba7f1d35ed5cc0b351b0f25610e449fd3ea3cae47c13ea5e3c8a7gnome-shell-extension-apps-menu-3.28.1-11.el7.noarch.rpma2b58451cca163842166d84e3baf872a82e938e710a43956d29bf0081fc9ec8fosinfo-db-20190805-2.el7.noarch.rpmc4e694ecd8faf86efe9fe166924595040899ccc82653b98f68050b9caf6ea5e4gdm-3.28.2-22.el7.x86_64.rpme3a32fc3a60333cf28aaff08ec398a703ecf75f12a44e50c0c5873e9d4647923gdm-pam-extensions-devel-3.28.2-22.el7.x86_64.rpmbcf7955fbe3cd4e8b9e5b3f8b14089f0fdcc839c3d88cd6531c49cc8c5de79f7gnome-shell-extension-user-theme-3.28.1-11.el7.noarch.rpm0b479c11f2c35a8eca7cdc14df3d0fd665ce4091aa7bdd452aeb45b18bb93899gdm-3.28.2-22.el7.i686.rpm6d0082803dec555d1f41b7b3c643b348db027b49c4d7e392bf833575697b150agnome-shell-extension-drive-menu-3.28.1-11.el7.noarch.rpm6d59a1d091b053a7e52fdf6ed20cbdcac0fee98054992c2cccd6b64255e59ccccolord-devel-1.3.4-2.el7.x86_64.rpm27727d86fd77eee20d74e4cdba6efaf33c00418e1795a625c249d7bf8b54901bcontrol-center-3.28.1-6.el7.x86_64.rpm0cb889a0bf28b286cd3d4f9a366fad350a98d66a0f929ad446ee165ded3f703cnautilus-3.26.3.1-7.el7.x86_64.rpm3888a3dbc9427b0d31b7dc013cc7a1547be4de8ea005c852f2221c6aaef9e13cgnome-shell-extension-window-list-3.28.1-11.el7.noarch.rpmd02cb581e105cef2cfcbde9076b413171d3073f4e9350e9c5b0e099407f0cd23libgweather-3.28.2-3.el7.x86_64.rpm33c9f6c3b909f2fdf272c2fa8d36920ee80b2443b069fbf0eb23664e45b43e9dcolord-devel-docs-1.3.4-2.el7.noarch.rpmca893715e7bd0d3a885c63bffd50140b32c1097bf9c64fa5e9455f989d2befc8mutter-3.28.3-20.el7.x86_64.rpm4a012f99f16e5e02263f1d85a5b2c182a29ba3eb3109b00eea19282de0ab1e6cgnome-settings-daemon-3.28.1-8.el7.i686.rpmb37026144d808285562bfb7499981be792309647585f04b52bd949388bb9554agnome-shell-extension-extra-osk-keys-3.28.1-11.el7.noarch.rpm58a45900ba0247321584abf43f2e191d00e43f089e05dc8597af99fb69cb5abdcolord-extra-profiles-1.3.4-2.el7.noarch.rpmcdbce679683350a96ac2c9083cb2f0c5b81fdad39d39848102ac472d7e7f96bclibcanberra-gtk3-0.30-9.el7.i686.rpm31c7122e98e8e1d1d4b554444532081f0b0c8a99f2fda4f579f1f5ec50818997control-center-3.28.1-6.el7.i686.rpmd1ebbb62b1b85f60fa1f7149ea634597fdf0cf977596450c26994fa90f921e11gnome-shell-extension-alternate-tab-3.28.1-11.el7.noarch.rpm8b75a7af378fa6b83d429dc0da1a7b0fb8524482bb9721984d2e48fc95555641gtk3-devel-docs-3.22.30-5.el7.x86_64.rpm8b31f644a0ff44620d834f3e9b87522dad33259b508edf1c3e1204afaf6070efgnome-shell-extension-places-menu-3.28.1-11.el7.noarch.rpma3c6407677dbd7627ce1e2f2ba8738520fe294d6c5e8fec47a9e375fb4d8836egnome-settings-daemon-devel-3.28.1-8.el7.i686.rpm37f9fd7d27d3cd9ac678009ac36af40642ac59a5a44d4835bd942f47aaf00f1fgtk3-devel-3.22.30-5.el7.i686.rpmd91a8d52dc734166a60f256cda76b039c283f7e40bd7f304499232b472e63844accountsservice-devel-0.6.50-7.el7.i686.rpmb7b4e6dc2b757550a1f445ae7da4be9c06de2168ace3d5a181666ecc0576f293libgweather-devel-3.28.2-3.el7.x86_64.rpm146155ca24af492b4354f0271c690cb100e5ded14d69e82a50743e4da66da31baccountsservice-devel-0.6.50-7.el7.x86_64.rpm6018c5f6413fe00f986a55604ff169e8013cedcab325911ab5ca08f389958c0bcontrol-center-filesystem-3.28.1-6.el7.x86_64.rpm61b79d0416a2268954839f8bb9be9d405eeaaa22d1dad046eea35cb8e9916375gtk3-tests-3.22.30-5.el7.x86_64.rpm80818e5c07c881820e9d8a9e5d98d9f911a519c6ca99b343b4d95dd5dc5d05b7gnome-shell-extension-no-hot-corner-3.28.1-11.el7.noarch.rpm39e87c650b9ca12c1fba8745324de54138c326d8275a7cbeec74d9182d559c9egnome-online-accounts-3.28.2-1.el7.x86_64.rpm9682512a4c261661dbcb252d7bf586f71b42e5c07eedd0977313acf5b24d7083gnome-shell-extension-windowsNavigator-3.28.1-11.el7.noarch.rpmd479b91d0a3aba8229b7f7cd8e41be7af61f3c1d1b8b6bbc4febd9f03141b7ebgtk3-devel-3.22.30-5.el7.x86_64.rpm4665878bd65cad446af7faa317deb9be3581f88974b296ce765cd23c6d96db71gtk3-immodule-xim-3.22.30-5.el7.x86_64.rpm23cd47e022316e2357ad99b711f147f1b79c1f7d62547cf4c49bbe4ce2a08045gnome-settings-daemon-3.28.1-8.el7.x86_64.rpm0e398b9b07dafac1fd8029f6cefc03abbe89f32931dbb66b02603df52c344cb0libcanberra-devel-0.30-9.el7.i686.rpm373bd559fdbe42d6effc70446b3147c96d984754ca3ab466445605106e9d6e2dcolord-libs-1.3.4-2.el7.i686.rpm1424d0f76891bc7499f68dfcde9ecc7ae3fe40acd9534c22d826b4f8aa648bc2colord-1.3.4-2.el7.x86_64.rpm39c307cdcd8f036d5cb16cca4109a7529499ebc85bbd0507f397551ef23e52efgtk3-3.22.30-5.el7.x86_64.rpme6c6c444155c88afc6d29cb32e2a9af58738297542b5c18214b0eddcb500dafegsettings-desktop-schemas-devel-3.28.0-3.el7.i686.rpmbecac5dbe7dad083baaa94ade5c2e63a22034567f835854c8f7133efb0cc779dlibcanberra-gtk2-0.30-9.el7.i686.rpm052408ae876e54b960119da2172bf50a3b9a7e2ea066ba6b95e850ad1bad918fgnome-shell-extension-updates-dialog-3.28.1-11.el7.noarch.rpmc1ff51b0b485310e54f3ffc790fc9fea5ee22f22271f0811b8e81524f5c1e467LibRaw-devel-0.19.4-1.el7.i686.rpmde897c6c834a1b7e141867e9e6c881b9e5a96f42f903a4ce65ed72a807ac7f0dnautilus-extensions-3.26.3.1-7.el7.i686.rpmd567499b2b739046d0bcedbdb361798d28402c253dcb618f2119dd4bd6bbd31fgsettings-desktop-schemas-3.28.0-3.el7.x86_64.rpme4ee021ba2f98622dc5bd22278239a04b2a21d0b8bf01497e1dabe9ffbc8506fcolord-devel-1.3.4-2.el7.i686.rpmf0392a3dacf873983621d91a8ce9700fa97ed61930de02677098add129259f17LibRaw-static-0.19.4-1.el7.x86_64.rpmebf8eba1019e883d66567804a68ab2d957da8c64cf17bcdcbcc0376f0d0c2cf9mutter-devel-3.28.3-20.el7.x86_64.rpmaaa77db7b627bd49afbe7cda02747f4f766ee40341b4b974e5857edf9b30abf5mutter-3.28.3-20.el7.i686.rpm057aca87c6075403aabf348046469fffc04fea7944a540ec7283ac639b95546bxchat-tcl-2.8.8-25.el7.x86_64.rpm22723e2cf290e12edce7bf2533088f6e2b30d41359f5bcda2088b9b830450d8enautilus-devel-3.26.3.1-7.el7.i686.rpm2619c80ca4f63bc786ddc0b8c9c60affc5bab6b450970b57cf472d23a8e93fd8nautilus-devel-3.26.3.1-7.el7.x86_64.rpm980d680ba1e47b88ee77235ddefc879d4d5ee82681b2625c6f43ff71f4e899beaccountsservice-0.6.50-7.el7.x86_64.rpmfae9e5c4fe85efe14bb9d5d26d1bdeb254064bd78193dbe0ba56fb208ba76827accountsservice-libs-0.6.50-7.el7.x86_64.rpm29435c616d5ea2fd504ee4ca498f8361fbe86f340ca6ffacce7df751be07fb0agtk3-3.22.30-5.el7.i686.rpme34102fed6500921805f6d5aaa85bb676c87aab37676d1335be6261358fba490gsettings-desktop-schemas-devel-3.28.0-3.el7.x86_64.rpmf7c78a30ebbaed4745945138cd4f4b00ab5e3133f8a1333da3b75281d8cd688agnome-classic-session-3.28.1-11.el7.noarch.rpm7b711e7511256f706db6a414e7e99b6258fa70a6fa1bee28af47ab9b5cb33211gnome-shell-extension-workspace-indicator-3.28.1-11.el7.noarch.rpma50dfb261d2ff21c2da0d403854339b3078eab7064877a33e7a1e2de386e3386libgweather-devel-3.28.2-3.el7.i686.rpm2d194f6a5459a71ce78b7d08964265508d5aad7d2be4e8405e1c8d260db5dae0xchat-2.8.8-25.el7.x86_64.rpmfb5af867730d73c501f5383ff60df006beb9756230774b32895726e0b8483bd0gnome-shell-extension-window-grouper-3.28.1-11.el7.noarch.rpm2dc217f76508eabbdd883eab3f557628d8a96f1fefba393e69a1d64bafbfdc73gnome-shell-extension-top-icons-3.28.1-11.el7.noarch.rpm979455db1fee536ae95d85812edf33d16707cde10027c080756df25c16d66af3nautilus-extensions-3.26.3.1-7.el7.x86_64.rpmaa50685f5208d76ed3b6345f8663bbd5ba284732307e1dab443619fb74c00f31gnome-shell-extension-disable-screenshield-3.28.1-11.el7.noarch.rpm9cd8d50b722cca964a89189f110363c21b3ca8cb837a73f62a4a66b3b9247c4dLibRaw-devel-0.19.4-1.el7.x86_64.rpmaee4a5a1b6cca331078e72d47846ebea21ea58fdced83220a02a09993750ba8blibcanberra-0.30-9.el7.i686.rpm18524340ca81b2e1600808d110a80e38faea3c8d8994fbd5196d2ad3cc10e71cgsettings-desktop-schemas-3.28.0-3.el7.i686.rpmd8af116cf05fdfcd588540c5da2d94ac7578bc9f81b8a5e845b14d17df550369tracker-devel-1.10.5-8.el7.x86_64.rpm1830b02fa9b6980a056face17cd1c9e90095c1925dbe5a0b96d0cb054139cd10gdm-devel-3.28.2-22.el7.x86_64.rpmdd020157e5dd78348c18dc4b6f55d9c9ad558a5a51d66c2c7e768b231c68830ftracker-docs-1.10.5-8.el7.noarch.rpmb5623a167c5705c39dc159e72f2ab85b8d3deab569bf121490464094810b7505tracker-needle-1.10.5-8.el7.x86_64.rpm19648e165bd333932d4d83f99aed0aced25362821001f6ee2e65c933fce01273gtk-update-icon-cache-3.22.30-5.el7.x86_64.rpm848ef780d440d041c6c28890f59ce28da85a8497ad3e37f188417aa2ffd96830gnome-shell-extension-panel-favorites-3.28.1-11.el7.noarch.rpm3ee20c7241880630ea304c90d07f755d8fede394a297fe2afbf7dd2ff9092c42gnome-shell-extension-horizontal-workspaces-3.28.1-11.el7.noarch.rpm5f08e4e41a305ceeed52b7898626f06be5407acb519f4f2a654307a9dc4e6fc0gnome-shell-extension-screenshot-window-sizer-3.28.1-11.el7.noarch.rpm0167939b636430f6344bada2d9026493f56eac1fd8a28f37b4debb6168b3fe6flibcanberra-gtk3-0.30-9.el7.x86_64.rpmc5c5c45abc697a303659038822f838c2bed69d309034789398673e8e1931bea3gdm-devel-3.28.2-22.el7.i686.rpme731a3104fe6e61a35690a281e5ba8c068172d9ec8ddc983f91ee53785ad103alibgweather-3.28.2-3.el7.i686.rpmfbaa60e1ee6ce613a380f40c60dfc9f7faee179ccba729eb7ba47400f9ec4818libcanberra-devel-0.30-9.el7.x86_64.rpm08c3514904b6daf6e7f11c69e23c1cc3f26813f3cf12f5d2c59276945adf2e15tracker-1.10.5-8.el7.x86_64.rpm9d7cbeceb53e1d5161f5f52dbdbc3540f9aca3a18c1d2f49d4bbbf2f76ea55a8LibRaw-0.19.4-1.el7.x86_64.rpm33f17cb83fc07632ba59c9abdff51aa34d80422c496dc1ef383b78cf4cf6d144nautilus-3.26.3.1-7.el7.i686.rpm41ae0ba07db98eef6e8dcf5d144ac19e9d8db34789460cb09e6d8d34b31f49f0gnome-shell-extension-launch-new-instance-3.28.1-11.el7.noarch.rpm6fd6060f19843ffe27949eb546a413f8f69afd255840ec81c23dc9d0069ff3dbgnome-shell-extension-systemMonitor-3.28.1-11.el7.noarch.rpmd8e5f043f02ed79b87d92a8e49e4f0e3ea80f24a781cf7d1db78254b3646afafLibRaw-0.19.4-1.el7.i686.rpm342dfcf3ded9b4f4c67df292e0e7ec1113971431985df0aa75a802fb3112c838accountsservice-libs-0.6.50-7.el7.i686.rpm14695786c04298f17af7a6d16b758314d8f9f811a772e2d1a0d50fc8f5537eaagnome-online-accounts-devel-3.28.2-1.el7.x86_64.rpma0e48b648b9110f38518b4932cf77f5ac5419c3cc6d8cde5b757592d67cdd6a8gnome-shell-extension-common-3.28.1-11.el7.noarch.rpm48f9252fcbe62d4b0f0893e7e84a6f9474837d9f894e2c572062c0422c27e340gnome-online-accounts-devel-3.28.2-1.el7.i686.rpma4dd0c49580a22aed512bbf249348f464a4e156997db0c24bb97b3d6d0e6e63ctracker-1.10.5-8.el7.i686.rpmee1af99b38b7f50ae027b980ebf5e6e96dbfaea1a54068d5c48fe39ae620c9a0tracker-devel-1.10.5-8.el7.i686.rpm671ebd3ffdb0366610eb0b220cc4c01c162ecea950cd589b10d6c398cb248545gnome-tweak-tool-3.28.1-7.el7.noarch.rpma223cb19095e7daf54d12cdac758ef8014c0972880e8d5621151dcbca5114473libcanberra-gtk2-0.30-9.el7.x86_64.rpm84f9e038c96c6815902bd0b7caf49e1f3eefcfbd60b2d96182c0db732ebb86aalibcanberra-0.30-9.el7.x86_64.rpm128cdb792fc0eb004b83f2d69989bf249af68b7b6da2706a19464f9512d2fadcgnome-shell-extension-dash-to-dock-3.28.1-11.el7.noarch.rpm71a3fd584f441a1d535d9bf10b1a08722644f6c3f6c2965700a857f595d1d9c5gtk3-immodules-3.22.30-5.el7.x86_64.rpm5ec25c28cd37f5fcd39f340f9c9b0529837f4a1e47c22532e293dbc1d73a7ce8SLSA-2020:1022-1File* file: out-of-bounds read via a crafted ELF filelowScientific LinuxScientific Linux 7file-devel-5.11-36.el7.i686.rpm91ba82c93c89111fccc3353acd8684f4858c9dabfb4c8251226878f01ce1e22bfile-static-5.11-36.el7.i686.rpm60fe7c5f507afb7a6d1e572e602161b55c22976a150e43aa98fe9fd6f58c5fa2file-devel-5.11-36.el7.x86_64.rpm4c12336f048667427d8217d26c775c9d3c953e8f5d48cbcb09c08ebc6c23d106file-static-5.11-36.el7.x86_64.rpmd00d4d364bc0be344a988ff64345f916ec07cbb4763aba9150fb7ef3888c551epython-magic-5.11-36.el7.noarch.rpm2f83861a72dc701a447b6c842a713f846986e8c0ca888a7162b1d1b2ba536dccfile-libs-5.11-36.el7.i686.rpm08980b0a6638fad706b45aa983ce3a5b33060d481ec4b29edfa76d71e6922486file-libs-5.11-36.el7.x86_64.rpm26aafdb0380b1e463875941a1e928c8622b753c388f368adcb59a8457150fd63file-5.11-36.el7.x86_64.rpm955282c9d706565c8c9d77abe174aa71132481b2871c140dfdd983073c1783b1SLSA-2020:1034-1Doxygen* doxygen: cross-site scripting in templates/html/search_opensearch.phplowScientific LinuxScientific Linux 7doxygen-doxywizard-1.8.5-4.el7.x86_64.rpm1f5b41c408263fd5a5cf742391f997e047e0f58393e73dac43c1a03216da7092doxygen-latex-1.8.5-4.el7.x86_64.rpm479c8dd6f79cdeb014d7076bdbc854e3c7f46c69665e2c04a56751ff22d2663adoxygen-1.8.5-4.el7.x86_64.rpma0265a372bffa73719a193bed0fa80599a6cc4ed1594acfa642ae82d15150f49SLSA-2020:1036-1Texlive* texlive: Buffer overflow in t1_check_unusual_charstring function in writet1.cmoderateScientific LinuxScientific Linux 7texlive-mathspec-doc-svn15878.0.2-45.el7.noarch.rpm4f949d0333de62e45d3c76da0181819d0332cf5d010ea1721ac2d430613f047btexlive-sectsty-doc-svn15878.2.0.2-45.el7.noarch.rpm842743380a57c1495d40e1a09e85e40fe0d93896de3ec3bd76ac09b06b262454texlive-iftex-svn29654.0.2-45.el7.noarch.rpmd5b64676eedd02562d63086f027be5af124d7c7664508dfbaa14754655847192texlive-changepage-svn15878.1.0c-45.el7.noarch.rpmdf967f31ca270fab04f2bf6996bc9525268c29084277d19e45bcedae2f1a093atexlive-chngcntr-doc-svn17157.1.0a-45.el7.noarch.rpmf2b547427c49f62da018d2ecc5b9e3b6310152b3b48695b73ef1431864398b08texlive-rcs-svn15878.0-45.el7.noarch.rpm400f3c3a85770d0d950124681c41b1202f20fed14769bb7fa1bb15373a7041batexlive-stmaryrd-doc-svn22027.0-45.el7.noarch.rpm2e76e04f0359091127d8c4062a645b0e0080c433c53f59eb9ad74bf4d3441408texlive-setspace-svn24881.6.7a-45.el7.noarch.rpmf47f7eccbe71b76ab466fbf7eb907072de92b2144326fafd9af5552b82beaf3ftexlive-fancybox-svn18304.1.4-45.el7.noarch.rpm1d72bd678591c7b3b6027e8039c7e9055f5e94ebe543125bb8aaabe519d778edtexlive-xetex-svn26330.0.9997.5-45.el7.noarch.rpme52e3cfb4794bbe746f224f4fdadc981f28f0eee7f3eb2ea3e8de7a4f1936ef8texlive-collection-xetex-svn29634.0-45.20130427_r30134.el7.noarch.rpm35f98c174b57a1dfcd0a2a7f4b91482b6c86a514b2e54b48edd3a84268081b78texlive-varwidth-doc-svn24104.0.92-45.el7.noarch.rpm0de09468f82a155ac5d0e234aaeed7a455d9904f71c123c5f8786942ca4f4ed6texlive-geometry-svn19716.5.6-45.el7.noarch.rpma542181f26b72e7ffdca58e04da9ac338076eaf643261cdff2c189ff2793c632texlive-geometry-doc-svn19716.5.6-45.el7.noarch.rpm32c07d085e0797e313b678b700b258b9dacedf26bc87d42e8497777bb1cbaa45texlive-cm-lgc-svn28250.0.5-45.el7.noarch.rpmcfd3d34b4b417bfbf53893165e586b550a9739db7eb79a372bb735cb86073153texlive-charter-svn15878.0-45.el7.noarch.rpm1c5cde84928b78ebc18d2aa8ed1f40dfca2506a9590eca0e485e14a8f8577bb4texlive-texlive.infra-bin-svn22566.0-45.20130427_r30134.el7.x86_64.rpmadd689952647c5d2897b635e428b191f16f26cd39c2d90863639cc5426d64896texlive-etex-doc-svn22198.2.1-45.el7.noarch.rpm12bc2a4043c1142afe098c02c66e59cb5d9ac771cec5b485fe9b67589c64a5b0texlive-luaotfload-doc-svn26718.1.26-45.el7.noarch.rpmeee97b66240b640eed91189fa8a2d94e98ee48e12ce4f4ea661b61ecd621d693texlive-mathpazo-svn15878.1.003-45.el7.noarch.rpm72a60efcdcc7f099eb7ca15140575cbe0834acc099af55cd56d683bb727984dctexlive-ucharclasses-svn27820.2.0-45.el7.noarch.rpmc73faa2214c6ff224e521503c18660ef29bf2c6603d10afaf2b4bdd6b77a25d4texlive-etoolbox-doc-svn20922.2.1-45.el7.noarch.rpm438365a7e5c524b91e0aa88f4394deacd9a0d5bded87fde1d7a3217aa2809ff8texlive-xetex-tibetan-doc-svn28847.0.1-45.el7.noarch.rpmc6e0bc9c456ce930924768359fad14fbc2be063e00f42a5df5e5c8e671727ff2texlive-cite-svn19955.5.3-45.el7.noarch.rpm66a4dd596a75e18c187b7c2399388e7aea01b4066ce7b5356bba51d2eae842c7texlive-overpic-doc-svn19712.0.53-45.el7.noarch.rpmde7475d58c3d92a84abc09fb268c524cc8525e8c5f990bc05b19b21eecf47827texlive-type1cm-doc-svn21820.0-45.el7.noarch.rpma58d5308b7df0e6c4c1ba882aeb41af0efebe5d77cbe3a4e68f4a6e688f38e9btexlive-kerkis-doc-svn15878.0-45.el7.noarch.rpmfaabd184219bfabf6bd718c3ca907eed1bdeb50dde8f520db01ee34bfdb22215texlive-arabxetex-doc-svn17470.v1.1.4-45.el7.noarch.rpmedd54d38669377bf4486f363dfdef22c3c3408d6cfdc3b4912b74413646f864ftexlive-xetexconfig-svn28819.0-45.el7.noarch.rpm58e54f67832883d7d8aad3bf42ffaa6a2f3736a4a82802c06e82d3eb50e5d823texlive-cjk-svn26296.4.8.3-45.el7.noarch.rpm799a5b595192f5be72bdd7d1b853c07476a7dd833126c31838a132a8ce4a3e91texlive-xcolor-svn15878.2.11-45.el7.noarch.rpm29f5b78741f56cc5dc97c3e3c7fd1f82dd754aebb463f9085d986c4cd65a70eatexlive-paralist-svn15878.2.3b-45.el7.noarch.rpm882470ed40d7d63bdf8d4f1ce96560d0538e05d2b1d23e705566384368ea2ea5texlive-mflogo-svn17487.0-45.el7.noarch.rpm41d5103ce1cf6a40a703da8d4608fcaeba67f7e0095587c98fe6876540f5f5a7texlive-epstopdf-svn26577.0-45.el7.noarch.rpm673e32c4a9b70627baa10b19383f45dd275d8c5ce37498534424210864d937dbtexlive-bibtex-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm8c035d9d16c07a8f4de6d5c172ae83311b88009a51c5de3b7fbc7206197d5e44texlive-euler-doc-svn17261.2.5-45.el7.noarch.rpm88d7cae6961b795d878881eaf329ad0fe25fd295294b743a0e0229403374ae82texlive-courier-svn28614.0-45.el7.noarch.rpm8668977798bb65e67e7d7ebf98ae4083ad93637ce4387254d863c9430fcd7c61texlive-marvosym-doc-svn29349.2.2a-45.el7.noarch.rpm180cffee896ef031ec55552a462d655969829f0957418f6a996f2545ddca2f4ftexlive-cm-super-doc-svn15878.0-45.el7.noarch.rpm963762f5aec40aaeed76bec68a63cfce7bb8a39faa5ffb3ea7432d85f838788ftexlive-tools-doc-svn26263.0-45.el7.noarch.rpma2d11fb0b764116f893fbc1a8bbcbba31e55e92c959369c69934d082f64e1bc2texlive-etex-svn22198.2.1-45.el7.noarch.rpmc1e685ecbc946ece3b26bbf5ba375a1d84ee23feb42a488f51c6230cf8e3ab33texlive-pst-text-svn15878.1.00-45.el7.noarch.rpm74cf20338f31010399f4ca97e7adb902463e688bdfd1baeecffd0693e7010de5texlive-amscls-doc-svn29207.0-45.el7.noarch.rpmba2578d90e92a465dfafcf87ae12c1f0e90f9dd22752853dbae2f218aaa27506texlive-bidi-doc-svn29650.12.2-45.el7.noarch.rpm08a39d9554c6cd03a0c1752537591a92bd002b99ec3a83aca120ec78ca50b363texlive-pdfpages-doc-svn27574.0.4t-45.el7.noarch.rpm1b424e31e9db8c143579a1c335bc188ea180bb1434175b7eee61172206acb1f7texlive-pst-text-doc-svn15878.1.00-45.el7.noarch.rpm6a14d5c4602d4090afcec0506c80622820db5b3ece223066776dc52df6ccbb66texlive-amsfonts-svn29208.3.04-45.el7.noarch.rpmb9b992042817246eec0c8b4176bdd222c4a9da0cb41828836fdb3f44ba61fba8texlive-xetex-doc-svn26330.0.9997.5-45.el7.noarch.rpm053952a9d74be130c7c79fb2ad7922e25699d94804b4ad551ca48a301e8a5f93texlive-pdftex-bin-svn27321.0-45.20130427_r30134.el7.x86_64.rpm5fc4d508f1ffdd1e5d037a1aecbfc5ca954d5f4a9e99a825db927d962f36f89btexlive-etex-pkg-svn15878.2.0-45.el7.noarch.rpm880f5c4270e4bb1a3f40cef93989bdfcb0f6c32dbc81a04388c1b030e66f8a0ftexlive-pst-tree-svn24142.1.12-45.el7.noarch.rpm9fa1c877355ad06977e6c367b793ffef562f610adfd1b5e5ae8d176000d4cd6ctexlive-latex-svn27907.0-45.el7.noarch.rpm39ca571bd0a0b08dd1c9f32fac775efef80f358719150078e97b932ba740f80atexlive-fancyvrb-doc-svn18492.2.8-45.el7.noarch.rpmf9386ea3cea168fab859e9b9b18f220fd8f726a82890dc4d0e772807425d7f1btexlive-mparhack-doc-svn15878.1.4-45.el7.noarch.rpm80cc7db34b389d98f4cef4af5bacaaed2444c0d01b82aa123f36bf3f48f428eatexlive-cmap-svn26568.0-45.el7.noarch.rpm305b0c6f1c8c1885760df56cbbe5ac23135794a8fa346e3e432020a77dad5bb8texlive-xtab-svn23347.2.3f-45.el7.noarch.rpm0e7b0495b160d19196f67f6382b8a2590e957777917620929784a8339dc710b7texlive-eso-pic-svn21515.2.0c-45.el7.noarch.rpmd8b16f7d8e1ea1c46c32e45a8cf0514cc88a7faeaac88019ebfbe3f169670bd6texlive-passivetex-svn15878.0-45.el7.noarch.rpm2ca111e1bfde110072e1b5f2ae148444efa8dd280ee1a006c43de03cb18012detexlive-scheme-basic-svn25923.0-45.20130427_r30134.el7.noarch.rpma23deb183a2502cc3ed198d864b7183a5bacb1cd50791e0e0016445c8a496e15texlive-tipa-svn29349.1.3-45.el7.noarch.rpmc2e926c326f7ee6693f670d08313b8dccce9890032968391217e7c0fab759ebetexlive-xeindex-svn16760.0.2-45.el7.noarch.rpmac8547ae3842763a85119f1da5b78a8869eccf69cd3932e1fc6f0a6db1bf6240texlive-cm-doc-svn29581.0-45.el7.noarch.rpm3a829be50dba0658f38f7a535b07e596be7b9f71e6cf3b77670143f38cb42d11texlive-lua-alt-getopt-svn29349.0.7.0-45.el7.noarch.rpm69d73d8d3c5277c017bf19feffdd6f8c30a66ce295450b6fe0d4274aa948263dtexlive-footmisc-doc-svn23330.5.5b-45.el7.noarch.rpm6770e3a49deecc25be58863089fa025ec216fa7f600b5e4078e915402a7c751dtexlive-etoolbox-svn20922.2.1-45.el7.noarch.rpm2938910476d222f5228cbc36e5c840374d669b4ed4d26b137cbe37e494ec3507texlive-thumbpdf-svn26689.3.15-45.el7.noarch.rpm2959212e16958d1aab5a0ea3c5d6797e01428e31570bd3d1f91a2d22d1027cd9texlive-dvipdfm-svn26689.0.13.2d-45.el7.noarch.rpm1cc91289178ef2ddaa37bebc799aba68cc271584e66bdfadb70b8d86cb8e720ctexlive-metapost-examples-doc-svn15878.0-45.el7.noarch.rpmca2a97f08e0b29a1c9609ee1c0d1ae0a915ec768c7d96fad64a6a3cab52844e6texlive-pdftex-doc-svn29585.1.40.11-45.el7.noarch.rpmb564850b1ed1b67f2f96f5c44377ec7899c3b03c4a0ecb0071708025390a5215texlive-ifmtarg-svn19363.1.2a-45.el7.noarch.rpm30dd1a492428914d824d653d8709daa630150e35ed8071bdb10d5a0aab706269texlive-sectsty-svn15878.2.0.2-45.el7.noarch.rpmb1ce7f20421dca4e0f3cb5808b71ad43de9c2bc04702614d455e788111f4528btexlive-url-svn16864.3.2-45.el7.noarch.rpm0a69d5ca3edbf45d29f60ab153d92b9a4b1596a08a7eeb93b5a53cac534094fetexlive-subfigure-doc-svn15878.2.1.5-45.el7.noarch.rpm8cccf08f4d73cd58290c6a5596abba3fa61ba77ac2e701c94aec94079f56975ftexlive-beton-svn15878.0-45.el7.noarch.rpmc0a38f079ceb2791885c4d09c9983df782706e8c93c6394cb86ba42993a69a53texlive-xmltex-doc-svn28273.0.8-45.el7.noarch.rpm763cb2de87ddf283d7829ac57baf7d8b6ad057eaaf1afbcb845e251e9d345468texlive-kastrup-doc-svn15878.0-45.el7.noarch.rpmb840a775cbaf99c9649039c11ee8a67a598a08f68f1c0d802b8333f7710f2c91texlive-pst-node-doc-svn27799.1.25-45.el7.noarch.rpm7e29239fc8203503adfbff18c3357c01aceef00ea67f716c9e3a5e41e3418560texlive-texlive.infra-svn28217.0-45.el7.noarch.rpm8a417478678475ee68da5b013af80c224d2a13590decf3ca2dac6f835e029e3dtexlive-fancyhdr-svn15878.3.1-45.el7.noarch.rpmc5331a2fabb79ca068013051913f8a776c99ed8cb4421d212cf9c2ad1bf537f8texlive-extsizes-doc-svn17263.1.4a-45.el7.noarch.rpm603425638ccf77c82a605e192422c9240d92cba29ac7713bffa9faa9c93da877texlive-rsfs-doc-svn15878.0-45.el7.noarch.rpmfc207758a5524b3be78e45e73befa872f4e37dc64f42d9e3ca94ff23772bf8f7texlive-sansmath-doc-svn17997.1.1-45.el7.noarch.rpm084fd308b5785da6b642128d416f884fad425c4dbfad0e963bbdb60d842a0598texlive-pdftex-def-svn22653.0.06d-45.el7.noarch.rpme1818ce0ccbd1c57b287b82ea907a6fc07a4a8c091b7575b108ac0f18b1da3c9texlive-xecjk-doc-svn28816.3.1.2-45.el7.noarch.rpm54535cee6780cc6b8bf164225e56c0d8757e5bc225c5a4275fcf35d11dffbb13texlive-wrapfig-doc-svn22048.3.6-45.el7.noarch.rpm2e705627c149403a72a5a047e1436cdc77b3c253d9fc9cd0446f23323a7c9b40texlive-philokalia-doc-svn18651.1.1-45.el7.noarch.rpm80e0e141382f8f0fa4735a19c6ebe7e3be178d65a9ceb0d1ff27a46b121817d8texlive-titlesec-doc-svn24852.2.10.0-45.el7.noarch.rpm1cee81eb0a925b9eda51220f740b9b84833bcdfdbb4f721557ac458005865a9btexlive-ifluatex-svn26725.1.3-45.el7.noarch.rpmfd671f3734d4bdd5e40670b693524ed1e4c07ddd025965e290335b452b2974aetexlive-ifmtarg-doc-svn19363.1.2a-45.el7.noarch.rpme2648a180416fa7f5a0805b1d53d11be438badfda0b191576d575505e7bf0beftexlive-euenc-svn19795.0.1h-45.el7.noarch.rpmf79870e7ea2856090a526c9fb1c86616423da39973bd6b281cf8913c81bfaee6texlive-collection-documentation-base-svn17091.0-45.20130427_r30134.el7.noarch.rpm226ced27a423a9b6ea3f0bc28cc09486425fa71e665a47e76956c062deb0ee8etexlive-amsmath-doc-svn29327.2.14-45.el7.noarch.rpm5f4abf32b3e339740db88fe9b2cb133849a1f54917a9ae0b6a8ce2b2235b1abatexlive-sauerj-svn15878.0-45.el7.noarch.rpm120676aec8a28caa426b66bffd96ffeb18499314f6298e8ff24c96a5141d70c4texlive-parskip-svn19963.2.0-45.el7.noarch.rpm2feb0fe12df7d6a6a02f500e23ff3434d90438f2b30c97aac19375dcd3d59c53texlive-mfware-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpmb01b0ecb4ade5c5f70dc965809f5cbc08d369b75ad76a235e916799d3c472f77texlive-ms-svn24467.0-45.el7.noarch.rpmbe6940aed1e6f6475d92d15a642d015c24cf0244e331a82d9f5c08d141468039texlive-ifxetex-svn19685.0.5-45.el7.noarch.rpm474fe2e64456f37d5d701c9ae57c6ef0eb512344fa3582586bc4310bf441c70etexlive-tetex-svn29585.3.0-45.el7.noarch.rpmf4bcb149dbf464cbdd07cf55f7e6b63d4c38876e2b23bfecba15442a2035f2b5texlive-xstring-svn29258.1.7a-45.el7.noarch.rpm5486866c84612ce11fb401a48d376eddfce9b4b7ec2997848b4cf2f39c7b0b10texlive-metapost-svn26689.1.212-45.el7.noarch.rpm6d576aa5e6b3c0921768963633246076d201e088136a35263242793d4166aff1texlive-dvips-svn29585.0-45.el7.noarch.rpma00646d8182ea039845a3c3e46c7836890dfe2e5798e28cab726a110b6546b64texlive-filecontents-svn24250.1.3-45.el7.noarch.rpm7b4879551a95fb109e9d19f84eaf80d2f3c6b9fea212f305cebe78f85df881e3texlive-collection-basic-svn26314.0-45.20130427_r30134.el7.noarch.rpmdeb420ff838ef295b24fd8be83301c2986355520941442aad34afc9dfdd46ca5texlive-polyglossia-svn26163.v1.2.1-45.el7.noarch.rpm6ce7e41d143bf4d9981c8ffb523da007598e68bc29a5a38ab5112abb4d23fadctexlive-dvipng-doc-svn26689.1.14-45.el7.noarch.rpm87727d8c6f4a10e2e810c1a130280c22bda441eac38a83314617de6998aad001texlive-tocloft-doc-svn20084.2.3e-45.el7.noarch.rpmd0b117426e0ffa5ec06dd907b0d0e558b8b29f26a66f94fcb47a8ca2504b45bctexlive-latexconfig-svn28991.0-45.el7.noarch.rpm4fd069fd9494cb6810bb1cdba312c89cbe13fd14711b897abfce7b413af44ac8texlive-multirow-doc-svn17256.1.6-45.el7.noarch.rpm74410daa4bd1aec4fc5d6d928794c0f8b6da2a4ef2f7f14ecaaec5bfb0badbcbtexlive-tex4ht-svn29474.0-45.el7.noarch.rpm3e4a2d01c69251cc3e3f0ecbdb58b468d1aff5fdd97bca70ee37c1d84572fb19texlive-latex-fonts-doc-svn28888.0-45.el7.noarch.rpm470239e47851b2de1f0a5c25e95e2ab82aee795976f28784a03fe40c77a6813atexlive-latex-fonts-svn28888.0-45.el7.noarch.rpm01f043b0f05e5da23568c8ea07fe52fcaf0a427fb45bed87b43640a0f3c51763texlive-fontbook-doc-svn23608.0.2-45.el7.noarch.rpm70f9991451e99a013b78f035d93f33e4784c038812adbbe2f4cd5e90913b7296texlive-pst-eps-svn15878.1.0-45.el7.noarch.rpm65040aef62ef448c43b9b03a80dd7bcb4954ae72f68eebdd6c400fb6a5e62e46texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7.i686.rpmc5bf738c144e4ed11393219c205655cd5b441acd47d6df9c7a196c927c4a59dftexlive-tools-svn26263.0-45.el7.noarch.rpm8c97f1a002c8d79fd871155734d99c1246a83deafba9d65f855eb99f6b81e6c2texlive-index-doc-svn24099.4.1beta-45.el7.noarch.rpm7a8c3fa1b18f7ee70b290158e15ed473a2bc412e7dde0ae191e3424d8d640bfftexlive-bibtopic-doc-svn15878.1.1a-45.el7.noarch.rpmbe4f77229a1ebd5f778abbd1e116bc372c3e67df28b8ba30dd1eec530672d101texlive-sansmath-svn17997.1.1-45.el7.noarch.rpm08680775ebb0afee34b26acb6438c69a3d21ebfbd876bb371e0fdef1d04d6f87texlive-ncntrsbk-svn28614.0-45.el7.noarch.rpm8bb1be66510d86334285a05b421392ed0c16572e288e2cc6127310534716c28dtexlive-fontware-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm01a69c8f37a82f378c64fd999c6ba3477675e9baba0711e4a88f1f663860bd15texlive-xecyr-svn20221.1.1-45.el7.noarch.rpmc6620374644007ee0c00e1e1571b1659cbfea5cb06aa7fc92625189857577f8etexlive-luatex-svn26689.0.70.1-45.el7.noarch.rpmf1824b29566d973ee39d3b0ba28c77da97a3f606c494b8b3d10b29c82674865etexlive-cmap-doc-svn26568.0-45.el7.noarch.rpm8d53b4393d7012d4190b2319d59d2747af0edeb65818e6d96818090cb471e1bdtexlive-pst-3d-svn17257.1.10-45.el7.noarch.rpma7512ab53a8390e31622aae8ec7c0dae9b200a1d8a0ec6b50a6677ff30bc9c9btexlive-texlive.infra-doc-svn28217.0-45.el7.noarch.rpm252b9d7abf7d192fe1c05a035b3420e957cdbe6f1b0ef0a2467e9ff83f249251texlive-jknapltx-doc-svn19440.0-45.el7.noarch.rpmda395a9f06494f3a1fe9ed3558831800602d94c67f1286c7f26aa2c324944d20texlive-mptopdf-bin-svn18674.0-45.20130427_r30134.el7.noarch.rpm9232432b3a7fdbd78daf1668e20454fb46545e4ec6444a38df5b319d829cca8dtexlive-bookman-svn28614.0-45.el7.noarch.rpm0aa8dacfc91c8df352aa67b1cd5eaf492e3a80d0992d311e2ff454a74e52b733texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7.x86_64.rpm2232b06be98390c8132598a082c1a98f3bfeff246d2bd95f0dab334a80febe82texlive-cite-doc-svn19955.5.3-45.el7.noarch.rpm0ffeb9c4c9c839ed46adc472a787f09112ff342fb0b9b6c936e862d8380735f5texlive-seminar-svn18322.1.5-45.el7.noarch.rpmf3ce1b6d4ce71382ef41d20845e038964ea4160849f20b85d4ac77e854167299texlive-lm-doc-svn28119.2.004-45.el7.noarch.rpm45502f0c2440cc8a5297e0aac1aca1e4afdf6e18d2469384020ae40d37379774texlive-qstest-svn15878.0-45.el7.noarch.rpm3bc95effafef9406971c47c8f8d1dbc11f68c731715983d486451790029f8b66texlive-anysize-svn15878.0-45.el7.noarch.rpm1ee1f994c9690169981c3096f98be49ca91a23b2698f30d8ec6d5dd1a64106adtexlive-pgf-svn22614.2.10-45.el7.noarch.rpm1fbfe441e8b3caba4b66ac7a48df4b63b7ee5786d7e714c233f3499140f2cadftexlive-t2-doc-svn29349.0-45.el7.noarch.rpme6187ef1aa3fcb7c299ea2963417fef43968c79794c71117283b6a187767d600texlive-fp-svn15878.0-45.el7.noarch.rpm02169f9103fb12d68651cda7c8ddc1790866f8c2c68fca9e7c2361eb33bad571texlive-times-svn28614.0-45.el7.noarch.rpmbdc55ace64a56b86e24e2404888746e2519c7a65794317f8da0461d2132eb33etexlive-xmltex-bin-svn3006.0-45.20130427_r30134.el7.noarch.rpmb88984d5c985736b354daa1f2341a37a83ba12b32770b8407f19a35363764d1dtexlive-eurosym-svn17265.1.4_subrfix-45.el7.noarch.rpm65c70d1893322a939643794fb0bbded06cd16321f1f7dfcdb4d669704fb09dbctexlive-pstricks-svn29678.2.39-45.el7.noarch.rpm62a435b711e41fd303c882fe5cf30da9455facfe1c8518fb44d62fb31d53d748texlive-utopia-doc-svn15878.0-45.el7.noarch.rpm1bf151a7da7af484747140a0543309652af867dcf669c4d4b46dfae3d630e068texlive-psnfss-svn23394.9.2a-45.el7.noarch.rpm9cae432f7b3c09c0c0b9e72bc14685e3f6803f6696d49b7ae57e908faa284223texlive-framed-doc-svn26789.0.96-45.el7.noarch.rpm44ad41c363f14345b956eb926fa353322437b3fbbf7b3e1a2b0591f81fee065btexlive-changebar-svn29349.3.5c-45.el7.noarch.rpmfe6d4645e70453f96cb647bb440bbbdb669ed474c92d22fcf6e5b994656755cdtexlive-extsizes-svn17263.1.4a-45.el7.noarch.rpm0eff2053ff8b068c7395c61b1f8a6982a0253699b451a0f1bb166beb05b581a9texlive-txfonts-svn15878.0-45.el7.noarch.rpm4935e192a8dc83dd566159619404c99afa040b315130e2c6486cdc2b30cc431ftexlive-txfonts-doc-svn15878.0-45.el7.noarch.rpm3921175810d9dfb0206d292bc984a16069109679b34e8891907e00781503b9f0texlive-wasysym-doc-svn15878.2.0-45.el7.noarch.rpm922d138d5352fd50b0f689cd94795b0654d61b271aa6df3cee32d48e26774fe2texlive-xstring-doc-svn29258.1.7a-45.el7.noarch.rpmbfa572d89624d3d83ef03d63a0c1c8026b757ca9f2bfca0bd107008465b5364etexlive-fp-doc-svn15878.0-45.el7.noarch.rpmba41d61d40e9d02885cb7645794ffc105614b5691b3abba631a0470921502b2dtexlive-natbib-doc-svn20668.8.31b-45.el7.noarch.rpm4dd45329c1e2fc9e21b93cf9c9a87445a85d8cfdd86c21157a68d914dde778bctexlive-pstricks-add-doc-svn28750.3.59-45.el7.noarch.rpm88dd7701f6d5b2422167086dfe0089491ec54e4ade7cab5a6498eeecc5c0325atexlive-kastrup-svn15878.0-45.el7.noarch.rpmf3b20097bef1e623b9bb9a53b3fef2b3478427a58a009e8367ac29420b34e6c8texlive-showexpl-doc-svn27790.v0.3j-45.el7.noarch.rpm1d7fda126c0c8ee09c8679b035f2abd05da76c4f6db3ee468dda8f2633a35569texlive-mathpazo-doc-svn15878.1.003-45.el7.noarch.rpmff870fcb84606917e6afb2012a697877215ee1c6d14929927f58b6de3b36492ctexlive-listings-svn15878.1.4-45.el7.noarch.rpm67bce833df60834210aba6e6cc06bbdb14dce817ff228c17a303ff2880c17b31texlive-tex-gyre-svn18651.2.004-45.el7.noarch.rpm62c6e38d93fec24564a5e747ff36272a7a7080e0f8e488bf686a68424be4ee25texlive-hyph-utf8-svn29641.0-45.el7.noarch.rpm939e8b2603c4d2964f65034634780ad2d4fd69b83e2acd04042b338ceb6565d3texlive-ae-svn15878.1.4-45.el7.noarch.rpm0a0db8ca6f7f426e7b147cfb0b268b6971b5bc96633f818b83641dd49706a79ctexlive-thailatex-doc-svn29349.0.5.1-45.el7.noarch.rpm37b724c2f56ce1644324fc4a78cc2c24dd5c8742995885ea9a24bc24c8edc724texlive-chngcntr-svn17157.1.0a-45.el7.noarch.rpmc47a02df88dc08ddd38d184ac2dee16e7207cab52bc4fc38bb422bd9d5b530fdtexlive-eurosym-doc-svn17265.1.4_subrfix-45.el7.noarch.rpm0630ab6b0abd32e469709a48faf8d88426a84ba61bae3a0e99094e6ae66295c4texlive-texconfig-svn29349.0-45.el7.noarch.rpmbb5fe2cf9574aceab195e9112d0865085d0bff2ada4ea8919b9d0008b68cc4b8texlive-uhc-svn16791.0-45.el7.noarch.rpm05e3bc6195c02c718ecdc34153a59c69965342dff68b02688c24ec4d15216e83texlive-pst-grad-doc-svn15878.1.06-45.el7.noarch.rpm4c061fc10850a2724e2b5506bb09c5bd4afea356da0af57dade34148ec265498texlive-enctex-svn28602.0-45.el7.noarch.rpme9e2ce8bade060e7793318201e2d22e76418b2989fd24d0a1f88555de0eab153texlive-underscore-doc-svn18261.0-45.el7.noarch.rpm97eeb2d22fa86d42db9bc58ec6fa4626f8ab8dbf526d6ca7f789387b1e514155texlive-ltxmisc-svn21927.0-45.el7.noarch.rpm03649e45aaa6d98e54cbc8beebce3f6c438db196ebc5c16ac3c7296f8411b2ectexlive-memoir-svn21638.3.6j_patch_6.0g-45.el7.noarch.rpm8c2eca02762830123db292b77d6975bb97d473d91e048283c280f6c7dfcf3e1btexlive-euro-svn22191.1.1-45.el7.noarch.rpmf5379d45464d4ae3bfb5de8489a268b70d4f2fcf326c1a7008fa742c793546bftexlive-xetex-pstricks-doc-svn17055.0-45.el7.noarch.rpmb29277a5d1a0c9b8d45ac4be059a147c216c235dad389b1fc2e293c44b7a1469texlive-pslatex-svn16416.0-45.el7.noarch.rpm79813ea9fe59ddf5f46719083a831dab19caefd533309fd7419ab274e3e63a82texlive-kpathsea-bin-svn27347.0-45.20130427_r30134.el7.x86_64.rpm97efe19f0f3324b2b88012540949d65ce82ad810e35861a804db4f3364598548texlive-soul-doc-svn15878.2.4-45.el7.noarch.rpmfc0f50e8aab070baeffa9d4152446c8f6dd6738073cfbcb2209fb16e5e0453f8texlive-mathspec-svn15878.0.2-45.el7.noarch.rpmd8b37597e4489dd8ca9c3c2c892fe87281eca60f1ca451b910c675c1d802d620texlive-pst-blur-svn15878.2.0-45.el7.noarch.rpme6af6f9dc63ff9b8ea23927d1ed20ae5058f0945630438ee84f95d379b308c74texlive-iftex-doc-svn29654.0.2-45.el7.noarch.rpmdd57fd3b5bf93c6a9ea150f9c76f623a686a6425cfb1604566cb9d92b80b5490texlive-2012-45.20130427_r30134.el7.x86_64.rpmfd8f3d38631d33650a15b5acdb88971ea7ee364a4af3b29cecdc1071a0471471texlive-wadalab-svn22576.0-45.el7.noarch.rpm68711264c3e91f8ed8d8e0743f240448b05db8a07babec02145e025f64051acdtexlive-xetex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpmb8503cd968d2dfed61253d791c23450c80eb9d48643e9b065ca99ee558b6abc3texlive-makecmds-svn15878.0-45.el7.noarch.rpm2f78be340cc0e2cd8f0e240418bfd2c6fab26c1c972184ec953b682093b4e380texlive-palatino-svn28614.0-45.el7.noarch.rpmf0d6bc6576157854e649a2317c3fde1ab7b7082ab9c1e52d12392a14fb19ca4ftexlive-parallel-svn15878.0-45.el7.noarch.rpmef109ee3a4b18f9d44dd6ea50e46f838f7125cf59c3ac837754e0334a147b0d6texlive-graphics-doc-svn25405.1.0o-45.el7.noarch.rpm67bb876a8b833a205f2978af0d1a147c29692e3523cc2c9860f93fcae1d7370ctexlive-dvipdfmx-svn26765.0-45.el7.noarch.rpm8771a923fa4b9b19d424806450f2a3aa10c3f4087b2ada06b29a015a6b15d436texlive-mnsymbol-svn18651.1.4-45.el7.noarch.rpmd75dc35d34a94c380be3f4e2ab90246a3aa0c4a56ebb0ab68dd5d8cf8fe35ad9texlive-tetex-doc-svn29585.3.0-45.el7.noarch.rpmde9994cca10bee3194f2ab0d5cb9caf7b578dc800b56c6b56a5af7087bef1494texlive-hyphenat-doc-svn15878.2.3c-45.el7.noarch.rpmeb01e04710b27dea038575bd60945e2ee1329f188e8e71ad7012e74a1f990fe7texlive-t2-svn29349.0-45.el7.noarch.rpm5a1f77cb58268413cd03e9efcc36bab038517de753b7e93d8f2a82275b537458texlive-textpos-svn28261.1.7h-45.el7.noarch.rpm8ccb56ac9b9e4873faa946ce0153a041a1aab9917550a9205d75d8fa1eb58171texlive-xetex-def-svn29154.0.95-45.el7.noarch.rpm4416b76f27f4d4e5711e9c4ed95cac6ab92e6d099be51104fec445f68e1bdebbtexlive-utopia-svn15878.0-45.el7.noarch.rpm37ffefdce4b6dea3b8406238519e1a75cb5d7cbcea15ac1b31df1f6163e7d7bdtexlive-tocloft-svn20084.2.3e-45.el7.noarch.rpma1423f22609cdff7e7b713ce881d1cde0a82156cd5be4279815246746c4f4f7etexlive-oberdiek-svn26725.0-45.el7.noarch.rpm4bda9b9dc45eadba92f991e4fe950505e6604de758f2743ec3d694966e5ce4d6texlive-epstopdf-doc-svn26577.0-45.el7.noarch.rpm463350636e9acc7f61305056ce7e3985fd26fb7f031c64fd8dc45d0a8c3a7310texlive-anysize-doc-svn15878.0-45.el7.noarch.rpm9a7b232e0dbee718d7239a3917ffde5654b48955a2f6f1e7334681120189b31atexlive-adjustbox-svn26555.0-45.el7.noarch.rpm5660804528c96a7aa393fe51550ba5bddbd0f349849e091559d1cee53726d41ftexlive-l3packages-svn29361.SVN_4467-45.el7.noarch.rpmbfffdfaab7ae034166b1de37432d346277eafa1a93422e0c3938948abef456fftexlive-typehtml-doc-svn17134.0-45.el7.noarch.rpmdf5b09029180c2b9bc993bdf87ed83758d7a755eaf8a81b5b052f6f0732aeb64texlive-pdftex-svn29585.1.40.11-45.el7.noarch.rpma5d865311c341edaf56a855b2fe0a56616ef1a783b1108fea1b410dbcb5e5e27texlive-xecyr-doc-svn20221.1.1-45.el7.noarch.rpm1a28abfdf7a25ae040280d890bd7770bc2fd036b1d4976351abc88032e23461btexlive-xetex-itrans-svn24105.4.0-45.el7.noarch.rpme1c87910fe9dc0b82ae87c9527f2633607e342935c5bf660f2e3f82ecafeae40texlive-ec-svn25033.1.0-45.el7.noarch.rpm6f48630bd22224e59838677911cf29961cc389c351ad117b7d5520bf841935catexlive-fontspec-doc-svn29412.v2.3a-45.el7.noarch.rpm32c080356697c6ff4934049f0e72a91489a6f19988a4263b0c4fade1f1425c24texlive-ifluatex-doc-svn26725.1.3-45.el7.noarch.rpme9f920f71733ccfb340e910d847d6a304113eef7b0c714718d921420f4e6d3f9texlive-ctable-doc-svn26694.1.23-45.el7.noarch.rpm5a560e7fb722af53bd978cbfdd81d3c1ffc3a6800febba51f4bc872ce2a30fdftexlive-fancybox-doc-svn18304.1.4-45.el7.noarch.rpm0dd97ed218cb7f4ecc080f3746223e2966915e8c5e24abfc1ffc96110d2524fdtexlive-dvipdfm-doc-svn26689.0.13.2d-45.el7.noarch.rpm16dcea9a1d005bafcae6fe8316d3fc448d67316374b5d6bc979bce952598cf5dtexlive-mfnfss-doc-svn19410.0-45.el7.noarch.rpm3fe3dad3bc41b93915482d313ac8fa1a294870410fb76d6c48e14f4a17e952b0texlive-mh-doc-svn29420.0-45.el7.noarch.rpm9d7b38ae0834382ff72bb27c476ce799777df81719a71b3eb234ff091c420f3ctexlive-threeparttable-doc-svn17383.0-45.el7.noarch.rpmb63830fabc590b373d877f1aac6f5daf87e1b0efb10af1c0ab9b88ca9281144ftexlive-underscore-svn18261.0-45.el7.noarch.rpm6abfd0b1409a3b4731efda7385907e074f912fd3a263dad93cc2ce76d52f5906texlive-luaotfload-svn26718.1.26-45.el7.noarch.rpm534baf70d61c472ce0656e6013fd8b4078b462e5dc2764b07d007523cd93373etexlive-setspace-doc-svn24881.6.7a-45.el7.noarch.rpm4f7f199444740acfc4af9fd86c7a4f406ce8a4a8e8f63455c39b084afc1c5532texlive-cm-lgc-doc-svn28250.0.5-45.el7.noarch.rpm776100b2951fc52a8c09c7cf550eceab44f2cb2c949e8b205ac313c886c21657texlive-colortbl-doc-svn25394.v1.0a-45.el7.noarch.rpmafd00af4a66ad16006eb40104bc49aac0bea85ca699731e0344de061506f1c7btexlive-xetexfontinfo-doc-svn15878.0-45.el7.noarch.rpm30743ccc027197d9c10332c7d0c57eaa411575c5c19bd2107e9129d4ebb6ee54texlive-ulem-doc-svn26785.0-45.el7.noarch.rpm7a0f3184e7c81d8bfa14e39a083b5ac73c7664ed4b739c6df3c1eae75110689btexlive-algorithms-doc-svn15878.0.1-45.el7.noarch.rpm783ee700fa8a8f5d342c46a72ba44e8b47fc300be6e0ce0bb0f57e88f7a76495texlive-titlesec-svn24852.2.10.0-45.el7.noarch.rpm548c2928c48bf14419f86aebd5c290c950dd1937a31fbe8471aa40315ecfc995texlive-jadetex-bin-svn3006.0-45.20130427_r30134.el7.noarch.rpm43d5e9a282880bb8f1b6bb136ddbfdec703527a8ae82662f8917142619ac7922texlive-fixlatvian-doc-svn21631.1a-45.el7.noarch.rpmbf87786a7aedb17fa51fc53897d50ab752dfbf7167ac630e3b84b4db92c0c652texlive-ucs-svn27549.2.1-45.el7.noarch.rpmfea318e93ba5016272b0563b1966b3a127cde96a5cf7bf5c24c40ee1f3443d4etexlive-xeindex-doc-svn16760.0.2-45.el7.noarch.rpm4a13424af84c48e760f221a56428fdae586cca52838a6ccc90581dc67e60141btexlive-svn-prov-doc-svn18017.3.1862-45.el7.noarch.rpmb4f38f1ea6709fb99057375ed2f5bc0fba9b07dc12d1429f93292b451d0de62ftexlive-rcs-doc-svn15878.0-45.el7.noarch.rpm2f6e0716058d5eac51ab7a5e19f069aa492be6591f646baff33d125f8c24ca5atexlive-carlisle-doc-svn18258.0-45.el7.noarch.rpm82ad4b0cea6116a7cd4ff2f8b4f583ac879c13f412161d9e3d342d360ea4df94texlive-ae-doc-svn15878.1.4-45.el7.noarch.rpm7ae93318bf4e82f316de2e8bb9523ff34f70c4ada1c837eb3a13b4700c152f8dtexlive-natbib-svn20668.8.31b-45.el7.noarch.rpmf008585a71ae5d0884cf6d369ff933b2ce64343e3a12b3018a69bffd5388b0adtexlive-zapfchan-svn28614.0-45.el7.noarch.rpma85793871769ceca8480e83929df9b6b10778945734a030e06565f8ddbc7528dtexlive-caption-svn29026.3.3__2013_02_03_-45.el7.noarch.rpm8b3562227a70604978591ad6e98bb0949db11a2cd725be7a54c98a15ddb90e5ctexlive-norasi-c90-svn15878.0-45.el7.noarch.rpm20816e14bb1f82a2abed52c284f4b0f891ea3bcae104591ae8d7495115b9fa37texlive-fix2col-doc-svn17133.0-45.el7.noarch.rpm5d5aae9855a9631a39afc682ee0019dac9749991d60d0e20d49d807fd3fe5918texlive-metalogo-svn18611.0.12-45.el7.noarch.rpme97df90649f450b59e58acf8de55a9fe4a763aae36ec4f71278cce7f4e1965c8texlive-wasysym-svn15878.2.0-45.el7.noarch.rpm287c7e10f17a95f837519a5868c75b7b1e73a8db9b88f845f9d39df69f8a451ctexlive-fpl-svn15878.1.002-45.el7.noarch.rpm627d9cc45db0311519318cff538af610ec7ca32e16830152b090efb90c99180dtexlive-enctex-doc-svn28602.0-45.el7.noarch.rpm5040ba682014165448526752ec82e4bcb810aa08e7dfe8714ae5d8f9ac6e9261texlive-fontware-svn26689.0-45.el7.noarch.rpmbee24b19d612a418ec07d3918ef8cbddf89159da89ec69e772e32865f62d3a8dtexlive-wadalab-doc-svn22576.0-45.el7.noarch.rpm30c555cecff7d6fec80973ee2f01d15acb20ae3c49300395703483c88e015cb8texlive-float-svn15878.1.3d-45.el7.noarch.rpm8aa9294cfd448dd7a54a1cd69319a9cf702d97b5922c6aa41726264226903627texlive-eepic-svn15878.1.1e-45.el7.noarch.rpm88920ec133c3dce2e12a7691228b505a1420284611b47817205f492f5dfbe46atexlive-threeparttable-svn17383.0-45.el7.noarch.rpmbcf5dfd2af5c6e9a260b452539423780e428dd4ddd12dff1eec722b3b525e325texlive-kpathsea-lib-2012-45.20130427_r30134.el7.x86_64.rpmec4b6f1f13cbdf2c17d4b814e28d6e63584883453faef5c33f8804b812960c22texlive-titling-svn15878.2.1d-45.el7.noarch.rpmcb7a187ca00ca4f916f53593179b6cac08dd2681202b44f1d0d7edbc27ebc069texlive-pst-tree-doc-svn24142.1.12-45.el7.noarch.rpm534af4ce72b8c6ada892852a537d196886bb90c4920ffebd6b080f439ec2cfa3texlive-xetex-pstricks-svn17055.0-45.el7.noarch.rpm226dd647edb7ecf717f50c8fd39d7ee7f883c33ee64adc3bc5bce8074fc6583dtexlive-luatex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpm883de235b79957465f31a9065d8acd67d5a9507324f2cb358285f0ce0662d284texlive-uhc-doc-svn16791.0-45.el7.noarch.rpm6f83b8987f47cbda9a34c09e96fa97e801afef7e84a06cc82068560c67138405texlive-dvipdfmx-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm097cee6e9a306fa36f68e6d9861733341df30897a9a0308d5f7dd0f7795f16b4texlive-babel-doc-svn24756.3.8m-45.el7.noarch.rpm5831ec988e8514a61ddc6086a49d82221a66eb3fb9c9d2d43facaa8c37c2dc42texlive-xepersian-svn29661.12.1-45.el7.noarch.rpm1a970cb699a8c8ac89798a65bc9afa1dcd9974b6f4c584d6efd1b4dd93906f3ctexlive-collection-latex-svn25030.0-45.20130427_r30134.el7.noarch.rpm73e9476f4ffe126867a8a0c6ca052beb15901a19b8e76eece209612f40448cbetexlive-seminar-doc-svn18322.1.5-45.el7.noarch.rpmddcc2b702fc34cb8191e0506a446c147afb876cc0e4da717fca118c5dcea1924texlive-xesearch-doc-svn16041.0-45.el7.noarch.rpm80055c8f2373fd6ac332572a2551e95e013084847bcd5923e0996a24ddedd78ctexlive-pst-coil-doc-svn24020.1.06-45.el7.noarch.rpm3acf08d69a44b86db020e28678936141aab47f46dca8ed8cd636a6022359c9c1texlive-pst-node-svn27799.1.25-45.el7.noarch.rpmc84400c207dfaf559c8762955b6c5530b4da8f6dd4608f23eb3141e6b5c8adf3texlive-jadetex-doc-svn23409.3.13-45.el7.noarch.rpmfe6d3f8c9d92b178e8257dfb5e4732dbc40a3453ba7ae17168bef04c5251a8b3texlive-garuda-c90-svn15878.0-45.el7.noarch.rpm5632e8213c5ea8d4b0bd1ff07d6d0ddea8e65c306c7a511156529c6fa01564e0texlive-xkeyval-doc-svn27995.2.6a-45.el7.noarch.rpm3d83501273e4eb504c830a2a9a255d3acbc34e3bf8d39a3c8f713f40cced8357texlive-was-svn21439.0-45.el7.noarch.rpme1f21bc86738541050b696010103fbf1ad414f79201b483852247af11825156btexlive-psfrag-svn15878.3.04-45.el7.noarch.rpm8e84b806351c4c7f2892dbf82b5302b77582140c545d68655fd38122db1ece57texlive-breakurl-doc-svn15878.1.30-45.el7.noarch.rpm3c0243e3e6df4d0218b7017394bdea8841057a27c204310964f8de0bd6fea878texlive-changebar-doc-svn29349.3.5c-45.el7.noarch.rpm00669a9fe964f6e4a35d80960188791d3eb5412ac4f49f8cf7688db54b750c09texlive-footmisc-svn23330.5.5b-45.el7.noarch.rpmc8bf81dd554ed485facab5a6437f485565c83d5ec38c7c8d38f44a7f30de81e1texlive-thumbpdf-doc-svn26689.3.15-45.el7.noarch.rpme24b56e0cb963a02e81dae0b0816bd2f906c94578159b768064e6ab45f714dc9texlive-graphics-svn25405.1.0o-45.el7.noarch.rpm6db60a82fe2cf0fccfd775007005d7c68f0a37b1ec3609dbc5cd64ee2805e97atexlive-philokalia-svn18651.1.1-45.el7.noarch.rpm92c6d1c860bfad352f77737aebc88792946fe1ae3495db1a8fb9e587073fcd34texlive-enumitem-svn24146.3.5.2-45.el7.noarch.rpmf00d1725918dcffe076e3a621bbb70d85696f0fe562ab616bed658b43b57dd67texlive-xetex-itrans-doc-svn24105.4.0-45.el7.noarch.rpm2f09388fd9dd200b370ef2b0e319292b9254ebd249bfd8f2ed326bb5861fb9d3texlive-currfile-doc-svn29012.0.7b-45.el7.noarch.rpm081c37293c115278280f1dcdb288676ec813dab30e74ad2d851c6b2c2a0aa850texlive-pst-blur-doc-svn15878.2.0-45.el7.noarch.rpme3927d0aa38f9c60f210e3d0c166f127f6161859c543c2befd61e945d81715d5texlive-hyperref-svn28213.6.83m-45.el7.noarch.rpmed4a220b5c41156e751a3467d87807497293fe176326e749264a3ecbabeebc51texlive-bigfoot-doc-svn15878.0-45.el7.noarch.rpm25ee0079843baf06770253e74915c3e626dc7815b73f68aa8c709f07d1fecc66texlive-mnsymbol-doc-svn18651.1.4-45.el7.noarch.rpmd9803379ab595503312c4c67b62e8fd7f373def32a65cf4f19003a9173eb5c91texlive-appendix-doc-svn15878.1.2b-45.el7.noarch.rpm49e802089b564aeac5ee1609af538997ab38d7158969985d3919e183cf285c94texlive-unicode-math-svn29413.0.7d-45.el7.noarch.rpm937e6fd4911615f3615a25ba4cd15f795868917804161f3799ec9334e6857aa7texlive-tex-gyre-math-doc-svn29045.0-45.el7.noarch.rpm5f9d5be1fd68ce7db39cb8a133940a00121437316f49da8e73f636a084c90b39texlive-mparhack-svn15878.1.4-45.el7.noarch.rpm2eff5482b122629ea94d5bbd65eb7298ddedd916277ec060d293fb203dc6b235texlive-ulem-svn26785.0-45.el7.noarch.rpm19d996ce82ba352a71bab1cd0fdbf54ffec415ef1ac1779e9e5a36a9085911b2texlive-oberdiek-doc-svn26725.0-45.el7.noarch.rpm5f308100fc8bb7fca406d60d292fc1d139cb50fc046f304a06e3536f46ce09f5texlive-koma-script-svn27255.3.11b-45.el7.noarch.rpmedad8611aa3b25d156245c59b4cc70560c7913d1e7fb7007a683ee3e1e8a8f3atexlive-epstopdf-bin-svn18336.0-45.20130427_r30134.el7.noarch.rpm12a9a2e0a8edd63ad8cfa5f2b05ce32c6014425d1189753919c3c3a1e9c40ebatexlive-luatexbase-doc-svn22560.0.31-45.el7.noarch.rpm37c9bab1b4358a2d69f28c2fc5ccfc9da3654bbe23c404e62bcb49d0ce43e22atexlive-parskip-doc-svn19963.2.0-45.el7.noarch.rpm93fd637429984bf9d440ba338f49a9a585a3bfbb47389a8871c0497af2184bd9texlive-collection-fontsrecommended-svn28082.0-45.20130427_r30134.el7.noarch.rpm90e4066ac06b903a02ba867598d76e998e37ed7707de29a80a568c90b277960ftexlive-etex-pkg-doc-svn15878.2.0-45.el7.noarch.rpm492f142a423e3411bb39fe7b5b9df1c94ae3f53bc2a49846bd226299dc072addtexlive-pdfpages-svn27574.0.4t-45.el7.noarch.rpmbdfa440bd18fa1d673c301b112b6a55ad1a84ac8f1abfc05de2722dbe82287b9texlive-epsf-doc-svn21461.2.7.4-45.el7.noarch.rpmab121f992318bd2085a7535e30c099ada576962ca419f5fc7a0689611002878ctexlive-cns-svn15878.0-45.el7.noarch.rpm13783ed40f364f78bbceae11b59e1f886fb073c599edda8e9972f04ff6c74edctexlive-pxfonts-doc-svn15878.0-45.el7.noarch.rpm0fb125dbd1202c33230f9c874912bd45186acf85e6e3fe9d0d7c2735eb670417texlive-tex4ht-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpma29d879e4b52b2659355f778ace1d462d494d6cb135b3386377b43db3d39cec3texlive-ntgclass-svn15878.0-45.el7.noarch.rpm393b87c8eb6a50ed6a8b6765218191d35b3ddfc72b61cc9d6254dce1f2adeeaatexlive-xetex-tibetan-svn28847.0.1-45.el7.noarch.rpm043d62074dd901ab6a58bf6793fefde96f5a997f374b6720227699602352fb6btexlive-fncychap-svn20710.v1.34-45.el7.noarch.rpm2652f5028d5fdd952663aaca269b3daa4c4ba575fb39fe2a7736e039de9b955btexlive-subfigure-svn15878.2.1.5-45.el7.noarch.rpm04dd3fd713915e1ea2d876fe18e13f1da0c82f983a644cdf3ff01dece22a3962texlive-makeindex-doc-svn26689.2.12-45.el7.noarch.rpmd59fb53527215f1089f793693f6d24aee20b47bfadd3999a902e7d78e7436602texlive-fixlatvian-svn21631.1a-45.el7.noarch.rpmf34e1736be0bd441aea57bee1516493cfe713a01487debf82b7ebab19bab6681texlive-dvipng-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm695504ac04a7502eaf1abae69e69eb704f0116c0412390d9c358b2c18c548d16texlive-makecmds-doc-svn15878.0-45.el7.noarch.rpm9b1a22f8373fd3079bf467e9366d5969735690b3814f3757a6fb92fd4772d708texlive-metapost-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpmf1612773a292449e76975710a3b0013d05d4766841d4f7638845474a46b20b0ftexlive-latex-bin-bin-svn14050.0-45.20130427_r30134.el7.noarch.rpmc112b457fd4a5e2e628d748836d56819f3c435ade4ebd41550d92884147cd496texlive-lm-math-svn29044.1.958-45.el7.noarch.rpm24a56c7febe63d789299ca6721978ad386fb9163b7ea79da66de8827e2851a4ctexlive-varwidth-svn24104.0.92-45.el7.noarch.rpm836af5f88e838f4fe3bacdd86f289ccac4b31543de56c396f2e6710df8a720f7texlive-jknapltx-svn19440.0-45.el7.noarch.rpm55de3b6d7fc6702ba12b93fd0377ae9bdaf0b42fcd5cc9d73210c8d2655b3c5atexlive-ifoddpage-svn23979.0-45.el7.noarch.rpm69f1543399793f676a280b3c973044ba3457da59f56da26a7f4f439b36df93a8texlive-powerdot-svn25656.1.4i-45.el7.noarch.rpmf9b56f4bb1aa5b09345cc3ae88d44274f35afda6f58c3f2d23758c98dc78f8b8texlive-pgf-doc-svn22614.2.10-45.el7.noarch.rpm3510e63a99fadf48de7b579c0f7f7378a139bab3689966e0496439717ab1d63ftexlive-pst-math-doc-svn20176.0.61-45.el7.noarch.rpm4b65d5e2923857435476577e195d910754f47d88d961cd845f9e0898d2300e60texlive-gsftopk-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpma2a628701d0262f4de2990489fac1385a37705922f73c4c2efcbe00d9b5ac5catexlive-subfig-svn15878.1.3-45.el7.noarch.rpm153bea0b844337c310bd4a6ef579cc3829c5cff434ab4d4d3c9885b1a83fe09etexlive-babelbib-doc-svn25245.1.31-45.el7.noarch.rpm205d7da7011d955f625c6202e2fe9751abd56d8038d891708a36ccfa573c622btexlive-textpos-doc-svn28261.1.7h-45.el7.noarch.rpmb7abce255c5fdf831c4e211ac85849a7bf262de2c2566e0403a0e09108f6209dtexlive-marvosym-svn29349.2.2a-45.el7.noarch.rpm84bad1b2d91e240149516180080cd0cb2019d647c8dbb1211b04a57e4df258d6texlive-bibtopic-svn15878.1.1a-45.el7.noarch.rpm7ef056f6988b275a23d9dc7ee3d6370e929ede130a03c9d7c22223ea4c7d50batexlive-titling-doc-svn15878.2.1d-45.el7.noarch.rpm10c006dc6f42596301054aff37f5d48a75abc20a8923d52cc3c687936eb397e0texlive-dvipdfmx-doc-svn26765.0-45.el7.noarch.rpm554b25b001a7aedf708dc097dc78a215ff85dd4b2c86dc1e4ac019dd69092f55texlive-filehook-svn24280.0.5d-45.el7.noarch.rpmc71cd6d0ebbb92935bf826bbb8750fef9641c1dac4ebfd4ae9cce650e701a2d1texlive-bibtex-svn26689.0.99d-45.el7.noarch.rpmd71606c2d98a6b273fc9e2354630a87274a2c8e3c77610099e0074e3256272f9texlive-fmtcount-svn28068.2.02-45.el7.noarch.rpm37cc1ec1d2ad32153724cc071a8be79615d021a7bfc72a23cd4970cb89b04095texlive-unicode-math-doc-svn29413.0.7d-45.el7.noarch.rpmdc731737e60c31ac5d51f3327dfc60719bf6dd3bc0cd41277815e5174ddb08c2texlive-metapost-doc-svn26689.1.212-45.el7.noarch.rpmd440496268c377733dc67031b4753c52784f48cacc325262fbadc2b1b0a4d9cbtexlive-ncctools-doc-svn15878.3.5-45.el7.noarch.rpm55e55793a247f77f8494d0efab62046067337aed14f6e266d3630e9b5274da25texlive-appendix-svn15878.1.2b-45.el7.noarch.rpm4675b54bde8131f766940c611705bf5dcd8851f06e493113a7c706c00b15166atexlive-xecolor-doc-svn29660.0.1-45.el7.noarch.rpm2d9969df989cc06cc72e823c39e061b7da7841ecab292cfc09f12769d434734etexlive-changepage-doc-svn15878.1.0c-45.el7.noarch.rpm226ae2b709f40236e6d941daf3e68e8d42e8db93cf6b281a2367fac75bad04b7texlive-thailatex-svn29349.0.5.1-45.el7.noarch.rpmaa3806fa577604e211ff0a5c2983d52df0eb38120db72b1f57f6e88bfcacb66atexlive-xesearch-svn16041.0-45.el7.noarch.rpm004a26efd40d17e9e66969f893ff704174dfd42be25820fc417cb0b104589d6btexlive-hyperref-doc-svn28213.6.83m-45.el7.noarch.rpmb0378f56bead85c0d0bffa4638fc1c2bfcffbf3074752cb48855526caffe5585texlive-pst-slpe-doc-svn24391.1.31-45.el7.noarch.rpm18f242efb2e38be49a9b89da3a0badae842c8f25ffb65bccbbe3c7501a42b259texlive-luatex-doc-svn26689.0.70.1-45.el7.noarch.rpmd6fbee84fa53c5bfcdd80f5d75d48c597ad56623113f07160320486e95c613c9texlive-avantgar-svn28614.0-45.el7.noarch.rpmd3801c03b236e6972457405776793103daf3ce067fd546345b5ef4312d6a8603texlive-xifthen-svn15878.1.3-45.el7.noarch.rpm2211b93ccee206457b5bfbec1aff1b9e72ffe33684e9a5cdf472568f0467d1fatexlive-placeins-svn19848.2.2-45.el7.noarch.rpmc4548682b0a9f57488e9a414632431aadcdc6b478a28d17b06300107c880964atexlive-makeindex-svn26689.2.12-45.el7.noarch.rpmd73f039d529f5945b617a3bf81c8ea884044b49043be24b4eb0e51e2e0a350e9texlive-ctable-svn26694.1.23-45.el7.noarch.rpm15aad23678f41008bb7ed548dbfc2f911e488d48bbd56080880a816416546b71texlive-fancyvrb-svn18492.2.8-45.el7.noarch.rpm190aaa0d8cc02e9c7fae73cc917a6fc5afba9f3e898bfd505c133728054279e5texlive-gsftopk-svn26689.1.19.2-45.el7.noarch.rpmaac40e794bef7df266c4d0db88f97bc8d8a8241882fb65f5704d2e975e6b4e30texlive-pst-fill-doc-svn15878.1.01-45.el7.noarch.rpm86cf2f9381331519c1db63122ccf4ba78f63ab60146e20b2bc8104e54345b54dtexlive-textcase-svn15878.0-45.el7.noarch.rpmc750e214d1a0f0cec7eb2ee1d075773abb7e7d6cc374a2aaaf2e77952cb17c3atexlive-arabxetex-svn17470.v1.1.4-45.el7.noarch.rpm7d5ef5a3f3983ceeb38e1b827785852c03482f99280e3921d38f2356423427e8texlive-babelbib-svn25245.1.31-45.el7.noarch.rpmb0ae3478ff87f1188777126607b523af705988e427c0d25f7e0342fdeeb91646texlive-euler-svn17261.2.5-45.el7.noarch.rpm4330efad869862bbdad35dedb1601b18eb1c6da3b51a2d44d6c870a11b81225ctexlive-pst-eps-doc-svn15878.1.0-45.el7.noarch.rpmd139d5a31cdbff6d3b69d4847f18a70c5da43ba1c32c30d61998b210f8b7da27texlive-xdvi-svn26689.22.85-45.el7.noarch.rpmae9010165081d45e0194a7e4091596c7b74639c6d84a97b94ebed79e671c0c49texlive-psfrag-doc-svn15878.3.04-45.el7.noarch.rpm81c36074d5c24c89a087a1e1947eed82957972bd3a7fa4f846efe289e70b20f6texlive-cm-svn29581.0-45.el7.noarch.rpma45600141e1f5b3bfc8bdd86c50103026ad94a505b5195b8f6694526e5c6af39texlive-mptopdf-svn26689.0-45.el7.noarch.rpm3eb07ffbdef82782ee39b7dd5d02a0ea57ea7337eed9613a0f02dbe18f5634cbtexlive-xifthen-doc-svn15878.1.3-45.el7.noarch.rpm8395cbefac1d3e0cbbea476046a6af2e37555874bb128c071ae8ccaee5b4c34btexlive-framed-svn26789.0.96-45.el7.noarch.rpm402b2ab97b3fa25aaec7c7652fd402151d2da9bf253949ed8ca7d30fc74b3d04texlive-kpathsea-doc-svn28792.0-45.el7.noarch.rpm95a9b1ce2ec8613375406c7cfe480ae41497b90b2957e7764d86d1c23011b0f6texlive-rotating-doc-svn16832.2.16b-45.el7.noarch.rpme47a39776020cae536002d8733df8c0fff0c2a6d57bead36543545abc7d412f9texlive-pst-math-svn20176.0.61-45.el7.noarch.rpm4124f3396d0375112a6116cdbed23d048279b4e6746b93d0ea546e019f3364e1texlive-type1cm-svn21820.0-45.el7.noarch.rpmd65786dd2ce2619d35e3969cd3df78bb747ea5d1c0b1228d60e87ec85dc79442texlive-ifetex-svn24853.1.2-45.el7.noarch.rpmbbc3cbce21fdda31cb62aedd97c4f158618843370f9242b101b1978c9685e951texlive-euro-doc-svn22191.1.1-45.el7.noarch.rpm5f59b6a30f9bcb65aeaed3a9287e165ea2f64c4165e40222f8c445391e725b62texlive-sauerj-doc-svn15878.0-45.el7.noarch.rpm25daf5da5c382ace875f461b169bfb87745cbdbfe502eabf5201b0e83d220c32texlive-parallel-doc-svn15878.0-45.el7.noarch.rpmf10102102fffe2c628f7b75bd12d9b14618ec8199c0a5e11eb5a639e9570727ctexlive-section-doc-svn20180.0-45.el7.noarch.rpm338e642955ce425555289caa07470ed67615177e25c05cae695723f5b9f83152texlive-beton-doc-svn15878.0-45.el7.noarch.rpm7f84ef7ae4d703d456105445bcc8babf2f7560d8ef5425072f37b0d2762560cdtexlive-tetex-bin-svn27344.0-45.20130427_r30134.el7.noarch.rpme5e0326adb8923fb25ce42d60f1a0691fc15db4b221edf488f3cbe21403210a0texlive-luatexbase-svn22560.0.31-45.el7.noarch.rpma17c548beedb84405c093b989d399178a65e7b3000e4e1f97f2b501c133d313dtexlive-arphic-doc-svn15878.0-45.el7.noarch.rpm3f0d4cbac80473ef2e4d212e8cdff7285be2cd4400b6879e4bb7851dfc294b97texlive-powerdot-doc-svn25656.1.4i-45.el7.noarch.rpm615f48ec23fc18dd2e3212c561f528a1d5029b81705b125a052b0db4bc3fa676texlive-l3kernel-svn29409.SVN_4469-45.el7.noarch.rpmafa9d4d37be0f93c0c6f619b927fc8a03dfc89a52aa4af65c7d9c164e30798ebtexlive-multirow-svn17256.1.6-45.el7.noarch.rpma25cb754d919483527e476e940c77f37ca525d49e06dc6f22c94c2740db32d91texlive-base-2012-45.20130427_r30134.el7.noarch.rpm823bef94bef5ea13707f357a9240bd0119b8422cdbe83249f85de6d8ce3dfc5ctexlive-mdwtools-doc-svn15878.1.05.4-45.el7.noarch.rpm67c519846d56727958f6598fe25907b6c0e791e0612097508906fc8f8d5f02b1texlive-symbol-svn28614.0-45.el7.noarch.rpm35dc4de24fc0f550f6e2356ac658efb6e42afa751040f7a19d7b04ab2c5aa089texlive-babel-svn24756.3.8m-45.el7.noarch.rpm87007f702a313c8a93c2e73976a56226665b8770b97d605eff836a28662d29datexlive-textcase-doc-svn15878.0-45.el7.noarch.rpm2983a658ec4fcd5474db5bcf89f407a1342196ffb04ec73495f67c35195ca0d4texlive-caption-doc-svn29026.3.3__2013_02_03_-45.el7.noarch.rpmb7918883ae2fb18c259ca49e7e790f5317e12927447afd332e973f9cc121271atexlive-tex-gyre-math-svn29045.0-45.el7.noarch.rpma57ac23e30fc015a2e6eae75052ff8d789290c6be928f625e61007c4469404betexlive-collectbox-doc-svn26557.0-45.el7.noarch.rpmca128cbaf0aaa32ab96adf6ddda37ebd72175b59bb1b981f1f6b99d8998c58bctexlive-charter-doc-svn15878.0-45.el7.noarch.rpm0b65c0aa9644aae54ff2aae5f7c96f811f5293824d6d1eb2d47f9565ef4d3cd9texlive-latex-doc-svn27907.0-45.el7.noarch.rpmcf46a1be0d32b9620455c301c05f30c48ed16aeef86f70c931d36c751e23e75atexlive-fancyref-svn15878.0.9c-45.el7.noarch.rpm2274a3a276e04d326945cfb84e3765d4c9691ead1ae02e3179c4101e1e889af2texlive-luaotfload-bin-svn18579.0-45.20130427_r30134.el7.noarch.rpm25f927ef3e5754a7b66343eb19b3c548086997b08be0e4bf72f01277620862fbtexlive-euenc-doc-svn19795.0.1h-45.el7.noarch.rpmd347ccd51803aed824eff694aefa3bca92ce96525bdbedf06e102fd888e6d842texlive-soul-svn15878.2.4-45.el7.noarch.rpmb8cff200d52e432c992b56308875132eaa725fd71de21cf2e821644c0bbed1b8texlive-rotating-svn16832.2.16b-45.el7.noarch.rpm1281509d8b75346e14714c332aa1c93fd27e0aad87ca65eb1a49cfe6ced62be4texlive-stmaryrd-svn22027.0-45.el7.noarch.rpmce5121821f5bc9143333d4ddfa0c2598257f4fe4d83477a58ca2881bc8d76e97texlive-pspicture-svn15878.0-45.el7.noarch.rpm957e4d8dd2dd1226442c23763b7eaa67f56cf2e17b324d6b2fbb60ef11f73abftexlive-amsfonts-doc-svn29208.3.04-45.el7.noarch.rpm1dd40ff8fd36119cb26c0413d1c288e3786df892c21cce655d4b82562ab604e2texlive-ucharclasses-doc-svn27820.2.0-45.el7.noarch.rpm056d9a641342768cbb97c632d4e5cf4608f15b7541007ff2b74b03a4bcdb991ftexlive-pst-3d-doc-svn17257.1.10-45.el7.noarch.rpm59e6ed46a6b58ee1e18409d053dc6cfd29cdc93f72dd72b207fbd6786831ad23texlive-sepnum-doc-svn20186.2.0-45.el7.noarch.rpmdad60d10f41faf7e064bb5d5bc537d22f3a2f6685e8a7c430adf3a93491b2b69texlive-lettrine-svn29391.1.64-45.el7.noarch.rpm2a9e153403df873c7ae3b781296274543d0c9cd3fbde6e26439d885f5bdb1f27texlive-preprint-svn16085.0-45.el7.noarch.rpmf34798ca1866edeefd22be293d51cd53d27fe75d26b09d953597a01b1c67fbc4texlive-bera-svn20031.0-45.el7.noarch.rpm683eda1a4fdaf01ecedc4219b70b4388fd8946e35672bc27a71cfc361b192207texlive-dvipng-svn26689.1.14-45.el7.noarch.rpm5260feb910f86f389fed891357d8385e335bf0e87e21e9a1447fa068ba84d93atexlive-pst-plot-doc-svn28729.1.44-45.el7.noarch.rpmace65da04b9eab57534f702e608c8afb7c61d323f09c04f1475e847490a7e0dctexlive-helvetic-svn28614.0-45.el7.noarch.rpm234a8ed49c74d5ba9cf3fe299c210ffec1a58e9d1c73f2ce1066f7a71bf7e04btexlive-float-doc-svn15878.1.3d-45.el7.noarch.rpm99b7e3f821afb4b864550d4359741ae43a1507008f4100aac342a37d4a2830c8texlive-l3experimental-doc-svn29361.SVN_4467-45.el7.noarch.rpm72aebaf86ce9971b1c5fb3490fd1ce7b715bacd5e08aacbf7ea19b98e50c2335texlive-carlisle-svn18258.0-45.el7.noarch.rpmad70faf28030cb58b49202d37f3aae9c4595c3c6fc834fcaa726fdc64854ec29texlive-memoir-doc-svn21638.3.6j_patch_6.0g-45.el7.noarch.rpm9329fd14577c0cd8b947dda029cae08f3f566664dfa517353d46ffaded69a228texlive-csquotes-svn24393.5.1d-45.el7.noarch.rpmaed60512ba4d718585db0514a778b17fc5c4d096cf2d77465dec2e16b0515a1ftexlive-tex-svn26689.3.1415926-45.el7.noarch.rpm521b89f6b18a060f0d094d806be94fa11fe567fa42a0494a0e6f083c19dfbab8texlive-pst-fill-svn15878.1.01-45.el7.noarch.rpm69ab985fbdef4743622e4c716159eac2f0b78b4ffdd8dddb2b39a28d65723709texlive-tex-gyre-doc-svn18651.2.004-45.el7.noarch.rpmad17e728f34ef09acded33b60cdd6fb3ecab726c4f5f35072c613c5ef909f0aetexlive-tex4ht-doc-svn29474.0-45.el7.noarch.rpm10c1aa65b7930e47edcc3c33e6dbd44feae54c523c9c0b798238aa55d6b1c6e8texlive-multido-svn18302.1.42-45.el7.noarch.rpmf0b2ba953e0863ed5d9715875f5b8315b4e9156451f213d7f0592c27e196e603texlive-mh-svn29420.0-45.el7.noarch.rpm93328a57bed6b3e7054ee2de21c9f8cfadcf111a824908b30d8bdcb0b639f64etexlive-arphic-svn15878.0-45.el7.noarch.rpmd610caa0cf142b1511297b32b09b6c2ccdfbb7da70ea2bef05889972d3898200texlive-metafont-svn26689.2.718281-45.el7.noarch.rpmc1b22b98491ce58a551c17539ce9241977dbbd1f40d945a643b742d095f7968ftexlive-lettrine-doc-svn29391.1.64-45.el7.noarch.rpmddf7164b7e750f5f51f588344888ad835eddd86911e34081f824e458e0476fa4texlive-fix2col-svn17133.0-45.el7.noarch.rpm60ea3726110da68292842db4cd0dab79a5a57d4d7900314fa03006b60ed4ae8dtexlive-unisugar-svn22357.0.92-45.el7.noarch.rpm7647cac8152028fac82eaf58555b12eb1a8599bf8542c12524a6b7409d2a34e9texlive-bidi-svn29650.12.2-45.el7.noarch.rpma21f516c283b2f722e7836b3d80ce65cd99c29a79787e9ceaf666f7cd39a00e2texlive-hyphenat-svn15878.2.3c-45.el7.noarch.rpmb8bbf4a46866a4a5e9c0235ff17ea23b23968022c7b550023fadf28c7d8cc4c0texlive-placeins-doc-svn19848.2.2-45.el7.noarch.rpma398cf6700688d75e4191b8fd2107566cdf610131e75eb814434a098fff837ebtexlive-listings-doc-svn15878.1.4-45.el7.noarch.rpm15b6c68bab1996161c6b3a1121cb7a2206af1cd53f36eb295d74d8cee44c8369texlive-booktabs-svn15878.1.61803-45.el7.noarch.rpmaf54ac96eacc18457228965c97d4d37efa5b7ba16e3c2ead92bffff91b54e7bdtexlive-collection-latexrecommended-svn25795.0-45.20130427_r30134.el7.noarch.rpm3b0489fa6270629b7b6ef085470a4053da383400d2c5667444e5429c55b8cd78texlive-mflogo-doc-svn17487.0-45.el7.noarch.rpm763d2f4923fcddcfa665d255d491db83303dad2d6b3fdebec4a820c715388093texlive-csquotes-doc-svn24393.5.1d-45.el7.noarch.rpmaefcab45f943b8d23d951ae0867e38e2b42c050c808d41d0f7a811954a6c6e29texlive-cm-super-svn15878.0-45.el7.noarch.rpm7716b49b325f233e750c657853f685a504eff53c1ded6dbb9472cb53999c6fd2texlive-currfile-svn29012.0.7b-45.el7.noarch.rpm51cccc6d2f567ea0c749ebed159d0f2c14e1dcf369c7d4911addbb6f6ac6692btexlive-microtype-doc-svn29392.2.5-45.el7.noarch.rpm76d614b05997f3a6567e5a2b0e50a5921c8b97055fb3198259804110018449b0texlive-fontwrap-doc-svn15878.0-45.el7.noarch.rpm9ea5822d668688ac4a6ba687e761d86c11903d9c8c07b914bf7efbdbcb1e5844texlive-wasy-doc-svn15878.0-45.el7.noarch.rpmf2990708623d2a14390b65256b074c1e243a2d451200b0526ab9ca1e73fdd7c7texlive-crop-svn15878.1.5-45.el7.noarch.rpmc8df289f16c1c6d44896f6763a2bd41bdb3856fda63c88bf88823f049a720d0dtexlive-fpl-doc-svn15878.1.002-45.el7.noarch.rpm1ae835615408c68d1e23fcbfc4abbe36a031b6c5d57749852ca13ee8f1f7969ftexlive-section-svn20180.0-45.el7.noarch.rpm2d91224592a7f0849c91922baecd3507dbefee0af5c0af882768913b524247d0texlive-latex-bin-svn26689.0-45.el7.noarch.rpm7c03ec52e04d0658fed074538996d6e93d36accf694526b666b0d9e98a517893texlive-texconfig-bin-svn27344.0-45.20130427_r30134.el7.noarch.rpm16079e5de222defb3975d35c62a5adf6911eebd36884c1917889b9ae706915e6texlive-kpathsea-svn28792.0-45.el7.noarch.rpmd679347135b641cf7b777836146047a1351ae602dc8c4feb6b93e47ce0c51775texlive-algorithms-svn15878.0.1-45.el7.noarch.rpmbc848b29eedce7d1680450daab4a0771e06eff1dc7e8e2217c302da9346a6428texlive-xunicode-svn23897.0.981-45.el7.noarch.rpm7b2a4c8e67705eed8c237b6118c57b0aeea2caf844dd6256a2145ec0568120dctexlive-xltxtra-svn19809.0.5e-45.el7.noarch.rpm638c0219fa14418ade6b51dca03119f34753bbe6a72c4a5718a402f05019db4ctexlive-dvips-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpmf2c7ad4b1030efaf5cdde84184f3366b6e9a8a5bee68ce2865ac2478bf1543b0texlive-collection-htmlxml-svn28251.0-45.20130427_r30134.el7.noarch.rpm9d11a70093d6284f026b8581984aabcff98d864bb16b1753f604107858d807cdtexlive-marginnote-doc-svn25880.v1.1i-45.el7.noarch.rpm17e135f84d21deba67a05b9aee17e2192b4b1acda03ce88d76b3ead549fb52c9texlive-metalogo-doc-svn18611.0.12-45.el7.noarch.rpmceb535309f841d72175a4a9c5badbb442db6087ffbd799115727a84da1ef2bc5texlive-xdvi-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpmf180857385d6b28bb6570c162bc179db7a057831234df4d5b3b4023973ffd182texlive-ucs-doc-svn27549.2.1-45.el7.noarch.rpm177eba8a07842b54c96e897509740729423d7841a69250f7a3b157c8f14dd335texlive-eso-pic-doc-svn21515.2.0c-45.el7.noarch.rpm97167df5d36a17b243489622cb37b052406f7e9c7f6ff6382771e8c649edaadftexlive-pspicture-doc-svn15878.0-45.el7.noarch.rpmeafeeb812f0506e9e8fd8007a758812a8fa92dd0a0a2bb7403235e13e9374f6dtexlive-pstricks-add-svn28750.3.59-45.el7.noarch.rpm638ae37b321251062bc50b3657c30713311c95b28287a14706109317d0fc842atexlive-ntgclass-doc-svn15878.0-45.el7.noarch.rpm1160dbc9fea01a669d29c3e72491df393c79598ce9c404b30a5092bb7a3ece0ctexlive-xcolor-doc-svn15878.2.11-45.el7.noarch.rpm9eca645b4e576f811881292cccb7aac40debc3ebd58ec0ca34b2431bb85efb0ctexlive-bibtex-doc-svn26689.0.99d-45.el7.noarch.rpmeab64a7610ba57ea33b811a5260b0141fc61eaabd4c9e89d2407c444eeb77db6texlive-lua-alt-getopt-doc-svn29349.0.7.0-45.el7.noarch.rpmc219da3d2c72900d65d3f2cfa75c1117b5408490e8b695bd4fe1c2aad3f31a1btexlive-lastpage-doc-svn28985.1.2l-45.el7.noarch.rpmc20223a843a7ea12c862016c7ea52940954c5f5d53f37d3bf5b9c3aae20ba803texlive-hyph-utf8-doc-svn29641.0-45.el7.noarch.rpmfe8ceb07145a51367e1aeed61cbde402123aa6738f1d2c250e03db889ed64832texlive-crop-doc-svn15878.1.5-45.el7.noarch.rpmdf6d98c6e30878d8ab49d46f4a97faa9aef4e0666bdc71654479ef1e04703c41texlive-ifoddpage-doc-svn23979.0-45.el7.noarch.rpm6a179f54c46d6bf77f1b663c977a0d51572ffff46ead2689732b403e70ac9b12texlive-xmltex-svn28273.0.8-45.el7.noarch.rpm9e488cfa170049440e708de1c31aeb5ec29199e2d3b97196ac2da62244a76886texlive-mfware-svn26689.0-45.el7.noarch.rpmf660af8b657c4c2be84dadfe7fad4a61eb2835ac0c3886b4384a722d5c74f93ftexlive-pxfonts-svn15878.0-45.el7.noarch.rpmf21e5e970073e7dffb352c052398b2ea55d4d877d514d2f23f2fc7e9960c7146texlive-preprint-doc-svn16085.0-45.el7.noarch.rpmf15a5763e9d58c85eea318bbee13a86a66bee86f3a805f1e8dc824c6ab331094texlive-lualatex-math-doc-svn29346.1.2-45.el7.noarch.rpm3a20fd0a400fa843ae7d61927931b7b7e75d48c09c47d9d2d79555883c4b0c08texlive-dvips-doc-svn29585.0-45.el7.noarch.rpm8b01d3f2da177dceeeccd758722c9aa513484903f9cdb090063ff5ff2f0be923texlive-enumitem-doc-svn24146.3.5.2-45.el7.noarch.rpmbf61168c2edb6796ebd5982bcf2c46945db82d5f8c46cf14815d1295b3f87820texlive-adjustbox-doc-svn26555.0-45.el7.noarch.rpmba7a05005c049a96cb14f8a659643c09a59e994a223e0ab772a96f5f600004abtexlive-multido-doc-svn18302.1.42-45.el7.noarch.rpm5d2ce52e73784c47f004d40da9fd89cfebf28bbe9ca74a65c0423abde7b824d2texlive-lualatex-math-svn29346.1.2-45.el7.noarch.rpm68c340a3c99d80904f68986d0af55f62d3b6b1e99d83f2d7a0aaf9a8b46d43e5texlive-tex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpm368a9edcdf22002a47311e369cbff9b7405e7d0954222c9b6a79d392157de7aetexlive-xetexfontinfo-svn15878.0-45.el7.noarch.rpm7066a703b7d58068f1a38f513943f649ac8d5b60b5b5bd0212e25ae408d50591texlive-glyphlist-svn28576.0-45.el7.noarch.rpm4b55fad5aad011635ee1c3acb0990c230284d00ae8d93f8a594fc3d1361c8605texlive-epsf-svn21461.2.7.4-45.el7.noarch.rpm7ca8902b944845b4e17e2a1597221c00b56054c943a9689c12734d5108f53da1texlive-pst-coil-svn24020.1.06-45.el7.noarch.rpmae3dccde2e188b8186ca86d4880ab64754d78e82ecdc7754db824cd4788d091dtexlive-amsmath-svn29327.2.14-45.el7.noarch.rpme34e68ab8c3476c5e4b6ddd39e572e516db384f95024accba3806cd50b1be9d5texlive-datetime-svn19834.2.58-45.el7.noarch.rpm5436589c3a83b8d82fd02c7d3abd6cfbbda8a785274938a38cc1d63884beb942texlive-hyphen-base-svn29197.0-45.el7.noarch.rpm6c3b45534d05fd2b37a21c801b62ab002a5854c084852033cd35abe921dce3c4texlive-wrapfig-svn22048.3.6-45.el7.noarch.rpm2a2d4c8b24be29239aec620c644defb741e3bab4443cad555ceaa301ba9414b5texlive-bigfoot-svn15878.0-45.el7.noarch.rpm2061faa0b09dea232537f58aa1f93c1f1675b1ed222fc09c628bfec8b1adffb2texlive-realscripts-svn29423.0.3b-45.el7.noarch.rpm4d6a64630e26e7a6004ec8b0580e6bf6662bfb0ae826083362783369a4efee60texlive-paralist-doc-svn15878.2.3b-45.el7.noarch.rpm1878c2d52a7169d0f917e315b26223a8855864ee6c9139aad45055c7e6d54bf1texlive-microtype-svn29392.2.5-45.el7.noarch.rpm8173e4bfc5f65ad87c0ef461d4c5ef19271ce209b450e1032bfb896dc2e2fd1btexlive-beamer-doc-svn29349.3.26-45.el7.noarch.rpmcf3833c6f543f5708349a15419a7ca07e19c988e1392f6f591432d82dbaa13f8texlive-ifetex-doc-svn24853.1.2-45.el7.noarch.rpmce056f7887b3235548053ddf317a24698d7ebb1e587390d97988071ad90dbde8texlive-kerkis-svn15878.0-45.el7.noarch.rpmef072c5a6bba9f3a3f475c481e1a0655e266ba0dc686cdb6fec89ddf741901b6texlive-realscripts-doc-svn29423.0.3b-45.el7.noarch.rpm497d10316c48450dbf71c006b2799683cb82802c7b7380960955f56201297141texlive-ms-doc-svn24467.0-45.el7.noarch.rpm0a1228cd4ce8b9fa3cce3a843bf4778fb3c9515370f1cf693113abd8408f6933texlive-fontbook-svn23608.0.2-45.el7.noarch.rpmea980b0e9973a6a864e9ec59b4b1ce0f0f9014af0d034121654ce0d6219c70d7texlive-showexpl-svn27790.v0.3j-45.el7.noarch.rpm6aa9a26716db68e91c26764af4d9202b0854f660dbc6f5abeef5db3d5099451btexlive-xunicode-doc-svn23897.0.981-45.el7.noarch.rpmbc9eb32e1b00dad0a407dd4848a907ddf28c1f57263ff47ddee53a1fc282a5cdtexlive-breakurl-svn15878.1.30-45.el7.noarch.rpm6b4f1c04a23792596e52e4db6dea23d3cc71bac9c76bb16b5c9cf5ce6bb9d979texlive-unisugar-doc-svn22357.0.92-45.el7.noarch.rpm259b35b618a28c6bbdef3c2be552d2756492720aee677830e3fd1bbbed032ec9texlive-typehtml-svn17134.0-45.el7.noarch.rpm0baf2f5b8f9c01b7697bb651d4281cea78eeb93505fc29ec3f43f45440c44df2texlive-cjk-doc-svn26296.4.8.3-45.el7.noarch.rpmb383de9e58a91d9972b7771d79b817d036d5497361e07f62c7b72da9da4e0aabtexlive-xecjk-svn28816.3.1.2-45.el7.noarch.rpm3fc34779b3aa5aca3fd8c0b3caacf40a69117861e9bc3d115f7e65d6a6dee73btexlive-attachfile-svn21866.v1.5b-45.el7.noarch.rpm368e6b89a4d8ef703d5bb4d1d7f4e4d7cc308b9361ffb9bb12c1b827a41b95e1texlive-l3kernel-doc-svn29409.SVN_4469-45.el7.noarch.rpm3c5acb0fc00c53586e685592fccac24948d566c29a21d54f32b22829817be1b3texlive-fncychap-doc-svn20710.v1.34-45.el7.noarch.rpmcdd5a1f6fe7300a2c8402064467698e83c7e440e1bfc17bdc863b8a5c48e0fa6texlive-sepnum-svn20186.2.0-45.el7.noarch.rpmd891e3c8cd1f431a261126f854ecfbdc44b924c97f5bd875c981371bb23b9df9texlive-psnfss-doc-svn23394.9.2a-45.el7.noarch.rpm586dad93a57170811d005221734776ecb32053ea9716126444d1eefc8d2d9e29texlive-misc-svn24955.0-45.el7.noarch.rpma13ac5a29a446be376bc7ab40e5c3b534068f07828813517f2c36af437816c2dtexlive-fancyref-doc-svn15878.0.9c-45.el7.noarch.rpm61fd0b303a29dd56602e13c2221fae2d6b8dca202294ac7dc3be922732b306cetexlive-fmtcount-doc-svn28068.2.02-45.el7.noarch.rpm0f94c064ab1bed5ffad901e0da32ecebdd34acd6d593c75c731b585201de0b16texlive-ncctools-svn15878.3.5-45.el7.noarch.rpm97f8f32905ed6a2c211def5a77847cbce98d24651e491fe7423c043c6d72136ctexlive-l3experimental-svn29361.SVN_4467-45.el7.noarch.rpm2dad1cd055dfb374db3aee650ea5cc97fd4a4ec62ef024fed237177d5c4b3b59texlive-dvipdfm-bin-svn13663.0-45.20130427_r30134.el7.noarch.rpm45d36439f752d1701262b335531804321eba0945a586a3592f439cdd0207e1b8texlive-zapfding-svn28614.0-45.el7.noarch.rpmf94499b8383fe2d357b5463d1d0cd7bb1161cb73f099f6d3de50ad5dc16fbfa5texlive-url-doc-svn16864.3.2-45.el7.noarch.rpm4d7eff924a39e6438d4e8e0bb44dd1828ce009f2046e5ca3883df7bc23020965texlive-kpathsea-lib-2012-45.20130427_r30134.el7.i686.rpm2f95fdc6b75d32c54b860e4454a15d807caf07ecbd5caedb85bb985c782d47datexlive-mdwtools-svn15878.1.05.4-45.el7.noarch.rpm79259551c697773243dd4c44cedfb31a4c24a3d088c4800e423904fa774ed3e3texlive-index-svn24099.4.1beta-45.el7.noarch.rpme7b0eb2328c27ab8a69e1300f5e5ca6295293b30ce7d4670de694044949e9b14texlive-booktabs-doc-svn15878.1.61803-45.el7.noarch.rpm0110638ea381d8de838ed7f45c23412ba8389ce27250ddec2035c6110f757421texlive-mfnfss-svn19410.0-45.el7.noarch.rpm990920514fa3bde7b70974da177b87e86dc90c00768a503820fafc1e9b4ce290texlive-colortbl-svn25394.v1.0a-45.el7.noarch.rpm9b006bf2907a8321fb75a0d9f3e7b4683cb38e1440c28e920befc08d4ce77502texlive-amscls-svn29207.0-45.el7.noarch.rpm4ccdf117df1508769a9f3f92419e4630cd8e217c8b60c14f62cd489a6ecfc6c5texlive-thumbpdf-bin-svn6898.0-45.20130427_r30134.el7.noarch.rpm00787cc0743467eafe9ba349e2d0c1f340d122d8474e05784284ab8c2dd70900texlive-bera-doc-svn20031.0-45.el7.noarch.rpm21cd7897540b3583d7cba613648504ace8f8bda2262be03fc0bb5e9f2600e2c4texlive-dvipdfmx-def-svn15878.0-45.el7.noarch.rpma9a3a929ba7271a68d14871eb5a8d5f62d77972dde516dd5076742043fd5b01ftexlive-makeindex-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm6b71d84dd9489fb8ee9d116a58ef2bdc4b0a029e6f30062ce0c0256e4a4d2db7texlive-ec-doc-svn25033.1.0-45.el7.noarch.rpm6eecff776f7ddd405f98537d064e8819d3b7e8c0ff30f4c0c1449dcb731642c9texlive-fontwrap-svn15878.0-45.el7.noarch.rpm9677c0d03956b5ffde531875c41c0d41d62fc8f2bd7e779760df34edace2196atexlive-eepic-doc-svn15878.1.1e-45.el7.noarch.rpmfdc5b975f2f50d0abe12855c7a207855291788b9447b7b8eb73ca773072161b5texlive-lm-svn28119.2.004-45.el7.noarch.rpm04ed7ee8cf7556bbcd6d5668ea08ee0b51cce5a1ec0d7e6bf880352a906a4b11texlive-rsfs-svn15878.0-45.el7.noarch.rpm6279ec647b8c2a97754335ff3d0ff655926b6440151d47bf6613f3cc75da0412texlive-collectbox-svn26557.0-45.el7.noarch.rpmf523f9c508c4d0f7b50738bbe875c7a88f5e4d88e7a2ea86b0786eafa9f7ed78texlive-wasy-svn15878.0-45.el7.noarch.rpmc51ac0c23dd20ece6f013f1c11999bdd2d1a840825a0c339d565952efaccb648texlive-svn-prov-svn18017.3.1862-45.el7.noarch.rpm122f29cedd4fcfa3846862e80ba32cb93c81b5e9970e78e0eeeb13dac213f750texlive-jadetex-svn23409.3.13-45.el7.noarch.rpm9f3409f44e2554385fd081510502899cbb869a3d371424c7ac9b1839f784358dtexlive-fontspec-svn29412.v2.3a-45.el7.noarch.rpm9d8e832f048d9c557eb80388ea1b947381641023b51c904f2bec1d0241c25e05texlive-filehook-doc-svn24280.0.5d-45.el7.noarch.rpmc3af90602efa3ea325e9e51336cfc3fae3e8bfdf02a89126ae2f2485743b0cb1texlive-ptext-doc-svn28124.1-45.el7.noarch.rpmece3f66848e11ab5cb3dea4a8421872da85b7fc83a1597c2525029db82dfcd62texlive-xepersian-doc-svn29661.12.1-45.el7.noarch.rpm848ba4618ee6906a65a1536e5cd51cf74c7ec405074cea0626c1f42232e62c87texlive-filecontents-doc-svn24250.1.3-45.el7.noarch.rpmc1c4bb646116e875abdf371a594f044d3097174b0daad20849aff6635bafc217texlive-qstest-doc-svn15878.0-45.el7.noarch.rpm3e4eace6e6986243d2f03fac24593287cf75f66b2696c2a92e9d08f2892b1197texlive-xtab-doc-svn23347.2.3f-45.el7.noarch.rpm0b1142e0e134bfb7f72064db96ec92966cb58af74d8ae87c7cffd461713b235ftexlive-xltxtra-doc-svn19809.0.5e-45.el7.noarch.rpm186254377c75069a462fa1336680093b27e285c4fca4c976a0b684644a2875fdtexlive-plain-svn26647.0-45.el7.noarch.rpm44843784b9d3778d18c75c38e95ed88916c84bf016d7266fc22397cd63ca9956texlive-pst-slpe-svn24391.1.31-45.el7.noarch.rpmeac19da90c9c19f431f684d7486c3619617a249471377e471504886d20432bb0texlive-was-doc-svn21439.0-45.el7.noarch.rpm8fbc0522b17531d1662d1fe301f2a5cd11aa69374ba2522219e0a629646b9817texlive-ptext-svn28124.1-45.el7.noarch.rpmf994a00bf927032b7fe3be85ceadc5cdfaad166193e944ebd2029a9eaad9e3cbtexlive-xecolor-svn29660.0.1-45.el7.noarch.rpmcab29c6d3b3cd9048df1c1cdd5ac13b64c289c73874a083875ec96bd746af23atexlive-l3packages-doc-svn29361.SVN_4467-45.el7.noarch.rpm73a253ec818a7cc04ec9bda1fe1f1a0b9cf776928b66c13245181ccf30845bcctexlive-marginnote-svn25880.v1.1i-45.el7.noarch.rpma6089281b8d2195cfe7109e22b9feb327db53a50b1a59d8235e75ac0ed935963texlive-tipa-doc-svn29349.1.3-45.el7.noarch.rpm13032c0bc6643c84b46c44e27f4a478d8db05271a3ffee0e8862a55477d6708atexlive-attachfile-doc-svn21866.v1.5b-45.el7.noarch.rpm976a1fd15deb01475d3e751da068fac9d40c6148499d26cabd90f9e205eda44ctexlive-pstricks-doc-svn29678.2.39-45.el7.noarch.rpmb5303d40ae92c67f4e5177ea69fb3913c294488bfdeb3d2ae0ca7c3051a62e5ctexlive-pst-plot-svn28729.1.44-45.el7.noarch.rpmca6800e92d7b9f90a995f0bcd32835e2490eb4b1c5f0c9afcaf683a7e18700cdtexlive-metafont-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpma6e76fcaa33af068af8b1c673f04a94bf5470abbca5e2605b386a38f585d7b85texlive-ifxetex-doc-svn19685.0.5-45.el7.noarch.rpm17dbd87df4543e4e8c615181f8189ac42896b0885712a86489610b7e51f8a641texlive-lm-math-doc-svn29044.1.958-45.el7.noarch.rpm1160cc2f13064534b3253150bb489d4cd9a14e6c4025ed710d3994b3f89071a8texlive-pst-grad-svn15878.1.06-45.el7.noarch.rpm352c63bfcbaf59181495210b3b30fded3d62b38ef99129eb0339f41580037b58texlive-fancyhdr-doc-svn15878.3.1-45.el7.noarch.rpma982ff1d5c93d669ad03f55b723aed51205c2cec976592e320398d76314ee225texlive-cmextra-svn14075.0-45.el7.noarch.rpma1719d0d382fead78b1976c962eced28307ddb2303812482edc1101b4eab0a59texlive-datetime-doc-svn19834.2.58-45.el7.noarch.rpm7929aeb85cbd8344e21852d7b4c8ec7422598ea5f233315be28bbaccb0325011texlive-polyglossia-doc-svn26163.v1.2.1-45.el7.noarch.rpm9907fbaeb71b4aa947c4132788d79b5f38181d3be09c1bd189550c3bab5c79f1texlive-cns-doc-svn15878.0-45.el7.noarch.rpm2fabfb71f2e3fa36b7aaaff5f8f3638e18442c808a8f9054fcaf34554da64ef3texlive-overpic-svn19712.0.53-45.el7.noarch.rpm969bdb40f6e25b5313f8c2db5efd24d5d53b8c081865aa78a21185160ea565e5texlive-beamer-svn29349.3.26-45.el7.noarch.rpm54ded66240e2fdd3a23c382eb65b19f88b971d8c42f3bc9cf2da3be49f5f39d9texlive-xkeyval-svn27995.2.6a-45.el7.noarch.rpmae892042993b07c3de06b5c7fc1dda195211506c192062ba092b55a54b0c6189texlive-lastpage-svn28985.1.2l-45.el7.noarch.rpm94090186af79544c7604e50c91d52029508a9b70fb34dc8c18100b020459027ctexlive-subfig-doc-svn15878.1.3-45.el7.noarch.rpm63eeefc793cb66d2c5157e2694677407997d03123db2f3542dc45525b6a01d73SLSA-2020:1037-1Advancecomp* advancecomp: integer overflow in png_compress in pngex.ccmoderateScientific LinuxScientific Linux 7advancecomp-1.15-22.el7.x86_64.rpm080ae5091580e5f0529d3c4707a1d14e6d6b8c2137f86e347477d9f2aedda96eSLSA-2020:1045-1Lftp* lftp: particular remote file names may lead to current working directory erasedmoderateScientific LinuxScientific Linux 7lftp-scripts-4.4.8-12.el7.noarch.rpm121ae03fcd39c1932effcaef3230afee3096878ac399c867e2199225410fe5d2lftp-4.4.8-12.el7.x86_64.rpmfe0e2c48ef4259d3df169f7022ada35f15435b9db1ca41c4fc35e909e8652feclftp-4.4.8-12.el7.i686.rpmfe29e90148c072cdf36b4214dcfa98e3d3c2bd1bc3e47070bf2748f6849aceafSLSA-2020:1047-1Wireshark* wireshark: Out-of-bounds read in packet-ldss.c * wireshark: Multiple dissectors could crash (wnpa-sec-2018-36) * wireshark: DICOM dissector infinite loop (wnpa-sec-2018-39) * wireshark: Bazaar dissector infinite loop (wnpa-sec-2018-40) * wireshark: SIGCOMP dissector crash in packet-sigcomp.c * wireshark: Radiotap dissector crash * wireshark: Infinite loop in the MMSE dissectormoderateScientific LinuxScientific Linux 7wireshark-1.10.14-24.el7.x86_64.rpm516cdbef14d71817cb17086e18990dc5bcbe2dc94d003dbc716a854dfa566a03wireshark-devel-1.10.14-24.el7.i686.rpm8dfa2552fe0502309d90600d1069ab93078ec487f2d3e2b64c7465830b46b2dfwireshark-1.10.14-24.el7.i686.rpm349a5600321619f97a67a6bc17f265f04ede4fef00e1f3fef03c3c9e2e13570fwireshark-devel-1.10.14-24.el7.x86_64.rpmf6def1eeb45a5c5878d6b2a720e8ca1131164a20e27abce41c2f2dbd8e65e95fwireshark-gnome-1.10.14-24.el7.x86_64.rpmc74400819d815a6127f9870642da702166eef2a4a863577d9821ee9f32e5d9c4SLSA-2020:1050-1Cups* cups: Local privilege escalation to root due to insecure environment variable handling * cups: Manipulation of cupsd.conf by a local attacker resulting in limited reads of arbitrary files as root * cups: Predictable session cookie breaks CSRF protectionmoderateScientific LinuxScientific Linux 7cups-ipptool-1.6.3-43.el7.x86_64.rpm30321219fd0e834fd3e02d41d9e35c7bd6374d1226bddd73d5d1c4c90835f2cacups-client-1.6.3-43.el7.x86_64.rpmaee326fc52d7de87a5db127a99f11c47441d95a12296bcb98781d7d3622b4e33cups-libs-1.6.3-43.el7.x86_64.rpmc324fc9c255e9b29a610885beec92383e5d50ea3d17cb4ea992c80c726bc4c83cups-libs-1.6.3-43.el7.i686.rpm38e0ca48e591497d554d421288ca1eb6224c31cc4fb527cf2b74a25dda61b578cups-lpd-1.6.3-43.el7.x86_64.rpm622ff1449cd07bc9a24580519c45409d88a7d128e06bc70c2c7cd9010fcfbd0acups-filesystem-1.6.3-43.el7.noarch.rpmeaa47af47f18b8ec67943dc90377b5586fc337531c386387af094a7723aefd11cups-devel-1.6.3-43.el7.i686.rpm5299ab86d0d5fe29a42d979a18a65e4b80e6f3e292d0b80ba56b63a387ba44edcups-devel-1.6.3-43.el7.x86_64.rpm1d01c1807758623160a5955b6fd0d7460020cfa1dc152df347d3f23aea3b4ce8cups-1.6.3-43.el7.x86_64.rpm3e1ed8a149a19feb1a21cda20b7ba6c85ff32a721f06a9de2a2b5f212d0f89d6SLSA-2020:1051-1Libosinfo* Libosinfo: osinfo-install-script option leaks password via command line argumentlowScientific LinuxScientific Linux 7libosinfo-1.1.0-5.el7.i686.rpm3760b63e4738300d8f4a268e3e24b4f008456576150bbc77bf05d013b4cb4869libosinfo-devel-1.1.0-5.el7.i686.rpma677b764e18a9f52406c8a06fd21eef2276683f210000ea9cdb21961d21342f3libosinfo-1.1.0-5.el7.x86_64.rpmc46df50f1634d79546b96f66b0a0319e3da3ef0589b5f0fdba5e511492f18489libosinfo-vala-1.1.0-5.el7.x86_64.rpmc0a39d2fcfb662c0f873763d727eedb62ce16cb624d44052b827b8d8e8b3b828libosinfo-devel-1.1.0-5.el7.x86_64.rpmf9af81804295dfc445874d3f45b271fc85914e005047091429f9177e1430ba1cSLSA-2020:1054-1Mailman* mailman: Cross-site scripting vulnerability allows malicious listowners to inject scripts into listinfo pages * mailman: Mishandled URLs in Utils.py:GetPathPieces() allows attackers to display arbitrary text on trusted sitesmoderateScientific LinuxScientific Linux 7mailman-2.1.15-30.el7.x86_64.rpm4c6560cc837ccd4ba6fd04a80ea918cb45f8d6e9bbab48cf383ef98d46890c2bSLSA-2020:1061-1Bind* bind: TCP Pipelining doesn't limit TCP clients on a single connection * bind: An assertion failure if a trust anchor rolls over to an unsupported key algorithm when using managed-keys * bind: Controls for zone transfers may not be properly applied to DLZs if the zones are writablemoderateScientific LinuxScientific Linux 7bind-export-devel-9.11.4-16.P2.el7.x86_64.rpmea5b762f5baca5a109756607c81a631dca99ab90f52f9423957ab01a3d484ef0bind-utils-9.11.4-16.P2.el7.x86_64.rpmaace8f95ce403ddff5f197510c377ab98aff702f660f1fc8634492cb83884663bind-devel-9.11.4-16.P2.el7.i686.rpm712f0d3e2eccf7f978293b5cb9602ca0ecde951ea26400fb2d3e29ef00758256bind-lite-devel-9.11.4-16.P2.el7.x86_64.rpm8b03a36cd661507bb99d34d8e0e4ccd0c0bf7f7af4184e008644a849a6370ee5bind-export-devel-9.11.4-16.P2.el7.i686.rpm641e187e4a7f9535d88ce0feef4f46cce6712e86bcef0616328eed50cd365f41bind-pkcs11-devel-9.11.4-16.P2.el7.i686.rpm41bb108f63a5a354a05e3ab97ffe6ddbd1da7da58cb977034ea566b89057baf2bind-libs-9.11.4-16.P2.el7.x86_64.rpm34020acaa109c65d78d37007b574923be687851b6d3e292852e493a3d4e73d38bind-pkcs11-libs-9.11.4-16.P2.el7.i686.rpm3292adb152f80f5d640beedab26556b531d760cf82b8a3fcf18cb0723025ecacbind-export-libs-9.11.4-16.P2.el7.x86_64.rpm6c173d231a58494f95c220e33cc690e4c0614f3b71e7d5e5991a0cc200c695d1bind-libs-9.11.4-16.P2.el7.i686.rpm3eb7473bad7b05c936dc1c76cf5c2f5c9e04fb296eeacb360c0a6a057c9f8b48bind-pkcs11-utils-9.11.4-16.P2.el7.x86_64.rpmd419763c2c5e417c7b3ec3acabf281d5f2fec2838213cf30cffebb2fb0c99e9fbind-pkcs11-devel-9.11.4-16.P2.el7.x86_64.rpmcba3e5fb0491c7258cb3a19aca28d07fcdfde4810d8a48d95965be42616848fdbind-pkcs11-libs-9.11.4-16.P2.el7.x86_64.rpmd3c1252b6611a53f60d775e22523f1af9e6373cbd9289c0bb6e6a92ac5b1dc71bind-libs-lite-9.11.4-16.P2.el7.i686.rpm5602ca7f6e9d40561ac5bcca60b4c07257dc523d637b79e04118c3e2ffaa6672bind-libs-lite-9.11.4-16.P2.el7.x86_64.rpm5c0ef59031be1053a97a97c02a38c4fa8a657660ace78e408194e60bf6fab30dbind-sdb-chroot-9.11.4-16.P2.el7.x86_64.rpm228fe5018d67068d3d6490fbed461a403e2aef39d9374b50f0b397e9a0fa6257bind-export-libs-9.11.4-16.P2.el7.i686.rpm067ad5557a7166d6ae739135bcc887cb426dbb878edc35823d21da5fe95d0e5bbind-lite-devel-9.11.4-16.P2.el7.i686.rpm9c2e5ad684cfc4ed40779692817568c3dcce4d465f05a6e6c61ac47b835e07bebind-chroot-9.11.4-16.P2.el7.x86_64.rpm28c5d31d977c02549e7740b3a15f721257ea9bfe117d1409e43b2f51c131d856bind-9.11.4-16.P2.el7.x86_64.rpm4c8be268faf8a57adcc6235e074313c36cb63cecb2dfcb30ef0209f467fae598bind-license-9.11.4-16.P2.el7.noarch.rpm510c0d96cc175ddb6261248fb31556db49e5f23eab2ed423bff629db6c321d76bind-devel-9.11.4-16.P2.el7.x86_64.rpmbf36656b723c591e2652907a8c5e00a2f231f730569bcd4892c60be3529396b8bind-pkcs11-9.11.4-16.P2.el7.x86_64.rpm0300fcceb4551e69fc6c387cf4c5d96dfa8b6fbcc39395f8c5d34e9b815086c0bind-sdb-9.11.4-16.P2.el7.x86_64.rpm30a7ca3ca3c641f815d000d626b366dda84f581e2616b22dc7497bf1001b63e6SLSA-2020:1062-1Dovecot* dovecot: Improper certificate validation * dovecot: Buffer overflow in indexer-worker process results in privilege escalationmoderateScientific LinuxScientific Linux 7dovecot-devel-2.2.36-6.el7.i686.rpm3471b2af67be1c41d0df3d33f9f09f82164f081421d757375622ea733c62d0aadovecot-mysql-2.2.36-6.el7.x86_64.rpmfa5e40e146ef45f111f7f5d9667609784db3a946a6d5d66f2ad69be32253ad53dovecot-devel-2.2.36-6.el7.x86_64.rpm4e141672ec5797ea26c911891d44e7446fb90553f9fefa7749ac71b05b7af7f7dovecot-pigeonhole-2.2.36-6.el7.x86_64.rpm9b5a1c340971784ee8c0e5f64d7b82cf2417acc248facc8a21dfd8e458529de5dovecot-2.2.36-6.el7.x86_64.rpm8345133371a923a9bd6b155b64fb30508e917d46a375a362ca08047aab24446bdovecot-pgsql-2.2.36-6.el7.x86_64.rpm74d2556aace15a0243c5b30ea40af5fef33c17b8e560a12663b650d8887be32edovecot-2.2.36-6.el7.i686.rpmc23d960bf920b3ac7a70005c2802b692d0035648df9094816275cd1e6da511f4SLSA-2020:1068-1Squid* squid: Incorrect pointer handling when processing ESI Responses can lead to denial of service * squid: Incorrect pointer handling in HTTP processing and certificate download can lead to denial of service * squid: XSS via user_name or auth parameter in cachemgr.cgimoderateScientific LinuxScientific Linux 7squid-3.5.20-15.el7.x86_64.rpm15fc5ca999e8a13629671d1eebfa9ad54e6a2a84ef71417a692b163b52a2d7aesquid-sysvinit-3.5.20-15.el7.x86_64.rpmad77d33417d11d48fcda68bfd72354b4aeb974a3a7cd78138707c75153dddf69squid-migration-script-3.5.20-15.el7.x86_64.rpm743619611cd8c503214a741ddaf8ab78a9439f53e8d85b606a8a96bdb2c9f402SLSA-2020:1074-1Poppler And Evince* poppler: integer overflow in Parser::makeStream in Parser.cc * poppler: heap-based buffer over-read in function PSOutputDev::checkPageSlice in PSOutputDev.cc * poppler: heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc * poppler: integer overflow in JPXStream::init function leading to memory consumption * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail()moderateScientific LinuxScientific Linux 7poppler-cpp-0.26.5-42.el7.x86_64.rpm121d38e13b1bec5c3d1dbe12e20f7d927faeed46153411e761be3dd2389f5107evince-browser-plugin-3.28.2-9.el7.x86_64.rpm41284fbc4a6721db87020b671c8f6ed0c6a230869cbe95702aa9073d767daffepoppler-qt-0.26.5-42.el7.i686.rpm57f944d40ce2664d5775cd7cc4b696e2d1a3180e076731295e18cdf3e3fe2cf7evince-devel-3.28.2-9.el7.i686.rpme2556ecaa99db1085d4d857e72487284a9f1357c69fe86fec5f6e5e925783ab1poppler-glib-devel-0.26.5-42.el7.i686.rpm59fdc887f5ca48f0aadd844f2c7a245fdc29a81d50b9936dc119881ee0f407f1poppler-qt-0.26.5-42.el7.x86_64.rpmc8561c93f6833df5e6290578dac9cfdbda8f6e7bc1167597737a9ed89ec267a1poppler-glib-devel-0.26.5-42.el7.x86_64.rpm68ffcab44ffc18c05a0e147d1ab2c8863da70cc5b09d9ed5ae4862855063dcb9poppler-utils-0.26.5-42.el7.x86_64.rpm646b7fe4c208dde5f7d115be14fabf3ad88ce7e6100419b46909dbb349b76a23evince-libs-3.28.2-9.el7.i686.rpm35475694cd6e27c3d4a3dd94c815b5530f7b28d4c5cbaf9d1ae7e3f80705675epoppler-glib-0.26.5-42.el7.x86_64.rpm86acd8c0c09f19c9f58414517171b14bcde53bea344d88120da4a56c8da615feevince-libs-3.28.2-9.el7.x86_64.rpm0fdbb41c14cd59c9532f66a18f00d9d06bb1fcb0979d1058e9b93a06e613e285evince-nautilus-3.28.2-9.el7.x86_64.rpmece61e44d447bfe2cf60687a385bed20b74f39aaf1824bed11d4ed9c1c189416poppler-0.26.5-42.el7.x86_64.rpmbcd114783b465399ee55b75330971eddcbf9a6bc0d740e44b0138179d7a8e2eeevince-dvi-3.28.2-9.el7.x86_64.rpm1b194752f2075e884891709178cb5ba22636c9c4151e433835821c7459f2ab82evince-devel-3.28.2-9.el7.x86_64.rpm5bc625c69197cffa3b45f0461d8048e1612a0c57be18d5232ba35063415feb90poppler-qt-devel-0.26.5-42.el7.i686.rpmaa670777ca20d7fb054e820369612825f8e323e7c62dbbff988393fc20f31436poppler-qt-devel-0.26.5-42.el7.x86_64.rpm6b6b21ea965a82e591a8597ae10dd362cf54464401b899db800ace5990d9fec0evince-3.28.2-9.el7.x86_64.rpm03461032243ca44b39915b468ea125b5b67f1eb1b8ee57064b38412f475d23e2poppler-devel-0.26.5-42.el7.i686.rpm8f0e15b6de84c046593322253939f4ecffbdfacb8a71db97842d4cc56e5c9122poppler-cpp-devel-0.26.5-42.el7.x86_64.rpmfed6077dd7185b610ca776ff5ff44515c7d1d2614cf56b7f1b35422b51531b56poppler-cpp-devel-0.26.5-42.el7.i686.rpmef0fb14d8938a802c8a7ea5829ee528f3b05351b95ec345fa2efd8da5c087042poppler-cpp-0.26.5-42.el7.i686.rpm1a0835bbab9409d741bda90b83bf75e735afbd882debbc74e87ab321eba8aa68poppler-glib-0.26.5-42.el7.i686.rpme5bd633d589369b80c07da8d5759ce49d4bc0468de2011ec5a7910cb397f584apoppler-devel-0.26.5-42.el7.x86_64.rpm65808c4480bdb4f8454ba467465fa2fe0e59b70be47ac223424278d61720a2e4poppler-demos-0.26.5-42.el7.x86_64.rpmcf8dbe9eb038ad8403b5f5197e47c325015c010fa4c6f650c73c62f67fa0073bpoppler-0.26.5-42.el7.i686.rpm49fdc6a357057025607e0104504715532b731c20dd6b241cd1b53ac7d80fd9f4SLSA-2020:1080-1Evolution* evolution: specially crafted email leading to OpenPGP signatures being spoofed for arbitrary messages * evolution-ews: all certificate errors ignored if error is ignored during initial account setup in gnome-online-accountsmoderateScientific LinuxScientific Linux 7evolution-data-server-tests-3.28.5-4.el7.x86_64.rpmb9abf6a378985658960f3d9ecef7e9e6805063ce440ace25948d6fb290e48a05evolution-data-server-perl-3.28.5-4.el7.x86_64.rpm2df4f13c318933111156cdf76976f8e4f674847f30c382240a1f689ed0c255f9evolution-bogofilter-3.28.5-8.el7.x86_64.rpm49940792feda2897eef88d20ff914ed4b881d92a23af199423f9aeba4b08081datk-devel-2.28.1-2.el7.i686.rpm00705fdc88ab99690ec0190ae01ecb80b973c62a7c133431fa2d35cbed8ddcb8evolution-3.28.5-8.el7.x86_64.rpmb3680a62611426e31a5c37e818c8c90e108b17fd957dc45003f304328e7acdedatk-2.28.1-2.el7.i686.rpmc7737c508695ecbf235d2975c573f6a78bb26999499ec4f143f2f50e472a29d6evolution-data-server-tests-3.28.5-4.el7.i686.rpm5eba983479051e37adbd77b75d09c12a08eb49b1739c8ddd2269610d4f7c3b92evolution-langpacks-3.28.5-8.el7.noarch.rpm89508295c0fed11fbb83709d04a6b69e2d7c5403f045797c12067954c97077b3evolution-3.28.5-8.el7.i686.rpm05d5b7a4435491a11c6ab8f7246ec8be30f0c973ed4e07b506139aa831a920b2atk-2.28.1-2.el7.x86_64.rpm8daf64b509c18bf136c6859161f377e5c9e6ee95cc06b9b792b282bad9f68e91evolution-devel-3.28.5-8.el7.i686.rpmb5bb39ce515cb534b02a6470f3306ff674a9b63a06f6b8224c4af8837e8ecbdcevolution-data-server-3.28.5-4.el7.x86_64.rpmc4f18fad5a2815799ca64d34ced60bb5bf4c840ff1774aaab05ff8d213c70cd4evolution-ews-3.28.5-5.el7.x86_64.rpm092b71406f49af7fd2ea65b2001f45d5e11be4faa6653d53db201fba2fbf46f8evolution-data-server-devel-3.28.5-4.el7.i686.rpmdc6314cd177b5da004dcbe7ab7ca487f2208b51fe86e11ecce54f7b88487f95bevolution-data-server-3.28.5-4.el7.i686.rpmb428a74e3b47db49f6318947c5ff2522d62fdcc95f5738097874b0aedd2d48f8evolution-devel-3.28.5-8.el7.x86_64.rpm59b4700df32a1326efc0f040f38f8f785c4971cee88003c722e613dc2814e223evolution-ews-langpacks-3.28.5-5.el7.noarch.rpm7be59e52f24ce0fdc41c4e8c7715286204e950900e626a998656aa74c633d81eevolution-ews-3.28.5-5.el7.i686.rpm057992b90c9ef7efcfc01bcf5b588c11f1008cbeeebd6b08db6f18a9572c70b8evolution-data-server-devel-3.28.5-4.el7.x86_64.rpm2c9aa5c3527c2e11567899e14ac8e4c06b8ec751e0866341a968de56836e5e1eevolution-data-server-langpacks-3.28.5-4.el7.noarch.rpmeddfb1078b409d6b1ba84242563fdc5ab2f7ef40bd24c2ca701296107d52d0b3atk-devel-2.28.1-2.el7.x86_64.rpm3a4d3dca41643fc93d26942c13cbc3988e3c2aa707b3db85cd65f3fc086bac6devolution-help-3.28.5-8.el7.noarch.rpmee15075c645a17203a06b77476425dea37be8e4f6ee68be6d5390dcd4356b175evolution-spamassassin-3.28.5-8.el7.x86_64.rpmc241fe203203faa6b493c2c2a8691f270e680a133d995d6c7b778aba80d80020evolution-data-server-doc-3.28.5-4.el7.noarch.rpmd3cff7d0f6c2e4e3444999de40a155d745f1767179edc3feee30b90ddb83435eevolution-pst-3.28.5-8.el7.x86_64.rpm6126fa8c7dcc092d8a6dd202802c1af9fd00437ad4a6f3fa91eef16f4a00020bevolution-devel-docs-3.28.5-8.el7.noarch.rpmb6842fb5ae8079b2a04e26dedb47c3d6e2ca5d6d8a575bef0ead1b4d43515c33SLSA-2020:1081-1Net-Snmp* net-snmp: NULL pointer exception in snmp_oid_compare in snmplib/snmp_api.c resulting in a denial of servicemoderateScientific LinuxScientific Linux 7net-snmp-5.7.2-47.el7.x86_64.rpm28b26ba4fd2e242f6bdd8c25a722c51b21976e5f619f4e8cb0b4aa2ee1dbb600net-snmp-devel-5.7.2-47.el7.i686.rpmc817c5c0514ab7fca11dc6091e244e6b6c8330c4a0cb3c24b415da17af156cb3net-snmp-python-5.7.2-47.el7.x86_64.rpm499fa38c774703ff7d68d0d4b38c23eb5590a0bdbb7857ee7260c3e4567c05benet-snmp-gui-5.7.2-47.el7.x86_64.rpm36dfaf441bd764e98071607ec45cc204f4787342b0073bb59f351a648a572076net-snmp-agent-libs-5.7.2-47.el7.i686.rpm8064787472b2b75d1ddabb4f5cff53d44c450e3e32a67d919e2b4fac4a150ba4net-snmp-perl-5.7.2-47.el7.x86_64.rpm7dd1cc490224675bffe1de6363665dde53d760c650221f8c712b4208c987cacfnet-snmp-libs-5.7.2-47.el7.i686.rpm505c5dc74098375e00e7b2fe3cae12d23eecd0e3fa168bb907b9d9a3d5ceffd7net-snmp-libs-5.7.2-47.el7.x86_64.rpmf79a44eb802af957194710e4ebf8c2fd491125c1f20daa13e72016f2aa8babf6net-snmp-utils-5.7.2-47.el7.x86_64.rpmbf5ec2e12d1059a502d38815c8922d34fad2035e4de3a281e669af602fb25483net-snmp-sysvinit-5.7.2-47.el7.x86_64.rpma3923f4d96c21a728c58d2289cdc98bbb72be21d373d2ab7ae1d9987a384d886net-snmp-devel-5.7.2-47.el7.x86_64.rpm0bcd956c1c68ffaf3719d714fa5d489efc604454b60184532df9492c45518662net-snmp-agent-libs-5.7.2-47.el7.x86_64.rpm69bbf9da197ae36918431a7d7d5f06f10f388bf34942b23f8bbb8a184a424f81SLSA-2020:1084-1Samba* samba: Combination of parameters and permissions can allow user to escape from the share path definition * samba: smb client vulnerable to filenames containing path separatorsmoderateScientific LinuxScientific Linux 7samba-krb5-printing-4.10.4-10.el7.x86_64.rpm53d0573afe9a79e8c96d9aef9289a6d8c4a88677d4a21eee2549bc14c3cd48e1ctdb-tests-4.10.4-10.el7.x86_64.rpmac75649ada4eae94cf34d8502a7afe6ab30543d70a1664d077bb4bc22805c1e3samba-pidl-4.10.4-10.el7.noarch.rpm883055b12cb9e573a62a55a40ec1907e00e8cbef853fbf497e1a700aa95b55absamba-test-4.10.4-10.el7.x86_64.rpm8479cbe7e3c84fb608910656afbdea3ec4bffe2c0d7aabdaca69bafa88c54859libsmbclient-4.10.4-10.el7.x86_64.rpm78a0d451777470d759403e5de7b0bd0b216374f5483f1713f967d071b722b541samba-test-libs-4.10.4-10.el7.i686.rpmff3e175e498ff6d917006aca1c5bacd633b0de13b1aff27a9256749e3a9e9b87samba-4.10.4-10.el7.x86_64.rpm66b2990e8de91113bdd7321116861a4b05b9a56295ccbedc9deddc0348a63538samba-winbind-modules-4.10.4-10.el7.i686.rpm0df9974b4a88620005568a74899c7cf4473cf5144ca2977e7a2fabcac0d22c00samba-dc-4.10.4-10.el7.x86_64.rpm5f94a4d31cea4d1982d8ad4e7d45d17f37a46b58cb4adc108e2afcbbedbb4ea6samba-libs-4.10.4-10.el7.i686.rpm63f890eefe3034668807776dce328ba44c7bcbd1a8b11ea8fa3412a5eb27c293samba-winbind-modules-4.10.4-10.el7.x86_64.rpm409453df31db84aa8931693a58977265d41450ad3cb08d26e4e1f60569e23e02libsmbclient-devel-4.10.4-10.el7.i686.rpmab2ba50b1ffdff623934488f7663c45bc11674dc9b788cb88ad4d56358287532samba-winbind-clients-4.10.4-10.el7.x86_64.rpmcf8e03ed35b2d97ed3891ca68759e12618e10f75179e89ebeb87fe3c5e183ec8ctdb-4.10.4-10.el7.x86_64.rpm8115ae02295060be774386779a92d6d22701c1b3d7d5577327250f7ae25b08d8samba-common-libs-4.10.4-10.el7.x86_64.rpmda217d025fb4980edb30611792b1eecf1e20c046318b12797f6684fcceef11cbsamba-common-4.10.4-10.el7.noarch.rpm7f9a7deb2e43292cb140ff30dca9cf1ff6c6afa7d24a033ce150528d71d89fb5samba-client-libs-4.10.4-10.el7.i686.rpmc1c8e54eedb8d97c63c9e533215fb1778558ebab32a316cc234b2934dd15b366samba-test-libs-4.10.4-10.el7.x86_64.rpm78b63fe2fdd4f426c8e979614aded3233bdce9308c7a0ad783821c2bf24cd560samba-winbind-4.10.4-10.el7.x86_64.rpm6801991917fe6efcaf54fe98daf4185812dbcb976d526caa4da4fc393261813asamba-winbind-krb5-locator-4.10.4-10.el7.x86_64.rpm0fb8dac3bdd9a24218f2c40beee8c309769d27310e247bd0a0e5351d8afb1179libsmbclient-4.10.4-10.el7.i686.rpma280eb0e2c8064053363a1b912088d64308fc1646e117dd76583376cb4884e98samba-common-tools-4.10.4-10.el7.x86_64.rpm4d2ab30dd98120b8e96b6841d03ea1c629e5b03ae3e3a45a1ef0c1318a85a30dsamba-libs-4.10.4-10.el7.x86_64.rpm42a12be20ed351ebc3db67124c37c9e42d3329cd8303486b230beab14607c0dblibwbclient-4.10.4-10.el7.x86_64.rpm7fa0e6a7231463db1cc613181116db2bc3ee977683dd9e37974459147deacc9esamba-client-libs-4.10.4-10.el7.x86_64.rpm2095ec5b4294c5ceb656bb65e3ce1099c07cdfe48baf2cff8b93b58c3f9586a8samba-client-4.10.4-10.el7.x86_64.rpmdd9a4759f07fc010d528d5634f658881556367bfd2c968cd2b97cae86a28324csamba-dc-libs-4.10.4-10.el7.x86_64.rpmd57365fea2b2b31729a96c0acd93795beb67a77c11478898630f8ac8c700428blibwbclient-4.10.4-10.el7.i686.rpmc03c40e65b49d6f2d31d4a630b6ef13533d146ffab37e3eaf75e8691bdbde3desamba-python-test-4.10.4-10.el7.x86_64.rpmf96873e815e6e3f0b0c1bff4b557a22ae42dfcb4b172cc7b464ebe418380dca9samba-vfs-glusterfs-4.10.4-10.el7.x86_64.rpmbe7529351a088a8805f7e930d60cf3dc2bf7503879bcdd84eb5b215a59466acdlibwbclient-devel-4.10.4-10.el7.i686.rpm0bad370e57a3f18f086cb21fd9c25433b69743a83221aa79d0d2e5aee722c80clibsmbclient-devel-4.10.4-10.el7.x86_64.rpmabe681e3bc08a47eb5b7c0e07674211263522c215e0c676d7fe36dc8d047260esamba-python-4.10.4-10.el7.x86_64.rpmb7881450727a1b2e72757905b359925b06f07cd08f2bd17e1285474b406f2c66samba-devel-4.10.4-10.el7.i686.rpm5fc48433205e752f74977fa9abbf1d00ecedfb32f7d43dfa16d09b2fbc1712aalibwbclient-devel-4.10.4-10.el7.x86_64.rpm21c618625d66e5124bd312ab6df4610549a8d0ae2670c9a930722884dcccacb5samba-python-4.10.4-10.el7.i686.rpm1632d3e081a28a30bb69828036c810ea01ee19d3d2b29530908ece4ac583355asamba-devel-4.10.4-10.el7.x86_64.rpmefb546877d488c2eb6bf4ecbc514f66c3113a61bcf21ed8fb109ebfc5708e4a4SLSA-2020:1091-1Python-Twisted-Web* python-twisted: Improper neutralization of CRLF characters in URIs and HTTP methodsmoderateScientific LinuxScientific Linux 7python-twisted-web-12.1.0-6.el7.x86_64.rpm4deb200bc91aabc54dceed7d66c472df361801c1af3e8a823a86fd96d387cdfbSLSA-2020:1100-1Mariadb* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019) * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul * mysql: Server: XML unspecified vulnerability (CPU Jul 2019) * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)moderateScientific LinuxScientific Linux 7mariadb-devel-5.5.65-1.el7.i686.rpm1012b35b43c21756d79c896818bd52ab34ae934dea358ae26c5b518fd29d5505mariadb-devel-5.5.65-1.el7.x86_64.rpm0047cda33f2efc1dce4f0c76b19a2e9a63eb29ef04c5ded8255d21557b43f786mariadb-5.5.65-1.el7.x86_64.rpm68f2f930ac32009c73a644fa9098fcb7379df08922e7702807715dfc2871dc20mariadb-test-5.5.65-1.el7.x86_64.rpmb34908f8c0904bbd6e018f1a6b22ea219bc38e590803abc5d98cdc455bd5f1b3mariadb-server-5.5.65-1.el7.x86_64.rpm515d62971a0808eb8d81c8dec7f09a4fea1d9ef6ec26d3cadc3679907da725a5mariadb-embedded-5.5.65-1.el7.x86_64.rpme9bb6deb1e883401655611e95e363afb6255a586f29efb2335fec611a09292bfmariadb-libs-5.5.65-1.el7.i686.rpm83af6331006d48207c991218185e7b8ee4bcdc3420cf4c47f71ec06a7021d800mariadb-embedded-devel-5.5.65-1.el7.x86_64.rpm820129a097711163246d52cfa974b000909e3fa0004e7ba39960cdfc0807920amariadb-embedded-5.5.65-1.el7.i686.rpm627a0688d9ed0e3651bbd49604f0c952006100b7908bb7aa9caaab5da65a5fcemariadb-libs-5.5.65-1.el7.x86_64.rpmf4b56655dc837d9d5da2a50e4b1ca99bc64c7eb08974a9931b67d652e9f1e803mariadb-bench-5.5.65-1.el7.x86_64.rpm878f65b906a307bfa317125987c8315e147ae0937c2e7f6e3200f799abb8bbf6mariadb-embedded-devel-5.5.65-1.el7.i686.rpmdbab5781405e3f67745bbc4570aa69b4f719d8e25bf53a521c09fc79402de51eSLSA-2020:1101-1Bluez* bluez: failure in disabling Bluetooth discoverability in certain cases may lead to the unauthorized pairing of Bluetooth deviceslowScientific LinuxScientific Linux 7bluez-libs-5.44-6.el7.x86_64.rpmbbb64bf973fbcfff8f181ef9813a745bdb1809ee2ed96cda73f78db57cb88024bluez-cups-5.44-6.el7.x86_64.rpmd1b852098e290d8da8284c73cb4c498a7e8e86ef2ddb7945288a49de955e19e6bluez-hid2hci-5.44-6.el7.x86_64.rpmd081ebc590da1091f40e6f40c0ad951fde5481b5c38529a9ad1f8af036f7cd74bluez-libs-devel-5.44-6.el7.x86_64.rpm06bef872217dd3b32826dec6fd2aea0dc555797d7388e250ac0b05c8f8c220c8bluez-libs-devel-5.44-6.el7.i686.rpm715f60736b63be50b77e4157f6691c5b051d357750a4871caa179523a630835abluez-5.44-6.el7.x86_64.rpm4117a1c1e697f0fa4b8d7bdf9ca06aecab566fea9218cf1b08e2c88e841360ddbluez-libs-5.44-6.el7.i686.rpm067946753c4781370f874176b66c8f5c97dc03c57a30d8a9582508d21683743bSLSA-2020:1112-1Php* php: Reflected XSS on PHAR 404 page * php: Stack-based buffer under-read in php_stream_url_wrap_http_ex() in http_fopen_wrapper.c when parsing HTTP response * php: Reflected XSS vulnerability on PHAR 403 and 404 error pages * php: Out-of-bounds read in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.cmoderateScientific LinuxScientific Linux 7php-pdo-5.4.16-48.el7.x86_64.rpm5896765672e4e0685c072077942889551debc9af29a6de4de7a7001ac0389e6cphp-mysqlnd-5.4.16-48.el7.x86_64.rpm524d82ace659534c74c56b0a73748c1c2d042fcd06532ae5e40323254cef603ephp-snmp-5.4.16-48.el7.x86_64.rpme4af2341e74a003d9eb3e83b1b5a1094f818f90b1f74145b7fbb2b24f3093802php-fpm-5.4.16-48.el7.x86_64.rpmc29a050e280bb102f15dbe2fa6210fa1e230baf89405d54c8adad1fc81223c8aphp-xml-5.4.16-48.el7.x86_64.rpm2d7578d80481bbc6adc8557c748c99628007502ecfb0cdf8f53841113d35f814php-process-5.4.16-48.el7.x86_64.rpmd9aed580d95c47c4355b6841e3990bc228f19e7c51b3ddba43504b3f9662fd10php-odbc-5.4.16-48.el7.x86_64.rpm3aff247e0beab1bca7a423286fbbf5ff3512901cb1ae478d94eb5a38ab515fb8php-xmlrpc-5.4.16-48.el7.x86_64.rpm5926f32a4fff5e4f35998c7b9d9c4c5142c429f05cfbb5c86379da1dafe361e3php-mbstring-5.4.16-48.el7.x86_64.rpm1ae23981cfe9c56853c4b93c48bcf1d0ea48136e5b9778e96d8a8a4b6e4e094aphp-pspell-5.4.16-48.el7.x86_64.rpm831e682dcb99aff8cb504c14f2ccdb608d3263928dc14c9d209f941eef6543c6php-common-5.4.16-48.el7.x86_64.rpm7c76fe8fe597ca87f6d2cea1920f75ee4d0be4f4008a40a357c9e4e1043af5cdphp-ldap-5.4.16-48.el7.x86_64.rpm52809ed66acf816918ee1c18d8880fcfc7e1d1ba771228407690ccd75a19abdbphp-embedded-5.4.16-48.el7.x86_64.rpm424508cde4c8f307d4bdd183b8614c656d41c6a30d8cab8e89191bd07c1ba263php-devel-5.4.16-48.el7.x86_64.rpmfdbdaae454f157ef08404e26ef8d2507cc1a31ac80b5012270ddd1530865c8b6php-cli-5.4.16-48.el7.x86_64.rpm455b62bfde65cc6ee6a8112035db06a64a18cc6dee527881905879ab050c2338php-bcmath-5.4.16-48.el7.x86_64.rpmc825e940d01bde8039f20b65fd64684112e4ac7519078e609b1a501982849cedphp-recode-5.4.16-48.el7.x86_64.rpm3378335b6c5e3575baf24cec6ebe7326edd6dc13310393a760cf66d06a05419ephp-intl-5.4.16-48.el7.x86_64.rpme917b511e746a4d90b2b31d4732062a59de60aac4b1f681e829fcf3e69759da6php-dba-5.4.16-48.el7.x86_64.rpmca1fbd484cf2d928c3e5145a7c908bd951b8dde4a5f3b931d0f4a69fe10790afphp-pgsql-5.4.16-48.el7.x86_64.rpm702e0026e9d0ae28adb32b6ab927578a101a9d77b3950f504dc5f2563faebf78php-gd-5.4.16-48.el7.x86_64.rpmfb479b448ecd272339b656b123612d0da7c949fd531a07c1b400b0073833e945php-mysql-5.4.16-48.el7.x86_64.rpmf99db8828f4103f81d9b003ff59d7243c16854b89555066f48cd17d2d91351f0php-soap-5.4.16-48.el7.x86_64.rpm2ce662c55974a7baba692b984da81c173075eeedf057a957b28000e6e568b6f1php-5.4.16-48.el7.x86_64.rpm15e82b4c083ee1a2e4640080ef75fb2cdf3830c806725a302401aabb5851d154php-enchant-5.4.16-48.el7.x86_64.rpme70239757c0406008c52d81ddcc13b675f24def6420bd9e58ea5e1c6f0431b14SLSA-2020:1113-1Bash* bash: BASH_CMD is writable in restricted bash shellsmoderateScientific LinuxScientific Linux 7bash-doc-4.2.46-34.el7.x86_64.rpm95ef57c39850b39ee7fdf031eacde80727ef4ab0b1eec82f0eb74793b121699dbash-4.2.46-34.el7.x86_64.rpm9f0be30f6cddf3a329d88fb0e2beafa3771a4d280afba721fea516deac7ba80eSLSA-2020:1116-1Qemu-Kvm* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()importantScientific LinuxScientific Linux 7qemu-kvm-1.5.3-173.el7.x86_64.rpmcb3d572587f522854dd88ea631e96b540892cb8ff88a2255e730ee8150fc0586qemu-kvm-tools-1.5.3-173.el7.x86_64.rpm90fbcec323bf2e378ed246dae56ac0cf4e2b8e5e1df5d2bcf504f8a1c6df932cqemu-kvm-common-1.5.3-173.el7.x86_64.rpm03ca92caea05c4f5986d2f2f5e03280de4ebd4b439212a308afc0cac41a63b77qemu-img-1.5.3-173.el7.x86_64.rpm6f4789f733a75a09c11a100113a544ad1900ffc22949e4e7b3e8f75e515caf0aSLSA-2020:1121-1Httpd* httpd: mod_session_cookie does not respect expiry time * httpd: Out of bounds write in mod_authnz_ldap when using too small Accept-Language values * httpd: Out of bounds access after failure in reading the HTTP requestmoderateScientific LinuxScientific Linux 7httpd-manual-2.4.6-93.sl7.noarch.rpm12cdeca3138ed890b721afa0886255c773330a579f2cc3ed7e80e44888270fdchttpd-devel-2.4.6-93.sl7.x86_64.rpma5bee07784e18148e5ef949da8e9cd061195e9f7306530498bff1ac464501b0bmod_proxy_html-2.4.6-93.sl7.x86_64.rpm707a65fd80966ebb01f95a0053dc686c288be41a631d188848a965d8ea759df8mod_session-2.4.6-93.sl7.x86_64.rpm18a44ac202b4df28605a327908ec6db4eb5d8922b3547fd141fa8df384cbe993mod_ssl-2.4.6-93.sl7.x86_64.rpm124c129fa5e5d5f5775bd92737b25220a15ccf3bd36528687bc9d7508c91d61dmod_ldap-2.4.6-93.sl7.x86_64.rpmebd54a294522a0d7523e75a91875c2edd3759f68cc134c2d6c2effd4537c0c62httpd-tools-2.4.6-93.sl7.x86_64.rpmeaeb1bd2f9f8b424234de782d6e7463bae07eb99e1bd77fe4bf371c4b9647d62httpd-2.4.6-93.sl7.x86_64.rpm2e4570bf4f4765a001119331184bfc605d5479c8e97290cd7b0cbff6a847eaecSLSA-2020:1126-1Mutt* mutt: IMAP header caching path traversal vulnerabilitymoderateScientific LinuxScientific Linux 7mutt-1.5.21-29.el7.x86_64.rpm39516f21d38c9d5d4d3986de02f63b5b23b1d36457eab4b1d2e3393e312991a3SLSA-2020:1131-1Python* python: Cookie domain check returns incorrect results * python: email.utils.parseaddr wrongly parses email addressesmoderateScientific LinuxScientific Linux 7python-tools-2.7.5-88.el7.x86_64.rpm3e81921ce8bb619e287fa6cab340354e40a0b83bd130618435c00c838ea69f90python-debug-2.7.5-88.el7.x86_64.rpmfbeedbf6a9541721d22f516e78baf8701e80fa2fa0d2f0c327422a8e577dddc4python-devel-2.7.5-88.el7.x86_64.rpm5dda4bbb68d526f248c5c6280ac9b5b84a2108873b838ba3326eb975074ad9b7tkinter-2.7.5-88.el7.x86_64.rpm3526b706aa711de3b1b8f0139b1251adde90850ef35765b7215ff595cc6b325fpython-2.7.5-88.el7.x86_64.rpm461c0ab8b1ac9a37273d2b01b8d10e41db8cabd44c9f574d9dac138ff4e430f3python-libs-2.7.5-88.el7.x86_64.rpm2c35ec41f6c19b3f7a18d11c3e8e72b66b363d33627705b4bf00eb753d623aaepython-test-2.7.5-88.el7.x86_64.rpm059a0e6b642bdb785a9bfdb0485ed0e0b34736e939ed0468cbee916ba02e0cb6python-libs-2.7.5-88.el7.i686.rpm4ac80cb42b1ef46e03b66b7a894c3eb7baaa7803c799e1871058172463731892SLSA-2020:1132-1Python3* python: Cookie domain check returns incorrect results * python: email.utils.parseaddr wrongly parses email addressesmoderateScientific LinuxScientific Linux 7python3-libs-3.6.8-13.el7.i686.rpm0cc3e332c302a97500459ce0434eb4dd518fd94c28fdfc151484a8df48f1e9c0python3-test-3.6.8-13.el7.x86_64.rpm6c630d6bfed0d7de2b2eb8c0bc275aff333522b076c16947818ff1e5453cc39dpython3-idle-3.6.8-13.el7.x86_64.rpm7c3faf6828cd8cbfdc3b247357a6c3b944c9fccd2003342374d18a3aadce480fpython3-3.6.8-13.el7.i686.rpm90873480e4cf053c5830ebcbaf1cbf7be5d247966581013642b609466b59231dpython3-debug-3.6.8-13.el7.i686.rpm1bf8eef4d37a645d721364f252a91266d61a6e2cafab7a64e5af69dbf6ccde7dpython3-devel-3.6.8-13.el7.i686.rpmbedb00d3248cfb29da129e8b71ab8e38f8f3482d7d828ecd9c039296a87fbceepython3-3.6.8-13.el7.x86_64.rpmbc1b155507c5363cb52205db0ffe7de7448d73fd28480405b10fffd317237e0dpython3-libs-3.6.8-13.el7.x86_64.rpm531a291e1a1b122b0b974b57d0a19af7e4b01018a3195089f982106ddd26a424python3-tkinter-3.6.8-13.el7.i686.rpm47382ac2235bb762bb997128c859e0a165ccbe383b6d02819761c44bb30d599dpython3-debug-3.6.8-13.el7.x86_64.rpm9ea6a8d1a0323a1aea782c0e8c801ea4c30972d4962792fd1ce8e249bbb0877bpython3-test-3.6.8-13.el7.i686.rpm9d796504f40c63ab8f4e255515e3e4ca0b8f0dce9290411a2ee928a2cfda6ba0python3-devel-3.6.8-13.el7.x86_64.rpm95a96ddaffcb273f5615b90fe6cf9b68ee4de184fceedffd72f05482140c4b7bpython3-tkinter-3.6.8-13.el7.x86_64.rpm6c47b7b108ddef1c5a895b5aad03707e271e3baee4ea828bb9379693393a4ac0python3-idle-3.6.8-13.el7.i686.rpmfa561b0065e8697484ca06c7ce5b7b61176eaefc795e89e69e2877439c5207b0SLSA-2020:1135-1Polkit* polkit: Improper authorization in polkit_backend_interactive_authority_check_authorization function in polkitdlowScientific LinuxScientific Linux 7polkit-0.112-26.el7.i686.rpmd317cbf5c7fb21669a4c130e49585e7d2c2647f4f0a2d585d549d192fafc6c9epolkit-devel-0.112-26.el7.i686.rpmbc2641a55094fe615b508dff9193f2ef6c405320b94c297b06aca35e7bd3130bpolkit-devel-0.112-26.el7.x86_64.rpmb6876acdda54d5d4dc39c37ec4f2e36597ae7e2160355159777a7eec0da515b2polkit-docs-0.112-26.el7.noarch.rpmd4840d1198559dd0c0b3cc7d63b0b31269023f6b662d229f711de0e2def4ff03polkit-0.112-26.el7.x86_64.rpmcff0f34881c95204ad467248b5fe3a30e1184d18057743d328bbecce667c578bSLSA-2020:1138-1Gettext* gettext: double free in default_add_message in read-catalog.clowScientific LinuxScientific Linux 7gettext-libs-0.19.8.1-3.el7.i686.rpmcdeb6b97e2542ee0f9272f7c9e0894d336150300ad4a90acc422e49762096f2cgettext-libs-0.19.8.1-3.el7.x86_64.rpm01007120a818da1e3727c668a0b4b2066f789d3ae80aa69dec2985d5e8a7580eemacs-gettext-0.19.8.1-3.el7.noarch.rpm9eefcac5fac587e36cf3d4c82871eb6e702f0ebbe0a15f6de5321f7cacc91cb5gettext-common-devel-0.19.8.1-3.el7.noarch.rpmb659742d587b888316d8d5f34ede272bb8dc613d6caa6118c0cabf5b542cdf4bgettext-devel-0.19.8.1-3.el7.x86_64.rpm480e38d5bbc39a8096381a9770b83aef59506dfe55e359ea9bdc70c5ed7b2833gettext-0.19.8.1-3.el7.x86_64.rpmb6018a436c93c9b1b7f77a8bea3bfc4616679136b43af9a8585ab148945a546cgettext-devel-0.19.8.1-3.el7.i686.rpmfe533c1cf84dd8c5788fdbd0d2735ebd15b827ab9226c5ead9732f4f31567257SLSA-2020:1151-1Libreoffice* libreoffice: LibreLogo script can be manipulated into executing arbitrary python commands * libreoffice: Insufficient URL validation allowing LibreLogo script execution * libreoffice: LibreLogo global-event script execution * libreoffice: Insufficient URL encoding flaw in allowed script location check * libreoffice: Insufficient URL decoding flaw in categorizing macro location * libreoffice: Unsafe URL assembly flaw in allowed script location check * libreoffice: Remote resources protection module not applied to bullet graphicsmoderateScientific LinuxScientific Linux 7libreoffice-langpack-it-5.3.6.1-24.el7.x86_64.rpm9a788e93254d57d2e59070c06e71d1d81285e01de9c722b34a4bb6b3ff6608aalibreoffice-help-sl-5.3.6.1-24.el7.x86_64.rpm73098a84f00b1b159e7be909f97c87d8082185f032ca0b22e698f6a59e982a0clibreoffice-help-uk-5.3.6.1-24.el7.x86_64.rpmcf8b29c29c135bd26f7a9fad45529381ccf09a1bf150b6f8f612768169d8c5c8libreoffice-langpack-af-5.3.6.1-24.el7.x86_64.rpme4aae532a496177c153a1ee74aa8aca99969e01b56195d5c3950dcf9bd51a425autocorr-cs-5.3.6.1-24.el7.noarch.rpm299ce9793d214886f4b482a8c775b0188d50ca7cef1008f747dd25a66a7814b9libreoffice-langpack-el-5.3.6.1-24.el7.x86_64.rpm3b19bd4ab6d6e5ee91d3b5d59790b708d2bad92257b18f00fb948d510e1ab9aelibreoffice-5.3.6.1-24.el7.x86_64.rpm5cb749784f39da86d14d9d0add8d462c6cf4e3a3fa8c4e203bba7ad4ebd588d9libreoffice-sdk-doc-5.3.6.1-24.el7.x86_64.rpm417098918e24e87500c32775e92196cb657723823ce29d28d15035798122ef3fautocorr-sl-5.3.6.1-24.el7.noarch.rpmd913e451467673cc99ae79ec95155decac5ed42d90ce4a14796c17b090794b35autocorr-de-5.3.6.1-24.el7.noarch.rpmd1cc7f1413deae05b139df01958483a54eb2dde20e1585172220334f1e52297blibreoffice-emailmerge-5.3.6.1-24.el7.x86_64.rpm42f88b2a39335b48ee53afe68f9ce35cea068790e5cf7b5a69f584b41db7c17alibreoffice-officebean-5.3.6.1-24.el7.x86_64.rpm5f0dffa10f62be36642fa1369aef3748bc18cba98d1b329196107d8f25df72a7libreoffice-rhino-5.3.6.1-24.el7.x86_64.rpmf75f3a80f82778519bd9c76e528386ef2d359c883ac2d5ce1b21a24f982a2e7blibreoffice-help-gl-5.3.6.1-24.el7.x86_64.rpm7c322bf19f21073df1fd9cecc99f93a436f33b6fc10188f2c89f0e97cc2a0f62autocorr-is-5.3.6.1-24.el7.noarch.rpm49abc6bb9b9c0b582ae0fff15410efe8dccbb8292bdf1564f08a605ef403ba21libreoffice-help-lv-5.3.6.1-24.el7.x86_64.rpm37b89c7809f2be648e4a1f9a1aa9abdf6055d25395b70630e7c55819107a41f9libreoffice-langpack-pt-BR-5.3.6.1-24.el7.x86_64.rpm07e096b66fff94a7c05227cea698db7b4062f3688ef66e42a59960a84b4db0aelibreoffice-langpack-br-5.3.6.1-24.el7.x86_64.rpm9a98cc9e40744ec15b1f81495600f67148e81056679265e55bfcadb8281e0aeflibreoffice-langpack-sk-5.3.6.1-24.el7.x86_64.rpm055942952eaf6fa8b93c31075747bd13a91cac2bf2eaebe7266427df233e09b6autocorr-sr-5.3.6.1-24.el7.noarch.rpmd49d918c056ee1212e99835c9727c616f600bf229a783ac418ab6dfd1984cf1alibreoffice-opensymbol-fonts-5.3.6.1-24.el7.noarch.rpm8a60652b772a694e5903faeafa77fdc7d60c96b729b2238e8db496e26fcff013autocorr-mn-5.3.6.1-24.el7.noarch.rpmf39bdf08382e42a71c2ecf44b34447d3a0efefcdef7b9c2890c3384e8db6d29flibreoffice-help-es-5.3.6.1-24.el7.x86_64.rpmb5431ba2f090c9c7d2695bd0f29ef591863d96cf9e8a6042dbba504478deb659autocorr-zh-5.3.6.1-24.el7.noarch.rpmbcbe611c9d71d576111b821a9b290e0072e3e0aa2772cd41fc7588461663d958autocorr-ro-5.3.6.1-24.el7.noarch.rpm07cb201d4a21335c398fc8a27b1aaf10db29819f1c64c42cd7319069ff66d063libreoffice-langpack-hu-5.3.6.1-24.el7.x86_64.rpmc01f089787f59834b3e38e003ce0f663badc0c2015b993ea31807c7aa76e22dalibreoffice-langpack-ml-5.3.6.1-24.el7.x86_64.rpmf4b4c58e2b8df5ea0ce8ccb3463dad6ebe33b42fc94e188c11d858052624cb0dlibreoffice-xsltfilter-5.3.6.1-24.el7.x86_64.rpm007199197d598f738bee3d0e9a9c6a27b278c08659b0ae756474f31fc4116608libreoffice-help-ru-5.3.6.1-24.el7.x86_64.rpm04706a6f31229bd7fcc3ebd6e513af45810cf46eb6d19fa8abd1e5a29845bbb6libreoffice-langpack-pt-PT-5.3.6.1-24.el7.x86_64.rpm5e2bb684454407f326688ce0b6c4efd12e93a0408d3fcbe56e90f145e55fed67libreoffice-filters-5.3.6.1-24.el7.x86_64.rpm3086628809a5e1a70b3a5999bc8cc071c21eee1c62b86be292d6d64a254a92e0libreoffice-langpack-nn-5.3.6.1-24.el7.x86_64.rpmdabdb32b391135b5ff6f5948b753169d9b2868c8782599a2cf2afa5ff39640e6libreoffice-draw-5.3.6.1-24.el7.x86_64.rpm7604c7400fc7c170c9aa97a80579e1ce184d723ced362de693171f2778e1dcd3libreoffice-help-pt-BR-5.3.6.1-24.el7.x86_64.rpm2b0dc76357201e015e461d065f8346f18f2469cb359b79be068f0f60e54c1c20libreoffice-langpack-fi-5.3.6.1-24.el7.x86_64.rpmafb6510d8824f3e6ca16dc2bf9b107141829e552da8e7324446ae82289db2b83autocorr-ca-5.3.6.1-24.el7.noarch.rpmaf9faad1a7291878b9dd564947904ab29f974ef0e622ce7c6eef2fb6ffe48680libreoffice-langpack-fr-5.3.6.1-24.el7.x86_64.rpm826d47b00ac2a98c371a531a8f6e13702bd4b1ce650e97f415cb6e4aba46c1c9libreoffice-help-pl-5.3.6.1-24.el7.x86_64.rpm845b8312eacb97b0c8db1e6598ce97f264fa7ab6c59115528ee717e994b9c33elibreoffice-help-hi-5.3.6.1-24.el7.x86_64.rpm3fb0e27cef406b5f0d30512675337210bb077a66497cb315186a850b24849bdbautocorr-lt-5.3.6.1-24.el7.noarch.rpmf2d0bf2296ffff769a9edcce38fb60f1c53b430019190ad6578c1c3265686bdelibreoffice-help-ca-5.3.6.1-24.el7.x86_64.rpmfc7dd9fd8fd892a4fb02ecbf1514bdf6143d0b186ba090798e6cbf103e69fd6dautocorr-nl-5.3.6.1-24.el7.noarch.rpm8c2b55fc5350341e259dc91d9a9aaaf848d42efc70a379c4bf2780049774d533libreoffice-help-bg-5.3.6.1-24.el7.x86_64.rpm682b99ec150099ab0387542ccabcdbab825712eec853868efa25be459efeece5libreoffice-langpack-he-5.3.6.1-24.el7.x86_64.rpma8d356c541c4c9e68d0e9ff37d07742d6a720ce743097a09884206385d9414d8libreoffice-langpack-sv-5.3.6.1-24.el7.x86_64.rpm24097662d5d5bd46145cebb52dce09cefbd729b98e807f988f28a860bdfc84a3autocorr-ko-5.3.6.1-24.el7.noarch.rpm80c65bec811df6826acdfbb3b19dca040f67df9ebf0caf8c413893ed482926dclibreoffice-langpack-gu-5.3.6.1-24.el7.x86_64.rpmf13b0a914061853f69df82ead1686c4c63a1fc8552ea319ba3719e9032b48d91libreoffice-help-ko-5.3.6.1-24.el7.x86_64.rpmf55e76d5c26c9f697a50df0fac804944ca190969627f6fe45ceaf7a666720e86autocorr-da-5.3.6.1-24.el7.noarch.rpmc6defd1f99af70599df18f9a986874264fbdcf351723fb308a315e78ec76026alibreoffice-x11-5.3.6.1-24.el7.x86_64.rpm0806a13ea01c851e1b177e4d8caa19bfd489f4dcb71585e8d3b4ea5aba334e4bautocorr-fr-5.3.6.1-24.el7.noarch.rpmbfe91d7e7d2b39570d21e3cb8172f2a7a9e05e18126bc55e7aec816a9a806619libreoffice-ure-common-5.3.6.1-24.el7.noarch.rpmc5780927929f8926f064d166ebd3f0a9f835120c74e76abed0d6088dcdf1b282libreoffice-wiki-publisher-5.3.6.1-24.el7.x86_64.rpm25d5db8bc90ae771cd9518a42c3f6a27732ea86049f22984ab38e625513e912dlibreoffice-help-fi-5.3.6.1-24.el7.x86_64.rpm35e6c6d0f966eb017350093253e4deb5b3598543d13e22f0fa315aa328c423c6libreoffice-sdk-5.3.6.1-24.el7.x86_64.rpm4eb09b555dd6920d11bc7581e8b4a0da9478e01a4b2eb549d63f6c31dab43191autocorr-pl-5.3.6.1-24.el7.noarch.rpm80429cac2618c9771950447719591c70eede4774433227de506d473a2bc91a5clibreoffice-langpack-zh-Hant-5.3.6.1-24.el7.x86_64.rpm786f519ce16829c638a88a73ec14daee3adddfd7dffe7105b027bddf425b556flibreoffice-calc-5.3.6.1-24.el7.x86_64.rpmbbdadbfab99a4a31972d9e78333366fbef7d719597aa8555cb98a74ff75474eelibreoffice-langpack-en-5.3.6.1-24.el7.x86_64.rpm8d71a1350413c33ccbe2065c9056e514428ea22a0abe770ef9281729731545bflibreoffice-help-de-5.3.6.1-24.el7.x86_64.rpm024500059b6f129882470e48aa200f5041bd4ee7643f96f8f506ecf9d5fd5b4dlibreoffice-help-fr-5.3.6.1-24.el7.x86_64.rpmd57fa3eae653a05c3876a3291f8b063bcc13e5726d5cb65f44440bc8005bbe15libreoffice-help-it-5.3.6.1-24.el7.x86_64.rpmd2238f851b1f3e96ce52e0f1e0eb106648a41b6d2355ccd71735cf9e7cbeb0f5libreoffice-pdfimport-5.3.6.1-24.el7.x86_64.rpm4dec42b02f162f5a90c5b6af23e6a62233d401b0a4fb6eb8b3e67737dc14c383libreoffice-langpack-nso-5.3.6.1-24.el7.x86_64.rpm9b0f1e4b8f51c3b4b438d14774dd1becd6e618dac079796da5d83e1d7ac49a14libreoffice-langpack-ca-5.3.6.1-24.el7.x86_64.rpm7af2e675a289e9c1990704d63cca049427ffdf15919ff935804c124d0bb2dc44libreoffice-langpack-th-5.3.6.1-24.el7.x86_64.rpm0c3c3bc906a971964d3f3f1bf0c749f888f2822b6eb1e1e1df941d7ebfeb19fdlibreoffice-help-ta-5.3.6.1-24.el7.x86_64.rpme0a859ee989313fda923518a2eac0c44762e7ed2ea99f65b47829ca12c399928libreoffice-ure-5.3.6.1-24.el7.x86_64.rpm987ba4c0583495b4d37d6bf6ff905578d4ced11ab0c28b2678170e4060aa5cf6autocorr-hr-5.3.6.1-24.el7.noarch.rpmd142151dc23140ffcf14fd10696125f579a4f2dd9d7c11733c3b311f5aae5508autocorr-sv-5.3.6.1-24.el7.noarch.rpm8a2a47ec463dc01c029b4546032e7f90ef868029b70b622e4251566087073c23libreoffice-langpack-fa-5.3.6.1-24.el7.x86_64.rpmbfa9e775280919906ccd1114396e1f22c850566e52bb7d8bbf69424351e5ed10libreoffice-langpack-tn-5.3.6.1-24.el7.x86_64.rpm9e073c169e1168e1e72304f9db9ef2592839d40b73e32b3e37d9ebc53b646659autocorr-fa-5.3.6.1-24.el7.noarch.rpm9e38568ace5bb858f36c18c436639488ae3a9e31dbe3d73f01a8eae46fe01202libreoffice-help-lt-5.3.6.1-24.el7.x86_64.rpm8b429122309425861e8a938e55c1fe98e25aea714e92f4b5827f6bc181be76ealibreoffice-langpack-kk-5.3.6.1-24.el7.x86_64.rpm901cccbccbc3f0555de929a9ce518cceab0a373dafcd9c407b5f59871ec91a7flibreoffice-langpack-lt-5.3.6.1-24.el7.x86_64.rpm8144bce9fd75403f23737f8d4e5780e974c1f1fd5a4cba28252a3e7aa68ce2e0libreoffice-langpack-nr-5.3.6.1-24.el7.x86_64.rpm721a0d21e9b6aa1a952a8305024fc131b3208f06ef1fd31df3e87fccbb0ba702autocorr-ja-5.3.6.1-24.el7.noarch.rpmfb0b7e58a379d673482eaadccf30572b3ea0cfd95a6eba85f27600a0d327222clibreoffice-langpack-nb-5.3.6.1-24.el7.x86_64.rpm0bed762126ac3c8832eda580633ad54d58ffc39dc409a523ed8143cce242cb87libreoffice-gtk2-5.3.6.1-24.el7.x86_64.rpmd39d2cfdc2a08e68065d70238b3371d91bb3a916d03b27616cdd3bc26a599932autocorr-af-5.3.6.1-24.el7.noarch.rpmb21ff8c4c1d91c4d964eb64f65bd52209abe5618c2c781bfac35bad6eae666b0libreoffice-help-dz-5.3.6.1-24.el7.x86_64.rpm2ba081ea8b28d0fb572a37739682d75fff787411a14694b98cca3b1248a8139dlibreoffice-pyuno-5.3.6.1-24.el7.x86_64.rpm5cf4187e6407324d42c2011005444c0a99baafed3509c4821aa64bc03a0d4d44libreoffice-officebean-common-5.3.6.1-24.el7.noarch.rpm8bd2c92fbf105127ffdbd3f9a468e96980866698b5a261d3847fa12a7b9ff3f4libreoffice-help-da-5.3.6.1-24.el7.x86_64.rpm71f25eed108315a20f624f0addd207d37430e68f18ea6ffd6ce6eb1192432e01libreoffice-help-el-5.3.6.1-24.el7.x86_64.rpm6639e05d3b33d8b4ab2ccd69ccbaca672cc7fc989e187507d969ecfa10b33e49libreoffice-help-sk-5.3.6.1-24.el7.x86_64.rpm6b44f84cc0f245793e18f03425909edcb0ad6a4ab741486346c79a2c0fbbf3balibreoffice-impress-5.3.6.1-24.el7.x86_64.rpmdf04f34a22e9a47529c61db39b0eb61dd47e7c52b6218e94cde6622f07c5effalibreoffice-langpack-mr-5.3.6.1-24.el7.x86_64.rpm338bac6607a735d711a9fb562209e33791a65d654c76567e22258eaaddb52137autocorr-ru-5.3.6.1-24.el7.noarch.rpm0ae103992e552fee250648a2615f8b003c52a11c5137bee7b25fc69a0d37c2c9libreoffice-langpack-ve-5.3.6.1-24.el7.x86_64.rpmb3c11bdabd5507da475a5c0dcd2b588e186316b0f5ad9e550572916331a9ea68autocorr-tr-5.3.6.1-24.el7.noarch.rpm436f60f314abe288acc3b180c11ab9a02dbb84be9ee696f78d11638771ef93b4libreoffice-langpack-bn-5.3.6.1-24.el7.x86_64.rpm9654817ddfaf9a0dcab71ef910ccabb1ae12bdf332a2fc655b926513411ff052libreoffice-langpack-cs-5.3.6.1-24.el7.x86_64.rpm24b9f0c2871f18ef868da347e06424b5f35f436061b884cc7f972f3d4cef2752libreoffice-langpack-as-5.3.6.1-24.el7.x86_64.rpmfed2d9e6e4e6a97ce6509f3efef1182fd9ef085dcc60ff1e97743e9173d2e90elibreoffice-nlpsolver-5.3.6.1-24.el7.x86_64.rpmff21d3eddb6884c8429e2236cc744c6e56d2c9a715d1ec2a8efb1c02f1593c0alibreoffice-help-zh-Hans-5.3.6.1-24.el7.x86_64.rpm6c1f6b6415f2da66fbf74ea664f7ffe647662e91c107ac25be96db16bd4acabblibreoffice-langpack-sr-5.3.6.1-24.el7.x86_64.rpm8aab575f96338044ccc6f235fcf0b9edeaf975f9cc37597d08a7b6779eef0334libreoffice-help-ja-5.3.6.1-24.el7.x86_64.rpm2de21480a0794a497e68e96a7fbf144496e293feb1d94c6de902923b1f23b3b1libreoffice-langpack-cy-5.3.6.1-24.el7.x86_64.rpme6f19af8a6193de4104552d38c75115173dd46c5172c749d0f267b923677b52blibreoffice-data-5.3.6.1-24.el7.noarch.rpmea5f9cce207e9424864ee50310bd7f882dec83ede9bbb8acb70170e3b91ba970libreoffice-langpack-es-5.3.6.1-24.el7.x86_64.rpmf3eb9168fea9a8d6fc59e42aac00389926da96027fd38a5e973d4d0c4e865f65libreoffice-langpack-ss-5.3.6.1-24.el7.x86_64.rpmab2977d1dff078f0b9ce6e6e5ae3b34ef5f6388fd7b12abd47fc95d5d5695f77autocorr-bg-5.3.6.1-24.el7.noarch.rpma5dfd33897637fa782a54a994d02f7ce50099677430451a411da127920786e74libreoffice-langpack-sl-5.3.6.1-24.el7.x86_64.rpm8276569bd65cbde23b325db50b74073daf8d60cb97add93ae987740883d735d3autocorr-ga-5.3.6.1-24.el7.noarch.rpme5a950597cac8427d62e966ac7766f60ca0a37d332e106d4d0b42d0af8f61f7blibreoffice-langpack-id-5.3.6.1-24.el7.x86_64.rpm6d44329c56e2a1de2ea7ed7cf3e1b3917d8cd9229d36797abbdf4c6ff91147b2libreofficekit-devel-5.3.6.1-24.el7.x86_64.rpmbcbf08a985ee61fbadc20dbaa0ed34f3a0dae828911f414f6843c87976b8f5ddlibreoffice-help-eu-5.3.6.1-24.el7.x86_64.rpmb24a4683793d598c3c681c2e1936dae895491c47cb37667df87a100c6cc0c94flibreoffice-help-cs-5.3.6.1-24.el7.x86_64.rpmf7d446d591f4f3b5169c15bfce0a42eaaa54f0c697f23fded6edc41a04dedcf7libreoffice-langpack-hi-5.3.6.1-24.el7.x86_64.rpm5a019acfd02092c65b66020dace2ab640bc14fd0ea126747ea4f74440bec4740libreoffice-langpack-ar-5.3.6.1-24.el7.x86_64.rpm93040c51622886d8b6e702b7ac065b0efb89e5c9fb9e1032d717f020b698017flibreoffice-langpack-ts-5.3.6.1-24.el7.x86_64.rpm53a7a808b2641dcfdc91f4ebf85d6aab30800279c4b4417a125e0a6f0203188alibreoffice-langpack-xh-5.3.6.1-24.el7.x86_64.rpm7e46d1a5e2e7e928cd34ab41425a1001efd3602da0cc425601af3eb300990fe8libreoffice-help-tr-5.3.6.1-24.el7.x86_64.rpm09210a0f3d1a8f0126f5b07bc30e40bb4372262e34e192dac40014860ef0595blibreoffice-postgresql-5.3.6.1-24.el7.x86_64.rpma5450fcf613930041d5e27c6baa7dd119d23f0a8f7a211200631acc6fa33018blibreoffice-langpack-mai-5.3.6.1-24.el7.x86_64.rpmca4b1f87cd163c452e2f7d94035f251b4553569da5c0878e2aef48e089e2f3d8autocorr-sk-5.3.6.1-24.el7.noarch.rpmd4d421a3d1f7d36bb2309fb945596997cfa424c3f30d6187d39e038b05ecb494libreoffice-graphicfilter-5.3.6.1-24.el7.x86_64.rpm8695b35b39400411015104d4c26fa16b0c9eeb4bf1b1e6722ac1fcd318ad655clibreoffice-langpack-ru-5.3.6.1-24.el7.x86_64.rpm7e7e10dffe437d114d9183026fa5fd766453aa01d02f034661ead04a26f192balibreoffice-langpack-de-5.3.6.1-24.el7.x86_64.rpm962c872aa525fd8ba6c6074ce74d8c95252f5517b348c33b03ae73dae8829baalibreoffice-langpack-bg-5.3.6.1-24.el7.x86_64.rpme3b57507e67daeed89deed6ac86738297ecafe94964eeb68caa492e582ff1077libreoffice-langpack-si-5.3.6.1-24.el7.x86_64.rpmdd92b2ccf3411ce7c93246fa43f065006a8838f398e812104374f7e9731364bdlibreoffice-gdb-debug-support-5.3.6.1-24.el7.x86_64.rpm97dfecff60f00b5219972597f6b042e96d33575f283c3221d3bb6a7a5ae77f74libreoffice-help-nn-5.3.6.1-24.el7.x86_64.rpmf99de9154d1cd340f93311cc619fde7e71b6f6a8dbd307ba4dd9632699b4255elibreoffice-ogltrans-5.3.6.1-24.el7.x86_64.rpm45ae7b684926956076c524b101a618037f68f9a611e7e141dde68d0ba7095101autocorr-vi-5.3.6.1-24.el7.noarch.rpma288a2bbdc007e6fe57eee2885b3b4925667e45f7af0e950da0fc3a41740f10alibreoffice-langpack-ro-5.3.6.1-24.el7.x86_64.rpm5b6aa371fcffc5dcbf41270dadcfe2578788e5852fe0d808b8098be08c853dc5libreoffice-writer-5.3.6.1-24.el7.x86_64.rpmcde95738a1488820a3fb659b5a27ea0fc83d40687ad0b2266abf117b519195d5libreoffice-help-et-5.3.6.1-24.el7.x86_64.rpm31c2fbc3511010d609cabea5be5e70534e226c779e6291fc68d936ebaf30d755libreoffice-help-pt-PT-5.3.6.1-24.el7.x86_64.rpme6d61128a202485387c3d4bd7edb0c3927c1b9de4780df8dc9ad1bb4e994286clibreoffice-help-gu-5.3.6.1-24.el7.x86_64.rpm46719f24dc48759fb4af9af59049842afec4a303c7d6c756a5a85e379a7c801dlibreoffice-help-nb-5.3.6.1-24.el7.x86_64.rpm1015a64a04740692490ebe68dadc5d75e5e9c0ddbcc468554c5704fb4f8c7d96libreoffice-librelogo-5.3.6.1-24.el7.x86_64.rpm6aa4cc57c1b564dbab5e596599e2e0744db1ac64ecb5e0b38bbf2a2115ed63cclibreoffice-help-ar-5.3.6.1-24.el7.x86_64.rpm4b1d018dd52851e3065b120f6e11981f849aec8fdc7a598b1bb00ec6cf6a159bautocorr-lb-5.3.6.1-24.el7.noarch.rpmedd774037e0f2dc89d77c6dddbc33545039d9da5ff5eca4e09ca3fdc4aa29bfalibreoffice-help-nl-5.3.6.1-24.el7.x86_64.rpm7240a2abc6a68386c6d084ab549282b9472dca19524cbe806b67c403263dde7alibreoffice-langpack-te-5.3.6.1-24.el7.x86_64.rpm76001e59e198a09b25e0998bc371c778ad1883bc24ed626815eea3131342d483libreoffice-help-hr-5.3.6.1-24.el7.x86_64.rpm1b1cc20a954237dcb092f10798132f71a9c09600874c794e3b9daf075684145flibreoffice-langpack-ta-5.3.6.1-24.el7.x86_64.rpm517cc8c5b4807a39fd49e552f201c3dc5c67623322e45ca380ba8f24c32f8743libreoffice-math-5.3.6.1-24.el7.x86_64.rpme4d7f7209557e98d5b351478708b470c7c1edbdb9b2698f772b3ce4e2bf62a98autocorr-hu-5.3.6.1-24.el7.noarch.rpm12bb4fc9a8762df0d1bbc35829d8f53069e70f64562a03e7a991aee341ae9a1elibreoffice-langpack-gl-5.3.6.1-24.el7.x86_64.rpm3af463f4cfa0c4d235c2212f838d525c2782de2e0f38d4918f01fe78777655a5libreoffice-langpack-ga-5.3.6.1-24.el7.x86_64.rpm56617f04aada8ddb2aa9e015502b72b0d15c38cbe49f28a046ce394a84e90786autocorr-es-5.3.6.1-24.el7.noarch.rpme5db2a814b4867932cda29b283cd41eb20a40840e423774822833190fcdd2f3dlibreoffice-help-ro-5.3.6.1-24.el7.x86_64.rpm194d0ad9d6752af94bf44b33e4dbcfceab5742b8304efa19989f764a535f8a64libreofficekit-5.3.6.1-24.el7.x86_64.rpmdd043bd6d1043ffcc2f0cb57046af93f89eb1da5f4ca9a8f19a67ab1bdd0876elibreoffice-langpack-pl-5.3.6.1-24.el7.x86_64.rpmbd5849a6b2f525a80edeb750dd857a4274ca81354f9cae2640e6764e7a8e58bdlibreoffice-langpack-ko-5.3.6.1-24.el7.x86_64.rpmc05c8d1516c20a1326324e054af6430e5bdb9d85c1ac5ae8816cc0f3a1f361belibreoffice-langpack-kn-5.3.6.1-24.el7.x86_64.rpm02eeabfd2981a3842802793283bf99bdf11488e08dd8254a32ab4500254ca331libreoffice-langpack-zh-Hans-5.3.6.1-24.el7.x86_64.rpmb0616a26785d5674dad0e00286ed29bc91a67ada4bd4f72d046350d819f7f485libreoffice-help-si-5.3.6.1-24.el7.x86_64.rpm9d96906fb83c921cbcda6ec1f0c9001e217913992a7021b6e423e7cd0778ec66libreoffice-langpack-et-5.3.6.1-24.el7.x86_64.rpmcc9e551acd26c4ea2160152b3fba3164be962ad1e521319f210efcaa6be2538clibreoffice-help-bn-5.3.6.1-24.el7.x86_64.rpma71b84c8ba805ab88f95db6a0e7a40cddb723e461e1e082ada3c4923eb07ed1elibreoffice-core-5.3.6.1-24.el7.x86_64.rpmc204088f44b85f2bde69620c2dd6218adabf4dbd50d1bdb4fc2b562232ab82a2libreoffice-langpack-lv-5.3.6.1-24.el7.x86_64.rpm8a23c2846d66378a5c317d1c28a5b98b97bd3aad9fb8578bfa860d9a49b2ed6fautocorr-pt-5.3.6.1-24.el7.noarch.rpm1bf9ef155abf6ab801c864c61439bdeea983146c1e584f0e197c584d5e9d7fa2libreoffice-base-5.3.6.1-24.el7.x86_64.rpm5c63e996584dd975709ae00a53781b5f7a25d87f6d434db3315955d04ffd98f2libreoffice-langpack-zu-5.3.6.1-24.el7.x86_64.rpme6a06bf0fc4ef139b3ddc594ee9ea6eeffc2d556b5d7ea86056787a34531ed84libreoffice-langpack-pa-5.3.6.1-24.el7.x86_64.rpm9d8761d593055fceb525515380904ac897ab83463b74e82bc23df53e25981816libreoffice-langpack-nl-5.3.6.1-24.el7.x86_64.rpm2944587901292b1dec1fbebde652b9352db15984713a3b2923257a6650d9e9d4libreoffice-gtk3-5.3.6.1-24.el7.x86_64.rpm46dc01b2cfe2956b52bbb1ef0b14aad42c12233fc1f556403db0a6389e58d52flibreoffice-langpack-st-5.3.6.1-24.el7.x86_64.rpma497ac357a5115d3b44be3b7ce7de09363c84cefc14e68bad080691b1316c80blibreoffice-langpack-or-5.3.6.1-24.el7.x86_64.rpmbefcb6d9c59b64f896d3c0e185fe72f8f9a5e22dc290590012fabc45db203bf5libreoffice-help-sv-5.3.6.1-24.el7.x86_64.rpm70d318447345833a013d2446aa9f614e3d965eb4266c52ee52879dd3d0ab6f01autocorr-it-5.3.6.1-24.el7.noarch.rpme5a3d3ef8a458478c0c72ded0fd45a169583e0ddb67f32852823403917ac47c0libreoffice-langpack-tr-5.3.6.1-24.el7.x86_64.rpmf836ec1da7411fc990a9612d8bc4b36df0a522f1eb2e968e1a03fe7756354232libreoffice-help-zh-Hant-5.3.6.1-24.el7.x86_64.rpmc19fbe21b45e65ec96d562ff722b97ad7806a516079d534ea5e9aa16157e0181autocorr-en-5.3.6.1-24.el7.noarch.rpm0731199ba48841cfa0d51564f066e5be675503f70422457c68b4dd923642225clibreoffice-langpack-da-5.3.6.1-24.el7.x86_64.rpm59713b73de96f6b8b83e18e15191463640770c045a857927c591e0e43d6ed621libreoffice-bsh-5.3.6.1-24.el7.x86_64.rpm2fa91c3b860730adc647e2bab34d5211ef807c856aa231c4e819a250abe30ddflibreoffice-help-id-5.3.6.1-24.el7.x86_64.rpm3a55b6672c42bdc09e6e891d2f2a25ece93b865578cea7d2081871fbfd4ee8d3libreoffice-help-he-5.3.6.1-24.el7.x86_64.rpm960d5f670778be892cc24c24b29057cb88ba0df2e7481f44d8ba75962877fb0dlibreoffice-langpack-hr-5.3.6.1-24.el7.x86_64.rpm1449e4b794adecc3213e93d06ec548540eaba6fd38f64d2e4980c957a3b6f93elibreoffice-langpack-uk-5.3.6.1-24.el7.x86_64.rpm698c5389e87773c3d54d475f4923f2764ea1edcf72e6e491e2e3e0cd58a95ca5libreoffice-glade-5.3.6.1-24.el7.x86_64.rpm58a8bed6cccd72e676801962ad413edea608fa2a2befcfedc01255c007ba6834libreoffice-langpack-ja-5.3.6.1-24.el7.x86_64.rpmf3737edf3792b9d39868abb60beec55d5a5b068968133ed43bc7cfac3ac97d60libreoffice-langpack-eu-5.3.6.1-24.el7.x86_64.rpm3e25b8440f36a2d8ecc07f157a6663f9526d950550c18be9c3682fbd4bc4620dautocorr-fi-5.3.6.1-24.el7.noarch.rpma75dbccf0df3d1d66f35c931a5359575affd657ac136bfad640284ae259db797libreoffice-help-hu-5.3.6.1-24.el7.x86_64.rpm3f6bd5114d256ca8c0c2c71c2f226a79fd9f78fca995e452cb28ac67c29f3cf2libreoffice-langpack-dz-5.3.6.1-24.el7.x86_64.rpm66db4a0122caba8c01c2eedb3983883ebecb6ac8bf756befa2ca89ead3fa7ff3SLSA-2020:1167-1Nbdkit* nbdkit: denial of service due to premature opening of back-end connectionlowScientific LinuxScientific Linux 7nbdkit-plugin-vddk-1.8.0-3.el7.x86_64.rpme2cd1b3993d20f1bae2b01bb977730d6527c71f943c55e7e408c9b94f2b5b956nbdkit-plugin-python-common-1.8.0-3.el7.x86_64.rpm0d32a05782c76faadf4c42c3580ee4dc8752b7b9bddc12b71f311d5ad8b6bc9cnbdkit-devel-1.8.0-3.el7.x86_64.rpm6722148017e193300c356e1d9b5bfa36bb06ef3ff6c031529d94f596bb767b79nbdkit-1.8.0-3.el7.x86_64.rpm0b8b38a60728ba26889cbcdd3e64fcf7430cac2ca0f78585294d20eeb72e4516nbdkit-example-plugins-1.8.0-3.el7.x86_64.rpme6a7b09dbc82d349c92ac76c6f4d5306b863d785bad4ef7254aef35e8250e2bbnbdkit-plugin-python2-1.8.0-3.el7.x86_64.rpm1e2de9cc4cc3944070b79429d5bfbb25300a7f8dd3062af9ce9ca2146114f6c7nbdkit-basic-plugins-1.8.0-3.el7.x86_64.rpm37917595a7f0955f954a67bb55c5e5599792722a2f843fb9114412589882e56aSLSA-2020:1172-1Qt* qt5-qtbase: Double free in QXmlStreamReader * qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp * qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service * qt5-qtbase: QImage allocation failure in qgifhandler * qt5-qtimageformats: QTgaFile CPU exhaustion * qt5-qtbase: QBmpHandler segmentation fault on malformed BMP filemoderateScientific LinuxScientific Linux 7qt-postgresql-4.8.7-8.el7.i686.rpm1b1d48152d96192d5ff660f347d66969d011690eb6b9be5fb5dda10f74b25922qt-x11-4.8.7-8.el7.i686.rpm15b890d9fcd1e7af77df7a08fe5aa1e0bfad82ce4e4545ada61636ce16bfe868qt-4.8.7-8.el7.i686.rpm06ce85228c0eb6a4575842e8dfc38a0d8108343a8d08678b5f2b0270c5e49714qt-devel-4.8.7-8.el7.x86_64.rpm388c3b2fe1da065a8336753ed69291e65ced3e9015b49c3330daee528e49dd3aqt-mysql-4.8.7-8.el7.i686.rpmb02eafd4c53c58fa6dfccf7739c92f331e986cc91eae6556164fbb1e64ca22c4qt-odbc-4.8.7-8.el7.x86_64.rpm1237ce49b54ca542baa37096687b1cdfa386987a19115f2160432c1a933092bcqt-qvfb-4.8.7-8.el7.x86_64.rpmf52d65f5151cd52696835eeedd8e039e8c63401ac5c823cb32dbd872cd3f6c94qt-odbc-4.8.7-8.el7.i686.rpm318114429841232f268636293b6afe1725948e49f80fb81ba0d907d22b6781c4qt-postgresql-4.8.7-8.el7.x86_64.rpm4e582a8e6f99b584d68064ef4ae0132ced8c22c270eb4b01b675c8b2f5e20460qt-mysql-4.8.7-8.el7.x86_64.rpm63a3ec807e7e67c9ec1ebb4be6be598d3230f6a88145fd180e5290c745939b27qt-4.8.7-8.el7.x86_64.rpm79cdd873ee3d50763a260f55fba368b0141870f6e0a3481932ebbfd61f47e66fqt-devel-4.8.7-8.el7.i686.rpm72aeba1b617cbf06a4147b5f77188d6af9c43732aaca79277873784478648cdfqt-devel-private-4.8.7-8.el7.noarch.rpm396dd64d2a8265c49ce4c6fa9a921141e49076fb168bc28b5c1e2d382f4b67e7qt-assistant-4.8.7-8.el7.x86_64.rpmc1fb351e6a9ae76643a3e3ace078b9053858d537fa593d7afddf2fd7f4a25d58qt-config-4.8.7-8.el7.x86_64.rpmbe4ade249a93a40c4bd67c879ccd254d3b343b0b9ae30f1976dc8d50e76c432aqt-examples-4.8.7-8.el7.x86_64.rpm7c3bd5d755119f41157b891839cbd29bd9b5bf890785e5c5902f7eed58cbb7ddqt-doc-4.8.7-8.el7.noarch.rpm78ff8c50509a36604254dd05330601458f4caad6e89b616c778978df571ca4cfqt-x11-4.8.7-8.el7.x86_64.rpmf32db3715612f38c4b2fe8a80591ec40716b3bb9aef967bbc81d56eeadd0d36dqt-demos-4.8.7-8.el7.x86_64.rpm49792f727a908765683f41a9eb66be65e253bb5bd9545a9eb297daed4cc2f11dqt-qdbusviewer-4.8.7-8.el7.x86_64.rpm7abc2f54a53953f0560a3d8c67218ca49445634d1ce59df949fa405bff7e8467SLSA-2020:1173-1Okular* okular: Directory traversal in function unpackDocumentArchive() in core/document.cppmoderateScientific LinuxScientific Linux 7okular-part-4.10.5-8.el7.x86_64.rpm72f07b485044422f7332defa1137720553f9f3e3b46075c14459afb92359c4bdokular-devel-4.10.5-8.el7.i686.rpm56c0b82557aad934482c70ea694c10df6b1daaf81a3608340b38450616cef775okular-libs-4.10.5-8.el7.x86_64.rpm3b8b75fde43459df275e6b74cc406e53ee84960c1037311a29fc26d0a2d7dba6okular-libs-4.10.5-8.el7.i686.rpm6b3c19b0c3776ef5f28c48d08a4be0cd9011e875c270c0a6dc4e7eceedd21e30okular-devel-4.10.5-8.el7.x86_64.rpmbb9338b0661efa6124dbaffb257c0ea48631f803849e49d93bbc3d0c0d6ec709okular-4.10.5-8.el7.x86_64.rpmc09c3774fefe80794af09098d51af3e301045d2f5da88434c48e5cfc1fd50cc3SLSA-2020:1175-1Taglib* taglib: heap-based buffer over-read via a crafted audio filelowScientific LinuxScientific Linux 7taglib-doc-1.8-8.20130218git.el7.noarch.rpm6ea08f0b9fa734f25558f4040e38684c9b309a09f7cceea2334c69176ac15b64taglib-devel-1.8-8.20130218git.el7.i686.rpm963cd3113710c986d6e282a5f73d5de07ba0065e9ca8ff283ab0b68c3275151dtaglib-1.8-8.20130218git.el7.x86_64.rpm20583449743a7ba18961aef7a16fee865a301890a88b57320f28202be844add5taglib-devel-1.8-8.20130218git.el7.x86_64.rpme20449b0b066f6b81575290a5d7107df2f8202b51d59f50b59f30a6e876589d0taglib-1.8-8.20130218git.el7.i686.rpmf5280a8ad2b4602a453ccfac9133484ee9140ecfd11cb749b605024ac0074a29SLSA-2020:1176-1Avahi* avahi: Multicast DNS responds to unicast queries outside of local networklowScientific LinuxScientific Linux 7avahi-libs-0.6.31-20.el7.x86_64.rpm7cb2f10f045899b53133750c03ac7224dcc35f9ba7837a77b6689fda6ddf333aavahi-ui-0.6.31-20.el7.i686.rpmf9f2d35c751fca490764b3691f6c46b349d7a030b96c7e5d1426f1e5bd37c349avahi-ui-tools-0.6.31-20.el7.x86_64.rpm1e74dfea1cb7bacd3818a2a0c5bfce14e834efd6377aeaf40778c426280d3accavahi-libs-0.6.31-20.el7.i686.rpm2ed4282b30a8f017ac3a691760e6c5077308c7e0a846ac4f581059ee3f62e232avahi-compat-libdns_sd-devel-0.6.31-20.el7.i686.rpm1321310d311dfff88f53696a108fa8b3d7e4c2c642a366570e8dedac7bef434bavahi-qt3-devel-0.6.31-20.el7.i686.rpmef1a6525107eebfb70b0bd0a4fe7b2725948d1685b27b84db7255c3fe7d469caavahi-devel-0.6.31-20.el7.x86_64.rpm2eb70083b4939853bfc23956b034d5e105ffd5c482a267c41587f30d73482db4avahi-glib-0.6.31-20.el7.x86_64.rpm00b323944b3cc135ba7f9753d72fad02484336457ca7c5caac5ac74130a512deavahi-compat-howl-0.6.31-20.el7.i686.rpmeb0e5a994ece3f1ad7d335af08c0be16a833a286efe83ea682fee1fe1317b19cavahi-compat-howl-devel-0.6.31-20.el7.i686.rpma60f6f0d2874233f403a7dd2ac80b20db7c0cf9230dc9f6fdd878bc13f9e5bdaavahi-qt3-devel-0.6.31-20.el7.x86_64.rpm0ac47bfa54e22844633d07eb0a05a31757494e83095a4fb4b7317c4420017766avahi-compat-libdns_sd-0.6.31-20.el7.i686.rpmad47208d58d1cb322347d7fa061d66dd5a58447bc9dae828d39c1e08f5d6c4f1avahi-compat-howl-devel-0.6.31-20.el7.x86_64.rpm72f234d1277b0566985506067e917bff130645e40b2225cdfe604e500042a813avahi-qt4-0.6.31-20.el7.x86_64.rpm50eb995355c8c1dabeb8054bc40f9293ddfa9ac217495a3336d21fe06ca8938eavahi-devel-0.6.31-20.el7.i686.rpmefbab8cf0439e1149a53a5c5bfd21e9b9bcc17b3bd12d95858082c5ceca60025avahi-glib-devel-0.6.31-20.el7.i686.rpm3622d0292974db194ed61df492e9f4fa0d31b97888d89affdd2df9f611545114avahi-gobject-0.6.31-20.el7.i686.rpm88c29639a8c0a04d7f8181702eb19a048d5d8bdd892ea27f88c6f8bb2057d022avahi-qt4-devel-0.6.31-20.el7.x86_64.rpm0f3658639366b6a771061b4a161a117364ca6fe99f0e4a73dd661d0d2852a254avahi-0.6.31-20.el7.i686.rpm1400f47774aa56f64934f383007436acd5d69f6eab27df8603a193ed91d15ed2avahi-gobject-0.6.31-20.el7.x86_64.rpmac5997995ba5455ae7f8761bc871b566c67746cc975be2ae1e82406a4c8ddc32avahi-compat-howl-0.6.31-20.el7.x86_64.rpm7a9a49e3a2bac857d9955198935f132073dd3cb2034394efb8da6015b2b9e731avahi-qt3-0.6.31-20.el7.i686.rpm77669d1ee33c94c3e299d8773c3c5ef0a05867674369b5212114f825b40699b0avahi-glib-0.6.31-20.el7.i686.rpmfa8cf354dcd29aac120bb8d46379cba1e9bd9cad59d6b7c902a2069a1f08fd12avahi-ui-gtk3-0.6.31-20.el7.x86_64.rpmb40d2569b7f47bcdee999cbd91985dba3e538d1acb2332a6eb0bd3f89b912fccavahi-tools-0.6.31-20.el7.x86_64.rpmeac5cc37c6f54138efc33c0ccbf5fb71f4fa72b5321fb81e5c36d518468d7c41avahi-compat-libdns_sd-0.6.31-20.el7.x86_64.rpm05046031a9e8d440d1aed829ccb70cf7705e84abe99875d31f632fa75be81b9davahi-compat-libdns_sd-devel-0.6.31-20.el7.x86_64.rpmcc3ee0dcb613acab3adbaca2507864597afc2232a11ecb79af08b01ee8e6c5cbavahi-glib-devel-0.6.31-20.el7.x86_64.rpm74e1854674895bbd807747ba31e5457e1ddc29575af58d61d68f007f516fc50cavahi-dnsconfd-0.6.31-20.el7.x86_64.rpmd61e3e540306208db74d1465a55924b7275a6db15b3cbd9c494b1a9f159950e1avahi-qt3-0.6.31-20.el7.x86_64.rpm36565554d7d7baa967a0f2b38caf67c7dc72445e08cbcb26b07f1d5c4d8ec2eeavahi-gobject-devel-0.6.31-20.el7.x86_64.rpm3741cb08303c58c9d6153ef2f3528b403b9d2b249f456331e4f749fe75f890a0avahi-gobject-devel-0.6.31-20.el7.i686.rpmd5bc87bcc9c3fa7920af1d54eb46146942e53661ca759899c5c0332df83a5f2aavahi-qt4-devel-0.6.31-20.el7.i686.rpma36f72b93d7dd4e64c8cd5593744d4a2b4214890aafa275f34bcfeccef415007avahi-0.6.31-20.el7.x86_64.rpm2e8b563077167e0599910ec1aa6d566f65934add557b538e0969390bb4f3ff56avahi-ui-devel-0.6.31-20.el7.i686.rpm612ff55e2de379ed90e29472a4ace7bf138e3b0df9dccbdec80e721571d66c78avahi-qt4-0.6.31-20.el7.i686.rpm8c3b816d2765e372fcbb4f1c276f99f1faaddad442a375317eed666a7f29d73bavahi-ui-gtk3-0.6.31-20.el7.i686.rpmcf98f5cd9818af34aea04d712b1b5b4169d4c3ae7f034ad3e12afacdecf49b51avahi-ui-0.6.31-20.el7.x86_64.rpm025a4d00c990f03ca9af453a4ef4f92e5aa9c31df85c20206d6a1ad1f64c60d0avahi-autoipd-0.6.31-20.el7.x86_64.rpm91c3eec43445fda974a20210c99e8150567c9287a3e5fb0a3bb508a578dacef2avahi-ui-devel-0.6.31-20.el7.x86_64.rpmdfe29fccd67b260c8ad1483a0a7301f5da57195ad0ca09cbf8ca9822ade18838SLSA-2020:1178-1Zziplib* zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.cmoderateScientific LinuxScientific Linux 7zziplib-utils-0.13.62-12.el7.x86_64.rpm98a8d2d8a46a13eba3c4ae441d5d00365a07b62ce01310f6ddce76ff235798bdzziplib-devel-0.13.62-12.el7.x86_64.rpmbffc6304ef03bb7e2228bf2a2451b4d798f451cdc80fa073493a1ebb3c58ca7czziplib-0.13.62-12.el7.i686.rpm9a2706d83766611aac5999c5fcb0a55935f17e640db445bdb088f49e22bac11azziplib-0.13.62-12.el7.x86_64.rpm97da238881ad98d139dc4d29dc1c56e74e2f79c3f721348bf0c19d06f3b204b4zziplib-devel-0.13.62-12.el7.i686.rpm285315cf445233607cd29bdc49d18bfe7adf9c64e27ee6986efe55793359eb18SLSA-2020:1180-1Imagemagick* ImageMagick: multiple security vulnerabilitiesmoderateScientific LinuxScientific Linux 7emacs-24.3-23.el7.x86_64.rpmd11cf9d323e523243ce442b4ba7d38f1eaeb7d3f141f7f42fb34ccdc3d9b426eImageMagick-6.9.10.68-3.el7.i686.rpmd73565d840e9d4bcc6a5a398eaa25f7b7c1524eb86f355a5d29adcfa77bf4ce0emacs-el-24.3-23.el7.noarch.rpmd6c6829a7973b4b8e8fc714a8523e89e747602ffba234eae29ce10ec816518fbinkscape-0.92.2-3.el7.x86_64.rpm0e87e06bd04d76d6ec93a471c7280adf76d676157de3d5cd97593b042b5ed36demacs-terminal-24.3-23.el7.noarch.rpmf063131f958e130aa43ac2e619c55b05d223063c70f6781b84ef491d3d488d8eImageMagick-c++-6.9.10.68-3.el7.i686.rpm9ab5f4683878bfa91b8baf6492494e6be1b5c9a209fb6810d9f11f025a3442b0ImageMagick-devel-6.9.10.68-3.el7.x86_64.rpmd5b35d044766211a8c203c4dad4579aaebe5d97a6f9cde50b6bd63dff3f83ab9ImageMagick-c++-devel-6.9.10.68-3.el7.x86_64.rpm669731d3611dfe806762efda7c35ec0cccb3afff8e0a01fbedd3857f94d76d49inkscape-view-0.92.2-3.el7.x86_64.rpm6ac2e22082ae96e818ed2a02a0a9584c8d49552e9901a25ee5490106373f9279ImageMagick-doc-6.9.10.68-3.el7.x86_64.rpm1a1fc29264f248251fd6a2214149007127151a0c23a26c1eb3cdf82fc29d117bImageMagick-6.9.10.68-3.el7.x86_64.rpmc0e52dbe9d8e3730f9d54f0dc25329d02ef18d6655e855a91c84bb96458c441cautotrace-0.31.1-38.el7.i686.rpmae3a24a599fa1b8cec3f874e6cd261f6852010a9af7b5d581b83ad96c01700e6emacs-filesystem-24.3-23.el7.noarch.rpmdaa510effd241b1292a768fb59ad4f8f0f56a2dff8be6fa8f6035cec36de70b3ImageMagick-devel-6.9.10.68-3.el7.i686.rpmfd02685c22977f3d206b8054b5ce0be8a00c1f504ce41af0d21d4cb10e434aacImageMagick-c++-devel-6.9.10.68-3.el7.i686.rpm1cdc4eb382098e29f365c597eb87bfd8923b63b790ed0228ca24d11244e6c0a1autotrace-devel-0.31.1-38.el7.x86_64.rpm34134bbc97889b198ad9d6c2df76471622b6fc8ad9df177345b68fa7cf68142dautotrace-devel-0.31.1-38.el7.i686.rpm0703d29d1fec744068c3de5de40edd668cd8213b83b6bdcb4e7cf8b521c6abffautotrace-0.31.1-38.el7.x86_64.rpmdd74de6dae2413eb56a6c3f3bd0d921a3f7317115d6af45cfc5d132d302b6822emacs-nox-24.3-23.el7.x86_64.rpm3981d377abb5d82b42462b58f5ffb6d18ca217fe072e21589ba2923271e3957cemacs-common-24.3-23.el7.x86_64.rpm8b83d8ffe3888877c54c56675f1061eb559310a6e31febaf49b8e1cf9e6bc0aaImageMagick-perl-6.9.10.68-3.el7.x86_64.rpmf2fcbb6f9d26c7542df7a9f16d9dcd8f8902bcced93ab6290a9e4e085a4c7cd7inkscape-docs-0.92.2-3.el7.x86_64.rpmd7f44d8d3c8f89fe532823557ea7dd56775d345d04b32aaa1c9fa736b73aba63ImageMagick-c++-6.9.10.68-3.el7.x86_64.rpm7f32e0325f44f6c13382c158e11cdceb9fbcb99e06ccf22666df025666c5929fSLSA-2020:1181-1Unzip* unzip: overlapping of files in ZIP container leads to denial of servicelowScientific LinuxScientific Linux 7unzip-6.0-21.el7.x86_64.rpm85608f0bce38e465f7058134129737363e68a840e072c87d41aff7353c85b663SLSA-2020:1185-1Libsndfile* libsndfile: stack-based buffer overflow in sndfile-deinterleave utilitymoderateScientific LinuxScientific Linux 7libsndfile-devel-1.0.25-11.el7.i686.rpmbe75f2676006d3a8c300bc35ff848afc8ca19e0e1eaa1183e5d92b33169e85e7libsndfile-utils-1.0.25-11.el7.x86_64.rpm0c2d38785cf7148085445b5e1c356bd52f8588af9a8e9c00f26bff4226ae4752libsndfile-1.0.25-11.el7.i686.rpm231ac4acb07be83ad83b3394627576d4d81548ee857ed12e565a8c867f0142aclibsndfile-devel-1.0.25-11.el7.x86_64.rpma2b607673e71979c46bcf1b9472519e86a1a16e2c74cf08106ae952ab679d6c4libsndfile-1.0.25-11.el7.x86_64.rpm2c5f6f55e792ef15a5b7eb7538ef0ed8df547c441027262b0ab01cc67d589d68SLSA-2020:1189-1Libqb* libqb: Insecure treatment of IPC (temporary) filesmoderateScientific LinuxScientific Linux 7libqb-devel-1.0.1-9.el7.i686.rpm9b33619c14e1f63e80faf6b2d1f426c5fa58c9fc0a00e73c7efa120079950de1libqb-devel-1.0.1-9.el7.x86_64.rpm63e69c4efe8b3b9370a1c8bc500d7365845ee7f1c5f758d3c711cc757a24bd92libqb-1.0.1-9.el7.x86_64.rpm486fa1b7b12bc06a6a7f541133333811b94447de86d9bf9ed8d199b5b3c51dc3libqb-1.0.1-9.el7.i686.rpm9eaee9004ed8df6b4cdcd22f6ffff5e07a819271ca0b4580c0018b1f6f5c8293SLSA-2020:1190-1Libxml2* libxml2: Use after free triggered by XPointer paths beginning with range-to * libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c * libxml2: DoS caused by incorrect error detection during XZ decompression * libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c * libxml2: Unrestricted memory usage in xz_head() function in xzlib.c * libxml2: Infinite loop caused by incorrect error detection during LZMA decompressionmoderateScientific LinuxScientific Linux 7libxml2-devel-2.9.1-6.el7.4.i686.rpm5b42befd79706109e9fca556fbc5fce2e52404eaf68c7aa1b160ba101eefc93flibxml2-static-2.9.1-6.el7.4.i686.rpm7f6ba7b20cb3a86460df5fa134b4aa5a4dd997ee975114d3f96ef114e8848ec1libxml2-python-2.9.1-6.el7.4.x86_64.rpm9892a4e1fb126374c920016af6a88c1d1244206deb6a4f5171c1e27bc267c868libxml2-2.9.1-6.el7.4.i686.rpm85a8c3a6ed6612c5a53ef09429cc33340bc1a17e1ae026cd46f1317234e10646libxml2-static-2.9.1-6.el7.4.x86_64.rpmb740723f65c2626684bcc0acbf260cf6cac248deff05020282e837ed0adea15dlibxml2-2.9.1-6.el7.4.x86_64.rpm773e875478acbd66489226b4177c11040269c26cac13a12dfd4bcd607b26e45clibxml2-devel-2.9.1-6.el7.4.x86_64.rpm90b0f2c254bf1311fc753addef6e90b673f930810c12b56c783755983009d1b4SLSA-2020:1208-1Qemu-Kvm* QEMU: Slirp: potential OOB access due to unsafe snprintf() usagesimportantScientific LinuxScientific Linux 7qemu-img-1.5.3-173.el7_8.1.x86_64.rpmf1f386968dae58c7e07d5bcbc4277a8a7d67f07b2f108834f2fdb4755e40684eqemu-kvm-common-1.5.3-173.el7_8.1.x86_64.rpmb60771a97444f24c04eceaa47d0d8a7fece951440850f95a4d2326bf91c51a63qemu-kvm-tools-1.5.3-173.el7_8.1.x86_64.rpm5bd1383d8f4395a9e246490900007bfe3d7d57cb879a0e8c3d748d31cf788b7eqemu-kvm-1.5.3-173.el7_8.1.x86_64.rpmca31403c3cac507d0ee7ae6ef34332451a7ce09e6d3f33e9426db7aafae4d567SLSA-2020:1334-1Telnettelnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary codeimportantScientific LinuxScientific Linux 7telnet-server-0.17-65.el7_8.x86_64.rpmb9639924e1c258f6c87d9fe7d0b9baa870674e2a918bb2c68eeb67b93427bb8etelnet-0.17-65.el7_8.x86_64.rpm609aae6d0869323d6faaa642adab306b9a6b0ea5ea60eb440d7fd2a0e4f5a865SLSA-2020:1338-1Firefox* Mozilla: Use-after-free while running the nsDocShell destructor * Mozilla: Use-after-free when handling a ReadableStreamcriticalScientific LinuxScientific Linux 7firefox-68.6.1-1.el7_8.i686.rpm01993ba3a72af6b78917dc5f00a91720fc89e982c7e28f2e7d02058f15e1867cfirefox-68.6.1-1.el7_8.x86_64.rpm8176a25e5e267f5a6b45265286ed42c223a8975b660a4942731d486aaa670ca8SLSA-2020:1420-1FirefoxThis update upgrades Firefox to version 68.7.0 ESR. Security Fix(es): * Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821) * Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825) * Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)importantScientific LinuxScientific Linux 7firefox-68.7.0-2.el7_8.x86_64.rpm1e5b267966f341537590d6654c97a355566964cdcf62bbc544e37277a5f55a3dfirefox-68.7.0-2.el7_8.i686.rpm853584adc4e08413c4606997e925c9851ddc2fd92a0a8dab4e5ad77e0833da42SLSA-2020:1489-1ThunderbirdSecurity Fix(es): * Mozilla: Use-after-free while running the nsDocShell destructor (CVE-2020-6819) * Mozilla: Use-after-free when handling a ReadableStream (CVE-2020-6820) * Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821) * Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825) * Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)importantScientific LinuxScientific Linux 7thunderbird-68.7.0-1.el7_8.x86_64.rpmb8f86a931a0edd41a317cad1b77d524a69ded0be84ae61dcd2a67c03987d2479SLSA-2020:1507-1Java-1.7.0-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) * OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) * OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) * OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) * OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) * OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) * OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) * OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)importantScientific LinuxScientific Linux 7java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8.x86_64.rpmac2f7f749a3b29f0116e9d47abbed6f0dea039defb4dcb85da2ace29d70b2c40java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm56d6cedb4273d200fae0d2ba93880da162f5bcd45a64ec69130c645ee4948f86java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8.noarch.rpmd361f061477aaffb7f8aecf0ca6237dfa87fee152f38c9871ce18fc8e4fd4a76java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8.x86_64.rpmc3070a4b2e6170f01d179917f2436d1c415354c2df70ffb7760de5f5b34de193java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8.x86_64.rpmc252a80290bfa8e59fb5a01a0b48892a6e7d8baccea833e3b27b42b34838d0e8java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm5cfb6e9f434aee2d625bea0fc6ac25db12ef77e8086b525a79db06596697f987java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8.x86_64.rpmb7cf63289d514e300887eedcdd5b8a48c71e261b5013ef4d929547265f67ead3SLSA-2020:1509-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) * OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) * OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691) (CVE-2020-2816) * OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581) (CVE-2020-2767) * OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) * OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424) (CVE-2020-2778) * OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) * OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) * OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) * OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754) * OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755) * OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) * OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)importantScientific LinuxScientific Linux 7java-11-openjdk-11.0.7.10-4.el7_8.x86_64.rpm78e63a6d891b057dad896a66da4245e6781ea1cea7e859919d778e28da5771ddjava-11-openjdk-demo-11.0.7.10-4.el7_8.x86_64.rpm3809dfed8a3345dc8aae1a35a90eb4d9c358531bbdf2caa4efa7222021dbc5f9java-11-openjdk-demo-debug-11.0.7.10-4.el7_8.i686.rpm50643e76eae1edf0aae04793221ffebc353e7e68bcd342ad090ad7e898bf0ed5java-11-openjdk-src-11.0.7.10-4.el7_8.x86_64.rpmab85871e725c2fd2794fb839d720c236d4f02f9d07e2cf5034b5a99f889725a4java-11-openjdk-demo-11.0.7.10-4.el7_8.i686.rpm20848af99256c249e985b483406886a5bda510dc6256a381b8d83fbb6b5df261java-11-openjdk-debug-11.0.7.10-4.el7_8.x86_64.rpm876afc21a0f727a737e927b7eb3e869d70965e2b64653b6936ec278788165d81java-11-openjdk-src-debug-11.0.7.10-4.el7_8.i686.rpme92fcf0d0943f66468e339bbcccde7fcd7d1dc12ea44bad3978308615b0ef272java-11-openjdk-javadoc-zip-debug-11.0.7.10-4.el7_8.i686.rpmdb14c224be2d2203f62c459b0079ac7fb497fb2cf81f7aca979caf909b9ed6d4java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8.x86_64.rpm2fb46205c9f9f87f07bd7a7f72f6f5939fccaee14528d392b98eafb4c93bb74bjava-11-openjdk-devel-11.0.7.10-4.el7_8.x86_64.rpmaeb453576033f9281bdaddf05fa93871b0f0d938dcf55eeae9629f08ca53b256java-11-openjdk-javadoc-debug-11.0.7.10-4.el7_8.x86_64.rpm9a3d798dbd225407f84649e581ea80177710c856fe509234f6422464132262c3java-11-openjdk-headless-11.0.7.10-4.el7_8.i686.rpm75e4f9b7103000b896c85b822ae894639fca70458a6fd1c5c495cd1f7e01cbe7java-11-openjdk-headless-debug-11.0.7.10-4.el7_8.x86_64.rpm3156a26c2ecf50f0811db32f47b020653546009e2b15ad6599c3fba21380ceb0java-11-openjdk-debug-11.0.7.10-4.el7_8.i686.rpm7344e10823cc2328323fc34f45567ea27a4aa55584352d21227d0a93c9560e16java-11-openjdk-javadoc-11.0.7.10-4.el7_8.x86_64.rpm524bcef4b6fca48fcc056dd98ba9c888d4d3c5e10d70229bf87f4cae5abf224djava-11-openjdk-javadoc-11.0.7.10-4.el7_8.i686.rpmbaeec652fd2ea7bfadb392612b81abf1c931713463077f5eebf0b1ffd5f0a725java-11-openjdk-11.0.7.10-4.el7_8.i686.rpm1f813c60a4cebd2c4b1b04937c4cc6a07c5f828b3cfd63c8b508e7bb4dccd01ejava-11-openjdk-jmods-debug-11.0.7.10-4.el7_8.x86_64.rpm853150e0df8a322126bbdb0683158d05ffdd627fa8eac41851ba3dbada1fc086java-11-openjdk-devel-debug-11.0.7.10-4.el7_8.i686.rpm1ce89b6a7a64bde744c1b40869cc8d12ea59637099963b9aa0a50a1eac2efbfajava-11-openjdk-jmods-11.0.7.10-4.el7_8.i686.rpm0e499905360df088f13d6ff980e6215870b08d467a3468d97d84afe44114388ejava-11-openjdk-devel-11.0.7.10-4.el7_8.i686.rpm49d6cec33de6e7383fde799957928dc07b222d123336e65f880140a88b1c5ee4java-11-openjdk-src-debug-11.0.7.10-4.el7_8.x86_64.rpmbccd7888a55d0c8c551842891199166bf600732200a61eb575fafd11108e4dbbjava-11-openjdk-jmods-11.0.7.10-4.el7_8.x86_64.rpm61b07ea180ad2fae0b002370febad2a8c1ecd3495d86c7d7cecd4e9ede421370java-11-openjdk-jmods-debug-11.0.7.10-4.el7_8.i686.rpmf455324da739f14b5585a1f1352b376f4fcab462ada2fa8f5e0cc9728d5a63b0java-11-openjdk-headless-11.0.7.10-4.el7_8.x86_64.rpm72f973c0cb28b0053904bc3e637af7b568eb617fcf8ca39d4389fa5bc2da99a1java-11-openjdk-headless-debug-11.0.7.10-4.el7_8.i686.rpmd52887605c8a0c62c9d74942269d4f765ba1b7ecf4cc856914fecdda6682fbf8java-11-openjdk-devel-debug-11.0.7.10-4.el7_8.x86_64.rpmceaaf361e555f7cffab53ce57487a29edd3685ea826ff6b457951c3c8909d21fjava-11-openjdk-demo-debug-11.0.7.10-4.el7_8.x86_64.rpm024b6a02ae009d3a837670275b2e6e8b0d9da78a2f12cdd00991d7344995820ejava-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8.i686.rpm5cec9a806eb7be609b4c88de76862c196822a386d5277819b2985c71136a6be4java-11-openjdk-src-11.0.7.10-4.el7_8.i686.rpm49c77300e0c16c1064fcc94f9c51ba34bd31cbde03dbe2002495463b8b0e668fjava-11-openjdk-javadoc-debug-11.0.7.10-4.el7_8.i686.rpm1a6f1ed433b9aeec0b68e852d084b9091e89a67b17a73eb2715ed673bec46a62java-11-openjdk-javadoc-zip-debug-11.0.7.10-4.el7_8.x86_64.rpma21441a347e279862e253138a5afe664c4f1a7accae09fe8b4d3290dc0b416d8SLSA-2020:1511-1GitSecurity Fix(es): * git: Crafted URL containing new lines can cause credential leak (CVE-2020-5260)importantScientific LinuxScientific Linux 7git-hg-1.8.3.1-22.el7_8.noarch.rpm1ae90a2a5f3ce55dc018e0fa4b3f8fd38b7c675152398906fe3a8130aad68948perl-Git-1.8.3.1-22.el7_8.noarch.rpm8c1ad66b18ccfa7bcdc5656c6744c0043e7e2106102889b6b2e206ad53232e45git-email-1.8.3.1-22.el7_8.noarch.rpma5b4a83030845c35d4693f77d07d2026eca4e41a4376c56ea1371ff64061814bgit-p4-1.8.3.1-22.el7_8.noarch.rpmd1e0b2702173d87a77d6474d7a29dd492c1049bdc90b22595d02cb91f57301eagit-gnome-keyring-1.8.3.1-22.el7_8.x86_64.rpm476b74790af0848bef3a905d5ba4defdfaaa62c6e0bbb08fe151c15bc378b15agit-cvs-1.8.3.1-22.el7_8.noarch.rpme20feec6bda667f900b2225c696388a5445009db93d414a688b55d32f3f99ed3emacs-git-1.8.3.1-22.el7_8.noarch.rpm4e2ce4c9685c44b01c1055437eb1bcfd57c3348546cdc0d44416a438181b5b74git-gui-1.8.3.1-22.el7_8.noarch.rpm0786e633a3b9de657dcd58b68cfbf285677b4c3f223dc96dc50c47389eedf7a6gitweb-1.8.3.1-22.el7_8.noarch.rpm56bb9ba6d3b9542357ba50380aa4d88f25abb117167394abea0e7fd0bf12654cgitk-1.8.3.1-22.el7_8.noarch.rpmec37c467486a230d4b51a41d8f60f264296ee071d069061ff521f63c52ab7bb6perl-Git-SVN-1.8.3.1-22.el7_8.noarch.rpm3e706b4684ab9c75b2090165e8bd6653d6a0e8b76b2e605f53dc69dfb8c04b35git-daemon-1.8.3.1-22.el7_8.x86_64.rpm13c3a7b8c3fc840899e2b35680ea35d3852180234881d871c5a0ba30c0e0c478git-bzr-1.8.3.1-22.el7_8.noarch.rpm71c610f7280e06790462c689915bd2fe7739aa853de4a6b09972fa944d4d4e26git-svn-1.8.3.1-22.el7_8.x86_64.rpmb2bace95a1f2240aadffa64fd700499a3b592a63fe9432df409c8c6908bbbaaegit-instaweb-1.8.3.1-22.el7_8.noarch.rpm8872bb46393c28d37f5795e35497c138f8e6231b2f024353b57b396bd78f3778git-1.8.3.1-22.el7_8.x86_64.rpm67959abfbaa88629e264578caf6b0c4a1ae273603c2b77299b18e22f4a9e4761emacs-git-el-1.8.3.1-22.el7_8.noarch.rpm35a71d11c1e5246619c1a7a5c805270b317d025f7f11ace3eec1afe4d7982ce5git-all-1.8.3.1-22.el7_8.noarch.rpm8ffa81715af249e1303e3176eb2a0a1a4b85aadf1e23855d7c73b8120da07576SLSA-2020:1512-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) * OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) * OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) * OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) * OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) * OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) * OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754) * OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755) * OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) * OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8.x86_64.rpm1069141af62491f1a021cf79fbf46e8724c41e4bbdc73ac940c71050ce435292java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8.i686.rpm7f4a7605aa00e05b5ef57522afd7adfd6d1d0d2f82d6dedef78e8703536fb081java-1.8.0-openjdk-javadoc-debug-1.8.0.252.b09-2.el7_8.noarch.rpmefea41c24e51fc6b4ffd6913f428438ab77058a4f2b92f614d7c85158a564341java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8.x86_64.rpm436ed40f59b987fc9f1537cc8faa715c07befb2ca24d71559b67ed886bd5c786java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.252.b09-2.el7_8.noarch.rpmdaa5e33d513dd54ceb036b8b4a702c9f37dca5d33aec6802a5903a376dca92cdjava-1.8.0-openjdk-debug-1.8.0.252.b09-2.el7_8.i686.rpmb8692f5b5fa33f8e07a00b393a7181e1191b25b0a6edc76596d7eaba528e87f2java-1.8.0-openjdk-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm8b4c0d19fe598c8f930b4bf9eb0c7c80f047e0a41c7c980edb4bf82bcd093cb3java-1.8.0-openjdk-accessibility-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm67ef968322d2949443729d7bf2c18297d4a54ada2c5903f7cec70cbf33181746java-1.8.0-openjdk-headless-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm397cc5fbf2499dc2f1ca13de3d240a860d08dc4b430ab6bcbe09f6a36aeca9d5java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.i686.rpm350db7c8ce15487c58aad33192d0d21b135b6939aa2f27437dba653a01547229java-1.8.0-openjdk-demo-debug-1.8.0.252.b09-2.el7_8.x86_64.rpmbd24c2c842814ba5c79abb989c4e1a6a680648450bf07791ec78cc4d56971448java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8.x86_64.rpm2a79b6e90d600c913f8b6831b56fa3d5b6281828856c63c6af1c005353daaf34java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8.noarch.rpm350c196bf4c5dcc0fc3384c42e1cdfe5c2235f90c98ab0255a578c0ec1bc3e8fjava-1.8.0-openjdk-demo-debug-1.8.0.252.b09-2.el7_8.i686.rpm381a40a7b6dca26c2e31afced75f71524ad1ed734a14dbee58313deccdb13b2ajava-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8.i686.rpm8bc5da3d2b4bcbd255775cb9dda1ed49d33d688f541b97496a237a5cdc395bd3java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.x86_64.rpmb8c62dcff7d47d204a047f0b5a52bb2805bf42ab776d9e870eec3ce6a186e4d3java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8.i686.rpm6898f10477b6d40c18931b7508897915b790800419b2d28dd9b73a817d6a046ajava-1.8.0-openjdk-headless-debug-1.8.0.252.b09-2.el7_8.i686.rpmc365ec1768b4ebf48cdb466a39c169afc720741e7905853d1ea74ef79642e0e8java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8.i686.rpmeefcb409662d3e530f8fe67a18b65cb211181c581c396fe3264160611d5cf534java-1.8.0-openjdk-accessibility-debug-1.8.0.252.b09-2.el7_8.i686.rpm4fdd4e3f37596045a104194d90e3fb4f58555acf61eefcb2740350b9c3a862d9java-1.8.0-openjdk-devel-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm060938775abcbab4e0d34d439f1d54d29e0e4e078cb820685d183fd72944cd24java-1.8.0-openjdk-src-debug-1.8.0.252.b09-2.el7_8.x86_64.rpmc38370deee5569f096495c5555c0d0b73f5fe86faafa355c4a718b49687b2633java-1.8.0-openjdk-src-debug-1.8.0.252.b09-2.el7_8.i686.rpm8b0d08202104cec64552d36769514d7f5bda544dc4fd94b07d42d787783753a6java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8.i686.rpm32dde1f75ff0d154e0f7d379ea57a09dc0ff8fc8c08b418dbdc888bf17e33165java-1.8.0-openjdk-devel-debug-1.8.0.252.b09-2.el7_8.i686.rpm76dd4d34e289c0d4a001dc741dd689d8a9371ee9c074e06d2fd2946d38ec4743java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8.x86_64.rpm7c65a3d8c9e61685fe41b82e56f99cb8397986028148c8081dcc769ef3851a1cjava-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8.noarch.rpm6e5ca39f62145c96c5f75be1cd2e6bb3c81557923ab8a60f5b020b88d038481bjava-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8.x86_64.rpmed48285098be9426b6c74dcdaf01573aa9dfd511405386705744f07c1860ac89SLSA-2020:1561-1Python-Twisted-WebSecurity Fix(es): * python-twisted: HTTP request smuggling when presented with two Content-Length headers (CVE-2020-10108) * python-twisted: HTTP request smuggling when presented with a Content-Length and a chunked Transfer-Encoding header (CVE-2020-10109)importantScientific LinuxScientific Linux 7python-twisted-web-12.1.0-7.el7_8.x86_64.rpmdb3aa75c0081fdc7fe5f6e93bb2228a194a7bbaba5020869dc5670326ac4ad18SLSA-2020:2037-1FirefoxSecurity Fix(es): * Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) * Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) * Mozilla: Buffer overflow in SCTP chunk input validation (CVE-2020-6831) * Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392)criticalScientific LinuxScientific Linux 7firefox-68.8.0-1.el7_8.x86_64.rpmd8d41c0b72aad0a8ad8da51a43a042dfd4e76df4405ef442db0db5451466b2f8firefox-68.8.0-1.el7_8.i686.rpmaa427e2246d1f439484a1d6c89dc37bd65a6aeb54286995ed310663a8963dcf2SLSA-2020:2040-1SquidSecurity Fix(es): * squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) * squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) * squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525)importantScientific LinuxScientific Linux 7squid-migration-script-3.5.20-15.el7_8.1.x86_64.rpme48a229cb920a5df8c1185b05641598a74c1890fab92862bbf07a7d3a7adb506squid-3.5.20-15.el7_8.1.x86_64.rpm2c851b785f68bb2782b17e95f33e52e09dd4908ea53dc680eaf9f14c9e4c768asquid-sysvinit-3.5.20-15.el7_8.1.x86_64.rpm3f78238d5cfad3ec426387a41f248bd8736f8061e3db21903f10d45dcad68d68SLSA-2020:2050-1ThunderbirdSecurity Fix(es): * Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) * Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) * usrsctp: Buffer overflow in AUTH chunk input validation (CVE-2020-6831) * Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392) * Mozilla: Sender Email Address Spoofing using encoded Unicode characters (CVE-2020-12397)criticalScientific LinuxScientific Linux 7thunderbird-68.8.0-1.el7_8.x86_64.rpmdf4fff2e0e48eaac06f00aa8f68c9c88e5b9099b0faafc14bfb33150cdbecd50SLSA-2020:2068-1Python-PipSecurity Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)moderateScientific LinuxScientific Linux 7python3-pip-9.0.3-7.el7_8.noarch.rpm820454d2e9444926b53f576c8ec461bf7fe8510af46c99782ba7c7b72ada90ceSLSA-2020:2081-1Python-VirtualenvSecurity Fix(es): * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) * python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) * python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)moderateScientific LinuxScientific Linux 7python-virtualenv-15.1.0-4.el7_8.noarch.rpm91df44f1cf0fc7bd093fecfb3046aba54dda019317d2354a0b8b44c11824a0ecSLSA-2020:2082-1KernelSecurity Fix(es): * kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) * kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) * Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)importantScientific LinuxScientific Linux 7perf-3.10.0-1127.8.2.el7.x86_64.rpma615a5d374a43e51fb57d2e39fd6bd3635458425f8883634b06f01fc56cafb31kernel-debug-3.10.0-1127.8.2.el7.x86_64.rpme9d206fe6d585fb3da067b10ac17f7bf1272d74b2fea657c022f9d517cf81fe6kernel-tools-libs-3.10.0-1127.8.2.el7.x86_64.rpmb6950f0e9d60e8daf11cc0471bc03dc41ff90a3dea25da467ff3eb8f180d3d13kernel-devel-3.10.0-1127.8.2.el7.x86_64.rpm1c99f69d2e920b2f72f2cc9ee5a577f1d16d1b1f6e0de0f4dfeb2bedd5fd6879bpftool-3.10.0-1127.8.2.el7.x86_64.rpm6580c5b3853e8f2d2af589894e884ba564777be228337acbbe63bd3f971935dckernel-debug-devel-3.10.0-1127.8.2.el7.x86_64.rpmfbca904b670a1b581572ea3b7ec94d33080d501a8abc6fcea7db01f002ddcce1kernel-headers-3.10.0-1127.8.2.el7.x86_64.rpm87755f06f96f52401c96eb6407ccda21828cd0c2cdefc106dddace5a1856ab06kernel-abi-whitelists-3.10.0-1127.8.2.el7.noarch.rpm3847d3dd6328593f8f438e4a6d63df714c1b3742dddeaacc57da3f7debad08c2kernel-tools-libs-devel-3.10.0-1127.8.2.el7.x86_64.rpmda3321490968b1636bd4a30f980f7ad7609ab005c3e047a31cf86c7cf5e66792python-perf-3.10.0-1127.8.2.el7.x86_64.rpmbade20520df0a6debd0c02835e3417b6bb11de4b7b2144b5968e1508a9163d2ekernel-tools-3.10.0-1127.8.2.el7.x86_64.rpmc2d6dbc5fba50c460519d994bb9473a6da99297413ed758b471c4662809cd81bkernel-doc-3.10.0-1127.8.2.el7.noarch.rpm4e5fa4ac78f4f2e6fb3318f0966f810994fd488ad714828a6b430da15ceeddfakernel-3.10.0-1127.8.2.el7.x86_64.rpm37d3e1c3a515452ae61717af7c2463e12466099ca8b8ef47a9b4969b7be0e244SLSA-2020:2334-1FreerdpSecurity Fix(es): * freerdp: Out-of-bounds write in planar.c (CVE-2020-11521) * freerdp: Integer overflow in region.c (CVE-2020-11523) * freerdp: Out-of-bounds write in interleaved.c (CVE-2020-11524)importantScientific LinuxScientific Linux 7freerdp-2.0.0-4.rc4.el7_8.x86_64.rpm791d36c8dc6db5b52ee3e517cb072f983477ad30785fd7e990f4b8239da4b9e6freerdp-libs-2.0.0-4.rc4.el7_8.x86_64.rpmfd62a93230b38a0518bbfea1b6f9b6cda7503a05f10ee41891f77351d8947c06freerdp-devel-2.0.0-4.rc4.el7_8.i686.rpm584707a19ce635e2eb24ca3dac5bd44a1e5b9bf130705922bb6b8f9012f1d326freerdp-devel-2.0.0-4.rc4.el7_8.x86_64.rpm61169318a91709f9eb63b092c68484e4cb532f72f873b4fad2bf90ffeada157clibwinpr-2.0.0-4.rc4.el7_8.x86_64.rpm396f79278b4fc772d3a5e5f9edab779e3c4811c153572bb72bcaa9b001e4ec67libwinpr-2.0.0-4.rc4.el7_8.i686.rpm7256febcc91b39f536ed215dfc8d7eeb44d6e9dc375ddc9236c98686348a4f08libwinpr-devel-2.0.0-4.rc4.el7_8.i686.rpm84f88e9442ee196a88bddbc4b113ada765f7baafb290c18d0921cb7da57f2d33freerdp-libs-2.0.0-4.rc4.el7_8.i686.rpm030f3031e662efad0b0dceba551900e45bf888a4e830c0a0cb5a41d41ad660aclibwinpr-devel-2.0.0-4.rc4.el7_8.x86_64.rpm2757b56c550b71bd702dbe896b7b307303ff2bc0ee46aa16bdbb037b3579c1dfSLSA-2020:2337-1GitSecurity Fix(es): * git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak (CVE-2020-11008)importantScientific LinuxScientific Linux 7git-svn-1.8.3.1-23.el7_8.x86_64.rpmbaef16b8ee609bdfe586df52f6d9a6d60ed37b5385e83cc287e7c308c88b421cperl-Git-SVN-1.8.3.1-23.el7_8.noarch.rpme99450c166ad1b31e011b06880bc1f6cb6b10af5ae9a5028ef20bc092fffe799gitk-1.8.3.1-23.el7_8.noarch.rpm6ea8bfabe4087bf3b7cb3631d5fe8aa3661361a574d2c2e325f1186d997915abgit-gui-1.8.3.1-23.el7_8.noarch.rpm49125643d46e92cb68315c96e7da69d633fa2c4cf3a6a5c984efb2603022a77cgit-all-1.8.3.1-23.el7_8.noarch.rpm353a55e783cb44262427760ecf2b978c5864f9f5fc90a33e58dd54402f1aab90git-instaweb-1.8.3.1-23.el7_8.noarch.rpm8b40eb707791625e153b45b7fad989aa1131453f273b728a1eb58662e1462f38gitweb-1.8.3.1-23.el7_8.noarch.rpm93c8a63edee34034ecd2b5017c57f0901e3f1ac89cce2d60dc6c03b1867ffef4git-email-1.8.3.1-23.el7_8.noarch.rpm543d003eb48ad2030701efdab9845ad91fb82f2d9b7a81b279d34fa2a40eb5acgit-1.8.3.1-23.el7_8.x86_64.rpm8cc6a6a4546ee960304bab2bc221c0b09c87f1a113a9761b9cfa2f4fdb764e83emacs-git-el-1.8.3.1-23.el7_8.noarch.rpm69ff078d441376524f9a33285797d8f023d5c05782194318344e739c049a1efbgit-p4-1.8.3.1-23.el7_8.noarch.rpme1e4d06d9f1c0de7ac4c16107b98d7413dc03b84524056e87d0e19d0ea683c01git-hg-1.8.3.1-23.el7_8.noarch.rpm651a7175975dc36a527c224e54f46d4a2b7e2cc80022175b51f8e08410d6daf6git-cvs-1.8.3.1-23.el7_8.noarch.rpmdbcfa3c27922ab9f2f4a3223e0cf03ed4b25b55bcf2b3baf6b0b9f40396af93bperl-Git-1.8.3.1-23.el7_8.noarch.rpm4f6f4c1dff39fd3e0dc307eb595de1bd712db53c6f757a6d0b0b51303dea460aemacs-git-1.8.3.1-23.el7_8.noarch.rpm4bbf2dd337e1c85f44d0e79d530ee711a8ba6419cd62eb0f016639bbb28b02d1git-gnome-keyring-1.8.3.1-23.el7_8.x86_64.rpm6d6cf2c56c45bab713aa10feaaaa73f0a981c82fa5f33e91463f2915df237fe5git-daemon-1.8.3.1-23.el7_8.x86_64.rpmd29ed04f5280d41b36c95efbd120a352df3b663d2963846d0ab939a95d771899git-bzr-1.8.3.1-23.el7_8.noarch.rpm399931e89538f32cc5e64f50f09a622f622b2b8d770b01175a737c8617aa021cSLSA-2020:2344-1BindSecurity Fix(es): * bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616) * bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617)importantScientific LinuxScientific Linux 7bind-libs-lite-9.11.4-16.P2.el7_8.6.i686.rpm865166806f97792e91d6d926e010b247a749354ce3588ba1c96bcd5133010188bind-sdb-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpme76d41362055a509b2677d8f8ca04353eba163cc900bb2f708b62387ba33fdfdbind-libs-9.11.4-16.P2.el7_8.6.i686.rpm7af89eb55fa3a14f6cdd0e27314444627d8968e32bd8bf26f3917c3e58016dd4bind-export-libs-9.11.4-16.P2.el7_8.6.i686.rpm0b130c09a42a4a737d1e81ff962832583b838bcd776982d22addffadceabf01ebind-devel-9.11.4-16.P2.el7_8.6.i686.rpma2a0e46b35bf46cc794497abdbf92ac9e942ca2c51f225bce6765cbd895cc136bind-pkcs11-libs-9.11.4-16.P2.el7_8.6.i686.rpm4da8d1d6136758376a4006696e85f580f769c995856d269fd33026319176c2d8bind-lite-devel-9.11.4-16.P2.el7_8.6.x86_64.rpmc5af589224e73977c166cdb538ddf1e072439fe5a0a47414c619491191047dc1bind-export-devel-9.11.4-16.P2.el7_8.6.i686.rpm6af2ccf1e3af2a568536262910fee7e353ee8c62f3f89378b3f5db24e7728dbfbind-libs-lite-9.11.4-16.P2.el7_8.6.x86_64.rpm02840d07c325d09899e9946a6bc88708a915b302b05d21357a686f98fe9b7827bind-export-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm6719c57f322a045a5ad433c26ff3a4331767a06a764808ccdc4cb8a3b94bf9bbbind-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpm082dfc5f40c56cf69e7bf9b1b61b145d8b91ebfed682ed82abb084b53024e218bind-lite-devel-9.11.4-16.P2.el7_8.6.i686.rpm25326445adb75522121d13028d3c17645afee82784a9f53edaa10e892226c991bind-license-9.11.4-16.P2.el7_8.6.noarch.rpm2775325acad81999f31309573fbe879bb39782a3f10daa040d9eaca0bc3732efbind-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm48b8b1f932d3def08107e353f28520e4562e4a9beab1dc50c67a38861ebf1c9dbind-sdb-9.11.4-16.P2.el7_8.6.x86_64.rpm05db4ac72f517852f6478f3173b9c1111cb408eb5ea7f7a575a62f3347572364bind-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm7fa9a189b00574f45b614defceffff68feaf5d021186a0e0a6fd59717a257194bind-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm5955ebd3462199cd66880ffc33cec10c6031a1ca872a4efb9851207cb0fd40c7bind-pkcs11-9.11.4-16.P2.el7_8.6.x86_64.rpm171c8fdc73ce0337634b40bff9937cd311741b4123335dc07f9a7f9b4d55ba86bind-export-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm9adb7f285c5634860761fa9fe5f69d654dce14adae7bb7097cefb82abb5a26e4bind-9.11.4-16.P2.el7_8.6.x86_64.rpmc6be42ce4f35b91ad377c16393bdfc436b438bfff49fa3bbe657321c3b09cf10bind-pkcs11-devel-9.11.4-16.P2.el7_8.6.i686.rpmf46b2a0972a5d0e0afb565741dfa330aee73a5a98a66cb269d9b690b93efe4b4bind-pkcs11-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm7ab441e92275caff0bb44a55eefeb4882558a3e6a8b22ed4f3e63cbac094507fbind-pkcs11-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm9ad5b85464486b92eab1ff265646e373cc5d8ca569793d163a05fc6fc803382dbind-pkcs11-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm4ad390960e0bbc8b98c71b64536ef1359b5a9d362f37d5bcbc038d89dccec50fSLSA-2020:2381-1FirefoxSecurity Fix(es): * Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405) * Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406) * Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)importantScientific LinuxScientific Linux 7firefox-68.9.0-1.el7_8.x86_64.rpmcd822f257cbbc2481bafa0c646abbc44d04deeafc4c5616aea0f81634de4f0e6firefox-68.9.0-1.el7_8.i686.rpmc420fd11cd7adcdcb333cefe7fa4ec64a300b29cbf824b89bc48a69f2c9833cdSLSA-2020:2405-1FreerdpSecurity Fix(es): * freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c (CVE-2020-13398)importantScientific LinuxScientific Linux 7freerdp-devel-2.0.0-4.rc4.el7_8.1.i686.rpm13129daebb1c1a7172c47fc0cd0b94f6cfae58e3a0ac151faaeedfbf08ded0e9libwinpr-2.0.0-4.rc4.el7_8.1.i686.rpm7188677256bfc2ac5ba16e976a8d9ee89770758ca183040572619aff716ce661libwinpr-2.0.0-4.rc4.el7_8.1.x86_64.rpm278aa434e8b95a5e62afe2dc9b54d705f876afa504918928a7ea888409ea6e6dfreerdp-devel-2.0.0-4.rc4.el7_8.1.x86_64.rpm51380744620ee17d2352dff3f9612f0dfbe2627946b1dbf50fd805cfd1e1a26afreerdp-libs-2.0.0-4.rc4.el7_8.1.x86_64.rpm482a081506c17dcc1a64727bb644fd2ce6615d9c8368b0cc9f489a0e2e8d5aa0freerdp-libs-2.0.0-4.rc4.el7_8.1.i686.rpm079b0e811e8b7caeaea6bbecea90cf638bacfe7d854a6da1a73e1b27b32076f3libwinpr-devel-2.0.0-4.rc4.el7_8.1.x86_64.rpmef881ffa2b57a093a646d147b53cdfefae69310a5756fd756cdf42f4a06dbe04freerdp-2.0.0-4.rc4.el7_8.1.x86_64.rpm65de402e659f95ac09a7a858b506744a0074e0d45a952691d47fbf98ae4870a6libwinpr-devel-2.0.0-4.rc4.el7_8.1.i686.rpm437d89858624d282a9e8f9b9d6d719ff049e609936a3ab29c230178c646b1cd8SLSA-2020:2414-1UnboundSecurity Fix(es): * unbound: amplification of an incoming query into a large number of queries directed to a target (CVE-2020-12662) * unbound: infinite loop via malformed DNS answers received from upstream servers (CVE-2020-12663)importantScientific LinuxScientific Linux 7unbound-python-1.6.6-4.el7_8.x86_64.rpmb368c0fa9b82908b1b54840cd3649358b985d3d97773e0e07c144d61e0af1a2eunbound-libs-1.6.6-4.el7_8.i686.rpmd976b05ca9239fd0cbec53d0a0adae9b33ee3962bfaf9be8e0df52317463ba79unbound-libs-1.6.6-4.el7_8.x86_64.rpm2e65e1e4399a5f2d9549972e087bfc79c1b708b6b859b446b9afea97142e860funbound-devel-1.6.6-4.el7_8.x86_64.rpm168f3304c412a5b6e5a55a145f31af42fab9c1bf0a3f67437e45078fd85a162cunbound-1.6.6-4.el7_8.x86_64.rpmb7eca75b5551a800e8556c5a6050dc0c76aa34e240db7d417c8fda6a66f85ea8unbound-devel-1.6.6-4.el7_8.i686.rpm0d60a73df62f24faaded98cddc9b8591d34b856e6fe8d60bf500e992bb876110SLSA-2020:2432-1Microcode_Ctl* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: Vector Register Data Sampling (CVE-2020-0548) Bug Fix(es): * Update Intel CPU microcode to microcode-20200602 release, addresses: - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f up to 0x621; - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718 up to 0x71a; - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28; - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e up to 0x2f; - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25 up to 0x26; - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c; - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21 up to 0x22; - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6 up to 0xdc; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151 up to 0x1000157; - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065 up to 0x2006906; - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c up to 0x4002f01; - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c up to 0x5002f01; - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6 up to 0xdc; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46 up to 0x78; - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca up to 0xd6; - Update of 06-8e- 0b/0xd0 (WHL-U W0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e- 0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6. - Change the URL in the intel-microcode2ucode.8 to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore. * Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment models. * Re-generate initramfs not only for the currently running kernel, but for several recently installed kernels as well. * Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script. * Update stale posttrans dependency, add triggers for proper handling of the debug kernel flavour along with kernel-rt.moderateScientific LinuxScientific Linux 7microcode_ctl-2.1-61.6.el7_8.x86_64.rpmc0337f87bab2fb65118dc5c52c1b62beaff73ed5ab9d905a015b21a13f8adc63SLSA-2020:2530-1TomcatSecurity Fix(es): * tomcat: deserialization flaw in session persistence storage leading to RCE (CVE-2020-9484)importantScientific LinuxScientific Linux 7tomcat-webapps-7.0.76-12.el7_8.noarch.rpm5175039ebbd3e0343682ed4c890b72f738e3a5135b7a0c81e662040c5576a96dtomcat-el-2.2-api-7.0.76-12.el7_8.noarch.rpm44af55c03f6f1144395846f7ed0b61a78d37fda048e67881876c5b60573740c9tomcat-jsvc-7.0.76-12.el7_8.noarch.rpmf08fb679877651d3e9a323f90ffe8661a80f5c4feb22ff3763be7d8702ac7097tomcat-servlet-3.0-api-7.0.76-12.el7_8.noarch.rpm29693e64398dc9648a646e53600ad28aaa7b367b57ba7defd864e2d6f26d936atomcat-docs-webapp-7.0.76-12.el7_8.noarch.rpm71c5c6d72f624ffa6b839e9bcfbbbcbe3913c825cdaf925512c67fd690a05f5dtomcat-jsp-2.2-api-7.0.76-12.el7_8.noarch.rpm89faea5c27f9ba37fcf946043744a979e2c99313428a1a2935966e972bd4b793tomcat-7.0.76-12.el7_8.noarch.rpm2234847dcd7fa60361a4accac11ec3349e136d5dd0a01b48268c648fd1eff9cctomcat-javadoc-7.0.76-12.el7_8.noarch.rpmbd20b2ff25aab62f88dc50ebd511b1efa213633c9a392956294be1e8569bb830tomcat-lib-7.0.76-12.el7_8.noarch.rpmeda892448414e87da9ff32ad5932c5f291979dc375c0a6644f7ac2a6b21597d5tomcat-admin-webapps-7.0.76-12.el7_8.noarch.rpm6f8c274a9812b9636f362949523d38f849a474bff8a6c76b60547dfa3b9d1ffdSLSA-2020:2549-1LibexifSecurity Fix(es): * libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS (CVE-2020-13112)moderateScientific LinuxScientific Linux 7libexif-devel-0.6.21-7.el7_8.i686.rpm373ba02ed9b2ae6bc06f267481a798a08fec0261c71b72a2100df9d252f83332libexif-0.6.21-7.el7_8.i686.rpmc731f7c864d5c08eb8018f648acb6c8fb480af267187a33208686f026019a228libexif-doc-0.6.21-7.el7_8.x86_64.rpmfb6c09c5635eca3582102cac1ad55a2622147ce56a0a8f82118acdab2c25f03flibexif-0.6.21-7.el7_8.x86_64.rpm7a3c4f8ad022dfdb13821c3acd66aeb43aa6733187964b1f76edbab3796ca8delibexif-devel-0.6.21-7.el7_8.x86_64.rpma059fdf6e7ec0706d9ce204422d7d8f28771890b01be3f18aea052f098d36e45SLSA-2020:2615-1ThunderbirdSecurity Fix(es): * Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage (CVE-2020-12398) * Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405) * Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406) * Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)importantScientific LinuxScientific Linux 7thunderbird-68.9.0-1.el7_8.x86_64.rpm067390d0a29459a3cbee073306c004ad2891f458b865be0fdc25264f51456f33SLSA-2020:2642-1UnboundSecurity Fix(es): * unbound: incomplete fix for CVE-2020-12662 in SL7 (CVE-2020-10772)importantScientific LinuxScientific Linux 7unbound-devel-1.6.6-5.el7_8.x86_64.rpm7c6a0a9a3ce954b42f441f984c16e5007148b2044b2c1ca4b702fdf3425c187funbound-devel-1.6.6-5.el7_8.i686.rpme4d1194d308cbbe07ceb33b12bf886fdeb4daa6d46dca5d96f1f0832e8e62eebunbound-libs-1.6.6-5.el7_8.i686.rpm6a9e60a66c4be3b716934ed18899cf66467fb19964156094a4d74029159a67bbunbound-1.6.6-5.el7_8.x86_64.rpmc68935a7548914dd8fabd3c8d5b3eff283b4178c889ed7544f793ba942b514ecunbound-libs-1.6.6-5.el7_8.x86_64.rpmf0af67c9e40d854eb96469c365377a4aa5a3acb581ff8a5c89a31d001fee6148unbound-python-1.6.6-5.el7_8.x86_64.rpm4db9dbfe2b4069672ed6659c68246288e5cc71f54f41f492c63f36b58d11f5a7SLSA-2020:2663-1NtpSecurity Fix(es): * ntp: ntpd using highly predictable transmit timestamps could result in time change or DoS (CVE-2020-13817) * ntp: DoS on client ntpd using server mode packet (CVE-2020-11868)moderateScientific LinuxScientific Linux 7ntp-4.2.6p5-29.el7_8.2.x86_64.rpmc59dadad0707f467fdb42c482350d8eb1b8f9ad6525ab4bfa958d26cf582c197ntp-doc-4.2.6p5-29.el7_8.2.noarch.rpm9c302ecfc45afe6bf258a77897eae9ca69b4b5bd7099e68b4d956e3bae7ee900ntpdate-4.2.6p5-29.el7_8.2.x86_64.rpmf4c6ac47a1840ed72d2fc8d8a16624c4e51fda030897495d3a45231b091d4818sntp-4.2.6p5-29.el7_8.2.x86_64.rpmbdbf0c685b0eeb1cb023568bd9595c0d6882427d1c16169716959daabf770cd4ntp-perl-4.2.6p5-29.el7_8.2.noarch.rpm48732021b8c5aa13132971e6568f7758144a5107e46eff4890b62ecd7b833c99SLSA-2020:2664-1KernelSecurity Fix(es): * Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)importantScientific LinuxScientific Linux 7perf-3.10.0-1127.13.1.el7.x86_64.rpm73760a7f5ed4f2f865f1240e8201129eb3c6cf59ca5ffdcea9cf599685236dc8kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm39c06e89374fcf4a058cb271a3a2d5a80024de40f3b9914e87bcc51553788346kernel-3.10.0-1127.13.1.el7.x86_64.rpm260bbfe988600b5b26a7c446a0b7b8b9e50bb1f904176d1b4b646196aef2f125kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpmb45deac3bbab816df551e1cdb11d1d981dc039d03f7837c26ed1c7643b3d04cdkernel-doc-3.10.0-1127.13.1.el7.noarch.rpm340fdf47cbe5cd0ac1fd7aea3b8a4baa81d8bf2653899238971633d61d361d99kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpmdeb9a3548569007092ef2aa5c493856874aedac630280d85e5235386d4fabdbfkernel-devel-3.10.0-1127.13.1.el7.x86_64.rpmbec147380af93c9e21766f4f9c0a92b12ce2457acd25563504f977aec94e6f5cpython-perf-3.10.0-1127.13.1.el7.x86_64.rpma25454d4ace4e8f382747605e7e3c11a0189991dc6c55b577e18874cde7d24b5kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm5562ab6d6e7d07dbb96039bf153f8d6c9e297c83832e9ec8e9e0676094dc58a0kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm325792a6f0d6d111b18fb035cc00db0e54a1e7444510e621e26f3a1ed0a6cdbekernel-tools-3.10.0-1127.13.1.el7.x86_64.rpmc51c9f94e102d860242a2d8576ef8087c923fb82913893d0e4cc2018aebb025ckernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpmd19a378b9d759ccbe18331b4cbe0e2648616effc56c054905443ffc8e72c5bf1bpftool-3.10.0-1127.13.1.el7.x86_64.rpm59879294d334b00829f6737d527f3874361329c5939a137d75e2f5d465c722c0SLSA-2020:2827-1FirefoxSecurity Fix(es): * Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417) * Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418) * Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419) * Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420) * Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)importantScientific LinuxScientific Linux 7firefox-68.10.0-1.el7_8.i686.rpmfb0e14e53cefd80e6c2af9aedeadc058d8791914b82c2defd686469c5024962dfirefox-68.10.0-1.el7_8.x86_64.rpm84332b01d8275c1aa7b81f17105c111505a637c65ab1d11d98ec7f82de02b5eeSLSA-2020:2894-1DbusSecurity Fix(es): * dbus: denial of service via file descriptor leak (CVE-2020-12049)importantScientific LinuxScientific Linux 7dbus-x11-1.10.24-14.el7_8.x86_64.rpm8b7b8dca07e2b37d52c5f29490c991d4ea65d5a2e41d1b8f88b1069de77ad35cdbus-tests-1.10.24-14.el7_8.x86_64.rpm2d3b5c804b3644d8aecfafb70cb0f23e98279fa2c84245b069bb7af61369779edbus-libs-1.10.24-14.el7_8.x86_64.rpm18d377ccfea34a09a7e92404055a9fa4b3de2cfd75229cf3cab6ebfa8bd2c439dbus-devel-1.10.24-14.el7_8.i686.rpm5b0358f9e63d9da0e5fbece921c0dfd3a492f9d1c887aa53081b14df9e4914badbus-libs-1.10.24-14.el7_8.i686.rpme3e590e330e2b5379205b0d551eb65e4574bcc1341d8d27e77790bc1514516a5dbus-devel-1.10.24-14.el7_8.x86_64.rpmb558ba5ac9e20a6514d8aa7476940cec464a3165cedd0f7c6250b4f99d38aed9dbus-doc-1.10.24-14.el7_8.noarch.rpmbced54d940739cd0ae17d64250a1e063e093d5c45ff3666e553d83e58a530ee9dbus-1.10.24-14.el7_8.x86_64.rpm4f4730bd1a24bc1ffef6f35bf10a374828fa22f1d530e1adcdbe867453a11dd0SLSA-2020:2906-1ThunderbirdSecurity Fix(es): * Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417) * Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418) * Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419) * Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420) * Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)importantScientific LinuxScientific Linux 7thunderbird-68.10.0-1.el7_8.x86_64.rpm5fce71dd35aa68a2c8c13d9af40d68331a0d63661ac949f9b1e3949d3c2b1d5cSLSA-2020:2968-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583) * OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593) * OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556) * OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) (CVE-2020-14578) * OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) (CVE-2020-14579) * OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621) * OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-accessibility-debug-1.8.0.262.b10-0.el7_8.i686.rpmc25b46a0d2fe83eb11de1b3c67406cbb32d21adf5e36fef22d175b1fa55acbe1java-1.8.0-openjdk-demo-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm1ce8d5e98058aa62e74b621b70cb470bbb2e740c8afd71b516dd5d3bdee13e4fjava-1.8.0-openjdk-src-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm62497feef406d5b15f4ba290705aa480747061a4ceb1ab96ebb2a7cfce1c1d46java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64.rpm33d57328b81fd57106f8ea3d1351bd90fe2297303cb89bef4f1fd43b673d67dfjava-1.8.0-openjdk-headless-debug-1.8.0.262.b10-0.el7_8.i686.rpmbadff50ef5eb9b8c1415f5a2a0b15fa903258ff032200a5870296f5d6fceadd3java-1.8.0-openjdk-src-debug-1.8.0.262.b10-0.el7_8.i686.rpmb3077b5c669315372b36c27a12b8e88a50bae2d8715bb3f8e09efe3bb1644caajava-1.8.0-openjdk-debug-1.8.0.262.b10-0.el7_8.x86_64.rpmd33b17d742e7dd4d19d6b23c10b0ef37d3f68d5110d4aa92ecf6702bfbe06636java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8.i686.rpm12926aff4ac3519791ae6b2c8ac72fd448b3a7ca27788be3fff97e353628a6a6java-1.8.0-openjdk-demo-debug-1.8.0.262.b10-0.el7_8.i686.rpm2f7f31f5a58b0afbaa8c86636762fe3310f740f66376351c35e3c2500b80638fjava-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8.x86_64.rpm9003c15b94226ffb46ce3a4c6450ffe9c97ab26406e58fb9cf8d8d83cdce85e6java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8.x86_64.rpm60d10537b8ebf4032b9e6a05dc87d6bb953a7463285cfec2402129046e4cbb8ejava-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8.x86_64.rpmb0aef98fcf54214b77c05910e3508cef7e752e45f774a8c234736b2d331e53d7java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8.x86_64.rpm5599516b9e86a557c7c008ef0da9aaa12c95aa99490912504b295946ed7d0a07java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.262.b10-0.el7_8.noarch.rpm124d974d1d111a6a5763a63b98374a4471590e716124272c4d75f9ffd0cd4c65java-1.8.0-openjdk-accessibility-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm733b5605d57fe3641bbb3ee20eba698a16f11503f8e9034aa74d578897a683fdjava-1.8.0-openjdk-headless-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm99f2678549de7ab83bec22d2e6be32301ec8472ca4d97b0803a5c4be5da90540java-1.8.0-openjdk-devel-debug-1.8.0.262.b10-0.el7_8.x86_64.rpmb71b02a5272e24e6aaa0e1332b5f970c0dd3a29f195e019638d2553b80f8e195java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.i686.rpmb2673b9a059a08890340af10eda8f0598b70c835ac2b9acbd55437b7c13c1c64java-1.8.0-openjdk-devel-debug-1.8.0.262.b10-0.el7_8.i686.rpm335ca82c895c3d7c895c4568fa6565a1d979a1e27188caff3d048b1c41a73774java-1.8.0-openjdk-javadoc-debug-1.8.0.262.b10-0.el7_8.noarch.rpm996c6b9497139853baa1e5056cc7a8c24976b291b0e32f1a492684eea628890ejava-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8.i686.rpmfe27cb5dc3b7653c620c93e1c5a0d4c76e6dc1c7887ee946c18692327dd80f24java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8.i686.rpmea621a3aae7486798d54351a033bdc49301bf86a9ffe4f62b57d3f0caa5ab162java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8.i686.rpm676b594dafbcf182b6c99b8522dc4ee8ef2145eaa8c51da89dfb812220a267a9java-1.8.0-openjdk-debug-1.8.0.262.b10-0.el7_8.i686.rpm7c929553ac57db6693e4f22c201c682025b3492a12ef5c5214dfcdb3f89f04d4java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8.i686.rpm292248066f124c758731e9bc2c3eed55b660ac2a4f551e3bd89de7fcb0230eb6java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8.noarch.rpm652f496dcc0797a659abc7a25ea9a772c42386f650c98eee0f198cb2bd459e49java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8.x86_64.rpmd37e78aae8a614c6543a578e5913d9496533c25b757b36e12f0367d8cf1aab3ejava-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8.noarch.rpme11e861a1b9bc2136d69c988f8f64cb2ea670fa18785041bc4becf983ae36b2eSLSA-2020:2969-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583) * OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593) * OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556) * OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562) * OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573) * OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621) * OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)importantScientific LinuxScientific Linux 7java-11-openjdk-debug-11.0.8.10-0.el7_8.i686.rpma9b0110419f1df152ad813e59f935cfc82b2086cd52190e4d599446033d22be2java-11-openjdk-src-11.0.8.10-0.el7_8.i686.rpm0319a6a2690357159a8ffb7e724f2dc63e65d0f824fea8e1ccb7db206cfefea7java-11-openjdk-jmods-debug-11.0.8.10-0.el7_8.x86_64.rpm21f4b120ad248ba5b9b3fe1ac7cbe03ebc0f6ea8cb04a84b8f9b996de8c46da4java-11-openjdk-demo-11.0.8.10-0.el7_8.i686.rpmffdc82b2637ed4a610baf7ce17f8dc1f1920af7b956d92ee39a57475417db588java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8.i686.rpmbeae6c0ace8672eed4179d03e27af0db9ca384c03b8083a52963d56c68503b69java-11-openjdk-11.0.8.10-0.el7_8.i686.rpmef778642f06039caca9c495fa2c3451c3dc658f2bdf839d1d8a643aa8eea81e1java-11-openjdk-javadoc-zip-debug-11.0.8.10-0.el7_8.x86_64.rpm77e4e569ae072a1b740159a132f138bc754f1544d9c420bd6786a238758883ddjava-11-openjdk-demo-debug-11.0.8.10-0.el7_8.x86_64.rpm86f027d64500ffc8807669355479ea664ac130a726ae38ccc17e3ba2a603b156java-11-openjdk-headless-debug-11.0.8.10-0.el7_8.i686.rpm6054356c4b57d0c879e97ce6bc12eee483f15421b2c2ca454921c50cd24281d5java-11-openjdk-src-debug-11.0.8.10-0.el7_8.i686.rpm610bb16318f87ba2db84e3cff209f26a8317146b61936d49c5b33b97266b6a70java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8.x86_64.rpmee7c81b54bbc1c5f693b457515c634a9ebeaae78a09333d51e6b70c4ed86d27fjava-11-openjdk-debug-11.0.8.10-0.el7_8.x86_64.rpm35612cf7654f5d8767ecd8687e4f61d507df7d63d37839aaf879f2f2a4631e8cjava-11-openjdk-headless-11.0.8.10-0.el7_8.i686.rpm633cd5aa2cfd41f7c6a46610edd9b5a51f8c414f068df144ad703fe8a78677fcjava-11-openjdk-headless-11.0.8.10-0.el7_8.x86_64.rpm51f59303cc115ffadff1e3cc850dd1b7ee3b3702c013e36c82b58eefa6bb641djava-11-openjdk-javadoc-debug-11.0.8.10-0.el7_8.i686.rpmc9fd077067ee02b0c2999fbd750d182859cab791c0994bc636e5d907d858b096java-11-openjdk-jmods-11.0.8.10-0.el7_8.i686.rpm95853bfe16b648ee8486dfc4f076a6b6b3d621f3893bccd14faacb14869d7c45java-11-openjdk-javadoc-zip-debug-11.0.8.10-0.el7_8.i686.rpm808b3edb8a347caf2c5126f87b7b6e1ba8166ed8ea3598265ec3b242733016f2java-11-openjdk-src-11.0.8.10-0.el7_8.x86_64.rpm39ac0c3a1a8111716bbaf498e8993079c0840924a208ca7ba5973aa863354551java-11-openjdk-demo-11.0.8.10-0.el7_8.x86_64.rpm7be688a2a93060eec5425fc00f4b7af5ab784ee7c4aef31d629b64b037435794java-11-openjdk-devel-debug-11.0.8.10-0.el7_8.x86_64.rpm8de9124203a43fe5c94405f575f6c42fb868120f6e2766f886cedc2c0e23eb8cjava-11-openjdk-src-debug-11.0.8.10-0.el7_8.x86_64.rpmee1245080879d431ec2ef46ab06712e7a073223e13516848dbff8778b54ff40ejava-11-openjdk-jmods-debug-11.0.8.10-0.el7_8.i686.rpmd71ae88e48578c33a45d6151bc308caf01f54056e76215b8f44a1d262c35552fjava-11-openjdk-jmods-11.0.8.10-0.el7_8.x86_64.rpm220ed7a3d41c2757e5635f7cde6a313b56ae8a06c7b0b3eed78f34a1d3533367java-11-openjdk-javadoc-debug-11.0.8.10-0.el7_8.x86_64.rpmb5418245f0890743c2846e4f495002efc9736dc3d1bfc82fde9e78eaab81b304java-11-openjdk-devel-11.0.8.10-0.el7_8.x86_64.rpm26e1bfd3f61c884608efb4efab299256215f56bce7a175106e3a62c5e83f5d35java-11-openjdk-javadoc-11.0.8.10-0.el7_8.x86_64.rpm268ce71bdb1210ebdcec9675e7dec2d4e9f8da2917c6d3d56aca61fe3d8b2c23java-11-openjdk-devel-11.0.8.10-0.el7_8.i686.rpm2ec52909847d2f94c62e643b04828c33d547df0a57aeba57d3666192c61924aejava-11-openjdk-demo-debug-11.0.8.10-0.el7_8.i686.rpmd5efda7ddb576c748a34b6427d05b6bfc969c18647f54d0dd55d334ea20de010java-11-openjdk-11.0.8.10-0.el7_8.x86_64.rpm9329751833ad7e0040ce3234c094823dac3879b7c0da664da3660c41cb1e1c5djava-11-openjdk-devel-debug-11.0.8.10-0.el7_8.i686.rpm6570ac3910a747e508d90aae0ee3d442c1541e381b48210f4b4b9ccd477f8f08java-11-openjdk-javadoc-11.0.8.10-0.el7_8.i686.rpm413b519b8c832957880ba0fe3cc2901fc0a683df3d1c8274c218edf574d4dd9cjava-11-openjdk-headless-debug-11.0.8.10-0.el7_8.x86_64.rpmba7b71dd858372163c956387ea6b510ac790312f58875b579e90b6898ac38058SLSA-2020:3217-1Grub2Security Fix(es): * grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process (CVE-2020-10713) * grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow (CVE-2020-14308) * grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow (CVE-2020-14309) * grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow (CVE-2020-14310) * grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow (CVE-2020-14311) * grub2: Fail kernel validation without shim protocol (CVE-2020-15705) * grub2: Use-after-free redefining a function whilst the same function is already executing (CVE-2020-15706) * grub2: Integer overflow in initrd size handling (CVE-2020-15707)moderateScientific LinuxScientific Linux 7mokutil-15-7.sl7_8.x86_64.rpm25149e24397bb7a04aa20ec53bfea557a0bb0606131666472c15f628ab5cc254grub2-efi-x64-cdboot-2.02-0.86.sl7_8.x86_64.rpma25e9b06a21f68fa1fc8a16c20969e11d4a6a7471cbd44f8605191d16a5da129grub2-efi-x64-2.02-0.86.sl7_8.x86_64.rpmca76b954d60a5e3e974f468ce8d2037041b36d8743e88985d7ae0a3a83b55640fwupdate-devel-12-6.el7.x86_64.rpmcd508ed1e4060d9fc856667f9c06a35df72dbea1c3549926f23ccf7c005b2e34grub2-2.02-0.86.sl7_8.x86_64.rpm95329c2057da4c23c41507cf9db560277301222eee5259921851deec33a86de3shim-ia32-15-7.sl7_8.x86_64.rpm788f513bbbc9b629bd59fbf93631cf7d54b9a41b3b52d8d1599ea0fbd3f3b2b9shim-ia32-15-8.sl7_8.x86_64.rpm7e4b9f377e73df5edd541b2ce5855eac42369c8408bfd454eeabb9252fcf8aa4grub2-tools-extra-2.02-0.86.sl7_8.x86_64.rpmb15e14291090912c8b1e3b1ca4e3e49020d58caf1d91fe19311d1624c4f64174mokutil-15-8.sl7_8.x86_64.rpme242f2611a84fc7af2d5ad684179b38d633e9521aa4ee9538f7eab4f96624774shim-unsigned-x64-15-7.sl7_8.x86_64.rpm388c84a4a6aeeb792fe7f9720b28ef933186396d72e49f1893fc8839967e3810grub2-pc-2.02-0.86.sl7_8.x86_64.rpm4e11c0dafc44e87829f70827b400353dfd7d1473b517f838c5f545f628f55e24grub2-efi-ia32-modules-2.02-0.86.sl7_8.noarch.rpm383e09759462fdd31408346574526270c4a15c3201c47360a5b35016c073ad1egrub2-common-2.02-0.86.sl7_8.noarch.rpm8438ecb28b007ae06eee6231a766fc0a55d415f44dc14ff831d895e5a9c527cdgrub2-tools-minimal-2.02-0.86.sl7_8.x86_64.rpmff7406b6020f013eb36ccf7591fb46c36bbec1ed7b46c6507abef7752dc0615afwupdate-efi-12-6.el7.x86_64.rpm5e9513f385cd09ba69a243b3e00a1a46f1f1410ab0acbb803a3c7b616dd6611cgrub2-efi-ia32-2.02-0.86.sl7_8.x86_64.rpm9c786a669ef363b8b6862cfb5982d5d5d712e2235a536b1ff3fc30176b8444cafwupdate-libs-12-6.el7.x86_64.rpm31f60b8c9f5f402ee306fb5e1a9a4dca1bc700ebd972f7cc2d7b189554226fd4grub2-pc-modules-2.02-0.86.sl7_8.noarch.rpma906cfc95bb28c7a5506ed6509fe26f4c7b0ab9cd42f7c4aa7ff3bd112fd1ca0shim-unsigned-ia32-15-7.sl7_8.x86_64.rpmc3bb830b14b10e310d48796ae1b055c730b3143ffac5654e7b49491dd8849721grub2-tools-2.02-0.86.sl7_8.x86_64.rpm9837f02dc7cb340ab34f3155610f0a979c28c25c540c88798c0206c08484e0e1fwupdate-12-6.el7.x86_64.rpm25da2674b397b0a9a39a7d6add874969a8546564f3010532a4e4d9b92963d9fegrub2-efi-ia32-cdboot-2.02-0.86.sl7_8.x86_64.rpmed63193ca324bbae6daf61b5fc08dcbe9c2fd37e43a1481943e96fe8761ced76shim-x64-15-7.sl7_8.x86_64.rpm46faa14554f3fa8ea68524bd67bb9bdcef66aca62ef694e8b4b67bdf0b5fa802shim-x64-15-8.sl7_8.x86_64.rpm68555de75739afa5dac0bfd9ce0abf46b78421d3ac3d483d41e4058d7074fa7agrub2-efi-x64-modules-2.02-0.86.sl7_8.noarch.rpm2806b7d73ed638e7423ed0f09473c2006b2455adfa821e090f6b950f40187585SLSA-2020:3220-1KernelSecurity Fix(es): * kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757) * kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653) * kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654) * kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)importantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-1127.18.2.el7.noarch.rpm88ef67016077eb8a8b942ac97e7f3d8799f1d14279b397761c734d681f1e37b2kernel-headers-3.10.0-1127.18.2.el7.x86_64.rpmf9bacb2300c029b3be53b09443c447567c61af3d4af2848acdfa0020099dcbebkernel-tools-3.10.0-1127.18.2.el7.x86_64.rpm6bd8eb64278ebdfdbfeff3f9791f404a96bef42fd8c3dfea102d6d675e8b0356kernel-doc-3.10.0-1127.18.2.el7.noarch.rpm914614c1e3e9ea42a3f2d570739f691437f51b5e783a87d6503f6838d2a55304perf-3.10.0-1127.18.2.el7.x86_64.rpm653935c5e314256387530bd667c6c06cf0b52ffcf3c94d664e41767a545f149bkernel-devel-3.10.0-1127.18.2.el7.x86_64.rpmf748cf0459c04f6ce6740d925a703bcf5b780d9bca65877b4a44d42912dd6a61kernel-debug-3.10.0-1127.18.2.el7.x86_64.rpm30ec54dd441a6ea14c14682f8f718e25ce2787f3b709ead1afe0f54681a0eef6kernel-3.10.0-1127.18.2.el7.x86_64.rpm3021ec30d21977edbc80fc09fa562f665075717c6d0636e1387856f1fed1399ckernel-tools-libs-3.10.0-1127.18.2.el7.x86_64.rpmd341efa571760005bd5d2d41362e502d942cd74d6aabf02665c94df99993f5e2kernel-tools-libs-devel-3.10.0-1127.18.2.el7.x86_64.rpm587ea412e4e4ba2cd041c9ffe2f5e899f162b1cda9851db5480c856c549357d5bpftool-3.10.0-1127.18.2.el7.x86_64.rpm144df27c7cbbbc8e3f48da52b9f104dee49b8664366ad54b28848fba84df7dd6kernel-debug-devel-3.10.0-1127.18.2.el7.x86_64.rpm57c45c7cc9913221da733a6605580c03477fa2ad68ec63f8c35612c7679be57dpython-perf-3.10.0-1127.18.2.el7.x86_64.rpm80ce8ccc6a835980ec28b8571c8cd75bf3e3d63fe8e1162512cbda89e2eb1201SLSA-2020:3253-1FirefoxSecurity Fix(es): * chromium-browser: Use after free in ANGLE (CVE-2020-6463) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) * Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)importantScientific LinuxScientific Linux 7firefox-68.11.0-1.el7_8.x86_64.rpm891f97022fc7edcd6ade88f35d3a30ef46863d355a5249dba2b02b5f0d3b8043firefox-68.11.0-1.el7_8.i686.rpm36cd5a2c005fbcb8a7a0a3ee3e8258a8886069f2da069254baf722d641b254b8SLSA-2020:3281-1LibvncserverSecurity Fix(es): * libvncserver: websocket decoding buffer overflow (CVE-2017-18922)importantScientific LinuxScientific Linux 7libvncserver-0.9.9-14.el7_8.1.i686.rpmccc988c09ea9883f4139451b785491799ac2b409bc5077ef5206e911a7c42cc1libvncserver-devel-0.9.9-14.el7_8.1.x86_64.rpm7615c1aa2b9cbe5173daf75127f9dc7ad88f9361597fa68a570188fe2237470flibvncserver-0.9.9-14.el7_8.1.x86_64.rpm9ffc66f52ef7c3e3b2f137e9d2a2f3b0a3116e2f21aa3b3ee039b6c2f4a617b4libvncserver-devel-0.9.9-14.el7_8.1.i686.rpm4f2981733cb6094d99e319be3895c311d4430ef0f9d78bf50c1758ed0964c237SLSA-2020:3285-1Postgresql-JdbcSecurity Fix(es): * postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML (CVE-2020-13692)importantScientific LinuxScientific Linux 7postgresql-jdbc-9.2.1002-8.el7_8.noarch.rpm3289199b7bfb79633a8fb67109b9a8458b7c3fba0948164b83d76976e0195228postgresql-jdbc-javadoc-9.2.1002-8.el7_8.noarch.rpm63b0078e5f040d3d4583dd5976c42a5ba0cfad49a314d60567ea1a85bb00588cSLSA-2020:3344-1ThunderbirdSecurity Fix(es): * chromium-browser: Use after free in ANGLE (CVE-2020-6463) * chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) * Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) * Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)importantScientific LinuxScientific Linux 7thunderbird-68.11.0-1.el7_8.x86_64.rpm39bd1f9624b8bb39d2a4ea429c6a261c079ee917961f09ff57cb1f32ff5d1ac2SLSA-2020:3556-1FirefoxSecurity Fix(es): * Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664)importantScientific LinuxScientific Linux 7firefox-68.12.0-1.el7_8.i686.rpmc4c7806f3c2ec925e5079abfffdde33edb14dff920a9bdbb53a8d9ad2f19f71ffirefox-68.12.0-1.el7_8.x86_64.rpma6a85479c9ffbed96a2292cd56983b7bf9f54a69947184ac2854396e66f38957SLSA-2020:3617-1DovecotSecurity Fix(es): * dovecot: Resource exhaustion via deeply nested MIME parts (CVE-2020-12100) * dovecot: Out of bound reads in dovecot NTLM implementation (CVE-2020-12673) * dovecot: Crash due to assert in RPA implementation (CVE-2020-12674)importantScientific LinuxScientific Linux 7dovecot-mysql-2.2.36-6.el7_8.1.x86_64.rpma507781d099d497f58bf28a0a357bd8cba7163e41b48f45fdf5693170b2f0fd4dovecot-devel-2.2.36-6.el7_8.1.i686.rpm01141fb6f2c7b54ce8ed764f3c7125dfbc24338f1129d23db898bd484cb09958dovecot-devel-2.2.36-6.el7_8.1.x86_64.rpm814f2c5519e688465446faa3b3d2d24438bb325d672bca752edf466366bab08adovecot-2.2.36-6.el7_8.1.x86_64.rpmc71bbc74d5af3dbf7070a4f48976ad5431c8ac657e775beabb3c056758e7848fdovecot-pgsql-2.2.36-6.el7_8.1.x86_64.rpm1ef83742a0476b97e60facf48a5a992985b3cd60e968c43f1f14c497c5c98df0dovecot-2.2.36-6.el7_8.1.i686.rpm7731998263496ea7694a4be9c4f0d731f462be7ced5420b5741fa2613cf5126cdovecot-pigeonhole-2.2.36-6.el7_8.1.x86_64.rpm2363f0e5efc1185c5e6ba573a7a92df42ceaa1e98583bc2e7f600442e0b8af5dSLSA-2020:3631-1ThunderbirdSecurity Fix(es): * Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664) * Mozilla: Use-After-Free when aborting an operation (CVE-2020-15669)importantScientific LinuxScientific Linux 7thunderbird-68.12.0-1.el7_8.x86_64.rpmdff64d6f24363451749037dbcf0758e2f7df584b87719e9f0b78c987476a9979SLSA-2020:3848-1LibmspackSecurity Fix(es): * libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)lowScientific LinuxScientific Linux 7libmspack-0.5-0.8.alpha.el7.x86_64.rpm41311f31457f4f756f9e1942224751cff503b72d974ae4f22f07826c2aa128bflibmspack-devel-0.5-0.8.alpha.el7.i686.rpm33ad46ba4af18f39fd96519dccec0d132e06e32c0fff3ae0f184a699fb2ef1d2libmspack-0.5-0.8.alpha.el7.i686.rpm71aa1de05bbbd120f8a80c43e91bf43cb02888f16786e63e755847a8e2b9d535libmspack-devel-0.5-0.8.alpha.el7.x86_64.rpma7c8d1b66389e0e5b8d28c80232607abbd6c5b2d858566697ba0f15c6e15fa7aSLSA-2020:3861-1GlibcSecurity Fix(es): * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE-2019-19126)lowScientific LinuxtrueScientific Linux 7glibc-common-2.17-317.el7.x86_64.rpm3e35753d321f94879f260cecfab0f0af189cfbde3be8a81b74a6534e5b61c0b4glibc-devel-2.17-317.el7.i686.rpmb54addb92e1fd63a02c50f03488e00892a51602fc1208e3d9219ee3b0425097aglibc-utils-2.17-317.el7.x86_64.rpm4bee882d975d57ec82e900cd282b206c125da3d188900829f5b4b7b26a7f3c6cglibc-headers-2.17-317.el7.x86_64.rpm08b6e6a7a630564ff22d00916d88c866a84cecedd53d96f14fb3213033634c45glibc-devel-2.17-317.el7.x86_64.rpm5deae7193de12549166f1cd5b82dcb13ad609a517597b5460c029b2c22bb3c72nscd-2.17-317.el7.x86_64.rpm60fed772cfa9694f3f618c1bfedf86fff5300877ff3f31a57e6a65598be2d86fglibc-static-2.17-317.el7.i686.rpm298dc4ef9855e9fa6360093578e621ec4cf5f44f9f8a1b1f0adb5f13d9e5ee83glibc-2.17-317.el7.i686.rpm3d66fa6a4fdf2d1c3d2f6853c35958e700556f22826998c21839ef65b535c228glibc-static-2.17-317.el7.x86_64.rpm6a2e3e27b3b370ff2c77d99f82524a5b5a736b3162dfd214e9e846560fd6b95eglibc-2.17-317.el7.x86_64.rpm4c7ef22bb13adea1db797d46db4d7e38144839a990b00791c5b146ee5f1959e0SLSA-2020:3864-1CupsSecurity Fix(es): * cups: DNS rebinding attacks via incorrect whitelist (CVE-2017-18190) * cups: stack-buffer-overflow in libcups's asn1_get_type function (CVE-2019-8675) * cups: stack-buffer-overflow in libcups's asn1_get_packed function (CVE-2019-8696)moderateScientific LinuxScientific Linux 7cups-ipptool-1.6.3-51.el7.x86_64.rpmabbf65d0730c8623d87d754b024e0e71a6c6469b922d4cbf6aee7748986a4f7bcups-libs-1.6.3-51.el7.i686.rpmf34fd5420818e5d64bdf14e69b516fc8e7419d8e587a5cc2002ac4eac0fec31dcups-client-1.6.3-51.el7.x86_64.rpmfb79471cac1098e9e9ce97fbab3436252d162e208ed31055af01fc1ec9940a48cups-devel-1.6.3-51.el7.i686.rpm48ff95dd5b1ea2d6772013197c49e35e13a13e47cdb8cd694f26ac6419b86f51cups-libs-1.6.3-51.el7.x86_64.rpm6a4150f8ba8a33881386c4f43fe3ca5d5337d6b4faa98af7c66b4323b49602f5cups-1.6.3-51.el7.x86_64.rpme497103a7aa7818ece2a98adcd40446797765527f149a3ca68cb89e52f80303fcups-lpd-1.6.3-51.el7.x86_64.rpm3b060a15d6c5d947cc771b8e7e276d15d428243facdd7d802a522fe805f3f5aacups-filesystem-1.6.3-51.el7.noarch.rpmf8efae5dcf706474ab5dc48bfde94d65d3b60290f9d2c1dd064905d205f7b99dcups-devel-1.6.3-51.el7.x86_64.rpmc6495b6587fa162de9f7af52b39218ec00db42d1c00b9381cfe144b4df09a566SLSA-2020:3868-1SdlSecurity Fix(es): * SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c (CVE-2019-7572) * SDL: heap-based buffer overflow in function MS_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7575) * SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (CVE-2019-7636) * SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (CVE-2019-7637) * SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c (CVE-2019-7638) * SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7573) * SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7574) * SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7576) * SDL: buffer over-read in function SDL_LoadWAV_RW in audio/SDL_wave.c (CVE-2019-7577) * SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (CVE-2019-7578) * SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (CVE-2019-7635)moderateScientific LinuxScientific Linux 7SDL-static-1.2.15-17.el7.i686.rpm9f01a6029c0164c93afd860499f7360fa6d73c01e43f68d77bdc39914ea36364SDL-static-1.2.15-17.el7.x86_64.rpm184508f6f204d853a4ce76b79a0128684e4daf7db07b8aed42483bda21d95172SDL-devel-1.2.15-17.el7.x86_64.rpm26d9cba78f9af85dd75925d8969cacdd3cd0040c1a33c50cd4538e7f2210dcd8SDL-1.2.15-17.el7.i686.rpm90afcf2b1ae15e0b807d48864fd939a88b5e584d9e4c4365794a7a739c569d02SDL-devel-1.2.15-17.el7.i686.rpm9c3dfe7904800b07de5904704f3b43a23e2a692f3f455018e0f5095e47ac0ed1SDL-1.2.15-17.el7.x86_64.rpm740d2d2435ed2310b1ecd7dd28552f2d8e6acea070ed35d416d9c0e05b219085SLSA-2020:3869-1PcpSecurity Fix(es): * pcp: Local privilege escalation in pcp spec file %post section (CVE-2019-3695) * pcp: Local privilege escalation in pcp spec file through migrate_tempdirs (CVE-2019-3696)lowScientific LinuxScientific Linux 7pcp-pmda-weblog-4.3.2-12.el7.x86_64.rpma454a7212895649230aa8b8773377e2b7abb57748e17dad7c6a82ff91b678e9epcp-pmda-json-4.3.2-12.el7.x86_64.rpm0232ddeefa4840d074f9e382a5730369a5b15828c07fadd4c0cd6bc1409ecdd0pcp-pmda-lmsensors-4.3.2-12.el7.x86_64.rpm36f129bac1ef3cd113865d963391f70527cd18a9356629a03cc0fc0af2714b17pcp-pmda-perfevent-4.3.2-12.el7.x86_64.rpmbc5b0bc62804ee029cd8a9ae5c6f87d831d92de5b4826728fc3b07d6cc0e629cpcp-import-sar2pcp-4.3.2-12.el7.x86_64.rpm6c0cc250506da7c4c449b0a09b6e1dd6336b0b69222fecac821b7f6ae0ac896fpcp-pmda-mounts-4.3.2-12.el7.x86_64.rpm28f2023572aee618b698185d867d23a2911e6feb479d5eea01c654279162a527pcp-pmda-lio-4.3.2-12.el7.x86_64.rpm704fb5287922c28a1f768b7ab9005e3cfef030b9a07fd075e56286fdb3c60933perl-PCP-PMDA-4.3.2-12.el7.x86_64.rpm548bf0cce3d40be957caa901a926f47a3bcf4c391ef349dd6abe26a84bac6eb1pcp-export-pcp2spark-4.3.2-12.el7.x86_64.rpm43aeeff52449f37de6a073bc442992d0f25c7515a422451e77a9f61e38ce1381pcp-pmda-prometheus-4.3.2-12.el7.x86_64.rpm1ab5a52191aa2b9032268963b20b966c58219f4c6bcd3a84017fbeb71ddea360pcp-import-collectl2pcp-4.3.2-12.el7.x86_64.rpm7d602a9cf5b23d89c4a2f5a0215355d02fff23b835c1c3bb62be139538be1c9fpcp-webapp-vector-4.3.2-12.el7.noarch.rpmd965889635760a409ba1db0e6be686732d03ba698e7bd520be67e8eed309507fpcp-pmda-elasticsearch-4.3.2-12.el7.x86_64.rpmfc127b59a84407583f19aa226119fd6b7ec97312321759794c869b12890b79cdpcp-devel-4.3.2-12.el7.i686.rpm3a043966b438e7b70b0e746e0eb3a03d5df4ad1ece6323104d995d93a527a5fdpcp-export-pcp2xml-4.3.2-12.el7.x86_64.rpm40104f37b00da1b4331d82c02740d2248eec07c53a1cdaa551e6278bb5a4d438pcp-pmda-bonding-4.3.2-12.el7.x86_64.rpm8e311bd3c9a0148dc4605d32cea4328bf95432946f30391189a36c5204bb062fpcp-pmda-bcc-4.3.2-12.el7.x86_64.rpm2872768ff4db2f0331d17ee74575c96d415af909088a89ff6890c3cbe7d5453bpcp-manager-4.3.2-12.el7.x86_64.rpm48f8f9458265db55901547921ee51377e23ebbb7b4d4b19cf2d5125805dc58dapcp-pmda-dm-4.3.2-12.el7.x86_64.rpm5ac27c3daaff3ccdd950bf47bc8ded829741512b716e07bd27fff2d01ba862c4pcp-pmda-bash-4.3.2-12.el7.x86_64.rpm86246b5c92705b14a4e26d93ad8ceba3de4b714685fa028ad4a1115f0e62d9depcp-pmda-mailq-4.3.2-12.el7.x86_64.rpm69e458711e14465b398401de4bc76dbe05d336c9a897edaf275aadd7b98f1524pcp-pmda-postfix-4.3.2-12.el7.x86_64.rpmaff4025f51ee417d55e1a60bee57a8f5bf06af5fd0cf129cb5ff2de80a3b60cdpcp-pmda-zimbra-4.3.2-12.el7.x86_64.rpm7c8cc7bd10672add7a8e8aa690da7f28bac36660fb0a2c6296bffa003702bf6epcp-pmda-rsyslog-4.3.2-12.el7.x86_64.rpmb52b4b34f44eebca2f9bb3eaeab201fde66b58c4d9c8f7988ac6003eae3c3d9dpcp-pmda-memcache-4.3.2-12.el7.x86_64.rpm4595abce8417afca060ec4cdf04b48a123d1fc8986d9e1b34626e0b362fbc5b7pcp-4.3.2-12.el7.x86_64.rpma03dd25155cdafd9f19bdeae3a79f381e5a6d82d22a0feab3288ab2000aaae26pcp-pmda-nvidia-gpu-4.3.2-12.el7.x86_64.rpm34b48a857bd683b6b17ef8485c074c4cb666305807584ff03c6210e4660060fepcp-pmda-gpfs-4.3.2-12.el7.x86_64.rpmfa2f8d94f8ba6c65436eddda0a96cc35482eb9732202f77158536a668726344apcp-pmda-trace-4.3.2-12.el7.x86_64.rpm8395984bd7a7db5d6519d1d27d8a39899c3a8261e711e856a1613200dfc763d1pcp-export-pcp2elasticsearch-4.3.2-12.el7.x86_64.rpm51509bf3f0dd3a720067d0bf2fe870d4a195979e0bbe284762ce7f0baa376ee6pcp-pmda-lustrecomm-4.3.2-12.el7.x86_64.rpm7fece26ad4fcb4589facea7c55c61305423912557b940f01e59a7f539a9da2e1pcp-import-ganglia2pcp-4.3.2-12.el7.x86_64.rpmc911207fc5c11570cdb420b9093f109a9e8cf434f6b390a542d3882e76f580c8perl-PCP-LogSummary-4.3.2-12.el7.x86_64.rpma71ba75848f5455be52c265cc897c20c2406363b7d2b49663105ef124227c3efpcp-pmda-apache-4.3.2-12.el7.x86_64.rpme6b1aa988dd567e7198948d406e7b39fe274980c0a275c2da12b4ac952a9586cpcp-pmda-nfsclient-4.3.2-12.el7.x86_64.rpm5f81174aff5ff1d1450862cc1035c58164b44f9ece54fa0bb695c8e99d4b6053pcp-import-mrtg2pcp-4.3.2-12.el7.x86_64.rpmc77ade8f3323d958d756bcc7af4f7b4ab957bd82168a3fa8fe430fe4aa40ecacpcp-pmda-sendmail-4.3.2-12.el7.x86_64.rpm4911131c35164a782591490055311ed91b70f269fa933493ce25463ff7d652f0pcp-gui-4.3.2-12.el7.x86_64.rpm57c6e135711aa806c4549f61aec101cffc3780aed81e50a88c59131cab6014f7pcp-pmda-nginx-4.3.2-12.el7.x86_64.rpm3b402e84b2237bea32bc9156516b033d91bc3614b374b47f2a1c6f91f46ab46dpcp-export-zabbix-agent-4.3.2-12.el7.x86_64.rpmeaa0a4f04f576390a7dcfb5b7078ee205f3962991d2f0de623a0cdd032068ca9pcp-devel-4.3.2-12.el7.x86_64.rpm8274ec24323e0fd7a1ca0738b43245b1f6a896f499aefe6fe860ee0517bb4f45pcp-pmda-cisco-4.3.2-12.el7.x86_64.rpm5c98e31fd5f60de072922fa0a8d72f62a59fcd400d8f237f4e6eab1401f1ba71pcp-webapi-4.3.2-12.el7.x86_64.rpmd200dad51c7435df07a58883c0ebf0dab0e64fd9ac7255533c3fd2db9742a6cdpcp-webapp-blinkenlights-4.3.2-12.el7.noarch.rpm8324ac0d2aa9881d0664a933f14da0c691ed485501c3657f2c083e98853b5378pcp-pmda-gpsd-4.3.2-12.el7.x86_64.rpm0a4a628f55f730cc52c56210b31184a93dd1350d034ac54df9b705e6f0059fcdpcp-pmda-oracle-4.3.2-12.el7.x86_64.rpmeda0c7d47626662b85706829ddfcb029d5f8fc59ea2f8684319e65e05c175cc9pcp-export-pcp2json-4.3.2-12.el7.x86_64.rpm48b08bcae33f208ac72b3a27e94c02e231019fd49a4e7cd5c0b4b9df7ddf9aacpcp-pmda-smart-4.3.2-12.el7.x86_64.rpm2129308a91344e882d2d295f941b7ae93ccc8d844d94d03766bf7dca7de5cb0epcp-zeroconf-4.3.2-12.el7.x86_64.rpm2e7743a4e438f8fbd0f35e6c24f7f4499575d40253eb99f74d3c298b7de84388pcp-doc-4.3.2-12.el7.noarch.rpmec41ebaf7da387a1f16f39d6d1fe44289b03ffc7c952fc1e69a9308c5036b2b3python-pcp-4.3.2-12.el7.x86_64.rpmce52a3660802a820ff127957de7f4b874249e660834088ed1b9c0bc428398f26pcp-system-tools-4.3.2-12.el7.x86_64.rpm333a40445aca73268667005f996a88fd3ed33f381fb4dac5769ea78ef8d9c644pcp-testsuite-4.3.2-12.el7.x86_64.rpm0d95aa8daef0c28b864be440a2d59665e54d3e6f6e44282003d144662e0027ebpcp-export-pcp2influxdb-4.3.2-12.el7.x86_64.rpm8b07d0f0b1eceae8f0ef58380bb391b78927e1ca09c4976b5b909a98ea17be95pcp-pmda-redis-4.3.2-12.el7.x86_64.rpmbb12895076899f8bb934ab0095597fc4b1d9b33b784fac7f1c008fffa29c5b04pcp-pmda-cifs-4.3.2-12.el7.x86_64.rpmf301c8b3ad6dd7c7c1b9921e2f914a3dce2656c3ea016fa3278f9226f5cd456bpcp-pmda-systemd-4.3.2-12.el7.x86_64.rpm3f9a59a2ee1a7ab01c24f7c7c2f62bf9fd6242cf963e37a207b92048624aaeefpcp-conf-4.3.2-12.el7.x86_64.rpm9b6b4e8634b3bfa809bfcebfd3915134b245fb38745e949d61da59490ca2f1a6pcp-export-pcp2graphite-4.3.2-12.el7.x86_64.rpmfbfdef935f7bf379c0736d57f1ffdb001b2f2114a515b0f1553ca911241152d6pcp-pmda-ds389-4.3.2-12.el7.x86_64.rpm87899613e58e5b3d0c15911786a8c606d060c62f3be8b4ba51ac40fffeb1bcf4pcp-pmda-snmp-4.3.2-12.el7.x86_64.rpm13d4002cca44d54a0c966a8732cd0a012a43ef3b5944375c22948d06fabc2fb4pcp-pmda-gfs2-4.3.2-12.el7.x86_64.rpm188c4bd83f512aa350f5a0cde4e885c08d6b5fa3a6078f8089ae60881c44239cpcp-pmda-infiniband-4.3.2-12.el7.x86_64.rpmf29e04e7a1a4ee8dbad285d177c418f42dccec6de8fb9d6c8f5f6180b5f8cdbbpcp-libs-devel-4.3.2-12.el7.i686.rpm3731054a7e66517359dab6b2f4c2701b392ef92c285d10db904925abe5573a9dpcp-webjs-4.3.2-12.el7.noarch.rpm34caa133a0b87790de287a87108a295dfee713eab06635eca09012f8a22851acperl-PCP-MMV-4.3.2-12.el7.x86_64.rpm2d3af366b35b32fb7a9e0e2086721697df720fc3366c1a35e15070a18d380305pcp-libs-devel-4.3.2-12.el7.x86_64.rpmd8537665520b7dc85c3feabbe4ec8e73ff1dc52cd197940837fd768be7f30870pcp-pmda-lustre-4.3.2-12.el7.x86_64.rpmc75fa8443f366dc882869bfd5fd0ce3b18f84be9bb293120cdfa5e3ffacb96ebpcp-webapp-grafana-4.3.2-12.el7.noarch.rpm67a08ef8d3c2155f46e24bab1cd4919ecc193e1affa3bcf9154d05691c09e80apcp-pmda-postgresql-4.3.2-12.el7.x86_64.rpm3ea66e8554babdc95cb9b215bcffa31a4818b92413706713875c290d4ba6c1d5pcp-pmda-news-4.3.2-12.el7.x86_64.rpm8ff2db2354e68d26f3ce528494b905646e8fa01a55b4e409a1f7a7fd1ac42f0dpcp-pmda-named-4.3.2-12.el7.x86_64.rpmebceb40ee5c385c714234d74bd43d038c1ce73a239452a3fffc57720e27207adpcp-pmda-haproxy-4.3.2-12.el7.x86_64.rpm8bbb991de40f0c9585d36a388046369c3aea250d4192f854950549138725fc5bpcp-selinux-4.3.2-12.el7.x86_64.rpmf8c39a44203878dfb7a92115778cfd906c12e3bb008679557ab8b5b7a9ce7126perl-PCP-LogImport-4.3.2-12.el7.x86_64.rpmf82a3cb82dfd0960cf3475808fa23a9ac70c3e2f080ce951673bb8c61f17e6cbpcp-pmda-summary-4.3.2-12.el7.x86_64.rpm1924bb5fa8c4d179f85a0d54b734e36c30f0d14b2dcc98aa2eb25e887804ed59pcp-pmda-pdns-4.3.2-12.el7.x86_64.rpmf0816da6003870e6b52cf2b2613e5634ab83968b15ed33b8548ab4c4a7455894pcp-pmda-gluster-4.3.2-12.el7.x86_64.rpmdb042a9cefac99b68b2036612b7ce4641e9333a03ce969aa89ee9293c7b4e38epcp-import-iostat2pcp-4.3.2-12.el7.x86_64.rpm6899765db035630361e39765ba1eee15382f9143485affc6ca62fe228abcab77pcp-pmda-samba-4.3.2-12.el7.x86_64.rpmd7c4757f33855758ec9e7630a08dd3a62892e0ca48a540eefdd231aecf93df9cpcp-pmda-rpm-4.3.2-12.el7.x86_64.rpm42b8963defba99d9bd04019be374fab137cffdcc344a2982962d9bea760e4bf5pcp-pmda-logger-4.3.2-12.el7.x86_64.rpm4a334eaca4cd7400cb9a89f644ee83f63db52c3e5fb9b3c7f3a6a5a085adcc06pcp-pmda-ds389log-4.3.2-12.el7.x86_64.rpmbc3def914cbe36b1232a0dff5dc68f188a743fb2584fa19fcdc414f6f789a7f7pcp-libs-4.3.2-12.el7.i686.rpm586d81a8f97a4911899beb30e1128a1dde2533aa7682197fcb2b6d03aeb846ffpcp-pmda-libvirt-4.3.2-12.el7.x86_64.rpmf0534334af6c18411356d89d8ad2e598cb1a4dbd284e16addbd08c1476a83427pcp-webapp-graphite-4.3.2-12.el7.noarch.rpm5850fbac343b48075fc7a74bdb9972ac452db3414091e2a66b2e81394a2048b9pcp-pmda-activemq-4.3.2-12.el7.x86_64.rpm40f93060970aa2902d25f6757937c9852fa37f2864f576a8c4404e2810152767pcp-pmda-dbping-4.3.2-12.el7.x86_64.rpm7398ff1b648557ea6e52e9487a835598e9f0c209c67079d652e4776f8265432fpcp-pmda-shping-4.3.2-12.el7.x86_64.rpm74c4df59928de268d66830f43cac4c561f10c3961b19c31629ad933a6b2f49c2pcp-libs-4.3.2-12.el7.x86_64.rpmab6a8dd6ebec57c9b0f1999b95e2f4107f587187f619f9c171cb7fa2a78f9f83pcp-pmda-mic-4.3.2-12.el7.x86_64.rpm4b06c4d24ecdd93b586a641eacf6abc6f5c1a696eefbd66244980c96ba66c877pcp-pmda-mysql-4.3.2-12.el7.x86_64.rpm367a59953bb3c028132ee0a7fb379046bd234773fb86d0a362a72bf0e396a1edpcp-export-pcp2zabbix-4.3.2-12.el7.x86_64.rpm018d2534564a9c60dc3b1226d96b5a55906145bc9ede8d682f8746c20b4f4658pcp-pmda-slurm-4.3.2-12.el7.x86_64.rpmc01a166080a10d2b46385ad284e08ef0d0b74614b76e0a94fa23f5529bb334eapcp-pmda-netfilter-4.3.2-12.el7.x86_64.rpm46894601507a441e377b4e388970ef04ffc583c2d0d3a0d69d9c2934ea78d193pcp-pmda-bind2-4.3.2-12.el7.x86_64.rpm6a32163e4540f98fa1dc33366cda02fe440f309137a3ccd32f896f599499f800pcp-pmda-zswap-4.3.2-12.el7.x86_64.rpma7cb05a1dd91152f78d2caf31a139168811953a84d5bb55be76afee453ce71f8pcp-pmda-docker-4.3.2-12.el7.x86_64.rpm6f61e4f0094fbe1bce20c623c6918ef026b12a87a794e71d1f8727cc71f6def1pcp-pmda-roomtemp-4.3.2-12.el7.x86_64.rpm8634b803899810ff128a29ea217b3423a219782027abbdc2e7b0da767ceb1db3pcp-pmda-unbound-4.3.2-12.el7.x86_64.rpme515a9a8dec6cc0acb270e426cf887f088bad821a5ac20ce4c250c60f090640bpcp-pmda-vmware-4.3.2-12.el7.x86_64.rpm0fafca5834e49f8181ac688bdfa01e4ede409522a5ad37765907d688537b421eSLSA-2020:3873-1LibsrtpSecurity Fix(es): * libsrtp: improper handling of CSRC count and extension header length in RTP header (CVE-2015-6360) * libsrtp: buffer overflow in application of crypto profiles (CVE-2013-2139)moderateScientific LinuxScientific Linux 7libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm3d46addf1591cdc73cbb9035da2ea20700eea4bc42ee514c085f204a7fd7afdclibsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm9e481eb4354af9064dc727515da91a84ad0ae703d261dcee68eb6f50891a4fb4libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm3bcb18505b8aef66783481971e0c7ab5a46d592919b9f799c802b021e2b766c8libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpma97d9980586cd80b86756c8c3641a1d4d9145c0ac259182348922b42701e36b4SLSA-2020:3875-1TigervncSecurity Fix(es): * tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder (CVE-2019-15691) * tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks (CVE-2019-15692) * tigervnc: Heap buffer overflow in TightDecoder::FilterGradient (CVE-2019-15693) * tigervnc: Heap buffer overflow in DecodeManager::decodeRect (CVE-2019-15694) * tigervnc: Stack buffer overflow in CMsgReader::readSetCursor (CVE-2019-15695)moderateScientific LinuxScientific Linux 7tigervnc-license-1.8.0-21.el7.noarch.rpm60dc13b47f3eaa35a40b7370da949560f4b0a214384164572a0282dd03dc7528tigervnc-server-1.8.0-21.el7.x86_64.rpmda195def7f91aa6e312f33beab418d56b160a60db1cfec308d4480ed95b26c1dtigervnc-1.8.0-21.el7.x86_64.rpm6dfe2cc20b9f7947721e62e440e119302369357d21ff4f95c975ac4e8442b54etigervnc-icons-1.8.0-21.el7.noarch.rpm50b608c98ce41c7b39f524660f5c7cf6aeda392512ae5832c2103a6785367c48tigervnc-server-minimal-1.8.0-21.el7.x86_64.rpmeafd08607c4951ff4a167761a3047dd24a0c1a50a65f34e5295512cb11cbceddtigervnc-server-module-1.8.0-21.el7.x86_64.rpm225539e1f71b76534a9136b9068c0187b57b955cac092df86701be4444be287etigervnc-server-applet-1.8.0-21.el7.noarch.rpmfbb91ee4575bd7b803058c51126747a87126ebc5dda45146450c4058dde3539fSLSA-2020:3876-1LibvpxSecurity Fix(es): * libvpx: Denial of service in mediaserver (CVE-2017-0393) * libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) * libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) * libvpx: Out of bounds read in vp8_decode_frame in decodeframe.c (CVE-2020-0034)moderateScientific LinuxScientific Linux 7libvpx-1.3.0-8.el7.x86_64.rpm52f05b8fee498a4be7e99ff0408af2f735789bb5fbcd167bf6ac3fe94e7ee739libvpx-devel-1.3.0-8.el7.x86_64.rpm0ec7b3d61c7211ba012bd89199a4c4ab1639a742fa3d6be7c4f2f0147e119785libvpx-utils-1.3.0-8.el7.x86_64.rpmba63453c446906577c14da5df5fcb30b34dae6d55bcdbc3858687d18fc28cd00libvpx-1.3.0-8.el7.i686.rpmc99a2275a9b83069f71bc275c281ca99fcc7c831676e1b473633d5a3cf7ef1d8libvpx-devel-1.3.0-8.el7.i686.rpm4965e6e8d821d8af743041d219a8560a247ae4815a30e3a77f461599432e970fSLSA-2020:3877-1AudiofileSecurity Fix(es): * audiofile: Heap-based buffer overflow in Expand3To4Module::run() when running sfconvert (CVE-2018-17095) * audiofile: NULL pointer dereference in ModuleState::setup() in modules/ModuleState.cpp allows for denial of service via crafted file (CVE-2018-13440)moderateScientific LinuxScientific Linux 7audiofile-0.3.6-9.el7.i686.rpm9a26fcbae2192fcdecba94b61cf7e69c38b5d1f215a3903e1efd155ced1ad6a1audiofile-0.3.6-9.el7.x86_64.rpm5068bee84e675ca2f2d01d126bd58bb37ab11c0bc48d3d108ff1c2f35cba1e88audiofile-devel-0.3.6-9.el7.x86_64.rpm56216a297f60c0ee46730c797b75c76b1fe563a3307942a11e3f549a7036b5a0audiofile-devel-0.3.6-9.el7.i686.rpm2282107381450a6ba84215a95078f451c1460c294fa8d3c48833f3d7b77690f8SLSA-2020:3878-1DnsmasqSecurity Fix(es): * dnsmasq: memory leak in the create_helper() function in /src/helper.c (CVE-2019-14834)lowScientific LinuxScientific Linux 7dnsmasq-2.76-16.el7.x86_64.rpmdaa4d767de0095812b2aa6f65e301a0e8e303c46cdaafece3c3f7f4a4827fd04dnsmasq-utils-2.76-16.el7.x86_64.rpmd9c5c1ec38c5880a759e8f8fd74c86a2a8e82bbb74b93188e00b40a042e6b8fcSLSA-2020:3887-1Python-PillowSecurity Fix(es): * python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)moderateScientific LinuxScientific Linux 7python-pillow-doc-2.0.0-21.gitd1c6db8.el7.x86_64.rpmb010e860a28fb10f1dc289199f9d53d8e7cb7695fc07bdca7c1e68ecf62fe2d8python-pillow-2.0.0-21.gitd1c6db8.el7.i686.rpm8291569a120b0df9e5e6288837682ca4b4c339c45998f2aae2b4dc21d2ee3308python-pillow-tk-2.0.0-21.gitd1c6db8.el7.x86_64.rpm0858f2e391eb6529e671cadf474bca62bdef7b26d057d0997a29fce49aa00accpython-pillow-devel-2.0.0-21.gitd1c6db8.el7.i686.rpm40398008e1a1fe5a8739bb01444ab77dd8acfb6ef4e95c2e24442114e901f637python-pillow-2.0.0-21.gitd1c6db8.el7.x86_64.rpmdd67334460ba6f58f5bacc7454a593cf2ca27c5be1ddfc7aaedb307b5f4196e6python-pillow-sane-2.0.0-21.gitd1c6db8.el7.x86_64.rpm1171170eb9c007f0ad256743979db0021b3407c0b6d88adf6367577d3591eadbpython-pillow-devel-2.0.0-21.gitd1c6db8.el7.x86_64.rpmd1cc10c620f775819173ca6106443acba2e7f18fa9b3339d61a15fd74a4f1f2bpython-pillow-qt-2.0.0-21.gitd1c6db8.el7.x86_64.rpm8930062c157d5419b324f5de78c527fd1e0d0e0d1ec54c9e6c8ba31f888f66ddSLSA-2020:3888-1Python3Security Fix(es): * python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935) * python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)moderateScientific LinuxScientific Linux 7python3-libs-3.6.8-17.el7.x86_64.rpm3786657d74649a5ef22c5f2f998273c99694812081dc386c17b318b5ba37ba29python3-3.6.8-17.el7.x86_64.rpm5777b19c4aab76059c9b38e47e3f7f6470e10c864e49ffaa2e771281fbe3fc3epython3-idle-3.6.8-17.el7.x86_64.rpm0529688f400285d529efdce8e4ec0ecb67be47e53a7742a49025f080ce9ab6e2python3-tkinter-3.6.8-17.el7.x86_64.rpme19e0c8ded7b6d161afa546da31ac053da70c2907a23e1b010464f4c2045d29bpython3-3.6.8-17.el7.i686.rpm305afdf13a5f552ffa00dd59f154b6ea0546c90e2962410db11d67b28c602f07python3-devel-3.6.8-17.el7.i686.rpma584ccf6e24363faa109f7c98777f86b3814289758653f29f5cb3b9dab8dbb04python3-tkinter-3.6.8-17.el7.i686.rpm11a2d12d28012d1a2c308db52468b86fd56922376a9c87d2779594ea350ec1a7python3-devel-3.6.8-17.el7.x86_64.rpmecb31d93f55639cd16cec810b53bd5a250f91b6bb60842aa0b158cf63d6c67f7python3-debug-3.6.8-17.el7.i686.rpmb549d3f8ef59e18d3e6bbec90dfd5180d86440ecb66885266b722d1b28337cffpython3-test-3.6.8-17.el7.x86_64.rpmdb1880e68d8478b3fd6f648fc76c7b6a7b1e724264da71f3993cd44cfbd09b34python3-test-3.6.8-17.el7.i686.rpm71c341657b208a997fa0a9daddcf06784b2fbf0d1ed972a21965902a791150fepython3-debug-3.6.8-17.el7.x86_64.rpm1e909825758411d5f787c612c08ae2dab9beb4fa7eeacdf2bc7c94c0930b5bc5python3-idle-3.6.8-17.el7.i686.rpm82cd4860dfa00c2cce22b6b685a98f4cf465fd7053161eb0338e2cf8c48d0918python3-libs-3.6.8-17.el7.i686.rpm00b41c5dca14a515d1d4004df978c9e8c86463ce7453e04fd7aad0de3346dac8SLSA-2020:3898-1Cloud-InitSecurity Fix(es): * cloud-init: Use of random.choice when generating random password (CVE-2020-8631) * cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py (CVE-2020-8632) * cloud-init: default configuration disabled deletion of SSH host keys (CVE-2018-10896)moderateScientific LinuxScientific Linux 7cloud-init-19.4-7.el7.x86_64.rpm55591cfe2ed22e312cd0b8366a69f59cb8b93c12c430cb5e47186b85f942000aSLSA-2020:3901-1LibpngSecurity Fix(es): * libpng: does not check length of chunks against user limit (CVE-2017-12652)lowScientific LinuxScientific Linux 7libpng-devel-1.5.13-8.el7.x86_64.rpm9675e15c9e84a9cef3d71cf0822605a6aea0120b63bb9c6b0e501b5e9ec4fd21libpng-static-1.5.13-8.el7.x86_64.rpm644daab0c8f61d93af68ea63a1329d3e8c85c7c84488316748cd97cf54ec2f3clibpng-1.5.13-8.el7.x86_64.rpm0e4f8cdfd63647f81a806f76b25e797c7a8bd64df53ea28e42d8955dba4781bdlibpng-static-1.5.13-8.el7.i686.rpm70fa7e0da54383b8d3de74bcc4fd1b553c53534e41e35b927bf14d2ebe291502libpng-1.5.13-8.el7.i686.rpm5345462ec540ee430e2470dff68515295d373d88c06aab6e4aac87f47f83081alibpng-devel-1.5.13-8.el7.i686.rpmcbecd58b02f2f55e095fb0957743f361210530ef6ba1fc06cae838bfc8be6ba4SLSA-2020:3902-1LibtiffSecurity Fix(es): * libtiff: integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c (CVE-2019-14973) * libtiff: integer overflow leading to heap-based buffer overflow in tif_getimage.c (CVE-2019-17546)moderateScientific LinuxScientific Linux 7libtiff-static-4.0.3-35.el7.i686.rpm4456a90574ff9aefd2dbced4ba6eeb3ddc886eb2574e1c1bc0feaa445f70d6a1libtiff-devel-4.0.3-35.el7.i686.rpm28e354f99c58b96c0667cdd4c28733455e37ef7e83f02d7108584c62490da904libtiff-4.0.3-35.el7.i686.rpm55a2a87e891e5ae9e6f76106a7e7af9e5408261ba9311cc702e2e1000c13052dlibtiff-devel-4.0.3-35.el7.x86_64.rpm114620bc9f5fc438848ae84a24af1c535ac8f7f843f3403c1f179a7624c00a1dlibtiff-tools-4.0.3-35.el7.x86_64.rpm21335421bd3acb7c2782aa6f2be48a81df6a8313af864a35f8b0b0a711b12c3clibtiff-static-4.0.3-35.el7.x86_64.rpm5f50220995c43eedf26e02f65a1dfe4f5ca2afb6d28811d24818233ec1350a49libtiff-4.0.3-35.el7.x86_64.rpm80943e54372643083901569fde0f17b642f859629923f381a2fc308e01a31c2cSLSA-2020:3906-1Qemu-KvmSecurity Fix(es): * QEMU: seccomp: blacklist is not applied to all threads (CVE-2018-15746) * QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)lowScientific LinuxScientific Linux 7qemu-kvm-tools-1.5.3-175.el7.x86_64.rpm6d2e2c9316d08af5d94e7984eef0dd6f9b13071883bcb530b8d5b0a2242448d6qemu-kvm-common-1.5.3-175.el7.x86_64.rpm8935d99c77ff3a7742a7f2ec0da11407bdf6613ca2a6a6267ef70e662682d383qemu-img-1.5.3-175.el7.x86_64.rpm490a44a4f588c2e6fad927d8f679f9568c0ee6392989dbd582b305314eee57adqemu-kvm-1.5.3-175.el7.x86_64.rpmf6487877daa75615bb84590866b1a331a449e6bf4b231691d97c161634f93451SLSA-2020:3908-1CpioSecurity Fix(es): * cpio: improper input validation when writing tar header fields leads to unexpect tar generation (CVE-2019-14866)moderateScientific LinuxScientific Linux 7cpio-2.11-28.el7.x86_64.rpm1abeea9894fe45a8983e0258f79069bad85b9effa640033aae9dbebdb497c3a7SLSA-2020:3911-1PythonSecurity Fix(es): * python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)moderateScientific LinuxScientific Linux 7python-libs-2.7.5-89.el7.x86_64.rpm429a0cc93beceebc65292b64f2809b0414206ab4940b0f0708b0ba2fdbe2fafdpython-test-2.7.5-89.el7.x86_64.rpm081601053786fb5bf339113a631a01c31622be8022d404ecc8b7b2ee78122097python-tools-2.7.5-89.el7.x86_64.rpm9442bbf8a094feddb106bb41188944fa3d74d2263bf742a5e90136d47413608epython-debug-2.7.5-89.el7.x86_64.rpm7fde2bf851b595d53b7c14b4f3d1948af9d33b5dd5315610c9b0f7688f753cb4python-devel-2.7.5-89.el7.x86_64.rpma98e9a7c5b39a55c0dc3114ee895fa705371cc5f1e4b29af071a78d5362cb7cctkinter-2.7.5-89.el7.x86_64.rpmc1308978f2637e9a481d20a9d9d676539f33037c942962fd498a512ba18514edpython-libs-2.7.5-89.el7.i686.rpm119b23cdb1e1b152d671f2933dbc802e277e2c7f3db2cb0c06422430366138e2python-2.7.5-89.el7.x86_64.rpm512c563a817b55c187e202e047acf8b53ddb456d814712d495c3aae33b1fad60SLSA-2020:3915-1Libssh2Security Fix(es): * libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c (CVE-2019-17498)moderateScientific LinuxScientific Linux 7libssh2-devel-1.8.0-4.el7.i686.rpmde09a90cf07de953e079f73a15570e61771f15212421ae4c688927b5e3c674celibssh2-docs-1.8.0-4.el7.noarch.rpm41146c005a9cb5bfcc19aaab25ad2a27cc16646a6e53fc57d770d59ee5035ff1libssh2-1.8.0-4.el7.i686.rpm158a01f5bc056e08a40a418661ef06d1800d719cc93ed4720b966d62f75c4777libssh2-1.8.0-4.el7.x86_64.rpmbcf4dc42888aa5074ae44a1849b80215c1cb26ec7a6e4a10034f4e7979ba6d51libssh2-devel-1.8.0-4.el7.x86_64.rpme6fa7588e0c282c2611051609f1e0de3f2f4e1bd2dd9251d4e45c4eb61259cdfSLSA-2020:3916-1CurlSecurity Fix(es): * curl: heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482)moderateScientific LinuxScientific Linux 7libcurl-devel-7.29.0-59.el7.i686.rpm9c856db762bc0d68f141856d7ff090c59b88eb98324eaa20a5eaf3a5708f2128libcurl-devel-7.29.0-59.el7.x86_64.rpmef28b8a79559ef802ae17fb9d184bb8be96478e0672806a3449a831df2791fe7libcurl-7.29.0-59.el7.x86_64.rpmb9c5025044f93b09dd9ab29fc5e0106d9f6114624ebbd9d3f3a1e663197b6da3libcurl-7.29.0-59.el7.i686.rpmb0754db1cf23accbf020f12c8d5c7cd5b34a9e48b0be6a062d5410c1eb227125curl-7.29.0-59.el7.x86_64.rpm6dd40f8f62b4aa20eb4088f398bd86eb63bb7b0f20db35e4eb1ececc9ff0934eSLSA-2020:3922-1LibsndfileSecurity Fix(es): * libsndfile: buffer over-read in the function i2alaw_array in alaw.c (CVE-2018-19662)lowScientific LinuxScientific Linux 7libsndfile-1.0.25-12.el7.i686.rpm71e5162542918806a4652b151f5fd4cd3db47c381fa01ccbe8e3b2d3d1402621libsndfile-devel-1.0.25-12.el7.i686.rpm956400c7497fff01c175cc68617a199fe84a679d23c0286d4272880bc43c6da3libsndfile-devel-1.0.25-12.el7.x86_64.rpm7f488640237061a08ec756d39b5aabe0a362778c64a1a2ea1a6c9dc9dc59886dlibsndfile-utils-1.0.25-12.el7.x86_64.rpm7f5ee5d38598133a1d18c261aab7a039e28273babf667fc9761158cc6f95a83elibsndfile-1.0.25-12.el7.x86_64.rpmde695e200b57e33040970a26f9031d65ce22de590c21f5fa37e6fbb4e3fa82d9SLSA-2020:3936-1IpaSecurity Fix(es): * js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) * bootstrap: XSS in the data-target attribute (CVE-2016-10735) * bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) * bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip. (CVE-2018-14042) * bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) * bootstrap: XSS in the affix configuration target property (CVE-2018-20677) * bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) * js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358) * jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) * ipa: No password length restriction leads to denial of service (CVE-2020-1722)moderateScientific LinuxScientific Linux 7ipa-common-4.6.8-5.sl7.noarch.rpm958b97d9fc31c879fdb2dbea8031420b87898c9b965279e694bf538909f79792ipa-server-4.6.8-5.sl7.x86_64.rpm212f856b3912d675c1fb7be2d49c6137e78a30a80fb3c02a5f699e5a1ad125e0ipa-server-trust-ad-4.6.8-5.sl7.x86_64.rpm95e90f07a9f23ede63feb3c4fd5757a4d99f10386c6a1faa05098e6791814077python2-ipaserver-4.6.8-5.sl7.noarch.rpmb003b3c0797415a96115c3e01f3850f3b7938c91770a5901dd2fb36c18921466python2-ipalib-4.6.8-5.sl7.noarch.rpm94283f04a0455a3a998e4b570a0395866e61bc6830f3bca211d3ef3feb256d1cpython2-ipaclient-4.6.8-5.sl7.noarch.rpm8d477c0f051efd043f9805ff8c8098eedf08b3486b81a230a3d38ff99bd77954ipa-client-common-4.6.8-5.sl7.noarch.rpm2ec31f79a3aaa0d80dc2816837aa21b209afe379391da2ec801b9fc2d659cb04ipa-client-4.6.8-5.sl7.x86_64.rpm9cf9f179f4f658e86a05603a72e8022514431711915e6b68f62f722936d5f0c9ipa-server-common-4.6.8-5.sl7.noarch.rpmeb08d748f9cb5646645f1dbe27d87dc5db7a327f3211dc8139f2c519b4bfbf69ipa-server-dns-4.6.8-5.sl7.noarch.rpm495fb3fc28301901f52de79642bbae01063134fa48b82666f9d38ed887839b41ipa-python-compat-4.6.8-5.sl7.noarch.rpmaf6dde81ad208f3dd8d38a6fffd9dfcfe14627fd7a159c17e13e4503c0d43ebcSLSA-2020:3940-1OpenwsmanSecurity Fix(es): * openwsman: Infinite loop in process_connection() allows denial of service (CVE-2019-3833)moderateScientific LinuxScientific Linux 7libwsman-devel-2.6.3-7.git4391e5c.el7.x86_64.rpm17355de3560fc7405745ea50c5fb8ecab0f6096568dd89b3813e92ba131902a6libwsman1-2.6.3-7.git4391e5c.el7.x86_64.rpmb143ae5c86e39bee0b9d0e90cddc05917c4ad6f0fda6df2c89254e4c22c6b37aopenwsman-client-2.6.3-7.git4391e5c.el7.i686.rpmff62a824c5f57da21d2acad939e8b631d536c80d57bb80f0f08b96e413c96effopenwsman-client-2.6.3-7.git4391e5c.el7.x86_64.rpma15665c76215e6eb6065f39cab4965986c3e58f2c64bf59141eff1ed81954e7dopenwsman-server-2.6.3-7.git4391e5c.el7.i686.rpmd1e212b90758f5a4b789aed571902ad1bcb6d640084f606b640012c5d0d6f45dopenwsman-python-2.6.3-7.git4391e5c.el7.x86_64.rpmab2e2282adff3c60550ea68ae8c6b3b395fef3b455805d0c0a1aaabeb81f0d9aopenwsman-perl-2.6.3-7.git4391e5c.el7.x86_64.rpm4594f53f2adc81772658d3beed9db7ff7513cdf06c0b687978c58ad589eb7483libwsman-devel-2.6.3-7.git4391e5c.el7.i686.rpmb90cc5a6f47f7328d4c465d24613d2fd73b68bc0e358499e31ec9d7ccfa582fflibwsman1-2.6.3-7.git4391e5c.el7.i686.rpm2ac3a4e56bc45f14b8a72ee0f98ff4239a4b2d18e0ceb4ef0aca94eac58c80a7openwsman-server-2.6.3-7.git4391e5c.el7.x86_64.rpmb56ae81b6084d06b1e50372555f0041f6ef2ece94fe969b83db36469c0e50807openwsman-ruby-2.6.3-7.git4391e5c.el7.x86_64.rpm752b88babaa24ded54c6f3f6f2e9aae905326e58e122c0526244a913d3788d9bSLSA-2020:3943-1LibwmfSecurity Fix(es): * gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)lowScientific LinuxScientific Linux 7libwmf-0.2.8.4-44.el7.x86_64.rpm0305c87f54bfeaeedd8830e1e69d72e13f56bb4c1a32a34cee7e9002001567dflibwmf-0.2.8.4-44.el7.i686.rpma65b16d445a9f49bac7ce47b48450c5e9d251f9b0a74dc3d0513c44ed93bac80libwmf-devel-0.2.8.4-44.el7.x86_64.rpmd9f5ecf2c2176631670e054af0f39e71319279196dea4f44804b35f4eddbcdd4libwmf-lite-0.2.8.4-44.el7.x86_64.rpm34bcc527bc53616bd383b921114d1cc768631b411fa468e17f1323a765130957libwmf-devel-0.2.8.4-44.el7.i686.rpm8322e751b91b7cf1542c0463119a8afca17870c9459ae1a471e5fd58a4262d8flibwmf-lite-0.2.8.4-44.el7.i686.rpmea7e092fccc28d46aa2376e62a935c174a1e29bda5797f40df15ce43e957b719SLSA-2020:3944-1UnoconvSecurity Fix(es): * unoconv: mishandling of pathname leads to SSRF and local file inclusion (CVE-2019-17400)moderateScientific LinuxScientific Linux 7unoconv-0.6-8.el7.noarch.rpm97695d70feca1dcd27e7ad8d2760e314ae94fcd2b92ab547e24355b42415edd2SLSA-2020:3949-1LibrabbitmqSecurity Fix(es): * librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow (CVE-2019-18609)moderateScientific LinuxScientific Linux 7librabbitmq-examples-0.8.0-3.el7.x86_64.rpm727e41346155507386016f6a7843b9fb983cdd981078d2e1d88c529c063a373alibrabbitmq-devel-0.8.0-3.el7.x86_64.rpmb0f8ffaca682b7bf6a64be397e8ea9be66fef21fdeded919285dc972082a3b3flibrabbitmq-0.8.0-3.el7.i686.rpm8e91da77c204be6513fc1b4863c65455ab600e85d74a80596e071ebd9847e64flibrabbitmq-devel-0.8.0-3.el7.i686.rpm4920939d44ebc704eec2f33283fc1a258aa1eb481d60130098595479c717148clibrabbitmq-0.8.0-3.el7.x86_64.rpm95019a3bc277abfecc2901a6591a03ef47aed5f54738ab6fae37b9563493a6ffSLSA-2020:3952-1ExpatSecurity Fix(es): * expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843) * expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)moderateScientific LinuxScientific Linux 7expat-2.1.0-12.el7.i686.rpm2821d8234609253c34b8216e80ac1cb471811ea7cbd2f6fe2996500557fc312cexpat-devel-2.1.0-12.el7.x86_64.rpm7f73d056ec93cd87853f3ed50e15854fd573a27e708d8d8ec86a9ef1c386f8a9expat-static-2.1.0-12.el7.x86_64.rpmbaa06e09b3b30fc6775a25044c4286e5e6d919e503bf0dcc78a003444c4759d2expat-devel-2.1.0-12.el7.i686.rpm03be57e99f6187bf48e30f38836507c5ad5c166aa752443353649f066b827449expat-2.1.0-12.el7.x86_64.rpmd1d93801fd83ba106092ab5b688bbad6d0ffa39d000af9bfb9f82feeb2e20401expat-static-2.1.0-12.el7.i686.rpmc521f597bfb4875495920019ac6fbadf086d279b41a94805e66e0582b4316dfdSLSA-2020:3958-1HttpdSecurity Fix(es): * httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283) * httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS (CVE-2018-1303) * httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) * httpd: <FilesMatch> bypass with a trailing newline in the file name (CVE-2017-15715) * httpd: mod_rewrite potential open redirect (CVE-2019-10098) * httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)moderateScientific LinuxScientific Linux 7mod_proxy_html-2.4.6-95.sl7.x86_64.rpm56159d40bdb54fe04bc5540e9e046a33f73de0c32386fe0de6c1a200516d273fmod_ldap-2.4.6-95.sl7.x86_64.rpm72ce3e7ecec1cbb64444f97de85ca67c4c49b456407ea4c56d3ae8c027b4a566httpd-2.4.6-95.sl7.x86_64.rpm8ae239a2a1435334b2013a17c8d9a4f76f2063fd4b2e4800c17c5685e5474a35httpd-manual-2.4.6-95.sl7.noarch.rpmd71c6aba2678eea06a0baaa73f1307a24e1baaa644faaa69ee140cfa2fc32a71httpd-devel-2.4.6-95.sl7.x86_64.rpm627fb306c6d41a1d20dc9f5cb9b68d173fcba4221a4177538d9885636e270cc1mod_ssl-2.4.6-95.sl7.x86_64.rpmc72c4a6b8d39138716cd25949b11d11f471bfc6d3b32625645963e9fe006af3fmod_session-2.4.6-95.sl7.x86_64.rpme268ecec31c591436a4f3cbdd2fb223d5b4eccbf731ffc2139db088b4a461692httpd-tools-2.4.6-95.sl7.x86_64.rpm4956f09c9255dbec36163703d7ec819ddcbab8e977824971cf9d2a88e0afcbf8SLSA-2020:3966-1FontforgeSecurity Fix(es): * fontforge: out-of-bounds write in SFD_GetFontMetaData function in sfd.c (CVE-2020-5395)moderateScientific LinuxScientific Linux 7fontforge-devel-20120731b-13.el7.x86_64.rpm7b9ec8018b910197e8f886af88df0b2f554ea3dc1256fb045988d26ecf3cf335fontforge-20120731b-13.el7.i686.rpma14c4929fd088e999f39b9bace435ea660435f83337354d66a2e04821494ae26fontforge-devel-20120731b-13.el7.i686.rpm27aaa4c8e0346e188923b9e9d9b669f0ef842343dd8d6310cb26558f44b02c9dfontforge-20120731b-13.el7.x86_64.rpm4dac7c8b6ab4a8b661524f83bb7a58b6fc7ae519682c3894f6a99e68d00d0216SLSA-2020:3970-1Mod_Auth_OpenidcSecurity Fix(es): * mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) * mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)lowScientific LinuxScientific Linux 7mod_auth_openidc-1.8.8-7.el7.x86_64.rpmb2dfaf03eb4ebc8d8caeb9fdc01a93c11fe2539156932b02766d5fee41165193SLSA-2020:3971-1HunspellSecurity Fix(es): * hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx (CVE-2019-16707)lowScientific LinuxScientific Linux 7hunspell-1.3.2-16.el7.i686.rpmafc57b23bf220b4e0bdc5d47b03385ce3e462b56694d27decf794f344f7fe852hunspell-devel-1.3.2-16.el7.x86_64.rpm796a35dc7e3ca03b3989f7a1e31d15e36d0b50988167bc6a6895e8c254c36026hunspell-1.3.2-16.el7.x86_64.rpm6ea12e07ba97623a9ed74f099804324f7aba437527c9c04fca59cea7af0fa235hunspell-devel-1.3.2-16.el7.i686.rpm529137a8d24c430049873f23d7e4cf1655cc9392eea9f0dc9a7e57568a0ce0feSLSA-2020:3972-1SubversionSecurity Fix(es): * subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)moderateScientific LinuxScientific Linux 7subversion-javahl-1.7.14-16.el7.i686.rpm9e420241533f135082de5962bcee6e9248e4244dc1d7ae9a6c3d8b5de47fbedbsubversion-perl-1.7.14-16.el7.i686.rpm88b1c81c21147fd47988ba979e9b71c16d88a7e08a4d7ecba266ca7c87f8c19esubversion-1.7.14-16.el7.i686.rpm9de49ccc1bde5e1743a1b5798adafa97d28a8edb10271d816049f4d7467aee60subversion-perl-1.7.14-16.el7.x86_64.rpmf5aeb55dca994afb3c1c8bed03eaa09ec1dd5e9980fde2aac4e725355b68fe82subversion-kde-1.7.14-16.el7.x86_64.rpma25ce5dcbb8ab3e39b15ca98efe3c25128f9ba3a548b0c3cebf42e90ebb306dcsubversion-tools-1.7.14-16.el7.x86_64.rpm118e499f5eede7fd3942d9a36e2fd97e2a875e35ef39140befc2ce03be4b4aa0subversion-python-1.7.14-16.el7.x86_64.rpm1692e14c1dcbce4ca904c18de551b779e2b8296bc1d0c2ea37007f77e792715fsubversion-devel-1.7.14-16.el7.i686.rpm9af90c245daa07dcd2f23d63eee1f759e9bdbf90064987861c53ac32171261a5subversion-ruby-1.7.14-16.el7.i686.rpma9b5a8aa8f74e57105df14e52f258227b83e67c3fa1f2c6732bc4cfa5eb23a2bsubversion-libs-1.7.14-16.el7.x86_64.rpm010444981277e7d62cc5053a15c43c1f1e79daef3eb85cc36bb0275db8722abfsubversion-kde-1.7.14-16.el7.i686.rpmc0dca587c707bef32984b23bcf2fc8ab3b03014223ee41bfe1b519a58be72c37subversion-gnome-1.7.14-16.el7.x86_64.rpm6e4b59df7286843cc7fd87ca04f8d2c7bbc8da3be6d59ea6c9947ac6d17aa7efsubversion-gnome-1.7.14-16.el7.i686.rpm98ce8a27404b1f7097e12536e49cb623f92930957ec02659f5495e581cdea09bsubversion-1.7.14-16.el7.x86_64.rpmdc9fa0f11f228fc248be9473998b8736cf3b3f20fe7e04f7a88c34dbee345785mod_dav_svn-1.7.14-16.el7.x86_64.rpm475fd383a654fb50705e508b5feaa727f2a2761063bb6715d6296bbdbe8386f3subversion-javahl-1.7.14-16.el7.x86_64.rpm9ad2551310778946957642458a9e7ace2119e53e6266ab9def612fc49c15daa1subversion-devel-1.7.14-16.el7.x86_64.rpmecda44c19b4f383da58b33d7e4fbf4e96c9bb90a2cefde29ec76b83d3d12c142subversion-ruby-1.7.14-16.el7.x86_64.rpm83022b57260bb140ced33314bd05d9276e317c082e214de22c833d4aafbef476subversion-libs-1.7.14-16.el7.i686.rpmb60bd800b686799dcfcf3446f081d0e5e965f2ccaf92bca5e1fa8e90081796abSLSA-2020:3973-1SpamassassinSecurity Fix(es): * spamassassin: crafted email message can lead to DoS (CVE-2019-12420)moderateScientific LinuxScientific Linux 7spamassassin-3.4.0-6.el7.x86_64.rpm7c97448ab50cb66a231bd9eca82c0ca7abd651266984b18985ccc0ca877d4bb5SLSA-2020:3977-1Evince And PopplerSecurity Fix(es): * poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc (CVE-2019-14494)lowScientific LinuxScientific Linux 7poppler-utils-0.26.5-43.el7.x86_64.rpm5162d9ba3e48d7a413e808bc06676a7edd04bd51a1c8718ea002afdcc9c5c798poppler-qt-0.26.5-43.el7.i686.rpma8c17f651e4689f51fafcdb24b6ceb6a6667de0ebd2a94a0218f7b41369f8a59evince-libs-3.28.2-10.el7.i686.rpm0a7e2afa167ac64174373e2176bd9a5b793164fe600eb087b0d9c135321c0958evince-devel-3.28.2-10.el7.x86_64.rpm440bf76a88b9de54ff33055b838d90ef127bb6f7150c2fed7f779c00671f5c02poppler-qt-0.26.5-43.el7.x86_64.rpmf225514c1b098616e6a2e9fcdfe23dd3c46b3660c74c275f15416b80e0536065poppler-0.26.5-43.el7.i686.rpmc1507b53f3555f5e0a26321678c2ecf72b064ff523d4676ebb7d4e6fb207adbeevince-3.28.2-10.el7.x86_64.rpmfa555a23db3376d0c808697903ae356d4e7ebb92c7c80cef1a3c6b0149f885b5poppler-devel-0.26.5-43.el7.i686.rpm884787b7f46a499bbbbe89201d6005b32810ef2823634b16b0a87917af768c1cpoppler-0.26.5-43.el7.x86_64.rpmcc82fdda6fbfb96c3bc7db238c8f3b6cff6a2c2b2af63d9797cf692e506fac70evince-nautilus-3.28.2-10.el7.x86_64.rpm2e33b3d8b8615beb10e1b3be97f8e8aed5e025cdae69650c97d718adee365fe1poppler-glib-0.26.5-43.el7.i686.rpmf9ec3cb0a1ccac2b2bf58a1a355fd3e3bce1edbe4b29debc4b63669b9d8b62cfpoppler-cpp-0.26.5-43.el7.x86_64.rpm0b13cd58e466f810a4082a1122d708791267c13ec395b5fcf8583998618b0409poppler-demos-0.26.5-43.el7.x86_64.rpm1c42f9eb888f94c4ffacc590c35919688fb5252dd826f1b50b12f1c9f3d3aec5evince-browser-plugin-3.28.2-10.el7.x86_64.rpma2cf943feb5433df74daccf975da5ed1a10066171bef5002af436de390a47ed1poppler-qt-devel-0.26.5-43.el7.i686.rpm21ec1a1e55d461ee50d50e3be096779910d1012137fa812ab5a77c1d3ef58a09poppler-devel-0.26.5-43.el7.x86_64.rpm998e1ecc3582be17d9ffc2ecf64cdbbcfe709fe98be4d7a09e2cff573a8cf5d5poppler-glib-devel-0.26.5-43.el7.x86_64.rpm3e7748820b14fa03f68d8be7b2a762c8f6ee1416eecb7cb605d5b7d568942616poppler-glib-devel-0.26.5-43.el7.i686.rpma0e5e60efa02d2706115fbac1f6059cb2c1a29f212b3395edea5c07b14b03600poppler-qt-devel-0.26.5-43.el7.x86_64.rpmeb7cdd7ade46da10de65b24fb861a3eb5a7ba70710abb3f21a3e323bd77b92f5evince-dvi-3.28.2-10.el7.x86_64.rpme4ca88fe129792db68f53c68842f5d3d9a55ec1b0d09855ca5903dc12a943f3epoppler-cpp-devel-0.26.5-43.el7.x86_64.rpmf08181c4683469e1625abf561ba0bee55295adaf152c5e70d92542b186505178poppler-cpp-devel-0.26.5-43.el7.i686.rpm98d43dff4629260d31e859406a3d58fc1bf6b1c0a8b0783228ac35dc7e6fa6d5poppler-glib-0.26.5-43.el7.x86_64.rpm6bbefede8c6f9015b890a521f75b2023fcca8f7813ee42d67bab970b92b33d9aevince-devel-3.28.2-10.el7.i686.rpm3345138d4c12ed09b94b094fb918e0b55a52f3f1b0333e4e49133ae37c267b03poppler-cpp-0.26.5-43.el7.i686.rpmc95bce5df205c729b17580903b5d571758835e9862b07837d7f8ca67d468731eevince-libs-3.28.2-10.el7.x86_64.rpm2b645c23c0cf4ce5eb5629605682782940d1a7834f2c5e74d337f8476b4d9dbcSLSA-2020:3978-1Glib2 And IbusSecurity Fix(es): * glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress (CVE-2019-12450) * ibus: missing authorization allows local attacker to access the input bus of another user (CVE-2019-14822)moderateScientific LinuxScientific Linux 7glib2-2.56.1-7.el7.i686.rpmdba2e320e5d55a1ad320f43b87818ebfb57707a36f883864412a3d912f209b60ibus-devel-1.5.17-11.el7.i686.rpm812dcaedfae5eb783659c22b0d53a4b126e48d453893be400e2fdc8e2c7d86f1ibus-devel-docs-1.5.17-11.el7.noarch.rpm7b6aa8682348126008cfe3d621c457cca8f6cf8ecfbb6ee0137c150d2944f8e3ibus-gtk3-1.5.17-11.el7.x86_64.rpm41f5c91bc15c18f3c58641ebe933f2fb3b513160e03fd114177282b66fe567bfglib2-2.56.1-7.el7.x86_64.rpm0ff883bb12db31cdc019be14bc63bd925868869886903f8c1cafd5dbd0403a40ibus-devel-1.5.17-11.el7.x86_64.rpm45e9cf8924dc993d1ba8a39959bc987667bfb0f382a7555a27cf65e60cca809bibus-1.5.17-11.el7.x86_64.rpm20015550f6cb008cf8669db337f38c6ada4491d8e9f62aa3cac989e61a0b3a5aibus-gtk3-1.5.17-11.el7.i686.rpm695bf7fe48bbcecd3729cfb89e33479d474b6eacb99b2a54e6fed35e1cf7a51cglib2-tests-2.56.1-7.el7.x86_64.rpma459c1af581430dec38b93d052b964b787c6ceda9ce5dad4a5c34b5a4fd7b16cibus-libs-1.5.17-11.el7.x86_64.rpm38de27d5c3a5ed14e693230bb049fa34f2d6b680a37fba8174bc49c12fee0deeglib2-static-2.56.1-7.el7.x86_64.rpm0468728a64c29056f6b1aec2bccf23bc0bb28b13f3e5994eb5559b20c631b38dibus-libs-1.5.17-11.el7.i686.rpm20cad8d3bd4754b4af69075d3390e97fa46d7eba49b981cfbc2a16382a80ab8cglib2-static-2.56.1-7.el7.i686.rpma79b0ccbc423cfe1916d291feb7637fb7452295bbb0dfc4332075a701531cc7fibus-gtk2-1.5.17-11.el7.i686.rpme6dd9f1a17f11a3606114286bacfc7739649dd7e5244968f57f00f22c953b13aglib2-doc-2.56.1-7.el7.noarch.rpmb5b8fcfe054e7296605c3716bd48db1d25ecfcb2fe709a40a2d2fd7a1e009e99glib2-devel-2.56.1-7.el7.i686.rpm4515cefd9767d0724da9ff92efe8ea4d611fd999428a85d14f586a344e2823acibus-setup-1.5.17-11.el7.noarch.rpm37dd4e489a8144e9001f16eddec4a3b4f239902e2405405f0399b1f886cae9f2glib2-fam-2.56.1-7.el7.x86_64.rpm979b9d7fc459b432b0a9dbc3439b3e23ec0420784ac5ac11a810fd650ef61c59ibus-pygtk2-1.5.17-11.el7.noarch.rpmab7a658c8deb5defb98a43fce38cae69bf3d82a183273ad0e0ab2ee448e43e4dibus-gtk2-1.5.17-11.el7.x86_64.rpmad6517fb5ddccc13e3330e7f71d482c3cf70be067a2bb94d0707c12288a6e9eeglib2-devel-2.56.1-7.el7.x86_64.rpm39675b88fa1d10df44a36f4101aa8a02d85ecca4c9e8e9ead12dc14dc7696127ibus-1.5.17-11.el7.i686.rpm1d8930b8c8f78f873d600a6db0d545b567af6da483630e6932cdf5daaa8528a3SLSA-2020:3981-1SambaSecurity Fix(es): * samba: Crash after failed character conversion at log level 3 or above (CVE-2019-14907)moderateScientific LinuxScientific Linux 7samba-common-libs-4.10.16-5.el7.i686.rpm4433702c6f052a4ae01729333ae0306b4a0a9fc8745cc12f64f0460e3a2e07d4samba-python-test-4.10.16-5.el7.x86_64.rpm28b0a289b685cfecb68be9243ec02e94677c4bcfe6e27d2c2e31f2c5a3f4ade7libwbclient-4.10.16-5.el7.i686.rpmda98ab4422063585f85848f30fd290ae964bdb431fca151f47b1087d7a2a8083samba-test-libs-4.10.16-5.el7.i686.rpmd515625d0f8c09eca2cbfad9d2fe34085d260ffa5529e44a766ee10d37b3d374samba-4.10.16-5.el7.x86_64.rpm2d0f9329836d6501a33d207858a79dba6c9bb51c2cebec698cced5b7a8665329samba-client-libs-4.10.16-5.el7.x86_64.rpm27ea67987195d1416452eba0caa1059c7d4f679f5708aee0e822be2d2b8e464blibwbclient-devel-4.10.16-5.el7.i686.rpmcac6d1848308ec6e87b108f86954d24f117d5f9b67e35b399725cadd16c2746dsamba-devel-4.10.16-5.el7.x86_64.rpm2a5fe36b5e561d9a3933e52afc3c5313f410a91799e5e782dc88f0c61777bbcfsamba-libs-4.10.16-5.el7.x86_64.rpm755f03864afca4db04eb988657f9a59c9b13e797f4bd1e828145b40a90f67649samba-python-4.10.16-5.el7.x86_64.rpm2531e6c7b21b0847d74fe616b02ad83047b6d4a19853687bf3fedb7c4ae9b7f2samba-common-libs-4.10.16-5.el7.x86_64.rpm394731b92d6a154d4b35575c8cb3e1ec5af3766b2dfe187c5b68336ea0760403samba-test-libs-4.10.16-5.el7.x86_64.rpm9b3c4550839b8993121aaddb28673d70922426420c4f7882f5438cdc278504e3libwbclient-4.10.16-5.el7.x86_64.rpm77934186de7c38d772ad4dad60a9118a7e312029b7d4745dddf51edef7e8304esamba-winbind-4.10.16-5.el7.x86_64.rpmd10108b8d29238429076cb308300d86143b050275725a90c75e691821fe6d61fctdb-tests-4.10.16-5.el7.x86_64.rpm76667b5388a6e6d18f1cd220537952b9072e46ca84af15ffefa2f6c34222198esamba-dc-libs-4.10.16-5.el7.x86_64.rpm4d78134794aa567ff154ed2cd401e57dbb43ef5a96b594a866078b5c33c7e5d2samba-libs-4.10.16-5.el7.i686.rpm9187e1b0d2c719896e3c670ef35c4bea2620564afc04f06b0be2f4117f43979csamba-common-4.10.16-5.el7.noarch.rpm0bb6a7568e891375b42e986ddfb2cd3787b195493f6f0472625e23dfb4955547libsmbclient-devel-4.10.16-5.el7.i686.rpme608f00a87f8efa20d4ebc5c97215c826d5c0285225b6275e70e5aa174c7d3d7samba-common-tools-4.10.16-5.el7.x86_64.rpmfda2273d80424a0add92b6556aaa18126dcfc4c862895da5d7270363c4ed3508samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm49437a5b961425beb47e7ddcb95eb1d288e0886860dbee4c9e7f1f6c99c1af2clibsmbclient-4.10.16-5.el7.x86_64.rpm316ffb4dadc05783a92dbf777eb9499c65f2aae8b091f180042d6d6908586e1flibwbclient-devel-4.10.16-5.el7.x86_64.rpmc4401295f9bb51233356788c096d7968feb8ba4534ded907333131bcc8829d75samba-winbind-clients-4.10.16-5.el7.x86_64.rpme75a6bc5aa24e0d8fc5c80c4ffb6f2e67e4e96e7f07df02f3f2ebca35d1b6430samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpmea4b5610a8d66487502c65043cbc2a7836d40263913e72291190b3539717c189samba-python-4.10.16-5.el7.i686.rpm8f11ef77cd00e75ed47dd73d6bb19576e67b818c522d07efbb5fc8fa2253583bsamba-devel-4.10.16-5.el7.i686.rpm700ae8bf484c06b74d108510e2a82a32e90a0de557f8d94ea666b4eee6e67723samba-winbind-modules-4.10.16-5.el7.i686.rpm27a8c897c14b2e00d268fb5703740c69c62c9dc432c0396268263ac65bf273dbsamba-pidl-4.10.16-5.el7.noarch.rpm5a79235d44f7c7c04080d3bf7115a934667640dbc373f7d51c355304d455263fctdb-4.10.16-5.el7.x86_64.rpmda610c0aed36bca99b74785ef1b508b6478783e9b5efed71d4091e158f0f4e08samba-client-4.10.16-5.el7.x86_64.rpm64fe5f9f2b705c3f9af0515f1f23b948cfd585fc22f9f1eec4d4dc6afb25bdf4libsmbclient-devel-4.10.16-5.el7.x86_64.rpm6ebf1d08b95fd3d6418d3e6c08ad864bcfca13a752788137372b60c4097747a1samba-test-4.10.16-5.el7.x86_64.rpm8d935b4bad0b99403e1513c347030460ca8502789c64ec540209a6ccc762a857samba-client-libs-4.10.16-5.el7.i686.rpm549d6cb0c8c952851323e8b9af03bd8ef0eb7838bda43f0d31b9a9391a34e44csamba-winbind-modules-4.10.16-5.el7.x86_64.rpm10a914e3a55da8ccd70a14ef850e825b07f4afd8ee8df5afc16c28ac81964b2bsamba-dc-4.10.16-5.el7.x86_64.rpm427ba84be0d94ba9ecdee57d4427880f0a99bcc12b60e3af8b079de0229b97cflibsmbclient-4.10.16-5.el7.i686.rpm09736a08fbf93986ac6f3e134ce18c0cd85f936c93ad64c8739f58791a337655samba-krb5-printing-4.10.16-5.el7.x86_64.rpmabc9b834724eaf486d251e83f7c794f6061a25d98223568c80f43b34825eaba2SLSA-2020:3984-1FreeradiusSecurity Fix(es): * freeradius: privilege escalation due to insecure logrotate configuration (CVE-2019-10143) * freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations (CVE-2019-13456) * freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (CVE-2019-17185)moderateScientific LinuxScientific Linux 7freeradius-utils-3.0.13-15.el7.x86_64.rpm7feb6de238043e6a856a4acd13d187da88ddcc7daf10c7edf6fdf56d3f772801freeradius-devel-3.0.13-15.el7.i686.rpm7f9fdea8d5855592486268c8928b6e86fd429c1ff032fe7ca7ec7bf331764d99freeradius-krb5-3.0.13-15.el7.x86_64.rpm36e5b67458d1eb68da1cf45283b6ee493d07c02d17e325850fd91422b7fa5df6freeradius-mysql-3.0.13-15.el7.x86_64.rpme1d08544abe854a451e745b5dff2d021dc8e13d4c63779359a2c5683d723d185freeradius-sqlite-3.0.13-15.el7.x86_64.rpm97ab8cff5c543c2eb68fa0d3026c3855c41a1544f4c3f5d1a97236ad42ea3063freeradius-doc-3.0.13-15.el7.x86_64.rpmcc604a6ba3277d8d609250a753ba807a3bc957261def0a8ac69d8ceadf003233freeradius-devel-3.0.13-15.el7.x86_64.rpmd3f5c2720d685b00d53fbc6d856688947a97acf0bd2303dd28af9a4ca743915ffreeradius-perl-3.0.13-15.el7.x86_64.rpm1ebb1fc819a326b63e0c7c84362ca01be3ba1de6917770d5d4d3b603b861d939freeradius-postgresql-3.0.13-15.el7.x86_64.rpm2d35bc7bd5d9dd205085a5660dac86558ffabe9b27e5dc73ddcf4c5d09a068e2freeradius-python-3.0.13-15.el7.x86_64.rpm9f531af4b5d5a6c0fd6b862c87c9e70b644a7e88982c198d22f0f734b2d67e90freeradius-unixODBC-3.0.13-15.el7.x86_64.rpm86213d9fbd06e0cb48446face4377f73a241ab26ab752c0eb0e4f1dead64c501freeradius-3.0.13-15.el7.x86_64.rpmccb6b87a403cc6d513fde29a3a5e6b2581551fddca847ce28ed70c8f475f4e21freeradius-ldap-3.0.13-15.el7.x86_64.rpm241fa7606c84c8c850441e373ca5d420ba8c8a41cec600cb22b8189e3b29e9e2SLSA-2020:3996-1Libxml2Security Fix(es): * libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956) * libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388) * libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)moderateScientific LinuxScientific Linux 7libxml2-devel-2.9.1-6.el7.5.x86_64.rpmdbd4aa5cee7ef698a5a3e1668fe4a585f4ae31d42e63ea585f4c75b11978f93clibxml2-2.9.1-6.el7.5.i686.rpm4ee258fe6435d7b424f6f81240b50508424eee0c11e160d80bd5c470f4e45447libxml2-devel-2.9.1-6.el7.5.i686.rpm68c1d8263bbd70e213a086a81c0773024a80a6d62ff489ec90711af32e953d5clibxml2-static-2.9.1-6.el7.5.x86_64.rpmae33ed58034989dbd2a87fb25d809eaf1cfcbbc2dbd19ad12874d4ccde897279libxml2-python-2.9.1-6.el7.5.x86_64.rpm3b7c67f100e199f2efbeb212e280843a651365b6b0f3b474bfbcf08ac5838cc6libxml2-2.9.1-6.el7.5.x86_64.rpm6419297e1d1a20ae43bff5d8f1dfaa1d30d53c0204a64ca3a74a748e4cdea048libxml2-static-2.9.1-6.el7.5.i686.rpm4744bc51e5511cfc541b88fbb5e944b1739235a38dcc568fe434f91836b35254SLSA-2020:4000-1LibvirtSecurity Fix(es): * libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) * libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)moderateScientific LinuxScientific Linux 7libvirt-docs-4.5.0-36.el7.x86_64.rpmb75211ad700f417723012281893e8d8bd9c1b4bca51c6eddbd5122dbaa70d7aflibvirt-daemon-driver-storage-disk-4.5.0-36.el7.x86_64.rpm496b33c1674c7ae7250cf1896790b186852808bfb5ce0b5cb0ebd6502db4d2adlibvirt-daemon-driver-interface-4.5.0-36.el7.x86_64.rpmeb4f8a8f50f1f87916e682635898d022659327f8e0bc753a1f682db73724e04dlibvirt-4.5.0-36.el7.x86_64.rpm4342f4ce8801b71d719cb361a768ef40b011b82bc55713242a8f5f98381a9412libvirt-daemon-config-nwfilter-4.5.0-36.el7.x86_64.rpma1ab324cbba9b45adab889d9bc0da6adc0cb3dac91829340eeaca9f68efae820libvirt-client-4.5.0-36.el7.i686.rpmb46fd5042892e80519b7c053ceddce9a86285fa457dbef04a488faf7f3d581c4libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7.x86_64.rpm10fc3288e9a96eacf3f4116723e2be911e3765435d73b5e56857bb485027b4d2libvirt-daemon-driver-storage-rbd-4.5.0-36.el7.x86_64.rpm1b5411200b747f1620b6cab3063b7777811e634c0aa7df00a3a52b0e98bd7786libvirt-daemon-driver-network-4.5.0-36.el7.x86_64.rpmcf6db16e8ffb5da193690a51de76299f497b352a69a111598d08d817e186f6b8libvirt-lock-sanlock-4.5.0-36.el7.x86_64.rpmdf3f5f92f589c68eabdf536a9095a236e1e7ff95cd8086ae6517fb38312d75b5libvirt-bash-completion-4.5.0-36.el7.x86_64.rpm81e67fa91a548e0c1a774884121f9d59f70b38694aa8ad2c00693437eb102c36libvirt-libs-4.5.0-36.el7.x86_64.rpmd92cf06a7b04a889cb9be5df7b18bae2e37a213b974063de5aa00e0212f10755libvirt-daemon-4.5.0-36.el7.x86_64.rpmb82da992e57525d2255417023bf2ba09cac822aa28461efe2ceb3f170b165bd4libvirt-admin-4.5.0-36.el7.x86_64.rpm86c39d819469ad10d482b6c5c7c4c9cd12fd067c0685607a5079889da6a4dcdelibvirt-daemon-driver-lxc-4.5.0-36.el7.x86_64.rpm619d7b207f4b55ef16b0f64822d35693c75f360b0ddbd10b89f4dfa9261e4fb1libvirt-nss-4.5.0-36.el7.x86_64.rpmedbda8b07b56058e5ff680499db324dc4858a4e18e6bbd5ff92a085f743a9cb2libvirt-daemon-driver-storage-scsi-4.5.0-36.el7.x86_64.rpmfabd0fd7b11570e88a0651b0ba7c04e719fc67670dcbf0c9e87c81483ceec4f6libvirt-daemon-driver-storage-core-4.5.0-36.el7.x86_64.rpmf724365cea637756505ba19938ac48245a4ee35ddda05a5996659ebc254b3906libvirt-daemon-driver-storage-logical-4.5.0-36.el7.x86_64.rpmebf986dc9d961bfaecc99b37ac73f25afdce9daed4d6e60ee8400a0169fb083blibvirt-devel-4.5.0-36.el7.x86_64.rpmbc04447756d3ce6c7bcbf9c0db4e09f5121bf85d7ab746fca00136fa1c3e75d0libvirt-daemon-driver-secret-4.5.0-36.el7.x86_64.rpm05ea88240cc245c611a7be42e4247d4f181368e11b1abbe8289d3e02d69bec86libvirt-daemon-driver-nodedev-4.5.0-36.el7.x86_64.rpm0aefc155c8423513f987338b7bfd66ab6e9280c70245c9bc5700943567c5311blibvirt-daemon-driver-storage-mpath-4.5.0-36.el7.x86_64.rpmcb6833f1004de879a3ad8ceb3596ab1f70b78685958eeefd071af805d9823528libvirt-daemon-driver-storage-gluster-4.5.0-36.el7.x86_64.rpm1aaef4e813e2102b8ff4734389c3548a1a23ebd6b9ff972379c00dc6272d3121libvirt-devel-4.5.0-36.el7.i686.rpm57b2ba8114fe9f847896c89d0a3562a9fe21b6c01f6854326e6f621fe609fa9flibvirt-daemon-driver-storage-4.5.0-36.el7.x86_64.rpm4a6fde25b076d001a9ae766ecac2c04dd73d44b5ba039d9685c5669c6bf4e3a8libvirt-login-shell-4.5.0-36.el7.x86_64.rpm622d332a0ca7e642e1c368f483b2b44b3dcfca419547d115b9981ddeba6a3034libvirt-daemon-config-network-4.5.0-36.el7.x86_64.rpmb16fb2a5b53721064432a56b0723b4a575418b557008673f5847ad9513e6147alibvirt-daemon-lxc-4.5.0-36.el7.x86_64.rpm1255e9ff441baa64e74254dab8954eb79ceace3f6e2999c4a08b8996afa69d52libvirt-daemon-driver-nwfilter-4.5.0-36.el7.x86_64.rpmebfaef3eb423b6fd65bc0451c87251349a9c5c155a2a005753f9392dc58d4527libvirt-nss-4.5.0-36.el7.i686.rpma53f754c6285352146827f07575ec836229172d7798e6a8625bcf351dfd41346libvirt-libs-4.5.0-36.el7.i686.rpm173d7168ddccdf15adb81421561edafc9420d14d80e8ff1e134c96505def39ealibvirt-daemon-driver-qemu-4.5.0-36.el7.x86_64.rpm64e0243d6afed485d0dbf416f1d194a39b0e603faad5d17226d1c36502274483libvirt-daemon-kvm-4.5.0-36.el7.x86_64.rpmd02123c8e6fd6b554fe1d1302665ea5db756df3c45e92ee732506473e04c350clibvirt-client-4.5.0-36.el7.x86_64.rpm0c2ace1e8529336b50bd710718ffed9d99f3f29f550b979d1a9459cbaaa7a076SLSA-2020:4001-1BluezSecurity Fix(es): * bluez: Improper access control in subsystem could result in privilege escalation and DoS (CVE-2020-0556)moderateScientific LinuxScientific Linux 7bluez-5.44-7.el7.x86_64.rpm2a7c532d13084cce124cb6ca75c9bfab50395636149fe3faffbac839edd8d126bluez-libs-5.44-7.el7.i686.rpm3406c53e60fb9f5dbf082ff4d9c0ffdfa71dd89b9cae3f261acf7d75454bf46fbluez-libs-devel-5.44-7.el7.x86_64.rpm5d132f663f3e29b196ff3ea530085cddd445277a12db52ec2ecf37cbdadc2323bluez-cups-5.44-7.el7.x86_64.rpm003193f244334d2b54bb844572e00673a3bd5c044690b9faa773ea02a1910e70bluez-libs-5.44-7.el7.x86_64.rpmd8c30dad8d8ae6b79e21029a8fd77046b07ed9778d53fc3a37779105b72abd23bluez-libs-devel-5.44-7.el7.i686.rpme5f47dc7d3a2f07c9caf704265d08e9f97c4f726f6d37a911f84af63e16ba245bluez-hid2hci-5.44-7.el7.x86_64.rpmb038da1fc353e81a1f64eecd80292e975ee1b92b81b131dd6c2b702440ad77fcSLSA-2020:4003-1NetworkmanagerSecurity Fix(es): * NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults (CVE-2020-10754)moderateScientific LinuxScientific Linux 7NetworkManager-adsl-1.18.8-1.el7.x86_64.rpmd8edc78e849570ddf8483a19e266d9ed2d49bd641169a61347a6295806547d35NetworkManager-wwan-1.18.8-1.el7.x86_64.rpm48b053252567a61b402d37447475ccdd941547bf6609c59834a7a1b9646bd49aNetworkManager-libnm-devel-1.18.8-1.el7.i686.rpmf76699181515b748d9ce1e6a2e51cad62386648cd42d38b99db74f6101ee784eNetworkManager-bluetooth-1.18.8-1.el7.x86_64.rpm4b39ed1225bc8c51480e223d07d307b0d660b3a1348c9e1886d4551229489650NetworkManager-ppp-1.18.8-1.el7.x86_64.rpme04b4f1b6c062f4c1064c8152741163efc7a639d5ac97defe01a61c225cef30dNetworkManager-glib-1.18.8-1.el7.i686.rpma70a5fe1268909f14a63b9b0b274d7afb27d3e3226b599559a43e3e6c96bb4bfNetworkManager-team-1.18.8-1.el7.x86_64.rpmd09b654320de212d3356a7f307c774205a444aac01063db4d51b05756153a5b2NetworkManager-glib-devel-1.18.8-1.el7.i686.rpm838864e66ccb3d6748ed29a152edc3622d8df575bb758969844cbb9201b69c71NetworkManager-libnm-devel-1.18.8-1.el7.x86_64.rpm5d448ac10548d0cf49cfb5d3afd192d8a291290a22ae6bfebfd9af103c8b1ec0NetworkManager-ovs-1.18.8-1.el7.x86_64.rpme3d25fd1863714afe048ae512a5f3d491855dcf576dddcd866c25b8dd5e948adNetworkManager-tui-1.18.8-1.el7.x86_64.rpm4701a45225590b1ad266b502a1859c45778bbfb37ed1aabc3232e69932efda0cNetworkManager-1.18.8-1.el7.x86_64.rpmb4ea7cbe44f9840b2cb3c99d1b5755b66ebd88b00a5d564bea3fdf7687cce507NetworkManager-glib-1.18.8-1.el7.x86_64.rpmba74547a0dc95c5498de4f462614d8577c146af750168d73c9ff9312279682e1NetworkManager-config-server-1.18.8-1.el7.noarch.rpm48f0bc72be92efa7e80d6413d11bf39dfd7eec528472645aa2b97218b8da2dddNetworkManager-libnm-1.18.8-1.el7.x86_64.rpm9ff9cf68ba518cd85ee7a94539e2d28009e54054bbaee86e70a8e98430730f55NetworkManager-dispatcher-routing-rules-1.18.8-1.el7.noarch.rpm3b73fb6eb579b58910848316231944d75274b0dbc65baae675b1078905a75146NetworkManager-libnm-1.18.8-1.el7.i686.rpma62d19861728a2bbba0edfee065cc23d686ec219d7c8c24b67d86de1621adda0NetworkManager-glib-devel-1.18.8-1.el7.x86_64.rpm89fc41bf847a9f71ed1b3ca0d307466ebc9c842b4d5335f06ae129ffd9af6c22NetworkManager-wifi-1.18.8-1.el7.x86_64.rpm4f9a5bb6f3580553d4058916e93753fcda252e7d2e47188b5067053ddd46d5adSLSA-2020:4004-1TomcatSecurity Fix(es): * tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS (CVE-2020-13935) * tomcat: session fixation when using FORM authentication (CVE-2019-17563)importantScientific LinuxScientific Linux 7tomcat-webapps-7.0.76-15.el7.noarch.rpm87b3d642e61504e29155413564fec0b52d5f57b09c4db068f9a05e959791dc23tomcat-jsvc-7.0.76-15.el7.noarch.rpm51964b41102672ad9252b5e716670cd72fc295b594df3ce2ba17bee8837dde96tomcat-7.0.76-15.el7.noarch.rpmd8b7d8cecb0cdb9287b65b2266c0e626574b30948b4524c1c0774dbd8b725cbftomcat-docs-webapp-7.0.76-15.el7.noarch.rpma692cdb3a57907beef6d8360fea12e0c84d8312c78ec7e5573d4359a0efaa409tomcat-javadoc-7.0.76-15.el7.noarch.rpmeed676b99abdbd7b5b4ed025138ebdb94f103951a7eabb7be5d23fcf916426fbtomcat-admin-webapps-7.0.76-15.el7.noarch.rpmb81c410e21ecb8ebed71b452ff00698b3982880affcce2fe6c1bdbe42b658ef2tomcat-jsp-2.2-api-7.0.76-15.el7.noarch.rpmfc0d17a16d3d5df3fb42abf3c476dbaf7fb20aa0e20927da2e86afb328c0e628tomcat-lib-7.0.76-15.el7.noarch.rpm3b5ab3dcdf94abfb690066f4414f22d0cba6854807f38a44b0338f577c10ed8btomcat-servlet-3.0-api-7.0.76-15.el7.noarch.rpm25a9e1fa67fde116785c962eb8a75cf960a3c8c7b09eed7fac582a45397ad602tomcat-el-2.2-api-7.0.76-15.el7.noarch.rpm2d42ec82abd43740e643aae0207161557c27d966214830b0f646cccf4c351e4bSLSA-2020:4005-1LibxsltSecurity Fix(es): * libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL (CVE-2019-11068) * libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure (CVE-2019-18197)moderateScientific LinuxScientific Linux 7libxslt-python-1.1.28-6.el7.x86_64.rpm1b508ab0ac76456f425eebc50523e8af8f3799a0248bbda6d3f9a5e66102f9e8libxslt-devel-1.1.28-6.el7.x86_64.rpm26426b49f1bf78eefb3c7661f6a3b8ccabf421518246e57c4a0bbc79ac2ff70elibxslt-1.1.28-6.el7.i686.rpmbacab1d3c17759b7844f6aa146f9fd71ed0a261dd7ab1842f660dfe9a5c160a9libxslt-devel-1.1.28-6.el7.i686.rpmc33a3d94a13b4f48be72e87c0e1cae7ee5fef991741568d1fe9dfd3f191aba66libxslt-1.1.28-6.el7.x86_64.rpm2cb886c9aec87e6ce4f173be84e20243e3118e9d078d9f13a2e75f69746c3d37SLSA-2020:4007-1SystemdSecurity Fix(es): * systemd: memory leak in button_open() in login/logind-button.c when udev events are received (CVE-2019-20386)lowScientific LinuxtrueScientific Linux 7systemd-devel-219-78.el7.x86_64.rpm9e4a239151efd3c119dc72374bbcf566492374dd93db1a5af3ad4d91b015305alibgudev1-devel-219-78.el7.x86_64.rpm86cd6d60f6ba9d20d5a3bc76e1a44c2f870ed91756ee13046686061ae716123alibgudev1-219-78.el7.x86_64.rpm1634fa6c32fef933648f5e283b236bbd9b98e8d54c81d804dec589c8cf92afbbsystemd-resolved-219-78.el7.i686.rpm07f83bd725e762217e0a6feaa74d8281b88f4fec6b86de401bbc13a40f82554dsystemd-devel-219-78.el7.i686.rpm29308d4b3f7d40d0e03caf50269889c3b92646b1c8c7cfbabf5f30b8cc05059bsystemd-python-219-78.el7.x86_64.rpm92761bffa75a36304ecc817ce59ffbf6689d078de7445ba5880e023f6ec0eb82libgudev1-219-78.el7.i686.rpm69adfbad6505778b4334a38e21414471b3d0f94635f27c359943158dc4672df2systemd-journal-gateway-219-78.el7.x86_64.rpm1185a7c7fd7c2849afe7db2bddd6830eba1cc4fab57cfd019d99ef20d0c9be7esystemd-libs-219-78.el7.i686.rpm2259559df5e82f98bf8479428bd2322a64f5daf38e8eaf06456b3f44a52c684csystemd-219-78.el7.x86_64.rpm822e1c3f53cb29006bd164865d072215423d8b50dca9c62147ed26a76a9c30b0systemd-networkd-219-78.el7.x86_64.rpmd6e8711e69c48b45fa944c006c4cb2be87314b42a389e4a2dd2b4610f42a42c1systemd-resolved-219-78.el7.x86_64.rpma6af5a300b787c0b0e20defce0ff772e2f4c1b1872aa34557c7096dbb436a4eesystemd-sysv-219-78.el7.x86_64.rpma33a30d06e5107808e2ea9d21e6b3a7315d68327c4d5557b45ebddab6c0552e9systemd-libs-219-78.el7.x86_64.rpmfe5ac8fb977e4d3d7f8a80bb4dacdd1792bb6af5e6344de73326cc46af45d2adlibgudev1-devel-219-78.el7.i686.rpmbba990c649a32557f5e0e2b704752c33c6f8669613635fdc2317238808e0f19eSLSA-2020:4011-1E2FsprogsSecurity Fix(es): * e2fsprogs: Crafted ext4 partition leads to out-of-bounds write (CVE-2019-5094) * e2fsprogs: Out-of-bounds write in e2fsck/rehash.c (CVE-2019-5188)moderateScientific LinuxScientific Linux 7e2fsprogs-static-1.42.9-19.el7.x86_64.rpmb13acf7be6e3ee574a91e839289b6abbd0d3e894897a67112e536a4d4ca5ed7elibss-1.42.9-19.el7.x86_64.rpm0571c9cc209e9dc2c5cbb4d69ea350677fa0b7d5758bac2c4b3c693778651880libcom_err-devel-1.42.9-19.el7.i686.rpm29c3c0d7965321619ca46b50c43c315967302ff0e4dfa216436d97320a007a21libss-1.42.9-19.el7.i686.rpm3448fac475a69c773ccc6478561f3ace4bc763c52ba1440ab47fe5ce0ec189c6e2fsprogs-devel-1.42.9-19.el7.x86_64.rpmb989e45b8d91ded5ca37d0b2e45b2276b3de9443b5cb4cb4ded10449654f7753e2fsprogs-1.42.9-19.el7.x86_64.rpm35e5efa68a1b9e729d60d7300338bb55c88fab016e42eaabc942645b43dcfb23libss-devel-1.42.9-19.el7.x86_64.rpmadbf8a194351a859e578994d45cb4f40e5d876a0642659f1c6c4246ba0c972dae2fsprogs-libs-1.42.9-19.el7.i686.rpmc79875b56cbaaa387b7f382ffa802bef9d1aa507b32d1925dd846958720b996blibcom_err-1.42.9-19.el7.x86_64.rpm643d68b3898aae12e14d804f7ef7ca3e1951bdabe998357d75b5188ef4967642libss-devel-1.42.9-19.el7.i686.rpme10b1c8d2a7d13341874177e947aead0e9aa44de33dfff748b09d8b0b63def16e2fsprogs-libs-1.42.9-19.el7.x86_64.rpmcfde5380a1da5cfa2bdee6e4c2f20a2c3ed421d33e9b1201aafc446239e52ce8e2fsprogs-devel-1.42.9-19.el7.i686.rpm3c9deb8a85a2b74c3d327a22a43fae6a2ddc9f6b7297803095fc8c1bc878759dlibcom_err-1.42.9-19.el7.i686.rpm4d0990dd22e09ae4e90d0d284a716440f9c20f9fe81e6c6fde627b7770252ad3libcom_err-devel-1.42.9-19.el7.x86_64.rpm6da95fb7be290714e949ddffb21d3049f34307af9272b4579d9fbbe8fdf121c7e2fsprogs-static-1.42.9-19.el7.i686.rpmc019fa9a7fcc4264ed62c4664e5d613f74696bcccf11227dabc2027590697bd4SLSA-2020:4024-1OkularSecurity Fix(es): * okular: local binary execution via specially crafted PDF files (CVE-2020-9359)moderateScientific LinuxScientific Linux 7okular-4.10.5-9.el7.x86_64.rpm227ee627aeeb063798344088808c9a66d7dbe0cfe5a2ca556f23e5ecd5ea679bokular-devel-4.10.5-9.el7.x86_64.rpme10dc39c17c4e3c58a6ae470a3ddebc05ef3b3d3a19cb652ff1cb519cd087776okular-libs-4.10.5-9.el7.i686.rpm6007b024d163f9ee217ee795d79daaa975ef722aefff755990c3ecf0f304d633okular-part-4.10.5-9.el7.x86_64.rpm4108c4a129092e7b3677c768a52b1bf2b93832de180f505b9d27ab656c773173okular-libs-4.10.5-9.el7.x86_64.rpmce739b58b2f977bb44604027eb902dc20ea3f179665e6f77915774a7bee0a9adokular-devel-4.10.5-9.el7.i686.rpme3e89569de22f6209882571e46f9db700b345c11c1e41ebc89246987b80bb9f8SLSA-2020:4025-1Qt5-QtbaseSecurity Fix(es): * qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0569) * qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0570)moderateScientific LinuxScientific Linux 7qt5-qtbase-gui-5.9.7-4.el7.x86_64.rpmabab1227dc0ff0370441bfd6278dd3be09d19e4e297a5d50eaeaa1d6bcc0f2feqt5-qtbase-static-5.9.7-4.el7.i686.rpm85982af26b66ccedeb8e13ca9df958dd07cd2c969597e65d6bf84c7f30717de6qt5-qtbase-devel-5.9.7-4.el7.x86_64.rpm7bae4add7fbb0e8b397aa454a9a1f1a033fd4a7988b4afe49a99698accd15a43qt5-qtbase-odbc-5.9.7-4.el7.i686.rpmf525b0851ad58810176d72a29f72d3a20e33d5ec1963c984c60fc31111c9fcf6qt5-qtbase-common-5.9.7-4.el7.noarch.rpm7f1c9432f93dd8c5dde95696eb73298ec04c0544882f443d64991cb81c3a3e63qt5-qtbase-5.9.7-4.el7.x86_64.rpmfa797e1be38c73b8781cad9156f3b3ce128ccbfd5383824e180594a36da783bcqt5-qtbase-odbc-5.9.7-4.el7.x86_64.rpm3065f28397158af1c0fc3072e3e2b5d0a027f27ed7d3875701d83620873139bcqt5-qtbase-mysql-5.9.7-4.el7.x86_64.rpmddcfc60323daf117580a3fcee0db370dbb6564a2abc2b9eedae8b40b21515a0cqt5-qtbase-gui-5.9.7-4.el7.i686.rpm334b59f119bbfe1554f1da9b6cf1f4eab417c714f66414a221c2754f4fc441a7qt5-rpm-macros-5.9.7-4.el7.noarch.rpm711f1c0aab7124cafb5d774346c9ae55a5de90e72315ed2d17df91193c4ca07fqt5-qtbase-static-5.9.7-4.el7.x86_64.rpmc457697974f37793091902fec69e8006182da5ace574c164a1e29543226d474aqt5-qtbase-doc-5.9.7-4.el7.x86_64.rpma8ec25d608f268834f7132d62f591d624f927d7b0f5477977270ac880c15552fqt5-qtbase-examples-5.9.7-4.el7.x86_64.rpm81c9cdfe894e4e00581b84c4858769dfe4e4ed852c1b5051a7c822a8f4f8b01aqt5-qtbase-5.9.7-4.el7.i686.rpm504912a51f798dff9d6a988f8d985b776142728f5d2d35151ab118ddacbdc159qt5-qtbase-devel-5.9.7-4.el7.i686.rpm1e59d1e9cd21ea65f23b6583662395a4ef48a8b46a2c679b385e544baef3b9e6qt5-qtbase-mysql-5.9.7-4.el7.i686.rpm4c585e99c4fbf42622b8c8e443126da264bc61c7ec907381b0292651494a16dcqt5-qtbase-postgresql-5.9.7-4.el7.i686.rpm5e2ba3a99a781f9d33a77f83a2f44ca6a40df0ad61dd32641b151108a1e880ebqt5-qtbase-postgresql-5.9.7-4.el7.x86_64.rpm2bf5dead3482eabeab1d6dd021f72927c072d86c1d09e4cf65c303ac7a58d5f1SLSA-2020:4026-1MariadbSecurity Fix(es): * mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) * mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) * mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) * mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) * mysql: C API: unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)moderateScientific LinuxScientific Linux 7mariadb-embedded-5.5.68-1.el7.i686.rpm698adde9d3d1b11478b26b49844754a907752444f4bcdbf36d7333b6124644aemariadb-devel-5.5.68-1.el7.x86_64.rpma851ac042508beda19cac0bdbcd6af89a6668867bc5212054ff69ccceda81051mariadb-embedded-5.5.68-1.el7.x86_64.rpm1702cdb5c291ebdf5d6276cc6f99980fddfe6d9a80efea64eeb5b34e2adfe5camariadb-embedded-devel-5.5.68-1.el7.x86_64.rpmc47cc49de59ddb583c025f53f3624d1ae8355c6b57dab59969043e4c4faa3901mariadb-server-5.5.68-1.el7.x86_64.rpmc6caf93379bbb675d16f142ed22ba0720c52abbc7f7b132da92ac7e22081fe8emariadb-5.5.68-1.el7.x86_64.rpmf305d3e78cbc2910e780f9298634aef9754974308eafe7130dc5f2e39c7abd27mariadb-test-5.5.68-1.el7.x86_64.rpm5eacd199a619557bde3bb3fba63c742fad338e57f09525ae410fd12ac79b0cc9mariadb-libs-5.5.68-1.el7.x86_64.rpm19b4ec56288c2563d082a4af7f23c6d0a408a0b3485cd1d6b9fb1d72511d2832mariadb-devel-5.5.68-1.el7.i686.rpma64490c6af7b1557f50a34ade4889ec1df0b8b8d00036c99f3c3bae186af3b14mariadb-libs-5.5.68-1.el7.i686.rpm966f5671d0876ee87e6c8e19592314c1db68a9057f130c7d79f334fcd66ed3c2mariadb-embedded-devel-5.5.68-1.el7.i686.rpmb537cec0f706f485eeb58e826d577af79f764d20574b8e8f0298b4ede8a317fdmariadb-bench-5.5.68-1.el7.x86_64.rpm9974118028d740e534857e7930076a251c21ab12415a631123b461537b067eb7SLSA-2020:4030-1Exiv2Security Fix(es): * exiv2: out-of-bounds read in CiffDirectory::readDirectory due to lack of size check (CVE-2019-17402)lowScientific LinuxScientific Linux 7exiv2-devel-0.27.0-3.el7_8.x86_64.rpm699b7f384aea8609147679d079b0fa531e464c9fab4beda9861a1b6fd06ab980exiv2-doc-0.27.0-3.el7_8.noarch.rpm9712b0545f1a74cbb8b7e53f2c2c90f6bf4e8f5b13fe14dad57c8fd90cb82ad7exiv2-devel-0.27.0-3.el7_8.i686.rpmaa31d9d0acf7fd5f431a3469e9cd75d7e1317328dfc274b957ff4916f8e1d82aexiv2-libs-0.27.0-3.el7_8.x86_64.rpmb4f067e21c8994450c7c4964d2b81305ed823c8bcc67f39a7fab13fdcc52283fexiv2-libs-0.27.0-3.el7_8.i686.rpm2f1e194e18531d71a2bed100da5671f2d21229ca4731f713862a2a7ae9316ed8exiv2-0.27.0-3.el7_8.x86_64.rpm128fb873cb7d2ffc1a10d64715ee26891c2a7629b3dab15dd784acdef0a6a67aSLSA-2020:4031-1FreerdpSecurity Fix(es): * freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) * freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) * freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) * freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) * freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) * freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) * freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) * freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) * freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) * freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) * freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) * freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) * freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) * freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) * freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) * freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) * freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) * freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) * freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) * freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) * freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) * freerdp: out-of-bounds read in irp functions (CVE-2020-11089) * freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) * freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) * freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)moderateScientific LinuxScientific Linux 7libwinpr-2.1.1-2.el7.i686.rpmbed5fd94e38041d14d9606e33eb0a29666be596b107e22604ccec195d57b98effreerdp-2.1.1-2.el7.x86_64.rpm899f978bbb36db7396207aa5631483c9256f46dbea8aacb1ad8b6aa0ce6ad1dalibwinpr-devel-2.1.1-2.el7.i686.rpm8933fcd83816423744b93bedc67f18e0da393f01b50156f0b313ce31dc6def14libwinpr-2.1.1-2.el7.x86_64.rpma16b61139ef5f5a409a2d34683c6e10bcfbc45c303883acc61f6230065ece19bfreerdp-libs-2.1.1-2.el7.x86_64.rpm50f478d4d3649092f7c414be5db7af1464e846b8c6f3c6a6942423af7c4521eafreerdp-devel-2.1.1-2.el7.i686.rpm658b8f764bfcded5b3dfe9e506ec8d0ab2f272bf7c73a87fbfe97ac4eb18516bfreerdp-libs-2.1.1-2.el7.i686.rpm070079fee97cd015d6aa2bf66249388d99c85eebfac8a252d2e62fe27b44f384libwinpr-devel-2.1.1-2.el7.x86_64.rpm1100ac0e91ed41264d2410ac18988a56753b53e8faeb84dfb5248342c16454bafreerdp-devel-2.1.1-2.el7.x86_64.rpmf0263a6d5bb65e61a7b8f6a62ab158564213b749d76bdf6197f72317b336bc48SLSA-2020:4032-1DbusSecurity Fix(es): * dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749)moderateScientific LinuxScientific Linux 7dbus-libs-1.10.24-15.el7.x86_64.rpm1af526b357ce623df3bb58d6e8a692a9d0ba31fe8461b764b0570c4fe4e18cd2dbus-x11-1.10.24-15.el7.x86_64.rpm69faa197f1a91f3de92ff8c0d67eaca2cf0067fc7205ed90f96c6ad3e2029f92dbus-doc-1.10.24-15.el7.noarch.rpm0152845e126e3c84a26aaa8c36a9fd1d44978eb885ae6fc23b8c057aa86cb45cdbus-1.10.24-15.el7.x86_64.rpm49613d23e5af1574fead789a20abd2c5a4f3ea9c12836f12ecdf4ceb307b6438dbus-devel-1.10.24-15.el7.i686.rpm2021654c8951ba2e8d71d9065b02f7dea21ceceece169adcb8d8333688c246addbus-tests-1.10.24-15.el7.x86_64.rpme4e97d5cb1e5b020854335e04f51d1f2ee53f7bc79e90cffb42e6cc549a5131ddbus-libs-1.10.24-15.el7.i686.rpmb296591bca8453364ae229e583e2d8821a0d626792a2d431992a2a08dcc54cbcdbus-devel-1.10.24-15.el7.x86_64.rpmdb8141daf59c2fa1e9e07c88e2727c016f087c8f594a5c789ee3c7aeb00b04b6SLSA-2020:4035-1Webkitgtk4Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-6237, CVE-2019-6251, CVE-2019-8506, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551, CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-8571, CVE-2019-8583, CVE-2019-8584, CVE-2019-8586, CVE-2019-8587, CVE-2019-8594, CVE-2019-8595, CVE-2019-8596, CVE-2019-8597, CVE-2019-8601, CVE-2019-8607, CVE-2019-8608, CVE-2019-8609, CVE-2019-8610, CVE-2019-8611, CVE-2019-8615, CVE-2019-8619, CVE-2019-8622, CVE-2019-8623, CVE-2019-8625, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673, CVE-2019-8674, CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680, CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687, CVE-2019-8688, CVE-2019-8689, CVE-2019-8690, CVE-2019-8707, CVE-2019-8710, CVE-2019-8719, CVE-2019-8720, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735, CVE-2019-8743, CVE-2019-8763, CVE-2019-8764, CVE-2019-8765, CVE-2019-8766, CVE-2019-8768, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8821, CVE-2019-8822, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2019-11070, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-10018, CVE-2020-11793)moderateScientific LinuxScientific Linux 7webkitgtk4-jsc-devel-2.28.2-2.el7.x86_64.rpmaceb7a1c5cd23f70dfed22b1c73b064e692bd4724ed40dfcc6e2acfdc86991b0webkitgtk4-2.28.2-2.el7.x86_64.rpma854513d09cd166c5d487700abc2ceb9975ab4cf584ade02a4570b890e9ca0f9webkitgtk4-jsc-devel-2.28.2-2.el7.i686.rpma340b60560733de3fe9cfb6a83c1bbfa27c4fce8bc30c727fde8c50343ea9a23webkitgtk4-jsc-2.28.2-2.el7.i686.rpmce6685ad0c4617164c3292239310271f102d836b7fd2e13c4f6d0efc64be8951webkitgtk4-2.28.2-2.el7.i686.rpm6e8bedb988c417322723f3557dd9fefd208e4c5d835ddaec54518a79591008b7webkitgtk4-jsc-2.28.2-2.el7.x86_64.rpm5feddee015f19f292616832b1f0bfbb8398172ec215b24980033ae467b687363webkitgtk4-doc-2.28.2-2.el7.noarch.rpma14f84c45f338b6c099ec9f886a9a891560d1b7b197b7a84df5d7af9e16c2950webkitgtk4-devel-2.28.2-2.el7.i686.rpm7bf37530a79b1e5fc06f0ba014a3db9a3bffe8ea6f34a0cc8cc6262f7490e50dwebkitgtk4-devel-2.28.2-2.el7.x86_64.rpme95de77af90a26f474731ed34fae4e2cbdd0f8288536d08dceab82c121070800SLSA-2020:4039-1OpenexrSecurity Fix(es): * OpenEXR: out-of-bounds read during Huffman uncompression (CVE-2020-11761) * OpenEXR: std::vector out-of-bounds read and write in ImfTileOffsets.cpp (CVE-2020-11763) * OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in ImfMisc.cpp (CVE-2020-11764)moderateScientific LinuxScientific Linux 7OpenEXR-libs-1.7.1-8.el7.x86_64.rpm718ced468bf51b2002f9affbb2cb4e978272e6de9a1a74ef424c3a78eea82005OpenEXR-devel-1.7.1-8.el7.x86_64.rpm18c2c0c079ff1e9552402956c508d05d41bfc05e82b03a1d8605dca773782c19OpenEXR-libs-1.7.1-8.el7.i686.rpm8677a62336741f83adde8e09a6ff228e0d7ea4b118d5d0082a216d43a1ba3a38OpenEXR-devel-1.7.1-8.el7.i686.rpm23931bd35b53dcec540bd01060db7f3b24e8425d5ac6bb065a54bb4b578779edOpenEXR-1.7.1-8.el7.x86_64.rpm0fdc6cc95ba73c327efefaada1b9f262e579214a66cace2d711a3191be003b87SLSA-2020:4040-1LibexifSecurity Fix(es): * libexif: out of bound write in exif-data.c (CVE-2019-9278) * libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c (CVE-2020-0093) * libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free (CVE-2020-13113) * libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time (CVE-2020-13114) * libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c (CVE-2020-0182) * libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c (CVE-2020-12767)moderateScientific LinuxScientific Linux 7libexif-doc-0.6.22-1.el7.x86_64.rpm29c8870ea192bd1a7f25455101ffb9da5bc0eb70a3d1c509be4d041156e70749libexif-devel-0.6.22-1.el7.x86_64.rpm7660c2b5f75652c415c05e4e1281c0fc970455970ec8315d17f74eafbdeeb0calibexif-0.6.22-1.el7.i686.rpmc55b7d08e21c66626adc2d006015053d3f6759e16fa2b7a551f93c0b29d401c1libexif-devel-0.6.22-1.el7.i686.rpm759bcabb28968dd4f558845a96872f25aa7ab7d487ee845956652ea06ee5cad0libexif-0.6.22-1.el7.x86_64.rpm462a6cff319a50bf552362667dfd8b845d5d5742cd1ed0d818486fea72cb19dcSLSA-2020:4041-1OpenldapSecurity Fix(es): * openldap: denial of service via nested boolean expressions in LDAP search filters (CVE-2020-12243)moderateScientific LinuxScientific Linux 7openldap-2.4.44-22.el7.x86_64.rpm45dd51741f681ba924741cc13c9c0e0679bee065ad86d33579ad269e37a8f7d1openldap-servers-2.4.44-22.el7.x86_64.rpmd4202c530f9ecaa0524744cee78c5b2d4182d8174436a32df0a4c26b6ddafe82openldap-2.4.44-22.el7.i686.rpm0bdc4ef73447eb751de5c1fd537d1a560a4def7f81efdac649e29ebc0a92960dopenldap-servers-sql-2.4.44-22.el7.x86_64.rpm93e88fd229200c0a07889e9a1f8ef9311ed85a5374a49df5e98a602180bfc2e2openldap-devel-2.4.44-22.el7.i686.rpmddd4c977e73eef7016cf40ec711b5f0d4ff153510a2016a2f4c44a60c3e72e98openldap-devel-2.4.44-22.el7.x86_64.rpm14982fa0e7b07d91720de6da1a47f092ad681e504be3acee6afb76724318354fopenldap-clients-2.4.44-22.el7.x86_64.rpm26847425b742ad43c5306aeff209ff4bc2d782d60aa1ae17eda7b4c842a0a07fSLSA-2020:4060-1KernelSecurity Fix(es): * kernel: use-after-free in sound/core/timer.c (CVE-2019-19807) * kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551) * kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836) * kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454) * kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)importantScientific LinuxtrueScientific Linux 7python-perf-3.10.0-1160.el7.x86_64.rpm05ee4ea7b278f80f4fd8ae40901116798482739f0c932197a3e8db62348a37c9kernel-devel-3.10.0-1160.el7.x86_64.rpme30ca60530716a375bf5876a5168948c6012e487b6dc5789630a41078a57052bkernel-tools-libs-3.10.0-1160.el7.x86_64.rpm9bae0055d052e84412b1be2b219879ceff924b81efabb571f275a86555eed844kernel-headers-3.10.0-1160.el7.x86_64.rpme1d63994d9db669ec855e25f7f0eafb726996cc9e4e9a613f96474f93f55c4a4bpftool-3.10.0-1160.el7.x86_64.rpmc5d517b5e094f8e519d19d1338c6ea8e051c2a5704a01c5d08861bace992e23fperf-3.10.0-1160.el7.x86_64.rpmd71f3e601b0d37028d2d378a3ba7dafb0e2c58f5ebf72805c4e0b16b9d497e7ckernel-3.10.0-1160.el7.x86_64.rpm7eb44887d89dd1c11abb325b3c8693be2cbcbb99e62c3c32d8db52d0ce483d8akernel-doc-3.10.0-1160.el7.noarch.rpm57077c9598b9fb2cd9c0742374e9169b29a3a9f26b469e7b3a7ba028c2777df4kmod-openafs-1.6-sl-1160-1.6.24-290.sl7.1160.x86_64.rpm2bc7a46865aef14d675e8485f1a1cbc0823b27f4e5dbf714890b3a0ee874e6ackernel-debug-devel-3.10.0-1160.el7.x86_64.rpm5a7407e03439617f377f9bab2077d86184aad3c92ce85dac7c6d5a62ba481196kmod-openafs-1.6-sl-1.6.24-1.SL79.el7.noarch.rpm477c073309fed9f6024465094de52dfaf0461607e3c0ff972e787a3f8b515e1fkernel-tools-libs-devel-3.10.0-1160.el7.x86_64.rpm198789134d8196e6d8f0c485712fc885c446140b5e915bccc870529c81e94806kernel-abi-whitelists-3.10.0-1160.el7.noarch.rpm05ad8c8d7e419eba02a6ca3fe402f0c112510ebfd17aefa7e9f8866648f3ba90kernel-debug-3.10.0-1160.el7.x86_64.rpm9df47dfc2aa200d4e3dd239dbc9fa4d8598d68d3f08b54ab340704d851964bb5kernel-tools-3.10.0-1160.el7.x86_64.rpme0f769d0ffd95c24ffae5f1ed3470c7b5f52a009aea99b439db99e5cc12ff716SLSA-2020:4072-1LibcrocoSecurity Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)moderateScientific LinuxScientific Linux 7libcroco-0.6.12-6.el7_9.x86_64.rpmd87d08920dc0d6fc8115db1658235f5de735757dd37422431369a61fa249bc82libcroco-devel-0.6.12-6.el7_9.i686.rpm4b512395a6822fa76d4c0fbc4014b8f33e37eca0dd449e27b22c5393b5532837libcroco-0.6.12-6.el7_9.i686.rpm4b4a8dbf07510cc58a5400f60b2f8e517bfe51567f1cb13fc26df73e19798391libcroco-devel-0.6.12-6.el7_9.x86_64.rpmbf8fdd5833f8236b37fe8bc05897aa99e052984c436bfda0351d38cc387973bbSLSA-2020:4076-1Nss And NsprSecurity Fix(es): * nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) * nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) * nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) * nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) * nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) * nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) * nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) * nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) * nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) * nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023)moderateScientific LinuxScientific Linux 7nss-sysinit-3.53.1-3.el7_9.x86_64.rpm15a101e35a98f34fac1b771804494d4c6301eff549833e5e78786fb9feacc8adnss-util-devel-3.53.1-1.el7_9.i686.rpm60683f92b2008461920e8aefda0a27b834a00c7faf48ecb927eaae4d44292177nspr-devel-4.25.0-2.el7_9.i686.rpm3fa4d956eae89cfce468432d9c19af7d360fe488c4e0e6f05e5afa2b9fbae8a1nss-util-3.53.1-1.el7_9.i686.rpm9262d3904ffb913894939f0d81393714589b96d493ddba11f6ef0dbf62e79022nspr-4.25.0-2.el7_9.x86_64.rpme08439dde765b18f4e224a91ae854eeae94dc7dc8f37a60fde90504ab233d7bfnss-devel-3.53.1-3.el7_9.i686.rpm0e0db7d4094860e358678dc2afd7975797eb597cee877b304953603ca2e2f5c5nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm6431e62f2f37e81f770ef6c16adf677c8d181bfbbd1a6751ab6852a3a42312canss-3.53.1-3.el7_9.i686.rpm5dd111c183707e7ceb015f79188e924f397b034aca7c7d274b336cf993c68b2bnss-softokn-freebl-3.53.1-6.el7_9.i686.rpmcae33d2ff8fd02ddf817a0b2ba3293d31b3d563276e4d274205aac710cd30c1bnss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm25e1bf14fd9e2ace713eb7f595db1ee2e60d6099813d5f1fcd98a9970be276acnss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpmcbcdecdc2c895a1b0fc34ae177210bbdc8a94f583f59e47c1c64b7f8db0c17b2nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpmce95acdf422ce3fc7b3662005438988b14f6bcd6195a429730e16d44bec1a098nss-devel-3.53.1-3.el7_9.x86_64.rpm4fdcf0080023ce61c49172ad09c2e9b10d47698b82a79433039d3ff87ce3f64dnss-softokn-3.53.1-6.el7_9.i686.rpme96391c99b548cc3fe9f16fe843cfda2d20d5e6d39204401aafc0e1a5492f73fnss-util-3.53.1-1.el7_9.x86_64.rpmfc0d30529d44c6c4edd76892d8700f7f24074c3a0448172bc76bca0df143652cnss-softokn-devel-3.53.1-6.el7_9.i686.rpm3f1b6bf28bb95723ac1c3e7ac8b0fba7c45bb42472b4fe44bef21aaa36b48fd5nss-3.53.1-3.el7_9.x86_64.rpm50faf714fa7d06ecc9cabcfa5e31bfdd489b5a6e1a18e20736f8575c128b032bnss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm0d0cac5d697578932de17afb870c3df1b9c244b0d9b718a127079b18531b3487nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm5e12474924151c097b3f2bde740bbdd83c387afd02498a1baefc13829bb7cb75nss-tools-3.53.1-3.el7_9.x86_64.rpma1f9fa142ea8067c25ed2764b30e0e813ec4d1650d0fb278c73afc1f64fbc787nss-softokn-3.53.1-6.el7_9.x86_64.rpm4875de4d0a8cda97d3e56860fbecd2284818e04a30520087d0f0e84fd958bce3nspr-devel-4.25.0-2.el7_9.x86_64.rpmdc2cbeebe55c53402d9a5a92ec9bc3f0e479b8e5b26d2fb7ab73370586edd447nspr-4.25.0-2.el7_9.i686.rpmb2a769c0f5a9bf9cd471371b1ce23fb1db144a7fd1e4147634136668b6fd9349nss-util-devel-3.53.1-1.el7_9.x86_64.rpm216d1def1e80a5867a486fb4d2412663739458dd2ad8b11039291f32e307265dSLSA-2020:4079-1Qemu-KvmSecurity Fix(es): * QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) * QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)importantScientific LinuxScientific Linux 7qemu-img-1.5.3-175.el7_9.1.x86_64.rpmcc234b4588abcd0ace2c803e27f48acda0fdbd096ca6f37c4165f7b9af872a60qemu-kvm-1.5.3-175.el7_9.1.x86_64.rpm780e0463b252a18a14de1b3be1627dfd4eff587bfe3e83a798a52422463cf1f4qemu-kvm-common-1.5.3-175.el7_9.1.x86_64.rpm8176a5ae74de01a8446831210e7e4ac7d83a5eafaa628b4e447fbf28d716ba63qemu-kvm-tools-1.5.3-175.el7_9.1.x86_64.rpm6bbc2982e31448005f29f6958c4a3cf6103d542e2ae8395d4163eb14fe7cabf8SLSA-2020:4080-1FirefoxSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) * Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422) * Mozilla: X-Frame-Options bypass using object or embed tags (CVE-2020-15648) * Mozilla: Bypassing iframe sandbox when allowing popups (CVE-2020-15653) * Mozilla: Type confusion for special arguments in IonMonkey (CVE-2020-15656) * Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) * Mozilla: Download origin spoofing via redirect (CVE-2020-15677) * Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678) * Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424) * Mozilla: Out of bound read in Date.parse() (CVE-2020-12425) * Mozilla: Custom cursor can overlay user interface (CVE-2020-15654) * Mozilla: Overriding file type when saving to disk (CVE-2020-15658)importantScientific LinuxScientific Linux 7firefox-78.3.0-1.el7_9.i686.rpm60d7ccbae0fb2e7efd40487513ffa31855c8ffc70640fa40f3fc0632303be2fdfirefox-78.3.0-1.el7_9.x86_64.rpmd32524acf8d66c8f275ec8f19eac5c77f0c48f37d45eb3086f01118fa87a5862SLSA-2020:4082-1SquidSecurity Fix(es): * squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) * squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) * squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) * squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) * squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) * squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) * squid: Improper input validation could result in a DoS (CVE-2020-24606)importantScientific LinuxScientific Linux 7squid-migration-script-3.5.20-17.el7_9.4.x86_64.rpm8b1a3a2a254b270fd04a7dd2f33021ff52c0e5a558ad766f1130305e0b5229c8squid-3.5.20-17.el7_9.4.x86_64.rpmecd073112bc98e8306973eadf51161a824607ae734f6035cf67e1d6b648e4b1csquid-sysvinit-3.5.20-17.el7_9.4.x86_64.rpm23e389475386958ead15f709c786b5aef35748f47648d7ef0fb23fcf0b218c67SLSA-2020:4163-1ThunderbirdSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) * Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) * Mozilla: Download origin spoofing via redirect (CVE-2020-15677) * Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)importantScientific LinuxScientific Linux 7thunderbird-78.3.1-1.el7_9.x86_64.rpm8cb9469cd9c20428bd5bf8d36bc3fc27f29a59bb3479ebc96ab319f2ce2aabdbSLSA-2020:4187-1Important: Spice And Spice-GtkThe spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. Security Fix(es): * spice: multiple buffer overflow vulnerabilities in QUIC decoding code (CVE-2020-14355)importantScientific LinuxScientific Linux 7spice-server-0.14.0-9.el7_9.1.x86_64.rpm30ddab719cd3bda859be66754d7d019ffca626947b292b067a2a72dfe1a01a6dspice-gtk3-vala-0.35-5.el7_9.1.x86_64.rpm262d414824db1a2bb0e8ee584ec73af35c3c7db6055033e89edc18aa4fd668a7spice-glib-devel-0.35-5.el7_9.1.x86_64.rpm5668c3958f2bd0877b5c7434b6ecb4978e0477f7a16563bb3bfa182819435de7spice-glib-devel-0.35-5.el7_9.1.i686.rpm6b893540268d67f008da133de195375193a3762a0d193247364e5d35047c66cespice-glib-0.35-5.el7_9.1.i686.rpm9e0dabdc7afa3624b57a12126fc0ce4332d48a001957581c671df2452588e965spice-gtk3-devel-0.35-5.el7_9.1.x86_64.rpmf1e2dba59dec195d5ab66ee51017e2c82d0f693d1da1a486030708b353c79849spice-gtk3-0.35-5.el7_9.1.x86_64.rpm1d890fc3d9e7b196242546c79cfd32d16da1136b607656068dc6e494ae0432f1spice-glib-0.35-5.el7_9.1.x86_64.rpm27dac680038754a54a867169760f0bde6a9c0de366c074ba11a3316893bd5e83spice-gtk3-0.35-5.el7_9.1.i686.rpm2ff0e30297f5cc7bad06deabaf27e3f4358401c3cdb42dfefd2a15d7389efe5aspice-gtk3-devel-0.35-5.el7_9.1.i686.rpmad0df4223041cd1c29b64383f16fc2695653d6501c31ecb9bd9dce0994238855spice-gtk-tools-0.35-5.el7_9.1.x86_64.rpma689d51b6ae85dbbd313c4dd9733e45ab054009104bfd8cdd4f53ddfabe8f7d0spice-server-devel-0.14.0-9.el7_9.1.x86_64.rpm2b766e8ccc48003a1738820137238bc972b83cc48a6c1295d680c105fd7a51adSLSA-2020:4276-1KernelSecurity Fix(es): * kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351) * kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)importantScientific LinuxScientific Linux 7bpftool-3.10.0-1160.2.2.el7.x86_64.rpm47cc98d79612c44ee4c50be036ff1202c827bacc377befbbe255b5e964fe5134kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm727a63e696b987d5633e3b1f12ac7506e0e6c8de8afa32f85e45451effb2aff2kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpmda5331ece8f1ff9c937d00d93ec8c1c92274df24d1e7b195011c9bacea3a120akernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm222d55b53701eb15e5f6faff4c9efbb061f6c50214ccab31f16c010eb3cc958apython-perf-3.10.0-1160.2.2.el7.x86_64.rpm0dc203103a8e108ebd3e9035912ca0c3c036b2495e563b21611cae6ce04b9ae1kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpme6af572c94419b586d36fa4592d7f067100928b0977cab2367d22cdaa053678ekernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm243e81730c77eecf1958dcee6298e81ed0a91814ebcc940f777ac975caac5142perf-3.10.0-1160.2.2.el7.x86_64.rpm4f8c8280a6df9babc06d5b037f4e9892dd15a5814df3794afeebae843de1661ekernel-3.10.0-1160.2.2.el7.x86_64.rpm6c14fb888501068824f2ed38908bb795a5dced8da3ca3a110e10b291b79084b2kernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm95227e1a8230974169c9b94c54634753c92c01eff32a5387731e006b4dceb4f8kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm8fc5c8d4c4b9c8824a39c471e5b7b1a7f2fbb955875cb93ee8ae5f2aa389bdb9kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm7a19019424a7b2bb7896b09adcc4e479eb6d809b7efff3d1e9387fa579f96b3fkernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm545d852acb5f838546dd9015a7c2dda4a03847b8fd77d35373ccbfd1ee6c50efSLSA-2020:4307-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) * OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) * OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) * OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) * OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) * OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) * OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)moderateScientific LinuxScientific Linux 7java-11-openjdk-static-libs-11.0.9.11-0.el7_9.x86_64.rpm7773fe9ab00a5e8c1fa37599c574b80af7c1ee660b6c99e28a71207d48ced107java-11-openjdk-src-11.0.9.11-0.el7_9.x86_64.rpm785df6e2691fd683771687fa700cff34019c9eb04cb47b8889d6ac893bb37be1java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.i686.rpmdfdba17e9f0906b0f52585265c332e327a2a82f69723e8751c5d44cb735adb16java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.x86_64.rpm4bf919398968b3130277688dc7cfcfa05884ff3075f03a968b2483ee714a7a92java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.x86_64.rpm27f5b0fbd8d539fab8c1a4ea03126541add9095f6eb6a5117f17e91a5e89b81fjava-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.x86_64.rpmfce83dfde7f0630f6f930fbd5397f0bed2fb0aa112ad8a717766dfe72382a090java-11-openjdk-devel-debug-11.0.9.11-0.el7_9.x86_64.rpm00d0710ee0f2d7fb402b45cc52980e660c7fd3c073124f5ab8d5a8c8fa1c05d2java-11-openjdk-javadoc-11.0.9.11-0.el7_9.x86_64.rpm7aaee6e13b69540fa095cf098931f029d21869f2f620cf21b8e04d1ffb78126djava-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.i686.rpmb357ecf4582909f59a3c364cc226ee82afe3b3a1ff6f4640abd93163eabf7b9bjava-11-openjdk-headless-11.0.9.11-0.el7_9.x86_64.rpma00bf0b70968ee49ec3a963c94ad6ae7e3aec54b16592b9af8a7b6aae4165507java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.i686.rpme454ea47a65bf2a519a48a11562b81125f4879bea34a5a8f3f06a7ad1fc4dca5java-11-openjdk-debug-11.0.9.11-0.el7_9.i686.rpmfd1c5e53b94b26df626a313c7db3b0c152f8ce9de178876b29ab259269b42341java-11-openjdk-jmods-11.0.9.11-0.el7_9.x86_64.rpm7646e5a15007012257dae0968a551100a2a1097760531d183b8028a02d41ea5ajava-11-openjdk-demo-debug-11.0.9.11-0.el7_9.x86_64.rpm6d036817e9eff8bd9ab8b2c6579e62b1bd65e5d6deb3e63e7fcb1ac58d17f54djava-11-openjdk-demo-11.0.9.11-0.el7_9.i686.rpmd62dc9f69a52e7342d29a506d12f244ff1ed71c35bb9d98e9463b80896699839java-11-openjdk-src-11.0.9.11-0.el7_9.i686.rpm843c4d95590a7a3f422307ecad5a20705513c70ea54d3c384ba0499e4423bb80java-11-openjdk-src-debug-11.0.9.11-0.el7_9.i686.rpma34d858422fd29ddaeca302b07a4ae044c1df031e7fbdd9e85d80405ebd3d84ejava-11-openjdk-demo-11.0.9.11-0.el7_9.x86_64.rpm14b2f5753b2aaa759ab0f96933f8ce6e26c91b6edd91a5545d3a2dd3ad39490ajava-11-openjdk-devel-11.0.9.11-0.el7_9.i686.rpmd6208d100a97ed19eecc9f95cca5ce4d7f635c6c4caff6805a86b34dfde8bad6java-11-openjdk-11.0.9.11-0.el7_9.x86_64.rpm980fdd5684afb67ba596416cd0ddb2883f0957474269e36b86e5063a43855b6fjava-11-openjdk-jmods-11.0.9.11-0.el7_9.i686.rpm3c57bd28c1411992c646173d8a33781d72a541ea82d98483398fef0793276115java-11-openjdk-debug-11.0.9.11-0.el7_9.x86_64.rpmc7c73df4d3bf0a3af20c68f89b944f55df8ac09ab84cb4c16c5e4b53cfe48317java-11-openjdk-javadoc-11.0.9.11-0.el7_9.i686.rpm927bcc99f1a34ca8fa03cdcd6e6adacc2443d4d20ed3a66350d6f330620c64edjava-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.x86_64.rpm8996bc1bf68f25eacd32125341f0fd1650b6e1ba3a7d482c77bb348c58f2a45djava-11-openjdk-headless-11.0.9.11-0.el7_9.i686.rpm9463ccd7aefcf1ab73ae5fe04106befaeef8b28a0366ba35b2d03dc604f29bbdjava-11-openjdk-devel-debug-11.0.9.11-0.el7_9.i686.rpmf996fcb1bae7301ace4b33f230c7237d608983c1b357c30b92596293af396be9java-11-openjdk-static-libs-debug-11.0.9.11-0.el7_9.x86_64.rpm290b0863990ac66b00fb4083c4fa0cd5652aa7dd425b6d7d0125f55add12540bjava-11-openjdk-11.0.9.11-0.el7_9.i686.rpm7406a9cbd48f8589fe8d021f10a10e13087b1d25ba804f38899e45af24af7648java-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.i686.rpmcf2e2b4b7d6b2a08ececc865b2db978d4c8ac3e5ab27bc1bdbb22628d6badc00java-11-openjdk-devel-11.0.9.11-0.el7_9.x86_64.rpm75b390535e29603b8704b9f7a10850d6ec91bb8513c78638bf71dac9dd29c4b0java-11-openjdk-src-debug-11.0.9.11-0.el7_9.x86_64.rpm60c79a1a8ead07a961e19e44366f566b078c1e072ed131ca67b8fb8e4c449df0java-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.i686.rpm976242e401e45c3996fceab5cdac2d634b5b8fe950e37f1702b881557951ef71java-11-openjdk-demo-debug-11.0.9.11-0.el7_9.i686.rpm2dea15a7b85e8b1588d2903733f00dcc9f960170d0e46d94cbb178e847b5205fjava-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.x86_64.rpm8f33384eb89293e170cc12a5699a793ea71f7d2bd7b116da06375d6a8062449dSLSA-2020:4310-1FirefoxSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) * chromium-browser: Use after free in WebRTC (CVE-2020-15969)importantScientific LinuxScientific Linux 7firefox-78.4.0-1.el7_9.x86_64.rpm0f7cecb12ce176dfe68f58e23a8658f885e895967d328d6dddf495a467874d40firefox-78.4.0-1.el7_9.i686.rpm5368bac75f97a694f3d50cc99544bb65499f5d8bc09af1b0212e2a7b49b5590dSLSA-2020:4350-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) * OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) * OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) * OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) * OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) * OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) * OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.x86_64.rpm84315cb088343d080c977e86a915e6409155b31470e1dd809df045148936bf74java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.i686.rpm8e53e8a1970a57d292b99eafb9991e560ec8637365609a3beee02c75712490d3java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.i686.rpm19c42b5702f1772fb858a7dd625a9b7b25ae36a5a446343251b25d688f52344ejava-1.8.0-openjdk-javadoc-debug-1.8.0.272.b10-1.el7_9.noarch.rpm1aa199552998d535623ef176edb0599d6e3ce6ea5c2b304c46e91633ca9c42ddjava-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm291c256aaa593a5b2fadc2c71892cc2cfd49cac62877de65c4d7333d6d1e2766java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm11da3b9851328b21be471ff58700b9b2f5bd82687423bb4aeff49ad5fe74bde7java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.i686.rpm0166f48d73f52d1b4960002169d5fdc6a3bc2dee12fb8cd565131982b16df6acjava-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.i686.rpm23e32a42c36201c41a19045602fe6a68c373dc8a114ceea2847e3ff69c95af67java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm427823d292ddc2e1912dbc3efd235617a03bcc39f55eb6ab6c73999879440526java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.x86_64.rpmde17e98792cf998ea57892d253aa9a014d87b676323cb00ffe23ffc808a855c1java-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.i686.rpm2fff35aad1f8f8087da29e944b74e864cf77a51390c4b6a8da086ea967ffb7ddjava-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.x86_64.rpm3e2f48307168177298cebba77c02b2add7e979bb11604f1884e6ac3e5c7ae81bjava-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.i686.rpm75a2baf703633777a09a0843420f231b218fb5ccf667034b9217546011a5f1f4java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9.noarch.rpme6a43a8ce33d46f21008e0f57a5e9274718a5846f796b6fd574fd749ad0cd256java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.272.b10-1.el7_9.noarch.rpme4ff55c6a3974510ed0d5a27e453efe217672a67b02dcaf63899407789e101aajava-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.x86_64.rpm9652581e291a509533b2e4ee788ace94e553dbaaeee77f9bea281899d9280f6bjava-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.x86_64.rpmcb363849f85f163f11d69c5721b4171bae4f79393951dd15de33b722872d9d0cjava-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.i686.rpm944ae8a673c37a87563b11c7a02b258b99e4ee270605ef31999f3e742fa7b203java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.x86_64.rpmf69ec149f70f7f866239649eb6f5c5a4c0b8fd826fc431f07b08aa8d93a3c054java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.i686.rpmc32d7e9e4972acc71800876a40238760a778cca2fb2c037511180e03720602c8java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9.noarch.rpm9a8f96cf3e2853d9be82443633e43a8e6e6272b20a9c2d38fbb40f4621c941a5java-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.i686.rpmd16c13b69c6aa06ee4183431a1edeb59292c109ae4c060ae4ad634d8edca96e3java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.i686.rpmdaaa6fd0a3d4bacf1db37e863d92ecee085d896317a68639f52ed55426d1581cjava-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.i686.rpm42bf03a22cc2276874f1429ebc2578e1c28675d80ff51a26adcfca2400c960fcjava-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.x86_64.rpmccb82da1647e57bbc6d08fdc599b42fd105616c8daa1899f3729ea126caa883ajava-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.i686.rpm5f035231f2a2dfb229860b0c91dac5dc62d9fe8e22f095fc467d08875dc80a5fjava-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm787f313e98da032ef62f0dfb22807715b5919725bb31240e48f28826aeb1b884java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.x86_64.rpm4b751ddb7f6a4e3be1a7475be83045a254e457b2320ef35a477e8aa79e0c7eefSLSA-2020:4907-1FreetypeSecurity Fix(es): * freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999)importantScientific LinuxScientific Linux 7freetype-demos-2.8-14.el7_9.1.x86_64.rpm4bfcf2c7e50e92c1f2d9409f26c5831b3896ec5ce1f8e47ffa61da84870812b6freetype-2.8-14.el7_9.1.i686.rpm856e5771864d72fc764d1a8042323f58fa6a121257e801239a8283d4034dd58cfreetype-devel-2.8-14.el7_9.1.x86_64.rpma55d3145c81d7f556319415342886d99a289c7a2c055ff488a8e8ec4eaeb56c3freetype-2.8-14.el7_9.1.x86_64.rpm0a2506c221bec596a80aac2b5f9956724acd36ff358e33a36d7a72ab9028ed34freetype-devel-2.8-14.el7_9.1.i686.rpmb490be3e3b925087ecd0ba1133a0fb1f6d84b413a04d69e80a0a3c4040a6d12cSLSA-2020:4908-1Libx11Security Fix(es): * libX11: integer overflow leads to double free in locale handling (CVE-2020-14363)importantScientific LinuxScientific Linux 7libX11-1.6.7-3.el7_9.x86_64.rpm6e8e14ca7f672249ccf93b21f9a05353d9f869e8c9e82c21e193d279eacf068dlibX11-devel-1.6.7-3.el7_9.x86_64.rpmf19a029ec329dc1e1243c645ea26b5a7f62dabf74c5b549969d58b13561ffacdlibX11-devel-1.6.7-3.el7_9.i686.rpm1dde8930cae65481b398449efa31c5cfb59d23826f5fa96d9e52cb282f70b99flibX11-common-1.6.7-3.el7_9.noarch.rpm381c93461e119984e0434b571d08714051e8aa858e2e2094b1bf2d0d1edc6d75libX11-1.6.7-3.el7_9.i686.rpmfafea10ff0634bedb1da4a7f7bd5dc1d0ac3b3d282e8c0db6348a5cc6311c657SLSA-2020:4909-1ThunderbirdSecurity Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) * chromium-browser: Use after free in WebRTC (CVE-2020-15969)importantScientific LinuxScientific Linux 7thunderbird-78.4.0-1.el7_9.x86_64.rpm25bc3fd79765278178210c5f457310376fb4fdc89b63a3716d1622c585ef860fSLSA-2020:4910-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) * xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) * xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) * xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)importantScientific LinuxScientific Linux 7xorg-x11-server-Xvfb-1.20.4-12.el7_9.x86_64.rpmf6838ab4d46d3054257b828a7aa09da6f020cb48bf424014e1be418934f66c74xorg-x11-server-Xnest-1.20.4-12.el7_9.x86_64.rpm59a891a6804e0ea057830bf640a4a7e10fd3488c6fd198af5ff0ccaa60ebafdbxorg-x11-server-Xwayland-1.20.4-12.el7_9.x86_64.rpm5b1c4f1a7d447b4905e86e7f92cc9afe83d803cadacd5e87d2e0cbf650f0f8d9xorg-x11-server-devel-1.20.4-12.el7_9.x86_64.rpm09033bb3f0b3195c416ec4fd68f5def0470d5a45fb96b8ac599fcf8db93c9ec5xorg-x11-server-Xephyr-1.20.4-12.el7_9.x86_64.rpme030ba439f9e18e27c1304a0037acde04069f35196f4d1edcb1e520ebb5b9a56xorg-x11-server-Xorg-1.20.4-12.el7_9.x86_64.rpm9ebc5b0228dc8be2571033eb26e2cb3cee0ac8bb36f72b7366734efbf3c25748xorg-x11-server-source-1.20.4-12.el7_9.noarch.rpma61f91a5c7e074ebe99958241cf0e74824ed077b38d3eed8ce45ade8cd175ae6xorg-x11-server-devel-1.20.4-12.el7_9.i686.rpm91ea49af08c78dbd43a08054b978fc8c15fed8ff793db9324e1388e9f68989d4xorg-x11-server-Xdmx-1.20.4-12.el7_9.x86_64.rpm36769b74f79e05de43a4c183a16bcd665b4d5c8e9015f7bcebdbfbbd472521c7xorg-x11-server-common-1.20.4-12.el7_9.x86_64.rpm10e5862388d8b6540d5d679da3bdd3164dcfd8bf2f7719cdbabb6921943bc62bSLSA-2020:5002-1CurlmoderateScientific LinuxScientific Linux 7curl-7.29.0-59.el7_9.1.x86_64.rpmba54d7541f99b9c1b96d3b33b9c2e18d90849d7cb66887cc3a1bc986b7c7f482libcurl-devel-7.29.0-59.el7_9.1.i686.rpm5807aead12a31810010e2917c43ef8bc265f212fb924fb1601e9ccf1704807d8libcurl-7.29.0-59.el7_9.1.i686.rpma1e0db291e8a9c734565c398e9a27b6c860183f135ea3a9d7cc5c228584dd083libcurl-7.29.0-59.el7_9.1.x86_64.rpm10d4a066a84d6742cd80208aa0113d24ee91fa5f9920eb44afb28547ed632f79libcurl-devel-7.29.0-59.el7_9.1.x86_64.rpm498795c1e33bc252ef6ba34b65cae08deff1823ffc0ba48263b049e343cea197SLSA-2020:5003-1Fence-AgentslowScientific LinuxScientific Linux 7fence-agents-amt-ws-4.2.1-41.el7_9.2.x86_64.rpm19c1b59f34566a07a680e1125699a5601016c4f319a0b75705d98377c2492973fence-agents-brocade-4.2.1-41.el7_9.2.x86_64.rpmf02e59eb643f3e54fc7b389da7546ae132453de6cacbde4abbd99385e56ea2e5fence-agents-heuristics-ping-4.2.1-41.el7_9.2.x86_64.rpm94d69c86f62a895488c9b506d6f5cfae82631017a45cb41c0ca9c35c8e1d215afence-agents-aws-4.2.1-41.el7_9.2.x86_64.rpm625fa195bf09fd0b2ff93c606f5a10b4b48607c4e7c658eef69c693e2a4349adfence-agents-ifmib-4.2.1-41.el7_9.2.x86_64.rpmf8f38967fe30cdad7aad67901ffaa6bf47b8469b46d6c0e1e3d11aaf7afee7b8fence-agents-apc-snmp-4.2.1-41.el7_9.2.x86_64.rpm5a6ed6aaba21a98dcdd9f4401143fc147a0c989312f25d7cbe1db6834b413402fence-agents-cisco-ucs-4.2.1-41.el7_9.2.x86_64.rpme80734486c4d4890d8320ff21ae677068bca71fe5fe2ba91ff0f5829b4940c1cfence-agents-ipmilan-4.2.1-41.el7_9.2.x86_64.rpmecf3927df5579f5a536b62f71366d279a3915439e331cd613df65b75c8a8ceedfence-agents-emerson-4.2.1-41.el7_9.2.x86_64.rpm93e973edf16a36d9dce880b159f61ff25e2e8ec26970ea2a50ddf29bc65f9b54fence-agents-eaton-snmp-4.2.1-41.el7_9.2.x86_64.rpm87cf4a8df3796539e14f2e45e097ddff5962023dab57efce4dae747dc8706a87fence-agents-bladecenter-4.2.1-41.el7_9.2.x86_64.rpm97effd14d1127ea087f512a63b22ed75bec9dc9b3cc841f314ffca633bd5a723fence-agents-ilo-mp-4.2.1-41.el7_9.2.x86_64.rpm9d8ff4d2b0dd185e45ba025d522050a6642a47d963f089b3d899c3e757e15ec8fence-agents-ipdu-4.2.1-41.el7_9.2.x86_64.rpm06e39bab1ee277ae744255675cfbb44271fd3f3c903323f1a0917f1f7c322f14fence-agents-eps-4.2.1-41.el7_9.2.x86_64.rpmacda91e12e2d0ac30de4dcf54773de27a5ddf0d8d2c59ac643733ef5d7d0d725fence-agents-ilo-ssh-4.2.1-41.el7_9.2.x86_64.rpm57abe5040417b44ca1df4883b214df169899cfd1775a2d76c76389f600741506fence-agents-hpblade-4.2.1-41.el7_9.2.x86_64.rpm21d3e84059bb8d99d386f4e742374915338e840d53b783e2f45c5bca9fd43138fence-agents-azure-arm-4.2.1-41.el7_9.2.x86_64.rpm1d8b493c7e010d1bebcde306db5209fddc3e122f7ef2ac1332d13fd044061e9efence-agents-aliyun-4.2.1-41.el7_9.2.x86_64.rpmdecc5ac47e2f630fffdbb821ca6ebf7b38269bbae0565bb8410589351ba59a31fence-agents-cisco-mds-4.2.1-41.el7_9.2.x86_64.rpm02a116fb8545da6c0b78a4c1122e6aa029ed2baded2336a6539bd3744f282103fence-agents-gce-4.2.1-41.el7_9.2.x86_64.rpm6d650ff5a7bc1d93d552eed702fb8ff4af0e255a6e012e1ddb3971204bc91755fence-agents-redfish-4.2.1-41.el7_9.2.x86_64.rpm07122c2fadde5f1434def7ae61dd0550c73eb7309b3f87b309c0a2991b14b217fence-agents-vmware-soap-4.2.1-41.el7_9.2.x86_64.rpmafac04d76ee59901927a64348eb93e4ea0c48a164cc0e2029847e8b26edc0ddcfence-agents-kdump-4.2.1-41.el7_9.2.x86_64.rpm8d6a4bc8e0c2082f7bb2fc692d41ccd385925ae94b94fe095591a846c940c7cefence-agents-rhevm-4.2.1-41.el7_9.2.x86_64.rpm798e4abc8535513ab7c780003067d0d787535100f412f57adad927899771c7c9fence-agents-rsa-4.2.1-41.el7_9.2.x86_64.rpm891ca7ba40226f9600a88b4c203b435de729c7aad318c3d08794bf769091c792fence-agents-intelmodular-4.2.1-41.el7_9.2.x86_64.rpm9d4cf92a8bd0efc8af62ffa59e709ac8ea92a414e65d08dcb1915cae96da714ffence-agents-scsi-4.2.1-41.el7_9.2.x86_64.rpm17c615fffd7a175d4158fe6c35728dd9b713c112f9e99529fc0708769b90fb70fence-agents-ilo-moonshot-4.2.1-41.el7_9.2.x86_64.rpm7a5a2b4de31ed4b73eb64ea6166a28dca4bc14a5a6ed7d2ac80c8d1e5e18260afence-agents-common-4.2.1-41.el7_9.2.x86_64.rpm3113ef7fa8701385c7a5c6f61e717ac7835c22d5799875b014af41ab19820f98fence-agents-wti-4.2.1-41.el7_9.2.x86_64.rpmc68f45aa1282b59a0f376da3c37f2f012d3bae05ea7c9c38c304b04359cb989efence-agents-sbd-4.2.1-41.el7_9.2.x86_64.rpm7d1d59df509363d91c0363179db6fcc242c229a2d617512faad157605bb5b391fence-agents-drac5-4.2.1-41.el7_9.2.x86_64.rpm39f494fb8d21bdde0e273d8a4c3110f811ba071cf2e9bb1a137ff0bc70799f05fence-agents-mpath-4.2.1-41.el7_9.2.x86_64.rpm77d14651c7a89a3873fcb841320bc6c4f37aa9bbcb4b118c292899eb16afad4bfence-agents-all-4.2.1-41.el7_9.2.x86_64.rpmaf1d5dde503828705086ed1cfd537bafb76e83b568ad1063e3ae8374cbe99153fence-agents-rsb-4.2.1-41.el7_9.2.x86_64.rpmb4ddaf6fcca6625e8b557cd3c7de1d0a230f23a22a0888d793ab0b0ebf9dbb48fence-agents-compute-4.2.1-41.el7_9.2.x86_64.rpmb1a61cc6f553521b7e4e4056b66462718b8e5b59466f1ea3d18c75603bad5cfcfence-agents-ibmblade-4.2.1-41.el7_9.2.x86_64.rpmc3cf909e55970318c1441c421986aace5355b213f0f27fd605c1929384f6d03cfence-agents-lpar-4.2.1-41.el7_9.2.x86_64.rpmb268844e144424fb2899eb26e623c12278f50a473077c04f46012cb21459cc7dfence-agents-vmware-rest-4.2.1-41.el7_9.2.x86_64.rpm9cfec09f827118a1a090fd807df6f879dc8c0c728d097cdc1c32225d4d967a25fence-agents-virsh-4.2.1-41.el7_9.2.x86_64.rpm68430c1c9dd9c303ef148a63c8ae963e773a7baad7617607883d068bb71d43a7fence-agents-ilo2-4.2.1-41.el7_9.2.x86_64.rpm41ee415447647eed027bb185416b14ded13e68e705ac15690df996d2d3c48084fence-agents-apc-4.2.1-41.el7_9.2.x86_64.rpm8d62c1b3065122e397a7cb931437908eee8860e1f8174171619a6fa1c01fe69dSLSA-2020:5004-1Resource-AgentslowScientific LinuxScientific Linux 7resource-agents-aliyun-4.1.1-61.el7_9.4.x86_64.rpm6741e110d07ae95142ad9c8ae7ce0b4ee1d84fa4d443de2263c0efffc0faea0aresource-agents-gcp-4.1.1-61.el7_9.4.x86_64.rpm24113aaad452a826353ff1a9bb70cd501196a5e195fb1af3a339e6cbd1ab0329resource-agents-4.1.1-61.el7_9.4.x86_64.rpmc655d13e0a6b3232dcb85372644ad9a0e41bd2b42ba00a1ed919d79f31a588f4SLSA-2020:5009-1PythonSecurity Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)moderateScientific LinuxScientific Linux 7python-2.7.5-90.el7.x86_64.rpm4e752d78be10a3150e118f067de4a2c1741192fa3a1b1ccccc7cacb2a1d55adapython-devel-2.7.5-90.el7.x86_64.rpm6fb703ebfb6d07fc86aee57f61ebab154a48b3392f9099feb0f862c34dc60570tkinter-2.7.5-90.el7.x86_64.rpmd3887158f3657a31a93bb8a42b504368e58bd61a76a727d1c5d849cd123e8362python-test-2.7.5-90.el7.x86_64.rpm8d4fbc682f98395e2a3b2bd59bfdbc00148c0046f3a93674ef17515ecbd500depython-libs-2.7.5-90.el7.x86_64.rpmfbe061a1f6a0f7e4c2c206db5a149e0fbf9a5e07101a22c47f5850913cd6b10cpython-tools-2.7.5-90.el7.x86_64.rpm028b8c625d2bbbc8ddba8669893ce2244b9c34d746b9cd2a11d853ff0de8a2c8python-libs-2.7.5-90.el7.i686.rpm2a375c1e3a4738e095ec03be404443859dd6b779f5e580b5bc1eaf005734c925python-debug-2.7.5-90.el7.x86_64.rpmc2ff66a4cfe90e016335af67c6f9119b924f27fc10d839788bef5b13de7db1a3SLSA-2020:5010-1Python3Security Fix(es): * python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) * python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)moderateScientific LinuxScientific Linux 7python3-libs-3.6.8-18.el7.i686.rpma7660e2a2f3125d61888433e08d9b119eabfbfee7814b5956f641daaac3d16e7python3-devel-3.6.8-18.el7.x86_64.rpm43aa3c0434b1412eae7822f4051ba310a53d1c3096d9758d21ff6652fbeadcc9python3-tkinter-3.6.8-18.el7.x86_64.rpme10cafc4bd4ff0c1a0ddbf36d5c7fc9446fafa85804e1ae63c8410cfe65822f2python3-3.6.8-18.el7.i686.rpm7f812c3e6f365f2e84fdbac137a6976e42f0f3a5f5c1b5fa95aed1c0a784bb15python3-debug-3.6.8-18.el7.x86_64.rpmc533139272942d0922d04eb19a99e44fde769aa9f76a93c0cdfa8d9fa1497d37python3-libs-3.6.8-18.el7.x86_64.rpm17b2a06a86a63c0a24c38aca3f59357bb05f561bb409f13c8092423c0084f60bpython3-3.6.8-18.el7.x86_64.rpm16d6911fd5e4e2d70be8d42e87fb416477baff5c313c3e251f010af76df67b49python3-devel-3.6.8-18.el7.i686.rpm38bfd095c97c53712cd65a01f6ec085a53ec6a7b043fad17da3a850a0584aeb8python3-idle-3.6.8-18.el7.i686.rpma59689e48b4c5506ac5031f9d6a3c4f529576283504531c5c70e9439a8cf2d9fpython3-test-3.6.8-18.el7.i686.rpm87478d3ab6ff72a3be98c75fcf0cf08a0668c71e8d030671ebeb7579ff5bfa7fpython3-test-3.6.8-18.el7.x86_64.rpm1d09983f1cf741814abec6324ed5c1e8aff39a249e854538ac774ce447973e9apython3-debug-3.6.8-18.el7.i686.rpmaed68cdc24710bf3087d20dc03abb64dbff1a5fbd9d7fa002637558108e158a7python3-tkinter-3.6.8-18.el7.i686.rpm317fd91d642bdf926eca2d224aec7b948873ca9f78379436fb32cd2d01ac63d4python3-idle-3.6.8-18.el7.x86_64.rpm8d4219b8ff1bc224f28bd8ad7d6bfc5c993aead45dcda9bdb2364414a3984cf0SLSA-2020:5011-1BindmoderateScientific LinuxScientific Linux 7bind-lite-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm6e55a724a60ef42a4e13b4bd0f32a3abf34323df4958482ae7662740d6d223bbbind-export-libs-9.11.4-26.P2.el7_9.2.x86_64.rpmaac0b90e4609b7004d2027c64a3e27da3b92969c8fbad97d0d053f41f8cac10dbind-export-libs-9.11.4-26.P2.el7_9.2.i686.rpmd473992a2a6512f6bd697e4200b71804f572691556f4c398170305cc7ec4223cbind-pkcs11-libs-9.11.4-26.P2.el7_9.2.i686.rpmcaea82264b0e1e6c343dccf95cc52f257fed2e135b0e15d4d3e5defbc810f433bind-pkcs11-9.11.4-26.P2.el7_9.2.x86_64.rpmed3d5cbf0009188355cb6fe08fa821cb0bb6013b6b2f560c3c28a6053f4fc0b7bind-libs-lite-9.11.4-26.P2.el7_9.2.x86_64.rpm601f32234eb3bc2aaaa8c34b7b814bca3974368c5bcd14b3b20e3391075fc37ebind-sdb-9.11.4-26.P2.el7_9.2.x86_64.rpmf209b01442c24e01c0dbf9b26af008c58b811c96f758b2e58db3985146b10a63bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm2455b597f2205f173708218e701b1a898dfb109b1b3ff6a04e0808b2417d0fb9bind-utils-9.11.4-26.P2.el7_9.2.x86_64.rpmeec76e247d93cbd1f7a186b88afc0f06111d005d9a21e92861f98222488a46bcbind-pkcs11-devel-9.11.4-26.P2.el7_9.2.i686.rpmdd0ef240b3a27a372f8677ad72902b7ca400c4d6d99a8949e123b8b7fd6c09f3bind-devel-9.11.4-26.P2.el7_9.2.i686.rpm98c7ca6154305aeab368688f1c27a1e05fbc2de5e742b32ed3218bd7fc1f544cbind-libs-9.11.4-26.P2.el7_9.2.i686.rpm35c0bd5b784f981951eb890d7e96f670a92cca814aafde0c84790be6f65d2a9ebind-devel-9.11.4-26.P2.el7_9.2.x86_64.rpmb1435d0c8da81b0a72b274eca170649f9b76349b539f6421ab4a2687a8fb64a8bind-lite-devel-9.11.4-26.P2.el7_9.2.i686.rpmaf95fc594e7fd389c1077dc9950675416f28bbfef92e60bb9d1db4e8054bad3ebind-libs-lite-9.11.4-26.P2.el7_9.2.i686.rpmba84e4f9783f4a9c8e8d0314626d596326644b918391d562eab30c32a28f97bebind-export-devel-9.11.4-26.P2.el7_9.2.i686.rpm568c85d08f58ab6c94e2f8dd086448b0295ba44be1669d80600c780dad7c1831bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm1137d00e19fe5e5304f4beac20b234bf52ab2cd1df0f0aecaddf6936cd14d078bind-libs-9.11.4-26.P2.el7_9.2.x86_64.rpmd6bd50edb212bde63536e11a4ca1a861fc56b7096b2ab4953614ad3de87381cabind-license-9.11.4-26.P2.el7_9.2.noarch.rpm91a402777de0497989837c462b009b8a4c06d9536038f7b2ce28ab4003396004bind-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpmadfbe5e8a9b3385e09f7c2e56341682c55a23e8fe1100868dd15e08d3e5dee34bind-sdb-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpma062858ee2760dc527dc773c645df312b22e5440d711a0bf9105450bd563815abind-9.11.4-26.P2.el7_9.2.x86_64.rpm273e674dedfdc72bb0c9762512c41a5ed7c3323bc79888dfd46352cd41558ff5bind-pkcs11-utils-9.11.4-26.P2.el7_9.2.x86_64.rpmb28870f9473211a5aab4761aaf1811a52d8f7d737a53892e03fb98700da4e032bind-export-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm682d4b7e4aa8fe2d2eee80929a26956290c764782a27195eaa18ddb39cbabe00SLSA-2020:5012-1LibrepomoderateScientific LinuxScientific Linux 7librepo-devel-1.8.1-8.el7_9.i686.rpm5e9aa35a981d2840134692f84d2e65150bd03a045a1df0f2432b0c46f8e24f44librepo-1.8.1-8.el7_9.i686.rpm54ac0b83a5980f0fe79f81d89bbc74511e224e96f3aa6acc5b69f30f2ba73f4dlibrepo-devel-1.8.1-8.el7_9.x86_64.rpm842b884bcff0768ce4bcf18fafeb9f1ab99bd8d1e6249607717fa18cd58b9109librepo-1.8.1-8.el7_9.x86_64.rpm818449bd35f4147b579a34e08feb2b30eccdb473abe5bcdf6a069186449e303apython-librepo-1.8.1-8.el7_9.x86_64.rpmb29277245dc259c20968baf397c933cc0ec2a338941c8e11b46ac3d016d038b8SLSA-2020:5020-1TomcatSecurity Fix(es): * tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935)lowScientific LinuxScientific Linux 7tomcat-admin-webapps-7.0.76-16.el7_9.noarch.rpmaa6977941c1bd2072e8fb52668afe505c2954183b66b3542044143bf50d5a61ftomcat-7.0.76-16.el7_9.noarch.rpm9278de0d20e9970c899c261f58a8f877dfda254c508e807a26543581b5f2a1cbtomcat-el-2.2-api-7.0.76-16.el7_9.noarch.rpm21603edf7a3c774277bf9bd700aa3094ba96a1202a280e3b47028eca16978998tomcat-javadoc-7.0.76-16.el7_9.noarch.rpm5cf6522a174594dc8829b733123119299d4b28d31cc1517b9ba363d2e1502949tomcat-lib-7.0.76-16.el7_9.noarch.rpm7b0ac0b8e2b581ecfcdd755f439d5d9f8d1177b580d36862164e42614f57befctomcat-jsvc-7.0.76-16.el7_9.noarch.rpmab625888831656616637f61767d19ed69855e9bc8b5613b1f2b21a614d4c9fa4tomcat-docs-webapp-7.0.76-16.el7_9.noarch.rpmf32c86c05713f79a60c47dc334f63927ee9b7e4c2882a0ec800cf568da8d75d5tomcat-servlet-3.0-api-7.0.76-16.el7_9.noarch.rpmbae2181cfc1afb37bbb46b70c86db7759a895db94e4d2532e82885dec4ad6a76tomcat-jsp-2.2-api-7.0.76-16.el7_9.noarch.rpm6d36a3c8047de2d05a4432fb9e3a2ef78553a6a23865860d8490688bd4f34d27tomcat-webapps-7.0.76-16.el7_9.noarch.rpme143514d193ed8743b67b9e1a19c66408778aa408d716b211c28a4e923a3f833SLSA-2020:5021-1Qt And Qt5-QtbaseSecurity Fix(es): * qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp (CVE-2020-17507)moderateScientific LinuxScientific Linux 7qt-postgresql-4.8.7-9.el7_9.i686.rpm2f990625aac0eaefe277e1d90296642a9b1769a0ab847d974fc6286a24a7c032qt5-qtbase-5.9.7-5.el7_9.i686.rpm496b6233b011be7d3c40f8ca6ba7099784979e45792a5248866fd658d8f3e41fqt5-qtbase-doc-5.9.7-5.el7_9.x86_64.rpm2357df991d7653d7a563cff583d91c69ec6f2a4a8b540b12b8ec0fbe40647975qt-odbc-4.8.7-9.el7_9.x86_64.rpmbe734a03e61cd155d5157f9293d70582a3dec56a806f6d159263e2e43df3453bqt-examples-4.8.7-9.el7_9.x86_64.rpmeafba1d14ae64d4274b6c589e86ec5469654769e36a98ad2c045e854c79d627eqt5-qtbase-devel-5.9.7-5.el7_9.i686.rpm5ba87d3495269210ce50d1d1d8f9f85aca324920ec8afd356a9f1e264e0063acqt5-qtbase-postgresql-5.9.7-5.el7_9.i686.rpm0a15d3c8e425c94919803f505f5c16e79ee114bfa4a0728e8d6c5fea205dc7e6qt-4.8.7-9.el7_9.x86_64.rpmf465ebe6ef7078025b0aef2d83521766c0193731dd513dd340f86e97c40ad4b6qt-mysql-4.8.7-9.el7_9.i686.rpma929b6861f8b6c71c5b8806107be20a35a566658b50f679f7ec99a516832966dqt-doc-4.8.7-9.el7_9.noarch.rpmb1f0394efc9e9b5c449853c0a4b7985aa41366fb86f0b0a5b2a1a04c4a5e21bfqt5-qtbase-odbc-5.9.7-5.el7_9.i686.rpm39a8424c0f12bf955a09694a34d9d52554f1d69487bd25f7bfaefbea7eedf1c5qt-qdbusviewer-4.8.7-9.el7_9.x86_64.rpmc31cd6a5bc81ed156dc959959be0c07c9a77eae076fab9e71bd31c425dc9580fqt5-rpm-macros-5.9.7-5.el7_9.noarch.rpm477f92195f9f353679121b03e73d2c4b1a890938adba3e8de175814c3c5b2203qt5-qtbase-static-5.9.7-5.el7_9.x86_64.rpme6c9d053df810165e1f2ceed63ff22ffc9223f392eac16b7c0446017e7d8bad2qt-postgresql-4.8.7-9.el7_9.x86_64.rpm149eaca53c75a7f7715efa7375b2df5b9e7825188b555992a4bd55aa0d3a4b6aqt-devel-4.8.7-9.el7_9.i686.rpm9e89c257e4ca088f35aaa05d178f8fc7500e8aad245912921618dfad3c3f4539qt-4.8.7-9.el7_9.i686.rpm99a1970527986d3b3cf24e7c62f6b13abecc10a37afb1d5185e37f5913043a19qt-qvfb-4.8.7-9.el7_9.x86_64.rpm7c7dfcdb90154564be2c0bb73e0c60527fa1e3293115df89d59dccc529ee1f6dqt5-qtbase-common-5.9.7-5.el7_9.noarch.rpm1bd4ac9a033b7f25c252543ac7663d0b33543e34b8cc11b6628e6a2535a5ac84qt-devel-4.8.7-9.el7_9.x86_64.rpm5d24d57c02883634e33c1d9ffb5ce1b6fcb0159ad1c355eb3d49db7b325628f1qt5-qtbase-static-5.9.7-5.el7_9.i686.rpmf9be3f2d2203d1e2fcca65c02e36c78a22cecb1f9e11d8585ff624120f847bcbqt-assistant-4.8.7-9.el7_9.x86_64.rpmcb546610e2a63c8897ebbae15c0c09c5df5dd8cfc8339dee8a9697fc5b98567eqt5-qtbase-mysql-5.9.7-5.el7_9.x86_64.rpmc0e467fe03493409c25efa83cd410e575e50bf5efb6592d7548fdc194873c39dqt5-qtbase-gui-5.9.7-5.el7_9.i686.rpm8410d859b7b9b6895b658d281e39f178f170fffb144fa4a96cf695b8d3f181a2qt5-qtbase-examples-5.9.7-5.el7_9.x86_64.rpmfde83ba6b73398217a03eacb43561b1efe091402f0e46c8bafb7b2c39e129ea1qt-odbc-4.8.7-9.el7_9.i686.rpm266ec15244d156419688218c64525e94997973c67cd35fcd430cf705691701c9qt5-qtbase-odbc-5.9.7-5.el7_9.x86_64.rpmddd010fb1e2ac6f97354294d8f0b4fabbe246258d2ee3a8ebd278813a1382fd8qt-mysql-4.8.7-9.el7_9.x86_64.rpmc78b158f03cd6cd903729cce4953053c132ef22fa81777395da63ea4fbfae809qt-config-4.8.7-9.el7_9.x86_64.rpm4fd2cea00c844b2380defbe708ee6002c8a61625f882effe9faad668f8946803qt5-qtbase-gui-5.9.7-5.el7_9.x86_64.rpm1bdf02c469fd8c928c5f7bc4577cf91d538e5948c64d99dd3cce9717fa353a08qt-x11-4.8.7-9.el7_9.i686.rpm998752272c7d54ce4a591d170f4f8197ef8c7a373c5ca88230adb00b199eb56aqt5-qtbase-devel-5.9.7-5.el7_9.x86_64.rpmf88198b4c90ff9433ca2a2051df7211a64a455f9d78a234769c486c9986ac744qt5-qtbase-postgresql-5.9.7-5.el7_9.x86_64.rpmc666834945473919c0e820375fc1f95feb723453ddab373bc21413acf4056d0eqt5-qtbase-5.9.7-5.el7_9.x86_64.rpm4e32bb93412d4410552a25aee3725c4e54e83cde7570a39112c0fd22c91467f0qt-demos-4.8.7-9.el7_9.x86_64.rpmb138388f394bccf5081a71cbfe11077b9d1293aab2cfabbc8d645e828dd2fd00qt5-qtbase-mysql-5.9.7-5.el7_9.i686.rpm929dc10998613b29239d2d0c0df5ff67bfbf9ae456727ec0f4ab2ac7496a9f11qt-devel-private-4.8.7-9.el7_9.noarch.rpm5340530c5e9e64293ae99b4eec8571eb6b5bb68e23ee1e54c806ebf25a337ae1qt-x11-4.8.7-9.el7_9.x86_64.rpme6d8cf8f67ced43c167000c58fc99685d0279f60bf240565e821ecad0c1f67e7SLSA-2020:5023-1KernelSecurity Fix(es): * kernel: buffer over write in vgacon_scroll (CVE-2020-14331) * kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811) Bug Fix(es): * [OSP13,mlx5] SRIOV VF still sending traffic when PF is down * gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk * GPF panic in qlt_free_session_done+626 * [ Brazos ] "Core(s) per socket" and "Socket" values are interchanged in lscpu output. (kernel) * megaraid Aero: call trace observed during reboots * Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool * The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced * tcp_fragment() limit causes packet drop under normal TCP load * ip link command shows state as UNKNOWN for MACVLAN interface * Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug * [SL-7/mlx4] ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] * Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV * kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome * Null ptr deref after nf_reinject->nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct()moderateScientific LinuxtrueScientific Linux 7kernel-devel-3.10.0-1160.6.1.el7.x86_64.rpmfa43ac3b28b2a8ab4caaaff4c501aaa62eb34f17d175b59668859842a2dfc67bkernel-debug-3.10.0-1160.6.1.el7.x86_64.rpmbe5779f6ededf4a8c550a4c6ed791e39823ebd7af2ee0aefa2042ae67ebb33dakernel-tools-libs-3.10.0-1160.6.1.el7.x86_64.rpmae5303acd4a7d66ac9451fd20e8165b57d9049c0ba2c78c5447419aebc511406kernel-debug-devel-3.10.0-1160.6.1.el7.x86_64.rpm6f1b80feb6f65d1f20927fce25cee1c4070164eeb39a4e0247cf7cafa574fffeperf-3.10.0-1160.6.1.el7.x86_64.rpme8d3cf4b090395d832d9b94609de61cc6e05b8882aaa11c0bce3f2467bbee963kernel-abi-whitelists-3.10.0-1160.6.1.el7.noarch.rpma22cea3e44550afadd16969a5e1e921fcb265865c06e12a02f28a45048c6c12ckernel-tools-3.10.0-1160.6.1.el7.x86_64.rpm35379a584782bb5df8ca0f8ce2d9aeab27ce17bf5c63d748d6cf49a2f4686b08kernel-3.10.0-1160.6.1.el7.x86_64.rpmb8a8c00cf831a57b9ba0ddcc51dda482b846d42992c80ae25b23f54429b4a697kernel-headers-3.10.0-1160.6.1.el7.x86_64.rpmb5cf9d49c2f50a57f515fda688ac10e942090ce5336eda682507913e9cc6692cbpftool-3.10.0-1160.6.1.el7.x86_64.rpmeb459b8bea04b524153136161e04a74bdc58d71fbbdcecf2c5312c67abac7349kernel-doc-3.10.0-1160.6.1.el7.noarch.rpm56f33f85d9f3a92f5b629f9b0e6533bcbba80e6aaf7636c660214210f6313adekernel-tools-libs-devel-3.10.0-1160.6.1.el7.x86_64.rpmf70f095585c8e87bfadb97237bf57c2bcab6d063838b2de7ed3e3bd6b07a5129python-perf-3.10.0-1160.6.1.el7.x86_64.rpm3cad1140ec4766ed2b2b01cd82d19d1f706fd5b2f813c63d97c5d804a7ab1166SLSA-2020:5040-1LibvirtSecurity Fix(es): * libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)moderateScientific LinuxScientific Linux 7libvirt-nss-4.5.0-36.el7_9.3.i686.rpm2834e674277a3d4e5c7b920b64448cd37bd2adc9ad0b75c0673a883b5cb42af0libvirt-daemon-config-network-4.5.0-36.el7_9.3.x86_64.rpme52837fd79aa0d9826502e8fc0fc99fe6040d6d83650ed563e063623cfab3276libvirt-libs-4.5.0-36.el7_9.3.i686.rpm46b60bd7c943bde038f8269c067525f00f0a93a8ba84daaadb4a8baff822fe78libvirt-nss-4.5.0-36.el7_9.3.x86_64.rpm7234513bca5e17ca7de87da8f24343e09ea045c9e45fa1349b5d391b53d046f2libvirt-daemon-4.5.0-36.el7_9.3.x86_64.rpmd39fae834251654f0e4be3f781d29f24b50126708581f7db9983f195d84debf6libvirt-daemon-driver-storage-4.5.0-36.el7_9.3.x86_64.rpmeb732df91cd5bfefea2c0e1ef932e89a2ab33cb3eb0215cbe3aa3d8175c53902libvirt-admin-4.5.0-36.el7_9.3.x86_64.rpm7aa1a1b7fd3f1ca0cf554f60e93d42021762187e81a733e813184f208e275955libvirt-daemon-driver-storage-disk-4.5.0-36.el7_9.3.x86_64.rpmba769f4988875848ca17fce27df881b29a65f835e8ac237c7f7a8575a40d7973libvirt-daemon-driver-storage-core-4.5.0-36.el7_9.3.x86_64.rpm73bf5e1ce2f47e28417ca23a447dd3bfed734385d78204c930458c3deaebeee7libvirt-client-4.5.0-36.el7_9.3.x86_64.rpmcb146dff7ec24a5bf7cd1a26acb894693db3c5edb11344ccd3c3bf945bab20a0libvirt-daemon-driver-storage-scsi-4.5.0-36.el7_9.3.x86_64.rpma02e55e98bac0ae38460a3dee0335f4c09db03805b94c3e8a5406dacdf32a152libvirt-daemon-driver-storage-logical-4.5.0-36.el7_9.3.x86_64.rpm59f3951acf83f1ec0815442186beb088b5da8c52d531f1d94816e8a300703fa3libvirt-daemon-driver-storage-gluster-4.5.0-36.el7_9.3.x86_64.rpmc029da9d94f4e235fb8c6e39e2c5bbbf7351bd2ac3393e59812213fbd7e90999libvirt-login-shell-4.5.0-36.el7_9.3.x86_64.rpm454d51418987da1014849d4132925cdef134737d1d08fb1cfa779c89c19a3924libvirt-daemon-driver-qemu-4.5.0-36.el7_9.3.x86_64.rpm050ef515b3c64595620bf6d53a462b54936c3dfe4126a4fdc609cc9a53d9dda1libvirt-docs-4.5.0-36.el7_9.3.x86_64.rpm0235ba04c3a98a9b5d2d31e85027b2a62fda74d77152debd17e4e99064e8a3e7libvirt-daemon-kvm-4.5.0-36.el7_9.3.x86_64.rpm1f62e1ba3e85b38d3025b12c077dd9caf6641a553330ddd49f01479942dfafbflibvirt-devel-4.5.0-36.el7_9.3.i686.rpme02dccd71df37070314abbf77e7e94e6eb1bae0729fe537cc6e981013716fa58libvirt-bash-completion-4.5.0-36.el7_9.3.x86_64.rpm3dfc31f773bb1efa5ef5e687088ab0f1b47fdaf91cd7e929a6f7c385541ccb37libvirt-daemon-driver-network-4.5.0-36.el7_9.3.x86_64.rpm0efbfbc232bcaca3fedfd060b20a8283fc7613f565f6048d0518818441c089c0libvirt-4.5.0-36.el7_9.3.x86_64.rpm157e09bbc77984eafc509c3191726f1dc17fa954ae54bdf641158f7fe20cf557libvirt-daemon-driver-storage-rbd-4.5.0-36.el7_9.3.x86_64.rpm93fbbb3a834d068f53db7b551ba09e14ecb5b2e3fd93582f968124aede4d96dclibvirt-daemon-driver-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm1b59823c76125992f394d22eb838c8c0478a1f5deca52420b620ef0fcb6932f9libvirt-devel-4.5.0-36.el7_9.3.x86_64.rpm7d0ec88254e280eeb07bdf1bb1252c900681099c26df13ad3245a7e3bde7b64alibvirt-daemon-config-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm57452d96f8978a1410c3ef2338fe270c97148911d03e9debba47513a2cdb9c1blibvirt-libs-4.5.0-36.el7_9.3.x86_64.rpme4860ecebc9088da31ce413a567de94ecf49d342e5bbcaae46ebe7087cface77libvirt-daemon-lxc-4.5.0-36.el7_9.3.x86_64.rpm505fdac487bef830c4d4567539061bf5c9fed6948c86ae44b98fd191025af572libvirt-lock-sanlock-4.5.0-36.el7_9.3.x86_64.rpm664362fcb2c8a7b8ee0bdfaf8c52138a82c9483bd9218a414850e9a21f4aaed6libvirt-daemon-driver-nodedev-4.5.0-36.el7_9.3.x86_64.rpmf5bf6a17338facb41aa3bb9612efa5e11af562e49ebfdef125efaecfa993cedblibvirt-daemon-driver-interface-4.5.0-36.el7_9.3.x86_64.rpmb83688c176dbdd74fb82d3ce011884783b08005d08bd554dffd76245bd1d5405libvirt-daemon-driver-secret-4.5.0-36.el7_9.3.x86_64.rpm5cf289a88e882a0dc6dfffd8e313c4fc5c957a4f3b4f352a04a1ae18226f94b1libvirt-daemon-driver-storage-mpath-4.5.0-36.el7_9.3.x86_64.rpm10f8c9d89b219b32a7d6f3d52e2f9431d37878c6a14c8c463148e6921bdb38ealibvirt-daemon-driver-storage-iscsi-4.5.0-36.el7_9.3.x86_64.rpm9b80a91b5a9f66eafe3468984eea8a0972f7b87dd2cc42f4c75491d687e0b1b7libvirt-daemon-driver-lxc-4.5.0-36.el7_9.3.x86_64.rpm9c92d5f80c668de652d744c66676942226c077b22154a8834a69ff2ba0d9b75flibvirt-client-4.5.0-36.el7_9.3.i686.rpm14bb3afa97114d6eeffeb31b1eb538b277f938a05301296d515b7678e4061d07SLSA-2020:5083-1Microcode_CtlSecurity Fix(es): * hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) * hw: Vector Register Leakage-Active (CVE-2020-8696) * hw: Fast forward store predictor (CVE-2020-8698)moderateScientific LinuxScientific Linux 7microcode_ctl-2.1-73.2.el7_9.x86_64.rpm69c381a9699c988fbdc4fd0b3bf8fa247e4ecd50868a7e2dda3900188d845d0eSLSA-2020:5099-1FirefoxSecurity Fix(es): * Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)criticalScientific LinuxScientific Linux 7firefox-78.4.1-1.el7_9.i686.rpme94ecc4b20facf2606282703cebc3026a4dedd3039002f228c9c9c7e379fb682firefox-78.4.1-1.el7_9.x86_64.rpmba519645c1953d71030a3ab3e27da0c317a547ef9d7fdd4fcb158af75e5f3fa6SLSA-2020:5163-1ThunderbirdThis update upgrades Thunderbird to version 78.4.3. Security Fix(es): * Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)importantScientific LinuxScientific Linux 7thunderbird-78.4.3-1.el7_9.x86_64.rpm92c042553512da9c96c8ee1f78a34771072021043df5e88a87657128ef708ae9SLSA-2020:5235-1ThunderbirdThis update upgrades Thunderbird to version 78.5.0. Security Fix(es): * Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) * Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) * Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) * Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) * Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) * Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) * Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) * Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) * Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) * Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)importantScientific LinuxScientific Linux 7thunderbird-78.5.0-1.el7_9.x86_64.rpm4aeda6a0fc5b123d030ff8d61dbe999dbc7911a850bd5ec4dc587824b0165205SLSA-2020:5239-1FirefoxThis update upgrades Firefox to version 78.5.0 ESR. Security Fix(es): * Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) * Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) * Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) * Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) * Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) * Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) * Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) * Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) * Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) * Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)importantScientific LinuxScientific Linux 7firefox-78.5.0-1.el7_9.i686.rpma01136ebd107e00f13819a1ff47a00f4cbfeb618cdbf488899e2a52c75436684firefox-78.5.0-1.el7_9.x86_64.rpm2a9ea789628f4859bab83c8ccf1e5fb214ddecae7f670f550109871358f6f0c0SLSA-2020:5350-1Net-SnmpSecurity Fix(es): * net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution (CVE-2020-15862)importantScientific LinuxScientific Linux 7net-snmp-5.7.2-49.el7_9.1.x86_64.rpm5f6a4f07a16a430a5b5bfba0cdb49f4bfc4d1e82080aea19d098c9b941d9dbe5net-snmp-sysvinit-5.7.2-49.el7_9.1.x86_64.rpm51b05cd2c54b3e2bd5925721e2bb6fbe877dcf442c355aeb026b2ab7ef226f1anet-snmp-devel-5.7.2-49.el7_9.1.i686.rpm28dff9113f62a657c99729c6b0820921088723d1e2e36f196f4397e59ea9ba16net-snmp-perl-5.7.2-49.el7_9.1.x86_64.rpmaacc4173eeb02c57b5cc603e87ff09dc3a4ef9e0a2a56b1c222d24ffe71d0378net-snmp-gui-5.7.2-49.el7_9.1.x86_64.rpm0ef72584b2f56c25f567db0b159846d0faf805414aa22a99d0a2a9124df784a2net-snmp-libs-5.7.2-49.el7_9.1.i686.rpm5784605d171bbbd0bd502566b65fcf1fd6a7fcd2f265986217732a1a38dbee40net-snmp-python-5.7.2-49.el7_9.1.x86_64.rpm8bf9e96031cfb8602feea8e199798171335e163802f8142bb6de4eadfcc732aenet-snmp-utils-5.7.2-49.el7_9.1.x86_64.rpm583d10cddad6c1df718a9d6240aae5d363b041f98f6297f5db023169b5cd3b93net-snmp-devel-5.7.2-49.el7_9.1.x86_64.rpm4db5985d46f717d6201094c9d68072769154cfb8cf8ad20bd8ba5483aba0c9cbnet-snmp-agent-libs-5.7.2-49.el7_9.1.i686.rpm9844acef0228629f571c059899ca877686ded22a947c3273c28ce700a142a27dnet-snmp-libs-5.7.2-49.el7_9.1.x86_64.rpm6413cc63e27157a63f2213d9d33f8c3d0dd24d69c57973a0c5c54bcd2b35419cnet-snmp-agent-libs-5.7.2-49.el7_9.1.x86_64.rpm4772c5fea319e3ef852b4455691ab029d4376fada1b836c313b524699f279811SLSA-2020:5400-1ThunderbirdSecurity Fix(es): * Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes (CVE-2020-26970)importantScientific LinuxScientific Linux 7thunderbird-78.5.1-1.el7_9.x86_64.rpm7204232e5916e30474537b49e8e3c380d323cb508133e2a3f272e2675f6c6b17SLSA-2020:5402-1LibexifSecurity Fix(es): * libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)importantScientific LinuxScientific Linux 7libexif-0.6.22-2.el7_9.x86_64.rpmefbb1fc8a925b088d782730b192f4f3261c241540dbc16525fda27d7fef82897libexif-devel-0.6.22-2.el7_9.i686.rpm2074ac598018d8710f20fde5efeef22a67981e962c305d38de81c36dfbe22cdelibexif-0.6.22-2.el7_9.i686.rpm6dc932c606a8b0b97108d1313fe5d3b59706d7feaa9d4ea4404b25eed3b2422elibexif-devel-0.6.22-2.el7_9.x86_64.rpm390e5bc8b3656b1360b772fd168205e8632a1bbe2c3c20340e617ee5d4f9ef2dlibexif-doc-0.6.22-2.el7_9.x86_64.rpm037a55132984a0bd769eb3194ef66167ad9badf0f745e36d5cd34f40e88b48d5SLSA-2020:5408-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) * xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) * xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)importantScientific LinuxScientific Linux 7xorg-x11-server-Xnest-1.20.4-15.el7_9.x86_64.rpmb43f75f93755916cd7662809f920674ff0ee386549c0c1425cc08a180aef832bxorg-x11-server-Xephyr-1.20.4-15.el7_9.x86_64.rpm1dd324a9b38007b9921ab6ca548aef439afa6b55470d00a8549f6d93eb4c43f5xorg-x11-server-Xwayland-1.20.4-15.el7_9.x86_64.rpme0ac1be16eddcef7251eab2e5914fbe32fa46053d7e52c533a3529dbf537fdf1xorg-x11-server-Xorg-1.20.4-15.el7_9.x86_64.rpmbd4762bed5392c807dfe22257611857ae4ff9775f8864505a2c88f549d561f61xorg-x11-server-Xvfb-1.20.4-15.el7_9.x86_64.rpm97c2405899a3c2cc2e38b12158a34ef817b67bc043c72a1da2b1aa67f6608699xorg-x11-server-source-1.20.4-15.el7_9.noarch.rpm28092e85516bb3ad3abaaa0a8b12b886194e9a4ab782b91d22231fecb2c2b59dxorg-x11-server-devel-1.20.4-15.el7_9.i686.rpm21aba054790d48f8b74cd55320fea0b6b2b8bd4afde2619f98143688b977283fxorg-x11-server-Xdmx-1.20.4-15.el7_9.x86_64.rpmcccae5645a379eb7651f950e94e10ff2c9b9eb125ff58b3482125c9e41e461ecxorg-x11-server-devel-1.20.4-15.el7_9.x86_64.rpmce9b2f9a96cb6f7e910bee5639099c84ce13bb87dc6a8d001c67dccb4195668dxorg-x11-server-common-1.20.4-15.el7_9.x86_64.rpmb3c791887936cc4ae55234af68d275037b4d90c2f0823745aa024e7b6cc7b138SLSA-2020:5434-1TargetcliSecurity Fix(es): * targetcli: weak permissions for /etc/target and backup files (CVE-2020-13867)moderateScientific LinuxScientific Linux 7targetcli-2.1.53-1.el7_9.noarch.rpmf1961207eea2a46a9b25e2d7d57195737a0fe1065b3b41498db025f6c36b0b49SLSA-2020:5435-1Python-RtslibSecurity Fix(es): * python-rtslib: weak permissions for /etc/target/saveconfig.json (CVE-2020-14019)moderateScientific LinuxScientific Linux 7python-rtslib-doc-2.1.74-1.el7_9.noarch.rpm38c2d69ce491410d16dcc623d71d2ba6d7cd30792f3efd20768cbe67df54f372python-rtslib-2.1.74-1.el7_9.noarch.rpm34ed38fcd5a5d16bf9c664b9a92f7daf7464ec726c1e79df4b99d50df1737d45SLSA-2020:5437-1KernelSecurity Fix(es): * kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385) * kernel: The flow_dissector feature allows device tracking (CVE-2019-18282) * kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. (CVE-2020-10769) * kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314) * kernel: umask not applied on filesystem without ACL support (CVE-2020-24394) * kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212) * kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)importantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-1160.11.1.el7.noarch.rpm8c4901a1254d52706a8026f9afa5b964c896fa61d871a47079c886e5434978bbkernel-debug-devel-3.10.0-1160.11.1.el7.x86_64.rpm074a2ca70735365ae82e9859c9fb8820f3d264b5eebd7f7384fddb980c8d44beperf-3.10.0-1160.11.1.el7.x86_64.rpm3e60b1603a251cb4af8f03c0bc08ef03504dda7ef9e0d50efc34f888cb7bc920kernel-tools-libs-devel-3.10.0-1160.11.1.el7.x86_64.rpmf3984b7e00b733ed304ad9d2d1ad2c6d9030b3e8a3cc5430f7cf112a2ff1ce12kernel-tools-3.10.0-1160.11.1.el7.x86_64.rpm0756af1a558d435b5a1b5788bba4d62c3ce18384bea6d923907834a4d391ca89kernel-headers-3.10.0-1160.11.1.el7.x86_64.rpm18f207344f466c5b6e74407601a61ea3185e644570f53fdb7df45290e5857e99bpftool-3.10.0-1160.11.1.el7.x86_64.rpm613af626396059c1078e7f852972e17b69faf1df7b048d6b581f4298a67460f3python-perf-3.10.0-1160.11.1.el7.x86_64.rpmf074050a3bde5f5f20b5402b58a3aab71f9cb94edbd5bef991c127e9f463bde7kernel-3.10.0-1160.11.1.el7.x86_64.rpmcf318a19af37dcd5a560f417ec291a5766a60ec24e9eb2d762f936beb26e6a47kernel-tools-libs-3.10.0-1160.11.1.el7.x86_64.rpm91db286c495fd0f265c5bc0289268239c2d0303c21844bf1415b0310ca867a66kernel-doc-3.10.0-1160.11.1.el7.noarch.rpm4b790062be5b1197903241e00a4ce71a06e3b3952ee700a67880eebdd161b388kernel-debug-3.10.0-1160.11.1.el7.x86_64.rpm01b2018f24bebe98aa6e01b7c5459bf12743278485212b48fe8f9bddd59eb947kernel-devel-3.10.0-1160.11.1.el7.x86_64.rpm01b394eb16a7a6be9c376e088f71a0c44eb4249a28c05fe9a72d53631fb08a81SLSA-2020:5439-1SambaSecurity Fix(es): * samba: Netlogon elevation of privilege vulnerability (Zerologon) (CVE-2020-1472) * samba: Missing handle permissions check in SMB1/2/3 ChangeNotify (CVE-2020-14318) * samba: Unprivileged user can crash winbind (CVE-2020-14323)moderateScientific LinuxScientific Linux 7libwbclient-devel-4.10.16-9.el7_9.x86_64.rpmb076a9f33db35192bbe69ddc9517f2144661cb2756de1d628b5de2ab5a334c7bsamba-pidl-4.10.16-9.el7_9.noarch.rpm3a45929ff73f086c20b0a688e69ef39579cf32ef1e9c5c96c7710496c79ffadbsamba-test-libs-4.10.16-9.el7_9.i686.rpm440286e7959b0a2cf2a559cfc8bf7c5842d258b6f43a0b2a02247cb90f44d6a1samba-common-tools-4.10.16-9.el7_9.x86_64.rpm00c9de7f1cee8e94b586633ba12a1646f89d9575bfc324aa6e9893adbd412b8csamba-winbind-modules-4.10.16-9.el7_9.i686.rpm2efb086f89ba6912cef4104107b9dc01431fdfa669245c1fc061a97749b406b4libwbclient-devel-4.10.16-9.el7_9.i686.rpme86d831cbb14eea16e57267c13a3bfdf06cdec971de24c476e14371a01006b89samba-devel-4.10.16-9.el7_9.x86_64.rpm38f0416a4ecb0e7ebb6bb334f9a75709e2c8e2188270fefea9966db2e6a69ffbctdb-4.10.16-9.el7_9.x86_64.rpm612a9671a5afdfbb3e174a8b747bf1c96e2c5bfb515bf7a93df196c71d5d139bsamba-krb5-printing-4.10.16-9.el7_9.x86_64.rpmd78679a5aa74bcda36d9974620f0b8cfedec6e1f47a91fbce65ae5e23d5b3490samba-test-libs-4.10.16-9.el7_9.x86_64.rpm0b91a59f9c5d32bae9d04b11b50595a48e404f15b4028c9dae01329507923dd8samba-python-4.10.16-9.el7_9.i686.rpm40217003284ac87071f9769e54b664943c738205ae94df6c9f13321692a77a04samba-4.10.16-9.el7_9.x86_64.rpmabf987af637efa73be4eac3641569c7bc4cfee8b251450d6a1370756a74cb1d2samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm031218649908fa353e5a8c2af61e9054cb39ffcfc8264ee8ac7a677440b4d9d4samba-test-4.10.16-9.el7_9.x86_64.rpm3ab1e89086f913190e3587876a6da9484d97916ccc0302bd04884a9913c55919samba-client-libs-4.10.16-9.el7_9.i686.rpmf80fded3dda885bdf26417baaa147b6d4d7961990adc48677e2e419d3a5b56c2samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpme4fab9053b7ba9b38722867bfdfb42fe7c990e577baaedefe6b50c7e0c75dfd0samba-winbind-4.10.16-9.el7_9.x86_64.rpme3ea6c53cd4e4a8dd2ad0a380c0d55f72d28c563ff59e6cdb5464de51951d18dlibsmbclient-devel-4.10.16-9.el7_9.i686.rpm4db73018e1489cf37ea5ed6abdfc1250946046971a05741eb565a17d513c4471samba-common-libs-4.10.16-9.el7_9.x86_64.rpm46407be156046b26ccbcf0cf131c8a692ce20c4fbfd186d31939e623f5defb39samba-libs-4.10.16-9.el7_9.i686.rpm519e0a4e6bb18214cfa971b232228ff43feda3f36ed123c177ff2ce00feb5b52ctdb-tests-4.10.16-9.el7_9.x86_64.rpmb5ecc1bc7a4e2f1a0c2083725d83c7e9d14a464e2d5fe429bb516da24a5e7b6esamba-common-libs-4.10.16-9.el7_9.i686.rpma9501b4b0918e9be3d9fef799513020f2f61a6dac411d9c87427d70b1df1b002samba-libs-4.10.16-9.el7_9.x86_64.rpm3920df3a2074dcb6633966fda57013415d63549b3a51e8fa993c57af2d8b0e19samba-dc-4.10.16-9.el7_9.x86_64.rpmf271d4c8fc59778b3b8546be5c012d971833fff265e96060c707ea6a9cb543ablibsmbclient-4.10.16-9.el7_9.i686.rpm56efcdcd4fe1755029a174cb76499b2bfece3ec8f226435265a7b1d18f3444besamba-common-4.10.16-9.el7_9.noarch.rpm8042e4e4498238bd6f4eeeef17522327228b39708be95839399d54209c0cf126libwbclient-4.10.16-9.el7_9.i686.rpmbfae295faf35a3784d08fd0cc0e76ab928dfe85a67e8542b97318740b7ac5cc2samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm3132857bdc0fcec518e8acb2b76662447c28bc201249fa6acb401b75da54dad6libwbclient-4.10.16-9.el7_9.x86_64.rpmfacd100d567679a5e3aa45f595cedbfa4197d17c4521c3fb59dd58696491aaa1samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpmefe3852c88c046489eecb30a7b8a61e8fc9f02b0115a70f058721293394c21acsamba-client-libs-4.10.16-9.el7_9.x86_64.rpme326f21e78e4f94efcd3c3d83cfc199c4e73af0b5feb4a2726c784fa11b409aasamba-python-4.10.16-9.el7_9.x86_64.rpme8cca8a7f801b65b906a85bf563bb92a26cd1f1cea813b09c411a24a6825c2desamba-dc-libs-4.10.16-9.el7_9.x86_64.rpm2909b4efe04c93c004227897e2fb7a63a02d8bf698b8ced94d01c672d69cde93samba-python-test-4.10.16-9.el7_9.x86_64.rpm2a3764105780fcec87cfc7bfd12f80e964d091148cc161ec6f2e8b8d5c6a50afsamba-client-4.10.16-9.el7_9.x86_64.rpm66843da5bf400fc5a2b51436f14a76168fe62e236105023477f2de19c4110b8dlibsmbclient-4.10.16-9.el7_9.x86_64.rpm9ffb0c883afdde797002ba30d19b5e199cbbe4c7606cbabe8b1822cb3a6d131bsamba-devel-4.10.16-9.el7_9.i686.rpm090851bfc72aebe18ed191ca16a3cc57251a653a9381c485872cea5f58232254libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm3358e17bd6642a2f9ca9247da03aaf13d2b635b0c225a12a5a25064c0b5c8f15SLSA-2020:5443-1GdSecurity Fix(es): * gd: Integer overflow in _gd2GetHeader() resulting in heap overflow (CVE-2016-5766)moderateScientific LinuxScientific Linux 7gd-devel-2.0.35-27.el7_9.x86_64.rpm649bdfb3f448048e424b079817af7ac828e5133323f87bd84aeea5fac6c348cagd-2.0.35-27.el7_9.x86_64.rpm8b22d155263ae48053312e120ad698f6691a26cbdcb53a29352683ed3c58ef31gd-devel-2.0.35-27.el7_9.i686.rpm6098eaf3c89f9adc5feb38e58ebc2cbd2740ba4e3fc45e79edb50c313ff4fe77gd-progs-2.0.35-27.el7_9.x86_64.rpmc1a23e3027865afcf15a1d2e06244f0b21f0ce8db329622b8d14e7e81704db26gd-2.0.35-27.el7_9.i686.rpmb6a019ac8d2811b6eb3296ab2c7e6a72c0bb66a0c848d53764d54111c462c601SLSA-2020:5453-1PacemakerSecurity Fix(es): * pacemaker: ACL restrictions bypass (CVE-2020-25654)moderateScientific LinuxScientific Linux 7pacemaker-1.1.23-1.el7_9.1.x86_64.rpmae3bba33a30bb03d79e842d929b208994522c37c9977689e76b884755b38dec6pacemaker-cts-1.1.23-1.el7_9.1.x86_64.rpmf7ab16be28c957f828ec50d955adfb38bfe761e1227191b1d0f81dd5f2ed8eb8pacemaker-cli-1.1.23-1.el7_9.1.x86_64.rpmd0087929e1f47f53190f5fbf4d8fe27e38a25bc761ca9ba9588ea414ba4d7657pacemaker-libs-devel-1.1.23-1.el7_9.1.x86_64.rpm7cec82a8fa695ce95c8dc6a9afd2a81953378a288b588f3bc9625de7919da188pacemaker-libs-devel-1.1.23-1.el7_9.1.i686.rpme31001032b9a817b564d4c6c391c732fcce21415a6286678668fef5a87b0e9eapacemaker-remote-1.1.23-1.el7_9.1.x86_64.rpm51d1edcf063c3879e8ab0eea384d56bed87768ca583037f2be802612ead7bf59pacemaker-doc-1.1.23-1.el7_9.1.x86_64.rpm993efca7ba035e125ad01223a8b75047cf4db2c60a2d463655c1cbecc8e38725pacemaker-nagios-plugins-metadata-1.1.23-1.el7_9.1.x86_64.rpme0bba6c20f230d4333a2b050b2fc240886d29b28aca71b1675efe08397bd4a10pacemaker-libs-1.1.23-1.el7_9.1.i686.rpm02d2eb1cf8b91bb2e0c736fafd47e28f0f2f721980e93a7f3ac7d7ca85e10075pacemaker-cluster-libs-1.1.23-1.el7_9.1.i686.rpmb323aa8453cb317274a80e53f4b62ad3a90fc6aa19354a9f555e9c8656cacd90pacemaker-libs-1.1.23-1.el7_9.1.x86_64.rpma0ea29234910e70b9d1fa10fd7f12dab0a432c90dd75fc5c556e5e83c131253fpacemaker-cluster-libs-1.1.23-1.el7_9.1.x86_64.rpm83b6faf7f1326a0139ff3b89a28d8e314962a83618d819a1fd9033638c3b020aSLSA-2020:5561-1FirefoxSecurity Fix(es): * chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) * Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) * Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) * Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free (CVE-2020-26974) * Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) * Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) * Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)importantScientific LinuxScientific Linux 7firefox-78.6.0-1.el7_9.x86_64.rpm0d6c4bd288c7d0a631ae8312388c5237d3f3d49d362067931f0c964cbac8b520firefox-78.6.0-1.el7_9.i686.rpm5c1c1f487c0ee722a18c9d0a2d1773a488d2035cd91be329429dfc49017c2fffSLSA-2020:5566-1OpensslSecurity Fix(es): * openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)importantScientific LinuxScientific Linux 7openssl-libs-1.0.2k-21.el7_9.x86_64.rpm4ab783a4b56a43eaa048038f945673f33909a21827029d5ee93b4c81b2f4d92eopenssl-static-1.0.2k-21.el7_9.i686.rpm5324134a3422bb4d2e370d8fd60b425f256ffce1ca7b2f9b5f1766915a5ae87bopenssl-static-1.0.2k-21.el7_9.x86_64.rpm25730dc215dab87a5e0cba02d8dc32feb2ad2b924d97e568eb75d86c2377ab8dopenssl-1.0.2k-21.el7_9.x86_64.rpm4099de643d8ffb0d9d7adfd5fcd3b57be8aa259b40a444e71e2bdbfe398ec449openssl-libs-1.0.2k-21.el7_9.i686.rpm2f99416e28a3c658927d78ec90fccfc640eb34bc303f9fa15688a0f049acfb86openssl-perl-1.0.2k-21.el7_9.x86_64.rpmd3f15aa14d37b7458ce9c8f81ad92b40434161a838e064006949813cadecffc1openssl-devel-1.0.2k-21.el7_9.x86_64.rpm2ff54248f85df13efadba6fe2669cfb9cbc7cfd6901218fb56f02821dc6255c7openssl-devel-1.0.2k-21.el7_9.i686.rpm6b0eba3b5d8c40fc55a6cbb70138d15c50baf2325cf5f637ff2696afcda2d7a0SLSA-2020:5618-1ThunderbirdThis update upgrades Thunderbird to version 78.6.0. Security Fix(es): * chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) * Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) * Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) * Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use- after-free (CVE-2020-26974) * Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) * Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) * Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)importantScientific LinuxScientific Linux 7thunderbird-78.6.0-1.el7_9.x86_64.rpm24422101a4101285534840c54c1008ac45327f0e93b99ebec74e41c60d009b27SLSA-2021:0024-1ImagemagickSecurity Fix(es): * ImageMagick: Shell injection via PDF password could result in arbitrary code execution (CVE-2020-29599)importantScientific LinuxScientific Linux 7ImageMagick-perl-6.9.10.68-5.el7_9.x86_64.rpm35ed20c4a1405b7be51394d2770f8a6cb1ce8727ae75d6d3dd7e11d21181344bImageMagick-devel-6.9.10.68-5.el7_9.i686.rpm38a5bc8854084aea0e436621674b7342c734829122be1f2058521c6a81b1df89ImageMagick-c++-devel-6.9.10.68-5.el7_9.x86_64.rpmc2557d70027530bb4e624c9789ba066907eb63145e00bcc4191d80800f6f14a9ImageMagick-devel-6.9.10.68-5.el7_9.x86_64.rpm263a8c54000db5a2c00dc0d1c8c6eb6c498857eaa6dfcc32979da35f66bdbaa7ImageMagick-doc-6.9.10.68-5.el7_9.x86_64.rpm1902faa24f58f417c8470021e076e97d10952b55e960a365d261c3badc438d29ImageMagick-6.9.10.68-5.el7_9.x86_64.rpm007a874cbb5e96e0ec9d091dc1e1375f5163bc7b51fb924b588b4a9e89693d33ImageMagick-c++-devel-6.9.10.68-5.el7_9.i686.rpmb456d51876febb32c76dac09baa9c049c2a05189e8faf5b3b031170cf506b943ImageMagick-6.9.10.68-5.el7_9.i686.rpm962a00fd6dd0394c38fa745e7b153b4fc4604d16450524ee89d4c89d2c4ae7dfImageMagick-c++-6.9.10.68-5.el7_9.i686.rpm8c7cb49693f69f88cfce4cee36178f33bbb1569e4f2b33f3c279dfffc162bf40ImageMagick-c++-6.9.10.68-5.el7_9.x86_64.rpm203e4810eb5b87904246399de6deec2bb5476e647432cc3fb3cb783a63f969f2SLSA-2021:0053-1FirefoxThis update upgrades Firefox to version 78.6.1 ESR. Security Fix(es): * Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)criticalScientific LinuxScientific Linux 7firefox-78.6.1-1.el7_9.i686.rpm4f8f75fe33d42ec9e805e56187ee91e42c099a99a22371bdd370f5acdf4717a0firefox-78.6.1-1.el7_9.x86_64.rpm8b08548589ca2d090a5090b87ad796bc4b16114224126f9945f0c0f89a03a6deSLSA-2021:0087-1ThunderbirdThis update upgrades Thunderbird to version 78.6.1. Security Fix(es): * Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)criticalScientific LinuxScientific Linux 7thunderbird-78.6.1-1.el7_9.x86_64.rpma9297af8abb6b9ee3f7c109429da762fde47e129d27893f0aec68f2cfb840ce8SLSA-2021:0153-1DnsmasqSecurity Fix(es): * dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684) * dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685) * dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)moderateScientific LinuxScientific Linux 7dnsmasq-2.76-16.el7_9.1.x86_64.rpm6729ababc68f71a67e57ee1a7c0b81375a2804a4081a054fa0f8d03fcdcc046bdnsmasq-utils-2.76-16.el7_9.1.x86_64.rpmd6187f9c7b3e1aab9110e2fd2a764e32f9e4e46af3419d745a1c54aa6423e585SLSA-2021:0162-1XstreamSecurity Fix(es): * XStream: remote code execution due to insecure XML deserialization when relying on blocklists (CVE-2020-26217)importantScientific LinuxScientific Linux 7xstream-javadoc-1.3.1-12.el7_9.noarch.rpmd1c3984fcbe1a1b24baec7263e375eadc97b343c9a463f934c92e43a4e1cf0ffxstream-1.3.1-12.el7_9.noarch.rpm72fb816c08d0492a3c4beddb831f9b13718f36bd9c071a40576baebea1d75bfdSLSA-2021:0221-1SudoSecurity Fix(es): * sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)importantScientific LinuxScientific Linux 7sudo-1.8.23-10.el7_9.1.x86_64.rpm5423b800533b588b826b3262e43317d7483ded52bec632b31e2ad6a7196959a3sudo-devel-1.8.23-10.el7_9.1.x86_64.rpm70d08e1e1e5a472c05109310f94e7080642cb63861cf299c0c4461b4a0fdd814SLSA-2021:0290-1FirefoxThis update upgrades Firefox to version 78.7.0 ESR. Security Fix(es): * Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) * Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) * Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) * Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) * Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)importantScientific LinuxScientific Linux 7firefox-78.7.0-2.el7_9.x86_64.rpmaefb9ecf93045e1f02b4d18b8454ea6a069d36374d511813302be771e372b6cafirefox-78.7.0-2.el7_9.i686.rpmfcf145cb6953a4256c0a7ee96f328579e3a0f81fc046931f75aabff454ec4dadSLSA-2021:0297-1ThunderbirdThis update upgrades Thunderbird to version 78.7.0. Security Fix(es): * Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) * Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) * Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) * Mozilla: IMAP Response Injection when using STARTTLS (CVE-2020-15685) * Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) * Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)importantScientific LinuxScientific Linux 7thunderbird-78.7.0-1.el7_9.x86_64.rpmda24d84fbba521a1fd1d55d856a97ac7be93b07dd9850ee602f76e37e112e419SLSA-2021:0336-1KernelSecurity Fix(es): * kernel: use-after-free in fs/block_dev.c (CVE-2020-15436) * kernel: Nfsd failure to clear umask after processing an open or create (CVE-2020-35513) Bug Fix(es): * double free issue in filelayout_alloc_commit_info * Regression: Plantronics Device SHS2355-11 PTT button does not work after update to 7.7 * Openstack network node reports unregister_netdevice: waiting for qr- 3cec0c92-9a to become free. Usage count = 1 * dlm: add ability to interrupt waiting for acquire POSIX lock * [Azure][SL7] soft lockups and performance loss occurring during final fsync with parallel dd writes to xfs filesystem in azure instance * Guest crashed when hotplug vcpus on booting kernel stage * soft lockup occurs while a thread group leader is waiting on tasklist_waiters in mm_update_next_owner() where a huge number of the thread group members are exiting and trying to take the tasklist_lock. * [DELL EMC 7.6 BUG] Kioxia CM6 NVMe drive fails to enumerate * [Hyper-V][SL7] Request to included a commit that adds a timeout to vmbus_wait_for_unload * Unable to discover the LUNs from new storage port * SL 7.9 Kernel panic at ceph_put_snap_realm+0x21 * A hard lockup occurrs where one task is looping in an sk_lock spinlock that has been taken by another task running timespec64_add_ns(). * ethtool/mlx5_core provides incorrect SFP module info * SL7.7 - zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl * SL7.7 - s390/dasd: Fix zero write for FBA devices * [Azure]IP forwarding issue in netvsc[7.9.z] * Security patch for CVE-2020-25212 breaks directory listings via 'ls' on NFS V4.2 shares mounted with selinux enabled labels Enhancement(s): * RFE : handle better ERRbaduid on SMB1moderateScientific LinuxScientific Linux 7kernel-debug-3.10.0-1160.15.2.el7.x86_64.rpm4819a3eb9dca66f723dfa5c13d6373518d260cde9d2c6f060a94d0b1e77b0b3eperf-3.10.0-1160.15.2.el7.x86_64.rpm90114f195d468dfecac0fb18a9ce5729b7d851a4cb0bcf939bf32d5a58dfdfcdpython-perf-3.10.0-1160.15.2.el7.x86_64.rpm641f97a285f424556bbe68a21bf178e0ef2ef20905b29aab3210af75d103fe47kernel-tools-libs-3.10.0-1160.15.2.el7.x86_64.rpmfe660577b9eaf88827f03c8381566415ad8e1bb3f1650e927c13ecbec550cbd2kernel-devel-3.10.0-1160.15.2.el7.x86_64.rpm6e2d1b4c71950f840f62fc5181b4b8896f0715df42b1776df145f66fc8807109kernel-tools-3.10.0-1160.15.2.el7.x86_64.rpm011bf1357ed906b856da1da696aa34b0363f0eded1c76a912905c9eed2072391kernel-tools-libs-devel-3.10.0-1160.15.2.el7.x86_64.rpme5e98d69d8bf787726353d7de45385c0473b6d619cfd0231181dd27fa36eb526kernel-debug-devel-3.10.0-1160.15.2.el7.x86_64.rpmf68403ea1737e930fb238d3bf1366df3b6427cedc9549ee2d921d114ba1574dfkernel-doc-3.10.0-1160.15.2.el7.noarch.rpma403da577d61eca9239b730a897039157a0631dcb86dca6f68feb8fdc21a0282kernel-headers-3.10.0-1160.15.2.el7.x86_64.rpm366f98be9c759b1a0c83154a9e3a2de474e4afbf6600c12149628ed46f2e14a2kernel-3.10.0-1160.15.2.el7.x86_64.rpm220521bb5eac456a87ce0f75842a5f6e283dd26f69ebc503e9a2fa145c185884kernel-abi-whitelists-3.10.0-1160.15.2.el7.noarch.rpm05e3ce588d2f58ff8b8657f7f34d05ae57d7c27621e6186af6ecf4ccc23e8566bpftool-3.10.0-1160.15.2.el7.x86_64.rpmf157c6631d357e858553558139fb5cb505ca50b43e3602c2d0736df2c18bed82SLSA-2021:0339-1Linux-FirmwareSecurity Fix(es): * hardware: buffer overflow in bluetooth firmware (CVE-2020-12321)importantScientific LinuxScientific Linux 7linux-firmware-20200421-80.git78c0348.el7_9.noarch.rpma04f0ec2d675e33d01959e1a83242c245a2d39a7a2c944c9ff1009cdf6e45167iwl3945-firmware-15.32.2.9-80.el7_9.noarch.rpm359d7aad7d2f44daf6f9f5e8fb3a227f45b7aba607138f749fc647b09297c245iwl6050-firmware-41.28.5.1-80.el7_9.noarch.rpm09990683afec4d460dac7bfe114f290ebc74fa8713f0ac58085a21e7f86c6998iwl6000g2b-firmware-18.168.6.1-80.el7_9.noarch.rpm61fac0b0aa5a70b9407d35efa59114947ff835794f071a1db6c66302b83e6115iwl105-firmware-18.168.6.1-80.el7_9.noarch.rpm6c35d887982d431759d462240adc49e8ee0cf75846a4cadbda700b42ea88d394iwl5150-firmware-8.24.2.2-80.el7_9.noarch.rpm1309fbd237fcad5bbaf316bc5374f2020ab43416535194e4fac7404730bd0895iwl6000g2a-firmware-18.168.6.1-80.el7_9.noarch.rpm4fa1b02c8567b22d22a9160f692c5bf1964b5b6ce2c69247a257dcb5e95848aciwl3160-firmware-25.30.13.0-80.el7_9.noarch.rpmb441c460e2aff73fff57433dc2c1a269499d061e7824dcc3a5f7e4776093ad9diwl7260-firmware-25.30.13.0-80.el7_9.noarch.rpm50f87a1a5e9d58a92daf1f05b74d1eb117127a54d0d2da5c7c507619612af72fiwl1000-firmware-39.31.5.1-80.el7_9.noarch.rpmc639d41f580e6ba17208031184ec07414e2e09241967dce78acfc1036386bab2iwl2000-firmware-18.168.6.1-80.el7_9.noarch.rpmb2376b69963be7591f80ee41efad20b6c7001d42d260ab5d229287d2ec8d3ae0iwl6000-firmware-9.221.4.1-80.el7_9.noarch.rpmbf625e797575121e1d90ab40d4487d83578daf2dc8ee043453b4bd44c8cfdb21iwl100-firmware-39.31.5.1-80.el7_9.noarch.rpm707ce9d9cea1f66a7bb4e3c721711e9575cb5a927ec6644fedbbb30de12dd413iwl5000-firmware-8.83.5.1_1-80.el7_9.noarch.rpma7da327f21ce36292d130875344e0e8a29685864c119177b2416a80190b9efdeiwl2030-firmware-18.168.6.1-80.el7_9.noarch.rpm0ccc1eeceda14b1c43ec3ba8060a006c0baa36948c3b6c13f60ab3342c7bc2f0iwl135-firmware-18.168.6.1-80.el7_9.noarch.rpmd7440a356a4d6c9feb4a573c817eb1e3dbcb37f4dc94dbdfeb6600e6f53f003ciwl4965-firmware-228.61.2.24-80.el7_9.noarch.rpm3ff0d2ff99bfb7b9d6e7ea6f3159545ee33521dea7558a0f2a8ffa9e75898c93SLSA-2021:0343-1PerlSecurity Fix(es): * perl: heap-based buffer overflow in regular expression compiler leads to DoS (CVE-2020-10543) * perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS (CVE-2020-10878) * perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS (CVE-2020-12723)moderateScientific LinuxScientific Linux 7perl-macros-5.16.3-299.el7_9.x86_64.rpma879c7b50bb471730f8ee371ff90439aa238254bacf7b8cd7873afbe3b42538bperl-Object-Accessor-0.42-299.el7_9.noarch.rpmd64afc4f611b5fadf848454ebc5d24ba6d29fad9eceb01e1b1eb9ef47f82d186perl-IO-Zlib-1.10-299.el7_9.noarch.rpm696a5ac2086dab867d43a0f6a9a8ed324d0887e3acf41c5a064c2c41122ac2b4perl-devel-5.16.3-299.el7_9.x86_64.rpm96de282bb6995063683f9a9e03302fcc8e3259ad67bf4023f8d20ab9793f6a02perl-5.16.3-299.el7_9.x86_64.rpm8a1ebda5a8b0d73310ce9a196fa387435c6c86e2b570476b10f055c13481c86dperl-Pod-Escapes-1.04-299.el7_9.noarch.rpm068db7d933a580c661090d8a379621bcee2d174b33a1d8976f5317b2ff59df6eperl-libs-5.16.3-299.el7_9.x86_64.rpm04d5bc27c7b13d66e657fd814dcbbe926f96552aa5805972137ccec6b9a23965perl-Module-CoreList-2.76.02-299.el7_9.noarch.rpmeb4fb6d9d0878452d5ffaeeec24440164ac1ad7ed67c47c6b0daaea384ebeeb6perl-Locale-Maketext-Simple-0.21-299.el7_9.noarch.rpm77c4bcc8c9ef5781b764dd9542a1596e8cf1b6a50edaaf11ca3a1b102aa2cc25perl-devel-5.16.3-299.el7_9.i686.rpm5ab0659408b632e1c380e0a22f046b28275a2ea546300491de5294deb3914044perl-Module-Loaded-0.08-299.el7_9.noarch.rpm75b836eb19a38795869ec7bed3116c6ff0ffd00da7ca9ff9821e8ca47839b359perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.noarch.rpm85e6da0f6a6dd62d6dc5e93f54aadeb0132ce1a8be521478e0e0dc004bb20763perl-Package-Constants-0.02-299.el7_9.noarch.rpmc6625ac445d3b437ea31e7828492f99e7a9db3ab7edf9de0b9b24402756a989fperl-ExtUtils-Install-1.58-299.el7_9.noarch.rpm37c2112c1518ee42c1df7e6f8fe87e262117d4f6ad41932686a04edc1b8ceea8perl-tests-5.16.3-299.el7_9.x86_64.rpm592b542b405321165353857c4695891647bc7a67673d5c68676e60b0fdcaa4c9perl-core-5.16.3-299.el7_9.x86_64.rpm1da5c538c63a3ecaa62da94d0bdc5d44ecc3f690ec2dda0632e2590c28092eddperl-libs-5.16.3-299.el7_9.i686.rpmac2d5dac30d4a5ce7ba68f7945408344ab95816306be5e169da469e58c0d7c5cperl-CPAN-1.9800-299.el7_9.noarch.rpme3c5ea3f13c03a16f5e33e284e704abdb353679e0cc3a4efd49921c39b8d867fperl-ExtUtils-Embed-1.30-299.el7_9.noarch.rpme89ea9809b4a2d6e54e5beff03ee40da52b44c48e659e0f85f239db2841bf276perl-Time-Piece-1.20.1-299.el7_9.x86_64.rpm43c6481cdb21258a36f8c8ecdb8a4512cb899ea3d99c5fd5709a1cee4e004463SLSA-2021:0347-1Qemu-KvmSecurity Fix(es): * QEMU: loader: OOB access while loading registered ROM may lead to code execution (CVE-2020-13765) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) Bug Fix(es): * qemu-kvm FTBFS on rhel7.9moderateScientific LinuxScientific Linux 7qemu-kvm-common-1.5.3-175.el7_9.3.x86_64.rpm3d983d02fae65d5d2d794245897da2c827f12948c7a4ee123f80ca80ae9aceccqemu-kvm-tools-1.5.3-175.el7_9.3.x86_64.rpma5d343cba227c6c6f03908786c70e3da960559910b7c92460d14db8c2a4c0f2aqemu-img-1.5.3-175.el7_9.3.x86_64.rpmc63f9feea8f5a3ed3c274cf5193209dd2390dbc612b647c2ea50e74c3442d4f2qemu-kvm-1.5.3-175.el7_9.3.x86_64.rpm3e53c4a294b534c01ee62b3f8659b72b3f66297c9fef4145c78ffe5d9e5e2929SLSA-2021:0348-1GlibcSecurity Fix(es): * glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029) * glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573) Bug Fix(es): * glibc: 64bit_strstr_via_64bit_strstr_sse2_unaligned detection fails with large device and inode numbers * glibc: Performance regression in ebizzy benchmarkmoderateScientific LinuxScientific Linux 7glibc-2.17-322.el7_9.i686.rpmeacc8efa6a1535da6f99f937267659b1ec828fcc3fa4a56f47093a9a8315a0caglibc-utils-2.17-322.el7_9.x86_64.rpma155c586e5c649ea52af5ef4ff5dc331be482d4a9e5c4ab76cf7a5288dd9b444nscd-2.17-322.el7_9.x86_64.rpmf75977b94de6357ed40a544a2303b9c7b8718902a93c2167721c2afcc9838949glibc-headers-2.17-322.el7_9.x86_64.rpm08a987cadf27a5435d8396d0aab85bc190e0c769adebb5d12441a18c54f5a6eeglibc-2.17-322.el7_9.x86_64.rpm7313f96fbe52fdf0ebe11d6f4104839038daa082391d8cebd0ce2ea53feaf182glibc-common-2.17-322.el7_9.x86_64.rpm8cbea99ed186c6a595b589a89239605dbf2e938c91f7c4163a3048d4e1e74e96glibc-static-2.17-322.el7_9.x86_64.rpm15893bf07ed763152dc3095f86c85e9d53b6fa08a4b88bd34ec084179d8c9f9bglibc-static-2.17-322.el7_9.i686.rpmc0ddb6b8b1d2c5a02c0430a5c0f7e13c771bdc14316e37090c97beaea11feeffglibc-devel-2.17-322.el7_9.x86_64.rpmc7e682d49ec90a9e70349e91dffb34b3e5542f8bde9305784e05b6e5988c9ea1glibc-devel-2.17-322.el7_9.i686.rpmf1012e0c66ae6b9a3d92cb167dd69f5096c1a450369f4bbdc677e3a52ffcfcf2SLSA-2021:0411-1FlatpakSecurity Fix(es): * flatpak: sandbox escape via spawn portal (CVE-2021-21261)importantScientific LinuxScientific Linux 7flatpak-devel-1.0.9-10.el7_9.x86_64.rpmc61b58e307ac1e785724862fa5f80d57d397110acfe5376f714c6d64087cb797flatpak-1.0.9-10.el7_9.x86_64.rpmd0145d8c5521f572cee69348e00b09664808dac4e662590d902cde19fa22ddedflatpak-builder-1.0.0-10.el7_9.x86_64.rpm66b166ee3a30969fcbfd740f8798191aaf894a4056c4c2a7f7042a9669e71c5fflatpak-libs-1.0.9-10.el7_9.x86_64.rpm53e599519edd6b04990f2649ab7bf1bde929af36f047272d2e76b9b41697686bSLSA-2021:0617-1XtermSecurity Fix(es): * xterm: crash when processing combining characters (CVE-2021-27135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xterm-295-3.el7_9.1.x86_64.rpm448e8b7f54e28e5c9703d5229aee2e63307a6bea9d70f84bd855c88859fc5a8cSLSA-2021:0656-1FirefoxThis update upgrades Firefox to version 78.8.0 ESR. Security Fix(es): * Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) * Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) * Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) * Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEcriticalScientific LinuxScientific Linux 7firefox-78.8.0-1.el7_9.x86_64.rpmbffabc0d15725ce0f2db7e29a57216be2d3b29e90cf0e23635a246d57c21c2cafirefox-78.8.0-1.el7_9.i686.rpm538a8b1e2d4d02551f4ad78f403e7084b8f3fd3f64f30bc3365faba14fe7b146SLSA-2021:0661-1ThunderbirdThis update upgrades Thunderbird to version 78.8.0. Security Fix(es): * Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) * Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) * Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) * Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-78.8.0-1.el7_9.x86_64.rpm1aa130714f02d6a5c556311988160f3c524434952a6b6e37c8b5523300e692e3SLSA-2021:0671-1BindSecurity Fix(es): * bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7bind-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm9e5b6954ca3d6c7894e4f201dc81b3a44cc8cf313cb643ca80993250d9547edbbind-license-9.11.4-26.P2.el7_9.4.noarch.rpmd81fadde04be1fafc43fab22dc897c12cbb19a14fc937003d8d95ba767f91843bind-9.11.4-26.P2.el7_9.4.x86_64.rpm155fb158aedbbfa4309a2fc1adf9a9254c1e72832ec0430dbde5fd8000939dcbbind-pkcs11-9.11.4-26.P2.el7_9.4.x86_64.rpm38346b34188c8f02e33be391b9c1028daff131a0a07eb929d74946b40509a22cbind-devel-9.11.4-26.P2.el7_9.4.i686.rpmb41e52f3edca20a46f973b6dd81fd78b02a2d0c135774557825a882f2af91f13bind-sdb-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpm75de22a7c836f42186a20178c133abd0833d0c7f608cb1872a24ead5ae2b0596bind-export-libs-9.11.4-26.P2.el7_9.4.i686.rpm3b21ac1132c5ac0564d420000174627746983bb56597497b7afa20ea1b190d44bind-lite-devel-9.11.4-26.P2.el7_9.4.i686.rpmea67cc77ffa069331349999858a7be56379764c27f50aa00f11994ed1db6fa60bind-pkcs11-utils-9.11.4-26.P2.el7_9.4.x86_64.rpm8ce0b348fce9caddf37e20278fe63d1e4bac52334a6403f1c4b4cb898d8d7eeabind-export-devel-9.11.4-26.P2.el7_9.4.i686.rpm5f919bfe6e9caae3aeb37ac98f75fb8e1dd268d48a739a6f26e988f9cb5ffcdbbind-export-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm0e77cacde069f2e0f0d7cfd869a9bd2d68b63c6590cff598244fedf369b126efbind-pkcs11-libs-9.11.4-26.P2.el7_9.4.i686.rpma5b9ea01e6d83a3239e98c5c2e8e6ca8197a99b540fd9892eadbac9228b5e94bbind-pkcs11-devel-9.11.4-26.P2.el7_9.4.i686.rpm66663a2950103cfddb2b2f82893add4ddc1d4fb874136a91225bf566acb6d3adbind-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm75a0b671d85195099bb672d52ce7bf7fb374f2def8985d6f2c8ad1be6185b8acbind-export-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm3ddbdf296547fabaacae407f196f83ca4e63c7ce59bf70b98d7d54611641957ebind-pkcs11-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm0cb5b1e3f2f602e1b5303ccfc199c83effa19de2cecccb547d247f0c4184a099bind-libs-lite-9.11.4-26.P2.el7_9.4.x86_64.rpme1645fffa1754662ae830cc70dea4f10d4b8bc0118a0418d0fb520dc4215eac5bind-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpmc3863f0ffda833af04d3aabbb71c6855ecdb162552dbe1bb9a0909b2dd8d3a88bind-libs-9.11.4-26.P2.el7_9.4.i686.rpm23d6d30f7a3e3d1a5ce04d5dca4b240fbac6e2ba56d0b5fc4f50706aa9f82cc7bind-pkcs11-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm82e44e5a3424840261903624d40dab0f3bef3083778f2b39620e718284f247f3bind-sdb-9.11.4-26.P2.el7_9.4.x86_64.rpm6ff982494cc963eca0c9b8829b0c2e54bb1c40f199bb66e79111c7f17169a152bind-utils-9.11.4-26.P2.el7_9.4.x86_64.rpmb2c9ec7a5b017591dbec8b4ce004c08404f77f88b6b86bab6a7425de98e969b7bind-lite-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm1fa6d5cfee562631a69c72c711493521bb2ee0ce0781c824a931813e133eb96ebind-libs-lite-9.11.4-26.P2.el7_9.4.i686.rpmb6310e106c6c0a80ef9e0f873a5e7a774de6d8f5cba6ca65cb9e7abd23c62b60SLSA-2021:0699-1Grub2Security Fix(es): * grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) * grub2: Use-after-free in rmmod command (CVE-2020-25632) * grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) * grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) * grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) * grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) * grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.2.x86_64.rpm211792b09de5351782267910616b09be86c67abe554507762bc029ab89f713ffgrub2-efi-ia32-modules-2.02-0.87.sl7_9.2.noarch.rpm91c1cbec8dedb06f74858471953cc877a5897595d67ccdfcf76ec92f57f75a4cgrub2-tools-extra-2.02-0.87.sl7_9.2.x86_64.rpmc999bc78e1c7d24ce12dff9c26b89727827463f3ee2f11ad6ad55695ac479321grub2-efi-ia32-2.02-0.87.sl7_9.2.x86_64.rpmd9d357ee4502829702d4de4272c92a61df523bd845e715f0f95ba8a04b68357dgrub2-common-2.02-0.87.sl7_9.2.noarch.rpma610c089ce1abe1c02eb23d1a75f32d70130c8670f7e8e6b751b6f1d80988078grub2-tools-2.02-0.87.sl7_9.2.x86_64.rpm9be8073a973b51f8bf465f1ba7c590e9068250fd7379e83ca46bd83a52f5d2f3grub2-pc-modules-2.02-0.87.sl7_9.2.noarch.rpmaf47dfa3848878a70d820bf584b6e27b477adfc7101a848e174f2a863fd0593dgrub2-efi-x64-2.02-0.87.sl7_9.2.x86_64.rpmbebee412feb48e7dd3053fe1436ae36d8dcb365da4e707c6e277d3510339dc66grub2-pc-2.02-0.87.sl7_9.2.x86_64.rpmf2b308408f69ad224c62a000f51ee6113a732caa79e13f048c6ca0dc3f3f9ec3grub2-efi-x64-cdboot-2.02-0.87.sl7_9.2.x86_64.rpmb7e8bbde9b06adc5a0547bc1a3eeaf5fd036048fd4b3f69ac9a6b5b4f4cd94dbgrub2-tools-minimal-2.02-0.87.sl7_9.2.x86_64.rpmbfd4e691d2d6adfe6486f9b58b48dad5c0f08ae2e264704e14be52fd9806a2ecgrub2-2.02-0.87.sl7_9.2.x86_64.rpma5cce68e0bdd981b7e54b89917843063ffb01baa386511f618d6b3d3c7022d7bgrub2-efi-x64-modules-2.02-0.87.sl7_9.2.noarch.rpm0ff26046d5996a5ff945f544bbdf505d6c8486faa7944e7efefa2fa7fd15a66bSLSA-2021:0742-1ScreenSecurity Fix(es): * screen: crash when processing combining chars (CVE-2021-26937) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7screen-4.1.0-0.27.20120314git3c2946.el7_9.x86_64.rpm04b381686a62e297500b1341fea5c3bc9d8d3c2a9d9708a47b83290754881a02SLSA-2021:0808-1Wpa_SupplicantSecurity Fix(es): * wpa_supplicant: Use-after-free in P2P provision discovery processing (CVE-2021-27803) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7wpa_supplicant-2.6-12.el7_9.2.x86_64.rpm9dc31d95856d46cb6ea4112361e906f5810c2e5fb807ed3171c9959c5764c7ffSLSA-2021:0851-1Pki-CoreSecurity Fix(es): * pki-core: Unprivileged users can renew any certificate (CVE-2021-20179) * pki-core: XSS in the certificate search results (CVE-2020-25715) * pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) * pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) * pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) * pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Add KRA Transport and Storage Certificates profiles, audit for IPAimportantScientific LinuxScientific Linux 7pki-server-10.5.18-12.el7_9.noarch.rpm27fbad63d48e3e5d745e3fa7226c4ff0c35826d1c159730c9dab129f41446f32pki-symkey-10.5.18-12.el7_9.x86_64.rpme8b4db9bf26442f9289a6ade6e8d75677b468c723c62a78555fef78dac9a052bpki-tools-10.5.18-12.el7_9.x86_64.rpmecd82e0ce19a61c9f8e51befbcb13609b71dd3297b543dff15cd31a7c738bd75pki-base-java-10.5.18-12.el7_9.noarch.rpmb667db533d0b0466cd9a7f191ed2f46ff7b6343365895224fdc58b4ccfdf8dbbpki-javadoc-10.5.18-12.el7_9.noarch.rpmbdd7527f205895ae73cada65090a85605f39ab7185d081b4d36572e13e0b01c2pki-kra-10.5.18-12.el7_9.noarch.rpm7f670bc1e1e47d342b2576e33faa19251ea3b33eac328048705c167d0e486a4epki-base-10.5.18-12.el7_9.noarch.rpm0650738faad52eaabc98983e443017fb63828e5b482060b4c112d7c239c9f00bpki-ca-10.5.18-12.el7_9.noarch.rpmb25de0464afb617728604cf1bc4f9918c412182ca2720ef7f00193e098eaf5a4SLSA-2021:0856-1KernelSecurity Fix(es): * kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211) * kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374) * kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use- after-free (CVE-2020-29661) * kernel: malicious USB devices can lead to multiple out-of-bounds write (CVE-2019-19532) * kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427) * kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c (CVE-2020-7053) * kernel: performance counters race condition use-after-free (CVE-2020-14351) * kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints (CVE-2020-25645) * kernel: use-after-free in read in vt_do_kdgkb_ioctl (CVE-2020-25656) * kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705) * kernel: increase slab leak leads to DoS (CVE-2021-20265) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * BUG: scheduling while atomic: memory allocation under spinlock in scsi_register_device_handler() * WARNING in __iscsit_free_cmd during recovery Abort * lpfc does not issue adisc to fcp-2 devices, does not respond to nvme targer that send an adisc. * Panic in semctl_nolock.constprop.15+0x25b * [SL 7.7][md]Crash due to invalid pool workqueue pointer, work queue race * Guest crash on intel CPU with -cpu host,-spec-ctrl,+ibpb * SL7.9 - kernel/uv: handle length extension properly * Commit b144f013fc16a06d7a4b9a4be668a3583fafeda2 'i40e: don't report link up for a VF who hasn't enabled queues' introducing issues with VM using DPDK * writing to /sys/devices/(...)/net/eno49/queues/tx-16/xps_cpus triggers kernel panic * [Hyper-V][SL-7.9]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit * kvm-rhel7.9 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. * kernel: nvme nvme7: Connect command failed, error wo/DNR bit: 2 * dm-mirror crashes from assuming underlying storage will have a non-NULL merge_bvec_fn * watchdog: use nmi registers snapshot in hardlockup handler * [DELL EMC 7.9 BUG] - Intel E810 NIC interfaces are not functional in SL 7.9 on system with AMD Rome CPUs * [DELL EMC BUG] SL system log shows AMD-Vi error when system connected with Gen 4 NVMe drives.importantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-1160.21.1.el7.noarch.rpm6094e9603b4da2bd6f6ba4f79b712d16a8d14b56191887cfcc8d668c5e2362d3python-perf-3.10.0-1160.21.1.el7.x86_64.rpm038ef49230c56246614a9e976d4e48bf691c27dd1babf0c510652da1ecda040fkernel-devel-3.10.0-1160.21.1.el7.x86_64.rpmff02f6293b776f7974a19d1df5e50d274398f2b81212892aa18f9004c1920919kernel-3.10.0-1160.21.1.el7.x86_64.rpmef252a2debd82692426f4c01bf78fbc47a5fd2373952a6843a3bb47333493e49kernel-tools-libs-devel-3.10.0-1160.21.1.el7.x86_64.rpm62d08da1cc34e06dd21140d6be0ca0f6e7869848011f83c5a23144333caf3a2ekernel-tools-3.10.0-1160.21.1.el7.x86_64.rpmd48e0daae8ef795b5f3cf826a5881096543adf966c215e3388fa49de360c058fbpftool-3.10.0-1160.21.1.el7.x86_64.rpmf4f24d0198c3147ef985fad6a6f613c5aa3129c52651d6c13beb40148b07493fkernel-tools-libs-3.10.0-1160.21.1.el7.x86_64.rpm8f972059f758fb7bee95648c26a782e740d4fdfa4df401a6a1148e86a46d9871perf-3.10.0-1160.21.1.el7.x86_64.rpm6ffd6ee9056d8b8f8c7239bb253fd49c4e0a57d1dce37430e7feb045b84e089bkernel-debug-3.10.0-1160.21.1.el7.x86_64.rpma287d94257eaa061dbe260bb586cba664091cb667304204191a35dd9db5978aakernel-debug-devel-3.10.0-1160.21.1.el7.x86_64.rpm0100ae043f3b4577d767caf812e96a0c2347a2d109e71d143e3bc254b9b10ddbkernel-headers-3.10.0-1160.21.1.el7.x86_64.rpm9aaef01ecab63328e3ee79422bf5342559480ec96b42b3e1ebf609a58030336ekernel-doc-3.10.0-1160.21.1.el7.noarch.rpmadfcbf58602c4b3dbbd37b346c6368af906a4c0af87daa81824d1135b0976a3dSLSA-2021:0860Moderate: Ipa Security And Bug Fix UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * jquery: Passing HTML containing &lt;option&gt; elements to manipulation methods could result in untrusted code execution (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * cannot issue certs with multiple IP addresses corresponding to different hosts (BZ#1846349) * CA-less install does not set required permissions on KDC certificate (BZ#1863619) * IdM Web UI shows users as disabled (BZ#1884819) * Authentication and login times are over several seconds due to unindexed ipaExternalMember (BZ#1892793) * improve IPA PKI susbsystem detection by other means than a directory presence, use pki-server subsystem-find (BZ#1895197) * IPA WebUI inaccessible after upgrading to RHEL 8.3 - idoverride-memberof.js missing (BZ#1897253) moderateScientific Linux 7ipa-client-4.6.8-5.sl7_9.4.x86_64.rpm1ed4bf14bd52dc244d62b6916df8470e09377e46366a271670570b0061ae62d0python2-ipaclient-4.6.8-5.sl7_9.4.noarch.rpm9ff8b4cb8abe9ed22d2ccbc4fc24bf9f5c69da12e614592e1128d818280a7085ipa-python-compat-4.6.8-5.sl7_9.4.noarch.rpmaeffe6fb3d8ef7a95f472e281a7cfdeede480ba3e6f5c08565584bb163a5f20dipa-common-4.6.8-5.sl7_9.4.noarch.rpmd4febde3124992711419e10f72a60fed11bd033cab1c426a6b9cb7a0a862cc42ipa-server-4.6.8-5.sl7_9.4.x86_64.rpm3bc5d8e6824bcb898657402f40baa86030f2ed3eff94f1ff0b806f58b69f9aaapython2-ipaserver-4.6.8-5.sl7_9.4.noarch.rpm9b29cedcbaed715cc305adfb56233bfada6d59d95e46d69f348ea4f78c904993ipa-server-trust-ad-4.6.8-5.sl7_9.4.x86_64.rpmb1ffa453b3b8caee571c289db11631bdcaf82a08b717da819c84bcfececb7493python2-ipalib-4.6.8-5.sl7_9.4.noarch.rpm8136719389c6e1ad756cefa0e711d90ed61d67b9d8957f5b473daf227e478eabipa-client-common-4.6.8-5.sl7_9.4.noarch.rpmf22012aec24260700ec750141870e1af40568ead8cac252af493ae9124daf9b7ipa-server-dns-4.6.8-5.sl7_9.4.noarch.rpmf915a15b5337d345c496b3db7f86bff99fb018766ed8a2892868bdcbfdc6f7e8ipa-server-common-4.6.8-5.sl7_9.4.noarch.rpm4f3b2a4c67baf3947332d06ac24edffb730353ea58514553191762376a3db5f5SLSA-2021:0992-1FirefoxThis update upgrades Firefox to version 78.9.0 ESR. Security Fix(es): * Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) * Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) * Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) * Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-78.9.0-1.el7_9.i686.rpm449df14cbc360743a3ab34d43f07a97ec2ae373f63491b35c475434ecfb308c5firefox-78.9.0-1.el7_9.x86_64.rpmad40a8508cce4f79864e7962536bb3f03c4fabb32ecc482d6995b438af64895fSLSA-2021:0996-1ThunderbirdThis update upgrades Thunderbird to version 78.9.0. Security Fix(es): * Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) * Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) * Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) * Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-78.9.0-3.el7_9.x86_64.rpm9166b8b1c37e08b4a4701b5003444858ecacb6bcdc9d9b193f7e4d3b351b924aSLSA-2021:1002-1FlatpakSecurity Fix(es): * flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7flatpak-libs-1.0.9-11.el7_9.x86_64.rpma0c8d1985df717702a00c219b1dfd9411914253a7af93163f746b240db61095cflatpak-builder-1.0.0-11.el7_9.x86_64.rpm00b6c14edd3fba4506b7a3230dca8b89b5540cebc377e2a51f7db1bd3ca4597bflatpak-1.0.9-11.el7_9.x86_64.rpmcf33c9234e001b7606a40cc1b452c7b75d25d06e6005bde9a65aa998a9ad0676flatpak-devel-1.0.9-11.el7_9.x86_64.rpm6521ddac74e82ae43234671eddc5f24b795a47e80b72b9e7a97ff01c824d8094SLSA-2021:1071-1KernelSecurity Fix(es): * kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) * kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) * kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Customer testing eMMC sees and intermittent boot problem on 7.8+, was not seen on 7.3 * tcm loopback driver causes double-start of scsi command when work is delayed * [Azure][SL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 * A patch from upstream c365c292d059 causes us to end up leaving rt_nr_boosted in an inconsistent state, which causes a hard lockup. * [SL7.9.z] Add fix to update snd_wl1 in bulk receiver fast pathimportantScientific LinuxScientific Linux 7python-perf-3.10.0-1160.24.1.el7.x86_64.rpm2f2fd4117c14eeede25c4093b900d7201919a46389f10857579254ea0eff776bkernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpmcb76211b757a3cd464b24f2d7060fe2d0e72afa9d11fc8f3469391eb16fde71ckernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpmaf70c25c4ef9a8ad37b20d2897f7284b9821b5f051e96e2323c73913435c71e1kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm656c38db2453c891ad2c45f9cfb9e74539e60e77471f2bd16c7825c9ec494794kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpme8adb9705ab08223016f1a2d3f3bbe7cc9527178c1416d3e9701c563b42fc66dkernel-3.10.0-1160.24.1.el7.x86_64.rpm8b02c778e6f475a8c05a6fd907f4a30cbf2b398de2db16b774c0e8f80dbf7639kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm4e1999914ac5f99b35772588a3724ac771e06bf70bccb969b19a7f947346c40dkernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm2a5af3560c0d2b58d3e92e072f21cbac7d005054e5669bb750df3ad80e342df9kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm40794e52ae66c3260a991b1ec548f180df2c79ae3be19e9ae2469ce661494ff0kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm45e0d2a3eec5f01530801e319c16cf353c1f4f01e2f671899c1538957580233dkernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpmf1afb9b8996e3da3191f1c34adc71dc6a7647897dec1cfc5f1d92b0de7032716bpftool-3.10.0-1160.24.1.el7.x86_64.rpme8937433e163b569db4594a6ef9ca6282fc9d0a4c26320c2b8ad3fa4594bdc77perf-3.10.0-1160.24.1.el7.x86_64.rpmaa3218f14b92997019671e64c7e60538305d57e6c18be05678bb7221b3a44707SLSA-2021:1072-1LibldbSecurity Fix(es): * samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libldb-1.5.4-2.el7_9.i686.rpmc8d61843617f2cb1f30708c3766acab28cf3322cd4463a6440845f80e58e0006ldb-tools-1.5.4-2.el7_9.x86_64.rpm5a30e6206b96aa941cf5bc0787be552ed795b37a5bcaa3a6c566e416ae0cdeaclibldb-devel-1.5.4-2.el7_9.x86_64.rpmf075bcf6db662ef2ff6165da440e97f8d5daf699c0ca75a1429fc2ae623a0680pyldb-devel-1.5.4-2.el7_9.i686.rpm49a598cb1f95a358da7e166ce9e7e42690b515c9300f27f66e3348c87bbccf6bpyldb-1.5.4-2.el7_9.i686.rpm592e2a51c0c0d2c9a8cbb6ec431564ac5672d3b5cf36c580ed538c146e63b7eblibldb-1.5.4-2.el7_9.x86_64.rpm35c4dfcc466c55a684cde022968cfdc5ed8f6a7908615dacf8de89abead874b5pyldb-devel-1.5.4-2.el7_9.x86_64.rpm0b05d33f911795ff1eed0b117ae6d8f659ca91a120a52db97b25120f8ad1055dpyldb-1.5.4-2.el7_9.x86_64.rpm81b3e1a7462a0ab7d801d10d06cdb7ed1bab30a7ecce8be02a42815c88acb34elibldb-devel-1.5.4-2.el7_9.i686.rpm459a9a0a10f37d4d5422f8b7bd6395b4812e62746ceb5112c9e4686a45100076SLSA-2021:1135-1SquidSecurity Fix(es): * squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7squid-migration-script-3.5.20-17.el7_9.6.x86_64.rpm5f4efbb47e4ef8bbc123c76ee5739139033149ca48f605398cce3d283a615c5csquid-3.5.20-17.el7_9.6.x86_64.rpm01e8917843e5d9f7a76ba9ed41ea78f043ea28b08aa9d34e1f89abae28a4f03csquid-sysvinit-3.5.20-17.el7_9.6.x86_64.rpm51672f3d8d35b136ea56a3926eb0d200f56f7a2a7323edc37fb2a2367a10748eSLSA-2021:1145-1NettleSecurity Fix(es): * nettle: Out of bounds memory access in signature verification (CVE-2021-20305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7nettle-2.7.1-9.el7_9.i686.rpm3a8ab2056c7e273d4f5e3b312f3cae6e1231f8f22fd6e4c7e7a7a47b33230b87nettle-devel-2.7.1-9.el7_9.i686.rpma6ee2bc74687ca5ddc54502f97621d44d3b20108dc5bb3fce0b5199f5f156d72nettle-devel-2.7.1-9.el7_9.x86_64.rpmed4b165b6393d04c01395bbffabde34c663918d165af9a17d15c8ffc49829fc9nettle-2.7.1-9.el7_9.x86_64.rpm631114eff14ce13570db80ea06c014964225734de427b1f5ed72f06315e9985dSLSA-2021:1192-1ThunderbirdThis update upgrades Thunderbird to version 78.9.1. Security Fix(es): * Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991) * Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992) * Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7thunderbird-78.9.1-1.el7_9.x86_64.rpm15b668cdfd777d49d74ef2aa02560696e79393a9ea3435db1cd9eca0c1112f0aSLSA-2021:1297-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * JNI local refs exceeds capacity warning in NetworkInterface::getAllmoderateScientific LinuxScientific Linux 7java-11-openjdk-devel-11.0.11.0.9-1.el7_9.x86_64.rpm0034ea4bb6360a4195b2e893473abe05a4caa5d3fba1bb2f947031a3a0fb23bdjava-11-openjdk-11.0.11.0.9-1.el7_9.i686.rpm3ba7659fe7c21237ddda65067f9bb0890b009f76b99da806d44b95de2f97090djava-11-openjdk-javadoc-11.0.11.0.9-1.el7_9.i686.rpm80c07f488b277fe77a6804f464351a593c6eec64ccd99cc9625c423fa316d30cjava-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9.i686.rpm8c32b31903c528c50a3c9f314fc80503666bdde1e27c87f65b8f07b22fbe9558java-11-openjdk-demo-11.0.11.0.9-1.el7_9.i686.rpm2eddd05a74f9ce62bca7c94ecb11d6e12d0625b51b7d497c3b1f0b24fb3b82d8java-11-openjdk-devel-11.0.11.0.9-1.el7_9.i686.rpmd5a59b97373234482ec6638e3c0f5b8e6634b1a516221f18411c301d78b93cf2java-11-openjdk-headless-11.0.11.0.9-1.el7_9.i686.rpmb831a9d9f5307edb419c8930fd5099ddfbaaf35b776a30084af53e8cd977e1d8java-11-openjdk-javadoc-11.0.11.0.9-1.el7_9.x86_64.rpma92890f9b8897ff784d2e09cde43a32bcefc529e957334f81ad717bdf0ef804ajava-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9.x86_64.rpm81ff8c66823e9f782647553c4a9813a7c6bfe157175608311fc2b820f514483bjava-11-openjdk-jmods-11.0.11.0.9-1.el7_9.x86_64.rpm3b832771787ee5616db81159d8160c2730f7ffbb49acef711362ecf717af0062java-11-openjdk-jmods-11.0.11.0.9-1.el7_9.i686.rpm063d70c16819779f8dd01c87fed8f1414af2f4e4e6170fa8589352be7a259200java-11-openjdk-src-11.0.11.0.9-1.el7_9.x86_64.rpmdacfb2f2f25e11ffa8ee9bf607585542ad824f662579fdb8c497a98b80f7e706java-11-openjdk-static-libs-11.0.11.0.9-1.el7_9.x86_64.rpma8ad8dd549b80506f39dd78eb7a580a83f13b05f9e4e20b17746ffe9fb940ab6java-11-openjdk-11.0.11.0.9-1.el7_9.x86_64.rpm792639abaff2f0c400ac29f6632604909863bc86c812ffb374b0cdd78172eef7java-11-openjdk-headless-11.0.11.0.9-1.el7_9.x86_64.rpm2ad3fb50999eb4448ecaa27c4c74e591a26a89d8afb93a3664485d53d4265d48java-11-openjdk-src-11.0.11.0.9-1.el7_9.i686.rpm4f998f3be20e475b38d401b610ce40fc3075b39248e60e4b0e45f67c11a6805bjava-11-openjdk-demo-11.0.11.0.9-1.el7_9.x86_64.rpm2fd6b328021bbc7b816576def60e0caeb865777f0a739f8bf42ba154122d2340SLSA-2021:1298Moderate: Java-1.8.0-Openjdk Security UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7java-11-openjdk-debug-11.0.11.0.9-1.el7_9.x86_64.rpm20f1ecd8e9bf9493f51e9e3e4ad46f03716f572e0d03aa6ed89bcb0422a736d5java-11-openjdk-devel-debug-11.0.11.0.9-1.el7_9.x86_64.rpmb1707f74e24c39439f064c2c0608d13521966668120480c3a0e392511838f7d3java-1.8.0-openjdk-src-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm0497048dabe9d531c1ec54f14cdbcb011ac31893866ef21176a3776c93fc86b6java-1.8.0-openjdk-debug-1.8.0.292.b10-1.el7_9.i686.rpmc9ecdbedd7a440f9e6e1502dacbdd2ca61a677acc91882764ec9728f61020162java-1.8.0-openjdk-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm755ab6e8a59dc81a4d169f0795737c1eb5efa94ff5da876423486843206c50c0java-11-openjdk-headless-debug-11.0.11.0.9-1.el7_9.x86_64.rpm90c0f00388fc9e9eac0870a6558600244a789e5527841d0441099baf08764adbjava-1.8.0-openjdk-devel-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm48bcc55e3c9f9449e580635946425f8e9913b40d6a1d772c01ee6bd8545145c0java-1.8.0-openjdk-headless-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm6f1c618f7b579e38486cf7ef243f41eafce72022a794e139d8163c2abcb1f737java-1.8.0-openjdk-src-debug-1.8.0.292.b10-1.el7_9.i686.rpm7a37644b790d36eebc1a9ef0d0ddb8856db0c32523139b8be8cd1a31b9ccab1ajava-11-openjdk-src-debug-11.0.11.0.9-1.el7_9.i686.rpmca7ea3307804ce88ab2f3fccd44456f9cdc9828683df5cf677c636ac8d01ddb1java-11-openjdk-javadoc-zip-debug-11.0.11.0.9-1.el7_9.i686.rpmd12b1cb6a0c7d32067a6dfd14876769e23d5b384c6edadbce494b24eca63d328java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.292.b10-1.el7_9.noarch.rpm09cd33f2498b4600c66a4b50b804b380bf784fa1a8c0eb3f92ec6156b74e310ejava-11-openjdk-demo-debug-11.0.11.0.9-1.el7_9.x86_64.rpm3d7626bbf610ca3321dbbe2f152ce1080dda51c998b72bcbbdc9deedd3994f50java-1.8.0-openjdk-headless-debug-1.8.0.292.b10-1.el7_9.i686.rpm025f84677045b1bc006ff4fb9b94d983e93bbafb5c5227c155801e50cee9a69fjava-11-openjdk-demo-debug-11.0.11.0.9-1.el7_9.i686.rpm4e2b3380bfbe792c3dc17ec39c66108b64fd7d6268873a85c9507dc39c817823java-1.8.0-openjdk-demo-debug-1.8.0.292.b10-1.el7_9.x86_64.rpmfe3d03c7aa5b25bbbba8bbfec4966633a33aa87bd64561c061609c0cd98cb7a1java-11-openjdk-static-libs-debug-11.0.11.0.9-1.el7_9.x86_64.rpmd5a2b4ebf25305d2d76e406d8c7425458f422b7a082c2abe2542d5304fbb9f76java-1.8.0-openjdk-devel-debug-1.8.0.292.b10-1.el7_9.i686.rpm24e32f28858eac569e35cea1acfad83e9778475a851a563f6243ebf7583b8f78java-11-openjdk-jmods-debug-11.0.11.0.9-1.el7_9.i686.rpm0d4f527254b81660e0c00bd87b366e7d938b953f30a37bc2a819f4a596a14dabjava-1.8.0-openjdk-accessibility-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm910eb565d7499e6844c58b3773f584cc6e0e2c05d3750de5452e9e2471a87507java-11-openjdk-headless-debug-11.0.11.0.9-1.el7_9.i686.rpmea7f20e35d355ba99ac2c946c02a7c2f8ce5a4d445825c5ad3929c0dac8138eajava-11-openjdk-debug-11.0.11.0.9-1.el7_9.i686.rpma2d0c0863c67920e8212c5175b77d34a9210a5febc07280fcbbc4f2b323d5a93java-11-openjdk-javadoc-debug-11.0.11.0.9-1.el7_9.i686.rpm82ebb5ea88130b5baccde7fb30ab71a4ce8e87394a7fd4c09d94ea03590eee12java-11-openjdk-javadoc-debug-11.0.11.0.9-1.el7_9.x86_64.rpm807f249ef9285c017d4dfee5c2e940521554d6c8378206c08d3cc4b1095b6aadjava-11-openjdk-devel-debug-11.0.11.0.9-1.el7_9.i686.rpmbca96f85c4ef034058789f509a0d5bb4b6677339dfdf275cdf1cfebf14239580java-1.8.0-openjdk-javadoc-debug-1.8.0.292.b10-1.el7_9.noarch.rpme8f5ec498e68ffd8e77385a6f7666685c600940e1b7c66a577294259d5a43066java-1.8.0-openjdk-accessibility-debug-1.8.0.292.b10-1.el7_9.i686.rpm1fb515ba0185aa49efac841b994ee51361d81257bc667d3674e4609211e715aajava-11-openjdk-jmods-debug-11.0.11.0.9-1.el7_9.x86_64.rpm2bdcbc12db372cf829c93a6fa9cb4b88acf5e3a49d80a069d05213adc493bfe7java-1.8.0-openjdk-demo-debug-1.8.0.292.b10-1.el7_9.i686.rpm0a1c20ad5252902044a839f3c8263fff1d22f7ea5cf00046b9cc6491932c1408java-11-openjdk-src-debug-11.0.11.0.9-1.el7_9.x86_64.rpm12a30ec6773dd5188740529f8a94d3fa98311a5609376c0f73a079eb63ef905ajava-11-openjdk-javadoc-zip-debug-11.0.11.0.9-1.el7_9.x86_64.rpm1060c8a7f5760644787be8e5ee05857ff13a5300c3823256589628ca2a701d2fSLSA-2021:1298-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9.x86_64.rpm6edeaf04168713d76c97ac60d7d99896e8c692e4aa5d0cd60229911165f2d729java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9.x86_64.rpmadbacd36f4f9b5815f023d1a88175b6c1e014528885323bd2d05bfb02ae9f28ejava-1.8.0-openjdk-javadoc-zip-1.8.0.292.b10-1.el7_9.noarch.rpmadf23389a8a04651ea763f3883c9f77bc38564835bf1bb76599423a1071f66c2java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9.x86_64.rpm087265fadbbacc30a0aa9e3b485705ca587ead4d557bc9244d30c797c9b5b7fbjava-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9.i686.rpm7284648b1cfbdcf5702d0ae9bf0ecf10dd9128adcbdc0cf3b951b5ff24b9b064java-1.8.0-openjdk-javadoc-1.8.0.292.b10-1.el7_9.noarch.rpmca42c18ea84acad61b4d70f3092f9a7ece7183a707fdf308926585290aab5dddjava-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9.x86_64.rpmd03c8ce0b348dd6928c11d3dfb645d2a4657f44f170706201fc479d8a627cb42java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9.i686.rpmd77c4ada5fda9a0850e0d37927c004f34a5b595a9da58dcf9a3b432ff325a164java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9.i686.rpm7213a69373655871bf60b0bc346bb499a8329615a5516b39f1daec67a15d1ebdjava-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.i686.rpm623d9d3fedf80e8038397f5569802131699c05b528dbec27d9893875c316c419java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9.x86_64.rpm8f1e47839e3931532edd0952d2dd654a0ab2a021655e0ab0c01a2e0ab3c8e228java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9.i686.rpmdcf161f4074c15ee5784e48bbe788ea29a66a3826a3d5f9fcc2a0100baceb2dfjava-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.x86_64.rpm729ea2ffc7c834f188bd8afb5aacc960a453e5542edde397ac1eebc821ac7ab5java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9.i686.rpma5bb2b2a2acf5261549aba3fa664dd82c550f31a4e3ffc8bbe1f1cb52ebd4a6aSLSA-2021:1350-1ThunderbirdThis update upgrades Thunderbird to version 78.10.0. Security Fix(es): * Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994) * Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995) * Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961) * Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998) * Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999) * Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002) * Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945) * Mozilla: Port blocking could be bypassed (CVE-2021-29946) * Mozilla: Race condition when reading from disk while verifying signatures (CVE-2021-29948) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - thunderbird-78.10.0-1.el7_9.x86_64.rpm - thunderbird-debuginfo-78.10.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-78.10.0-1.el7_9.x86_64.rpm27ff7bb70e8a0f52811bae4fed2444655d1143c8e82d93338a5c3a20588f2fc6SLSA-2021:1354-1XstreamSecurity Fix(es): * XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet (CVE-2021-21344) * XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry (CVE-2021-21345) * XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue (CVE-2021-21346) * XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator (CVE-2021-21347) * XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader (CVE-2021-21350) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 noarch - xstream-1.3.1-13.el7_9.noarch.rpm - xstream-javadoc-1.3.1-13.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7xstream-javadoc-1.3.1-13.el7_9.noarch.rpm2ecc7fa6ee2bb422a255f7346c1a40b982110351e3e3d93daa2dcbc7ec134fb2xstream-1.3.1-13.el7_9.noarch.rpm9002183ae963575c82637c92eaf93e240c2fae160ecf24a6e2913de1a5d8637dSLSA-2021:1363-1FirefoxThis update upgrades Firefox to version 78.10.0 ESR. Security Fix(es): * Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994) * Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995) * Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961) * Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998) * Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999) * Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002) * Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945) * Mozilla: Port blocking could be bypassed (CVE-2021-29946) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - firefox-78.10.0-1.el7_9.i686.rpm - firefox-78.10.0-1.el7_9.x86_64.rpm - firefox-debuginfo-78.10.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7firefox-78.10.0-1.el7_9.i686.rpmdbeaf4541e0a177fed5c3a943650a1c55f6c5ca4be2278bf258e750e8da3258bfirefox-78.10.0-1.el7_9.x86_64.rpm668cd09b9146cfe77e64f0561ed96cc794dde90f1c701d4eaf63ae128e432131SLSA-2021:1384-1NssSecurity Fix(es): * nss: TLS 1.3 CCS flood remote DoS Attack (CVE-2020-25648) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * FTBFS: Paypal Cert expired * FTBFS: IKE CLASS_1563 fails gtest * Cannot compile code with nss headers and -Werror=strict-prototypes * CA HSM ncipher token disabled after SL-7.9 update --- SL7 x86_64 - nss-3.53.1-7.el7_9.i686.rpm - nss-3.53.1-7.el7_9.x86_64.rpm - nss-debuginfo-3.53.1-7.el7_9.i686.rpm - nss-debuginfo-3.53.1-7.el7_9.x86_64.rpm - nss-devel-3.53.1-7.el7_9.i686.rpm - nss-devel-3.53.1-7.el7_9.x86_64.rpm - nss-pkcs11-devel-3.53.1-7.el7_9.i686.rpm - nss-pkcs11-devel-3.53.1-7.el7_9.x86_64.rpm - nss-sysinit-3.53.1-7.el7_9.x86_64.rpm - nss-tools-3.53.1-7.el7_9.x86_64.rpmmoderateScientific LinuxScientific Linux 7nss-pkcs11-devel-3.53.1-7.el7_9.x86_64.rpm9de797b2cfcdc8cc229ef47fb4ec244a8feaab780959d0be0ac2e754a7965709nss-pkcs11-devel-3.53.1-7.el7_9.i686.rpm2a04e2b686baf9f3095fb36281f181cac13d70033a54c2c6478cfcde3edd16b8nss-tools-3.53.1-7.el7_9.x86_64.rpm64916d0f417c88546d00651592a19f62947019455574ac2f7b04887a6934868dnss-3.53.1-7.el7_9.i686.rpm46fa84cb2dca239707b5af9e20f16ccc5d9294315fe37e9b522bf89800dbcb3enss-devel-3.53.1-7.el7_9.i686.rpm92efd45efbd9743b4c1338be321742f0ffc9b0c2f3dc9423d465909e0891587cnss-3.53.1-7.el7_9.x86_64.rpm8a388e9732a15b191de402c4877cd8f4a610ae3f6b531180147ca991458310e4nss-devel-3.53.1-7.el7_9.x86_64.rpmc7e84f4e7bce7eaa95ae02f5ada3ca4674e75b25f31695be6fcc139129f18567nss-sysinit-3.53.1-7.el7_9.x86_64.rpm944e84dff5016a57957f4fd0e4f7ac40d2b03659d269083286aa3cc20749fabeSLSA-2021:1389-1OpenldapSecurity Fix(es): * openldap: NULL pointer dereference for unauthenticated packet in slapd (CVE-2020-25692) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - openldap-2.4.44-23.el7_9.i686.rpm - openldap-2.4.44-23.el7_9.x86_64.rpm - openldap-clients-2.4.44-23.el7_9.x86_64.rpm - openldap-debuginfo-2.4.44-23.el7_9.i686.rpm - openldap-debuginfo-2.4.44-23.el7_9.x86_64.rpm - openldap-devel-2.4.44-23.el7_9.i686.rpm - openldap-devel-2.4.44-23.el7_9.x86_64.rpm - openldap-servers-2.4.44-23.el7_9.x86_64.rpm - openldap-servers-sql-2.4.44-23.el7_9.x86_64.rpmmoderateScientific LinuxScientific Linux 7openldap-devel-2.4.44-23.el7_9.x86_64.rpmc4ab39a53ed3b7bb4f40dc04dcb331d76549a4e65f7f0b133ce34c3ad4929f6dopenldap-2.4.44-23.el7_9.x86_64.rpm7d1b468fd544df1619789b5b84c2e9bbc652e6b5b28bdc697819b0d9cc7e94b8openldap-clients-2.4.44-23.el7_9.x86_64.rpmc8b54025ff6c00c6b495fc954f5b7df7858a05b302acd95c0e9898863aa85ac9openldap-2.4.44-23.el7_9.i686.rpmfd10af55c5e2b360e0ee4415366c8a70c20d17bee41f8fba730521a9f5087edeopenldap-servers-2.4.44-23.el7_9.x86_64.rpma2a6a577481dfc70c41991fcd7fc83d5f9ef43bf8858b216813cf13e3bdd56d9openldap-servers-sql-2.4.44-23.el7_9.x86_64.rpm85aecde5a653c61d7d092db4c474810a86c2a72839d3d618dcea9e943f0d568copenldap-devel-2.4.44-23.el7_9.i686.rpm148afb143da738103e79fa5ef8fd77a8967b0badc3662c6b1a0d0705527fb980SLSA-2021:1469-1BindSecurity Fix(es): * bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - bind-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-debuginfo-9.11.4-26.P2.el7_9.5.i686.rpm - bind-debuginfo-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-devel-9.11.4-26.P2.el7_9.5.i686.rpm - bind-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-export-devel-9.11.4-26.P2.el7_9.5.i686.rpm - bind-export-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-export-libs-9.11.4-26.P2.el7_9.5.i686.rpm - bind-export-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-libs-9.11.4-26.P2.el7_9.5.i686.rpm - bind-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-libs-lite-9.11.4-26.P2.el7_9.5.i686.rpm - bind-libs-lite-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-lite-devel-9.11.4-26.P2.el7_9.5.i686.rpm - bind-lite-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-pkcs11-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.i686.rpm - bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.i686.rpm - bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-pkcs11-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-sdb-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-sdb-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm - bind-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm noarch - bind-license-9.11.4-26.P2.el7_9.5.noarch.rpmimportantScientific LinuxScientific Linux 7bind-export-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm5f12080002eed2b3d0a5fe0d6ba3ae0e493c0381fa9774ffdd5cee036061a661bind-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm774c99015bc2d7baa39bd1348801f0737353305e3111a2e54c4d246721f9b918bind-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm5ac89251e16484e5d8d51ec3ec74b8593b1f7e44421a4c2c2c12c739c424198abind-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm04d776e8211418700d08b85c04ec9a87f114ad6aff51b5af0f8245a9bd0ebf4bbind-9.11.4-26.P2.el7_9.5.x86_64.rpm52932470558a95a9898dd936150ba8d7d5d1494fd33b28e0fb7e3cc876e85827bind-libs-lite-9.11.4-26.P2.el7_9.5.i686.rpme09f37081e387b39c847460852f1f063d2bf45b1eb51a5faa7b908e3b1692f17bind-lite-devel-9.11.4-26.P2.el7_9.5.i686.rpm93b73fa12dd56caed82ccac43a574078149254704f2bc72a0470c26dc276ac6dbind-devel-9.11.4-26.P2.el7_9.5.i686.rpmda50831ec3b2b0082f6afb1063c471e85c72a7f9625e037f481a6ebd16df6ec8bind-libs-9.11.4-26.P2.el7_9.5.i686.rpm2434d790ef2452f0887d8bb623d4e64057327d9b96e9fc87c347075ae9a31436bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.i686.rpmc1853aeb2a81d958cce56306aa4add20566b32e562c0d813dbd7a54c72265db0bind-export-devel-9.11.4-26.P2.el7_9.5.i686.rpmdd979fdb8a371cfaf0e06724b90691e2dc742dab923870ca92f84600ac103a19bind-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm1ddb59ec131528bb776e435125a5117d5a42dbf4ccde72580fa129dc95b7f998bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm1adbfc28887c4de3d43e936db64d8e7b29ba01f03ad1087ae3b6ca4c2eb6a715bind-pkcs11-9.11.4-26.P2.el7_9.5.x86_64.rpm3519feefe599d74baeb7cc28541296e856f7c5ca3ba404acf4e8c0ae0f83a248bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.x86_64.rpmdd9591546ab81de27fd16f3f509dda1250c4eec929644d02aa9f3603f8116d81bind-sdb-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm7e0d29db6cb6308fe03e6db8b4701e2ee5d392a0d28a1bc266b4017a8af9ad62bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.i686.rpm65cd52b5f02b1cfbc2c72d324520e3e1c45762ba676522175fb1c889f682c0a2bind-sdb-9.11.4-26.P2.el7_9.5.x86_64.rpm1a54382277a41b4d57517df82f5ce170034b915e91f2e46349f10c019c3b35e6bind-license-9.11.4-26.P2.el7_9.5.noarch.rpm937c00c41008fa6a8771e1b421b4fc0d85fd86dea954d9543eb489091019d111bind-pkcs11-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm1c2bc6b788dbd7703f88045376009b98493a97ca155af266dd3ffb8a6d80481ebind-export-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm3a08818423154fa939cc02b2acfb974d8fdd7d9a6bdeb3a98cf0ac1e6aa3efe6bind-lite-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm51cea52e6d70ec317d51e8fe2e80f3b77cadb97ba8b32c168e190f9b1cc42df4bind-export-libs-9.11.4-26.P2.el7_9.5.i686.rpm5c4745efc2fba02f614bc1d5f9e45ac28360f9033761a90666e03575e78c59f6bind-libs-lite-9.11.4-26.P2.el7_9.5.x86_64.rpm7445a4d51ed6814795bc41931485e412959d1cf7e5ec5c73e6df210edb3df949SLSA-2021:1512-1PostgresqlSecurity Fix(es): * postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) * postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) * postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution (CVE-2019-10208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - postgresql-9.2.24-6.el7_9.i686.rpm - postgresql-9.2.24-6.el7_9.x86_64.rpm - postgresql-contrib-9.2.24-6.el7_9.x86_64.rpm - postgresql-debuginfo-9.2.24-6.el7_9.i686.rpm - postgresql-debuginfo-9.2.24-6.el7_9.x86_64.rpm - postgresql-devel-9.2.24-6.el7_9.i686.rpm - postgresql-devel-9.2.24-6.el7_9.x86_64.rpm - postgresql-docs-9.2.24-6.el7_9.x86_64.rpm - postgresql-libs-9.2.24-6.el7_9.i686.rpm - postgresql-libs-9.2.24-6.el7_9.x86_64.rpm - postgresql-plperl-9.2.24-6.el7_9.x86_64.rpm - postgresql-plpython-9.2.24-6.el7_9.x86_64.rpm - postgresql-pltcl-9.2.24-6.el7_9.x86_64.rpm - postgresql-server-9.2.24-6.el7_9.x86_64.rpm - postgresql-static-9.2.24-6.el7_9.i686.rpm - postgresql-static-9.2.24-6.el7_9.x86_64.rpm - postgresql-test-9.2.24-6.el7_9.x86_64.rpm - postgresql-upgrade-9.2.24-6.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7postgresql-server-9.2.24-6.el7_9.x86_64.rpm13a43265d2a3f0399dbeb8650fd44ce7cf064a5082a1a13ee263a4e5b2f2017apostgresql-devel-9.2.24-6.el7_9.x86_64.rpma46b2709b9a06be227d0a9504dc34592f8c0cc5495d41a52ad85f67d3bb4cdc4postgresql-9.2.24-6.el7_9.x86_64.rpmb54b8faa628b7928240cc047de9648888f6834e88fd302e1ea19e4526df7b47dpostgresql-upgrade-9.2.24-6.el7_9.x86_64.rpma1f9e294cf6a6b0dbf5472ffc42946c8eb7f6f6b999de851d7eb2f06b5b9848bpostgresql-9.2.24-6.el7_9.i686.rpm8b554d1337699f1a83589a30e426978094fc7483066b317095e3501bcca3453epostgresql-devel-9.2.24-6.el7_9.i686.rpm24e50e2bcbcd328ac72503f34bc8a23d9a680df300ad6b7c2c0feeeb4cf1129dpostgresql-pltcl-9.2.24-6.el7_9.x86_64.rpmdeac119a80db8d2e3c3d75857be661445fc171e4bc4aaa76595a053295bd093fpostgresql-static-9.2.24-6.el7_9.i686.rpm35c129497e7c62242bdfe8cfd5ac8ce7b3341c94bcc30ce5931ab5dbeb375552postgresql-docs-9.2.24-6.el7_9.x86_64.rpm88664b6db2f6bf2e9d987f0310bdf165b0b334591e5dcaa442ff7177a388de4epostgresql-plpython-9.2.24-6.el7_9.x86_64.rpm1dd1e6e73a83e66cd49691e2ff5d2bb0a78cafab2d756031de3a1357bfb3670epostgresql-test-9.2.24-6.el7_9.x86_64.rpm002be0d729f775fd923898a302d85600951ccbbeb44be32ad2a4839c726d6d26postgresql-plperl-9.2.24-6.el7_9.x86_64.rpma7f95a93113c7bf49d560e2e2d7f25381263e9c3e8db95bde96f3b21d0fea763postgresql-static-9.2.24-6.el7_9.x86_64.rpmb4a8eb4283bfdae2206f4419c69bf49236f8358dc7cb7728882d30bfc3f8b7bbpostgresql-libs-9.2.24-6.el7_9.x86_64.rpm477b5f0b7e2864b6503c2f5fb08b852b34dbb7eceaa411e471235aaae2a64f8apostgresql-libs-9.2.24-6.el7_9.i686.rpmd929748c04c4fc3d85556033ca3b3b50e454fee4c67ee56bfbfb64d30371a0c3postgresql-contrib-9.2.24-6.el7_9.x86_64.rpmecc7664978f843392d0baeb80516fa54aad6913d69bf6e8b5cd69bc92061020fSLSA-2021:2032-1Slapi-NisSecurity Fix(es): * slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - slapi-nis-0.56.5-4.el7_9.x86_64.rpm - slapi-nis-debuginfo-0.56.5-4.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7slapi-nis-0.56.5-4.el7_9.x86_64.rpm6dfcfec44b8eae028e7946736c04aa975f5c9a2b13e5400da680b1c9f9caf52bSLSA-2021:2033-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: XChangeFeedbackControl integer underflow leads to privilege escalation (CVE-2021-3472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - xorg-x11-server-Xdmx-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xephyr-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xnest-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xorg-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xvfb-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-Xwayland-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-common-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-debuginfo-1.20.4-16.el7_9.i686.rpm - xorg-x11-server-debuginfo-1.20.4-16.el7_9.x86_64.rpm - xorg-x11-server-devel-1.20.4-16.el7_9.i686.rpm - xorg-x11-server-devel-1.20.4-16.el7_9.x86_64.rpm noarch - xorg-x11-server-source-1.20.4-16.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7xorg-x11-server-Xdmx-1.20.4-16.el7_9.x86_64.rpm6a2a64f392461a3b1798f2c302639c694ce80af3c9c8400fd6a4b48bd2d07f54xorg-x11-server-devel-1.20.4-16.el7_9.x86_64.rpmee7a8ed348dab7340c8d5207228f6e2bd64e0e046d079d7714ffc986001873d7xorg-x11-server-common-1.20.4-16.el7_9.x86_64.rpm20e2e6671dd40ce6f5709f9f9ca380787fee0a3b7a6c8a796bdf946b59258a58xorg-x11-server-Xorg-1.20.4-16.el7_9.x86_64.rpm3d263b42fd00a1bc625a17575b763e61b0e44d3770ddd403473adfa1f608602bxorg-x11-server-Xvfb-1.20.4-16.el7_9.x86_64.rpm93ed5a11123ff02f577e4714f6ee7b6948362b95c6cdae9501006c6de7567654xorg-x11-server-Xephyr-1.20.4-16.el7_9.x86_64.rpmab7c5ecda7303df4af58245291daef6c585fb946a021a625899271b965112f8exorg-x11-server-devel-1.20.4-16.el7_9.i686.rpm0cddf15d75c07eb4495bafc2e68800bc009c65ec332c60b48f6cc11276437422xorg-x11-server-Xwayland-1.20.4-16.el7_9.x86_64.rpm79a98194010cfed4a7a94c41206fedd321efa41aec8b350e841bcc81640e0388xorg-x11-server-Xnest-1.20.4-16.el7_9.x86_64.rpmdba96725be36791a883264af65d73262f268d36501250f164888631570cfb6d4xorg-x11-server-source-1.20.4-16.el7_9.noarch.rpmec17ae4c7d16c6c046921d42d4155b519290c9e019f112cc3165b805c7744778SLSA-2021:2147-1Glib2Security Fix(es): * glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE ----- SL7 x86_64 - glib2-2.56.1-9.el7_9.i686.rpm - glib2-2.56.1-9.el7_9.x86_64.rpm - glib2-debuginfo-2.56.1-9.el7_9.i686.rpm - glib2-debuginfo-2.56.1-9.el7_9.x86_64.rpm - glib2-devel-2.56.1-9.el7_9.i686.rpm - glib2-devel-2.56.1-9.el7_9.x86_64.rpm - glib2-fam-2.56.1-9.el7_9.x86_64.rpm - glib2-static-2.56.1-9.el7_9.i686.rpm - glib2-static-2.56.1-9.el7_9.x86_64.rpm - glib2-tests-2.56.1-9.el7_9.x86_64.rpm noarch - glib2-doc-2.56.1-9.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7glib2-tests-2.56.1-9.el7_9.x86_64.rpm02520b0ebb0cf7e0a5e9397fb4daa2545702764867693f2deeb5b132fa2cb0c8glib2-doc-2.56.1-9.el7_9.noarch.rpm71008da68cdfc784b6dc939ea17a2de7e7e34db0694983f4e87dba4ae175bc3eglib2-2.56.1-9.el7_9.i686.rpm7c88e4ba0edbbb2d5831e0d90860a239c1b0b104ca9558ad1c1524c8cb37ce9fglib2-static-2.56.1-9.el7_9.i686.rpme455d5f1b61eb74b40d4f9dcea43818954ec8e8bbb640101a6f382e56f118061glib2-devel-2.56.1-9.el7_9.x86_64.rpmc30ed59651df9ad80a6770b71379384b5efe926628fbf4692c2bd8e8c88e52c6glib2-2.56.1-9.el7_9.x86_64.rpm7e8632f2c3557076b52c2bcd40f6e8c8799af61e4dd641a7a82a04074f453059glib2-fam-2.56.1-9.el7_9.x86_64.rpmf20e6e399f5ce60cb494f80096222050f02bc70e181261b2ba342171674e85fcglib2-static-2.56.1-9.el7_9.x86_64.rpm97ce77b9c203931971627d4b79e4a79e618a5aed74a76f464ad4596e3cfaae3cglib2-devel-2.56.1-9.el7_9.i686.rpmf5b6e9f7130c9060ead03a9eccce33b0217f061be640ed896034f10f969290ecSLSA-2021:2206-1FirefoxThis update upgrades Firefox to version 78.11.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 (CVE-2021-29967) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - firefox-78.11.0-3.el7_9.i686.rpm - firefox-78.11.0-3.el7_9.x86_64.rpm - firefox-debuginfo-78.11.0-3.el7_9.x86_64.rpmcriticalScientific LinuxScientific Linux 7firefox-78.11.0-3.el7_9.x86_64.rpm460e9b9d43dff32fec92291d72995fcc32837e1eff428ffaa799376b642c971cfirefox-78.11.0-3.el7_9.i686.rpmffa44d31cf931ba3ee78db4b3eb806f2ecd97561508a84053ab3bf7897661fdbSLSA-2021:2260-1LibwebpSecurity Fix(es): * libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) * libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) * libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - libwebp-0.3.0-10.el7_9.i686.rpm - libwebp-0.3.0-10.el7_9.x86_64.rpm - libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm - libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm - libwebp-devel-0.3.0-10.el7_9.i686.rpm - libwebp-devel-0.3.0-10.el7_9.x86_64.rpm - libwebp-java-0.3.0-10.el7_9.x86_64.rpm - libwebp-tools-0.3.0-10.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7libwebp-tools-0.3.0-10.el7_9.x86_64.rpmc45e7e543b9e9122850a55e5e94f14c3c555539e4238d302d71509fb5c558c83libwebp-devel-0.3.0-10.el7_9.x86_64.rpm0e9dea5793b1620cf4b8947c70e5b15d5e56f4b10b342d9ff46bf9cad44aa3f7libwebp-0.3.0-10.el7_9.i686.rpmc7c8944319977c15afb204ecae3b947eeaf258f7c7435675a6f8e7974029a5b2libwebp-devel-0.3.0-10.el7_9.i686.rpmab915f9d617061e7465a1e70e84cc78e43359dce1e5a44fbcedbc1c3636dd0f0libwebp-0.3.0-10.el7_9.x86_64.rpmeec5495efec86d0c336291e4b4a8529f0fc2c4b58c94dc9d397d3e20f261cf2flibwebp-java-0.3.0-10.el7_9.x86_64.rpm3052051d8334ead45132328c82d330d98df5f11bd6919b90bbdde3ffaa08263dSLSA-2021:2263-1ThunderbirdThis update upgrades Thunderbird to version 78.11.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 (CVE-2021-29967) * Mozilla: Thunderbird stored OpenPGP secret keys without master password protection (CVE-2021-29956) * Mozilla: Partial protection of inline OpenPGP message not indicated (CVE-2021-29957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - thunderbird-78.11.0-1.el7_9.x86_64.rpm - thunderbird-debuginfo-78.11.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-78.11.0-1.el7_9.x86_64.rpm14a6750cef537a37e7a776f11d13460260cb59d4cdd01c5d92b8eaa134dc1b10SLSA-2021:2305-1Microcode_CtlSecurity Fix(es): * hw: vt-d related privilege escalation (CVE-2020-24489) * hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) * hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) * hw: information disclosure on some Intel Atom processors (CVE-2020-24513) Bug Fix(es) and Enhancement(s): * Update Intel CPU microcode to microcode-20210525 release --- SL7 x86_64 microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7microcode_ctl-2.1-73.9.el7_9.x86_64.rpm8a41f6c98891c5e2891129fbcaa9cc7ef5d648a0c4e84107665486b80a36c569SLSA-2021:2313Moderate: Samba Security And Bug Fix UpdateSamba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * smb.service stops when samba rpms are updated (BZ#1930747) * samba printing dumps core (BZ#1937867) moderateScientific Linux 7ctdb-tests-4.10.16-15.el7_9.x86_64.rpm2528a7abd08712c2e83b2d01510bf14e8f036bf31c2adfaa29f9f4ad9aa971d8ctdb-4.10.16-15.el7_9.x86_64.rpm69326f1343382296243313ccb2c28e33cd1f41edd81337f9b06c7f14c92a3417SLSA-2021:2313-1SambaSecurity Fix(es): * samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * smb.service stops when samba rpms are updated * samba printing dumps core --- SL7 x86_64 libsmbclient-4.10.16-15.el7_9.i686.rpm libsmbclient-4.10.16-15.el7_9.x86_64.rpm libsmbclient-devel-4.10.16-15.el7_9.i686.rpm libsmbclient-devel-4.10.16-15.el7_9.x86_64.rpm libwbclient-4.10.16-15.el7_9.i686.rpm libwbclient-4.10.16-15.el7_9.x86_64.rpm libwbclient-devel-4.10.16-15.el7_9.i686.rpm libwbclient-devel-4.10.16-15.el7_9.x86_64.rpm samba-4.10.16-15.el7_9.x86_64.rpm samba-client-4.10.16-15.el7_9.x86_64.rpm samba-client-libs-4.10.16-15.el7_9.i686.rpm samba-client-libs-4.10.16-15.el7_9.x86_64.rpm samba-common-libs-4.10.16-15.el7_9.i686.rpm samba-common-libs-4.10.16-15.el7_9.x86_64.rpm samba-common-tools-4.10.16-15.el7_9.x86_64.rpm samba-dc-4.10.16-15.el7_9.x86_64.rpm samba-dc-libs-4.10.16-15.el7_9.x86_64.rpm samba-debuginfo-4.10.16-15.el7_9.i686.rpm samba-debuginfo-4.10.16-15.el7_9.x86_64.rpm samba-devel-4.10.16-15.el7_9.i686.rpm samba-devel-4.10.16-15.el7_9.x86_64.rpm samba-krb5-printing-4.10.16-15.el7_9.x86_64.rpm samba-libs-4.10.16-15.el7_9.i686.rpm samba-libs-4.10.16-15.el7_9.x86_64.rpm samba-python-4.10.16-15.el7_9.i686.rpm samba-python-4.10.16-15.el7_9.x86_64.rpm samba-python-test-4.10.16-15.el7_9.x86_64.rpm samba-test-4.10.16-15.el7_9.x86_64.rpm samba-test-libs-4.10.16-15.el7_9.i686.rpm samba-test-libs-4.10.16-15.el7_9.x86_64.rpm samba-vfs-glusterfs-4.10.16-15.el7_9.x86_64.rpm samba-winbind-4.10.16-15.el7_9.x86_64.rpm samba-winbind-clients-4.10.16-15.el7_9.x86_64.rpm samba-winbind-krb5-locator-4.10.16-15.el7_9.x86_64.rpm samba-winbind-modules-4.10.16-15.el7_9.i686.rpm samba-winbind-modules-4.10.16-15.el7_9.x86_64.rpm noarch samba-common-4.10.16-15.el7_9.noarch.rpm samba-pidl-4.10.16-15.el7_9.noarch.rpmmoderateScientific LinuxScientific Linux 7samba-python-4.10.16-15.el7_9.i686.rpm3bf08c96289e6609050edc7e544893b1c9a5e09067ac53e9c6c4635bd3ffb766samba-libs-4.10.16-15.el7_9.x86_64.rpm963af811ad5dba4265daa8f8a64eb47b8f4125e26ecaa248ac83546b80d8777csamba-winbind-modules-4.10.16-15.el7_9.x86_64.rpma0077b3516a5ec8cef57b138f6161f2d1ac71edb9a0700dc84f990a5a0c93a6flibwbclient-devel-4.10.16-15.el7_9.i686.rpmfcb4911e26b223e9506ac04519eeb4e8a757270d4e51cc5f25a2de47ca037163samba-client-libs-4.10.16-15.el7_9.x86_64.rpm5d04a03b32a375baf0ae04d00724f2f0f6b75995aa54c3dd03f94264517cf6f5samba-common-libs-4.10.16-15.el7_9.x86_64.rpm9522acf0e649723e808fc7a15aa11f4047696074b59c08216271a8843bcd5da9samba-python-4.10.16-15.el7_9.x86_64.rpm1b4b8e88dc3795e20dcea916964ef368b00aa0f4de34fd51416dbb69135c0880samba-libs-4.10.16-15.el7_9.i686.rpm8b27e9c6089087bd6f05226f64bab1d7a45403695e4c9fdfdabf89ceadd0e02dsamba-test-libs-4.10.16-15.el7_9.i686.rpm9b0fe9fb48ddda3ed0f438b7ba79a3b88b1154bb9971bf3e222b55cc26c30ca4samba-dc-libs-4.10.16-15.el7_9.x86_64.rpm5e97176ca96821cf7b2987ad6778852edeefa029247ea222f178224454936116samba-test-libs-4.10.16-15.el7_9.x86_64.rpm4693eda3daca745d78f4a07bc36c41d7d1cbc6113b521d604472a8675a6d43c4samba-devel-4.10.16-15.el7_9.x86_64.rpm4ea0d60644619ed6909a51a0d3872b005f554c96c57e86400dcb53c168ce0b65libwbclient-devel-4.10.16-15.el7_9.x86_64.rpm541d45d9952b27d8aae45dfee62461b9ef0522eb86c1c9a86b8c33c587869b9bsamba-python-test-4.10.16-15.el7_9.x86_64.rpmc02fa36775cde71f0544da4873695f57a7f8b3eab8db8159734475cc3011ba67samba-winbind-clients-4.10.16-15.el7_9.x86_64.rpm42cc740c2b2a91a831f7bdc3230194787daa79abf26b1365e848d170de97ecbasamba-pidl-4.10.16-15.el7_9.noarch.rpma91fbce57c5064ae71882789184f99f7243d33673cc2b408d18c7067b49c0f27libwbclient-4.10.16-15.el7_9.x86_64.rpm45f6edf64767adcab7ad34a3ad7c63d0c4719d398df338dc169219806e1d7018samba-winbind-modules-4.10.16-15.el7_9.i686.rpm1fa938d059993bfc45d595574c6999fd4f061684fdf951118a6e83020d1416aclibwbclient-4.10.16-15.el7_9.i686.rpm0027f30c8daa1b1244fb454bb207a937744c0fe26441cd9f202eb4aba5cb7e06samba-vfs-glusterfs-4.10.16-15.el7_9.x86_64.rpmaa3617c92e2f894b6d62ade87fc696e02387bb5bc58a31accbc7ebce985ca9f0samba-common-4.10.16-15.el7_9.noarch.rpm4fb374a6298799a03fff8eab3a1b72575e00874d3de4eb9fb6902b8e34ea5bb0samba-devel-4.10.16-15.el7_9.i686.rpm5dcd901abf67c55779f7d66b45042221c291f91b06dcdd52987586c0a189b277samba-common-libs-4.10.16-15.el7_9.i686.rpm28fdbfa6a292b8f48ad831e6bfba4f6a7b16ba2c39c064679a1335d9201e6da7samba-client-libs-4.10.16-15.el7_9.i686.rpm5800750cc72e98dca3f66cffcd98de3cdc4956705b7d15defa356a15bd0c2ab0libsmbclient-devel-4.10.16-15.el7_9.x86_64.rpm13fca3c22d89f209c28012214df13cdc52972f9572afbb7da8bc1118d70edefdsamba-client-4.10.16-15.el7_9.x86_64.rpmc87e85699cd76dd6849214745a5bc836fdc9402ed58ccc7c5fd317505d1c7fb7samba-dc-4.10.16-15.el7_9.x86_64.rpm1bb49aca0d1c28f45c006f4481d6f3d2addcbcf2c03fb18da465a0c482a09a9dlibsmbclient-4.10.16-15.el7_9.i686.rpma1d617af8ba3c59a4c1374e93e31276ef7701468d90b52d93ca3a511476042f3libsmbclient-4.10.16-15.el7_9.x86_64.rpm38fcc3da40f8d15fffd50868e35dd44de40449b82a3133cf2c8ae6c624180f4dsamba-common-tools-4.10.16-15.el7_9.x86_64.rpmecf340838f6a535449d829827da7ecaf25b83e51529a606f4754c8c4eb7d2f31samba-winbind-4.10.16-15.el7_9.x86_64.rpm8c73518a4061449bdcf6ea0a7b6068f710b2098d4ee1768dbc7f46ce97c33a1csamba-winbind-krb5-locator-4.10.16-15.el7_9.x86_64.rpm077416a1636d36455d70022191d90ef391f7afb49da60fb87bba6c8fc0fe9fbcsamba-4.10.16-15.el7_9.x86_64.rpm0199d755d8c5759035e92e83969a69b1bb0e6f70c63f61f61fa51d82d20f1bf3samba-krb5-printing-4.10.16-15.el7_9.x86_64.rpm3086146d97fbd2fa391f0df8be69d3bb0bcb6558f8f0720e036a046f2b05a7e5samba-test-4.10.16-15.el7_9.x86_64.rpm6fe9c97b1783752e9919df0798864794c9e8394b4f21566eeb0fc3e66194d19alibsmbclient-devel-4.10.16-15.el7_9.i686.rpm41060951f6192311613b9ab0b609916c5704ea15f3d586f9f790133820855594SLSA-2021:2314-1KernelSecurity Fix(es): * kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362) * kernel: Use after free via PI futex state (CVE-2021-3347) * kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648) * kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363) * kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364) * kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module * SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation * netfilter: reproducible deadlock on nft_log module autoload * netfilter: NULL pointer dereference in nf_tables_set_lookup() * [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap policy equal to 0 watts" * A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. * netxen driver performs poorly with RT kernel * gendisk->disk_part_tbl->last_lookup retains pointer after partition deletion * Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix * SL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path * SL7.9 - mm/THP: do not access vma->vm_mm after calling handle_userfault * raid: wrong raid io account * qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings * SL 7.9.z - System hang caused by workqueue stall in qla2xxx driver * selinux: setsebool can trigger a deadlock * [Hyper-V][SL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V --- SL7 x86_64 - bpftool-3.10.0-1160.31.1.el7.x86_64.rpm - bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm - kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm - perf-3.10.0-1160.31.1.el7.x86_64.rpm - perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm - python-perf-3.10.0-1160.31.1.el7.x86_64.rpm - python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm noarch - kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm - kernel-doc-3.10.0-1160.31.1.el7.noarch.rpmimportantScientific LinuxScientific Linux 7kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpmf146169c2e1e2682199b5c6bd03bbe577981645ee5d6b934fd9e1398b794d803kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm001620ea5a1a14ea9a67858d93fdf75581592c8fb1b41b955ca9f515cd900840kernel-3.10.0-1160.31.1.el7.x86_64.rpm33b83b872b03d304dffd44ca8c30ad2ae1b11a7eef719a275521dd71211c6368kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpmb20c4f7db9b6e2720919e918298cee1a16cde0d8bb7cf6d1e8b8bec836f3551apython-perf-3.10.0-1160.31.1.el7.x86_64.rpme3b8261de98a47a78985ee7c714b02bb06d4be508fdcca23466d188ca191cc05kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpmf43dec0a3daa151b602415f6509ac6b62c604bca386112bc506124a347208b71kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm0a87d41078aad213f57ca583375d11182452104cca0b6c0a889b1183605a791cbpftool-3.10.0-1160.31.1.el7.x86_64.rpm19bb2ab022c1b5baa08e787b3b0491a830396095772e3535f8410cf775016cbbkernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm15a4b566b7e4fb25a5d6f195d3301d27c7d69db5eaddf72dc0db5907a2aa903eperf-3.10.0-1160.31.1.el7.x86_64.rpmed9b20cf0449eec46adff1d83a44d964feec09ac1aea06b6eebd432a85ae4e0ekernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm4de8770b19792d3525e3a44c54654d8e56a3c66606f4b8f6982673989e65de84kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm2d242882671570f55531142c32916b7679bd8a6c8c8790de86ee3c86ae0c4bb5kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm4d6aadaec334fc5b5f1cfce3ff588e6af061c3b86948b1201e7b1e282949bcc2SLSA-2021:2318-1HivexSecurity Fix(es): * hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 hivex-1.3.10-6.11.el7_9.i686.rpm hivex-1.3.10-6.11.el7_9.x86_64.rpm hivex-debuginfo-1.3.10-6.11.el7_9.i686.rpm hivex-debuginfo-1.3.10-6.11.el7_9.x86_64.rpm hivex-devel-1.3.10-6.11.el7_9.i686.rpm hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm ocaml-hivex-1.3.10-6.11.el7_9.x86_64.rpm ocaml-hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm perl-hivex-1.3.10-6.11.el7_9.x86_64.rpm python-hivex-1.3.10-6.11.el7_9.x86_64.rpm ruby-hivex-1.3.10-6.11.el7_9.x86_64.rpmmoderateScientific LinuxScientific Linux 7ruby-hivex-1.3.10-6.11.el7_9.x86_64.rpm70ff83bd89b3a516c62a82ca22036e00b35f6d738a21541f6cfb28c336321c50ocaml-hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm7922ba897f8ba607bf961263e17cea88351ded69ff9ffb523ddc3d7a6f5d5cefhivex-1.3.10-6.11.el7_9.x86_64.rpmb4bc08184a6fcbfcf3fc701eae65c5401c847cbf052fed4c5036c7d49efdd443perl-hivex-1.3.10-6.11.el7_9.x86_64.rpm927ae1e774035bec849f0847ad3d315c9dfe5c5b859dbf4306b6ac603b45cec7ocaml-hivex-1.3.10-6.11.el7_9.x86_64.rpm9a4dc3d3fc98a74dc47aba35c26e4c41b17e28e5b0536ff2dcf64c4284a9fb8dhivex-devel-1.3.10-6.11.el7_9.x86_64.rpm774709ff3467b495de350f692372acc34009f17b08ef11a6b2a67cf4501f7daepython-hivex-1.3.10-6.11.el7_9.x86_64.rpmcd86f76c5c12683ceb78941a9d1af7fd142bfac23d2eb19c789ffd56e416c23ahivex-devel-1.3.10-6.11.el7_9.i686.rpma3ba7c6fbac4ec4872695e6a866e3e6e6a2f0c9ce3a0086e83fee3c06d9c38behivex-1.3.10-6.11.el7_9.i686.rpma68119a2bc76e35331c85acf2974fbe9d0c93026c4c64174b1bca8e5fbb465edSLSA-2021:2322-1Qemu-KvmSecurity Fix(es): * QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 qemu-img-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-common-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-debuginfo-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-tools-1.5.3-175.el7_9.4.x86_64.rpmmoderateScientific LinuxScientific Linux 7qemu-kvm-1.5.3-175.el7_9.4.x86_64.rpmc9072966f802b13c51cc26cad520ba4de9a77f2725322d2c18cde51b47f50d0bqemu-kvm-tools-1.5.3-175.el7_9.4.x86_64.rpme537aa8950b76e2290bc2ae1a8a1d399e59c2423bb14751ad1f6fe5c323dc692qemu-kvm-common-1.5.3-175.el7_9.4.x86_64.rpm4aa234a0664bcf8dde65870311bce96b737b9220f914667bafe5ea22b5418114qemu-img-1.5.3-175.el7_9.4.x86_64.rpm364a06918e63444100221d6472bbda6129b9b69703f44e360c611d5e55f11106SLSA-2021:2323-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: information disclosure during the binding of a DN (CVE-2020-35518) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Add new access log keywords for time spent in work queue and actual operation time --- SL7 x86_64 389-ds-base-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-debuginfo-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-devel-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-libs-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-snmp-1.3.10.2-12.el7_9.x86_64.rpmmoderateScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.10.2-12.el7_9.x86_64.rpmbb65147d453338e7cca13421f947e9ebfc5949e1a34e3829745aafa0a071be5e389-ds-base-1.3.10.2-12.el7_9.x86_64.rpm7b3d1df912cf00d8fc800b3f6caf477abfa0325dc1ff603b5a921cdda3c98533389-ds-base-libs-1.3.10.2-12.el7_9.x86_64.rpmd717f396ae302b7ca1392319957a4b31d2c9fa8253000a12ffe78743b8ceaa01389-ds-base-devel-1.3.10.2-12.el7_9.x86_64.rpmfbe5956bda164c7d8b150849c61601a3e104c3d7d63e15b8b3aa773a5da8ced1SLSA-2021:2328-1Qt5-QtimageformatsSecurity Fix(es): * libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) * libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) * libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) * libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 qt5-qtimageformats-5.9.7-2.el7_9.i686.rpm qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.i686.rpm qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.x86_64.rpm noarch qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7qt5-qtimageformats-5.9.7-2.el7_9.i686.rpm3ae2e559638d0781783b638233cef303a46eaf2dde1f2c7ba68ca6c4db3ab4a3qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpm682d1477d439225104ba4f3a5749071cebddefddb4119c83b6d896a4c18d6375qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm4fdab3f7df2e30a71dbc732a5be85d3dfda87518d11f8c37c3defcc6517e00e7SLSA-2021:2357Important: Dhcp Security UpdateThe Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7dhcp-4.2.5-83.sl7_9.1.x86_64.rpmb287c98b390f00cbb5ebc28a9d5389e387cd1b86e3ae24b20c907aa6e80e1811dhcp-devel-4.2.5-83.sl7_9.1.x86_64.rpme4c7db95a5e4d4ca0c18209014b43b8c2d0dbcdafe4ca27e5e1c0ef8cc13bb4ddhcp-devel-4.2.5-83.sl7_9.1.i686.rpmbc9e52b40a91c46f225d2ef5033505d49d1ffbe9ea59353c7b7dc0695aa335efdhclient-4.2.5-83.sl7_9.1.x86_64.rpm8949ed6e47882dea0ea828752573794a630e70d8760ea7cb03323ceaac492d0edhcp-common-4.2.5-83.sl7_9.1.x86_64.rpm3d5dd700d355b3bdeb1501218cce589e0577778e0760e1814a4072a2cae8729fdhcp-libs-4.2.5-83.sl7_9.1.i686.rpm6aa8ea106a32c5eb0beaf64acae8951f4a0a12c7501069e3503d8d9b069db3a9dhcp-libs-4.2.5-83.sl7_9.1.x86_64.rpmc76788b9c008cf2b5b9542e4cedb2c9cbb5acd81eeae9cbf259cf1687a3566efSLSA-2021:2397-1PostgresqlSecurity Fix(es): * postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 postgresql-9.2.24-7.el7_9.i686.rpm postgresql-9.2.24-7.el7_9.x86_64.rpm postgresql-contrib-9.2.24-7.el7_9.x86_64.rpm postgresql-debuginfo-9.2.24-7.el7_9.i686.rpm postgresql-debuginfo-9.2.24-7.el7_9.x86_64.rpm postgresql-devel-9.2.24-7.el7_9.i686.rpm postgresql-devel-9.2.24-7.el7_9.x86_64.rpm postgresql-docs-9.2.24-7.el7_9.x86_64.rpm postgresql-libs-9.2.24-7.el7_9.i686.rpm postgresql-libs-9.2.24-7.el7_9.x86_64.rpm postgresql-plperl-9.2.24-7.el7_9.x86_64.rpm postgresql-plpython-9.2.24-7.el7_9.x86_64.rpm postgresql-pltcl-9.2.24-7.el7_9.x86_64.rpm postgresql-server-9.2.24-7.el7_9.x86_64.rpm postgresql-static-9.2.24-7.el7_9.i686.rpm postgresql-static-9.2.24-7.el7_9.x86_64.rpm postgresql-test-9.2.24-7.el7_9.x86_64.rpm postgresql-upgrade-9.2.24-7.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7postgresql-libs-9.2.24-7.el7_9.x86_64.rpm3bf162c4a94a11e0b6ed4a37bf05afd25f7f0281ea35f708b088abff5cfd1c50postgresql-libs-9.2.24-7.el7_9.i686.rpmd6ebaeddc43cc67b36b83283043b378120e53eb79abfc77187671ed411226640postgresql-server-9.2.24-7.el7_9.x86_64.rpm3f94ec32306530e799b50ff670aaf6809399d1135a67a516498250689e1c8624postgresql-9.2.24-7.el7_9.x86_64.rpmf938f0b97b430cbd251a0f036e4214199df561c5dfd2f478143e5edd5bc12283postgresql-plperl-9.2.24-7.el7_9.x86_64.rpm926162483eb35a1d39e1c0e2b56b7c196697ade56bd8fb38870cff629baa3231postgresql-test-9.2.24-7.el7_9.x86_64.rpmc28b40c3f00cf23e22de580966ecd38e277a70732a7625e9da129475c056d4aapostgresql-9.2.24-7.el7_9.i686.rpmf5515ecf51a202879d66c91312b10c4214cc3995591a34391b472d601aa12775postgresql-pltcl-9.2.24-7.el7_9.x86_64.rpmfe84b2c10cc2ffc47245014647c21768c6ff7dbc3d9f0d9ac9e255700474c202postgresql-docs-9.2.24-7.el7_9.x86_64.rpm4dd6a639a699788e8a6812c960e672544e99bad708395f8a188704004044347epostgresql-static-9.2.24-7.el7_9.i686.rpm7c9e5ef8fb7eff7cb672225f57ed5c8762f3958652a4498f947e119bcc35783epostgresql-plpython-9.2.24-7.el7_9.x86_64.rpm835629aec9a254e10435f3c461b887e2a7f76e5aa91750febadffba0b0da188bpostgresql-static-9.2.24-7.el7_9.x86_64.rpm74afa4f5df7a224a93ccb22c9d8f8e7358c965e69dccae53925f169486c5faf9postgresql-upgrade-9.2.24-7.el7_9.x86_64.rpmb9ecb9b5b59a17c92985c06291051d1834f718be392b5c58f3f2aa58a1437173postgresql-devel-9.2.24-7.el7_9.x86_64.rpm78a04399dfdcc47c4302e4cf573ee64a388a3bb57a39d1ed3fd0647fbf0d6182postgresql-contrib-9.2.24-7.el7_9.x86_64.rpmd2b36cd2421c1d0cbf6d7d31daf716c8c32478593f4b1d1106cdb15afd8637cepostgresql-devel-9.2.24-7.el7_9.i686.rpmdbec064f8fdc17ab8c066186122b31b0648554619f7191ed7705d43596786098SLSA-2021:2417-1GupnpSecurity Fix(es): * gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 gupnp-1.0.2-6.el7_9.i686.rpm gupnp-1.0.2-6.el7_9.x86_64.rpm gupnp-debuginfo-1.0.2-6.el7_9.i686.rpm gupnp-debuginfo-1.0.2-6.el7_9.x86_64.rpm gupnp-devel-1.0.2-6.el7_9.i686.rpm gupnp-devel-1.0.2-6.el7_9.x86_64.rpm noarch gupnp-docs-1.0.2-6.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7gupnp-devel-1.0.2-6.el7_9.i686.rpm7f37ce90a108e6ee1e8079e3721e199777ec5a118f40cf4052e8e8f14021dc4fgupnp-1.0.2-6.el7_9.i686.rpm2b8140194eac42849f0413eb49061b72f2bb83a3997b578451c551e39570b21agupnp-devel-1.0.2-6.el7_9.x86_64.rpmc5a7092395429e4b142cb998cc71b239d7ba6018b75fe99366f3431b97faeb61gupnp-docs-1.0.2-6.el7_9.noarch.rpm3ad612ae1e816a0cffcfc500d66b0de0598f332d4159db09e9acaab30343318fgupnp-1.0.2-6.el7_9.x86_64.rpm588c939f7fe4121ee36f425753647b2bee628fcb30a0b919cfd00b1196ecf1faSLSA-2021:2658-1LinuxptpSecurity Fix(es): * linuxptp: missing length check of forwarded messages (CVE-2021-3570) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - linuxptp-2.0-2.el7_9.1.x86_64.rpm - linuxptp-debuginfo-2.0-2.el7_9.1.x86_64.rpmimportantScientific LinuxScientific Linux 7linuxptp-2.0-2.el7_9.1.x86_64.rpmcd19472fe3908a41310e91a23e649c7c8aa1c93c58af619542a150c80a6286f8SLSA-2021:2683-1XstreamSecurity Fix(es): * XStream: remote command execution attack by manipulating the processed input stream (CVE-2021-29505) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 noarch - xstream-1.3.1-14.el7_9.noarch.rpm - xstream-javadoc-1.3.1-14.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7xstream-1.3.1-14.el7_9.noarch.rpm4c0d1e279f58b3c5fc61212ae542c273a87ad83e762cf82d968befffc234abc7xstream-javadoc-1.3.1-14.el7_9.noarch.rpm5df6f91d53d3443b4aab2e3cf697e3d6a0e734dae4e6adea1b7540c6425285bcSLSA-2021:2725-1KernelSecurity Fix(es): * kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) * kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) * kernel: use-after-free in show_numa_stats function (CVE-2019-20934) * kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668) * kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * [SL7.9.z] n_tty_open: "BUG: unable to handle kernel paging request" * [ESXi][SL7.8]"qp_alloc_hypercall result = -20" / "Could not attach to queue pair with -20" with vSphere Fault Tolerance enabled * [SL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP * False-positive hard lockup detected while processing the thread state information (SysRq-T) * SL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) * The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console * nvme hangs when trying to allocate reserved tag * [REGRESSION] "call into AER handling regardless of severity" triggers do_recovery() unnecessarily on correctable PCIe errors * Module nvme_core: A double free of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). * sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! * [Hyper-V][SL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed * Kernel panic at cgroup_is_descendant * [Hyper-V][SL-7]Commits To Fix Kdump Failures * IGMPv2 JOIN packets incorrectly routed to loopback * [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] * mlx4: Fix memory allocation in mlx4_buddy_init needed * incorrect assertion on pi_state->pi_mutex.wait_lock from pi_state_update_owner() --- SL7 x86_64 bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpmimportantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm7d8ecb4acaea932f0c8952ee9af2eacba520a527bfe920b669c922ce4c52d3a9kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpmd693cdb4cf9f6b10fc9e8ed2d32390fc1d4d1a1874ab6e847afd0829cb96000akernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpmd6ae76ca47e20b280316d8ff71851d7c3a20fa3cee111d25aa2a0dd0eff7cbcckernel-doc-3.10.0-1160.36.2.el7.noarch.rpmf8e09350909d363258cabab3a793867b6f775381e1653a0be9386ad2bc9daac0kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm2aa5e3f4679a1935ddbf5185667ca13e950c2a02f8967b58f681108ca2c06314perf-3.10.0-1160.36.2.el7.x86_64.rpmfc1a425560686ecd1aeda5561dd9e31caed3feb6d9ac2290016c5f13eecaae62kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm417ba353631eb370a626496cf0124bda27d15332b74275b31f4d2b0250fb1396python-perf-3.10.0-1160.36.2.el7.x86_64.rpm04dd3ebe74791e117d40c57d072cfc09cb1769bcfd9e12019543fc850cb8d73bkernel-headers-3.10.0-1160.36.2.el7.x86_64.rpme553a94a8a993338ae132e222b1046da227d9601de7743906d1faea33856aedekernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpmb49834e7c0c65269e6ad42c1fc17aa1fdd56d4e7d76bc15bcb1f5d1efe761b4ckernel-3.10.0-1160.36.2.el7.x86_64.rpmb63017d77d981063372bbc92dc6423e9387c01668ee7c70963ff3d886ee46b19bpftool-3.10.0-1160.36.2.el7.x86_64.rpm991736f4f2fe98ff1f6740177e2ce530640dc5f9e8f866280f8db303594e1eddkernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm4fb494afeb8ebe56bdd8add70251c529ab5b5772f941d4cd6e79f9033df73acdSLSA-2021:2741-1FirefoxThis update upgrades Firefox to version 78.12.0 ESR. Security Fix(es): * Mozilla: Use-after-free in accessibility features of a document (CVE-2021-29970) * Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 (CVE-2021-29976) * chromium-browser: Out of bounds write in ANGLE (CVE-2021-30547) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - firefox-78.12.0-1.el7_9.x86_64.rpm - firefox-debuginfo-78.12.0-1.el7_9.x86_64.rpm - firefox-78.12.0-1.el7_9.i686.rpmimportantScientific LinuxScientific Linux 7firefox-78.12.0-1.el7_9.i686.rpm5072673f08d52e0ced6ac477f677481000537be1557c181c8d3483adee4f3c43firefox-78.12.0-1.el7_9.x86_64.rpm6bd823c34deaa1a1e06b0c6665122b3dc08984c22bb398d0ebbec8407e00709dSLSA-2021:2784-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) * OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) * OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 java-11-openjdk-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-debuginfo-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-debuginfo-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-demo-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-demo-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-devel-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-devel-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-headless-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-headless-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-src-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-src-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.x86_64.rpm40ed18b4d88296b926addc5f3488e95a532af2616b339fb470ab89efe9b33978java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.i686.rpmad15ee4fde1e323fd53ad78545605a445f954b03c5f105e5b1277a3a7afde34bjava-11-openjdk-devel-11.0.12.0.7-0.el7_9.i686.rpm25687ef939eaf8b30fa0c0abbf000d50a7de09a91672fd87c0acc078480323eajava-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.i686.rpmd6f8f6df281e2bcb246d37938461a2d8541f5b9288a859dbab42031c82a6c13ejava-11-openjdk-11.0.12.0.7-0.el7_9.x86_64.rpm2cfbae8b8d3476eb614c43a6af638d7bc64cdeeb8dfe3afa59727780cbfc3dbejava-11-openjdk-demo-11.0.12.0.7-0.el7_9.i686.rpmd1c61bdfaf082840c4a026ce0ca27e5060094208f3c94057873b29510fefac34java-11-openjdk-headless-11.0.12.0.7-0.el7_9.i686.rpm580feb4e2aee7dc454c0d87c538e9940ec312de05a735fba275f9a8c8073e486java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.x86_64.rpm150df06bfcf5cf74bd9f22ae934021ae13d6fcd08072d6384ee375cab8df06ddjava-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.i686.rpm746780768d85f21edc8db369296a7d42784cf171564bf91a58a9abcbf2bd3524java-11-openjdk-demo-11.0.12.0.7-0.el7_9.x86_64.rpm6184086c04b7d5ae668b69ea271b49b1ff9356adc659f3eadbce14734e4a87b6java-11-openjdk-src-11.0.12.0.7-0.el7_9.x86_64.rpm4d750ffee5def8f1e7d24404502ed102a8d97ebfa149fdd56cf181143601b41bjava-11-openjdk-devel-11.0.12.0.7-0.el7_9.x86_64.rpm187524191dca7a5b7755f688d53c427c6adfd6f9ee6e62f30dd05a9c970286bajava-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.x86_64.rpmb6a9d24c04f3d17ad62478855251401aa36facff2e016c9422088886e7f1b9c2java-11-openjdk-headless-11.0.12.0.7-0.el7_9.x86_64.rpm2526e65ef5fe50f6864eaeebbfcc62e9010ec568c8d08efb4a466522cdaab033java-11-openjdk-11.0.12.0.7-0.el7_9.i686.rpm1dbca9adc5784430935d62f33177b1aa29a37c6e8c592daa40f3af23eca1fcbajava-11-openjdk-src-11.0.12.0.7-0.el7_9.i686.rpm2c55847b071127c9c423665e36666ad4b0cc399fa8e157ae742a593d32f26999java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.x86_64.rpm397dc94ccadf1cc07ed6b9eec704486ee3e120916bf81bf6301f464245b85f13SLSA-2021:2845Important: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) * OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) * OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * JDK-8266279: 8u292 NoSuchAlgorithmException unrecognized algorithm name: PBEWithSHA1AndDESede (BZ#1960024) importantScientific Linux 7java-1.8.0-openjdk-accessibility-debug-1.8.0.302.b08-0.el7_9.i686.rpm503e87717a057cf98c785b42ef1384df5b43e070f134568c9763153dfdab5d51java-1.8.0-openjdk-src-debug-1.8.0.302.b08-0.el7_9.i686.rpm259e7edd8a077d3d9ce857d1824f5b35ec233b0e3612791cdd16f353ff338365java-1.8.0-openjdk-javadoc-debug-1.8.0.302.b08-0.el7_9.noarch.rpm9fb2415f774c0bf1bf64e3ca720709260ba99b60591718237bcfbcf330134281java-11-openjdk-jmods-debug-11.0.12.0.7-0.el7_9.x86_64.rpmb644e8d999f05d3ed440a9c478aade5487b180429bcfccda9c3d52d58b7c65eajava-11-openjdk-devel-debug-11.0.12.0.7-0.el7_9.i686.rpm6941da52a5e6aeb5a9ca86d8e02521978761a2c026daea27977be3f54b37b769java-1.8.0-openjdk-demo-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm541dfc3f577bd50b00f3f67b7a7ecadfaeabbef5d8016103c289ef48f2dd44c8java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7_9.x86_64.rpma226ad0efd2ba486b68d189957ded0cfeda686213b2a9dc7cc8c484b476fdb26java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.302.b08-0.el7_9.noarch.rpm4deef6abdb8819c181e3e10bd2bc1435ce2d3ca77b1e543189d7780b4d42cffajava-11-openjdk-jmods-debug-11.0.12.0.7-0.el7_9.i686.rpm2a668ff27d9a45507afe1c7daa7c2115814b968bcf1d54de45261aa379fa2476java-1.8.0-openjdk-demo-debug-1.8.0.302.b08-0.el7_9.i686.rpmb66530714e9689b2d24e88327a6116eece12fdfbb14e0a237e28595634cc2643java-11-openjdk-debug-11.0.12.0.7-0.el7_9.x86_64.rpm5545de2e2433d0b52c06f627eef8279a858657c96b833013c9c704cbbfd42034java-1.8.0-openjdk-src-debug-1.8.0.302.b08-0.el7_9.x86_64.rpme9bca973fbcf25a83c3a27cef032e16a667633b886f58940d0129888264db818java-1.8.0-openjdk-debug-1.8.0.302.b08-0.el7_9.x86_64.rpma5dd961b429af5889ef9d24cc0c2ca22f97a260e4e2d06d09fec06babd6ddd6ejava-11-openjdk-debug-11.0.12.0.7-0.el7_9.i686.rpm0c1e27807db8a30ef27d4000333703e9e134efc0ccd79de0845cf4fdc5db3307java-11-openjdk-src-debug-11.0.12.0.7-0.el7_9.i686.rpmd1251ab40d2373fde3711c8dc81bd3fca599f1bffa6888ec1ab546723259bff1java-11-openjdk-src-debug-11.0.12.0.7-0.el7_9.x86_64.rpm572292710adf20d1d3e3f646d3e469df5e23a2707f6969b99cad7eadba74ae0cjava-11-openjdk-demo-debug-11.0.12.0.7-0.el7_9.i686.rpm82b8c2cf3276139d9c1e7009866560a1d932d1582c115b8c6ba832eb3a434f0djava-11-openjdk-headless-debug-11.0.12.0.7-0.el7_9.x86_64.rpm313bc9f9712f72a4998b928f92c3061c467de050947f6bb6d354070e7159a3a4java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7_9.i686.rpm2fb087a780d001dd55ac9e2193645a69bd55386d1fc74fc3ae9e8d28919f3005java-1.8.0-openjdk-devel-debug-1.8.0.302.b08-0.el7_9.i686.rpmf2f4bf7e53f3bfefdc14a881813f261aae9ecd7b7e65e40ae410beb7ea6e6f40java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7_9.i686.rpm1d2354f323d57fe9229b7afa9293317af44c9ba4e5b5b289591ba50eb7e962a7java-1.8.0-openjdk-headless-debug-1.8.0.302.b08-0.el7_9.i686.rpmd6ae82ec8de7558797b089df7750c7d8043ff0fd895722fadce95d404a16e422java-11-openjdk-static-libs-debug-11.0.12.0.7-0.el7_9.x86_64.rpm2b750a81c4d4f4daeb1ba6aa6a7deccd4325451b3d5736ad9ad981d8bdf54f7ejava-11-openjdk-demo-debug-11.0.12.0.7-0.el7_9.x86_64.rpma87d815fcd33fd6689134ad748c41768af50ed81f886369c84fb7a8ca248a8e8java-11-openjdk-devel-debug-11.0.12.0.7-0.el7_9.x86_64.rpm95512f993250891c7b8d2bd6a28bce89ef846eac9aab79b6b9548aaeef057d63java-11-openjdk-headless-debug-11.0.12.0.7-0.el7_9.i686.rpmb84bed334da15fc88b6068df346078fe950ec81cf592cee0939e8d4edf4dd106java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7_9.x86_64.rpme107bf56f04db02fae2ca8d6c7291540e124e4584ac0b79ece4e20ca22d47139java-1.8.0-openjdk-debug-1.8.0.302.b08-0.el7_9.i686.rpm0c476704f8568af73f4fd8241fd3cf6717eb3984305f8da7e27cc0c9e813e1bajava-1.8.0-openjdk-headless-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm7f2476266ea1139f00956d3018d57d890711b16f79f7d1522d804bbb1bde309bjava-1.8.0-openjdk-devel-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm45ab1bf63c939aae68e150fd5c785298bacd2f38655484d1377f65ce487cfa61java-1.8.0-openjdk-accessibility-debug-1.8.0.302.b08-0.el7_9.x86_64.rpmc71f143b109dbc85c5c4a2574e09c4cde1039b780420e71eae2ccaceaa7c0764SLSA-2021:2845-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) * OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) * OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * JDK-8266279: 8u292 NoSuchAlgorithmException unrecognized algorithm name: PBEWithSHA1AndDESede --- SL7 x86_64 java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.x86_64.rpm noarch java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.i686.rpm7f3321a3d27853c3087f2e2bca65e30dcaabcbba6169ac009e11cecbda85b476java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.i686.rpm39f9af7346d534f2002887db9f4ff695de79b3ad2499d212e2a0e45eb9fb92bcjava-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.i686.rpm4cf1b2f740d587ce33a1a07625b21d3eb96a97cb3f66c14776a435fa3af479e5java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9.noarch.rpm28f81e124f6d9bb59da40a64297d73b483a577f19c24f1eeba78d08ca6e03146java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9.noarch.rpm9c576e635bfce44eda493bd2d4537d0285dcf6e5ad65ec6921bdb827b568cd56java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.x86_64.rpm06df563cb9a22f4fb86978044e3ccd7fc77e0045f8d0b6bde77bf762d86ab6eejava-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.x86_64.rpmfe7868ec6c87bbfa14b5dbcb2c0c2f62890dfe9bf9908960fdaad79c3309bc90java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.i686.rpmc421080fae04fe01329bad7393633aecec64a7007bca4156f48610dba07dde8fjava-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64.rpm3964f8ce990919fe3aad915412fa4e49987fffd234eefc1564a40b1aace539b8java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.i686.rpmed38b6dd0cdd0699af0fd65385edc050199398f3907f853a84a7b243aa4d7f52java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.x86_64.rpm72e7ced455969605907a30370a3ead4e2d3a45236aa28550ceff34ccabda5eacjava-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.i686.rpme115f53dc308a75e1993d8ac0442465084d4f7798612b77bc490d389a5f53e61java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.x86_64.rpm5e8345b76c0310784eba308e4f94cfb60c33984b23bd62bde384e85997279035java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.x86_64.rpmb519d21b168768ab0745f0f53f5288f58bbb7f070944c8e7dce3d5a0be6bd5e4SLSA-2021:2881-1ThunderbirdThis update upgrades Thunderbird to version 78.12.0. Security Fix(es): * Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed (CVE-2021-29969) * Mozilla: Use-after-free in accessibility features of a document (CVE-2021-29970) * Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 (CVE-2021-29976) * chromium-browser: Out of bounds write in ANGLE (CVE-2021-30547) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - thunderbird-78.12.0-2.el7_9.x86_64.rpm - thunderbird-debuginfo-78.12.0-2.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-78.12.0-2.el7_9.x86_64.rpm91806481c6fc65fcd2f5ae3c3fff8150b7982eb1f02226c2f8681d50cb369576SLSA-2021:2989-1LassoSecurity Fix(es): * lasso: XML signature wrapping vulnerability when parsing SAML responses (CVE-2021-28091) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - lasso-2.5.1-8.el7_9.i686.rpm - lasso-2.5.1-8.el7_9.x86_64.rpm - lasso-debuginfo-2.5.1-8.el7_9.i686.rpm - lasso-debuginfo-2.5.1-8.el7_9.x86_64.rpm - lasso-devel-2.5.1-8.el7_9.i686.rpm - lasso-devel-2.5.1-8.el7_9.x86_64.rpm - lasso-python-2.5.1-8.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7lasso-2.5.1-8.el7_9.i686.rpm98e13a86c7880b2fbe273dfbf02fe9588b53ea0a7308376a53cd6989eda2f856lasso-2.5.1-8.el7_9.x86_64.rpmcf2896c9af6e17896a050bac5d3866525ed0e43c7f50fd394c1d969edab0acc0lasso-devel-2.5.1-8.el7_9.x86_64.rpm682530e22a43541c96014fca60914ed9c36f229b28084a66b91e2cc6875ffc50lasso-python-2.5.1-8.el7_9.x86_64.rpmbfefa00287b78344a058232d34d74688113e0715f55b2f550cd5b7989d83c7dalasso-devel-2.5.1-8.el7_9.i686.rpm619d5eda91dfad8c51da2b01d131aa662754e2d057ba75501cec5e9e572d32fdSLSA-2021:3028-1Microcode_CtlSecurity Fix(es): * hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: Vector Register Data Sampling (CVE-2020-0548) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: vt-d related privilege escalation (CVE-2020-24489) * hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) * hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) * hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) * hw: Vector Register Leakage-Active (CVE-2020-8696) * hw: Fast forward store predictor (CVE-2020-8698) --- SL7 x86_64 - microcode_ctl-2.1-73.11.el7_9.x86_64.rpm - microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7microcode_ctl-2.1-73.11.el7_9.x86_64.rpm88a9b7faaa2f8bcfa45c883d79da8855fedf161b102a41ba91c8e7a8cda723dbSLSA-2021:3154-1FirefoxThis update upgrades Firefox to version 78.13.0 ESR. Security Fix(es): * Mozilla: Uninitialized memory in a canvas object could have led to memory corruption (CVE-2021-29980) * Mozilla: Incorrect instruction reordering during JIT optimization (CVE-2021-29984) * Mozilla: Race condition when resolving DNS names could have led to memory corruption (CVE-2021-29986) * Mozilla: Memory corruption as a result of incorrect style treatment (CVE-2021-29988) * Mozilla: Memory safety bugs fixed in Thunderbird 78.13 (CVE-2021-29989) * Mozilla: Use-after-free media channels (CVE-2021-29985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-78.13.0-2.el7_9.x86_64.rpmbc41b16a9bca16b2a8ce95bcdc37b7988f20720b9cd4f7c0f2e74ed0bd1803d2firefox-78.13.0-2.el7_9.i686.rpmd8449a4c77bed4b52ed6429f3ec3079091b241740fd34a67fbf54e789db5c80aSLSA-2021:3158-1Exiv2Security Fix(es): * exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7exiv2-libs-0.27.0-4.el7_8.i686.rpm6e1655bac655b79fcef547510c9571d75eed3867a13c3c1df24e9ebb7f488e88exiv2-libs-0.27.0-4.el7_8.x86_64.rpmc80106ec40162ef5482829b34e6a1f488a5896145e62988f50069d3a7a3ca99dexiv2-devel-0.27.0-4.el7_8.i686.rpm4c33360ef1a27e17ecb897829b29dcc92ede55fed680d7ecae084ecf15a751f5exiv2-0.27.0-4.el7_8.x86_64.rpm2ad983d2240087ea19daa9c8345c687256c2dfbd767739c4dac6868e3a2800cfexiv2-doc-0.27.0-4.el7_8.noarch.rpm72bbcd2f72146fc524ea043f551cadd8cc7a3b6757fada666865e346171d71a3exiv2-devel-0.27.0-4.el7_8.x86_64.rpm6a7ed5be881d54c881fdb41359fa7b90c508fef7321cf4f588e72503777795e6SLSA-2021:3160-1ThunderbirdThis update upgrades Thunderbird to version 78.13.0. Security Fix(es): * Mozilla: Uninitialized memory in a canvas object could have led to memory corruption (CVE-2021-29980) * Mozilla: Incorrect instruction reordering during JIT optimization (CVE-2021-29984) * Mozilla: Race condition when resolving DNS names could have led to memory corruption (CVE-2021-29986) * Mozilla: Memory corruption as a result of incorrect style treatment (CVE-2021-29988) * Mozilla: Memory safety bugs fixed in Thunderbird 78.13 (CVE-2021-29989) * Mozilla: Use-after-free media channels (CVE-2021-29985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-78.13.0-1.el7_9.x86_64.rpma1c089fd6ce1fef0bef27a525a9745cc2d310cf48d4b9483805b199e86ed5edaSLSA-2021:3233-1Compat-Exiv2-026Security Fix(es): * exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE7 --- SL7 x86_64 - compat-exiv2-026-0.26-3.el7_9.i686.rpm - compat-exiv2-026-0.26-3.el7_9.x86_64.rpm - compat-exiv2-026-debuginfo-0.26-3.el7_9.i686.rpm - compat-exiv2-026-debuginfo-0.26-3.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7compat-exiv2-026-0.26-3.el7_9.i686.rpm9a34a4f44f655124edba74a73224379e4b27c9deb32651cf533c6a61f5086f19compat-exiv2-026-0.26-3.el7_9.x86_64.rpm0033a683cc63d68e7a84dec2d25b02285145f3fb9df32a933ba26d0b87176ee6SLSA-2021:3234-1Compat-Exiv2-023Security Fix(es): * exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE7 --- SL7 x86_64 - compat-exiv2-023-0.23-2.el7_9.i686.rpm - compat-exiv2-023-0.23-2.el7_9.x86_64.rpm - compat-exiv2-023-debuginfo-0.23-2.el7_9.i686.rpm - compat-exiv2-023-debuginfo-0.23-2.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7compat-exiv2-023-0.23-2.el7_9.i686.rpm234b3ac49dc1dedc349059d07f01a8eabf9899d69b359b6979ecd193a1ebc096compat-exiv2-023-0.23-2.el7_9.x86_64.rpme99bc81d83364f6f684739c64f04bf3cece758e5bea3d7a2e61ddb943dae32cbSLSA-2021:3295-1LibsndfileSecurity Fix(es): * libsndfile: Heap buffer overflow via crafted WAV file allows arbitrary code execution (CVE-2021-3246) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 libsndfile-1.0.25-12.el7_9.1.i686.rpm libsndfile-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-debuginfo-1.0.25-12.el7_9.1.i686.rpm libsndfile-debuginfo-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-devel-1.0.25-12.el7_9.1.i686.rpm libsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpmimportantScientific LinuxScientific Linux 7libsndfile-devel-1.0.25-12.el7_9.1.i686.rpmb3910769e141cfeeab716a19e97939dd241377aaf55821ec9c642af011d0c59clibsndfile-1.0.25-12.el7_9.1.i686.rpm5bab9fed88e6b7fc23592c9da41f699d431160f44e271d4f2fb1b1f2865ba15clibsndfile-1.0.25-12.el7_9.1.x86_64.rpmac61969886fb56f38f2e298136eeb397bee1a22271feeefdb8aed0fbe2a47fealibsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpme117477a7875c688069d8b033df530da34e18628510e18d2921cf3760f13ef08libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpmd15484d0294af5ee8e1392da70f43fa812df27b7c642d79aa0ce936fea1678deSLSA-2021:3296-1Libx11Security Fix(es): * libX11: missing request length checks (CVE-2021-31535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 libX11-1.6.7-4.el7_9.i686.rpm libX11-1.6.7-4.el7_9.x86_64.rpm libX11-debuginfo-1.6.7-4.el7_9.i686.rpm libX11-debuginfo-1.6.7-4.el7_9.x86_64.rpm libX11-devel-1.6.7-4.el7_9.i686.rpm libX11-devel-1.6.7-4.el7_9.x86_64.rpm noarch libX11-common-1.6.7-4.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7libX11-devel-1.6.7-4.el7_9.i686.rpm4f1dc1fb871116b82794ae3b0432e5ac521ed6811611740cac68e62621e8665elibX11-1.6.7-4.el7_9.x86_64.rpm805486b69ea140fa070aa6e28a15a8eb5519e592811c4325acd906d695829340libX11-common-1.6.7-4.el7_9.noarch.rpmff2dbbb2c0c4168eb25f248e7952404ca464f7fbd7974343f2412003abeefd84libX11-1.6.7-4.el7_9.i686.rpm6ff763fc3c4042a91cdf2b63763bc28f35cea891d46a78da3f6198bfeb148d9dlibX11-devel-1.6.7-4.el7_9.x86_64.rpm6be63062aaaf4e8d6329b503577de87342b48cc2acfe3cd690e80f83f1c465e9SLSA-2021:3325-1BindSecurity Fix(es): * bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly (CVE-2021-25214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 bind-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-debuginfo-9.11.4-26.P2.el7_9.7.i686.rpm bind-debuginfo-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpm bind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm noarch bind-license-9.11.4-26.P2.el7_9.7.noarch.rpmmoderateScientific LinuxScientific Linux 7bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm0f664c4582d87086632bceea130dad5c9230205974fc1fd51d574d14c36ab72dbind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm1cd8a4c5be34e924728330c8921f4c162287c484621027417858c3183977b943bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm40e8e2e47fe864b27bdff476ba1dad290b8b84e1d5e837d5a301928cd4e9b22dbind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpm99baf1d0b90af916bf4caabeadbbe04b73fd490b2a3d0b0d12dba8142c111475bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpmad423e367926bac84af867f8282f16fc859526a6d503174c675ce8daeb36ff20bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpme5a515e291fab1fa300a30f05511e81411bf61fffd47380944fe4ef5f4693f55bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm0253dfb5a08f373842c240c84f0c1eb9171f2ab8e08eeb5126ed3e70a8871921bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpmfa207b6f9321b18c5f525bbb91903bcefa94e530f6c5f17a191925f8cca21681bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpmffb34baf93dc78b8c3204a0dfc3e40e5309b130a02aca8e9884ad591b9fd2b61bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpma6bdf31288be4ca1ee0031c86acb9a40d3258e3d5ba84c431ce77712557534c3bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpmb28cab1232e3b1c4c311f24af1f39361f4226651a3061082343f922b856a78b6bind-9.11.4-26.P2.el7_9.7.x86_64.rpm2cf14f362fac3cec4e32deaa2a6ddbcb64700936117dae0cdbbb64f007552d0cbind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpmf22a802c9f3559615c63df34546aec823b984569735e37463de73ccbfbe9c868bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpme50f60168b6033107d65d1dc2047d457f4aaa792d2c8ca4435aff8fb3d7f2395bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpm99f00d3261d884dc7d8d6ebc32efa082e4187ecddb4ccfcf9231f9ac35560b64bind-license-9.11.4-26.P2.el7_9.7.noarch.rpm422f7a25a275aa9ef9fe2d98e9f90d28648c8e18d6fb337841fd12b2e16a4f44bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpmfdee061bae052b6d4d5a92910f14a1633cec37d16509a941cff19cb6e1930ffdbind-libs-9.11.4-26.P2.el7_9.7.i686.rpm034fe87eea2d8b5a2124400aae03a472c9a0d622fb25800e6fbbcd5259e30557bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm193531fe7702ea7dda0cb4ef0d7b32d6a503d4d2a96b684a9b4859207e7e66f7bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm229169f1dcd87871c084babd1b0c907de4221b2ec3e89d5083a01689da89a197bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm327434f2010bf6e5d1eff08dcaaaa092d11d21299aa111e62ff028d204436379bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpmfc2533dea2c78321b310a83c63524e905b24276818acd9ae171bb5b96cc1efddbind-devel-9.11.4-26.P2.el7_9.7.i686.rpm69df49b5752140ef781df58fd756fbba32875b4988a055c654dab339bbf8cacfbind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm8176d6c537943acedcdfa817652ed8ce382144a789085c0227d8563c6836cb37SLSA-2021:3327-1KernelSecurity Fix(es): * kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555) * kernel: race condition for removal of the HCI controller (CVE-2021-32399) * kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777) * kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) * kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * SAN Switch rebooted and caused (?) OpenStack compute node to reboot * sysfs: cannot create duplicate filename '/class/mdio_bus/ixgbe-8100 * XFS: read-only recovery does not update free space accounting in superblock * The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. * Backport of upstream patch "net: Update window_clamp if SOCK_RCVBUF is set " into rhel-7 * Kernel panic in init_cq_frag_buf * futex: futex_requeue can potentially free the pi_state structure twice * be_poll lockup doing ifenslave when netconsole using bond * OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() --- SL7 x86_64 bpftool-3.10.0-1160.41.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.41.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm perf-3.10.0-1160.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm kernel-doc-3.10.0-1160.41.1.el7.noarch.rpmimportantScientific LinuxScientific Linux 7kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm5bcfdad599b44925e1230949969a60903487c392b6e40aa5c2d725271d6f82d3kernel-doc-3.10.0-1160.41.1.el7.noarch.rpmc5910ab8910fff70be6016751415352f55198ccdc8e11735da61c6775f76b8eaperf-3.10.0-1160.41.1.el7.x86_64.rpm53538846f19e0fecbbfc76ea664e44b0a60c548785d2d331086baf4ef3b998c9bpftool-3.10.0-1160.41.1.el7.x86_64.rpm5115b684a64e594c10a8202c5e951f143eac59a7f75382e2d65c9104202df150kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpmf16c223fe64df7ea47ff1eed29a0833e150e50412c49e240397c13d1df363847kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpmd250b4cdfb1d8ea7986d3dee2694eb112445103c3fd9f7e633ed1565034b8190python-perf-3.10.0-1160.41.1.el7.x86_64.rpmd1df2230944d9712346af10fc36e683be7ed322084d36ca609f13f7c15bc4450kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm5a2b5d848316fbd08d1315a721b6875c2c9d367307e5b52ed148f2dfdb396b8akernel-3.10.0-1160.41.1.el7.x86_64.rpm324b80fdf429db9c8c98848d4d3c5e453165c7fa6e8860df88383454c6f60123kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm7929926bcb7e8857a134ae7c4e173c7ff2387cad23370fecf0118c7351b545aakernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm5c891a7b590d142e84b1a975f57cc6192bc5e4f116fb485c5b7d1d367822a486kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm5a2fc8257aecdaf5d27f57952b69b2b1cd42f8472842e3647c5a3ac9e0ca1e6bkernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm8d9bf7379a529f839def865bd2276337a3154d516043688b9669a388309e171dSLSA-2021:3336-1SssdSecurity Fix(es): * sssd: shell command injection in sssctl (CVE-2021-3621) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Memory leak in the simple access provider * id lookup is failing intermittently * SSSD is NOT able to contact the Global Catalog when local site is down * Missing search index for `originalADgidNumber` --- SL7 x86_64 libipa_hbac-1.16.5-10.el7_9.10.i686.rpm libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm libipa_hbac-devel-1.16.5-10.el7_9.10.i686.rpm libipa_hbac-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_autofs-1.16.5-10.el7_9.10.x86_64.rpm libsss_certmap-1.16.5-10.el7_9.10.i686.rpm libsss_certmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_certmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_certmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_idmap-1.16.5-10.el7_9.10.i686.rpm libsss_idmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_nss_idmap-1.16.5-10.el7_9.10.i686.rpm libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_nss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_nss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_simpleifp-1.16.5-10.el7_9.10.i686.rpm libsss_simpleifp-1.16.5-10.el7_9.10.x86_64.rpm libsss_simpleifp-devel-1.16.5-10.el7_9.10.i686.rpm libsss_simpleifp-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_sudo-1.16.5-10.el7_9.10.x86_64.rpm python-libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm python-libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm python-sss-1.16.5-10.el7_9.10.x86_64.rpm python-sss-murmur-1.16.5-10.el7_9.10.x86_64.rpm sssd-1.16.5-10.el7_9.10.x86_64.rpm sssd-ad-1.16.5-10.el7_9.10.x86_64.rpm sssd-client-1.16.5-10.el7_9.10.i686.rpm sssd-client-1.16.5-10.el7_9.10.x86_64.rpm sssd-common-1.16.5-10.el7_9.10.x86_64.rpm sssd-common-pac-1.16.5-10.el7_9.10.x86_64.rpm sssd-dbus-1.16.5-10.el7_9.10.x86_64.rpm sssd-debuginfo-1.16.5-10.el7_9.10.i686.rpm sssd-debuginfo-1.16.5-10.el7_9.10.x86_64.rpm sssd-ipa-1.16.5-10.el7_9.10.x86_64.rpm sssd-kcm-1.16.5-10.el7_9.10.x86_64.rpm sssd-krb5-1.16.5-10.el7_9.10.x86_64.rpm sssd-krb5-common-1.16.5-10.el7_9.10.x86_64.rpm sssd-ldap-1.16.5-10.el7_9.10.x86_64.rpm sssd-libwbclient-1.16.5-10.el7_9.10.x86_64.rpm sssd-libwbclient-devel-1.16.5-10.el7_9.10.i686.rpm sssd-libwbclient-devel-1.16.5-10.el7_9.10.x86_64.rpm sssd-polkit-rules-1.16.5-10.el7_9.10.x86_64.rpm sssd-proxy-1.16.5-10.el7_9.10.x86_64.rpm sssd-tools-1.16.5-10.el7_9.10.x86_64.rpm sssd-winbind-idmap-1.16.5-10.el7_9.10.x86_64.rpm noarch python-sssdconfig-1.16.5-10.el7_9.10.noarch.rpmimportantScientific LinuxScientific Linux 7sssd-dbus-1.16.5-10.el7_9.10.x86_64.rpmebb500e796d30ffc9ae912ac078355a34859ccf1d9c9943c71bc45092fd12807python-libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm3e2050e95d1f3ebbb8271671852b412420ea280154df550e557cc7f7dec227a3sssd-ipa-1.16.5-10.el7_9.10.x86_64.rpm76508a713e696581eb1ee4c0ba6d0d9592f2b556016c9355fbc7bf70996c394fsssd-ldap-1.16.5-10.el7_9.10.x86_64.rpm7fb5e25b4f03d4489ec688e682425380885ba49c76de9e762c8a81eae88fdfc9libsss_simpleifp-devel-1.16.5-10.el7_9.10.i686.rpm8cdffd4f636e874abb4110c23062d2ebce093fd02f87da5a87475c850d4604e6sssd-kcm-1.16.5-10.el7_9.10.x86_64.rpm7245184b18feab0c075c6ca5d1d5079d2717f7b12750783548737d42b150b642libsss_simpleifp-1.16.5-10.el7_9.10.i686.rpmaf1a1ac20c407907416e0be39c90ad91aedf44f51b44d33e60c6702d68a06a40libsss_simpleifp-devel-1.16.5-10.el7_9.10.x86_64.rpmbfefb570ae1a9957ca8e43705108387e0a14e3f7f4611f67b813db9c11a701dfpython-sssdconfig-1.16.5-10.el7_9.10.noarch.rpm6b4d7c87a9ff71f3b8d1d4067556d7662ab771ac880d3b53f221709398d60844sssd-krb5-common-1.16.5-10.el7_9.10.x86_64.rpmbd26b00fcbb063337b26d054ad72e0cf9cb0796bed0c3ed6e5ac1eb641cc5bdepython-sss-murmur-1.16.5-10.el7_9.10.x86_64.rpm8d3cf5f00e6b887d17584b95d1664335f1d493f4719111f66504e4f365b57cf2libsss_autofs-1.16.5-10.el7_9.10.x86_64.rpm34810b9bfaf523bc510c3fde66eacd512f7f44639585db09c2fb5259edf6fc03libipa_hbac-devel-1.16.5-10.el7_9.10.i686.rpm48bf468fa6075da60c140bae64400741d3c858f72cb9842f6a58b6683a80e119python-sss-1.16.5-10.el7_9.10.x86_64.rpm6f0917b948a1f3cdd4653cc8b5cf7286eca4114dad2fb958e4a8f9c434bf7f59libsss_nss_idmap-devel-1.16.5-10.el7_9.10.i686.rpmce516026800a8ce723d4cb667c391e353f61fbe2415518d1274210ea72ae79a5sssd-libwbclient-devel-1.16.5-10.el7_9.10.x86_64.rpm9047dbc282b156b53582dc43090e0f8afe87cf64f53ba5525dc26b285f138fd0sssd-winbind-idmap-1.16.5-10.el7_9.10.x86_64.rpm99a3b8b9bff033a5bcdffa7cc798b359778a9e72a882843e4ab56335045499a4sssd-common-1.16.5-10.el7_9.10.x86_64.rpmcc88d2d2ec3ba8cabfd75a9664233edde6b813716e2f9c0ef0c1e181a806473csssd-common-pac-1.16.5-10.el7_9.10.x86_64.rpm0f1d572f4ca4496b4a6f74c90afd87bf42b343ff9f79a250754fc95a4af48de8sssd-1.16.5-10.el7_9.10.x86_64.rpm15cd608affb1ee07c97297add43aafc5c12fa8cee1d6ad26a618e3d72aaa3291libsss_nss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm21634c7c16563a1ca96bebeff099b00a9b6cb46712fa13da41aa91dec1bfeed4libsss_certmap-1.16.5-10.el7_9.10.x86_64.rpm4e025c3b36f5b6f679e88cc79168c081cb78f1f235f10f1e8d37aed8602a634bsssd-krb5-1.16.5-10.el7_9.10.x86_64.rpm36a63b1132197ae7bd592a61dfb846cff68e23dcda1cc4623d84200c94d038d8libipa_hbac-1.16.5-10.el7_9.10.i686.rpm807c8cc510ed682e3823d46990f8e72acecb1417e972c3e30c168060d13e6e2flibsss_certmap-devel-1.16.5-10.el7_9.10.x86_64.rpmde583697d68e9965964e9b776b04b04e5497fb7337c9df6803840102a27239a5libsss_certmap-1.16.5-10.el7_9.10.i686.rpmc84815e08ae58422387429c8933f097cdc4e277f386afcc44bab10a18fb59082sssd-polkit-rules-1.16.5-10.el7_9.10.x86_64.rpm15ecfd87feb56508a001d086c9cab4cb011fef0349b3644bfa20aa190c9e2c5bsssd-libwbclient-1.16.5-10.el7_9.10.x86_64.rpmb3fb83eb2abe7d757f8b314a4507a8f738c3d40f6de155254c6feabfe35f2000sssd-proxy-1.16.5-10.el7_9.10.x86_64.rpm6d788f7682ea53cead8d82d111cab5a27d60169689d666156f5d2ad7b2cec3eblibsss_sudo-1.16.5-10.el7_9.10.x86_64.rpm408a18a3a1ccb71703651ac59e843baaf3085340c36ce4a70cf45103bfb2d2cclibsss_certmap-devel-1.16.5-10.el7_9.10.i686.rpm379d8186fb9607a0a36cd209d7704770971bea0dd0ef16f3d8fefe992109f4f0libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm73855f072f1a2432c650112e27ca2bd1ed03371c2a2910a23a3b84ba863319d4libsss_nss_idmap-1.16.5-10.el7_9.10.i686.rpm28817330e3e6957966737b5798daa8bfa63a3992552f571539cd15fd298ae433libsss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm11fc647330d60e502d86007060e468d67cff2a79c650936210e1603a791a9220sssd-client-1.16.5-10.el7_9.10.i686.rpm379b3eabff1bebbd09397d8b0516cea1c38d05c4e689db04882a8c2019983271sssd-client-1.16.5-10.el7_9.10.x86_64.rpm2d916950378d815c659a2d9c847a7ba230752158d2ea248f0c981e110d8d2d76sssd-tools-1.16.5-10.el7_9.10.x86_64.rpm75cf819b5199bbd7cce944ba7023e307dd27b5fb5e85a0be1a3739f3f5f50e1clibsss_simpleifp-1.16.5-10.el7_9.10.x86_64.rpm11cfb2cd085d2dc80886ae324e199be7f5b15dbd244a8526505e875de391782epython-libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm67e116b5fdfdf6518a66aeb1a31fed3d6ca6c5257244b27f5a3f830011ee0926libipa_hbac-devel-1.16.5-10.el7_9.10.x86_64.rpm7e0638a0bcf9fe4ef12289b5ded49df445de1cacb9468952f6ab74433d2352edsssd-libwbclient-devel-1.16.5-10.el7_9.10.i686.rpm0e19ac9b1062ea74de9da9ec9b9563254e29e618e6a5d9ef638827fafa967191libsss_idmap-1.16.5-10.el7_9.10.x86_64.rpm4877e9a2a3274b5db35d2999ef1827fb03c941516b9f055c936f0797e659815elibsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm525085aee2a090f378c368427732381827fcd95155c317fa4e41b730e19a8fa2libsss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm9868ad8377d3a7ea59527e8386e69e201eea9b7d4433abe3dee365061863798asssd-ad-1.16.5-10.el7_9.10.x86_64.rpm7c1858cf98f7e0c684e8561240fe8b02219b8105a2a6ce8eeca431a157560750libsss_idmap-1.16.5-10.el7_9.10.i686.rpm2d7c9988bdb0402e3052117ceccea2bb0f3d6143c34bfacf4c2f4981bc8fe7a7SLSA-2021:3338-1HivexSecurity Fix(es): * hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 hivex-1.3.10-6.12.el7_9.i686.rpm hivex-1.3.10-6.12.el7_9.x86_64.rpm hivex-debuginfo-1.3.10-6.12.el7_9.i686.rpm hivex-debuginfo-1.3.10-6.12.el7_9.x86_64.rpm hivex-devel-1.3.10-6.12.el7_9.i686.rpm hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm ocaml-hivex-1.3.10-6.12.el7_9.x86_64.rpm ocaml-hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm perl-hivex-1.3.10-6.12.el7_9.x86_64.rpm python-hivex-1.3.10-6.12.el7_9.x86_64.rpm ruby-hivex-1.3.10-6.12.el7_9.x86_64.rpmlowScientific LinuxScientific Linux 7hivex-1.3.10-6.12.el7_9.i686.rpm1caee1ae63b7e789e9e44bbb1cd42157e6cfc808a461b98227f6c107cbd09c5dhivex-devel-1.3.10-6.12.el7_9.x86_64.rpmd228ff112d6a9331cbb0ffb928122eb5756419ec3aaee85fdcebc10b6f0e37b6ocaml-hivex-1.3.10-6.12.el7_9.x86_64.rpm1f3ef43f71673df625ca2714b1cfd8fd96af7bba80cc8d8c01e9cd5b9d3812ffhivex-1.3.10-6.12.el7_9.x86_64.rpm42dc380b24339b64af4aa373ec67103bba53f1684c3eeb4c31e852135521d66epython-hivex-1.3.10-6.12.el7_9.x86_64.rpme3904da15f8fc7f82cabcb789626a88699cda81f2a0fd02eaeb9c91139e252f2ruby-hivex-1.3.10-6.12.el7_9.x86_64.rpmaa2def395f6c510a1eac7868e33809287cd65c0d17d32dcf5784ea47c183cb2fperl-hivex-1.3.10-6.12.el7_9.x86_64.rpm0f51f73587a33aaf290265edb03d75c08b04d3b84f55871129c44fc4334b7050ocaml-hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm8019f3839747ef54278da82fc0bebc35dd32e461cbb7990ba3c54cb489aca7bahivex-devel-1.3.10-6.12.el7_9.i686.rpma3ecd9709faa50747e5115d83097da32e8d473787ef46e0fba22a07cf083738eSLSA-2021:3438-1KernelSecurity Fix(es): * kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * [SL 7.8][s390x][DASD]Crash in __list_del_entry, alias_pav_group list corrupt when running dasd_alias_remove_device() * EMBARGOED CVE-2021-3715 kernel: use-after-free in route4_change() in net/sched/cls_route.c --- SL7 x86_64 - bpftool-3.10.0-1160.42.2.el7.x86_64.rpm - bpftool-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debug-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-debuginfo-common-x86_64-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-tools-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm - kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpm - perf-3.10.0-1160.42.2.el7.x86_64.rpm - perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm - python-perf-3.10.0-1160.42.2.el7.x86_64.rpm - python-perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm noarch - kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm - kernel-doc-3.10.0-1160.42.2.el7.noarch.rpmmoderateScientific LinuxScientific Linux 7kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpmd54bdec26ae4df8b37939e59e6849e140a44e6b10116ae474f0610f1d67dc5ddkernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm0536a7838973ea4c7f8a98cbe918932752f68ccff105c5cb9a831b8530780e51kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm3bb0a406631f9d6f4c62895475c8500d34c7662730877d1e58be135a065631e5kernel-doc-3.10.0-1160.42.2.el7.noarch.rpmfc6715e90285c83bf4bfacdd56b2a1290ab2ff4295c6b9947354b817500be560kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm82e800cfca360f81cefd59ca89458c715f091daa55f2f525f17e299544d13f51kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpmdcc57a5759566c840f2804d055b6aca5173e5ab30c1dce27cc5f0a92354990fapython-perf-3.10.0-1160.42.2.el7.x86_64.rpm5f67cbf8f2b09ea18a760128f1e73c0df3e407707aaed177cd25529997a944f9kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm33196a3bce35e239045eaeaa537781170a5753215a4570d261b39d6c98042849kernel-3.10.0-1160.42.2.el7.x86_64.rpm84b30ca068c91fe02952ba36a0dce83ba0e41c0ff77ebdb0df95ee3f69feaeaakernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm411ac1452d7827e069b871ef3a260b1d98506eb9baa22c65cac994e99760f2d8perf-3.10.0-1160.42.2.el7.x86_64.rpm12bbbe03c2e6eed4a5c5bd5de4d10abe7f59c1733fcd30e1491b77a4d439cad6bpftool-3.10.0-1160.42.2.el7.x86_64.rpm126127eaeb11dd1e67eff118aebcc7b9606b8d20589fc270ad1a3b7199128a83kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpmc867dab9d6e5db66d4d046ab28da10a58620cf9ea6df3d1afc75fe089e79f01dSLSA-2021:3494-1ThunderbirdThis update upgrades Thunderbird to version 78.14.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - thunderbird-78.14.0-1.el7_9.x86_64.rpm - thunderbird-debuginfo-78.14.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-78.14.0-1.el7_9.x86_64.rpm850f8afd9d801282a58ba0918d138946e44798cae9b087bb575ed7673eab6106SLSA-2021:3498-1FirefoxThis update upgrades Firefox to version 78.14.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - firefox-78.14.0-1.el7_9.i686.rpm - firefox-78.14.0-1.el7_9.x86_64.rpm - firefox-debuginfo-78.14.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7firefox-78.14.0-1.el7_9.x86_64.rpmc35becc58f8d5211ced2d834c117fa17e93125a0fcab7b44d9f8e96dcbeac3d3firefox-78.14.0-1.el7_9.i686.rpm5f1d800c81d82afb56f6c64e087f9fec6caebbb16d6d095f223dbc44403b55bbSLSA-2021:3791-1FirefoxThis update upgrades Firefox to version 91.2.0 ESR. Security Fix(es): * Mozilla: Use-after-free in MessageTask (CVE-2021-38496) * Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500) * Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501) * rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810) * Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497) * Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 firefox-91.2.0-4.el7_9.i686.rpm firefox-91.2.0-4.el7_9.x86_64.rpm firefox-debuginfo-91.2.0-4.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7firefox-91.2.0-4.el7_9.x86_64.rpm2108beff106b3a505077f48f3daaccbebe0cb5e0580119fbe631427f4a6e8cebfirefox-91.2.0-4.el7_9.i686.rpme75a8f263454f13e27fd080a3ff5eb5355a6cd833f60c361aae5b08c667f5c4aSLSA-2021:3798-1OpensslSecurity Fix(es): * openssl: integer overflow in CipherUpdate (CVE-2021-23840) * openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7openssl-libs-1.0.2k-22.el7_9.x86_64.rpmd440e6dd5875b7f851b77504780b3d836c6046550d8d21a27057fc172c2e6d7eopenssl-perl-1.0.2k-22.el7_9.x86_64.rpm0896832e03341d76521c42f7b1b2e5353404a29cf1a7e0218e5130549352f670openssl-static-1.0.2k-22.el7_9.i686.rpm5a1bd652238c1bf6f4f249c115d9161468e9ff363d5bcd8e0241b5d77c3a1eaeopenssl-devel-1.0.2k-22.el7_9.i686.rpmb8c85d6360fb785fac3bfc3aaf63442a5257a27325c3426b0d8d9fff2623b3e2openssl-libs-1.0.2k-22.el7_9.i686.rpm326fe4fe4832c1312b334c1553e1c9623543ee6bbd1beb068276e6b5fa81f8e9openssl-devel-1.0.2k-22.el7_9.x86_64.rpm4ac584b2648ef5b2947325914d5bc645a4a4a4bc72ffa4f0d7ff4bd7f289da45openssl-static-1.0.2k-22.el7_9.x86_64.rpm6d732ebba370c1094b6bbcdfd0baa398c8f6e393d25ea7c5df63ef9e63e48345openssl-1.0.2k-22.el7_9.x86_64.rpm625bcddd9f6faea4ca2dd3750620adcc5a77693e36d43026654c853cc40fb95dSLSA-2021:3801-1KernelSecurity Fix(es): * kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543) * kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576) * kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653) * kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Kernel panic due to double fault with DLM reporting for socket error "sk_err=32/0" * "MFW indication via attention" message getting logged frequently after every 5 minutes * lpfc fails to discovery in pt2pt with "2754 PRLI failure DID:0000EF Status:x9/x91e00, data: x0" * pcpu_get_vm_areas using most memory from VmallocUsed * SL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and releasing command after timeout * [Azure] SL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs * [stable guest ABI]Hot add CPU after migration cause guest hang * i40e driver crash at RIP: i40e_config_vf_promiscuous_mode+0x165 * [nfs] Performance issue since commit 5a4f6f11951e * [kernel] Indefinite waiting for RCU callback while removing cgroup --- SL7 x86_64 bpftool-3.10.0-1160.45.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm perf-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm noarch kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm kernel-doc-3.10.0-1160.45.1.el7.noarch.rpmimportantScientific LinuxScientific Linux 7kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm867fdd6e332efbd4cea7bacdb32374f632ca50f3c27b115367c5bceaf950023aperf-3.10.0-1160.45.1.el7.x86_64.rpm4ee7937dec998d123d775db2e2a905e3baff41861e97ef4835f4bd7f9b1d139ekernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpmba563855289df621120ac2ff431b1a133af48779619476660eead751240e58d3kernel-3.10.0-1160.45.1.el7.x86_64.rpmf10179e6528536565797b6977ef373f2bcc93de865490fd71c807743026e493bkernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm0b3b808b3e34bd6a6a80f40cd0283e05c73143fc8134ba6a05a4204471bbfaf2kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpmb86d2bcc3e17d97f11c8b38b05a6c48a62abdca41fa488cbe52c529344d71621kernel-doc-3.10.0-1160.45.1.el7.noarch.rpmc0adc04226bfa29b938ad285aa99f5f2e153031beca278eb46f94b600e11e7fdbpftool-3.10.0-1160.45.1.el7.x86_64.rpm525b3f26666c486a0870cb41de14c0ce3da96d1d688c62b63d45b74077bd9222python-perf-3.10.0-1160.45.1.el7.x86_64.rpm6ee9f492b7ac9d6a9572dabbbe6e1ecf0fe2d1e2c7b571078795f900b19bba80kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpmb6778bbd766fab3ba47aeaffd8dfec93f818b50cf3bc2777a8f4a04a73fcbcbdkernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm923405a988634c32c71fed69171e958b1c0c06b356b2ba0dd5efbef3366c3646kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm8e8fee1867e2a9134f4323f10f6986eb549df5f416b503a3169784d72c582209kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm484a818618e60b5d7cc3bdeb2f7f30cb261533f3eee672e0ab234d71713f7e2aSLSA-2021:3807-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: CRYPT password hash with asterisk allows any bind attempt to succeed (CVE-2021-3652) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * A plugin can create an index. Even if the index can be used immediately (for searches) the index remains offline until further reindex * In some rare case, a replication connection may be treated as a regular connection and ACIs evaluated even if they should not. * A regular connection can be erroneously flagged replication connection --- SL7 x86_64 389-ds-base-1.3.10.2-13.el7_9.x86_64.rpm 389-ds-base-debuginfo-1.3.10.2-13.el7_9.x86_64.rpm 389-ds-base-devel-1.3.10.2-13.el7_9.x86_64.rpm 389-ds-base-libs-1.3.10.2-13.el7_9.x86_64.rpm 389-ds-base-snmp-1.3.10.2-13.el7_9.x86_64.rpmlowScientific LinuxScientific Linux 7389-ds-base-devel-1.3.10.2-13.el7_9.x86_64.rpmaec7abb1ea3f088e1fb0844c076f8a2b3a7f94ad9b2eed3384702f32ba7fa86a389-ds-base-libs-1.3.10.2-13.el7_9.x86_64.rpm9a701e7781a327bcf458ded4c0578fcec25e88ea744a5aaa40e74d5f93596929389-ds-base-1.3.10.2-13.el7_9.x86_64.rpme5b1cd1a816777e3910d687b4acc55ce2558fbce0e44e41f74223fd315f366a6389-ds-base-snmp-1.3.10.2-13.el7_9.x86_64.rpm138cc1e3a0c9dfa5610aeed6db70927895f5acf90bcf3242054e5fad1caae504SLSA-2021:3810-1Libxml2Security Fix(es): * libxml2: Use after free via namespace node in XPointer ranges (CVE-2016-4658) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 libxml2-2.9.1-6.el7_9.6.i686.rpm libxml2-2.9.1-6.el7_9.6.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7_9.6.i686.rpm libxml2-debuginfo-2.9.1-6.el7_9.6.x86_64.rpm libxml2-devel-2.9.1-6.el7_9.6.i686.rpm libxml2-devel-2.9.1-6.el7_9.6.x86_64.rpm libxml2-python-2.9.1-6.el7_9.6.x86_64.rpm libxml2-static-2.9.1-6.el7_9.6.i686.rpm libxml2-static-2.9.1-6.el7_9.6.x86_64.rpmmoderateScientific LinuxScientific Linux 7libxml2-static-2.9.1-6.el7_9.6.i686.rpm8a59d382b30319d0ff690e40222edb29c738c9ca34cf444404e96aa775067b80libxml2-devel-2.9.1-6.el7_9.6.i686.rpmaca8e9ea39cb10f330355ffc3f46dff2698f681dfdddda2ecf987339aaa73f66libxml2-2.9.1-6.el7_9.6.i686.rpmf87f59a8af354ebd01bf4fe2763aa8ad246912a21c096ce4bc27b22f53d1f608libxml2-devel-2.9.1-6.el7_9.6.x86_64.rpmd9968fe93e5c1af2ccbe30d3a4cb1ae2523e454717b0d6dc762d01aacca2547blibxml2-static-2.9.1-6.el7_9.6.x86_64.rpm66674b9b2caa4763602e3e5ae5cc79704358c65ac092fc65bfc153c54aa5a32blibxml2-python-2.9.1-6.el7_9.6.x86_64.rpm8f07c25339c6fde873b15392514b0344ba7b22b46ca088cf46874535e1f906b7libxml2-2.9.1-6.el7_9.6.x86_64.rpmf4c797e76f3851b1071a8583855370125721551c43ccc91477b77c7b06ad401aSLSA-2021:3841-1ThunderbirdThis update upgrades Thunderbird to version 91.2.0. Security Fix(es): * Mozilla: Use-after-free in MessageTask (CVE-2021-38496) * Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500) * Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501) * Mozilla: Downgrade attack on SMTP STARTTLS connections (CVE-2021-38502) * rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810) * Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497) * Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 thunderbird-91.2.0-1.el7_9.x86_64.rpm thunderbird-debuginfo-91.2.0-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7thunderbird-91.2.0-1.el7_9.x86_64.rpmca7ecb224d07e0dd1409860349eb0eb01188050739568942bf50e43875e78b75SLSA-2021:3856Important: Httpd Security UpdateThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7httpd-tools-2.4.6-97.sl7_9.1.x86_64.rpm9581a172adb312e7e316a2f5ba812b21cdc7464e98af2e92ec9620f12d3bb4c6mod_session-2.4.6-97.sl7_9.1.x86_64.rpm7c721f5a5df540461d2710cce4802bd4b75820fd70ab4fb6f7d03991a5ef2214mod_proxy_html-2.4.6-97.sl7_9.1.x86_64.rpm6f5b0e6091bd251d553a697848d55e871eb7ca33a2d0ad8d6c3de18536e36b6ahttpd-devel-2.4.6-97.sl7_9.1.x86_64.rpm29ecb6fcc01aba2a3d3a2d341fa19e2975d17fb725e5eaa3496b69cddcc55e97httpd-manual-2.4.6-97.sl7_9.1.noarch.rpm1794f9ab5b5a11081fa9978bdd1af37ccf839681cf4bc003e56399f8458feb65mod_ssl-2.4.6-97.sl7_9.1.x86_64.rpmdcd70d4f19c36d40e2a23a2227ba722e869141b9efdfcea1919dc921b3eca1e2httpd-2.4.6-97.sl7_9.1.x86_64.rpm5fc596869c32f29d76b23ea0cd05e38c7cf75c7b9fa861431268266be6905a2cmod_ldap-2.4.6-97.sl7_9.1.x86_64.rpma6adbd702164e543182a0a32f3b1a7f7a4fa75f4e43ec6a8048cc535de40631bSLSA-2021:3889Important: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) * OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) * OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) * OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) * OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) * OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) (CVE-2021-35578) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586) * OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) (CVE-2021-35588) * OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * A defensive security change in an earlier OpenJDK update led to a performance degradation when using the Scanner class. This was due to the change being applied to many common cases that did not need this protection. With this update, we provide the original behaviour for these cases. (RHBZ#1862929) importantScientific Linux 7java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.312.b07-1.el7_9.noarch.rpmb8e041ae56a3b6f55f91e35e550c91c79a5f7663521a4821b54286b5349d4587java-1.8.0-openjdk-headless-debug-1.8.0.312.b07-1.el7_9.i686.rpm185e6681a034b8fb8d4418f512e628f3b385294a5532ece494895abe7551cdfcjava-1.8.0-openjdk-accessibility-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm318dd320b0c51f88be77b97acf3d8c0c3aa22e410b3290fee5c7c860196ba162java-11-openjdk-javadoc-debug-11.0.13.0.8-1.el7_9.i686.rpmf3f4387ab91c214f9dd86464a31e3414b74492361737b221816178c571941c48java-1.8.0-openjdk-headless-debug-1.8.0.312.b07-1.el7_9.x86_64.rpmfe3fc45668fa2d1e847ee3f529c8016bcf9e0bc66bc60e823b890407369a58b3java-1.8.0-openjdk-demo-debug-1.8.0.312.b07-1.el7_9.i686.rpmbe18bb19a976d1fc42494fcb27a048dd7204bed976708e61d91e3171ae2506f9java-11-openjdk-headless-debug-11.0.13.0.8-1.el7_9.i686.rpm97eb31f1ef863866ea004512db55576c813f0d9ca733cdc02c73c15a72c3a264java-1.8.0-openjdk-demo-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm613ca8a7e3e8c2af0b551f7f23b47fe6181517b3925ce98577d40bb76eaa88a0java-11-openjdk-devel-debug-11.0.13.0.8-1.el7_9.i686.rpmc12fe1fbe90dcc0bd4be61d229ac2cbd97879d417447bf7f36440318c10d9681java-11-openjdk-headless-debug-11.0.13.0.8-1.el7_9.x86_64.rpm2eeacab36ce271803ecfc626ed5b1855bfbae454c38aedc1d6c587c4a630267fjava-11-openjdk-javadoc-debug-11.0.13.0.8-1.el7_9.x86_64.rpme90a511e21be6f399a142c7c844768cf9cd5fbf3fe7c60eea4ca2a7e3bc31d32java-11-openjdk-javadoc-zip-debug-11.0.13.0.8-1.el7_9.x86_64.rpm0c7554936b512c3be2b5f0072c3f419f5278b7c27a4d9140c049a8f0d9e3c051java-1.8.0-openjdk-javadoc-debug-1.8.0.312.b07-1.el7_9.noarch.rpm6d49108d4429403240621882e8e762435eca92d61ec7ac01c4a7ecc2d3463301java-11-openjdk-devel-debug-11.0.13.0.8-1.el7_9.x86_64.rpmf86980e699225cd91a39abe0a293a42179db3b72f366266539584c35cda107cajava-11-openjdk-jmods-debug-11.0.13.0.8-1.el7_9.i686.rpm5a5972bf73572ba1ed7673b859557be68d9da5c91c0cd6b97f88e421e8059310java-1.8.0-openjdk-accessibility-debug-1.8.0.312.b07-1.el7_9.i686.rpm2c065ede1975c9b4714b4598a5ba351b0f5798441e3bf526a339f4ea04617faajava-1.8.0-openjdk-debug-1.8.0.312.b07-1.el7_9.i686.rpmbadbefa4886b2f0e02af3920674721ae6dd20cd40550b38fd6350778949da252java-1.8.0-openjdk-src-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm8650d36c04fb12c4e51aed57461a16733b7f785a43e2d7905679168cf742c93ejava-11-openjdk-src-debug-11.0.13.0.8-1.el7_9.x86_64.rpm90eea65199aaf18e400556e0d11fc55978450bd3cf312b35b5c4630a42a32f83java-11-openjdk-src-debug-11.0.13.0.8-1.el7_9.i686.rpm485a53dcbfce50300ce2b08423f653c90d91f068efcbd527b1d05443be6e758djava-11-openjdk-debug-11.0.13.0.8-1.el7_9.i686.rpmd2ef3fdae6a8002640cd022b6440975cea9f7bd2c5d50ef58609d37cc065a5dejava-11-openjdk-javadoc-zip-debug-11.0.13.0.8-1.el7_9.i686.rpm944c237e8e0efc48143d3a1f430cd3b3c316e143542a263dde4120d5594a9761java-11-openjdk-debug-11.0.13.0.8-1.el7_9.x86_64.rpm2986a8d4690f34dd30e269cce43aeff99afc0f9c0d79794071bdd20840f1a0e0java-1.8.0-openjdk-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm06e676bb945720a776d4e3450adc46c75e0bc27e4b9d876a940be5be10633f05java-11-openjdk-demo-debug-11.0.13.0.8-1.el7_9.x86_64.rpme07bfd456b04754c02ed825e5dacd707f2ab07351552b940cf8a106122da4901java-1.8.0-openjdk-devel-debug-1.8.0.312.b07-1.el7_9.i686.rpm815bda03a742f2b7e1f10b785b398d227fee602872bdea6ea51d143348922521java-1.8.0-openjdk-src-debug-1.8.0.312.b07-1.el7_9.i686.rpmca5e16a6456f3cb50263ff94a90ac206afddf4a8aeb5ef3a5dc7a467378f61edjava-11-openjdk-static-libs-debug-11.0.13.0.8-1.el7_9.x86_64.rpmccbff3e9c5546692b8ca43756439d1837893f6127de9635f490bae72668f7f4ajava-11-openjdk-jmods-debug-11.0.13.0.8-1.el7_9.x86_64.rpm6dbb3dca7fa74b6378c7d8c1cb6e589d9c76cf90c4d69375eede2a4d1f32d37bjava-11-openjdk-demo-debug-11.0.13.0.8-1.el7_9.i686.rpma9ddfa9caef1859a580fff96b0d152ff2371b203894ea91c8e2eefbf6a20c951java-1.8.0-openjdk-devel-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm87efefa8960f6579e5731b72101f67e7cf282f7f6a43d58b073c60d8f5a947cdSLSA-2021:3889-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) * OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) * OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) * OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) * OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) * OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) (CVE-2021-35578) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586) * OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) (CVE-2021-35588) * OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * A defensive security change in an earlier OpenJDK update led to a performance degradation when using the Scanner class. This was due to the change being applied to many common cases that did not need this protection. With this update, we provide the original behaviour for these cases. (RHBZ#1862929) --- SL7 x86_64 java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.x86_64.rpm noarch java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.x86_64.rpm96becc4df530dcbb300a3ee87e56d7d557d982f3a05a6e13bdf0f173c321ab98java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.i686.rpm8053e3d59d91fa2565831d5591d2bea43d763da33cf9d69e8205aa1c2563e506java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.i686.rpm08274409df9aa67ba85ec46e67c03b74360b3553d9b2d66921632e287b145223java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.x86_64.rpm27ee4919633d5efccefc730781dc6bf03c1bdd255584f54640513fa3cf2408c5java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.x86_64.rpmdde358379e51deb289aecf16e04be1d2a7d803ae6c6e47b1969ab1cd425a30fbjava-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.i686.rpm7e5737cdd00f317e6fe853678e470966df3db388539749132381d3731894ab2fjava-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.i686.rpm06b10b389e6da269004a11f8c8e7d2c98a931309b739bb16d8bbf2e79031b9ffjava-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9.noarch.rpm35d2a9fd1ecb1c7e2c93bbedf92a66bddef3fd81ef5bb8d52264eecb297cee41java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.x86_64.rpmd1f3f237c4290a03682bb672e5a734917de05866edf597726e1be0ed77c43422java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.i686.rpme7a0e52a0cc34f69a2c1e8f959fd064ac6770cbbe9114be3efef465def119cc0java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.x86_64.rpm904e67fa5443bdcc8c1d21217e278c8c4ffd4f9f37e189b7acc46cbc4c514039java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.i686.rpmac3569fd519415e34c1f9f87bfe90a825a1d2fada013b0e2667aa41a541f2f73java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9.noarch.rpm75c9b6a586b9e3d8e08bd1a9808ded2153d35a74d9ba19a418473f04fbbfcba7java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.x86_64.rpm83d558c3b78820fb00cf5ca98fb3763617c578826bd25eb84ab77196ed330d8eSLSA-2021:3892-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) * OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) * OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) * OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) * OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) * OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) (CVE-2021-35578) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586) * OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Previously, uninstalling the OpenJDK RPMs attempted to remove a client directory that did not exist. This directory is no longer used in java-11-openjdk and all references to it have now been removed. (RHBZ#1698873) --- SL7 x86_64 java-11-openjdk-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-debuginfo-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-debuginfo-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-demo-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-demo-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-devel-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-devel-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-headless-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-headless-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-src-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-src-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7java-11-openjdk-demo-11.0.13.0.8-1.el7_9.i686.rpme33b167c32960ebe864e3298c0806fef44326dbf2e60f5fd6de9a64787630e47java-11-openjdk-src-11.0.13.0.8-1.el7_9.x86_64.rpm605d9de79b1e7b66b8a678a32d3662f6024308b0d8efe4212832a6e3696c990fjava-11-openjdk-jmods-11.0.13.0.8-1.el7_9.x86_64.rpm47f96da1d5218fca5cb8492684bc3375eb0562b5d3a2b9d4c04b86be92305609java-11-openjdk-headless-11.0.13.0.8-1.el7_9.i686.rpmcc8f5858a5ef7c4e422c8ac9478b19571d12c9ea62b65b204afba187f834ad3fjava-11-openjdk-11.0.13.0.8-1.el7_9.i686.rpm0818aa1117445013eb4f0ad45b312d1e54ac8c922ceffe90e7674a643eea5788java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.x86_64.rpmfc46580e7be7714628c10b0e0e9fb0ee34b25b3912fa5a599bf77715b069f65bjava-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.x86_64.rpm452cbaf81da20d0b10d5cc951fa527304a7e306f64193c11f9c28c9e60e74c4cjava-11-openjdk-jmods-11.0.13.0.8-1.el7_9.i686.rpmf6fdc5145a6147d28ca9a6eba36ce56aac8e01286353c367a91c4cb2b14cbe31java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.i686.rpm3d3be31a498e5596c6ec12383fb0cbdbfe7d7577e3ad628f63325b34808717c7java-11-openjdk-src-11.0.13.0.8-1.el7_9.i686.rpm064608eff6a661e8ecd966c80bce8fa37071a8ea30c87741dd144573b073a1d9java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.i686.rpm04cdecef944c4d0caec49c21edb6897edeaee502b5aff9086123a3715ff51fd9java-11-openjdk-devel-11.0.13.0.8-1.el7_9.i686.rpm67fc4f3c7e2f848a74b162d8b863b37d8f7198885a1c0642d27a0bf2e52e1e4bjava-11-openjdk-headless-11.0.13.0.8-1.el7_9.x86_64.rpm378bee12136df9aa9fe80bff862d608232d45449a532cbf404db7357f3314623java-11-openjdk-11.0.13.0.8-1.el7_9.x86_64.rpmbebb84bedcb3c512d2a0bfeeb8b4db7b60ec32b5815d7de7edf819d3b2ffde24java-11-openjdk-demo-11.0.13.0.8-1.el7_9.x86_64.rpmcf3f5bdb45ebfa36350f721c37429c0ec2b0e08e7fb8cd0835ad0b04831c170djava-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.x86_64.rpm2657fc9170f55acff762e78c6b324cbcf7671e37196f15cce4046d1d34570290java-11-openjdk-devel-11.0.13.0.8-1.el7_9.x86_64.rpm1d1b99c75a03c26401710fec1fa91024ab5f78e37a1a21c599ccea4061b052c7SLSA-2021:3956-1XstreamSecurity Fix(es): * xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39139) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39141) * xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* (CVE-2021-39144) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39145) * xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39146) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration (CVE-2021-39147) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator (CVE-2021-39148) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* (CVE-2021-39149) * xstream: Server-side request forgery (SSRF) via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39150) * xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39151) * xstream: Server-side request forgery (SSRF) via unsafe deserialization of jdk.nashorn.internal.runtime.Source$URLData (CVE-2021-39152) * xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39153) * xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39154) * xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler (CVE-2021-39140) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 noarch - xstream-1.3.1-16.el7_9.noarch.rpm - xstream-javadoc-1.3.1-16.el7_9.noarch.rpmimportantScientific LinuxScientific Linux 7xstream-javadoc-1.3.1-16.el7_9.noarch.rpm721d4a42d6144450ca7a9d9a3346ea70c1c2cd3e659be4498547a45c905ad650xstream-1.3.1-16.el7_9.noarch.rpm18234f1e80c5362d2f18e4c98af1b3ad30f317728f614a810542f5013260471dSLSA-2021:4033-1BinutilsSecurity Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in binutils in order to facilitate detection of BiDi Unicode characters: Tools which display names or strings (readelf, strings, nm, objdump) have a new command line option --unicode / -U which controls how Unicode characters are handled. Using "--unicode=default" will treat them as normal for the tool. This is the default behaviour when --unicode option is not used. Using "-- unicode=locale" will display them according to the current locale. Using "--unicode=hex" will display them as hex byte values. Using "-- unicode=escape" will display them as Unicode escape sequences. Using "-- unicode=highlight" will display them as Unicode escape sequences highlighted in red, if supported by the output device. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 - binutils-2.27-44.base.el7_9.1.x86_64.rpm - binutils-debuginfo-2.27-44.base.el7_9.1.i686.rpm - binutils-debuginfo-2.27-44.base.el7_9.1.x86_64.rpm - binutils-devel-2.27-44.base.el7_9.1.i686.rpm - binutils-devel-2.27-44.base.el7_9.1.x86_64.rpmmoderateScientific LinuxScientific Linux 7binutils-devel-2.27-44.base.el7_9.1.i686.rpmfb6f39677f4dfcd8081f6c7255d6b3290a7bb59c19bc49777ff53ab5d326d9f8binutils-2.27-44.base.el7_9.1.x86_64.rpmf734e06cf2c45618f88fc22efa5888844a886d627cf2c73b505c16287fd0ef3fbinutils-devel-2.27-44.base.el7_9.1.x86_64.rpmb86b196eb77c5dfcbd607eaea01c7b8cf538def86cc0c047c72004f9fecef54cSLSA-2021:4044-1FlatpakSecurity Fix(es): * flatpak: Sandbox bypass via recent VFS-manipulating syscalls (CVE-2021-41133) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE --- SL7 x86_64 -flatpak-1.0.9-12.el7_9.x86_64.rpm - flatpak-builder-1.0.0-12.el7_9.x86_64.rpm - flatpak-debuginfo-1.0.9-12.el7_9.x86_64.rpm - flatpak-devel-1.0.9-12.el7_9.x86_64.rpm - flatpak-libs-1.0.9-12.el7_9.x86_64.rpmimportantScientific LinuxScientific Linux 7flatpak-libs-1.0.9-12.el7_9.x86_64.rpm58e3c1f8dd1fa2e042593af0ee4e645190955b33c3399cf72ebb0a2eee668351flatpak-builder-1.0.0-12.el7_9.x86_64.rpm22067faaaeb7791e013f2978eaa4812a0c98185e7379c24d625cc3669e1c929eflatpak-devel-1.0.9-12.el7_9.x86_64.rpm1764362a0c1f11a79eeca38eeffc989f49059b37c95500454fda35278377b209flatpak-1.0.9-12.el7_9.x86_64.rpm9eb7d9ef146c06f180f0b37e746cf2d2237d458853a34eb8f91d5914b96f3fbeSLSA-2021:4116-1FirefoxThis update upgrades Firefox to version 91.3.0 ESR. Security Fix(es): * Mozilla: Use-after-free in HTTP2 Session object * Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 * Mozilla: iframe sandbox rules did not apply to XSLT stylesheets (CVE-2021-38503) * Mozilla: Use-after-free in file picker dialog (CVE-2021-38504) * Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning (CVE-2021-38506) * Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports (CVE-2021-38507) * Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing (CVE-2021-38508) * Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain (CVE-2021-38509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.3.0-1.el7_9.x86_64.rpmd240ca41ca7b893bf6dfe675cc0570479cd65e03efd623d8a49f34eaaa5e3b63firefox-91.3.0-1.el7_9.i686.rpm8c6d8cc7b4a69ef5cbd1426523aa2b250928f0c44478c8020e085e6333a1370cSLSA-2021:4134-1ThunderbirdThis update upgrades Thunderbird to version 91.3.0. Security Fix(es): * Mozilla: Use-after-free in HTTP2 Session object * Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 * Mozilla: iframe sandbox rules did not apply to XSLT stylesheets (CVE-2021-38503) * Mozilla: Use-after-free in file picker dialog (CVE-2021-38504) * Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning (CVE-2021-38506) * Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports (CVE-2021-38507) * Mozilla: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing (CVE-2021-38508) * Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain (CVE-2021-38509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.3.0-2.el7_9.x86_64.rpm4c8ed042fda855710d18116d76d222179772e50d5b378b3830c92bb8ddf6626aSLSA-2021:4619-1FreerdpSecurity Fix(es): * freerdp: improper client input validation for gateway connections allows to overwrite memory (CVE-2021-41159) * freerdp: improper region checks in all clients allow out of bound write to memory (CVE-2021-41160) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7freerdp-2.1.1-5.el7_9.x86_64.rpm425ec2b695d055f02fad6b19a925aefe72b42a728f5188beca945ea774551522freerdp-devel-2.1.1-5.el7_9.i686.rpm00fac61464c5480ec91e302fb37991b75d4f2f69bdd93d0fbddd5e29dcf7fdd5freerdp-devel-2.1.1-5.el7_9.x86_64.rpmf6315426a81bea92b151c19b92dd73abf7785c2c5f38326a7dd87edf9cebd623libwinpr-devel-2.1.1-5.el7_9.x86_64.rpm623433c0ea6efa7207d361905f8f4f211d28def2609e49c1fbc4745d35594620freerdp-libs-2.1.1-5.el7_9.i686.rpm685bc3857c0a1c7357e7ed1e99a2c3943005b17e0f0ad29461b131cb283d3c75freerdp-libs-2.1.1-5.el7_9.x86_64.rpm16ff1cf1e8b791b72f404683e1b09ca183c1b923bfd7a40bde144c0a011097a0libwinpr-2.1.1-5.el7_9.x86_64.rpm77239c60301bfd4569a632c262051c21eec79b1ea830b546779d5084aab7d084libwinpr-devel-2.1.1-5.el7_9.i686.rpm4f0aa642e193199463b076ab85aa95c6471db5c0015ffec54a485eb2df6dce37libwinpr-2.1.1-5.el7_9.i686.rpm3ee37c0c201ef2fe982a344d953ffa8ea29a8c96200396163702500be4efe67aSLSA-2021:4777-1KernelSecurity Fix(es): * kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after- free (CVE-2020-36385) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * scsi: ibmvfc: Avoid link down on FS9100 canister reboot * crash in qla2x00_status_entry() because of corrupt srb * qedf driver: race condition between qedf's completion work task and another work item tearing down an fcport with qedf_cleanup_fcport * The kernel crashes in hv_pci_remove_slots() upon hv device removal. A possible race between hv_pci_remove_slots() and pci_devices_present_work(). * I/O delays incorrectly handled in the NVMe stack * Data corruption in NFS client reusing slotid/seqid due to an interrupted slotimportantScientific LinuxScientific Linux 7kernel-devel-3.10.0-1160.49.1.el7.x86_64.rpmc59bd6ad8b0ba335b1a88bffbcf8ef268d3df29a96d7b7b995d30b8c305939dekernel-tools-libs-devel-3.10.0-1160.49.1.el7.x86_64.rpm6e4c1d649dde4da6699c3f05acb8e7ef57f58b8e98dd9d3f197804e05169011ckernel-tools-3.10.0-1160.49.1.el7.x86_64.rpm76e9b04a0a7c47f25152f16f92dd7c8cb609e4558c0616d4f261870ac288b993kernel-tools-libs-3.10.0-1160.49.1.el7.x86_64.rpm85effede8b93bcb34e01c1154c8bb0c9aefc896e7cd9c4809290bfde34d14e6fkernel-3.10.0-1160.49.1.el7.x86_64.rpmaa36c535e415cd33f65a061cdef6ff3fb12a14214d7614ab7cc113412933ff4bkernel-debug-devel-3.10.0-1160.49.1.el7.x86_64.rpmae36099deb7aa92ef933e33052f63aa483b8755c5b63b0360840bc48f1914469kernel-abi-whitelists-3.10.0-1160.49.1.el7.noarch.rpm6c4f2476de1b18214e0d474570a7e21b0d4139c347b674cd0b78836ae5320907bpftool-3.10.0-1160.49.1.el7.x86_64.rpm73b93162d0e202f228b3157df9b278ea9944b817dc7489af189b682b5f0dfd3dkernel-debug-3.10.0-1160.49.1.el7.x86_64.rpm20261f01313111e42969541ffdb4b19cafd855d6294a3ac64481a5edeb8f2a50kernel-doc-3.10.0-1160.49.1.el7.noarch.rpm82e0747f69c44a4d7b658707d6ee95cbb91f67f734e768d03dec121eec1624aakernel-headers-3.10.0-1160.49.1.el7.x86_64.rpm90f2afa509798753be07a36e1c0bca62c2a505ee3f9206d908fadfd437273edfperf-3.10.0-1160.49.1.el7.x86_64.rpm4620413535aa12eddad10c9fa5e0468cd8a8bb4cd7b0523d27959c47fb896295python-perf-3.10.0-1160.49.1.el7.x86_64.rpm255a4e7fe3d8b457d6e51b5df869cf53e6c73f383acdd0b1573161541c9c9ee1SLSA-2021:4782-1OpensshSecurity Fix(es): * openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured (CVE-2021-41617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7openssh-keycat-7.4p1-22.el7_9.x86_64.rpm1335e1327219cdfad2139a4e7eaa935f3c4c420449714d6a512d2ad7e6a795bbpam_ssh_agent_auth-0.10.3-2.22.el7_9.x86_64.rpm49828810f0d5030b8669f601621777242386c6f46b9bd24b8dd9e4ca8385d786openssh-server-sysvinit-7.4p1-22.el7_9.x86_64.rpm27656905c453087fb4326a46ae20f69ad6f7d15dc57ac689aebaa67cc3af2f94openssh-askpass-7.4p1-22.el7_9.x86_64.rpm75a95101038a61ef81f8bc905cca421e78a765ad8ec724b14df9f60dafa4100fopenssh-cavs-7.4p1-22.el7_9.x86_64.rpmd30c8c5057e3ac699638dc6131d01513da36d2ff21ad586caf8b1db7245f854bpam_ssh_agent_auth-0.10.3-2.22.el7_9.i686.rpm9a85d8a27fbec1addee6044fee82166d543cda136dd0f8fc573ca74c5603bab0openssh-server-7.4p1-22.el7_9.x86_64.rpm21c4cdb91e7b33fb22d39d57323aabd8e3c4fb3e247c96e350f6524439410552openssh-7.4p1-22.el7_9.x86_64.rpm09b902fcc03fa2ff326c9f6534af56d52092119319689489dffb5a5712b7c975openssh-clients-7.4p1-22.el7_9.x86_64.rpmb9995430cbc9a2437eceddfaa6d5543cb9cbd27b88a6088bd12e826497f390efopenssh-ldap-7.4p1-22.el7_9.x86_64.rpm56b9b8f33bd2f38acc39a956c5707e609a788f202e7bb1ef7bb1d94e97f0a875SLSA-2021:4785-1RpmSecurity Fix(es): * rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7rpm-4.11.3-48.el7_9.x86_64.rpmf7034a7d37716143df45fce93a7db04674d4c0a11744c6eb7350d3e1a60eb9dbrpm-sign-4.11.3-48.el7_9.x86_64.rpm2148e0ff7f1fb45bfbe7001dbe9999f9cc16425e4b449ed0f28ea41f97160d4brpm-libs-4.11.3-48.el7_9.i686.rpm7c92bfe62ed2e6ef2cb5e34cf60d7b4aa3caf175bba0fe317879b73b083aae0frpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpmf3591c4301390b93035418fd9355051df0c9d22533775c0db02f26f09cfeb039rpm-build-4.11.3-48.el7_9.x86_64.rpmbfdfa81bef912c168e7a5e4efdb859656050c1d0919b9a919d4c220eff2a4a06rpm-apidocs-4.11.3-48.el7_9.noarch.rpmdc4d8039966f057bf378f252329a1b26c6ed9b5a59a03a821ec82d8bde9747farpm-build-libs-4.11.3-48.el7_9.x86_64.rpme4ab10a468a9fcf6885626b9045f3268ef3701f891ba304325e720ce57edc005rpm-devel-4.11.3-48.el7_9.x86_64.rpm58728c0ff5dbe6ddf05dfe74e314a78fff2c53bad686f11f69bff0b570716884rpm-build-libs-4.11.3-48.el7_9.i686.rpm773c74a13a8be6aa2766b718b53e89e53c3775a190f09a90445d2f137ce8eea8rpm-python-4.11.3-48.el7_9.x86_64.rpm6473424fa421cf2f447521a64a754fa76d07ca4d2690ec10f946d50a02507554rpm-cron-4.11.3-48.el7_9.noarch.rpmcc1922c981027ee30335ca2191a223e6f40ecee1aa27e7947e200aba8cac9c80rpm-devel-4.11.3-48.el7_9.i686.rpm6d05f18d940eead5c800f05dead657010bd1c5a78757f1f01327e008248045a0rpm-libs-4.11.3-48.el7_9.x86_64.rpmd13ab2c849e7ef85d698c599f8393fe1b58c118eea4106a8822f496de2f3e097SLSA-2021:4788-1Krb5Security Fix(es): * krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field (CVE-2021-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7libkadm5-1.15.1-51.el7_9.x86_64.rpm657875b63fe49b17f6d97ccfbd08597596af7bc12197093ebe1f5da0d1baf3b8krb5-devel-1.15.1-51.el7_9.x86_64.rpmecdf5093b38c12d3549c5c3ac6069737e21d8645f28c6a7a47243443f5a9ecf9krb5-libs-1.15.1-51.el7_9.x86_64.rpm0b5693f5de9bae23654703f65e36c84e2787e104908f8c171faefffd3bf3caeckrb5-libs-1.15.1-51.el7_9.i686.rpm8c4a640ef705264b41a8b8406ba75dac8812c740b23bacc3cb755b7db5d9e5d6libkadm5-1.15.1-51.el7_9.i686.rpm8ecd0dda63f8fdef85f3be10611b669d2dc8f8820c41e51929957203919c59c6krb5-server-1.15.1-51.el7_9.x86_64.rpmedbefd5f50c0ab6f8f347753a30e6cabb9e3a9a91e3edb0140a39c295c478976krb5-server-ldap-1.15.1-51.el7_9.x86_64.rpm2736348c2e593224a35ad17d2baba550a0f3f9d925bb28687786378dafabf2aekrb5-pkinit-1.15.1-51.el7_9.x86_64.rpme6ef83a4934b858afe592fb93a7365e981aafa924b55b6d515ce30fdd084bc99krb5-devel-1.15.1-51.el7_9.i686.rpmb17db7a9e0d3401fff1a6973e133a3b97a5a42ec6e9f4e54e4533c6d67dd503fkrb5-workstation-1.15.1-51.el7_9.x86_64.rpm518e643fae6225e2a0bf9f417845ac6057b93e97fd4db403cd1264f533781d7eSLSA-2021:4904-1NssSecurity Fix(es): * nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and RSA-PSS) (CVE-2021-43527) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEcriticalScientific LinuxScientific Linux 7nss-3.67.0-4.el7_9.i686.rpm8b39d7bbdd0b7c87e89fa90555935b23723b4de00bcb3c620b9244d895da45aanss-pkcs11-devel-3.67.0-4.el7_9.i686.rpmd80c7a1e8ecfa6c65521a83cc7d8145ef3b8cf9624d3ccb14ffb2dd5a7d06b5fnss-3.67.0-4.el7_9.x86_64.rpm9fa543b38cbcd32000f90732cd5dc04f7e6bddcfeaf65b2e1563f345ed58a0bdnss-sysinit-3.67.0-4.el7_9.x86_64.rpmb66372dc9a21d68aeaf19da7827403ad84fa245fa8e22058d891106701661d8bnss-devel-3.67.0-4.el7_9.i686.rpm96ac14ca35823c9a4ac7663af959bef6f678a125fd197e01b94d15df2335cfa4nss-pkcs11-devel-3.67.0-4.el7_9.x86_64.rpmfd5c09387dabef2c766f98684d44e391053a13a1b9c4bfb7baa704ea908d3431nss-devel-3.67.0-4.el7_9.x86_64.rpme37be7a62e6a240e35e8b7fb7ac856bcdae43d435bf76244e80e800210210b1enss-tools-3.67.0-4.el7_9.x86_64.rpmb53f0ac22d348471aaf4297e58721ca11ae4f57122869e47dc1d51bababbcdafSLSA-2021:4913-1MailmanSecurity Fix(es): * mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) * mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) * mailman: CSRF protection missing in the user options page (CVE-2016-6893) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7mailman-2.1.15-30.el7_9.2.x86_64.rpma6d403a8414332a58f7713c4db942ad7216a5f34f7c6a7e1d4dcfe28cb8bd819SLSA-2021:5014-1FirefoxThis update upgrades Firefox to version 91.4.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 * Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536) * Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537) * Mozilla: Missing fullscreen and pointer lock notification when requesting both (CVE-2021-43538) * Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539) * Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541) * Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler (CVE-2021-43542) * Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543) * Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545) * Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.4.0-1.el7_9.x86_64.rpm74b34b94c0496a052d766ef75b3959f4f21d66d466f6f73698d6bb9397a1ea3bfirefox-91.4.0-1.el7_9.i686.rpm47df76129a2edadd96529cb6ecc6a39c43c555f5ec0932f3f345fdca39a68cddSLSA-2021:5046-1ThunderbirdThis update upgrades Thunderbird to version 91.4.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 * Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536) * Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537) * Mozilla: Missing fullscreen and pointer lock notification when requesting both (CVE-2021-43538) * Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539) * Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541) * Mozilla: XMLHttpRequest error codes could have leaked the existence of an external protocol handler (CVE-2021-43542) * Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543) * Mozilla: JavaScript unexpectedly enabled for the composition area (CVE-2021-43528) * Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545) * Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.4.0-3.el7_9.x86_64.rpm6d5614c26c0384912aebe50dc573bc0865fb463afb90ed78e385c01d485f905eSLSA-2021:5192Important: Samba Security And Bug Fix UpdateSamba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) * samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Backport IDL changes to harden Kerberos communication (BZ#2021428) importantScientific Linux 7ctdb-4.10.16-17.el7_9.x86_64.rpmca4344699b290998b563050811d67e398006832a01d730ad20eb66ca9aedccc6ctdb-tests-4.10.16-17.el7_9.x86_64.rpm8c8da384268bf5fccba4ff8f4c52f415a39ff3b3e604d09c753e64e63ed19f0bSLSA-2021:5192-1SambaSecurity Fix(es): * samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) * samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Backport IDL changes to harden Kerberos communicationimportantScientific LinuxScientific Linux 7samba-winbind-krb5-locator-4.10.16-17.el7_9.x86_64.rpmfccd7fac0b4e430d2265335820d03a03444d1e394c6c12895b62940562f6325esamba-krb5-printing-4.10.16-17.el7_9.x86_64.rpm76c22fc6f283b0abb8ce92e3a40f5caf50817a1dfcf37895835e1b5ed36900e2libwbclient-devel-4.10.16-17.el7_9.x86_64.rpm77f6e67d80e62266c9f6edc5a7c0eb4ac0abc20201b3b0cee0944a0eb661cdfesamba-client-4.10.16-17.el7_9.x86_64.rpm83f58f79e439d0f5d99de769d791288e5777785799f835f872bf72a6341ce621samba-test-4.10.16-17.el7_9.x86_64.rpm58ebd96e52fbc22359938a509237c70a35cd6cedcca2010c4dd62f96fa8acca9samba-client-libs-4.10.16-17.el7_9.i686.rpm91ef15b825a8a5d761cfc6a0ddbf3e48758b34e51feaf904413244d9d7708562libwbclient-4.10.16-17.el7_9.i686.rpm40d1c0855c8259f9bbfd4f2f45b239b79c8d5101f2df884d86853c1abbf6af4bsamba-4.10.16-17.el7_9.x86_64.rpmd3727b6c48f0a4f9d908e8b6e3427846e6a80c5377ef0e40301e5a9e7df0b642samba-vfs-glusterfs-4.10.16-17.el7_9.x86_64.rpme9f03c3e2696c8256a55a620360f0cd4c4a8b1e70b6b7d4e664648685f58c246samba-devel-4.10.16-17.el7_9.i686.rpma56816dfaf5e2c393a7679576aeb6cc71251b81d1270e49c1f0f695c5cbe8e3bsamba-dc-libs-4.10.16-17.el7_9.x86_64.rpm8b8242d3d2b9651ca69ed606b593554940a9da7af796f5e5866f0fda5b911185samba-python-4.10.16-17.el7_9.i686.rpm1c50d68275ae3e786b12ed0941a5c865dbcae209edfc6da0b1c4062fae0671aasamba-dc-4.10.16-17.el7_9.x86_64.rpm7a05cc305cfdb6a7a873e3293a8e8ecc20f0ce56143be6a169128e274fe98076samba-common-libs-4.10.16-17.el7_9.i686.rpm40bde39bd1fa9e632258146bb71fa6fa62cb8bc173df3bbfc4fb3814230c232flibsmbclient-devel-4.10.16-17.el7_9.x86_64.rpmf2900e10160efa1fa6da0fd4cbb2306141c66e646a071c4429432aae2b178992libsmbclient-4.10.16-17.el7_9.x86_64.rpmd82ae98bd60973a99849a035947c743e3b1bdf17777141b2c91e4015b00d9444samba-common-libs-4.10.16-17.el7_9.x86_64.rpm91f4fae3ae01f88dd4c5667b02cbe12fc81ce1878891b1f39708aa228f3ca2a9samba-client-libs-4.10.16-17.el7_9.x86_64.rpm59b11d7dca5070f0ab7f07fe1e2d366d35e089ef6fde9e652920bce0784b6a14samba-python-4.10.16-17.el7_9.x86_64.rpm226f20e710f0dba58f76df93ede8175a3f7218e2a450678dcce302aa7a77568bsamba-test-libs-4.10.16-17.el7_9.x86_64.rpm8b9125573a1c10f278cafe10823e8638d0d6d3fa8721edff72ee250d1745ce7flibwbclient-4.10.16-17.el7_9.x86_64.rpm11aa4dd9f1070cdccbef45593aa5eb8d11820e0a343f0365224725c2ee6c6052samba-pidl-4.10.16-17.el7_9.noarch.rpm006b198f8d806c3728f5028d288a95f9a4929068b54635abc2aa1bb22bd2098csamba-libs-4.10.16-17.el7_9.i686.rpm20421f25bfb9f83da767bc8bad49e16734ccea5cb08d6be240ecc216c1c13151samba-test-libs-4.10.16-17.el7_9.i686.rpmd2cea758a40b3c562a7e1701a61791a582d91409b79cdc5bec48a26f4ab4ddbasamba-libs-4.10.16-17.el7_9.x86_64.rpm3cdbb5d29cf8a9de05a3ea1e3ed041f63ace5c469c6214e1a816a6962d9a5f16samba-python-test-4.10.16-17.el7_9.x86_64.rpm885931f0c44184190ab523e79e44757c7e4994ab059d8d66906a695fecc68691libwbclient-devel-4.10.16-17.el7_9.i686.rpma993a893e2c3b713749c49f8fd13e03fe56eb514b45e6b84a7d608baf8248361samba-common-tools-4.10.16-17.el7_9.x86_64.rpm37508a8a808cd8d930f62f8983ee6ee2e8543745cae73cf163d31fd448aa7906samba-common-4.10.16-17.el7_9.noarch.rpm0a5637aac7e2ebbbb6d8f624450c071ab61caa086eecec041becd1520c4cacdesamba-winbind-4.10.16-17.el7_9.x86_64.rpm9a52b6824a9124e6c234bf305315ff6530e5057c88159a3306840461f7c19985samba-winbind-clients-4.10.16-17.el7_9.x86_64.rpm71b55f6e1c2158774b901d97db832afc225ba2882d88b13945557ae7a2e820dasamba-winbind-modules-4.10.16-17.el7_9.i686.rpm0a4d62969165153d51f06cbf88222fa0a88533589740e2e7b6da6a7395b1be82samba-devel-4.10.16-17.el7_9.x86_64.rpm7451c9daf89660e83e84d2e64c25253c6c1eaa71907a8b9a084dfac0f83d1224samba-winbind-modules-4.10.16-17.el7_9.x86_64.rpmdd3a2f088f535f905a65bea23360486fe6e6a11d2749465eeebbd0ccdc1bfc14libsmbclient-4.10.16-17.el7_9.i686.rpmaea5935636f86272694d14548ee666e2d1eba32ca6bf57b762132eff600405eclibsmbclient-devel-4.10.16-17.el7_9.i686.rpmd2c8370a21a41827d547e2fb4461cc544a60eb49e696fb1f72367057fe00be37SLSA-2021:5195Moderate: Ipa Security And Bug Fix UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RHEL 8.6 IPA Replica Failed to configure PKINIT setup against a RHEL 7.9 IPA server (BZ#2025848) moderateScientific Linux 7ipa-client-common-4.6.8-5.sl7_9.10.noarch.rpmba3e65b75de0615b30f31251addbebf9a381c5752ce35c0c8a85890b19805a65ipa-server-dns-4.6.8-5.sl7_9.10.noarch.rpm8a1a1d7f5a6a84ea98aedaa19e07359a51a29a38e53fcb4cf267c116c5935f31ipa-server-common-4.6.8-5.sl7_9.10.noarch.rpmb9172dd5d1dca7fe8e6849ebb3f238b45232c929509e28d9c9e7249fe8a7e1cbipa-client-4.6.8-5.sl7_9.10.x86_64.rpm4416f3ec1635682299d01ba62964a7f2eee00c3e1a9e659b724a44935cc91f2apython2-ipalib-4.6.8-5.sl7_9.10.noarch.rpmdfa9f7b90e8b4377d664998d7a0a31f0703626732069b265b202764c8ca2af1fipa-common-4.6.8-5.sl7_9.10.noarch.rpm0fb158bf0f87a788649c85f3f6ee3c6e56d6139d057da35d182da389253ac3e2ipa-server-4.6.8-5.sl7_9.10.x86_64.rpme96afb955b6d688374ff418cd38f41fc4308c48b8b3fa2bd2ec2e00e78be45eapython2-ipaserver-4.6.8-5.sl7_9.10.noarch.rpmb0562c5297aa37456cdcec9b40950cfadd9daac380e45107705d9b9faa4ac73aipa-python-compat-4.6.8-5.sl7_9.10.noarch.rpmd3e8bcdc368785fe79dc0c38fcd468781d6518e60ce4d76b62b2e335f834feb2python2-ipaclient-4.6.8-5.sl7_9.10.noarch.rpmdcd33ccebd465c4e937987026c0aac5c208598b470112e953f5a7741b41e54f6ipa-server-trust-ad-4.6.8-5.sl7_9.10.x86_64.rpma253d56aeba91f49e9be09abdc6d8f19f1798d24adeb6e1d78400025bd5d965cSLSA-2021:5206-1Log4JSecurity Fix(es): * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7log4j-javadoc-1.2.17-17.el7_4.noarch.rpm7f8dcfcca0c95f2356405ffbe58f163d9ae1e29fe844c9c35cf72582717a9086log4j-1.2.17-17.el7_4.noarch.rpm51f4e6b324089f9d26b9d4c167770f5ae0f9302e00e36a9a1b7db5c7431ca091log4j-manual-1.2.17-17.el7_4.noarch.rpm4ce766ab47665d246a4f108b603d6d797967629d900cf570617727d883ddd1a2SLSA-2022:0003-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: SProcRenderCompositeGlyphs out-of-bounds access (CVE-2021-4008) * xorg-x11-server: SProcXFixesCreatePointerBarrier out-of-bounds access (CVE-2021-4009) * xorg-x11-server: SProcScreenSaverSuspend out-of-bounds access (CVE-2021-4010) * xorg-x11-server: SwapCreateRegister out-of-bounds access (CVE-2021-4011) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-devel-1.20.4-17.el7_9.x86_64.rpm98268e97294e5e61cd5ae9724a60f2d86fdb78bfad8b96a6d4cebe683dc5f506xorg-x11-server-Xwayland-1.20.4-17.el7_9.x86_64.rpmfbd34b80cced270b813bbef467a2d12255003967620e2c28bf4de0741c79225bxorg-x11-server-common-1.20.4-17.el7_9.x86_64.rpm2e1018a8d0bd51dff6d83ef948418f762c203d239f0020269fee7500538ab40dxorg-x11-server-source-1.20.4-17.el7_9.noarch.rpm7f5af24d0f6249d57137eb7f5f380a7f13c8aa5cfd9a914b8c5eff9df5c764d7xorg-x11-server-Xvfb-1.20.4-17.el7_9.x86_64.rpmfce562c16c7cdf9d0f147b567379b38071b0d934b574fa1d04007d19ddccc0b4xorg-x11-server-Xdmx-1.20.4-17.el7_9.x86_64.rpmefd6b680b414d75f5dee35c343ddf2e3ee2b0587adf5694202a130037cee4454xorg-x11-server-devel-1.20.4-17.el7_9.i686.rpmd100a533e292e9d1465d3b4238aaadd6e2075b81b3500f467bb26ae697b23fe5xorg-x11-server-Xorg-1.20.4-17.el7_9.x86_64.rpmb5e7aa52ca58da7977f27f333a17e9eacfc6fb54dd54d3390556009264f92652xorg-x11-server-Xephyr-1.20.4-17.el7_9.x86_64.rpm983e196d913b2396c61c6ac75d70687482dd096698a372f2f6ece8cd8f1cbeecxorg-x11-server-Xnest-1.20.4-17.el7_9.x86_64.rpmb01cce56ff3e9feb30957a95d43de3e6e97a9a2181e69dbf4048888095225636SLSA-2022:0059-1Webkitgtk4Security Fix(es): * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7webkitgtk4-devel-2.28.2-3.el7.i686.rpm2534a83763bd174b50e81a306838d5b1006a9b89f35e76680ee67f4df97cac7cwebkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm218df31a4ff2a0a7c341dc484c2c348e8a2205db49147ccd5448a78cb5e6d78dwebkitgtk4-jsc-2.28.2-3.el7.i686.rpmef77d62e815cf45cec69e28567cd8079f03beeb766ce1c1d846dafb56a016f2dwebkitgtk4-doc-2.28.2-3.el7.noarch.rpm953e6f26fc29f36acfa9015d8c95a5e41f4cac5622b8b90ce20ddbdfd957da6fwebkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpmca992fdc96462b479e549876ac8e275a99e37a6add39225543c90ba2d0e27493webkitgtk4-2.28.2-3.el7.i686.rpmeda71bba7578ebc4415bbfd8c43813920c6be2f8bba1fbc14c0d39a8b5c3222bwebkitgtk4-2.28.2-3.el7.x86_64.rpm643bdebe39d488dd7e5e47699ed2d8ae3227bd5f7d2a182385b9c73152180c5ewebkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm0e22c4a0c88f6a07e46cbb0c1b090888a8ceb611667f8cdba8d5f6303987644dwebkitgtk4-devel-2.28.2-3.el7.x86_64.rpm6c3714b086b57365575f5ab43c8aa2a05af23e0346f9ec215cb71c79098d07b5SLSA-2022:0063-1KernelSecurity Fix(es): * kernel: perf_event_parse_addr_filter memory (CVE-2020-25704) * kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322) * kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * A gfs2 withdrawal occurs function = gfs2_setbit, file = fs/gfs2/rgrp.c, line = 109 * i40e SR-IOV TX driver issue detected on VF 7 - VF connectivity loose after VF down/up duplicate ACK not sent when expected * [kernel-debug] BUG: bad unlock balance detected! when running LTP read_all * Rudimentary support for AMD Milan - Call init_amd_zn() om Family 19h processors * A VM with <=8 CPUs handles all the Mellanox NIC interrupts on CPU0 only, causing low performance * fix _PSD override quirk for AMD family 19h+ * generic_file_aio_read returns 0 when interrupted early with a fatal signalimportantScientific LinuxScientific Linux 7kernel-tools-libs-devel-3.10.0-1160.53.1.el7.x86_64.rpme1b4eb8495df8c8e404e29027bf75bfcf446e9c72f4cdce9e885ad4c0f84c74ckernel-tools-libs-3.10.0-1160.53.1.el7.x86_64.rpmfc7930b80c5c957b3c11ca0a8fdc8253b5c592005218c195013b5af27ad52fe0kernel-3.10.0-1160.53.1.el7.x86_64.rpm50fa58d82abc229771879df7ea1c31833d20c8e5648aaca94f796d4454ce47d9kernel-devel-3.10.0-1160.53.1.el7.x86_64.rpmefe2465efe72478457ad7248132950834a973a31d7e32dd72bd6bb7a5af678d1kernel-debug-3.10.0-1160.53.1.el7.x86_64.rpmb7cbee4f83236379820e3ad7c8c99517ac58062735b6b92fee460df377354e5aperf-3.10.0-1160.53.1.el7.x86_64.rpm3bf6fe2ebcdec2cd7c6947ca654995807dbd5079be69a53f4dd4e83bbde2ce4akernel-headers-3.10.0-1160.53.1.el7.x86_64.rpmdd7cdc23048dcb8f3deb188047954c6e8a860ec543c1141af80401bcbb544cb9kernel-abi-whitelists-3.10.0-1160.53.1.el7.noarch.rpma4e8fae7b13733df408e4e6b47ed996d16189f5d7fcad211b6cdbc1b3f21dfd0kernel-tools-3.10.0-1160.53.1.el7.x86_64.rpm72148e3dc5d1b8f06e71978c4d49a61a9afb83ba56f2b1c4528c0fb9d07714capython-perf-3.10.0-1160.53.1.el7.x86_64.rpm5a97314cb3e63a379d542f48205763959151da815d6b1663057b2eda47725517kernel-doc-3.10.0-1160.53.1.el7.noarch.rpm530aea97981d5feda154cd41631c4a1220b291e183601d7ab2456dae5d5dc721kernel-debug-devel-3.10.0-1160.53.1.el7.x86_64.rpmd1e6c49f3b347b404269e242437ec0ca7f365b201170769917b0b0cc96a0e02abpftool-3.10.0-1160.53.1.el7.x86_64.rpm643ad950e55e74f544c41b24cd7c4a2e1baf65a5802de9e20573f45b31bb27d8SLSA-2022:0064-1OpensslSecurity Fix(es): * openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7openssl-1.0.2k-23.el7_9.x86_64.rpm4b7e5233f1ef54c5a49a2e7ef776b6555b7cbb9d2b310f9697923d9b7c7f25fbopenssl-perl-1.0.2k-23.el7_9.x86_64.rpme6618c1e128f8765d85a14ea2e693bc8fc06c837542ed5c30d7df96c37104bb7openssl-devel-1.0.2k-23.el7_9.x86_64.rpmf3f92393d8ac5d161e7460d7e50d01802e498cfe55855bcc1a7f58bab0580a3aopenssl-devel-1.0.2k-23.el7_9.i686.rpm93769ab70815d8a8cdc9f8edf4f90ad61eb40cee4bd092b8c89a511d0de01274openssl-libs-1.0.2k-23.el7_9.i686.rpmfb34c957a261788fe6457be8bf0ce1f77c970e8132ab509e1dda887884c7b0d9openssl-libs-1.0.2k-23.el7_9.x86_64.rpmc39581eaf6d8a28a5b3af447d4a0a83cdf236803fecf60172074131740c9412copenssl-static-1.0.2k-23.el7_9.x86_64.rpmf40c92173b08ccc3db38d78bbeb03120d0b043bbb4deaa2d423b9e981c0490d0openssl-static-1.0.2k-23.el7_9.i686.rpm5f5d16a031e480a292463d7c1aa64a083d69f8ba617332518b5480af9e558384SLSA-2022:0124-1FirefoxThis update upgrades Firefox to version 91.5.0 ESR. Security Fix(es): * Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) * Mozilla: Race condition when playing audio files (CVE-2022-22737) * Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) * Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) * Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) * Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) * Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) * Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) * Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) * Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747importantScientific LinuxScientific Linux 7firefox-91.5.0-1.el7_9.x86_64.rpmb24cd7262ae038465b552c404eea1adce86219ff96ba1b00bfde6c71fb4d708ffirefox-91.5.0-1.el7_9.i686.rpm52541ab3a9f02cf7b7362cb6b02574c833e661eeb9c14539f3811c03c8b83738SLSA-2022:0127-1ThunderbirdThis update upgrades Thunderbird to version 91.5.0. Security Fix(es): * Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) * Mozilla: Race condition when playing audio files (CVE-2022-22737) * Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) * Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) * Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) * Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) * Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) * Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) * Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) * Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747)importantScientific LinuxScientific Linux 7thunderbird-91.5.0-1.el7_9.x86_64.rpm3cb0a76f2c45fa9cd11c3b908892dfb10fd1f7030c243a18fe0b6e92849b3352SLSA-2022:0143Important: Httpd Security UpdateThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7mod_session-2.4.6-97.sl7_9.4.x86_64.rpmf6d50a70e34d90f430a16387e36ce6c3c58fe33c52432ccfc433c32203ade455httpd-manual-2.4.6-97.sl7_9.4.noarch.rpm8a49f246b504b1bd850314a39faadadeaef3a6cfe23bb67c6774d71e3c5fb8e7mod_proxy_html-2.4.6-97.sl7_9.4.x86_64.rpmb0fd2d6d5a89ba32d563573c3bb8be4c58e28e13e3eed53052af8899509aa4ffhttpd-devel-2.4.6-97.sl7_9.4.x86_64.rpmbd85ba1c0745e459eef961ae53126bb0796a3235ca3dd6539f089add38513004httpd-tools-2.4.6-97.sl7_9.4.x86_64.rpm4c7abdd81e62ca20befa0591ebeff2685f0aa76633a726a99e56fc7bd005b062httpd-2.4.6-97.sl7_9.4.x86_64.rpmf2be60c4f22fff3a82e3b7d590f13ec8ccc695bdfbe7f949bd74d0bcf76ae197mod_ssl-2.4.6-97.sl7_9.4.x86_64.rpm19c13172d628ab4ee8f43bbe35b7bcfcc2f7eaa13ce09c7699f0652025fe5ba1mod_ldap-2.4.6-97.sl7_9.4.x86_64.rpmf2d94441192f13f6930c986ef6b676ff097f35f978363b34e63829aaba93855aSLSA-2022:0162-1GeglSecurity Fix(es): * gegl: shell expansion via a crafted pathname (CVE-2021-45463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7gegl-devel-0.2.0-19.el7_9.1.i686.rpm1026ad809317760b0d4aabbe6b6e860534b665a242954df648017d26425f395agegl-0.2.0-19.el7_9.1.i686.rpmb1f3ba7fcda7b41faeac20f54e467969a03dff3c82d44d92e0b84c0b659c1140gegl-0.2.0-19.el7_9.1.x86_64.rpmef02317437aeae99e92e18ccacfeaf9171450113cc41ba989318f5fcc0c41436gegl-devel-0.2.0-19.el7_9.1.x86_64.rpmb6ac02e80d0cc53efc5d041e39652cef7a249221c39f729b7b8cd0d63ff85226SLSA-2022:0204Moderate: Java-11-Openjdk Security UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) * OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) (CVE-2022-21277) * OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) * OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) * OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) (CVE-2022-21291) * OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) * OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) * OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) * OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) * OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) * OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) * OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360) * OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) * OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) (CVE-2022-21366) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7java-11-openjdk-devel-debug-11.0.14.0.9-1.el7_9.x86_64.rpm54e94a49f94c000311fd8d9e5b97e53301facf3f4124087671061204158dd262java-1.8.0-openjdk-devel-debug-1.8.0.322.b06-1.el7_9.i686.rpm22abc18d93f07f90e6b42ddbd5093a801bf7e3f3015e8cd27f3c4e26c0da2eb7java-11-openjdk-headless-debug-11.0.14.0.9-1.el7_9.x86_64.rpma2a1d79c7ddac04304f1eca9f9d18c82864f1870988c40e6528c4f9bf46d9b68java-11-openjdk-demo-debug-11.0.14.0.9-1.el7_9.i686.rpm3a4aea36b0f4e25a3ed5cf94e0f7386ab5f1d45e3823fec31de7e02212022fadjava-1.8.0-openjdk-headless-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm4f2b655d843d01abe1db3f8e10e173d042dcb42d4bcbafbf32069ccf6cc12dadjava-1.8.0-openjdk-accessibility-debug-1.8.0.322.b06-1.el7_9.i686.rpm250e0a7cad249a45617d83f6b5150b91cc908568fa58912282ccbf9e3614298djava-11-openjdk-javadoc-zip-debug-11.0.14.0.9-1.el7_9.x86_64.rpm7a2935078143afd2685722413322ae84fb00eeb85c730ffaf5d8132439a0cae2java-11-openjdk-headless-debug-11.0.14.0.9-1.el7_9.i686.rpm30a6882e26f722d5d52e51dfb475f44d6dd7c05e6ccc7be976994b6269a724d0java-11-openjdk-demo-debug-11.0.14.0.9-1.el7_9.x86_64.rpm6369689fb71d5d00ec0736c4462b02d19376b3085ba45a70f2186224f30002d8java-11-openjdk-src-debug-11.0.14.0.9-1.el7_9.i686.rpm5afd5e147596a1d9397956bf9721329089d28bc928fdd47a1459ae4b6a3b6b5ejava-11-openjdk-javadoc-debug-11.0.14.0.9-1.el7_9.x86_64.rpmf040b3fff3cadbf5bba46359793f047aceec610db6b246d2d1495b575976b0c4java-11-openjdk-javadoc-zip-debug-11.0.14.0.9-1.el7_9.i686.rpm96de0c2dc0c8db1c3b6d05d1d88021884e87016f30990a68b5081ae3a2dd34a2java-1.8.0-openjdk-headless-debug-1.8.0.322.b06-1.el7_9.i686.rpmf74f241d8001846ea41a74f6e4fe447e3c5040739edfa4bede9d73a4e2acc064java-11-openjdk-debug-11.0.14.0.9-1.el7_9.i686.rpm3fc46c2e0fbdb37e4e798254d1c5ed4d35d14efaea3c20a9401283ea9b068303java-11-openjdk-jmods-debug-11.0.14.0.9-1.el7_9.i686.rpm2fc773b81c442f071e6ed161ff9836373741bf1ac45102c9a2c006d9c48b6641java-1.8.0-openjdk-src-debug-1.8.0.322.b06-1.el7_9.x86_64.rpme9ea555722da53401eb1acedccb6cee5093ffe0d923a857b4de4d4be2c090feejava-1.8.0-openjdk-devel-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm428130bcc2525c6a036bbaf6da0788720b6e75aada9a50fcafe91585b4f28244java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.322.b06-1.el7_9.noarch.rpmfed1d5416135665f0d365e53c2821753658b58496601de12afe92b96e502b314java-1.8.0-openjdk-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm01d5ba12a84abfa92dc7a4bc18d4a833cc125ae5b52c5d8c3bf66e9347bb54f8java-1.8.0-openjdk-javadoc-debug-1.8.0.322.b06-1.el7_9.noarch.rpm91ded251200a705eb4c072c2044612331cd229e820328e0045319633269d704ajava-1.8.0-openjdk-debug-1.8.0.322.b06-1.el7_9.i686.rpmffead4c176d93aee9b77b4da35a516af4023a7ef83a1167d681970b9e1c1d1cejava-11-openjdk-jmods-debug-11.0.14.0.9-1.el7_9.x86_64.rpmf86af909cc2f526fe18fd6535390085ec139b66b88863946cacb8e6ad68dbde7java-1.8.0-openjdk-src-debug-1.8.0.322.b06-1.el7_9.i686.rpmd08459c9eb22b8e5f9be6a280c5df29f72ad16bf6f83f22897aaabbea136e05bjava-11-openjdk-debug-11.0.14.0.9-1.el7_9.x86_64.rpmf5e40ddaf84a7b9a91c9f819c7dd2af4ad5254788ef00c3e83dfba35eaeb80a7java-11-openjdk-src-debug-11.0.14.0.9-1.el7_9.x86_64.rpm4360d60400c097e9d840cd55ee4b32828b82afe859bd0acd2738aed6548b4839java-1.8.0-openjdk-demo-debug-1.8.0.322.b06-1.el7_9.i686.rpm44511b6ecb9daf9acc9d5e84a68d5ba9f06302ca652ae1f507c84e04a43edb75java-1.8.0-openjdk-demo-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm106283358485a57311aa90a8b37fad25d1dd72f71a528ff64872f51ce8d27d32java-1.8.0-openjdk-accessibility-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm419bd98f1f9c77fc6e63f6eff664dc3af238fcbf6916d4952c111e441f341af7java-11-openjdk-devel-debug-11.0.14.0.9-1.el7_9.i686.rpm4fa67312ed6440d3808caf8bd033c095c3126c02c12ca3c8126e958b256550abjava-11-openjdk-static-libs-debug-11.0.14.0.9-1.el7_9.x86_64.rpmfdbd1738c7a9a66b53d2744428dd69a7ff9129a8caa52042fa2ed080b1a7e705java-11-openjdk-javadoc-debug-11.0.14.0.9-1.el7_9.i686.rpmbe5ac853436da737779d848c36be1cdae8aa926fad8d6540b5b4b77f929652a2SLSA-2022:0204-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) * OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) (CVE-2022-21277) * OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) * OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) * OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) (CVE-2022-21291) * OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) * OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) * OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) * OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) * OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) * OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) * OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360) * OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) * OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) (CVE-2022-21366) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7java-11-openjdk-devel-11.0.14.0.9-1.el7_9.x86_64.rpmcc0889f63874783c1587cdb2920dae9c9b22b654208212411a6675c559ae85bdjava-11-openjdk-javadoc-11.0.14.0.9-1.el7_9.x86_64.rpm77bd8cd3cb7b00b03f86de7d2ba8c94733b0cd0058cc898d318c83c6f2b3067ejava-11-openjdk-javadoc-zip-11.0.14.0.9-1.el7_9.i686.rpm5144866cf38908fa899127f174a67b3913a2b873291b355067e0896da8eb4fe0java-11-openjdk-src-11.0.14.0.9-1.el7_9.i686.rpm50eb4249160603431d7aab5d83df8bb7408102070f1e7f6b7b87c9cae987644bjava-11-openjdk-src-11.0.14.0.9-1.el7_9.x86_64.rpmd6bf474547d1334de8d7640fc5126470cd0f84c08c92e2b005df87158e7dad39java-11-openjdk-jmods-11.0.14.0.9-1.el7_9.x86_64.rpm52c47aeb85a00884f332349ad60e14bcfd2967dbf35901b99caa91a9c8874941java-11-openjdk-javadoc-zip-11.0.14.0.9-1.el7_9.x86_64.rpmf2f7478230baa8b5a9dc38d0e718632d861b42d60326bccbcef0d80145ad246ejava-11-openjdk-11.0.14.0.9-1.el7_9.i686.rpmce7b0ad4461acf10115acbecf082ea2475952fd27c71530cf08d55d195153d3ejava-11-openjdk-demo-11.0.14.0.9-1.el7_9.x86_64.rpm8f0a47867262db56e7790a717dd1ada48ae630a58e63875fdbafcbd99ce10b74java-11-openjdk-static-libs-11.0.14.0.9-1.el7_9.x86_64.rpm75db03a8a5647d9c9327f479714bc74dfad20c0002ad9409ceab1e0c0ad09388java-11-openjdk-headless-11.0.14.0.9-1.el7_9.i686.rpmbbf237389b53489037deab07f4eb170225ef1b113b38f7d175f9f5345ff792d9java-11-openjdk-headless-11.0.14.0.9-1.el7_9.x86_64.rpmc69384d43f8be73c756b6b45ed9efdc142fc792d5988b8a7a7f2d81749e21768java-11-openjdk-demo-11.0.14.0.9-1.el7_9.i686.rpmd19bdc3ab44387fbce45f62c463221c9788c0c63d0f9eea7a2bdb7eae77ad7ccjava-11-openjdk-11.0.14.0.9-1.el7_9.x86_64.rpm9459fcb48519274800a15bc286399d160a55ac9e4a14504ddc677e6cdca22371java-11-openjdk-javadoc-11.0.14.0.9-1.el7_9.i686.rpm4100a9da94044e8a26c6fbbb8a155fcb3d346a0b999817f744a566e83af271ddjava-11-openjdk-jmods-11.0.14.0.9-1.el7_9.i686.rpm18e806660adc56368b07783d1dc706fc1574144c5a3c469baf58414b03134389java-11-openjdk-devel-11.0.14.0.9-1.el7_9.i686.rpmd93618065592c206d65b10e92606933f6436cc175d919bf380acd07614d589d3SLSA-2022:0274-1PolkitSecurity Fix(es): * polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7polkit-0.112-26.el7_9.1.i686.rpma51c58a015ba9d4a24cd2892eff98c88780bc2faf647d7a2de964503062c9a9apolkit-devel-0.112-26.el7_9.1.x86_64.rpm9f5b87876726dd6f3222308cf4d835c0ea59184d38f0a6b9d63e7c31230f0e95polkit-0.112-26.el7_9.1.x86_64.rpm68203be229c1f9cda0901c099d1c83d467c440273aeca0477beae5f4837bc9cepolkit-devel-0.112-26.el7_9.1.i686.rpm927f01258ae72316036787ef5c597fa6ab4b4d3b52f1d2a2247ccf1819f9dc84polkit-docs-0.112-26.el7_9.1.noarch.rpme60511f118ae805d5d7cb82c8a852b55454d27a21407581e71db6420d58adf90SLSA-2022:0306-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) * OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) * OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) * OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) * OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) * OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) * OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) * OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) * OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) * OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360) * OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.i686.rpm9fc1c228bfdd6cd91ee00a1b85521b0bd9a1703c25bf371a3e170520718b254ejava-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.x86_64.rpm04dc751224ddbbdfbf53fcc13646051e88de5a92cf81f9621ac4d26bd51adca4java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.x86_64.rpmd0d1db385d79c24b153a5e378d3557637b3262336aa5c670577218a9e1b07b79java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm3f9d342530e385ac09c2bccf9994f13b797fa7245a284d16e77cd44482175e00java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.x86_64.rpmcac72660b95e7de372e9c8863d0d577f6e66b21b019847201a6975aba535fc7cjava-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.i686.rpmb6f8d11f1467b3341d0c1790239571e32e512cc2f9f57033a77c00984940715fjava-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.x86_64.rpmc54c45e92dd9370bd5ec2cf4b94f9c4c2c5c8b23d4d460fc13e9312df9ec2f9djava-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpmd5fd399710a732268bba30410c30f68613bfdd0abdd174ddba84f2084c36ebb4java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.x86_64.rpmea1964a5ac6c3ce7d23c0379adf67af3b9a6b324186b6f5a77c03dc41ea7e955java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.i686.rpma138a9ff6d0a204d4954e21ce9bbfffe6cbc71cdfab9b7254ea8a1519ed38892java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.i686.rpmb0d2892f5361e65f6cf19ed8e55b374bca09237b7ffb47788dc94db5ed46d584java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.x86_64.rpm8930e7312515fb1b8ec206e11be265caf82649d498f28a7bd2664f7668cbfd79java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.i686.rpm1474e8e84cd3edee131374d943d7c5aaa650d46f2fbf2679902f1ee849009900java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.i686.rpmabf6d38551de0d1441ff30ed1e5770c5f9402423d2c42944e003942abd8748aaSLSA-2022:0328-1SambaSecurity Fix(es): * samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution (CVE-2021-44142) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Fix CVE-2020-25717 username map [script] advice * Fix Kerberos authentication on standalone server with MIT realmcriticalScientific LinuxScientific Linux 7samba-vfs-glusterfs-4.10.16-18.el7_9.x86_64.rpmdf8d1340cb4aa6914bb9ea7874070288a8d22c55f39d645ad86ba5a31c259e2bsamba-common-libs-4.10.16-18.el7_9.x86_64.rpmff89d32684ee759c454ef11b51ff31d4ab44179d46d5283cbf646999d16b2886libwbclient-devel-4.10.16-18.el7_9.x86_64.rpmbc9aa7dbffea68c98acbc88351a6327dc9ca500eb6a2479120737e1f96bd2ec2samba-client-libs-4.10.16-18.el7_9.i686.rpm663812b7dfd973fdeb6b74305cf08921d5e8335ed5017c3df59727ebd535ea1esamba-libs-4.10.16-18.el7_9.x86_64.rpme0097d987e2824450c7a11ac3fa532ab06135fd15f38220e2dfaf8f077f038ebctdb-4.10.16-18.el7_9.x86_64.rpmf2202e2e9b18f5f5f4811a7c13559b3ac8af727e7527cb65d40c3e56e4dc8c0dsamba-pidl-4.10.16-18.el7_9.noarch.rpmf8e815f2673098975c445e25da7c9888356919b0f110f82a04eb99f8e829b91asamba-winbind-clients-4.10.16-18.el7_9.x86_64.rpm5d7f29a95b57203ec49238bd369911af9b72ba82f75a0622ea6163b35f3314b5samba-client-libs-4.10.16-18.el7_9.x86_64.rpm73b297084b805368e9667009be2b75c17b73ad7f1f506494a49df3d35109a3besamba-test-4.10.16-18.el7_9.x86_64.rpmf7e01fd00edc4d62cd42ae41951abf4757e5ad7a1c1ed285a327907171b2ff11samba-winbind-4.10.16-18.el7_9.x86_64.rpmfab6ec8990130ff39e6b8f98593599f42697a5438d68800968033b83cc51e308samba-winbind-krb5-locator-4.10.16-18.el7_9.x86_64.rpma2bd52f053cd2c036687eebc3ea642bfc33aa5a38ab6f2cd55da9210d8d5516fsamba-common-tools-4.10.16-18.el7_9.x86_64.rpm3f52d9d7e060e7b709f26c6293aba4e0ef9d9bdadb5603dd61099716d381aaa9samba-4.10.16-18.el7_9.x86_64.rpmced360cb043b91623e67bee09549903842831c2eede707e98d8ae900796afb51samba-common-4.10.16-18.el7_9.noarch.rpm32f942ee5738af20289aabd52b423162b6bd093c6be041a7071238080853b8e4samba-krb5-printing-4.10.16-18.el7_9.x86_64.rpm01fc3a9e1c9a12f830b114d85d160f26074e02dd715a312951a1e2e5a57dc324ctdb-tests-4.10.16-18.el7_9.x86_64.rpmaa2e4e9aa51f6c1a5f3d4d911af3af5dce1f7d9e9baf676c7e5dd49b8790b0a7samba-winbind-modules-4.10.16-18.el7_9.i686.rpm875867d34e244fe641fff4e423d80b07242a8114b964f46d8557ff456311269dlibwbclient-devel-4.10.16-18.el7_9.i686.rpm68d0c23f13c12c8c6f6a7b10575d1bad11b066bcf4b365a1a0431c771418402csamba-test-libs-4.10.16-18.el7_9.x86_64.rpma9b7a9efd81714e4c1dc7138b23388da7c3b85057317bcb52cbea650c5720897libsmbclient-4.10.16-18.el7_9.i686.rpm52006ab895f07fa144f6caf9f0108d798dc7686e992b97dc18c0a110b2f2f489libsmbclient-devel-4.10.16-18.el7_9.x86_64.rpma6116873071d0e0e1a93f92da747594440df1661bab383785ab65bc054e78c8esamba-devel-4.10.16-18.el7_9.i686.rpmfc07d27a24cfb4bf3fa270fffe46819d19b7e4e847365548d7a6b7ec278da24asamba-devel-4.10.16-18.el7_9.x86_64.rpmca6c55ccd41e72fed93e81bbc6fdde14ea7e8346f8fc14c7801372dba2104e65samba-python-test-4.10.16-18.el7_9.x86_64.rpme6e02517c726e3d2c1b20b65f6d57c118d87f6af0d28492ede3bbbbef4c7ed40libsmbclient-devel-4.10.16-18.el7_9.i686.rpm8a522401f34868ed4780b40edfc1b2fa187e1edf154c390de8b9cba7be2074b1samba-winbind-modules-4.10.16-18.el7_9.x86_64.rpm0910ecae72d725b7e82afd842ef1fa185e4dc42011571109c4c238d91f97c8a5samba-python-4.10.16-18.el7_9.x86_64.rpm1110731afb343bcb0a24bb1093644864edd9c95fd2405668431271396b824fc3samba-dc-4.10.16-18.el7_9.x86_64.rpme1085bfc77c7780cde712c509a36e2fedc60a70f6c10f8a7b92c77b2baf3211csamba-libs-4.10.16-18.el7_9.i686.rpm822f845e292c216299de5833eeee71b674544aa92d36be06aa9a0f5c7d5abe4dsamba-common-libs-4.10.16-18.el7_9.i686.rpm358abe0a4f3d1cccee4cbfdba14e4b8e9f9b249b3be50719522a14fb86e950d0samba-dc-libs-4.10.16-18.el7_9.x86_64.rpm4e068894c52502219475e5eedff3ebafcb87de6e24b7d19b5f2a442fd8f0210elibsmbclient-4.10.16-18.el7_9.x86_64.rpmade34f32e8b4638566cad1850941da3d52909303b61d17d40757a1f1b2d6e5c4libwbclient-4.10.16-18.el7_9.i686.rpmb18a8ec1660612b3ad53037f8ac744ee63d2b8a9ad2c26af2d6ed8e1b0c56b77samba-python-4.10.16-18.el7_9.i686.rpmd15237e0febd8fb7c185f336f4e8c1b4b5bf46db636e83fa5289b928c9ed0fb8samba-test-libs-4.10.16-18.el7_9.i686.rpm2e289467abbb34185c8560a26d2cf8e48172772b3ebfd21da6cb9bbe7db22633samba-client-4.10.16-18.el7_9.x86_64.rpm4ae012ffc048270196283c083ddc37e49cb6867ac416c766017cbb2518edc18elibwbclient-4.10.16-18.el7_9.x86_64.rpm93c751bd215072f74bea32450991e179972a893d22670d3aa7734a20f8e284a4SLSA-2022:0442-1Log4JLog4j is a tool to help the programmer output log statements to a variety of output targets. Security Fix(es): * log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) * log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) * log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE importantScientific LinuxScientific Linux 7log4j-1.2.17-18.el7_4.noarch.rpm9a9f3a9c0c0b3c903b3eaba362782c65a7fe0960c03569ceb943974feb8dc6a0log4j-javadoc-1.2.17-18.el7_4.noarch.rpmb7bce1f231766d0932ad8e7a33358ec1e403446a4c9397b9c9420d4ca87605e6log4j-manual-1.2.17-18.el7_4.noarch.rpm461d220a1b053f5423d08f9200f10c970665b4c01c355772b0494ab003236f85SLSA-2022:0473-1AideSecurity Fix(es): * aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7aide-0.15.1-13.el7_9.1.x86_64.rpm363dd087939f8af0acae1ac7e23f6450d17e61db25f0b1ba7fc788c90b4c8c9cSLSA-2022:0514-1FirefoxThis update upgrades Firefox to version 91.6.0 ESR. Security Fix(es): * Mozilla: Extensions could have bypassed permission confirmation during update (CVE-2022-22754) * Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 (CVE-2022-22764) * Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable (CVE-2022-22756) * Mozilla: Sandboxed iframes could have executed script if the parent appended elements (CVE-2022-22759) * Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types (CVE-2022-22760) * Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages (CVE-2022-22761) * Mozilla: Script Execution during invalid object state (CVE-2022-22763) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.6.0-1.el7_9.i686.rpm006aa93e30bbb3f0008e6d0e66fd76bae445f9cceee651b211fc41064485b986firefox-91.6.0-1.el7_9.x86_64.rpm02ae80929123f01f3766ad291f6c2fe454e161bf31ecb8405a78b352d9d5e857SLSA-2022:0538-1ThunderbirdThis update upgrades Thunderbird to version 91.6.0. Security Fix(es): * Mozilla: Extensions could have bypassed permission confirmation during update (CVE-2022-22754) * Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 (CVE-2022-22764) * Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable (CVE-2022-22756) * Mozilla: Sandboxed iframes could have executed script if the parent appended elements (CVE-2022-22759) * Mozilla: Cross-Origin responses could be distinguished between script and non-script content-types (CVE-2022-22760) * Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages (CVE-2022-22761) * Mozilla: Script Execution during invalid object state (CVE-2022-22763) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.6.0-1.el7_9.x86_64.rpm4cb3af64b351c65ca34d5fdd03c25ef419d792314f77aa5e8f6f9fc14bd12537SLSA-2022:0609-1Python-PillowSecurity Fix(es): * python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) * python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7python-pillow-sane-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm761ee37e931defd45f9d59ca37e3faf94f054114e2a73c335d20318a23c484a9python-pillow-2.0.0-23.gitd1c6db8.el7_9.i686.rpmf24f8203b4277f2c132fa1c7259c7f537836f050dd5a5b7b5c1267fac1d3e9a1python-pillow-doc-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm2620c143a4a87bd90be2f59117c2af3fc51383790dca3e0887c226cdbda8a851python-pillow-tk-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm8bc1039d9b77f4fd8c40f8b4a8dc0c4d1959420b8fd45beeb7ed77855c53268apython-pillow-qt-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpmca4d0a62c0744041d7f27f56718b6d7b22a22aecfa795edc5a968ed7e508e41dpython-pillow-devel-2.0.0-23.gitd1c6db8.el7_9.i686.rpmd249271ef57c9faae7cffe852c28a837b96ae8f6d1b4e330c1b9792f869adf53python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpmc10b296e79d6f98eecd23df8d0ab59797f6aaac7bb30bdc005023e234b01ed65python-pillow-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm60975a21b14fe34186e2217332ed40acd52bcb74f73d679fd61f81041a9d70bdSLSA-2022:0620-1KernelSecurity Fix(es): * kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466) * kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920) * kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155) * kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330) * kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942) * kernel: out of bounds write in hid-multitouch.c may lead to escalation of privilege (CVE-2020-0465) * kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564) * kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573) * kernel: possible use-after-free in bluetooth module (CVE-2021-3752) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Kernel with enabled BERT does not decode CPU fatal events correctly * SL 7.9 - Call trace seen during controller random reset on IB config * Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when another CPU races and modifies the queue's blkg_list * NFS client kernel crash in NFS4 backchannel transmit path - ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task * SELinux is preventing / from mount access on the filesystem /procimportantScientific LinuxScientific Linux 7bpftool-3.10.0-1160.59.1.el7.x86_64.rpm4ddf7ebc316baa4753d705cc370c3345d8e2e3cea217dc81cf612a8ba3f92af2kernel-doc-3.10.0-1160.59.1.el7.noarch.rpm946c0d5fcb9b4946fd34699fb2ef587e861ec95bc4468acce0c7422eb10425d5kernel-tools-3.10.0-1160.59.1.el7.x86_64.rpme747d7f2f10bff1b2ca5b681279af5885c2bb1d05885c2e98b9b6ccace3d3a03kernel-headers-3.10.0-1160.59.1.el7.x86_64.rpma22a4b3e94f5b811f45bf3495d738f76e4496f5ce9330f9720e19cab12fa77c0kernel-devel-3.10.0-1160.59.1.el7.x86_64.rpm6e1694a9954433eabc31e5ce15ffbb9c21ff17193421ae9bb3cb180ed1b88e34python-perf-3.10.0-1160.59.1.el7.x86_64.rpm82a02931a29454361303ab1ba2c02f228f0f17bf17b57b56343a8f6cab755296kernel-tools-libs-devel-3.10.0-1160.59.1.el7.x86_64.rpm463f7dda5c55c053351b111748e0bcfee9f51c9ea91ad6a93d3e43ce32563911kernel-abi-whitelists-3.10.0-1160.59.1.el7.noarch.rpm13ffd6cfe031fa7b7ce1e900387a4a4ba21b9c079f01e6c7727b8a1154fd2504kernel-3.10.0-1160.59.1.el7.x86_64.rpm60245e7c95ddaa01b92e933a97e4a19b14691634789b4da69df74ef7f7ca3e03kernel-debug-devel-3.10.0-1160.59.1.el7.x86_64.rpm82baafb6336e0df2607de6c8cae06e5f156a0468672396aae71a1d3c2e320016kernel-debug-3.10.0-1160.59.1.el7.x86_64.rpmf3d5d25fdcfeeeb70b7f01ee947bf0905277a88b74fc90cd2218a08f9879f0cdperf-3.10.0-1160.59.1.el7.x86_64.rpm05f73fd3364bb8792508c37d2a3c449f175e11e27884d797aacfcdba9495655bkernel-tools-libs-3.10.0-1160.59.1.el7.x86_64.rpm32309a82faf074334032b78dc644203d3d8cca45cb372d5b3b780391248a4504SLSA-2022:0621-1OpenldapSecurity Fix(es): * openldap: assertion failure in Certificate List syntax validation (CVE-2020-25709) * openldap: assertion failure in CSN normalization with invalid input (CVE-2020-25710) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7openldap-clients-2.4.44-25.el7_9.x86_64.rpm05df5e99db0edc47544d7e762ad1ccc43a9e553280b133221c5bd62d14fe880dopenldap-2.4.44-25.el7_9.x86_64.rpme9a2d83f26076ad4562fa60d1ae142d084bfdb8aa51f48827d6934385a26f72bopenldap-devel-2.4.44-25.el7_9.x86_64.rpm97dd2cd507f6de48745ebc747fc1f4ef66077ec5b94c4052d0653c3ecfda9cbaopenldap-2.4.44-25.el7_9.i686.rpmc09a5ae95c62121ac6673698e840713a44a367e395133e28ab063689d6ab80cdopenldap-servers-2.4.44-25.el7_9.x86_64.rpm80759d70873b2db68b01b5378b4959847eed52f08191d3ac7adc649b860fdac0openldap-devel-2.4.44-25.el7_9.i686.rpme7b7ce9bd1c91af747a625b85f9d9a3b92ad3db0145c679b6fa2094563a0edacopenldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm0177d423dfdf9c911c709ed276d8a2fac763c9e586977f47df64187a75f64803SLSA-2022:0628-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: double-free of the virtual attribute context in persistent search (CVE-2021-4091) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * CSN generator can adjust wrongly the local and remote offsets used to generate a CSNlowScientific LinuxScientific Linux 7389-ds-base-snmp-1.3.10.2-15.el7_9.x86_64.rpmce77ae886569507d3d8a636881b4e0227124bb4ac73d40eac1f2a1966385e86f389-ds-base-libs-1.3.10.2-15.el7_9.x86_64.rpmba9bb484a4c7dc68b007a7f520720b47331b793f36702702197405dbd144ca71389-ds-base-devel-1.3.10.2-15.el7_9.x86_64.rpm9dfdde8db3f0283a5d345af8176577a6fec3f27a965a496675311bf7424936de389-ds-base-1.3.10.2-15.el7_9.x86_64.rpm8101f7625070f12f155e4c6d7f4cd2807d5b8e32274999474c2c41b1c5ef2eafSLSA-2022:0666-1Cyrus-SaslSecurity Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7cyrus-sasl-sql-2.1.26-24.el7_9.x86_64.rpm4a40ab6db225cb6ad07f8544edd60c2aee43d0d380300527cd9e9721b1aa5655cyrus-sasl-gs2-2.1.26-24.el7_9.i686.rpmb54b9528ae53f5495721c5f2c8adbebe1f1d1757fa21cb0997471353766c3b31cyrus-sasl-2.1.26-24.el7_9.i686.rpm967339b9fcb7b6167797be3b72d0d4ac420e9b86fe1cac909ad8c90007e11fefcyrus-sasl-scram-2.1.26-24.el7_9.i686.rpm44780aad3b57cae08e6c6f2589d1dadd74ae23126c71398eb4e7c0dcf4661b1fcyrus-sasl-md5-2.1.26-24.el7_9.i686.rpm54625b5af7df520aa30ec4be91f88aa4f021b99b420d85da3b0616076dd98ec3cyrus-sasl-sql-2.1.26-24.el7_9.i686.rpm8904a5ee533579ee4ca9881e15f251c6de2eb088fcbace9481a4ad7adb46377dcyrus-sasl-ldap-2.1.26-24.el7_9.i686.rpmeea9f5dcf16322f440e908b8ff15b291d0d39e817c42673dae424714e236531dcyrus-sasl-gssapi-2.1.26-24.el7_9.x86_64.rpma83b5a1977b9c7b3538b2d3b624a9bdff4f7c505dcf42a0c31fb95aefd07aca0cyrus-sasl-ntlm-2.1.26-24.el7_9.i686.rpmccc7f7145072c2a6b4b86fc3df68c3763801dfcc27186be6ab680e26920dbc0bcyrus-sasl-plain-2.1.26-24.el7_9.i686.rpm6b94a459b9b883c37968d0f20fb8600ba428e4ccfdf66d797b0a56a3b4083963cyrus-sasl-scram-2.1.26-24.el7_9.x86_64.rpma1ddbd0a6fd6f2e074c3df9a2c124bda9d81b9d7d605b0dd8805c215c9ae78dbcyrus-sasl-2.1.26-24.el7_9.x86_64.rpmc0788227ddc4b5349fd59d2c921669ff2943c5a5b26986440b5d1f61b4c8ad16cyrus-sasl-plain-2.1.26-24.el7_9.x86_64.rpmc4ab1f09bb0e4a614871d5c4266e4d18ae88d3df3d57c15772abe292c23d30aacyrus-sasl-lib-2.1.26-24.el7_9.x86_64.rpm2aba1129ef910065dc0a8e69295d1ad6bcd5b1f97ff2e3ac3f3be667594a3363cyrus-sasl-devel-2.1.26-24.el7_9.x86_64.rpm0230c24753ea28baaaab7ff9b4f2dd408029bf893ea6aefab59034f0d2c5cf3fcyrus-sasl-gs2-2.1.26-24.el7_9.x86_64.rpm31a2440a98e41391a5fbab60a833229fa2e70ecaae47167d83359eeaa8b9a48ecyrus-sasl-lib-2.1.26-24.el7_9.i686.rpm4853a8c3bdbd9490959789e6a00ef507002c7d2c16d8867c64dbc95fb0f7d430cyrus-sasl-devel-2.1.26-24.el7_9.i686.rpmb30208f1a17274345596864583a4697e3110646204022787474b3351697d666ccyrus-sasl-ntlm-2.1.26-24.el7_9.x86_64.rpm7d64db4096bcc01a8587a9d5aa2f22616c979dbeba0e1294b9345628a704ac5fcyrus-sasl-gssapi-2.1.26-24.el7_9.i686.rpm4bec982ea813540557f0a52138f8b3e09698020541719c8e783ad57eeacfcf3ecyrus-sasl-ldap-2.1.26-24.el7_9.x86_64.rpmfa614ba1acea9591194c1a17162400866c22b9f4a231e45166d352f0907915d6cyrus-sasl-md5-2.1.26-24.el7_9.x86_64.rpmc4202509cdb3a97da1c6aa221566733f33c1afc61e8c1067d5ad1f4c4bb6d742SLSA-2022:0824-1FirefoxThis update upgrades Firefox to version 91.7.0 ESR. Security Fix(es): * Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) * Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) * expat: Integer overflow in storeRawNames() (CVE-2022-25315) * Mozilla: Use-after-free in text reflows (CVE-2022-26381) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) * Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) * Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) * Mozilla: Temporary files downloaded to /tmp and accessible by other local users (CVE-2022-26386) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Firefox 91.3.0-1 Language packs installed at /usr/lib64/firefox/langpacks cannot be used any morecriticalScientific LinuxScientific Linux 7firefox-91.7.0-3.el7_9.i686.rpm17a6c0c6940f2d8c32861a0fc4523fd49af44c0790833f5ecef02ac63dd6a45dfirefox-91.7.0-3.el7_9.x86_64.rpm96d651cc95589c55f2343d3ecd7a126c34b8e500a6666c5633ca1071f58c1547SLSA-2022:0850-1ThunderbirdThis update upgrades Thunderbird to version 91.7.0. Security Fix(es): * Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) * Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) * expat: Integer overflow in storeRawNames() (CVE-2022-25315) * Mozilla: Use-after-free in text reflows (CVE-2022-26381) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) * Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) * Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) * thunderbird: Crafted email could trigger an out-of-bounds write (CVE-2022-0566) * Mozilla: Temporary files downloaded to /tmp and accessible by other local users (CVE-2022-26386) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.7.0-2.el7_9.x86_64.rpm86ae44e13f4bd6644c5f83d8e7149c802629dad4f6a1110dbb096a7fdcd2a9e9SLSA-2022:1045Important: Httpd Security UpdateThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7mod_proxy_html-2.4.6-97.sl7_9.5.x86_64.rpm61b42447228c8c4f96ca083fa8874f87393f20064bc6cd7702d5f287107eefc9httpd-devel-2.4.6-97.sl7_9.5.x86_64.rpm60c899c7fb2088fb25771d3a18c096b7e85fa343a21f99fde105751d5a78d593httpd-manual-2.4.6-97.sl7_9.5.noarch.rpm53b457c68db12d30eacfe372d40554be842ac10db5568f6576574b28cb6b17d0httpd-tools-2.4.6-97.sl7_9.5.x86_64.rpmb7000fea8dd4c7ddfbcbf98b95ae7e20330fac2554404d59f1dae79ca3d7010chttpd-2.4.6-97.sl7_9.5.x86_64.rpm0be74a09f7461ff46cf66401b9db4e4f429b1d4c55952455a8a7a012b728b7c5mod_ssl-2.4.6-97.sl7_9.5.x86_64.rpmd03ed63db929825bd4f0f81df35f02c5cc4ad1a05c7693b42b125a8062a69e08mod_ldap-2.4.6-97.sl7_9.5.x86_64.rpmb01bda47f0ad5df1efa995409759bdaddba56709ca2790177a1a6aa5758086e2mod_session-2.4.6-97.sl7_9.5.x86_64.rpm6f9b6c8d39161243b4d782e6b55549de922d0e2d4a56d057373bb28a5577206cSLSA-2022:1066-1OpensslSecurity Fix(es): * openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7openssl-devel-1.0.2k-25.el7_9.x86_64.rpm0cd7ba148b371e943111ce6eaafbd00eb24c265bbea3545e4cd8f77a4ae0f51aopenssl-devel-1.0.2k-25.el7_9.i686.rpmfb9d5a2a4777a3570d2826570ce98f67c3e75b01d06a859c7d6521ee75d229f8openssl-perl-1.0.2k-25.el7_9.x86_64.rpm7a90aa94a06406b97cb00a55e2ecfbafb31d9967e76907ec7ad4f954a7f573cbopenssl-libs-1.0.2k-25.el7_9.i686.rpme9318045f52dc83193ff047b76fee6f3d06ee2092cd7d6752fdb1a7577be3f42openssl-1.0.2k-25.el7_9.x86_64.rpmda8f28a2c9b1940ce0ee2c745cda3f2774bcf3a426350a26903f29b40b9b2fc9openssl-static-1.0.2k-25.el7_9.x86_64.rpm9f0061c22cec08a203b08ecc08351efa083a2a438c995b153ae072748bad5263openssl-static-1.0.2k-25.el7_9.i686.rpm2c9af1aa25ed8e8d12035e176bd3bb1648e3ae05903620f768fd41c83a3cbc27openssl-libs-1.0.2k-25.el7_9.x86_64.rpme58ebf01a83537b5b6979be59b9bad2552b07874b4ad317037287dbc9e127fd4SLSA-2022:1069-1ExpatSecurity Fix(es): * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) * expat: Integer overflow in storeRawNames() (CVE-2022-25315) * expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960) * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) * expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7expat-2.1.0-14.el7_9.i686.rpmdb2260a5a84c3b7184b5bc609698720947e449b84b89688dabf5254d2cccfd5bexpat-2.1.0-14.el7_9.x86_64.rpm5257fbac66b901d8eb514bbc0d61e19302e6e789bf5666bed2840c6fdad50babexpat-devel-2.1.0-14.el7_9.i686.rpm91bc2f24c563682181148502aeee7002e20d1745a3fda375947d0b68298e6f9cexpat-devel-2.1.0-14.el7_9.x86_64.rpm7a36b0bcb1c2ea46cf6c80ffe6d0f37a8767d514bfa2c8fdd27828766f1db9d5expat-static-2.1.0-14.el7_9.i686.rpmd92b1587b263f4e350840712870cce1abf384381120b621f913f6d5dbb426c56expat-static-2.1.0-14.el7_9.x86_64.rpm09fb4769dc9a2d5d253ffddaab86e4eccc87bb0b9fc7a551f5e0a68ea04526c6SLSA-2022:1198-1KernelSecurity Fix(es): * kernel: use-after-free in RDMA listen() (CVE-2021-4028) * kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Adding new kernel entry in grub configuration file only after generation of new initramfs * Cannot mount DFS shares on SL7 * SL7.9 - zcrypt DD: Toleration for new IBM Z Crypto Hardware * kernel panic at skb_free_datagram_locked on 3.10.0-1160.45.1.el7 * Lots of tasks are getting stuck in I/O wait waiting on the buffer_head locked by the task that is busy shrinking slab for freeing pages - 3 patches to fs/buffer.c * [SL 7.9 Bug] x86/platform/uv: Add more to secondary CPU kdump info * REGRESSION System panicking in __kmalloc+0x94 from a freelist issue introduced by a block patch. Enhancement(s): * SL7.9 - kernel: Add support for CPU-MF counter second version 7importantScientific LinuxScientific Linux 7kernel-tools-libs-3.10.0-1160.62.1.el7.x86_64.rpm406efbc3cf0166a399a7d123eed3829f0305f3888628008d5f289e23f55434bakernel-debug-3.10.0-1160.62.1.el7.x86_64.rpm80cd64455bb40e7230c5834ba674fd80d234e6325414d1543edf005b294e1eb5kernel-headers-3.10.0-1160.62.1.el7.x86_64.rpm517ce9e691730d5103e7ebeb16e7d616d639f3412a4166060d58155d06914b65kernel-doc-3.10.0-1160.62.1.el7.noarch.rpm472ce233645dedc0eebab070fbf54bae4b5148b689de439d1d25334317906ea1kernel-tools-libs-devel-3.10.0-1160.62.1.el7.x86_64.rpm61998c4bdf5a790273293189b472775556b614d1a70988f5d81351674a1ace67kernel-tools-3.10.0-1160.62.1.el7.x86_64.rpm303b2a8f6f95bc0b6637d696f898944f6c027bfb04037d268485220bc1c94045kernel-debug-devel-3.10.0-1160.62.1.el7.x86_64.rpmc85e6501cee65b1a7867aad8fc811600b899f71817e88c6369e8d15b949f42ddpython-perf-3.10.0-1160.62.1.el7.x86_64.rpme63786d546be238c2b8da96134eb0cedf37afae465088eec5b916e839cc1d102bpftool-3.10.0-1160.62.1.el7.x86_64.rpme87ae6fa8c463e8a14daa06961a93b0f67bf3d0114b5293a66376a79d7827672perf-3.10.0-1160.62.1.el7.x86_64.rpm189d3795653adaada253018e99cdf4046cbdf6e4cb50fec91aee8c705b1c9fe1kernel-abi-whitelists-3.10.0-1160.62.1.el7.noarch.rpm775ad768127a77f40b4feeeaffeff7bce31181bb02dedca2e3d3f02090e693f1kernel-3.10.0-1160.62.1.el7.x86_64.rpm5f4b87416f08fe2293227436c3860a7b2ba649264a9c16c0113bb22067048556kernel-devel-3.10.0-1160.62.1.el7.x86_64.rpm958f9f19d97851d8cb365895dc33e57e8611f9101896ae8f0485bd687711505dSLSA-2022:1284-1FirefoxThis update upgrades Firefox to version 91.8.0 ESR. Security Fix(es): * Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097) * Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281) * Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289) * Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196) * Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282) * Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285) * Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713) * Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.8.0-1.el7_9.i686.rpm9daf2e0220ee23c0eb4357894ba156262a6e09e3109e488ba28530e5f63b3b26firefox-91.8.0-1.el7_9.x86_64.rpme8b3036efd6a8b939ed121e073fb065f3518b7c43761e4d4610afd5f829b7422SLSA-2022:1302-1ThunderbirdThis update upgrades Thunderbird to version 91.8.0. Security Fix(es): * Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097) * Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281) * Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289) * Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196) * Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197) * Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282) * Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285) * Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713) * Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.8.0-1.el7_9.x86_64.rpma8f369bab052fd85ca6c24f4845174873218547a34eca1081b7d1f7fbfd54a8eSLSA-2022:1440Important: Java-11-Openjdk Security, Bug Fix, And Enhancement UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.15.0.9). (BZ#2047531) Security Fix(es): * OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-11-openjdk-jmods-debug-11.0.15.0.9-2.el7_9.i686.rpm6454698240bf2414d9a427d50bfc9066d1309fdcbe3ce9fa46c08a34531f9bbdjava-1.8.0-openjdk-demo-debug-1.8.0.332.b09-1.el7_9.i686.rpm8fa1db6e7c41fa21f266379f8373d0b5adc94af525b0575000f9170a7897a208java-11-openjdk-demo-debug-11.0.15.0.9-2.el7_9.i686.rpmd61e76b91d98389d1d69d1f777395aee32f352d27aa5f69c3639b96170927768java-1.8.0-openjdk-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm98d063dd81a3e10cd455c9d22c4dc9842526ea4739341844b058af143868df19java-1.8.0-openjdk-debug-1.8.0.332.b09-1.el7_9.i686.rpm6d2bd0cca07b5da3a949c5ab58b8051ef22f9135c194bf6fda871c55252c2f07java-1.8.0-openjdk-devel-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm1d5c0b1629cd24b0ef8772abd047e970432905649620632b32b5b45f33f397d8java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.332.b09-1.el7_9.noarch.rpm0b4e7241ab25be75d62adfd35cf567580d3d778a707cc2c392baad4c0de5d283java-1.8.0-openjdk-accessibility-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm8d0531bfee4d52a9205fcbe8c1e3910652d26957d10214d8dc1720242cc418cbjava-11-openjdk-debug-11.0.15.0.9-2.el7_9.i686.rpma98dbfd8c7b4aa2d34e972234a01c35ec374d4a01453b24030c1e5700c1acbd7java-11-openjdk-headless-debug-11.0.15.0.9-2.el7_9.x86_64.rpm7ab27c142f078cd661ad9bc2986a25b0e965ed9c6c2954c9b727a4a57b770a70java-1.8.0-openjdk-devel-debug-1.8.0.332.b09-1.el7_9.i686.rpma3536da9d95f234070c5588f129862e6f76e115ab6b9be0e0ed7abae77a491dejava-11-openjdk-headless-debug-11.0.15.0.9-2.el7_9.i686.rpm91e1ca80adf9e1c006a587215b8360444486c64e21a21595cd9570ee112d0e18java-11-openjdk-javadoc-zip-debug-11.0.15.0.9-2.el7_9.i686.rpm9a27c396f5c20920f4e3b2135d207f022048ac7d2c8e92a7cc7045804a36ff0ajava-11-openjdk-devel-debug-11.0.15.0.9-2.el7_9.i686.rpm44882dc9edf6502327ae1d7483c4c5e94eaadef140eab876563e545cf588ef69java-11-openjdk-javadoc-zip-debug-11.0.15.0.9-2.el7_9.x86_64.rpm8f5bb8aedb103c83eb41e2cd01541e3745b3ce1c2d18a5fb4c96004573354d46java-11-openjdk-javadoc-debug-11.0.15.0.9-2.el7_9.x86_64.rpm790a422311f4bf7e96ab4f70596e3b15081723e03c10ea5c91be361f32dd00c3java-11-openjdk-static-libs-debug-11.0.15.0.9-2.el7_9.x86_64.rpm865c25db988d67ea0239d79eff5574b232513b88c54e86fde9768de3420f9849java-1.8.0-openjdk-headless-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm29a58554a3c82b76a03f260483b39de964ed2434f54de298b631d7291f5f760ajava-11-openjdk-src-debug-11.0.15.0.9-2.el7_9.x86_64.rpma5f11cb569cd225057fbf7d36db853276edbdfdc8d4e95f8a3eb45dd816ede0cjava-11-openjdk-javadoc-debug-11.0.15.0.9-2.el7_9.i686.rpmbab1d9c934572ad5e702d3f290c5c3be3db749006e8a4f19023d1d3b43195706java-11-openjdk-demo-debug-11.0.15.0.9-2.el7_9.x86_64.rpm55b5258d010f86e7ef8ad2a49179e102cd71c4c281fba741c65ee9d72290c800java-1.8.0-openjdk-demo-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm3c2d12a6fde5807197875fa4f3abab4b4b71c2fbedeebc8b74fa5a929612c5a7java-1.8.0-openjdk-javadoc-debug-1.8.0.332.b09-1.el7_9.noarch.rpm2fbc92e494e095f0bd519994a99ff2dfdef3fc82db35669b1e868e8797c27de2java-1.8.0-openjdk-src-debug-1.8.0.332.b09-1.el7_9.i686.rpm5c9a44c800e5518d218e575dd86612f06ec48a06d1a192896b8ad93b5432c46fjava-11-openjdk-debug-11.0.15.0.9-2.el7_9.x86_64.rpmbf12e7ca8f7d3ee8b42c8fea4863251f25fd0688e622119a9e2d164965268b03java-1.8.0-openjdk-src-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm7ec8ac0d1a0ade3c045fdb70e701cdedaed51839fc794a6cb646da9d2b62542djava-11-openjdk-devel-debug-11.0.15.0.9-2.el7_9.x86_64.rpme6070418b3a57822693d1ba54ab0835d412b97de8f31738d137e1a8affd67c06java-1.8.0-openjdk-accessibility-debug-1.8.0.332.b09-1.el7_9.i686.rpm5c4c150e5d70ef3e359f5cc3c001dd34c5aaa52972b76db6c0cf7f99c09e1480java-11-openjdk-jmods-debug-11.0.15.0.9-2.el7_9.x86_64.rpmf79e6a2d077080d73e3d2e89419e063fed74e795be7eb14bd794be7b6251727fjava-1.8.0-openjdk-headless-debug-1.8.0.332.b09-1.el7_9.i686.rpm1be91c9ffdaf54ab97c3e8ca6e8f8cc761d71df030821976129d0b975e8fff74java-11-openjdk-src-debug-11.0.15.0.9-2.el7_9.i686.rpmc9862419593933f057e7e52a04628c31a91afce54ca20a94e75eb7d8bd4a0c4eSLSA-2022:1440-1Java-11-OpenjdkThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.15.0.9). Security Fix(es): * OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9.i686.rpmdde57732b2c43cf4fdab923ca25a26111486754cfef4b0b7ca9ae4bcc59c8f03java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9.x86_64.rpmdcf924eeb44ba991e6d0ffdc06e5f8ae80a9fefa7034a3c4866cf7a56ef3c8e3java-11-openjdk-jmods-11.0.15.0.9-2.el7_9.i686.rpm29225e443a09ceaff69bc83a0172c0287a57389bdfb51b9f19e612e440bbc71ajava-11-openjdk-jmods-11.0.15.0.9-2.el7_9.x86_64.rpm37e80356b5ec3561aa58ed22a4c8d39eaffc5111a7931dc05f8879fc880c2f66java-11-openjdk-devel-11.0.15.0.9-2.el7_9.x86_64.rpmd13851971149cf7063229db1256e4079cd602a757bdc196b01db2a3eaf888f61java-11-openjdk-11.0.15.0.9-2.el7_9.i686.rpmf941c1ab71d54b68b3cd2560fd5340cba62675deeffa9fac9cb2f663de30c5cdjava-11-openjdk-src-11.0.15.0.9-2.el7_9.x86_64.rpm89d22efd78517f02dbf39aea0f45dfa8d261012bd910d7059012cd53fc6ce28bjava-11-openjdk-11.0.15.0.9-2.el7_9.x86_64.rpm54de3796cc3eb5b01d2b60bcc97b9c8fcf29dcc4a70a8c7031fe6f55cc0f8ec6java-11-openjdk-src-11.0.15.0.9-2.el7_9.i686.rpm3bdef62cb5951dfd6d4561608d29e54e027eb399227e9d066e8ea0a7da7feb73java-11-openjdk-headless-11.0.15.0.9-2.el7_9.x86_64.rpm85b1c49c7c73aa8d4fd021959cbe18c3ee1cdbc75268a0e7b212f1852f0db2d7java-11-openjdk-demo-11.0.15.0.9-2.el7_9.x86_64.rpmb5babd89afc050fb8e0be904f5fc61c9d551ed427a72d4a77d367e415776704djava-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9.i686.rpm43425d585ac388ff95d0d6bcd4d5a80b9c13c0d6df3756a31d89fa50920fe4d9java-11-openjdk-headless-11.0.15.0.9-2.el7_9.i686.rpm187b0eeca1aa3710529d42aec35f95d4cb2a0dadf7089b297512c4cc604a213cjava-11-openjdk-devel-11.0.15.0.9-2.el7_9.i686.rpm7fcf28f2386c7cab99c5bfba993434b55e925ac83db8d627ccbcad6dfeff416fjava-11-openjdk-static-libs-11.0.15.0.9-2.el7_9.x86_64.rpmabd20afa7d4d5874006ad51aafa8bb71c41048ac8be43642c5913d0f9f007bc7java-11-openjdk-demo-11.0.15.0.9-2.el7_9.i686.rpmfd618325e092d5dbe7ad7e7e7c3178a8335f1d2c1d9a9fc05962f6703df8648cjava-11-openjdk-javadoc-11.0.15.0.9-2.el7_9.x86_64.rpmb78a1c26e55cc35b94e51b14ef910876e24a17e7ddd20f0a9bd230ae6e72f3a1SLSA-2022:1487-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.x86_64.rpm2fe3ed816e42aacabe3ccbe30a458b41470ed1419f25c24f07ea37c2faf16ed5java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9.i686.rpm3203b6dee98f8021866c807ba0389dcaa94cafdc001720e86135d61b1a826b4ajava-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9.i686.rpm913f70c9c5bfb2b4c63dffc455ee70363bca51fed32a63bc552c3686c1f9c34fjava-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9.i686.rpm1a08683eeb8f7d7245725793b3ccc5011b5feb349ad97a59b6c1a0e096d56abcjava-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9.i686.rpmc8caa6d338c2691c4c131f970d3a3bafbc26d9445e85f57ca905fa0635c2dbbfjava-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9.x86_64.rpm7555bf4db79a8e019a6757b8b3f7ade934a602a05f711d0ffbf0d17991047a1cjava-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9.x86_64.rpma911a1eb974b106334d39bd84e8394b666788f50805e0b0bb675cf086a5e860ejava-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9.x86_64.rpm2d032b3722bef7b4fcc6722509f7c105c742079e69ed5a2ab9bce66e7d870c22java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9.noarch.rpm4e216459910b462af79016c6fe77c7d44608501de95f10dd93bebc4968ad96e0java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9.i686.rpm25e1e8033161283a58f8deaa404326d267095868935d1d9bb839a38c004046a7java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9.x86_64.rpm46fa43016dca217f7f31aec060edb30aaabaa1f50ae8a70ec3ec0508cb7d8aa7java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9.noarch.rpm65ba24f4ef25a4833d1a39799602766dc85b2c018c8928d31ab4a2001c59b578java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.i686.rpm8b035e58f6ea351ea93babda6b4925d6cfe96b5e169f9548028831c8042ad0c1java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9.x86_64.rpm982688a1575aa0bf1f4c1adaf81c61564d7a2dea3bd7394bcbccc2f8a6997719SLSA-2022:1541-1Maven-Shared-UtilsSecurity Fix(es): * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7maven-shared-utils-0.4-4.el7_9.noarch.rpm635ca492b99ed733728a56d3d5882fc5a367ffcae2bcd0e5730ecba596d48a99maven-shared-utils-javadoc-0.4-4.el7_9.noarch.rpm71ba926f15d5118380601b4e3c13e09b1aa51462571713302735e558c25aeb62SLSA-2022:1703-1FirefoxThis update upgrades Firefox to version 91.9.0 ESR. Security Fix(es): * Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909) * Mozilla: iframe Sandbox bypass (CVE-2022-29911) * Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914) * Mozilla: Leaking browser history with CSS variables (CVE-2022-29916) * Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917) * Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.9.0-1.el7_9.i686.rpm2848a8eb37faa0aa648b62965b19fa466dc4968ed927d3545154545215d52e98firefox-91.9.0-1.el7_9.x86_64.rpmc11a6c9ed11495d188649eb84f2251a15dbf86228fce394a8c8b9fd278ddb811SLSA-2022:1725-1ThunderbirdThis update upgrades Thunderbird to version 91.9.0. Security Fix(es): * Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909) * Mozilla: iframe Sandbox bypass (CVE-2022-29911) * Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914) * Mozilla: Leaking browser history with CSS variables (CVE-2022-29916) * Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917) * Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912) * Mozilla: Speech Synthesis feature not properly disabled (CVE-2022-29913) * Mozilla: Incorrect security status shown after viewing an attached email (CVE-2022-1520) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.9.0-3.el7_9.x86_64.rpm806c8e4eebfcbbae90a9ac8a9d27e401ae2e6bc8bd1e64d871a4c55478605cc9SLSA-2022:2191-1GzipSecurity Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7gzip-1.5-11.el7_9.x86_64.rpm31892df32fdf2c1c290d6e2f41169b2cd56ddbf8bb2635c07416c00979a4d59fSLSA-2022:2213-1ZlibSecurity Fix(es): * zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7zlib-static-1.2.7-20.el7_9.x86_64.rpm59fbd7dba8ac257ebd36d9e43a3f1416134e2034c3c64053397dbe35092f29b1zlib-1.2.7-20.el7_9.i686.rpme2a8ad745347fbfb35c38b8084fa7d8918c8affc9387f5a45f9e60c32279597dminizip-devel-1.2.7-20.el7_9.i686.rpmc8243e2e7c06b397b7d8f8f5f6c0baa8b8a83a37618e96d4ee46974a0648dabezlib-static-1.2.7-20.el7_9.i686.rpm6edb526f889c296e32c1573d68fe243759299b4a8bd2a0b7a29328695ae05769minizip-1.2.7-20.el7_9.i686.rpmcedb4974fde50c300966cefb68799eca467fa942ae921647be90c1e11a3df00fzlib-devel-1.2.7-20.el7_9.i686.rpmce8da1a1626e6648d5557d6566ebc67e0c2b61e841c2c501e15f7bd867bb3236minizip-devel-1.2.7-20.el7_9.x86_64.rpmf9cb6bb4c9f5556c891e8eb177f3b35dbc5dd20ad58256f93e4e2a9a9bea0614zlib-devel-1.2.7-20.el7_9.x86_64.rpmecb3672456577e44acfee7cb131be9acb9781ba1433f4e1fadb18f7d6dcd700czlib-1.2.7-20.el7_9.x86_64.rpm4a4de3032bfcef31be4e2cb07dc924293521d9ce6500d17c45e618af7d3f725aminizip-1.2.7-20.el7_9.x86_64.rpm2e4eacbb6adc7522697701ef62afef3212274d563cf10b9e556fe8e2eb341577SLSA-2022:4642-1KernelSecurity Fix(es): * kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * kernel panic in mlx5_ib driver SL/CentOS 7.9 VM * [SL-7.9] Get Call Trace about "kernel/timer.c:1270 requeue_timers+0x15e/0x170" on specified AMD x86_64 system * kernel NULL pointer dereference while calling dma_pool_alloc from the mlx5_core module * Rhel 7.9 NFS Clients takes very long time to resume operations in an NFS Server failover scenario * perf stat shows unsupported counters for Intel IceLake cpuimportantScientific LinuxScientific Linux 7perf-3.10.0-1160.66.1.el7.x86_64.rpme35107177f0d41b11598d0eb6b700fcb26220351f583b2b7f5822f6e8c3362d6kernel-tools-libs-3.10.0-1160.66.1.el7.x86_64.rpmc1c6d696b1cf50d8c90b8fc28de93bb4281a51a243e473fa57f0bcfe6868b343python-perf-3.10.0-1160.66.1.el7.x86_64.rpmd4df399b78ab27a497b8ba2cdda2b6c2429c137b5b75c0e9e7b7dda9aa1f7f5ckernel-headers-3.10.0-1160.66.1.el7.x86_64.rpm69d183d419048a8f44a63d9c6ecefdc9c66a024a3fd1a977a52242a10d9a6c94kernel-doc-3.10.0-1160.66.1.el7.noarch.rpmfb8d00a98dbf8ad64df3c2fc3bd71875f16f26f4bb63d75569f3b23119e1cf82kernel-devel-3.10.0-1160.66.1.el7.x86_64.rpm335d8182f93343fe1c06d24c240894cce9ff2641ae03e4be023af248320211b0kernel-abi-whitelists-3.10.0-1160.66.1.el7.noarch.rpm7f4a207a45581b1089c7584be3d0e47920eaa1daf4259f06c2f224b5ee6b89d4kernel-3.10.0-1160.66.1.el7.x86_64.rpmf9b73f3c142bad4396ca930a46fb0a9936ea56f78daee78c5a5567eef626765dkernel-debug-3.10.0-1160.66.1.el7.x86_64.rpm6d3e4617ed58016b72c8c1e794509f65512f2895935e7d5228b82fe0544f18ddkernel-tools-libs-devel-3.10.0-1160.66.1.el7.x86_64.rpm8213bb277061bfe1bd0374654b7af0c9bbe1fc417794613469281c45e94ad21akernel-tools-3.10.0-1160.66.1.el7.x86_64.rpmba2389506b7fdd928f026feeaa2e7c45f63e70a263360669cd5246259d9b9c22bpftool-3.10.0-1160.66.1.el7.x86_64.rpmce07c0edcf1471992df12486aaab0ac6c59c962c91ec2488f8080eb5527c2895kernel-debug-devel-3.10.0-1160.66.1.el7.x86_64.rpm9f3f654ab1782eebfee4bdfa9ef84640016992e36a13770aae9d8e3a91d9f05fSLSA-2022:4729-1FirefoxThis update upgrades Firefox to version 91.9.1 ESR. Security Fix(es): * Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution (CVE-2022-1529) * Mozilla: Prototype pollution in Top-Level Await implementation (CVE-2022-1802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEcriticalScientific LinuxScientific Linux 7firefox-91.9.1-1.el7_9.x86_64.rpm80d46609a8cb319359dc3b90af371283b148cd4a302a84bd648bf361c9c9aea0firefox-91.9.1-1.el7_9.i686.rpm341d17218763d9e521c93047f4952bfec6d6c04b14f9ee0a68fa7349fb40c0e6SLSA-2022:4730-1ThunderbirdThis update upgrades Thunderbird to version 91.9.1. Security Fix(es): * Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution (CVE-2022-1529) * Mozilla: Prototype pollution in Top-Level Await implementation (CVE-2022-1802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEcriticalScientific LinuxScientific Linux 7thunderbird-91.9.1-1.el7_9.x86_64.rpmcdc32e32092757a426f9207dcc7a53db29fa5b0ed6c7fe4fe65314f3cefa263eSLSA-2022:4803-1RsyslogSecurity Fix(es): * rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7rsyslog-snmp-8.24.0-57.el7_9.3.x86_64.rpme3b0542fcbf988eefd3b6ec087cdc45c6c1d06f14f3be8bade5e4f1c7e417672rsyslog-doc-8.24.0-57.el7_9.3.noarch.rpm72657e2cc5db25197b8f643d0203f53eacd2005e6b211e2317675382eba39e4frsyslog-libdbi-8.24.0-57.el7_9.3.x86_64.rpm966ee3885d60b27edf283acd40da8dcb43f82fdf2e4b85775808e4b8c01a91a1rsyslog-pgsql-8.24.0-57.el7_9.3.x86_64.rpm432a8f1b6e2be0243afc23f667afa34872e02b7b9f961628c3236a7b055798afrsyslog-elasticsearch-8.24.0-57.el7_9.3.x86_64.rpmfcd136bc321c3355d226340c99e3966a302f34476f045f5224335f637d397567rsyslog-relp-8.24.0-57.el7_9.3.x86_64.rpm8d3db0683773333cd93c29adbc38376f2d4b47539b0e573028504b08227ea593rsyslog-gnutls-8.24.0-57.el7_9.3.x86_64.rpmdbf02a5d0fc4e537ba4efc857f2665213c6d3dc3b84c5f62b6c3ad8978d8464arsyslog-udpspoof-8.24.0-57.el7_9.3.x86_64.rpm5a6260ae1d9c425f4d0e094e01ceaec7a20afea7464ddd37219ce2d86bd42e06rsyslog-crypto-8.24.0-57.el7_9.3.x86_64.rpm35077c3289d295a5cc412a627a2b361607dd36c687b16a2bacdb2b21dc2e4f8arsyslog-mmnormalize-8.24.0-57.el7_9.3.x86_64.rpm644b8ec956e3eaf20423f42b6d09c3a84f1bb42e71e37bd362e0d61c078e75bersyslog-8.24.0-57.el7_9.3.x86_64.rpm79a351c99a2feaa59d46d57843b73a33626af0b2e0c02e36b4d1433b854eb632rsyslog-mmsnmptrapd-8.24.0-57.el7_9.3.x86_64.rpm111275aab2b392d0e2100b7b793077752a97d9753336c6bb69b6cc7692137d6arsyslog-mmjsonparse-8.24.0-57.el7_9.3.x86_64.rpm46edf8d0738f0a3f00cf1a2780d87e0c6f0bcadc90cd137ecfc30e86571fd90crsyslog-gssapi-8.24.0-57.el7_9.3.x86_64.rpmaf9469c429db2f02c98a5491498b5eeba67965d937b0accd39b9d6cb868dab10rsyslog-mmaudit-8.24.0-57.el7_9.3.x86_64.rpm04c51d5cf3f33a846a9791cd706b8f717e28c9d6d49c3ddf46901600b0250b60rsyslog-mysql-8.24.0-57.el7_9.3.x86_64.rpma9b52a799cc93dc6d8a1d9f9a194ab5e3dddc39cf22bdb4345a3b0d92c532bb7rsyslog-kafka-8.24.0-57.el7_9.3.x86_64.rpm88d2d81c4c6f9f0eecb5f904d4ffbe92f99cf545734a558e3b44642c1185dd87rsyslog-mmkubernetes-8.24.0-57.el7_9.3.x86_64.rpm00a56045395dda8d104195a547d518a18fbbb6b03cf23b40a1184906eef1ca51SLSA-2022:4870-1FirefoxThis update upgrades Firefox to version 91.10.0 ESR. Security Fix(es): * Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736) * Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738) * Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740) * Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741) * Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747) * Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information (CVE-2022-31742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.10.0-1.el7_9.i686.rpm2c73cfaf9b93a6e35b7206601d3a4f4d633b93e520ced5f8479a6eaacad266e1firefox-91.10.0-1.el7_9.x86_64.rpmf439b4056dcf344e92989d85360bc52336ce8ec8f3c89db5ab19f2b3688e3b3eSLSA-2022:4891-1ThunderbirdThis update upgrades Thunderbird to version 91.10.0. Security Fix(es): * Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email (CVE-2022-1834) * Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736) * Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737) * Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738) * Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740) * Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741) * Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747) * Mozilla: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information (CVE-2022-31742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.10.0-1.el7_9.x86_64.rpmba4945587137c1e9dc2da7e1bc1c6993113a8dac1a2b1af76a9b473672c62f6bSLSA-2022:4930-1Python-Twisted-WebSecurity Fix(es): * python-twisted: possible http request smuggling (CVE-2022-24801) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7python-twisted-web-12.1.0-8.el7_9.x86_64.rpm45f5bb7fea6902e35eae90d069a93ba49ba7a7c8b0d7c6f2a34eca6fe131ad25SLSA-2022:5052-1XzSecurity Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xz-lzma-compat-5.2.2-2.el7_9.x86_64.rpm178be34e860e9391f07fb01816dc05a79e1d95a398f26b2c998d0ab621a3d073xz-libs-5.2.2-2.el7_9.x86_64.rpmc07f0cf3977e760679b6626d88a5d1b88ca2540ac6659c3fac74da5802341b2exz-devel-5.2.2-2.el7_9.i686.rpmc3af6af75d9eb8a997dbf96539b8e37a276a8a0ffbcfef2f939c6a06fd427277xz-5.2.2-2.el7_9.x86_64.rpm6e66b5705a7befffe0701195106d9d9638602fe7a80d54eaf4c8d1ffe1a694f8xz-compat-libs-5.2.2-2.el7_9.i686.rpmed52b79ebc47ec936fe2e8e2e44dbe888f3707ed6067f473b3b0a9d052a08823xz-devel-5.2.2-2.el7_9.x86_64.rpmc17801a5adcda0f76ceaa856dad0568a25406374520a3b96f926c24c5a265e58xz-compat-libs-5.2.2-2.el7_9.x86_64.rpm50573e4a0c567e0c6000a558a5bcab49ffe16fba1444253b351a628eddefe282xz-libs-5.2.2-2.el7_9.i686.rpm4d87b16c5e91c6169ef120acd7f925bc140876fafc133af49bc086c190652862SLSA-2022:5162-1PostgresqlSecurity Fix(es): * postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7postgresql-docs-9.2.24-8.el7_9.x86_64.rpm785f51347d3f6b380a212837cb270c0a462763304285d9b5438448c697e15cc4postgresql-libs-9.2.24-8.el7_9.x86_64.rpm59a4789756e0cb29822cf7c8eedf629e9a67e43b2f7fdc5ace1c9e7fab1f80b1postgresql-static-9.2.24-8.el7_9.i686.rpm19a07b567067664944f2a8aa7df574c970184b11ff0949579e157421cdc9cbf0postgresql-9.2.24-8.el7_9.x86_64.rpm2d2e7d29446e98fabe696c38228d61c6ac6e18ce1c0a79776cc4cef11974b3d0postgresql-upgrade-9.2.24-8.el7_9.x86_64.rpm725c7494ff796b3c5e721187771a2307352f91738e5133e33f50b808b0086158postgresql-libs-9.2.24-8.el7_9.i686.rpm59efe390ae8c13b421732a56cac09f26690d633efe1e8259bfda1a3f1b9ddfe3postgresql-test-9.2.24-8.el7_9.x86_64.rpm288f93adc82232378274a624afc629b402d6c4c006626541c72b9a59371c424dpostgresql-plpython-9.2.24-8.el7_9.x86_64.rpm163973d9e3846607713d6a2ace3e29a9c00ae46a46253a9f27f59c85baf77f15postgresql-pltcl-9.2.24-8.el7_9.x86_64.rpme18690e1d0d9ed6c6818e4198375da98920ad266acc9ec7e7f7b80a7672bde27postgresql-devel-9.2.24-8.el7_9.i686.rpm22a34c80bc19cdf540fb3a0900201c5cf18863efa3f38199343f68896bf238f0postgresql-server-9.2.24-8.el7_9.x86_64.rpm2214e31cdf76b0bb8a399a80ba4662ee4381140c1ea62320bf50df2b2791cacfpostgresql-static-9.2.24-8.el7_9.x86_64.rpm46f46125b8d1815a091900c4fd80a0c838a8b68206c399563ceb3f43b871bb78postgresql-plperl-9.2.24-8.el7_9.x86_64.rpmd0df9bbf5eb5e754c22643007a07ccddaecc7096edfc03c2be248f79d3d004cfpostgresql-devel-9.2.24-8.el7_9.x86_64.rpmbd33822d9eab3ceb26128fb525db894fd6a9bdae21371c94d3db6ffdebb7f006postgresql-contrib-9.2.24-8.el7_9.x86_64.rpm273899f72e24eb777a82216f169a06d18ff1c6c48f0e29b154863757c5bf84c9postgresql-9.2.24-8.el7_9.i686.rpma9e3e531f3c674b2e4ddf3502b6c32d4d2950af50c050ef968c76de7c353d803SLSA-2022:5232-1KernelSecurity Fix(es): * kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) * kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * XFS inode cluster corruption * sock: sock_dequeue_err_skb() needs hard irq safety * libceph: fix potential use-after-free on linger ping and resendsimportantScientific LinuxScientific Linux 7kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm1d77baa3d81ea83477d62c49e015be49732465ccd422059db318efc757ae8ecbbpftool-3.10.0-1160.71.1.el7.x86_64.rpm7b066f7a2dc6af9f4b4060613ecd118b217cf11f81913b38bf5a654015dbde5ckernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm4f556e1061c61af28b9174b25e07f65c43819121efcec015882d984e8b49602dkernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm4db12f15fab31a6a5df99c09f89b5c62e83290fd0a61ac8ce5f9ee5e8a497421kernel-3.10.0-1160.71.1.el7.x86_64.rpm3214a01be7fda555894dc93053890a4100c0aa1c4886e7842ab7cfed376144bbkernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpmd7e26d24d3a734275e8bc9ade31b1ae3adee803dd46db10d57b6d85660494a00kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpmce17a9c6466362c175e0bddc060062332de9e637d4caafe8cc983a0a1e8be3c3python-perf-3.10.0-1160.71.1.el7.x86_64.rpm1910321931f2f0a442171a982d11ef4f6be5450336c0eac6287f89f65c267caekernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm41aae026c1a9b1193e21d29b67d9c83918da3d7d027d6727b85a9c04c391c7a3kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm2750f1392b10f38d70e95e3d8a78ab25c2518d9ca45d85bd30f300db19593d81perf-3.10.0-1160.71.1.el7.x86_64.rpm2e5767fc21747cc1001ad9293110f8fa39ea33383d025c625bc65a026ba6166ckernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm72dd92debffef227aee347e7b48b4bd26a8154b7ccdefab4a2ded440a376859ekernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm76398d724a76043908976a33be347fffb46febcf045b39309fde9250498c8d91SLSA-2022:5234-1Python-VirtualenvSecurity Fix(es): * python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7python-virtualenv-15.1.0-7.el7_9.noarch.rpme91998c8834ef7665475ce23d9b11eab0bdc361c2c595c7bfd57fe9b5b07c32fSLSA-2022:5235-1PythonSecurity Fix(es): * python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) * python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7python-devel-2.7.5-92.el7_9.x86_64.rpm3d67098ab806f5b36a32ad07f418c0c3f336177fecd3e69332aa47bc841b6a38python-test-2.7.5-92.el7_9.x86_64.rpm9ca0cb5713f710cfc4281aca00b03121ceb3897e17d7ec58aa7f16223533b1e8python-debug-2.7.5-92.el7_9.x86_64.rpm15793b35b8d9dd822f51a7b2890c5dd76e634259ba7abf19e7e9ad88d9976c66python-libs-2.7.5-92.el7_9.i686.rpm722f37223adac9b05f452755a17f11db6e32a48fba2e9792e205b81b20544032python-tools-2.7.5-92.el7_9.x86_64.rpm119abd1b66cb24e612fc399c80af7c5040169ac2078bac8446f57f81061f2ecctkinter-2.7.5-92.el7_9.x86_64.rpm75ff0121c4b61bdb679b3d1f5464a924ab6ba3e304da49651d948c557741b1b6python-2.7.5-92.el7_9.x86_64.rpmd1d50f02f72bf047ef8fff0a6150e0eeb1eaee72a27fdf8ab41acb42f10b6915python-libs-2.7.5-92.el7_9.x86_64.rpma9b403e98099f7e6ff63ac8e5712b378ec290ce13c7357fe1704c302bac41f4bSLSA-2022:5239-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918) * 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Log the Auto Member invalid regex rules in the LDAP errors log. Enhancement(s): * RFE - Provide an option to abort an Auto Member rebuild task.moderateScientific LinuxScientific Linux 7389-ds-base-libs-1.3.10.2-16.el7_9.x86_64.rpm2b6f8fd9d6c2d5d6a400605ebb49e89a22b1b307288eb098908b1cad691b2e17389-ds-base-devel-1.3.10.2-16.el7_9.x86_64.rpmd226bedc44c7f9d2cf5192e322e7e0a9cd1656c3b68aa8973ec6ed482f9264e5389-ds-base-snmp-1.3.10.2-16.el7_9.x86_64.rpm748b47079f3d10641d78e5f1e3e63bc24b6e874fab0706073bc364f561147ab0389-ds-base-1.3.10.2-16.el7_9.x86_64.rpm0ed083ae9c6791c4b9eee5fb1eb5e7cd1b22a74f433b86a1c7975cda5e9afcbbSLSA-2022:5479-1FirefoxThis update upgrades Firefox to version 91.11 ESR. Security Fix(es): * Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) * Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) * Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) * Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) * Mozilla: Undesired attributes could be set as part of prototype pollution (CVE-2022-2200) * Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) * Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) * Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.11.0-2.el7_9.x86_64.rpm5e83f5f9e9a731890b9ba7d60465f40904736502213b1f154fd5e104105844befirefox-91.11.0-2.el7_9.i686.rpm6ff4fc0a21fa4e5fa5f25bc3c28d56596b6699302f3d9bc0ae2c5671b679e254SLSA-2022:5480-1ThunderbirdThis update upgrades Thunderbird to version 91.11. Security Fix(es): * Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) * Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) * Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) * Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) * Mozilla: Undesired attributes could be set as part of prototype pollution (CVE-2022-2200) * Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid (CVE-2022-2226) * Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) * Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) * Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.11.0-2.el7_9.x86_64.rpm518b25f63fd9c1898cf7dbc477faf7330e4eeca94bbfaf5ce71233c8b0f46c1eSLSA-2022:5542-1SquidSecurity Fix(es): * squid: DoS when processing gopher server responses (CVE-2021-46784) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7squid-sysvinit-3.5.20-17.el7_9.7.x86_64.rpmdbff6ab9c250e0f10dfca230a5f1170d86e8144eb1dd96909b41e1183ee5ecc0squid-3.5.20-17.el7_9.7.x86_64.rpm000c8e8e89638b9035378a053890a009bf1912fce759f517f212187470ddb2b5squid-migration-script-3.5.20-17.el7_9.7.x86_64.rpmab738d32e426a0b2aa73cb8c5d479f25edb1c03e00afda9adcc0cf661cf02b43SLSA-2022:5687Important: Java-11-Openjdk Security, Bug Fix, And Enhancement UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2083258) Security Fix(es): * OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-11-openjdk-jmods-debug-11.0.16.0.8-1.el7_9.i686.rpmff485a031b7358e9a603019431d11ad49fe1c191b651a1ab4a966f3254434a36java-11-openjdk-src-debug-11.0.16.0.8-1.el7_9.i686.rpm35b009867aeaec41a4101189c975ab32f52b96997c04179577e204fa7c953041java-11-openjdk-javadoc-debug-11.0.16.0.8-1.el7_9.x86_64.rpm8fc0bd4b7300cd42b8c60f8301d2262a0e6ea85ca55bbc6191f423f8202351dfjava-11-openjdk-src-debug-11.0.16.0.8-1.el7_9.x86_64.rpm3e5b6dde1167f229003f25a94346f478c7386e8578b31da25f85940331851b92java-11-openjdk-javadoc-debug-11.0.16.0.8-1.el7_9.i686.rpmc0b7fa4b587e7c76e5b652246d91f417d05c21d031489d5f776db52c4554f81fjava-11-openjdk-debug-11.0.16.0.8-1.el7_9.x86_64.rpm7c81e27141ef3886d8a41bc2d856be63ac236f2aa11c4782382e82d44ce2c221java-11-openjdk-demo-debug-11.0.16.0.8-1.el7_9.x86_64.rpm78fab0f72db34591ffdf639cdbe2205b7d7838e039c3a6132953943c67894bfbjava-11-openjdk-javadoc-zip-debug-11.0.16.0.8-1.el7_9.x86_64.rpmc3ae470cc832c94dc93002679fe56a85f31e5988fafff3fa00b23e4c520d16b9java-11-openjdk-static-libs-debug-11.0.16.0.8-1.el7_9.x86_64.rpm58260f8e9843800aa31099c7e4f7a6aa74597a915271959fc300c78fef0825d6java-11-openjdk-devel-debug-11.0.16.0.8-1.el7_9.i686.rpmead1acfec0163bef28a3971805467b337155d5ba67064a613dab2424f187a02cjava-11-openjdk-demo-debug-11.0.16.0.8-1.el7_9.i686.rpm9c83e1948e56b5044f88c9a04eef39f63ec956fc54f29b023c752b62f71f73fbjava-11-openjdk-jmods-debug-11.0.16.0.8-1.el7_9.x86_64.rpm08d96bdd9b4331466d1c58221053dd24927fd80259e9e2cdc3edbf4c06b9e061java-11-openjdk-headless-debug-11.0.16.0.8-1.el7_9.x86_64.rpm07d0d9aedd58dc4d0bc84278ce0304fa2611a20ccc953e0719b2af733f5c95d1java-11-openjdk-debug-11.0.16.0.8-1.el7_9.i686.rpmf6277b5d6d7a9a104aa48ff42821bba76d39ea8109ca0ef184dd602386fdddecjava-11-openjdk-headless-debug-11.0.16.0.8-1.el7_9.i686.rpm37cafdda08da3a1ea4dad7b80777489a1e4f6117b828b5100e289e33088700c0java-11-openjdk-javadoc-zip-debug-11.0.16.0.8-1.el7_9.i686.rpm94355e3db0d1eeb216c439c8794e367d054b3c0f110445a51e122ff51efbe2b1java-11-openjdk-devel-debug-11.0.16.0.8-1.el7_9.x86_64.rpm3ab693276932133e379fdf8b4ba7d90d26dc330d6c7dd75a6fc03b150e18bd45SLSA-2022:5687-1Java-11-OpenjdkThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). Security Fix(es): * OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-11-openjdk-demo-11.0.16.0.8-1.el7_9.x86_64.rpm8611c379545049fb5145af947ade98d6a34982bc6b1bd6fdc81b844cbcb69d6ajava-11-openjdk-headless-11.0.16.0.8-1.el7_9.x86_64.rpm144ea8e27c84507fcd45e26a346bceeb42afa3b2d10cc491ca6a313ad72d87fejava-11-openjdk-static-libs-11.0.16.0.8-1.el7_9.x86_64.rpm4bb7d26c567fe11f583ff82d4e213651a0add391dc89c7ded87d18acabba77ecjava-11-openjdk-demo-11.0.16.0.8-1.el7_9.i686.rpm0dfbe0a0574ac807f4e74809bb73dad28f577fdd6f077cee0bb6aabd5dafaa3bjava-11-openjdk-11.0.16.0.8-1.el7_9.x86_64.rpm31ab6b80b64db525f4350f5e232a4ad566c0a79970861d8029ea611644c5771fjava-11-openjdk-devel-11.0.16.0.8-1.el7_9.x86_64.rpmdb9ed77efbe929b28e593e4a21d6dded7aea5e80c7c9757c4e6d1fabe0c35720java-11-openjdk-headless-11.0.16.0.8-1.el7_9.i686.rpm55746417c54be47dd7809c30d000e0b7df9c025cc5350cd3ded8aac7a7c27033java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9.i686.rpmb16c911001ad580f4c2eca21d0924a8baade689e538df738b7f5e9c9f4253005java-11-openjdk-jmods-11.0.16.0.8-1.el7_9.i686.rpm820cfd6ee3b4b8a3d26cd3492a4774099272260bd0d18dd554c2f131c707ac84java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9.i686.rpm1e4d28d9a9842eca02530b1c5663a51a039fc5e5e6920b447097fde9621ee2afjava-11-openjdk-javadoc-11.0.16.0.8-1.el7_9.x86_64.rpma9676e773f4ab904e6df5340fd3ddebb1bd7150ade2b0dd4a3d6e48d83ad3203java-11-openjdk-src-11.0.16.0.8-1.el7_9.i686.rpmdceaf6b3fa5f11e3c3090f103adc39c32ab3b78e19e0a0ec82e56054a2ae28adjava-11-openjdk-devel-11.0.16.0.8-1.el7_9.i686.rpm30ecf4fca91c24ce852ef7d2c7f0ffe7d3c0cc2267a92963cfe5e3105225d811java-11-openjdk-11.0.16.0.8-1.el7_9.i686.rpmaac17aa4e1897cc09e6e0e34dc6dfc05075cb0a119889610763865b5eb7c814djava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9.x86_64.rpm404c5774f8f9163e381965ffc6e739616efae6c6fa8a6bff1bc09627535c3c73java-11-openjdk-src-11.0.16.0.8-1.el7_9.x86_64.rpmcb1b49986b19897e0457f122762c3a018f006826fc0b1270fe1e82c804c5c5f6java-11-openjdk-jmods-11.0.16.0.8-1.el7_9.x86_64.rpmc962abaf22b4a395efaf424f8c79ef7676507c16265a1f7253bfdcf794360ea2SLSA-2022:5698Important: Java-1.8.0-Openjdk Security, Bug Fix, And Enhancement UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2083257) Security Fix(es): * OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-1.8.0-openjdk-devel-debug-1.8.0.342.b07-1.el7_9.i686.rpm5cfe245f019d5fc6308312b6a2c36a5b3816add572af41e5c6da2630b2a9bc9ajava-1.8.0-openjdk-src-debug-1.8.0.342.b07-1.el7_9.x86_64.rpmdd552247cc20b81cab5abc2ac39dc17703d58a53732fa2f6e0f11c51b8d1de95java-1.8.0-openjdk-src-debug-1.8.0.342.b07-1.el7_9.i686.rpm2d94cbaab9b7bf560be85fef61cec7970813cbcfb23a6293de86d10ffee052d0java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.342.b07-1.el7_9.noarch.rpmeab54a41190cafaef99ff3f6d5539734a6c151d3868f78a326b549940284c43fjava-1.8.0-openjdk-demo-debug-1.8.0.342.b07-1.el7_9.i686.rpme283c2ea3701cd6b330e1fb6c469a58905becb4687d6ddca1fdfcf5b6e24a173java-1.8.0-openjdk-demo-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm5dede49755fef443561ec1294d59dddef1e977661dc8965744ea5b3eadaa82f7java-1.8.0-openjdk-headless-debug-1.8.0.342.b07-1.el7_9.i686.rpmfb412993684366151cc44711dd03669a328a34a78c0a6672f94f1a3f48e7dd8bjava-1.8.0-openjdk-accessibility-debug-1.8.0.342.b07-1.el7_9.x86_64.rpme1592b2fdef08f1ac87ecb4356fe1a6667cc9a310a5eff04bc97fb67bead7846java-1.8.0-openjdk-javadoc-debug-1.8.0.342.b07-1.el7_9.noarch.rpm49142f39946bf7ab738aeeeb04d894615267f95b7dc83a735c1aa75531c95599java-1.8.0-openjdk-debug-1.8.0.342.b07-1.el7_9.i686.rpm4d87c03704812f5de6e21624549dfee758efd582b6161854c671bb5c4671f2ffjava-1.8.0-openjdk-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm5ff4ae53a07a78eeca4ad20043caa10fb4f5ce90b73a6e102d2870d3a13fcf9ajava-1.8.0-openjdk-headless-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm3fb8a14a48644a420ec20fd27537402eca63522a85023ab13bbcede16dc384adjava-1.8.0-openjdk-accessibility-debug-1.8.0.342.b07-1.el7_9.i686.rpmff4d3843ce0896b873094b65d95ca7aecf1343ba1c948dbafa02de065c951154java-1.8.0-openjdk-devel-debug-1.8.0.342.b07-1.el7_9.x86_64.rpme1bdd17a0490037142cdb6ae84a6ff45766880d6cb7e147f74b7ae01788f652dSLSA-2022:5698-1Java-1.8.0-OpenjdkThe following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). Security Fix(es): * OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9.x86_64.rpm4ab7f27a38f56298c39e246c94d702d582ea7461cd0cda84ae19d6898080d863java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.x86_64.rpm4f5e91bda435dd90919ffa87bf89fdac660a7581c552c0c1a6e8bc8b729c694ajava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9.noarch.rpm6e2bfd3f96c12846a098b7d01b6114c64b868638c083814e5a57facae46d4081java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9.x86_64.rpm866c8ff926d25e5c119c13292f2bac934bb3e02a9b821123efdd85dd3b263135java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9.i686.rpmb4006d90a56f38c63ef8522c0c97ad8a5963d5e50107985f0f758e39e03f5c27java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.i686.rpm6b3829da94a98f6ad1e9e4224796bf108eb0f15f1b6fea2a7be9cfd0b559767ejava-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9.x86_64.rpm7dabfb17f9d0efe22785ddeff0450c86fc99e0942e254911f3424cbaa1040dfdjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9.x86_64.rpm42b430ea26f1ca194196526b12c4dbac2d646081c4572cdcfc35e184fd9f491bjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el7_9.noarch.rpm8ccac8e0148f92f0c7f079a592c2a7e62644b42c26d0c61b3b93b1c22454868ejava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9.i686.rpm1fb56095e0db3a565698ac3a02327db2940983beb6cc358373da4dab1ef91c70java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9.x86_64.rpm943ac0fd188f796e44f4173e92e2e6b7bfd67d0597bf42234b17463b1cd62a02java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9.i686.rpmf25db7168bce97ee6e42b1605467a84b4aea3418c88cdf10131b453f9c700968java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9.i686.rpm37005280cc568854374742f1509d56437f8e4a07ada84ab33b6eff370523036cjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9.i686.rpmebfc9595270935485aa68afb4085c59d07730d26b097e9a9149993c98f89af98SLSA-2022:5773-1ThunderbirdThis update upgrades Thunderbird to version 91.12.0. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 (CVE-2022-2505) * Mozilla: Directory indexes for bundled resources reflected URL parameters (CVE-2022-36318) * Mozilla: Mouse Position spoofing with CSS transforms (CVE-2022-36319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.12.0-1.el7_9.x86_64.rpm25a5d69dab2c0d6e34baffa70a62cbf18dbce647a17972984ee25af215b4a716SLSA-2022:5776-1FirefoxThis update upgrades Firefox to version 91.12.0 ESR. Security Fix(es): * Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 (CVE-2022-2505) * Mozilla: Directory indexes for bundled resources reflected URL parameters (CVE-2022-36318) * Mozilla: Mouse Position spoofing with CSS transforms (CVE-2022-36319) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.12.0-2.el7_9.i686.rpme807c37430e440a90e53af5e3858b6d52894389f35fa4361859e909c484328e8firefox-91.12.0-2.el7_9.x86_64.rpmef66827a15fe99c87e24c7685945c40f106fa61acab0287487d7d79a8482bd4fSLSA-2022:5905-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) * xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-Xorg-1.20.4-18.el7_9.x86_64.rpmf198d70d27d6f20b08719a5d875253fc44f9ea11146514d27c98c6ab8c12ee7axorg-x11-server-Xnest-1.20.4-18.el7_9.x86_64.rpm6b9a477b42d0bf923e2e2cfd4dce74d98748caa2f83b94a587514bc46102bf2cxorg-x11-server-Xdmx-1.20.4-18.el7_9.x86_64.rpm6e5c93deb4573a33358916269db7b17a0df2403364718318c5afe97b2806bc9cxorg-x11-server-devel-1.20.4-18.el7_9.i686.rpm7aaefe51552cc5d7a9e2d6d51f58a94df47648dff8b4cefa9353ef3f54f1a813xorg-x11-server-Xvfb-1.20.4-18.el7_9.x86_64.rpmfcb5709e9084537571247640566e2680616a5db70de7491bd83278358e22a64dxorg-x11-server-source-1.20.4-18.el7_9.noarch.rpmec086e923e6853c3f484c456df0a9428b87748d4c26a3b10befb8b5716219d86xorg-x11-server-Xwayland-1.20.4-18.el7_9.x86_64.rpmf8c10d3f4bfb44128472809afe964e52451f3b4534c0438ad07aeadd2e0e8356xorg-x11-server-common-1.20.4-18.el7_9.x86_64.rpm29f5d4a1af552ddb0093c15683f86e51d39d9a055bfc5209ba2a26200449b8d7xorg-x11-server-Xephyr-1.20.4-18.el7_9.x86_64.rpma409484eb5a91f441cf24a219a3e24fb4a51587b5bf18385001d912889178772xorg-x11-server-devel-1.20.4-18.el7_9.x86_64.rpm546ecc8a110ab6d2c1d3b0362e1ffd9dd0ac923bed363397d560eeab0f72b7c2SLSA-2022:5937-1KernelSecurity Fix(es): * Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) * Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) * Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * SolarFlare sfc spurious TX completion * Page allocation failure on cryptsetup open * The kernel-rt crashes where one task is indefinitely looping in __start_cfs_bandwidth() with the cfs_b->lock spinlock being held * While using PTimekeeper the qede driver produces excessive log messages * The kernel crashes due to a GPF happens in mutex_spin_on_owner(). The known RDMA/cma bug that was introduced with a patch from upstream commit 722c7b2bfead is the possible cause. * Running LTP testcase creat09 fails showing related to 'cve-2018-13405' * Crash when releasing inode which was on unmouted superblockmoderateScientific LinuxScientific Linux 7kernel-devel-3.10.0-1160.76.1.el7.x86_64.rpmeb6c6858ee108768f74cbf482648a1d7c1468dfd9c6c14df31c4faea745a3aafkernel-tools-3.10.0-1160.76.1.el7.x86_64.rpm737ff7b8680df3b857d3386e5e33fb441444da64f4bfe0e9996d943dcee11bdbkernel-tools-libs-3.10.0-1160.76.1.el7.x86_64.rpm028e5f26d6cb86bc95b0a0583c97a367cd71cbf05b6115ec3aad3dff4c792abakernel-headers-3.10.0-1160.76.1.el7.x86_64.rpmae37ab166a3132528ba33a244f4de1a9f8644f0df5d3ff424056c0df935046d5perf-3.10.0-1160.76.1.el7.x86_64.rpm2ae7ad41b3cacbc8e843a4e3a0c6a2289ab9046e72cb3de23cdeb21488cdacd6kernel-debug-devel-3.10.0-1160.76.1.el7.x86_64.rpm96b836848019f779069f10177b6d425f351526684bbadcda46e1cc06aa2b006bkernel-doc-3.10.0-1160.76.1.el7.noarch.rpmd102f7c09caf2f06e44a067310247b90109993c49a4f5fe2756ef40119c67723kernel-3.10.0-1160.76.1.el7.x86_64.rpmef75240138a948d9fdc8669cf50f5ca70e48f2a9217acd6559577ca782b666fakernel-tools-libs-devel-3.10.0-1160.76.1.el7.x86_64.rpmd15c22331aa7656ad2f356b252b861f88a176d7a883bfa1c69c4e3098475777apython-perf-3.10.0-1160.76.1.el7.x86_64.rpmb054c8924feb65a2322d77acaac5203839c1217149ece08fc0b5da3c618a60b4kernel-abi-whitelists-3.10.0-1160.76.1.el7.noarch.rpmf05cd8f070add9cd4fc3e2dde0412e2e6f220d5c7bdc8a37e377e49c41637f11bpftool-3.10.0-1160.76.1.el7.x86_64.rpmbc87496d4e290c092d76890042f67cd51705320c826f03086ed3fabf4b4cb29dkernel-debug-3.10.0-1160.76.1.el7.x86_64.rpm10ebee491b5390dfd3a729a6195825d8dd9809bf8287f9cb321ebede65329e78SLSA-2022:6160-1SystemdSecurity Fix(es): * systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7systemd-219-78.el7_9.7.x86_64.rpm2b08ea19b057824d23fbcee8bb677679b7502f5b0b0cd38d60b7547ede2616e5systemd-libs-219-78.el7_9.7.x86_64.rpm3ed557aa85228f94cf8edce8c2bc89de8768a9ef050ee9928d68e6306501df1dlibgudev1-devel-219-78.el7_9.7.x86_64.rpmc7f3267ae4feb20d1d39d56a84a392e357db2ee1b34a6af2a7f7ffde61d30330systemd-resolved-219-78.el7_9.7.i686.rpm17ccc70a4c6b0fd4e36f601dda974f4c5f0d9c9da5cb3c348c54ee0039e5c5a3systemd-python-219-78.el7_9.7.x86_64.rpm621c4981bdbb67e3c0183a129cd2a51c36d6fa7b7940ed5ae3326fdf2d43bb06libgudev1-219-78.el7_9.7.i686.rpma813ab9e45be45a76c35df5060d6a236e18fd15fb13b2dd55ebc4f48a87f2b47systemd-resolved-219-78.el7_9.7.x86_64.rpme8fb0512bc5b5c66a605062cd97348245d57219d59f0fd14c5c12715017fe90elibgudev1-219-78.el7_9.7.x86_64.rpm02046f2acce4d5b8942b5e44d1fc5055a9e0e0f36e8463f3b17bc1a0155f4976systemd-devel-219-78.el7_9.7.i686.rpm2c5fc64cb5b0cb6df919385209c89eea049576a44a733ce2db2a119af579a726systemd-networkd-219-78.el7_9.7.x86_64.rpm774a53e5c24bc4ffbfa971d0686081c94f071eb3922e882ae90c82740f6c26dfsystemd-sysv-219-78.el7_9.7.x86_64.rpm3f89049498d61702206987358b0093989b9e8a226f794f03c941ede6b11b49d3libgudev1-devel-219-78.el7_9.7.i686.rpm3d2423fe28b482163248e160f4a471838e8c0a4f40308e6325cee4e2b4184e30systemd-journal-gateway-219-78.el7_9.7.x86_64.rpmd00824b3b9831e98c7a22512c63df9e320b7ab2769d49159dba45f99c212d93csystemd-libs-219-78.el7_9.7.i686.rpm48338899941ad604d5b84c5610d198837179fde1a03eb8301038ba704c2bcb45systemd-devel-219-78.el7_9.7.x86_64.rpm791e864b91024b15cba4e60eea597d4261f1926cd7c8f7a24e8158d8a15ba699SLSA-2022:6169-1ThunderbirdThis update upgrades Thunderbird to version 91.13.0. Security Fix(es): * Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) * Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) * Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) * Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) * Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-91.13.0-1.el7_9.x86_64.rpm6d85633aab8f9d5e33b46d20c0cb450d8b929292c3d4ec57f5cc9c4b9e1ca949SLSA-2022:6170-1RsyncSecurity Fix(es): * rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7rsync-3.1.2-11.el7_9.x86_64.rpm0c488dacb9f63cc2330889b3748f363389f63ac0c34cad4588f23ef4afe550beSLSA-2022:6179-1FirefoxThis update upgrades Firefox to version 91.13.0 ESR. Security Fix(es): * Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) * Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) * Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) * Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) * Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-91.13.0-1.el7_9.i686.rpm81039b2e705fbc6fb6c4ef61fcc0fc13592fb7a778009b300b41befb5500b044firefox-91.13.0-1.el7_9.x86_64.rpm098f44ada05d0d9010b129d6c9f3b00921b8b94b3568a4b550bc6cbd07339c37SLSA-2022:6381-1Open-Vm-ToolsSecurity Fix(es): * open-vm-tools: local root privilege escalation in the virtual machine (CVE-2022-31676) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7open-vm-tools-11.0.5-3.el7_9.4.x86_64.rpm2c7a540c07f75bbde969aab6fcd7643af51af971b6f2e604e30160fdf66c102bopen-vm-tools-desktop-11.0.5-3.el7_9.4.x86_64.rpm3736617d4ffbbee600bb2b187c796ea5a2e976c42a51bdc11310520b2a493cc7open-vm-tools-devel-11.0.5-3.el7_9.4.x86_64.rpmff5657209dd6cdfe32980b90cd40eb61d77c1f1fd633a53137d8429890940660open-vm-tools-test-11.0.5-3.el7_9.4.x86_64.rpmae6fb0521fdab2fd20a14ffb493fd0e72863d59051fe1d16f2bacd95df27ec89SLSA-2022:6710-1ThunderbirdThis update upgrades Thunderbird to version 102.3.0. Security Fix(es): * Mozilla: Leaking of sensitive information when composing a response to an HTML email with a META refresh tag (CVE-2022-3033) * Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) * Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) * Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) * Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked (CVE-2022-3032) * Mozilla: An iframe element in an HTML email could trigger a network request (CVE-2022-3034) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of- service attack (CVE-2022-36059) * Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix (CVE-2022-40958) * Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) * Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.3.0-3.el7_9.x86_64.rpm5c158e57590300fc7fdc7642fadd46a5c062d8f1d3f5aaf87fc01b93f3110114SLSA-2022:6711-1FirefoxThis update upgrades Firefox to version 102.3.0 ESR. Security Fix(es): * Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) * Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) * Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) * Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix (CVE-2022-40958) * Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) * Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.3.0-6.el7_9.x86_64.rpm16dfa4174101455cbdf4db85f950a31f77d7a7a7cf9fbb71aa501b68d60b6a48firefox-102.3.0-6.el7_9.i686.rpma90f01eb2e7fb81dada4d449816efb77b1bb64bffdf4774ddc2be5a93ff8d340SLSA-2022:6765-1BindSecurity Fix(es): * bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177) * bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7bind-export-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm8c8e95e6cc3d13d0a60fed32d2eb4c01f58f23a44d1ea1e09269db25a19f4b7dbind-9.11.4-26.P2.el7_9.10.x86_64.rpmc3c174c51b49054fc568a401d3333d3f72d60eb844202e128a35d9f0cab01f6cbind-libs-lite-9.11.4-26.P2.el7_9.10.x86_64.rpm452a47e1a5c85d5284ca3f3e624f93f3030863d7c1a716ec87f17c07d71bc3b0bind-sdb-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpm38640fd00904a57efd528c2c076063e966d23cc216db15d22ed891140254393dbind-pkcs11-libs-9.11.4-26.P2.el7_9.10.i686.rpma0032d922ee1ad824ece7bee12589cef936bea052cf91695a46f4d29d48d6950bind-devel-9.11.4-26.P2.el7_9.10.x86_64.rpme7245226cdf1bf2a601cfc69cd381ce021c02992837e33a08f03e0289d423f29bind-sdb-9.11.4-26.P2.el7_9.10.x86_64.rpm11614018e6fd0121a286ff84626820225434594f97ef7f85c052a069f293a302bind-license-9.11.4-26.P2.el7_9.10.noarch.rpmf46466f6f10683fea611257b1f00763bd3f9441b97de721c19ff378e9104c901bind-export-devel-9.11.4-26.P2.el7_9.10.i686.rpm262677c264df05452a69e4ef29c3b8b7136538cbde5e230c7c35518b233819f0bind-libs-9.11.4-26.P2.el7_9.10.i686.rpmb50a3aa1d2f5d7ecf431a390f9d95312f338c75c847f9be2e3ce68616b9bae5fbind-export-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm886b312819904b985a31a29c6186a922989129eab0a7d539381e01dee30876a7bind-pkcs11-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm3f00161ab3c26341c8ab2d1bd5a22440d71ec8908dc5ed389f963a4050321eadbind-lite-devel-9.11.4-26.P2.el7_9.10.i686.rpm83aa7de54f47a6e325acc11254c9c3f447811ac6ec120e214288e278d72eff6cbind-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm46d8f6e86bf934a2a672fae81dc95c4652b050b2a98dd17b7e4d282992199671bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.i686.rpm9b4f8ba068b3891a277d4e4615ca3f8c882bad7fc9094d902267527fbf3c0b8ebind-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpm3397207eef4b4b8230eb35d39e553433e864226d0f7dc4b0c8ecfa934e41c71dbind-pkcs11-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm214fd14b0d5694ca4ef19425be5f88df6e324ad67f5f416ff037ebfdba6cb2ccbind-export-libs-9.11.4-26.P2.el7_9.10.i686.rpm63caf82f0c27722f3bcae22df946bb32b1042778da5ba76ce4f064abfa8d687abind-lite-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm1043d386988aa361c430fc5bcf99f0e719c54e69c93b9b97dfafdb46f874b3d6bind-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm7b348a7112ff4e203e64deec4f3d72909188f2302ab758dc02062c2d8f9e884ebind-devel-9.11.4-26.P2.el7_9.10.i686.rpmf1713f6bb470b0d7457202d39cd42bb0d03db2b75ab696e5ee3eb58d714a7226bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm08fd5980cfa071b0029fcdc029d63ce1ca3649ef4a73d96a15a8a005ccfa9183bind-pkcs11-9.11.4-26.P2.el7_9.10.x86_64.rpm59d79cc06227b29ff85aad74c80d32ecf96007b4cf44413fc92d94beb89b51e6bind-libs-lite-9.11.4-26.P2.el7_9.10.i686.rpm49ff2ab782cd64e6e4716f6fd496983a988cbe706f2edb2e903a3ea0b9184396SLSA-2022:6815-1SquidSecurity Fix(es): * squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7squid-3.5.20-17.el7_9.8.x86_64.rpmc80eba4f4ea195535460958b789906d52c7dca95daf9b548071db9c6edb70a45squid-sysvinit-3.5.20-17.el7_9.8.x86_64.rpmf5822f2cb2c244fb13fc93edc60a914c70a7e9f764dd7558f0e676e6cfd06275squid-migration-script-3.5.20-17.el7_9.8.x86_64.rpm41e3aa29f321f1a3db9d6b6b48288842b2e41f3f75a1640d0fa9cbfd0fca8ef7SLSA-2022:6834-1ExpatSecurity Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7expat-devel-2.1.0-15.el7_9.i686.rpm6d734ec2dfb8d067b0ed9e0044f6ef41e53fb641f894c40f01b89b2257ed032eexpat-2.1.0-15.el7_9.i686.rpm9d0a2ee25f9603e4c03758b57ad0bfcb35d6578381841c4235ff2ba9c8415dbeexpat-devel-2.1.0-15.el7_9.x86_64.rpm1a55d904f7411d5734a35309c82dd5ef4d5f906ecb198aaccac3ba57c32cd8b2expat-static-2.1.0-15.el7_9.i686.rpm2b51ea7bea1db7ec6ffe364e0e55f7483eeb02d2f8a0600bc4fc5ac14f12a70eexpat-2.1.0-15.el7_9.x86_64.rpm342e80ce03829aa81d520b4d1765e109818f6341d410bc9e4f6a2fdbc2909fefexpat-static-2.1.0-15.el7_9.x86_64.rpmc5e62aa01f2a9979cde445da233c0ce980eb6d2124036f0f3e83246ed36c80d0SLSA-2022:6997-1FirefoxThis update upgrades Firefox to version 102.3.0 ESR. Security Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.3.0-7.el7_9.i686.rpme0034b680c6c69752f77043e773d5f536fd2346d3e56ad571c76cdd058167e88firefox-102.3.0-7.el7_9.x86_64.rpm4881290a113ee0c15753bc4b63202747fcc727620c5089ba94fd2b563cfc69c9SLSA-2022:6998-1ThunderbirdThis update upgrades Thunderbird to version 102.3.0. Security Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.3.0-4.el7_9.x86_64.rpm94b25799df156b6c9c081860f77acd08ce9c5579d31716471499eed12aa9892aSLSA-2022:7002Moderate: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 8u352) (BZ#2130371) moderateScientific Linux 7java-1.8.0-openjdk-demo-debug-1.8.0.352.b08-2.el7_9.x86_64.rpmd56beb31d4ce3cb40cf06a3da3e78ecd7188dc0ef89bbeedb94fc05c0da906ccjava-1.8.0-openjdk-src-debug-1.8.0.352.b08-2.el7_9.i686.rpm4c8ef6112e9d00d3c6897a771b2774d74c339bbf0f83958034f4d72d835cd2d8java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.352.b08-2.el7_9.noarch.rpm6e34c23528db17618c9dd959117bb35918d8f396ab75fe755a6c734c75e7c2dajava-1.8.0-openjdk-headless-debug-1.8.0.352.b08-2.el7_9.i686.rpm1be77c0923180bb6caffdaa7116b170fc598c54a75b6e745b6896909ba4e42b0java-1.8.0-openjdk-src-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm094e338d13280eafaa2a1d56c0f5adf1d3f81d8d1d598ed6c3040a4ecc5cd17ajava-1.8.0-openjdk-javadoc-debug-1.8.0.352.b08-2.el7_9.noarch.rpm5c369b93e91db39be0f766c413578e7144f0d877463e12c8ed344fb2659ae60cjava-1.8.0-openjdk-headless-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm4bfda19ee57fc0edbd38c9fb1dbfa2dcbd1acc677d17dea82b097a8dead97ce4java-1.8.0-openjdk-devel-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm95a8274eacb0e615ccba63bfbe4f25693e055dee17e4c21aed7978ac968b5afbjava-1.8.0-openjdk-accessibility-debug-1.8.0.352.b08-2.el7_9.i686.rpmdc22f9c7db829153bef1e0f454e626f978408ef1d954b33a4725accf8f502246java-1.8.0-openjdk-accessibility-debug-1.8.0.352.b08-2.el7_9.x86_64.rpma7c2844adb412d23f0d44e2406a02168ad616ab6782ab507b23e4d630a4658dajava-1.8.0-openjdk-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm393037559109238206721f2850b69dbfdc4d63c4b5e2049aff4a6c4593ea3120java-1.8.0-openjdk-demo-debug-1.8.0.352.b08-2.el7_9.i686.rpmeb968d4f78a6de548c383fc6057ce11701ee12320697f918a3d3c36db9c1a8b2java-1.8.0-openjdk-debug-1.8.0.352.b08-2.el7_9.i686.rpm3a8ef487dc22dee957cb88c32af7efce732327055257cba68d755bd424e1c661java-1.8.0-openjdk-devel-debug-1.8.0.352.b08-2.el7_9.i686.rpm6efff0a7e6bf24d99c9292a1fab2cff2f82e77dcf81c55fa22b52b16117b5542SLSA-2022:7002-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 8u352)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9.x86_64.rpm045324cf39dd8d58706f6c90b421bbfe82dfbf1fa1bb614becf94af1bc5598fajava-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9.noarch.rpm5154bc849ea4faebc2df3ec151a2fff7e579d7bc8a0d6a92bc7ac3916e8eea85java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9.noarch.rpm236fc0b6fe5e63a031d98dad0282a0005276e6457b19792171ae5751c4893b88java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9.i686.rpm41b5cd44eeaf21dddc7a8fcab47c64a450d31c421149160feac0d58851312e23java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.i686.rpm2260ae4a9e1b4fbdc73d15c0eb9a3dcfed10e6602ba22c01363528045e961b90java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9.x86_64.rpm005d42f99b2171c26982cc7d7311934935a2d5ef23bd81e748c826b7a70de691java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9.x86_64.rpma9bf6ced787401b1a48a4b41f761037e5e24b17ad998f1b2069c7b505a083177java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.x86_64.rpm34c31532c398cfcf388c394b3470d8cd2074534ee132f770cd1080c685bd2094java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9.i686.rpm00123b9b7145ddc44227277d96a63acd537f393cd5183070bfb01762289c2419java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9.i686.rpm7c587708770b27a9d455b30e4f3118d410595e4a047187a377f94a272a742edfjava-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9.i686.rpmd723f61e6ce4a05c6683286586fb847941cafacb422bb68c40f35346c7b8e638java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9.i686.rpmf2bba7fd17da0be94b52d99e7efa8b27dbf3fa40e964595c6cdb331544f0a2edjava-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9.x86_64.rpm5527a326f0fca48935071a78978625a171fbfa130ac8b939a086a633a8e9eb7fjava-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9.x86_64.rpma85d45511bcc33ddbb1351d215ec9e16b644ecd45a8ef08c6c927cd4c8284f88SLSA-2022:7008Moderate: Java-11-Openjdk Security And Bug Fix UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) (BZ#2130373) moderateScientific Linux 7java-11-openjdk-demo-debug-11.0.17.0.8-2.el7_9.i686.rpm9b30e0b4114447ecba9284f9f8bdc7a7fad055bd25fa4d0f940b2445b6a19073java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7_9.i686.rpm65a4fae1ca173d02255c130907fcd50e78168bc5bc4135e20df69177bd56c619java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7_9.x86_64.rpm3d3a96485558332be7609acf9e84226055ff1d14905e59a943ea18cbab036696java-11-openjdk-demo-debug-11.0.17.0.8-2.el7_9.x86_64.rpm9c23f12f9a5495a548e1c9459308e84b9e9bc0ba240fa1dc77ea08baf93b2e62java-11-openjdk-devel-debug-11.0.17.0.8-2.el7_9.x86_64.rpmc794784018586395306109eb35a4e7a2b0af066a1c512f075ad22511bcc300c4java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7_9.x86_64.rpm0b5a939ef30c149d7c8bc37d653dba5e91cc9800a95b7105afb9d53461fc42efjava-11-openjdk-jmods-debug-11.0.17.0.8-2.el7_9.i686.rpm1f9d95412225790c9ee7352e4f91df4e7802ba3277c8d8dd51b1739db7ad3664java-11-openjdk-headless-debug-11.0.17.0.8-2.el7_9.i686.rpmd885ab7433ac56582a23b9ecd7d23131073867860a272dd26173cf376f16f65ejava-11-openjdk-debug-11.0.17.0.8-2.el7_9.x86_64.rpm49bf2f5320e238c6aae952f0a51052ed5e6759fc81e272117e30c0e39b6ad55bjava-11-openjdk-devel-debug-11.0.17.0.8-2.el7_9.i686.rpma887b2c3dd2ffe619fdd61c8fb2ddc15918bda4b3ecdd06aace9b65e7f335952java-11-openjdk-jmods-debug-11.0.17.0.8-2.el7_9.x86_64.rpm9f96cafc43c20dab9078c4fff5050241c0a92b28af68e4fab5160bed79580a44java-11-openjdk-src-debug-11.0.17.0.8-2.el7_9.i686.rpm906dbfba89f53fba9d831aef188204c768faea406c5c6cac748650a2acd5b2ddjava-11-openjdk-src-debug-11.0.17.0.8-2.el7_9.x86_64.rpmbe16072fc3b3928b5e29e9ac8de897e345b1e7c05bc5a3653394f190a516a935java-11-openjdk-static-libs-debug-11.0.17.0.8-2.el7_9.x86_64.rpmd220f2012589f2cb3f6a2a35c2d450e9d046810cdfad7162041dbac644ee5a24java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7_9.i686.rpm873e1f41f194c4720c8b728c6fdca7682b625710ee7b6335f64734b3c5937f49java-11-openjdk-debug-11.0.17.0.8-2.el7_9.i686.rpm01ed2ea371ef11fd32780c19716eb34a3b66e3eaf3a493095e65bf86f69521c5java-11-openjdk-headless-debug-11.0.17.0.8-2.el7_9.x86_64.rpm26122d4e60e887d73eb597edad58173f18d3ca9cc960670b3ba34cfc89627058SLSA-2022:7008-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17)moderateScientific LinuxScientific Linux 7java-11-openjdk-headless-11.0.17.0.8-2.el7_9.i686.rpm2e2f4282ea556b93790aa1f19bba98323f97261add22e01175952f7b54180271java-11-openjdk-devel-11.0.17.0.8-2.el7_9.i686.rpmc6dac67cc14997f8bdd2dd3f7c17a5356cf1dfd544c537e4a4cb1be83e411dc5java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.x86_64.rpmf3eba0997d80fd02f0641cb91ef9d3e79154b864cb8ec725b3468e6772c85942java-11-openjdk-11.0.17.0.8-2.el7_9.i686.rpmd68cb771bd42bb1114ef6559d8f7a51c2fd9e2ef435ad5a94dcb10744af7837fjava-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.i686.rpmb68bc607c222aa7323545ccb3262e624a17ad28dd04cfe4f0575a0cd6a14b905java-11-openjdk-devel-11.0.17.0.8-2.el7_9.x86_64.rpm15ab7a5216ed7697b80152e664dad4c0118228e2efbe7fde553627ef5d0fe1d6java-11-openjdk-11.0.17.0.8-2.el7_9.x86_64.rpm897a35cd9ecd8fe3605aeb9f800e834335b04aeeb756419b111fa6910fdbf20ajava-11-openjdk-src-11.0.17.0.8-2.el7_9.x86_64.rpm4e1a6147713db1f4fafbd879be92ce02a46966b7dbf0474b43eed85ffbb4bdb7java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.i686.rpm85858b751048b26cad16d92415828e9468ee5835840e547c549c00e31fade5d3java-11-openjdk-src-11.0.17.0.8-2.el7_9.i686.rpm5b6289d4a8c6cfb1938a28dc1a42b9849c012856d101f1ee0e69e621a979d06djava-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.x86_64.rpm5f7eb56248f3f5eb23975d3b7bae6acb884bcc24aeab2c6d51c80277274f28e8java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.x86_64.rpm28fc66558d2ba55d75d14e50f8816694f309cb296e8ac95a22655364e2a0c176java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.i686.rpm79f01ac42da78f71404bcac3d62dcc7c6f3d60100a33b8e1eff91f9c25d75210java-11-openjdk-demo-11.0.17.0.8-2.el7_9.i686.rpma70dbda492c78313c14a7a84828fc160b387bb1a1ea3ebfc2901e4a1ada2c63cjava-11-openjdk-demo-11.0.17.0.8-2.el7_9.x86_64.rpmbc21f6281a4762c1b3a272002479649491b01a68954c3962d4c7a75c38390c5cjava-11-openjdk-static-libs-11.0.17.0.8-2.el7_9.x86_64.rpmde645229b378ac294b1976bb731ce4336a91191ebb1573bb8f042b109397b583java-11-openjdk-headless-11.0.17.0.8-2.el7_9.x86_64.rpmbbb34fc805b6ee57991a015d7ae9bbfd4de8f6f6685a0a5a6e8dafee0f0e24a7SLSA-2022:7069-1FirefoxThis update upgrades Firefox to version 102.4.0 ESR. Security Fix(es): * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.4.0-1.el7_9.x86_64.rpm0642373afde8eacc9aeeb43c40c54bcf7c9f3749c7a1a8ea40e35825d201482efirefox-102.4.0-1.el7_9.i686.rpm9acb24fcb2dfe02086a689c5392f6c45d84459580fd79b2d14ce0993dc21d96cSLSA-2022:7086-1Pki-CoreSecurity Fix(es): * pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field (CVE-2022-2393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7pki-server-10.5.18-23.el7_9.noarch.rpm09524799484444a63b913868881e250af4f0119140f1ca99fc6c4fbc468cac6bpki-kra-10.5.18-23.el7_9.noarch.rpmf76d979333f8434d23757f3b6e1bb28343747049e0a10cb5252ebcfe5462802cpki-base-java-10.5.18-23.el7_9.noarch.rpm794c5cb52ab984ec7528d71a07eb08a8e2d93ef75e10ebf594d4c42cb40b248bpki-javadoc-10.5.18-23.el7_9.noarch.rpm167f14b76c2519a957b28c4c1104739f821a2f2943f3b31f34437ebcd68f8bf9pki-symkey-10.5.18-23.el7_9.x86_64.rpm49a97d887f18cea8d21db6e43d88473304c72347ec23df948a7058b2922e07c9pki-tools-10.5.18-23.el7_9.x86_64.rpmfd9f9a6b2d9168cf15bba41c981c54459bce435098ec52d0c4827685bcb01ea7pki-base-10.5.18-23.el7_9.noarch.rpm953ae5767d157d431e1c9bb90cd2151636d8e605ec23df90789c96372f8602ddpki-ca-10.5.18-23.el7_9.noarch.rpm02068486401ee6b5051a65921893a41da030562b0a46be4f00fbd004f9119515SLSA-2022:7087-1389-Ds-BaseSecurity Fix(es): * 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Import may break replication because changelog starting csn may not be createdmoderateScientific LinuxScientific Linux 7389-ds-base-1.3.10.2-17.el7_9.x86_64.rpm944f95622365738fafccebbf63316eac7d691e3e470ee9fc33d68fdba098b14f389-ds-base-snmp-1.3.10.2-17.el7_9.x86_64.rpmd8d451f7a840ad2daf7160514343a7d0803e7f24b76086999548e5715fe5b085389-ds-base-devel-1.3.10.2-17.el7_9.x86_64.rpm6ec4b181ba625b39344fcbd044793356d3549213cbf7e94806dd06fc38d84a17389-ds-base-libs-1.3.10.2-17.el7_9.x86_64.rpm77db2d2adfa7d50b05eb1f3eb8f39fb488d0a6b36121d361057dff940ebd85d3SLSA-2022:7088-1LibksbaSecurity Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libksba-1.3.0-6.el7_9.x86_64.rpm7e11e6a81df1d6272e17a03009a28d7943a6cabd68bf3a923c6d89ead0769d2flibksba-devel-1.3.0-6.el7_9.x86_64.rpm673f0822ba542ac61ce573dca842da2c6661e75fb2de30e86bad51cb7a6237e3libksba-devel-1.3.0-6.el7_9.i686.rpm07a063e3cc370de7bb840c75e0f4ee06e5c777a7c18b843916c71c484ca8e943libksba-1.3.0-6.el7_9.i686.rpm533730773bb7dfd38472b7e70e42eb7e2ffd62449d70aeca13d4019900e8f8b8SLSA-2022:7184-1ThunderbirdThis update upgrades Thunderbird to version 102.4.0. Security Fix(es): * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) * Mozilla: Same-origin policy violation could have leaked cross-origin URLs (CVE-2022-42927) * Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) * Mozilla: Denial of Service via window.print (CVE-2022-42929) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.4.0-1.el7_9.x86_64.rpm751d9af64cbed054e4ce9d25ba8de957cfca2e6b6bbc6e583f6bb7e955e8e702SLSA-2022:7186-1Device-Mapper-MultipathSecurity Fix(es): * device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7device-mapper-multipath-libs-0.4.9-136.el7_9.x86_64.rpmc0417cd8fbd8cf0ebb675b89fe1472401299dbe36f3fe4832a6fd6f3d4820ee3device-mapper-multipath-devel-0.4.9-136.el7_9.x86_64.rpmfe3b267788d109ff4f28777fcc00dafaa6669cae749057415a1194fe94cabeeclibdmmp-devel-0.4.9-136.el7_9.x86_64.rpm30ca5556be8eab6e7c22d594443e7627ddc1d414751cad4b31556d244787ce56device-mapper-multipath-0.4.9-136.el7_9.x86_64.rpm55013cb7881446aa95631dfd591cde64b649c7a1b91c942d131bc49e117c0ff1kpartx-0.4.9-136.el7_9.x86_64.rpm0df134d6cc6152e6ee502a0590a4f10aeaabd870624486bcd1ecf804d0376e01libdmmp-devel-0.4.9-136.el7_9.i686.rpm7d73ab67bd157e7d42989546fe383af91118f2bb5afa94b5ac0ca82ce2d6d9b2libdmmp-0.4.9-136.el7_9.x86_64.rpm859220b7a7116671fa883778eb026c73853085eb18dcdf85d37c6f13904a8b9blibdmmp-0.4.9-136.el7_9.i686.rpmdf30e350eaf3d5d7eff406c4e548aea30732ea9564ea84403018876c810e2664device-mapper-multipath-libs-0.4.9-136.el7_9.i686.rpm16b497a2a5748f83372ecd97c9a53caf6a56c5136e039a3ec351c7ac6074fa26device-mapper-multipath-sysvinit-0.4.9-136.el7_9.x86_64.rpm125e697568c384f2b0e8b1e81a067b11d599fe7a078c7ac2347729e66a6b21e6device-mapper-multipath-devel-0.4.9-136.el7_9.i686.rpmbe0f0cbdc39232617d8f56ea6b5c387a8e7a5fdc378e8379553adcca324e81f0SLSA-2022:7337-1KernelSecurity Fix(es): * a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588) * RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900) * Branch Type Confusion (non-retbleed) (CVE-2022-23825) * Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * lpfc panics in lpfc_els_free_iocb() during port recovery * mlx5 reports error messages during shutdown then panic with mce * Kernel panic due to hard lockup caused by deadlock between tasklist_lock and k_itimer->it_lock * fix excess double put in nfs_prime_dcacheimportantScientific LinuxScientific Linux 7kernel-debug-devel-3.10.0-1160.80.1.el7.x86_64.rpm371b608b0e17311b77cbb5c189256e34e26616d68e63c2377d3cf2fff2738f6ckernel-doc-3.10.0-1160.80.1.el7.noarch.rpm8ebb2c2be13c520a0bc08dd36c7d3f6986cb16e3999e3ef5e1a0405227ebaf19perf-3.10.0-1160.80.1.el7.x86_64.rpma45033d911a9951c719cbe1aff04fcf2216b4196f99c28010beb30b26f3366cbpython-perf-3.10.0-1160.80.1.el7.x86_64.rpm059abb1c94a1beb4ff872ca8ea2dc9faf621c414a90dcfedfa5922eabf27bebekernel-tools-libs-devel-3.10.0-1160.80.1.el7.x86_64.rpm4a71676849293f3c9f03b00e00d398df59415f2b4b2b146f74ae8f5583d347efkernel-tools-libs-3.10.0-1160.80.1.el7.x86_64.rpmaac2543f8b404cc85519fca1c32a189b44db191d78a4d19345e5b2963c531436kernel-tools-3.10.0-1160.80.1.el7.x86_64.rpm2d77fae8e1d3117d2bd2d48cbc79b5c3dcbf58c48a6f8b9be6a2681eee9d2806kernel-devel-3.10.0-1160.80.1.el7.x86_64.rpmddbdb5dffbf590e495a3f442dac24a81a3cc0ae681eb42fe5853a68d2ea2b6b0kernel-debug-3.10.0-1160.80.1.el7.x86_64.rpmdccc8cb1637b56a31daafec03d0f5618c74aa0c35c407136d3c447b661adf7fckernel-abi-whitelists-3.10.0-1160.80.1.el7.noarch.rpm0f478084fd9a6ac71bdfe4f6a6d68c360817fe8b8875cfc733e46165b5230a67kernel-3.10.0-1160.80.1.el7.x86_64.rpm334bf15c70cbd6233c3b86e566248a9996c9e25a541f91113f6bc278a09ccf45kernel-headers-3.10.0-1160.80.1.el7.x86_64.rpme1b1fb5a43dba7bdcc17a379221e8dfe0084b0a62bf19934dd34a293e0cd6565bpftool-3.10.0-1160.80.1.el7.x86_64.rpm5b1549f366029a1777a0a1672a63ecb1070ceef48b309f5f3315442f9c000764SLSA-2022:7340-1Php-PearSecurity Fix(es): * Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) * Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) * Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7php-pear-1.9.4-23.el7_9.noarch.rpm03d25f58bd03ae554728125a505e13150c6f9bc8eae411c41dc195bb34099c22SLSA-2022:7343Important: Pcs Security UpdateThe pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. Security Fix(es): * rubygem-rack: crafted requests can cause shell escape sequences (CVE-2022-30123) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7pcs-snmp-0.9.169-3.sl7_9.3.x86_64.rpm390b97770cab2e1374c50ec3619000ebb7872e23a8419e960c92041cfff00a83pcs-0.9.169-3.sl7_9.3.x86_64.rpmf8d9e60d0aa9c4ead385ae3725133bd8e1593e67285fa304ad0fc02bc6e3ef31SLSA-2022:8491-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c (CVE-2022-3550) * xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c (CVE-2022-3551) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-devel-1.20.4-19.el7_9.x86_64.rpm3e3432461e7d3bc68549c1872fde8eac9e22004155b343f0d5e98e0a96a6debdxorg-x11-server-devel-1.20.4-19.el7_9.i686.rpm0fd6387e097cf045b57e24a56d2da4afee38e756dc8ed403e95263f6356547e0xorg-x11-server-source-1.20.4-19.el7_9.noarch.rpm9023b819fdd94631d36f8be6c4c146489ca13e1134cb7e713d0846a2190816f6xorg-x11-server-common-1.20.4-19.el7_9.x86_64.rpm24376753e027a21ae6fa8e7b389c76538157ed9e06b64e44fc9b89a99fc6c10bxorg-x11-server-Xwayland-1.20.4-19.el7_9.x86_64.rpm5618774205f6014628aeee0dcf61781f52a0f265211147dffb51967c92942fdcxorg-x11-server-Xorg-1.20.4-19.el7_9.x86_64.rpm9ceb862a8744affd6ac8c2d38d756324460ad2cfe084621de13c075aad9590e2xorg-x11-server-Xephyr-1.20.4-19.el7_9.x86_64.rpmd0fcf4663345dc9465ef599962e37c0682546d1e76426a1e946245c0910ab558xorg-x11-server-Xnest-1.20.4-19.el7_9.x86_64.rpm0e1d8fbdd9864e1c01862fa15e6d601e0b230ee758da7838f905cf728054aed5xorg-x11-server-Xvfb-1.20.4-19.el7_9.x86_64.rpmaef148d20647d6392ce3a307b6305368d22ba19d28efb86fe15f1a90f02466a6xorg-x11-server-Xdmx-1.20.4-19.el7_9.x86_64.rpm3472ac91cc88a2b629fb6dc03cee388c9e0d7bb8d3e476526b7074480d663b2bSLSA-2022:8552-1FirefoxThis update upgrades Firefox to version 102.5.0 ESR. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.5.0-1.el7_9.i686.rpmfbfdecd9b75c9285060bf545f775eec9d54c680f703ee44634b2d6892b5b62c6firefox-102.5.0-1.el7_9.x86_64.rpmd9246fd451ec95c47e1faae3b828827c1a897d3a0447c57b2a79e744347c42d4SLSA-2022:8555-1ThunderbirdThis update upgrades Thunderbird to version 102.5.0. Security Fix(es): * Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) * Mozilla: Fullscreen notification bypass (CVE-2022-45404) * Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) * Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) * Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) * Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) * Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) * Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) * Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) * Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) * Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) * Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) * Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.5.0-2.el7_9.x86_64.rpmaa6b87752deb674efc6faf9d021e36523a29be598aba27f9627d9118f480c8aaSLSA-2022:8560-1HsqldbSecurity Fix(es): * hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7hsqldb-demo-1.8.1.3-15.el7_9.noarch.rpm52afec8b8d834a50847f845c3d07024d94af6ecde1019872ddfd1b8f7ae27ca6hsqldb-1.8.1.3-15.el7_9.noarch.rpm227ca9d80bccfb61a5790605ed02ff16da540572df48e3705884964262444a56hsqldb-javadoc-1.8.1.3-15.el7_9.noarch.rpma27b384f2e00296902b1a0fc4191f3ba7316a3fafd968e944e37f19a4d7151f6hsqldb-manual-1.8.1.3-15.el7_9.noarch.rpmd37aa571bfe6d88ad8c91d832ce9b4681a923db382482dd0c616e245e37ed2c2SLSA-2022:8640-1Krb5Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7krb5-libs-1.15.1-55.el7_9.i686.rpm1f711a5526449ed91253280ae45242d477b1abc458cc6d2cbac38ad0ae33cf20libkadm5-1.15.1-55.el7_9.i686.rpm88bb67fe414e2b7cb835e8232d313bf8ca0a6cfeb75b7e572f7752d8edec8c64krb5-server-ldap-1.15.1-55.el7_9.x86_64.rpmfdd36b73b8525fafedd6d7583da11d48fed0c3152cb1f6781efc425b05152380krb5-devel-1.15.1-55.el7_9.x86_64.rpm7c2e5c8e65ee6cc4042785a0ed36f99435254246f07260981f47b848921e61f2krb5-server-1.15.1-55.el7_9.x86_64.rpm5c22318fd10f1e807a87454ab210b4f1c3e5681fb931becfd7a866a37476808akrb5-devel-1.15.1-55.el7_9.i686.rpm0a98cd60d216e78afb2bfd8c25bf46c2aeeaa1b4412b3000c702a8c4db02bf32krb5-pkinit-1.15.1-55.el7_9.x86_64.rpm67b71dd1972f73c992e99e75c2204ca00ebc4d6979e0f833c9c14125ff4b7229krb5-libs-1.15.1-55.el7_9.x86_64.rpm94051fb415c683c99563089edd3efdc1c89803c3a5dd6a5d552d6fc0e302e3f7libkadm5-1.15.1-55.el7_9.x86_64.rpm09c4105398d0ebfda101c5733482baba1a78c10c09214d066630e4b93b368142krb5-workstation-1.15.1-55.el7_9.x86_64.rpm632e08ca81c5804305ea37d3a31eb3043c022e5f3f5477ad7dfd0fa39ee52e83SLSA-2022:8799-1Pki-CoreSecurity Fix(es): * pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7pki-symkey-10.5.18-24.el7_9.x86_64.rpm3763d3b06fa5adf88b1d856ec6e4df9ca072e85bb4c81802e242f92a276ff808pki-base-java-10.5.18-24.el7_9.noarch.rpmdec3a16ca4abc10365d37dd7f5b56d884f68dbd6daf866b94879a8791d0a7e07pki-tools-10.5.18-24.el7_9.x86_64.rpm0ab55652836140beb57a6c63f61647209cab3de7150476eb35cc8dadbb914db0pki-base-10.5.18-24.el7_9.noarch.rpm18901f2122cb5943d0653f02b4c62053e7f560ed6ea4b756c5423076d84d3234pki-server-10.5.18-24.el7_9.noarch.rpm56e94336222080a7ff07384101ee0283b3bd10c37c4f2a80c0829109bdad74bapki-kra-10.5.18-24.el7_9.noarch.rpmf9f6a70b5fce40e571b34548f86c5a4c3396d08b883a8cc489278f380a075b20pki-ca-10.5.18-24.el7_9.noarch.rpm2e0f47fdb4abae43cd3dfed8b80839aa1d2a766c0251406381fe380f81392d07pki-javadoc-10.5.18-24.el7_9.noarch.rpme5f1fc8f795dc8659b0e65e19d84f650ff31d2784ff1fe8a16f794d5ec3b3847SLSA-2022:8900-1Grub2Security Fix(es): * grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7grub2-efi-x64-2.02-0.87.sl7_9.11.x86_64.rpm99f13a06930fd8354a1ce96c33a6259dc91161f7b09891410980dc420ccabe97grub2-2.02-0.87.sl7_9.11.x86_64.rpmc2dcf0ed508fe4acc3f214e50869ff48cf0886c74714a2577e2b67d762855fc2grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.11.x86_64.rpm5918876ca7da16670b153194d5a341cb7761ae6492372e7072ddbdcbaa42b5a8grub2-tools-2.02-0.87.sl7_9.11.x86_64.rpmf30b3c3195f950bd75b2d21900762fcea27dab83ae1e850266e2850f25457554grub2-efi-x64-cdboot-2.02-0.87.sl7_9.11.x86_64.rpm4cd257f520e9638b7cb458d48fd0d283e107960078011156a3a8f36c9974390fgrub2-tools-minimal-2.02-0.87.sl7_9.11.x86_64.rpm9c6b61af8090eac77335eb6d8ba3ad60833940748bdf74b499bb951f9894f65agrub2-tools-extra-2.02-0.87.sl7_9.11.x86_64.rpm71306d978b90994b31c82c9d7f9b4af1f9ebbe05b1359243d83f10b9ee71c6cfgrub2-efi-ia32-2.02-0.87.sl7_9.11.x86_64.rpm4ab89cd7a4d82eb2be1409e571f0e0f0f84c29a5a46305d549fcdac72816dbe2grub2-pc-2.02-0.87.sl7_9.11.x86_64.rpmae59cc1a85e6dbfbef53c30ebefb1e2fbc1ecf5ea64dd5e219acdadc8d54d936grub2-common-2.02-0.87.sl7_9.11.noarch.rpmbe8001b8070d239f5aa659ba3935f0f12f041c36098d269c6d3d646e3d909995grub2-efi-ia32-modules-2.02-0.87.sl7_9.11.noarch.rpmdde4f7b829f72d95ab2c64758b3984d14e513648d5e16960635f19b9dc224db0grub2-pc-modules-2.02-0.87.sl7_9.11.noarch.rpmd7305826250898110bd4c2b6011ec147aa73f2c34cb7264f62528928a896b020grub2-efi-x64-modules-2.02-0.87.sl7_9.11.noarch.rpm797f457079572c3ba99445cb9db9c3650c7144d48d2f65ded3f11256a3524432SLSA-2022:8958-1BcelSecurity Fix(es): * Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7bcel-5.2-19.el7_9.noarch.rpme0cca685fe9940435681041174b6a4030eb581bc4e5308f7b587e3d4d1a0beffbcel-javadoc-5.2-19.el7_9.noarch.rpm7a618a7aa2a41af5da430d391a804277066289904fbe29cd4ea8fd0354b7774fSLSA-2022:9072-1FirefoxThis update upgrades Firefox to version 102.6.0 ESR. Security Fix(es): * Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) * Mozilla: Use-after-free in WebGL (CVE-2022-46880) * Mozilla: Memory corruption in WebGL (CVE-2022-46881) * Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) * Mozilla: Use-after-free in WebGL (CVE-2022-46882) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.6.0-1.el7_9.i686.rpme520550281c9f7c97655685cc5ab1c53c4a4958a2cba6c34d6294d78b179cbebfirefox-102.6.0-1.el7_9.x86_64.rpmaa5d2fc2abac7f2b6755b0d75ad9e00a5b88aa7f311c0f4be1cb30c09bf76cc0SLSA-2022:9079-1ThunderbirdThis update upgrades Thunderbird to version 102.6.0. Security Fix(es): * Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) * Mozilla: Use-after-free in WebGL (CVE-2022-46880) * Mozilla: Memory corruption in WebGL (CVE-2022-46881) * Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content (CVE-2022-45414) * Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) * Mozilla: Use-after-free in WebGL (CVE-2022-46882) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.6.0-2.el7_9.x86_64.rpm42b9264f75fcbd01966a937d569bd365f98c1c7bf4d83596b2bda5b8f060f137SLSA-2023:0045-1TigervncSecurity Fix(es): * xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283) * xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340) * xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341) * xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342) * xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343) * xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7tigervnc-1.8.0-23.el7_9.x86_64.rpmdd3017d51e87041cf20c76409022f16c604d3db82fea92764bea0ddf3064c1b1tigervnc-server-1.8.0-23.el7_9.x86_64.rpm8ba2077105eacdd811c769c72a7a9834e55b37f61af9aa7a754fe0f5349b81d8tigervnc-server-minimal-1.8.0-23.el7_9.x86_64.rpm1ba07a8cbf1e41a0a31c664a7bcdb64fb1a5c15aaf675dfbee04f9eeadb76ed1tigervnc-license-1.8.0-23.el7_9.noarch.rpmd4918406587f5ee86cb34b02ced600c4cebc2d49094803a34f912ac6eca5f403tigervnc-server-applet-1.8.0-23.el7_9.noarch.rpm3ce399d5291dfe9f6ea5866ca916bcc44ba1327dffe7d42ff380a8f88cc519f5tigervnc-server-module-1.8.0-23.el7_9.x86_64.rpmf749036b2eec25233c9739ba858271abbc5c050abba51fb05efa087350fc4b77tigervnc-icons-1.8.0-23.el7_9.noarch.rpme06f8c903c7c8f2a55c2d691f7635c0450f53b242cc4ca08b2e927dc07d534c4SLSA-2023:0046-1Xorg-X11-ServerSecurity Fix(es): * xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283) * xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340) * xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341) * xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342) * xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343) * xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-devel-1.20.4-21.el7_9.i686.rpmb225aa56a8ca3c634abadd18923c8556e372e00b4f2048ef8e8d024f00048859xorg-x11-server-common-1.20.4-21.el7_9.x86_64.rpm79d53e5d5cb651278f2afcb1294f9b7f02c9247a3adaca45560400fc0b570f88xorg-x11-server-Xnest-1.20.4-21.el7_9.x86_64.rpm3b2ce032e3823928c8c7b39a8f3485b7f98ff75c1d93d5522b13f387742cbcc1xorg-x11-server-Xvfb-1.20.4-21.el7_9.x86_64.rpmb2b56bdddd55759d19fe1cda40eef9a558d83177e52e4d4febb2674bd11183c4xorg-x11-server-Xorg-1.20.4-21.el7_9.x86_64.rpmd55a20b8c13216c9b26bbf8bfa3968a8ec696e167a952acd479fc8c88a25a143xorg-x11-server-devel-1.20.4-21.el7_9.x86_64.rpm31d5dcfa4b14c22d9148fc0343746d4e468c267bbc21e3beb4b573c099e60c48xorg-x11-server-Xephyr-1.20.4-21.el7_9.x86_64.rpm579384683f9a00c1f779d2d356627975bbffb7fb22b45183c7cd129615eeccd5xorg-x11-server-source-1.20.4-21.el7_9.noarch.rpm51c813defbae680877830c3caba839f053ef6b7004088f7358c28d288113e7c5xorg-x11-server-Xwayland-1.20.4-21.el7_9.x86_64.rpma47e375d2cf9f34c2ccc30d20c6f94d619c492ccc51715729c75b314e3f58d67xorg-x11-server-Xdmx-1.20.4-21.el7_9.x86_64.rpm18862f831a03ed2aefa268c9c5bbdce8b7b977d0010a4d6a2f547d37b1c2e861SLSA-2023:0195Moderate: Java-11-Openjdk Security And Bug Fix UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) (BZ#2150192) moderateScientific Linux 7java-11-openjdk-javadoc-zip-debug-11.0.18.0.10-1.el7_9.x86_64.rpm4fcccdefc071d921599a1e7c4bc3a4f5fa074bef39e0504866e93dc5f91f2531java-11-openjdk-demo-debug-11.0.18.0.10-1.el7_9.i686.rpm5721c7753a72eac303fe3255b37283d95fcd94c7376c2d4ebbeeedff3a096af1java-11-openjdk-javadoc-zip-debug-11.0.18.0.10-1.el7_9.i686.rpm51b99f58322d567cddd042efbc869f373b52e933383e45a66c97ae8cc45e1f63java-11-openjdk-headless-debug-11.0.18.0.10-1.el7_9.i686.rpm6a258f5f2f99e2e656619c7f5f3b6b7f2023b8f901c0a0334873b94fdc941b29java-11-openjdk-src-debug-11.0.18.0.10-1.el7_9.x86_64.rpm8ad97a2c2b6319d5cc2fcb597087eaa62c042f2225f2217708cab3fa727c7744java-11-openjdk-javadoc-debug-11.0.18.0.10-1.el7_9.x86_64.rpm7bceae79f301a98f2b175728c26b4dc0ddd2049e5aba176fe774f0afd219a1aejava-11-openjdk-javadoc-debug-11.0.18.0.10-1.el7_9.i686.rpm42e0fc8733f5c586bb78b49b5a2de5bd09258b51af47a92b6e8712bf03ba76d1java-11-openjdk-demo-debug-11.0.18.0.10-1.el7_9.x86_64.rpm52fe117f3dc1637a5bce91dbbbf262cb3426d5ba229fdb5be195fb49de0dead5java-11-openjdk-static-libs-debug-11.0.18.0.10-1.el7_9.x86_64.rpm46ada50a9aa614b885d0dd4a7015ee5d1fb06d7f490904fa30e1ce6957236953java-11-openjdk-devel-debug-11.0.18.0.10-1.el7_9.x86_64.rpm2c9d49a68aa09f02258351c91f555f6b0211de901645235f7d0f31f232115963java-11-openjdk-headless-debug-11.0.18.0.10-1.el7_9.x86_64.rpmb3f024c8c0309215dd310fdc7d20f9e854ff1793fcd79f7cbdf51565a692ccbdjava-11-openjdk-src-debug-11.0.18.0.10-1.el7_9.i686.rpmce46f933757568cd5b7eba35845c701fcc3e4ed15e922ded40398265ee427211java-11-openjdk-debug-11.0.18.0.10-1.el7_9.i686.rpm3c359c9afd7dfd0a006e9b23d4ad5f1036df5508873b104ab0f05b5b5bbc60fajava-11-openjdk-jmods-debug-11.0.18.0.10-1.el7_9.x86_64.rpmbce1e0dc45399bdbee0b5b70b9596f99c175ca68a14454e8de229887bdfbff18java-11-openjdk-devel-debug-11.0.18.0.10-1.el7_9.i686.rpm1872c8712dccd991aa136cce3c2e86875a3b2643acc896bec68c3b083507125ejava-11-openjdk-jmods-debug-11.0.18.0.10-1.el7_9.i686.rpm1915fcb1e7116b4b935440e911a85d10923bd50e9c924c70aeaea617e26ab15cjava-11-openjdk-debug-11.0.18.0.10-1.el7_9.x86_64.rpm88c6d0144ec63fe83ba7762cd6bb68ba4d04c150859d27d78d0a1c5858b78b4bSLSA-2023:0195-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18)moderateScientific LinuxScientific Linux 7java-11-openjdk-demo-11.0.18.0.10-1.el7_9.i686.rpm3bc1d3cae89a9b43428bc5b056d83be87f802edd3b625132919a4179e3636b00java-11-openjdk-11.0.18.0.10-1.el7_9.i686.rpmf843f7100c0e05db141e5711b463151f6f84edc518e26801f642781dadadca7cjava-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9.i686.rpm748d1bbacd06da97f2aee6b4cc956921ed77d1686c9ecc216e3fbefdc764d37bjava-11-openjdk-static-libs-11.0.18.0.10-1.el7_9.x86_64.rpm842ad0e3202d29c2ab7d4a0da2ffd7ad60553b79dbc38a04e365248634c6de44java-11-openjdk-headless-11.0.18.0.10-1.el7_9.i686.rpm271de5dce775c818dd0b07bb8f270955529619164be4339e950d85d38733b777java-11-openjdk-headless-11.0.18.0.10-1.el7_9.x86_64.rpm954bed46277a5d12619ace7f32279515c2a98ffda3733e187797f19460113d75java-11-openjdk-devel-11.0.18.0.10-1.el7_9.i686.rpm135f5bac306fd312a6d7a5ed81c4922953d0ef8b2459fd5df8ce47ef3e275595java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9.x86_64.rpm1977afedf027ab6b36f6bb4701372b22ed6891ccb86921ec144da42de29f9a09java-11-openjdk-demo-11.0.18.0.10-1.el7_9.x86_64.rpmbdeda4ae3c3d1558414becfd75b3df7cef33576f702a1a1d3997c638d07b75fajava-11-openjdk-11.0.18.0.10-1.el7_9.x86_64.rpm1e1ee682659151ffc7e9622e46fc4a5385da0c847855c692fb300b454fe95038java-11-openjdk-src-11.0.18.0.10-1.el7_9.i686.rpm61e30fd23ae2c3e0fbbb70ee6995a7e608dd52710ded594d9ea8b9ff71f6dff2java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9.x86_64.rpm1b9d27cbbe2e7a6823e56922b743ce76e738da8af3281699337a61f2df134024java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9.i686.rpm8962445f55696819dfe7c47f475c2b53cc0d96e5ff73bc5d645d6b61edbb7debjava-11-openjdk-src-11.0.18.0.10-1.el7_9.x86_64.rpm973dea4ab545a00f6aac1ce0b55b22df5a5bbb2d9071f77ce4b98f0ea0997a7cjava-11-openjdk-jmods-11.0.18.0.10-1.el7_9.x86_64.rpmb89892b3f9e18cd038d05dd81498d044c33b301dc2e42bf4a8a7e9eef50d4d9ajava-11-openjdk-jmods-11.0.18.0.10-1.el7_9.i686.rpm27e633ba219e5a22027e01f848a8a16d84316b68f7cd97929c42fce46a887983java-11-openjdk-devel-11.0.18.0.10-1.el7_9.x86_64.rpm145f8da2a5bc486a8421b1e7cb57363db2e0f2b18f9349f21546ce6b8312f0afSLSA-2023:0203Moderate: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) (BZ#2150191) moderateScientific Linux 7java-1.8.0-openjdk-devel-debug-1.8.0.362.b08-1.el7_9.i686.rpmd67f5f2319f6ff0a3b5de8d2d807ee5c67e926c7a8dcacaf2e28e8e9bc6b2238java-1.8.0-openjdk-demo-debug-1.8.0.362.b08-1.el7_9.i686.rpm17fab252cbef0c6091cc5b79ee41edf7247454269c7672890c234175a9eb1f03java-1.8.0-openjdk-accessibility-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm8a61d12f78f3795ac2cf62406286a5f37c7deead7dd6c3a02dd4c1e889ef8900java-1.8.0-openjdk-src-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm394b99e5dad56c6b475922a65576ff8f622be890d773b2f61800985c335daae3java-1.8.0-openjdk-debug-1.8.0.362.b08-1.el7_9.i686.rpm59b237e3ae54ab4415241c247e5d3d42a352e2b81960c848cd8ec07d91fe1fb3java-1.8.0-openjdk-accessibility-debug-1.8.0.362.b08-1.el7_9.i686.rpmeafcc7b9ea13057aec5c7b0ebe6f10882c24d023883a27a2e2509bef8e8e1179java-1.8.0-openjdk-headless-debug-1.8.0.362.b08-1.el7_9.i686.rpm8b9addb29a05d1fd51e24843f9c9ff233ffefa529185561466b7c7d5f244b5e2java-1.8.0-openjdk-src-debug-1.8.0.362.b08-1.el7_9.i686.rpmef2f54dfcec1be271424d6a3a0a362c9a3af74a93f52ef43402d1912c781729bjava-1.8.0-openjdk-demo-debug-1.8.0.362.b08-1.el7_9.x86_64.rpmaf40a2cfda64966d5a427c2eea862ea30d618567d401078c4c0c448bf9432df6java-1.8.0-openjdk-devel-debug-1.8.0.362.b08-1.el7_9.x86_64.rpmd23676057675490f4089eab52482b9cd0e7878e5a2f3cf9c9d113207478d0751java-1.8.0-openjdk-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm51112771c749d39cf0184f0bb26636af59c40d88eee15751b02ce8f719f10a37java-1.8.0-openjdk-javadoc-debug-1.8.0.362.b08-1.el7_9.noarch.rpm5fbd504305174e6bfb203b14e45aa9fee36c3da9f73d7c810733d9600fcdda54java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.362.b08-1.el7_9.noarch.rpmcea11c3b85836b654b96bf42c4a8d3325d4d9db3c17277871f917965165aec3ajava-1.8.0-openjdk-headless-debug-1.8.0.362.b08-1.el7_9.x86_64.rpmc43fcee935ee49480526fac1e2080c2036252474816bd997f9ec6418f4add8e9SLSA-2023:0203-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el7_9.noarch.rpm05b6ccceb390b74f5a4dfc27aa6f6100d7bce12dc245e3c52e0ccc7fe1d642bfjava-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el7_9.noarch.rpmd7b36f402fb5e3cb164069a19de48997180a7acbf656960bb8395de371279098java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9.i686.rpm653e348b4a040d8fade666eb0133836bd40c9973dd7ff739b24337dfbdc2c892java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9.x86_64.rpmfebf86745e38c1a80182668de2e367ad6870206ed182ff455aa67cea0a450222java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9.x86_64.rpm752180dbb579f396c985a1d7de2f8b79440096ebe4240c8b16a011eeab0557bcjava-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.i686.rpme5eeba85072f8947cb295251e39a59f2387fb3bdcb75fab7446b3319262313d6java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9.x86_64.rpm591856a5e8fa2aca76194cf466f2c7a8e0ee74bea747b9a9618e4b5b51b24ab7java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9.x86_64.rpm8502fc7913dce12d4b6782a1b1bd06573cf1e0f3b87026a84fbf391584632705java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.x86_64.rpm4c48921b8d693ebe70aea1f02ad0281c6bf7ad5343dd8286014421164bc60053java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9.i686.rpm77908458f8b22121d9d5d237ba5df39a2d013502b35c14bb51f7efecb23c2159java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9.x86_64.rpm29e7e96ad8580b7ad6a47a627b381b7af105f9d1ffd99ed38cb9eae25ccc3768java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9.i686.rpm165e46dc7a8d05f83a894dd20c23d60abc3c1887ecfa1c5254049ff044d73fc0java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9.i686.rpm4c06915a71f9f8f77fc3224a3befd6978484aa94fa0fbc6fc388db7463a24e22java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9.i686.rpm8b4df27fdadbb0e8f1d2d251fbbe1659a597ab959926c96a03963d71d1631039SLSA-2023:0291-1SudoSecurity Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7sudo-devel-1.8.23-10.el7_9.3.x86_64.rpmb509e056243c05835de134363455b1f06feb4a168d8589a349ba2c8e83eddd47sudo-1.8.23-10.el7_9.3.x86_64.rpmcac42c69a281a8b043ad8439ea382ef1189f033ae73996f6ee04a369fd8db073SLSA-2023:0296-1FirefoxThis update upgrades Firefox to version 102.7.0 ESR. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.7.0-1.el7_9.x86_64.rpm11b23f5cd514cc8129706f30b58ad4a5ff362d3ef32d278e706ec529245f2128firefox-102.7.0-1.el7_9.i686.rpm6dcb5e50c1d0aeda1e6b048bb06d3b39cc58c23a5c108108eaefc4fe586d4027SLSA-2023:0377Important: Libxpm Security UpdateThe libXpm packages contain the X Pixmap parser library. Security Fix(es): * libXpm: compression commands depend on $PATH (CVE-2022-4883) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7libXpm-devel-3.5.12-2.el7_9.i686.rpmb198deb123820a78c48009ba17ad5cbd90c0c33aa6bb09c392370a38599b7ae3libXpm-3.5.12-2.el7_9.x86_64.rpmdf039c15386f0ccaf4d4ecec2af6f54b1d698240cadbf324d7327d67ec92f365libXpm-devel-3.5.12-2.el7_9.x86_64.rpm60c812c275867820f98e75f4b0067b0b5ab76e52b5f95ecf26a2831b8e97a6e8libXpm-3.5.12-2.el7_9.i686.rpm2f0d3e0e9abe5bb42ef048af825a38deda1b5ead99875ab9e4f2063a51766714SLSA-2023:0399-1KernelSecurity Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prevent unnecessary resets - Avoid leaving shost->last_reset with stale value if EH does not run * i40e: Request to backport upstream commit 2e5a20573a92 * disable VMA-based swap-in readahead on PowerPCimportantScientific LinuxScientific Linux 7kernel-abi-whitelists-3.10.0-1160.83.1.el7.noarch.rpm98e7e92cd04b875945fd4cb335412bf8c24a4e439ce39aabc1d795c46c4298d5perf-3.10.0-1160.83.1.el7.x86_64.rpmd33cbb5d8ad58c6e4c876a306ec93179871e9a2a84123c97d3793b0a8404dbe9kernel-3.10.0-1160.83.1.el7.x86_64.rpm03e614e31ff2f223881b8542d50a59e0360117c66c4663fea606ad019dc574ackernel-debug-devel-3.10.0-1160.83.1.el7.x86_64.rpm6c11f35cc47ff1a43b18c0506fabc9a3f3d3b0b2f5c8c15470c443c7828450e9kernel-tools-libs-devel-3.10.0-1160.83.1.el7.x86_64.rpm1366cd9ad0a75cb819e32ab8e99f2e59afe5fa863832725e38334f2a1c8af63dkernel-debug-3.10.0-1160.83.1.el7.x86_64.rpm1a49e659075919d95f7ebd2fd2bc6689cb2f475d1274496c971e44e0899014c1kernel-tools-libs-3.10.0-1160.83.1.el7.x86_64.rpmace7dd6fc95f571358580c4a373531a643070b7b59571908ea809c31dca21b76kernel-doc-3.10.0-1160.83.1.el7.noarch.rpm863a86b1705c39a0d3f84cadcc501337fd023cfc5cf517d71611b513a24100afbpftool-3.10.0-1160.83.1.el7.x86_64.rpmad4a6345606050446ad16b770f6d3d27852dda942ddfd3a0f06c0b2f551f89d0kernel-devel-3.10.0-1160.83.1.el7.x86_64.rpm6e0ef358ba023ff734894a30f88fa4cbf5d4a0639c70323c8881bb083a2dc6e7kernel-tools-3.10.0-1160.83.1.el7.x86_64.rpm7d96c648f1ecdb2a7a013c40c3eb09397ab8d091ad9a1edebff4a55348d0a1a0kernel-headers-3.10.0-1160.83.1.el7.x86_64.rpm0b6671b29f4ad5264592b71ad0eddc45a9ae36cf0b6f270e02743487c3fa0bdapython-perf-3.10.0-1160.83.1.el7.x86_64.rpm68b80d5f1ee488ce0fe8bf9e7f6d996325fe03c11fa6180f2491c6daa84d0920SLSA-2023:0402-1BindSecurity Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) * bind: processing large delegations may severely degrade resolver performance (CVE-2022-2795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.i686.rpmeb7454c91c0c0229c5c42b7b39da752e86f3a8d3178430deb6a1b44c96881f8dbind-pkcs11-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm0f56a8eb01c837fa298d23a19ab0440f1c384d578326e75deb4f079ab3d879e1bind-libs-lite-9.11.4-26.P2.el7_9.13.x86_64.rpmab10c3e78d6034f2aaa0c8b4ebf6d7be3407f1357101e822c318cf17ea861d63bind-export-libs-9.11.4-26.P2.el7_9.13.i686.rpma2a4d81888ef9d2d40a9925b76a4810877a2d2c652f56690282bdea89262089cbind-libs-lite-9.11.4-26.P2.el7_9.13.i686.rpmab7659bf414b34d38f29bb3c339e7ef7227ab6029c09aea0d9796f3b16617074bind-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpmf4a664d35029d85dd179c384f40480a3428f7812dc5451815f570169ad5772b6bind-pkcs11-9.11.4-26.P2.el7_9.13.x86_64.rpm1ced88f817c5c9b837c0f30d5716d0170451c17cb76f2aafae9f38ec7d4eb2b7bind-sdb-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm043c7ab8699a0c632fbcf86503a81e396117e945c9b688fbc3dd8ebf74bf130abind-export-devel-9.11.4-26.P2.el7_9.13.x86_64.rpmbc654c846cc7b0cf207acabf543674bb337c2d00834b8a1642d20f1f876c7913bind-9.11.4-26.P2.el7_9.13.x86_64.rpm4da9b800ab814fad0c507e1fbbcd24e87046e12f6a114208a20735d11ca050ddbind-sdb-9.11.4-26.P2.el7_9.13.x86_64.rpm6cb479ea7e8351c0e798e4bba3b420e8f8527767c75c387558d04ccc176131fbbind-pkcs11-libs-9.11.4-26.P2.el7_9.13.i686.rpmbd749319924fd015a69e9e0b46bbe2f1372885887dcae418439f0ac76ce4c217bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm8d3f4431c5eeca4e4d989d494d1e9fa35e5315c146e2ee097b18e46d125ac0a2bind-lite-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm776572692e3ee2fa60f1b3ec56e69ee16c4229730f7845cbc3fa135dab5c3c91bind-devel-9.11.4-26.P2.el7_9.13.i686.rpm329962f999d5f845da95aaac1b0236c6c12ab50763a353458b0563949e9241cbbind-export-devel-9.11.4-26.P2.el7_9.13.i686.rpmb388afda1b0ac50faedaaa336b839370c6edc9e37fc2bf2e444f8ffdd839e878bind-license-9.11.4-26.P2.el7_9.13.noarch.rpmf9aef2500b2b1ed6c3206607d73157246a3b0ea6fda944b02706154b00b4e979bind-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm1eb2074549612b1cff2a28627e5f3b2a4d236566d5adaa99b4674405697d2598bind-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm4e09efb17c23f9971cf3c42854c641011561dace108198a272befdfefe2ebacebind-export-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm4003d60867abb79d5c6e609204461ae25f64ccd2b1fd3738b72b12b440325bccbind-pkcs11-utils-9.11.4-26.P2.el7_9.13.x86_64.rpma6ec6b932f762a7869a3550209b49a275b111bf37ee2995818965911c54deb94bind-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm46774dcafc058b1dd4cfc9a640d0d0a446467d300bcee59a7bda88a1b53e8c01bind-libs-9.11.4-26.P2.el7_9.13.i686.rpm34830638859ee62e60bc47dda6f0383455e839436448de55706892203e9fd909bind-lite-devel-9.11.4-26.P2.el7_9.13.i686.rpm42ca2439d41c12224fb12b8bda8ef7a3e260ceb64d79f0b6054eaec655cc7644SLSA-2023:0403-1SssdSecurity Fix(es): * sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters (CVE-2022-4254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * smartcards: special characters must be escaped when building search filterimportantScientific LinuxScientific Linux 7libipa_hbac-1.16.5-10.el7_9.15.i686.rpmec9e2f79eb49a0a505bc4258a16c40fdb4513d3ee2a915987ad1dbcb12a32a4alibipa_hbac-1.16.5-10.el7_9.15.x86_64.rpm529d2d8d22c5c0b309ba3e79c1e410e0fcfc53987eb9322c862b6840a8675584sssd-ldap-1.16.5-10.el7_9.15.x86_64.rpm84b915877ab3a0f4fd324e69005f330e06b2a0e8f5787a2d0bba23d2b76ca9b2sssd-ipa-1.16.5-10.el7_9.15.x86_64.rpm8e8ec7152e1511103ce96db1be110b5010660c65698b467c470a980b0af99201sssd-client-1.16.5-10.el7_9.15.x86_64.rpm2fdc8cec74266f2a85a55c6d3b6b0307458d0a20476e5749c76aef33c6151225libsss_nss_idmap-1.16.5-10.el7_9.15.x86_64.rpm16bc4d0557dde9b46a1c9897345a621b49b790c90c07141860cfc9e93df55ee2sssd-krb5-common-1.16.5-10.el7_9.15.x86_64.rpmd7b2acb1b193cfdfdca7c54d169497cd58ee5e57e76980ed7868446d8b90cfdalibsss_nss_idmap-1.16.5-10.el7_9.15.i686.rpm8759698f9478c1aeb33c8ea981a0a6439202f6066cdb70c2682e1100320cbb42libipa_hbac-devel-1.16.5-10.el7_9.15.x86_64.rpm4fbb6253c7180e83a4b2bb828bd2a6cd24014d28a0055d2fcfc2fb5fc706f78clibsss_certmap-1.16.5-10.el7_9.15.x86_64.rpm388a3fc9d5274d70d776671716eb893b82d5e832890dae1d7ba2cf2d0484f3fclibipa_hbac-devel-1.16.5-10.el7_9.15.i686.rpm56cb20370288a226781598ee1d8dd41707ba4d2e6374a2b2a4505d2302357279sssd-tools-1.16.5-10.el7_9.15.x86_64.rpm255fd956b96970e4286710242848e4e2ea03d870037cdcfb4eb601449a82a13epython-sssdconfig-1.16.5-10.el7_9.15.noarch.rpmd9917b941c40b174fe3288f491f5a5c27432162520eee3e9802d08c5906bdc22sssd-libwbclient-devel-1.16.5-10.el7_9.15.x86_64.rpmaf6072ecffe9de1b96a4a2d046fde800d16199ed23fa9a5562fafd798ba0d812sssd-krb5-1.16.5-10.el7_9.15.x86_64.rpmfad79434fd51546a0fbee2de76ce712bfa0688711c140b1dc07c9a8c0b64c782python-sss-murmur-1.16.5-10.el7_9.15.x86_64.rpm938cc193a64aae61f740e346a6cc07d91159b2bd59beb7e708126467fa3f9ae0libsss_sudo-1.16.5-10.el7_9.15.x86_64.rpmdd638f04c9746d12804f8f6832b0d7ba71bbbf274bea2c9e47208bba79340e8dlibsss_nss_idmap-devel-1.16.5-10.el7_9.15.i686.rpm36c1eaaa24852833dc15e6e2d9001115d52559f8216da22719195690cbb84937libsss_simpleifp-1.16.5-10.el7_9.15.x86_64.rpm18c60954981fe89a687102c7ade27f8460765feb6a5dc041b1af83a2b4559bcesssd-common-pac-1.16.5-10.el7_9.15.x86_64.rpme7d7f28cfe133469d32a76816d268647e82f76efcc19bf23c656497e1ca0b219libsss_certmap-devel-1.16.5-10.el7_9.15.i686.rpme13ef52f86fd527281433977507ec7c903aa1509fc320351a8333674b0296ae3libsss_simpleifp-1.16.5-10.el7_9.15.i686.rpmf9c666658668dd42ba5dc5d4a6d5cd92c1fd810366eebfaa8d213fc523e85374libsss_simpleifp-devel-1.16.5-10.el7_9.15.x86_64.rpm5cb5f1d47f0a70fb927abe487e444b4bdc44504b78e7be135573e6800a33c3b6libsss_nss_idmap-devel-1.16.5-10.el7_9.15.x86_64.rpm5b0b124649901239d68533cd1160d197a6664fba2b04a6e577b271a1ff520458python-libipa_hbac-1.16.5-10.el7_9.15.x86_64.rpm1268d17249eabc1d72f4f7d4e532006684674dd6e1ddb7fb61f27eb5925e1ceelibsss_idmap-devel-1.16.5-10.el7_9.15.x86_64.rpmd110b98cc9817c35bb3de61a1d32a7d730f929d01030553b2c9cfd185d8882e1sssd-ad-1.16.5-10.el7_9.15.x86_64.rpm917491496fe70b0202e6f01082eadc5e8f1a995664b299843c829cc6dcfd6f77libsss_idmap-devel-1.16.5-10.el7_9.15.i686.rpm388765451b6fe56a237844e7bf42c6b96e04ed258ee5db463defffc2a96fa39bsssd-libwbclient-devel-1.16.5-10.el7_9.15.i686.rpm348326d8bac6c34c68273d1e15767b70bbb787dc04b2928ebfc3e3f00409ef39libsss_certmap-1.16.5-10.el7_9.15.i686.rpmb69296ad05824787abe7334c0802db70c802318dbc071fed8e0e1f2103c17738sssd-libwbclient-1.16.5-10.el7_9.15.x86_64.rpm91f4a3ad5d10e03c211e30e14045c82c014392c9e3a4e8340a736662f4955792python-sss-1.16.5-10.el7_9.15.x86_64.rpm20e31c810deb0e0829a6b056f2952375a95bbd973af4acba096a481902c2a263sssd-dbus-1.16.5-10.el7_9.15.x86_64.rpmb76094d7cc0b6c9d867a24911850af375df7342d2d5027fa01aad2a1831e8932libsss_idmap-1.16.5-10.el7_9.15.i686.rpmfc62a7d175109d6eac959a24e9c66eac882b75e167c102b169f0167c5053e1bfpython-libsss_nss_idmap-1.16.5-10.el7_9.15.x86_64.rpma39774f4d0d89e596fa26fdd71180c15fc10f775827c9111f0ef263bfbda2393libsss_autofs-1.16.5-10.el7_9.15.x86_64.rpmc94c5b0f3138667df29e2276c9953e660d6fae4084fee8c13de93d44c1ce243bsssd-client-1.16.5-10.el7_9.15.i686.rpm19a7dc1be7ab7889c11f1bb537e695576a8ddaad71b6a98494dff5b95320734bsssd-winbind-idmap-1.16.5-10.el7_9.15.x86_64.rpm3f7f3f823469bc5e778a4a7d7c8f78fe28de7ab4f08ef9e4e18e0d2c3a4d3671sssd-common-1.16.5-10.el7_9.15.x86_64.rpmfba7a3b126e91c9453e4dab4e6d664e867f750f02852cc9ea52727d81a0d47b5libsss_simpleifp-devel-1.16.5-10.el7_9.15.i686.rpm39e740f102af4b6235a1428d0985cf18cbc14301443b4efdcbc587d897d3ee97libsss_certmap-devel-1.16.5-10.el7_9.15.x86_64.rpmd4967b404147f7103003cd1d643edeea8b827e201cae7e5df4e7320e25f6c381sssd-polkit-rules-1.16.5-10.el7_9.15.x86_64.rpm612d622be4d58ea8063b0f9fae21db3e244b111bb3b1cebc3d6b0de80893c6belibsss_idmap-1.16.5-10.el7_9.15.x86_64.rpm67a758c68ca0ad65538bedcefb3878c38a204eec2805bcd3766399204f22f60dsssd-kcm-1.16.5-10.el7_9.15.x86_64.rpmc1ba20a5876ef78cd463c30044c1f803c7c4a6522934f7593eb61e0d60f8dbfdsssd-proxy-1.16.5-10.el7_9.15.x86_64.rpm3e0a62b4beb3d82c57a1b105f5e3a2b331cb6e33d45e87beaf7c2c6da1e7c078sssd-1.16.5-10.el7_9.15.x86_64.rpmb7915ce2844a91d5c646615b010658b2441d16532459bea87c6c18669f83ee9fSLSA-2023:0456-1ThunderbirdThis update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: libusrsctp library out of date (CVE-2022-46871) * Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) * Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) * Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) * Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) * Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) * Mozilla: Fullscreen notification bypass (CVE-2022-46877) * Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive (CVE-2023-23603) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.7.1-1.el7_9.x86_64.rpmf8eb0f48dc455b82381081db3cba0b2c75a0d885b8582ab5b17e418aa4d3ba27SLSA-2023:0530-1LibksbaSecurity Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libksba-devel-1.3.0-7.el7_9.i686.rpmeb11ecb88f45499e516fc9e39454fc4ba8fae8176cb3dce87bf18faab092f0a0libksba-devel-1.3.0-7.el7_9.x86_64.rpm132171720846a1714489518d30207780d5c838a872d48d262b805519d967b8bdlibksba-1.3.0-7.el7_9.x86_64.rpmf4ed855d1c9f63d62bdc83eb52442a7350bd5202af24fded086e59ebee4b677dlibksba-1.3.0-7.el7_9.i686.rpm7e5903cb864a99118df2cb87a56afcb8a7cb92feb4a5c9480748323a2cb32752SLSA-2023:0600-1ThunderbirdThis update upgrades Thunderbird to version 102.7.1. Security Fix(es): * Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.7.1-2.el7_9.x86_64.rpma3d1eadfa0d5aa89a22b7885e85c547dd7cf96d832158506919f52bbaa19c73aSLSA-2023:0675-1Tigervnc And Xorg-X11-ServerX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-Xorg-1.20.4-22.el7_9.x86_64.rpm8694f038496e5948c3a3783ab51176edef29d8d95296ef79e3a5eb686ae2adbetigervnc-server-1.8.0-24.el7_9.x86_64.rpm6aa9ebde340d047d4bb706b83dd28cd6e8e46bf5d0eb54d18709a4ba11d386ccxorg-x11-server-devel-1.20.4-22.el7_9.x86_64.rpmf107aadb4473d707bd74c370f8b2f70af9211609c2f2ca64bd31913946f5bf70tigervnc-1.8.0-24.el7_9.x86_64.rpmc17da119f457426264bb1dab2c7feb6d4f81f6b5dd406f66f3b178fa9cc93ae0xorg-x11-server-common-1.20.4-22.el7_9.x86_64.rpm04dfa49a820630082a4de59f0b63b9ede317888a4a402388cd2011fe72aa1154tigervnc-server-minimal-1.8.0-24.el7_9.x86_64.rpmec701a0f8060564f5fa9b234242f61975328a64589a23ec4b85ceaa9771a13ffxorg-x11-server-Xephyr-1.20.4-22.el7_9.x86_64.rpm0e34f2713da8012f8f2843474faeb2c7815a3c3fef7d8af01eeb8c4986f7c6b5xorg-x11-server-Xvfb-1.20.4-22.el7_9.x86_64.rpmb9e16048bd8c405251a93c584bc5c873bb527d29e2543447fab2403870734950xorg-x11-server-Xwayland-1.20.4-22.el7_9.x86_64.rpm40b038aea93bb116a76856958fb9e757a0873c454edce402c48fe248c320fe2atigervnc-icons-1.8.0-24.el7_9.noarch.rpm9f0328e2dbec5856c753c1d131e04d04d5a54b76d76d0125a89bc8a56747b824xorg-x11-server-Xdmx-1.20.4-22.el7_9.x86_64.rpm2c8c222a89dc9210b033711127ff969b3f2736e74b92bf24bcc4fc37c6d6fe6dxorg-x11-server-devel-1.20.4-22.el7_9.i686.rpma7529527d02d8baa8ebc8f416af1e48201c10b85225714068a80945799233b08tigervnc-server-module-1.8.0-24.el7_9.x86_64.rpmbd0288bb6da3f80c87d9dda13a62173ff0173a96693015cd8f4885bc16c2ac34tigervnc-server-applet-1.8.0-24.el7_9.noarch.rpmb17d08a619cffba382ede4c812adc1d4788651daae8cdb25c2fd90982d8cc2c0xorg-x11-server-Xnest-1.20.4-22.el7_9.x86_64.rpm8a1c4e5f7e823dfd628bcc73ee45c65382b0fc7f92bf0e76c24197ba79348334tigervnc-license-1.8.0-24.el7_9.noarch.rpm6fe8f2e3641dd29b7d3e9d68132f5e885a7801e0ee1d9123718b320655d6ac27xorg-x11-server-source-1.20.4-22.el7_9.noarch.rpmd92e9b25809b714f3f04f31f7eb8b49e26d3002dacd39d7f0e9b337f15b632e3SLSA-2023:0812-1FirefoxThis update upgrades Firefox to version 102.8.0 ESR. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.8.0-2.el7_9.x86_64.rpma3877ec0d3d9b26a2d922f57130ad636c80eaad56ac034af6a842d93be7f7fbffirefox-102.8.0-2.el7_9.i686.rpm6758c75f205d4e4c74069d30d41135040e340c0941cd2aa36d065b46bb22e491SLSA-2023:0817-1ThunderbirdThis update upgrades Thunderbird to version 102.8.0. Security Fix(es): * Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) * Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) * Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) * Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) * Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) * Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) * Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) * Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) * Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) * Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) * Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP (CVE-2023-0616) * Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.8.0-2.el7_9.x86_64.rpm84f11997de0cca1fbbb42d12ae5ab748e6a2b12da62075e83ff0313820b63696SLSA-2023:0978-1GitSecurity Fix(es): * git: gitattributes parsing integer overflow (CVE-2022-23521) * git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7git-1.8.3.1-24.el7_9.x86_64.rpmb26c2f0f9afecaae81c7a39acc8f66dfaa9b6d2e49f58370d1fa43425ab328bdgit-instaweb-1.8.3.1-24.el7_9.noarch.rpm5cbf8d6cd4c5f1ca050dcd4c99fbd2d7a90861ed38de876cc168ff0019cb08b8git-daemon-1.8.3.1-24.el7_9.x86_64.rpmedca8227e635ecf93dfeeff500d4314b8271777dbda7a4c5e0df88d87c66b773gitweb-1.8.3.1-24.el7_9.noarch.rpme0e2d826925d442e35ea871ca3bc35a2e82aa2df5f09c48a80b18e9b86badf81emacs-git-1.8.3.1-24.el7_9.noarch.rpmc9a516c4f2cc89e203a84a70ce903cdb388014a187d43a178bd163f78e454942git-cvs-1.8.3.1-24.el7_9.noarch.rpmfa461440d71427a33bed73c62219fc4d2c1e37b73a3141e82a773c037d20dae5git-all-1.8.3.1-24.el7_9.noarch.rpmbd063bcbd94dcfaaf21fa3fce44019ecb9e49baefbad3f82846c5b018678159egit-gnome-keyring-1.8.3.1-24.el7_9.x86_64.rpm33829bca4c6cf3140c450f2ec4a8bfa8d6a9b7fc0d7ecbaa68ad73be9fc9d37fgit-p4-1.8.3.1-24.el7_9.noarch.rpm30fc2f9f292da5a4e7ee3ce8ca7baef2911973d72c856e81763596d3758208e8git-svn-1.8.3.1-24.el7_9.x86_64.rpm2cb056134b6bf424851bf959c25e17968f87dac0995c4faf5d09c4389f971a97git-hg-1.8.3.1-24.el7_9.noarch.rpmffd7e91f163eaedf85059bf5ac67d4ffae3414f915f891a4b1ab0fdf18c655e8git-email-1.8.3.1-24.el7_9.noarch.rpm67ef252f653719b74cb97466d1aab0f27249c1748ef5ced8337696376b5b39fdgit-gui-1.8.3.1-24.el7_9.noarch.rpm5d2c34d5b8486e3b27d65917b33fe782b5a858375fc1b0cb093ee114cbd04214emacs-git-el-1.8.3.1-24.el7_9.noarch.rpm99de28fe34035a00e4e9f90dc525e53058ea287ce4d1bbae965f044f73cd33bcgit-bzr-1.8.3.1-24.el7_9.noarch.rpmb58ab51d4051ea420f870ecb5fb3f399a77cdccbd2066e06cdf87136255e5d9bperl-Git-1.8.3.1-24.el7_9.noarch.rpm17f47c2a2714359e706cabb37c903cf05449cc6538a9698bd63635f09889d4c9gitk-1.8.3.1-24.el7_9.noarch.rpm512cf3658af83e990041688730807c342d960053723e696fdceee8c635b0d509perl-Git-SVN-1.8.3.1-24.el7_9.noarch.rpm66077fc18291ae304da279d1f97ed77a1306bcc07629cbf9bfe5fa8f24525a46SLSA-2023:1090Important: Samba Security UpdateSamba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7ctdb-4.10.16-24.el7_9.x86_64.rpmfddfbde281170a2350208c846e02cb2f735ee2da692388dfe592d3b6f2221315ctdb-tests-4.10.16-24.el7_9.x86_64.rpm0586c7e2c9783848bfc7fd8d069049645fcb9addf7f29a3405028b6f8fa6f8ceSLSA-2023:1090-1SambaSecurity Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7samba-devel-4.10.16-24.el7_9.i686.rpm500ff04ad16fa32c36af15b5e3c1b80492ddb2605c8831333fe699144e1b5585samba-common-libs-4.10.16-24.el7_9.i686.rpm3a506031708a60521c1ce26d7b25b7d33f871448efee490754aaa11f238bf6c5samba-test-libs-4.10.16-24.el7_9.i686.rpmaa14ab7a6819597c7179bf43a2612e93e65cdf60b588a47c90c5f69fc3a0a01esamba-libs-4.10.16-24.el7_9.x86_64.rpmfb4328a23ff9c6f3f1338e8ab0b640f49b135346019b3bf09ce2b9c125282814samba-client-4.10.16-24.el7_9.x86_64.rpm9817baee22eb3d09944be83b09843d8c5c0002914ba9dde8184f3ceedecfd53esamba-winbind-modules-4.10.16-24.el7_9.i686.rpmfd638a33e01ee122966a262131400c851d4b2cb82898af5ed06cbae1e88de1aasamba-winbind-4.10.16-24.el7_9.x86_64.rpmeb8c266f6f5019fc5b2c600965b45d57087e8d635aa5952361e28edb3ebaccdcsamba-dc-4.10.16-24.el7_9.x86_64.rpm2c381f7d0617036e73e5636546c62c420822537f69456921c6adab74ad4cb3f0samba-winbind-krb5-locator-4.10.16-24.el7_9.x86_64.rpm3ccc9f9326d8b4602a3ef3e389f23d593140ad6dda7893ead58d258aa2ed35absamba-dc-libs-4.10.16-24.el7_9.x86_64.rpm162e40109413dc22aa30db63c52aca3cd022e563f8813efe5afbb1ec654c1bbelibwbclient-4.10.16-24.el7_9.x86_64.rpm645fc6268dcb2bed6534f8e588b76b142e19a03a8e99db58fab3962305542881samba-client-libs-4.10.16-24.el7_9.x86_64.rpm7570e96a1288f733237327dc3da948701b33ec973a909820d25f28864a63127elibwbclient-devel-4.10.16-24.el7_9.i686.rpm4006301818a57799b4760db07835dfa52580c8ed26037adff4a8f7fa12750105samba-4.10.16-24.el7_9.x86_64.rpm2259a55556e9766fcc56db5372bf17847a469ee86031509c485a20e6926d9c78samba-python-4.10.16-24.el7_9.x86_64.rpm70674e86b6f31bad41417cefb7aaa003a98dfc3700094b1767d5c6336c80c664samba-common-4.10.16-24.el7_9.noarch.rpm599601a6ec8dbd3ea3f75be569b375fb9854c9c06123c08d9e4f36869e83f17asamba-winbind-clients-4.10.16-24.el7_9.x86_64.rpm8c48cc5d15e8aa111c148bd4654ee35ef9d477e89b3f8b70659c58500d1a4a89samba-test-libs-4.10.16-24.el7_9.x86_64.rpmfad10520ae3cc31e6aa868f6385b027985464857673faaf5490291b40bde0843samba-python-4.10.16-24.el7_9.i686.rpmfc81d3283b08cf0a13ee1a3dc32c648956df0d797e19dc438229706f80874e9dsamba-libs-4.10.16-24.el7_9.i686.rpmece27d16977a89a859fb38d509053ef6487ccd79f432777da058a9ed83f2115csamba-client-libs-4.10.16-24.el7_9.i686.rpme284f006353619c61dc1b3995028031745e0c51ab673aac7df9d47af3ffeab58libsmbclient-4.10.16-24.el7_9.i686.rpm36482c21714fff9ecea78bfd9b60f4818a077034f7ae65d7975a0d1305988565libsmbclient-devel-4.10.16-24.el7_9.i686.rpm0ed2103a8eb2ee8ae24bc01c4a16685ac33614bb0ae0db7f22e6ed515fd6d335samba-krb5-printing-4.10.16-24.el7_9.x86_64.rpm4597f10df0c826ef51647d1bc615be93c0616512ecaf577ecc51aa7c4cd4b7a8samba-vfs-glusterfs-4.10.16-24.el7_9.x86_64.rpm2fbe9e1eeab8b46c0a07951c9de7af55591df294d580fbc4f35b622750ab5c54samba-pidl-4.10.16-24.el7_9.noarch.rpm60e72d724b225ce033d0c9ab75ece967b47edceb53f35338a94d8e5bf3dd44e2samba-devel-4.10.16-24.el7_9.x86_64.rpm481f7fdb19fa20bbbdaace15be52182a64ea6017bad6c8a3e7073c0477d659bbsamba-python-test-4.10.16-24.el7_9.x86_64.rpmee6083c33c8dea339c7dfdbcea143aa161f3efbab2c5b7605a4be8ec853f2667samba-winbind-modules-4.10.16-24.el7_9.x86_64.rpm794419b4cdfaddb314cfe6da06baa77bf8b2de66a2405373276d8b4a9283b1acsamba-test-4.10.16-24.el7_9.x86_64.rpma95cfb5c67cb83fa714c978bc63bb89c4558c29c5d33ab551e8a9f447a24516flibwbclient-4.10.16-24.el7_9.i686.rpmb4b4c731d0e5e3c42bb147a1f50523d98b0fba7418f05feeb1e60803e4cbb852samba-common-libs-4.10.16-24.el7_9.x86_64.rpm7da197a0d57e411be6d6b01650265d280532834d8a384a544f3c5660b7bbe626libwbclient-devel-4.10.16-24.el7_9.x86_64.rpmf5cfea82a73d3008884adeeb93d6b6e82a67a0c69f6ccedf3a9d72e2152a2b0elibsmbclient-4.10.16-24.el7_9.x86_64.rpm38054eae1a74d2b95eeb8896b5985b5b6d7a189724c60d2a2d29b5fe2fd4a350libsmbclient-devel-4.10.16-24.el7_9.x86_64.rpm0b6dd455d26f75fe2b0015e954e9a9f7d40adc1511e366d64bd70694d1dc4232samba-common-tools-4.10.16-24.el7_9.x86_64.rpm5e105eee330f72edd154260e9b5abaeaff92e26a8c7bbf599a0d5943ebc1788cSLSA-2023:1091-1KernelSecurity Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Regression - SAS3416 card works on SL 7.7 and below, does not work on SL 7.8 or 7.9 * use-after-free in sctp_do_8_2_transport_strike * SL7.9 - [Regression] Kernel test failed during CPU polarization test - lscpu, chcpu - LPAR * SL 7, block: Crash in blk_mq_rq_timed_out() when dereferencing NULL request->q pointer * qla2xxx: Qlogic double completion races during error handling are still not fixed and this will also be a SL8+ exposure * kernel 3.10.0-1160.80.1.el7.x86_64 on Xeon E55xx crashes upon KVM startup * Guest's time jumped forward by 12 minutes _after_ live-migration completes (in 30 seconds) * SL7: target crashes if a malicious initiator sends a logout immediately after a login command * SL7.9 - LTP testcase creat09 fails related to 'CVE-2018-13405' and 'CVE-2021-4037`importantScientific LinuxScientific Linux 7perf-3.10.0-1160.88.1.el7.x86_64.rpm2994a6e723cfacabd813dac1ea31a94b3d7335b015d5d9f5bb91dc450ca04154kernel-headers-3.10.0-1160.88.1.el7.x86_64.rpmf0fabded1573afeafbdea88dabaa33d9a5b25eb6a2e8da0b0741d98b82ee39cdbpftool-3.10.0-1160.88.1.el7.x86_64.rpmbd2b9606716ea103edfeade341a514508e78e2ebb20de46917c58714075b19a8kernel-tools-libs-3.10.0-1160.88.1.el7.x86_64.rpm18196694a675b25665410c3c9d44a2e98d1ca5bd946987e609612e8cfbdaa3e7python-perf-3.10.0-1160.88.1.el7.x86_64.rpmfa3a944b73812f9848fd6a8a3f5db3bad17e75c3964713e8358f699734a3cd58kernel-devel-3.10.0-1160.88.1.el7.x86_64.rpm847e8c99f83ffa5657b05ef11a8200d47838d7625d4daaae8176b24efc86c852kernel-abi-whitelists-3.10.0-1160.88.1.el7.noarch.rpm3e5a1430d717b710a581e948c0be5a661f549ba1dffb627801476755b4df5ca8kernel-3.10.0-1160.88.1.el7.x86_64.rpm5c64944b3c8e0a4b1b489a49fae4eca1e0e11230199314410617969ceea45b7ckernel-debug-3.10.0-1160.88.1.el7.x86_64.rpm23b0e945e1397bfc990f1f366e451335a0934428a9149bc85d47fae479dc9bf5kernel-tools-libs-devel-3.10.0-1160.88.1.el7.x86_64.rpm7675927d96955b743696d9e8314b6f78d61132e2e7b916df89a67d4f497f88dfkernel-debug-devel-3.10.0-1160.88.1.el7.x86_64.rpm32cd28ab0db8bea7fab5947760340fce5ac55dcf5ed47134de5501479e5e82adkernel-tools-3.10.0-1160.88.1.el7.x86_64.rpm86e80c491ce804d47f821e7ea6aa2ebc03421f81a13821e0fd94708e34a345b3kernel-doc-3.10.0-1160.88.1.el7.noarch.rpmba8643984b51511422db80b0ce8a7c820c0d691c260480f7e6e245f4de156a53SLSA-2023:1093-1PesignSecurity Fix(es): * pesign: Local privilege escalation on pesign systemd service (CVE-2022-3560) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7pesign-0.109-11.el7_9.x86_64.rpm818e3c6565f79af164f8deb035916daf2318eda8901ce99140df3d0f6cbc9fd3SLSA-2023:1095-1ZlibSecurity Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7zlib-1.2.7-21.el7_9.x86_64.rpmb906a4671893fe9fcf39156ba4033ba9bcd43627435e8b82217568f5d3b997d5minizip-devel-1.2.7-21.el7_9.i686.rpm28334f56db86508ed18a210c742977186328cae7b5472f6f12d4808b65b8192cminizip-devel-1.2.7-21.el7_9.x86_64.rpm6ab923ac4a54450364d194e1cedac2302f3c78a3f7d7c7560eb26a03b2565c59zlib-devel-1.2.7-21.el7_9.x86_64.rpmbc81ee36a9b0f222e5fca10b578453b8e6981ed0868012df60ab15105629244dzlib-static-1.2.7-21.el7_9.i686.rpm520f6ed819c571b365246297f7f7beef2d9d9db1f424556aad8844cefc98eb8ezlib-1.2.7-21.el7_9.i686.rpm4ebd12869bda437316581c42b39b035604ff470992e069d213283e17b7f3acffminizip-1.2.7-21.el7_9.i686.rpm7620d3f8bd2161803e83754acde308b4b76f47fd13b7a35f4d14973e89b363c1zlib-static-1.2.7-21.el7_9.x86_64.rpm328f1fe6e08399d03326a68f542ad89ddcb416dfabf1757c67ee372a4c6a8d71zlib-devel-1.2.7-21.el7_9.i686.rpm949c7905f39fc96d1c159336a55f1c0e9e22efe2ed5584cb759e7206750f80b3minizip-1.2.7-21.el7_9.x86_64.rpmafc722f2c605a07221685863675ef9f6607275561c1a95ecd42aeea6d157c357SLSA-2023:1332-1NssSecurity Fix(es): * nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7nss-devel-3.79.0-5.el7_9.x86_64.rpm34ce3134bee9eb51fe1920ee90371c3f8580d7acd476b5fdea6cf12bd7600ec0nss-tools-3.79.0-5.el7_9.x86_64.rpm0d669b9c5f62827ce1be6a066d8f5ab4881ecb66c4e37940865e839b6f386029nss-devel-3.79.0-5.el7_9.i686.rpma19367f29460d9ca333423ed010bc7bd5cc91c05ce4ffaa8affc9e190e2a9b86nss-3.79.0-5.el7_9.i686.rpmee56b00c8b952b66513a703df2001a2cb80a22f8a70b9e09b7005c756220d4c2nss-3.79.0-5.el7_9.x86_64.rpmf2520c6f279918a8a25d0af46886654a0fee295452dc01d2b314e0fd78b6fb4fnss-sysinit-3.79.0-5.el7_9.x86_64.rpmd15a95b44c4bf2c0539039b14df3f1144bb6b0ed81735081b3ee6e623d4322eanss-pkcs11-devel-3.79.0-5.el7_9.i686.rpm1c017b19a750ad2def22e07bd3316737c87d2e82808a8b929203e91ed8583767nss-pkcs11-devel-3.79.0-5.el7_9.x86_64.rpmddfe69109a54ff7b19f4751269ccaeb77bd7defa8b4aa0f975056110c82dbafeSLSA-2023:1333-1FirefoxThis update upgrades Firefox to version 102.9.0 ESR. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.9.0-3.el7_9.x86_64.rpma427a7a88bbd42133b1aaaf4008c3fcc07dbad9616aed631c0f49726b156fce8firefox-102.9.0-3.el7_9.i686.rpm59d53797253f44aaf180d6cbb4edbcc6eaa79d72c43b37363ecdce3cbdfe6829SLSA-2023:1335-1OpensslSecurity Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7openssl-1.0.2k-26.el7_9.x86_64.rpm2e31d503681d6e51ffe1b515f01f0dc727f815ff16c44c30e151d1369dea38dfopenssl-static-1.0.2k-26.el7_9.x86_64.rpmc77c9e6ac83fe42c8effcc805dec484f68e057d40e2dc5357da3239d6c87596fopenssl-devel-1.0.2k-26.el7_9.i686.rpm29934cbf30d318a3c22bf8df0ee8321131d2dafaf96e68ffce5981c2b7a00ddeopenssl-perl-1.0.2k-26.el7_9.x86_64.rpm5fc16fc71da41b06defadfb576ac263d32ec4d632810feaec2c8797ad169d9baopenssl-devel-1.0.2k-26.el7_9.x86_64.rpm496511b8e774088eb9316cf3f6844619ba665ec80b90e46bd86cf08d75182828openssl-static-1.0.2k-26.el7_9.i686.rpm79b9820ed1c1acdf7cb580cffbfc22a4da3a575ac4a63a00341a0013206b86e7openssl-libs-1.0.2k-26.el7_9.x86_64.rpm2bd1f18958c502d555455c93beae0ecbfb201ca20e3a33f94fddf624f95efbc8openssl-libs-1.0.2k-26.el7_9.i686.rpm05c3ac671b481f99d8127e80e8ef27d40f3d417f7116726e6ad2bf036cd51ee3SLSA-2023:1401-1ThunderbirdThis update upgrades Thunderbird to version 102.9.0. Security Fix(es): * Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) * Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) * Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklets (CVE-2023-28162) * Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.9.0-1.el7_9.x86_64.rpmaaef7ae5f3ff0fe550f70ff6757c567713337f61bb126f5909ff9ad5de04e06eSLSA-2023:1593Important: Httpd Security UpdateThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7httpd-manual-2.4.6-98.sl7_9.7.noarch.rpm10e663ffe1d3b93bec8607a8ed2cef51586ae7574113e23ea5b168df1ba5fb7fSLSA-2023:1593-1HttpdSecurity Fix(es): * httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7httpd-tools-2.4.6-98.sl7_9.7.x86_64.rpmb6cf4199858267e8f9762451385d46f87e8ceb75bac0b2de7fe032732fb06203httpd-2.4.6-98.sl7_9.7.x86_64.rpm3d4bc97a92e7c0bb5425a938a84c21101f25b7b53e825193af04e1fd8892d0dfmod_session-2.4.6-98.sl7_9.7.x86_64.rpm1ce891dabde1836b2b362c14de6e3aafdcd7c8d5f6de73e64e7f878ccd7d96a2mod_ssl-2.4.6-98.sl7_9.7.x86_64.rpm49f6fa7cfc5629f66b01e3a18ec3e558dc6722839a3766fc7d2cbe4fc1195b63mod_ldap-2.4.6-98.sl7_9.7.x86_64.rpm6e05444ce8d8bf1e3a91639b23bf7d128e584646f26949bb215f1446e1837820mod_proxy_html-2.4.6-98.sl7_9.7.x86_64.rpm1a650a8e1ea9a7d69c3d00dbeb59bb17e6a5c94df65dcb21cf3714c2859f781bhttpd-devel-2.4.6-98.sl7_9.7.x86_64.rpmecc06f45c96a7758b84341f2d60318bf7b28ff3b318304a73b4dbeccad3249f2SLSA-2023:1594-1Tigervnc And Xorg-X11-ServerX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7xorg-x11-server-devel-1.20.4-23.el7_9.x86_64.rpm5c4766340029b5da5b87e44f14c9ff40b4d7e939beb439ae4fd922ead3a5a401tigervnc-server-1.8.0-25.el7_9.x86_64.rpm9a0971a52bce35c9630a41c85f52bffcf44546cfbd79cacb99b735206b946f5cxorg-x11-server-Xdmx-1.20.4-23.el7_9.x86_64.rpm97bf7b3f2bb37ae6d3e7a4efa36851013f8dc9b4cec489c2764768a14f8a0790xorg-x11-server-Xorg-1.20.4-23.el7_9.x86_64.rpm834e599ec8cf47884775633fa718683d390a944447405f8ff7b99ea05aec1f12xorg-x11-server-common-1.20.4-23.el7_9.x86_64.rpm62f517a3a48adb938f85b62f362149acdd6be710767e7770a46c37215f66a172tigervnc-1.8.0-25.el7_9.x86_64.rpm04671427d8346c9647f78cbdd0268fa1e5f699536f69d5cee4c769baee9b150btigervnc-server-applet-1.8.0-25.el7_9.noarch.rpmebd8ed160da00171c32afe1429bd9d8ceaf34a91af5369bad46fc75d121bb3b2tigervnc-license-1.8.0-25.el7_9.noarch.rpm983db28d51982dbfde3db1e7b05dc7702c97f51977ec27ec7b9d3b55d7761d5bxorg-x11-server-Xephyr-1.20.4-23.el7_9.x86_64.rpm3467bf8a152e43b9bef7a27bd16715c5e3fa540e59fb5a33fb4b6aa4bc6e71b7xorg-x11-server-Xvfb-1.20.4-23.el7_9.x86_64.rpm5a14ef83b13c887c9537e214da940725b07ca8b45a50fd17ff63cf4580b45d00xorg-x11-server-source-1.20.4-23.el7_9.noarch.rpm35176bd63454bd00d5b1f0cf5abca716a2d9027dff58a39a1dab81b73a93b091xorg-x11-server-devel-1.20.4-23.el7_9.i686.rpm14244e03dbef775e3f5c6518c5ed08869205d39aa9411935fc4c007f9fc9120etigervnc-icons-1.8.0-25.el7_9.noarch.rpmf088e39a19cae65c421134424e007808080e02f5479f8c8ab224e3fab6b53aaexorg-x11-server-Xnest-1.20.4-23.el7_9.x86_64.rpm17d6256f633f77185934d41b63fef31042c96aa996dad9c1e0d65fdf2a861969tigervnc-server-module-1.8.0-25.el7_9.x86_64.rpm13a0791a7fe89474cd82503b3d573f393f9440dde33dc3e651684b8b25aab271tigervnc-server-minimal-1.8.0-25.el7_9.x86_64.rpm91cf15c11dd54d4faa4450cf63008a4747524ec1cedf6c89ecb9e41b8bcc717fxorg-x11-server-Xwayland-1.20.4-23.el7_9.x86_64.rpme46d1a09f68e8b9c5c3fc265d0444d94ca0247c6f795ade8ffa4e2f3063d3d93SLSA-2023:1791-1FirefoxThis update upgrades Firefox to version 102.10.0 ESR. Security Fix(es): * MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp * Mozilla: Fullscreen notification obscured (CVE-2023-29533) * Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) * Mozilla: Invalid free from JavaScript code (CVE-2023-29536) * Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) * Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) * Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) * Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) * Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.10.0-1.el7_9.i686.rpm4b88e59f89bd15b2d7dffa6ae1fd994a9adc1906332c85530f2d93a4739498d6firefox-102.10.0-1.el7_9.x86_64.rpm1971c8dd433daf282cc606e06d8148c6771731090d0fd0c3345fcae01055ac8bSLSA-2023:1806-1ThunderbirdThis update upgrades Thunderbird to version 102.10.0. Security Fix(es): * Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547) * Mozilla: Matrix SDK bundled with Thunderbird vulnerable to denial-of- service attack (CVE-2023-28427) * Mozilla: Fullscreen notification obscured (CVE-2023-29533) * Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) * Mozilla: Invalid free from JavaScript code (CVE-2023-29536) * Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) * Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) * Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479) * Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) * Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) * Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) * MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.10.0-2.el7_9.x86_64.rpm1c30a55a7773ed392b56df4f614bf0542653fd91f7a7b5b2a648d2912dd559a9SLSA-2023:1875Important: Java-11-Openjdk Security UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-11-openjdk-demo-11.0.19.0.7-1.el7_9.x86_64.rpmca044ee07327b954b4aff68d9abf78d153a77c58f605be2b722e8cabb54ebee0java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7_9.i686.rpmdf4208141f7ba687db292f880890b548ad5137f1723d26c58d134421dfd3f484java-11-openjdk-src-debug-11.0.19.0.7-1.el7_9.i686.rpm893b77a830554f328e04b4b4175516ae2cecfed146daac80e6d21c01f28fc631java-11-openjdk-demo-11.0.19.0.7-1.el7_9.i686.rpm5ce3e0b5c15c5a458d1ab4b0aed61ebe2ca8f6f5d90183675c3534d3acd7c0a4java-11-openjdk-src-11.0.19.0.7-1.el7_9.i686.rpm0521427a43634e0bcb5235a172a09ce2938c3ff33f4d03fe660e33078b9249a2java-11-openjdk-headless-11.0.19.0.7-1.el7_9.i686.rpm1bcd0ac8c3c793004a05e1a20a23b19127a964e7ee34ec57570abb2cfd25897ajava-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9.i686.rpm3eff7cecbe2e857bec3fdaf3911f021eb8731c6023da45671d315bad6510b25bjava-11-openjdk-jmods-11.0.19.0.7-1.el7_9.i686.rpm14339f857ef1c2eeb77945e298c3fa4762a10fb16fef2bbe9d8c39ee6304e2e9java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9.i686.rpm8d3f8771540dc157c943f36685da8ee39f5f8a4fbfb6b9544164a255feab788djava-11-openjdk-devel-debug-11.0.19.0.7-1.el7_9.i686.rpm368f46f7268fafdb3c579111305d4f7ec7ec3c1ce938aa01312c9ffa2b8ea772java-11-openjdk-demo-debug-11.0.19.0.7-1.el7_9.i686.rpm966c80b7f3c3e97c3be19ab2e037202e5a530518918897217e55a0d2eda58b5bjava-11-openjdk-debug-11.0.19.0.7-1.el7_9.i686.rpm5d3ad55933a600443139b9639e74211c56e605e5dc5ddcd3f34a992c254f57fejava-11-openjdk-devel-11.0.19.0.7-1.el7_9.i686.rpmc945c271b8a7fa135263b37a727bcb633fbad9901a9b253d7feb2a380c0b8bb0java-11-openjdk-11.0.19.0.7-1.el7_9.i686.rpmce9ed1c9d3076c33543fda913bdea950b7892a007bca45953cc54b34dbd4d7c7java-11-openjdk-headless-debug-11.0.19.0.7-1.el7_9.i686.rpmce7b0839a2ee5e74efd3b5ec54c0456afdd51a5cc82947087b4c4c7b735443b7java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7_9.i686.rpm697d64355c9693a6bb54d851d774c842bf46b5da410b241aa89fab6e9b27d86ejava-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7_9.i686.rpme27543f31898a2b72dc1687122ea3677eceabe93f618d77567dbec358d34cef5SLSA-2023:1899-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7java-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7_9.x86_64.rpme7d7dcca1e81bf498dd349ae60f174446b068ce267e7ad6f503ef9b4954c2fa3java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9.x86_64.rpm3da89a9ffafce0f76610f0d5ff3b3ddaaaa7b0602106f6be67a1957f829bd8c6java-11-openjdk-src-11.0.19.0.7-1.el7_9.x86_64.rpm783b5a5ace4eabbc26c765569f31ff4863e83c81b48696a728bf9e4ee4534556java-11-openjdk-11.0.19.0.7-1.el7_9.x86_64.rpmd13185ac7d38f202463ddf655a25d02cef85b71d59acbe56ed0f7d40dc70d2c7java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7_9.x86_64.rpm79d88f962c73afceafa92655367a00510eb84da07b69f2e773d60208e62034d5java-11-openjdk-static-libs-debug-11.0.19.0.7-1.el7_9.x86_64.rpmddeb619b8bb2023b0ebe9bcf192a72ac70be99ce02964f925d14aae0adeda89djava-11-openjdk-devel-11.0.19.0.7-1.el7_9.x86_64.rpmb200923f06dfd3a841c63f1be22c6ee30274787ab0b6ef93865a0531a2796d47java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9.x86_64.rpm1460d071feb21ff6bc669df2c59314a558d6ae377a0129be52b7f722aa21b591java-11-openjdk-debug-11.0.19.0.7-1.el7_9.x86_64.rpmf4db844a3283adb1a688769e5489614dcf2a25663a77f0943dadc08676d2a5dcjava-11-openjdk-jmods-debug-11.0.19.0.7-1.el7_9.x86_64.rpm60ffc85fbd4b6440b246fa7f6c7ca08db70bc89dd26c97ce6f2a238b2304944djava-11-openjdk-headless-debug-11.0.19.0.7-1.el7_9.x86_64.rpm2f9282054eaaf1e0966ca3c79fb01604b52b6a736cc18100b48f4f207ac026a1java-11-openjdk-src-debug-11.0.19.0.7-1.el7_9.x86_64.rpm2c449d2a8bc39812577a9fd2179d4d190a242b7544548665792ab1957319326cjava-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9.x86_64.rpmff4bac6396cc6032ef5235e742d2901140529240aaca67794b38f123b3e55584java-11-openjdk-demo-debug-11.0.19.0.7-1.el7_9.x86_64.rpm42589b275de9ea6b01352701fa670321f4ff8ab8097a0cf0c939309ef833d45bjava-11-openjdk-headless-11.0.19.0.7-1.el7_9.x86_64.rpmb98fefbf36becafb610464da95ed028209814f32571e7edbe9747f7538bd2e91java-11-openjdk-devel-debug-11.0.19.0.7-1.el7_9.x86_64.rpm47443f3d369fa4eb622bf76975a3c62ad614321efbabaf6319bebf02386aa668java-11-openjdk-jmods-11.0.19.0.7-1.el7_9.x86_64.rpm285b1cd3daa192966c20725f318f343e0e93f85e370570a5be2f553ac021b397SLSA-2023:1904Important: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Native code within the OpenJDK code base attempted to call close() on a file descriptor repeatedly if it returned the error code, EINTR. However, the close() native call is not restartable and this caused the virtual machine to crash. The close() call is now only made once. (RHBZ#2159458) importantScientific Linux 7java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.372.b07-1.el7_9.noarch.rpm646768d83d6251c8eedf888f3915c573c053176902179b5f5a69cc8d37b1ebfajava-1.8.0-openjdk-accessibility-debug-1.8.0.372.b07-1.el7_9.i686.rpm806a3a0b17335ea6d9d1b8c53042e8bae1916f06e1ef5400e97827ef34bfb15fjava-1.8.0-openjdk-devel-debug-1.8.0.372.b07-1.el7_9.i686.rpm1bd2264d72db55590781bac0667f09114c7868d31a9353148fb4740b21934245java-1.8.0-openjdk-src-debug-1.8.0.372.b07-1.el7_9.i686.rpmd3cf33cd94a93d63544a4fbf673759b44f22933337b3f3b18ee5b8b81aa33606java-1.8.0-openjdk-debug-1.8.0.372.b07-1.el7_9.i686.rpmb1ff189ca269ee49847a9265cf0988dc998b33e92927fcf811f0c61afe6e8ba1java-1.8.0-openjdk-demo-debug-1.8.0.372.b07-1.el7_9.i686.rpm4a97194520016f53ff2f66ec138b36bf53ce65cad09bbe01d96bd386e7293861java-1.8.0-openjdk-javadoc-debug-1.8.0.372.b07-1.el7_9.noarch.rpmf2aabab9fbc0ef81ca5da7a6ea4e2caa6473df13dd9121e0c021bbfe916fa16bjava-1.8.0-openjdk-headless-debug-1.8.0.372.b07-1.el7_9.i686.rpm3ca61ef2ecfbce5403113d58ef935a7c8b9b2b95a247ecda8d58dbcd347397e3SLSA-2023:1904-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Native code within the OpenJDK code base attempted to call close() on a file descriptor repeatedly if it returned the error code, EINTR. However, the close() native call is not restartable and this caused the virtual machine to crash. The close() call is now only made once. (RHBZ#2159458)importantScientific LinuxScientific Linux 7java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.x86_64.rpm3970da71dbb7d4387ffda5541026805c6155773aa068f9aa2c50f7c1635f40efjava-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9.i686.rpmb8f5a08a2517c86193fdff4312d88df661c2d1366d5694d5e8d8dd1f4908cfb4java-1.8.0-openjdk-demo-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm1b9c9d2c00fa1860c1a335735c066903dbb2fcb5d535fc757759f4abb3128b24java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9.noarch.rpm5c509a7695f34dc1ca8aa721bd41db8f1768b9cbb5639571b0554c15244c6361java-1.8.0-openjdk-devel-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm21617911170f00001069a2338b7c3b9a5b6dd725074040579da1eb78a80e96a6java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.i686.rpmdf2eec75f6a7373e61d2a3b5a1f2b39ce61d77160466ad77bd1e1fcfc27888aejava-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9.i686.rpm7c1d3c628dc2aa8ba5868c8503584323e6a85cb243ceab78b237eb8a55110a6ejava-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9.x86_64.rpm44c0732528921c3523825792eb390055db12f5f0dfcfc951e29200853e8a2888java-1.8.0-openjdk-headless-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm9fbac8c8d22e94f89554d198252d5e8603d7627e7ef794466d86b2569cd03e5fjava-1.8.0-openjdk-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm2805bc614336ff529007801b092c3b638899290d57d3ede83686b5af7ecc797djava-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9.i686.rpm4cff91774c6f91e91384e2faf2141154e8f52123e68c7cc5bcd5d996df383a6djava-1.8.0-openjdk-src-debug-1.8.0.372.b07-1.el7_9.x86_64.rpmc3ab8dfc60523f0a92429fd8d33a70da029b9de871be58b8a819a10facad0c2ejava-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9.x86_64.rpm0e7b61f122111dd61463033d0391ff4ba07ca13ba4517ceffec740aca8f79454java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9.i686.rpmb81940212cfd79f445033cabe563daeb3596757fd22446f6e61df8541562a0cdjava-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9.x86_64.rpm74da510bb8b01ead3f0dd393642a3632d4de354042276f8759912951838b5540java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9.x86_64.rpm3b0f1a5bb573bbb35d00485b3fd963351cf346d7c39fe4817a8d63c9492fe91cjava-1.8.0-openjdk-accessibility-debug-1.8.0.372.b07-1.el7_9.x86_64.rpmd5bfcfe020159faf6beb324035ef036ea4871292bd296df6e5472bb392d31528java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9.noarch.rpma2facdb5600ce337d1ade1b1f902d8dd669cdff38f4cfda163c61239ec6b905bjava-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9.x86_64.rpm157a01cf2f7272493df845a357a7c4c1386b1656203880886448576c23ef6775java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9.i686.rpmbc2adc4d0f284b275ed81058992d4c4355c126850d61a8ab0a9a66ac4ce08949SLSA-2023:1987-1KernelSecurity Fix(es): * kernel: memory corruption in usbmon driver (CVE-2022-43750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * NFSv4.1 : state manager loop TEST_STATEID/OPENmoderateScientific LinuxScientific Linux 7kernel-debug-devel-3.10.0-1160.90.1.el7.x86_64.rpmde36d46b2412c28856e2a4670ceab1138e88f088b02f688b09d6a4f47dcd1f2ckernel-3.10.0-1160.90.1.el7.x86_64.rpm23abdf98822a301faf51002e5cd3df3b237663599b54512bf5b3a704d2133f7ekernel-tools-libs-devel-3.10.0-1160.90.1.el7.x86_64.rpm5209696d1b9d02fda70665d0c33b8f42a0c2867c8c091ca0fa7ac187092dc610kernel-tools-libs-3.10.0-1160.90.1.el7.x86_64.rpmf912c4a8afbb5370c90d0f75f8ec48eadebda3e00a7c8cb3c812a4004121ec00perf-3.10.0-1160.90.1.el7.x86_64.rpm1f03dbba96d8c0aacd2c650617f689be28fc8fb500504203c7a6afc7e72f337dkernel-devel-3.10.0-1160.90.1.el7.x86_64.rpmdc586da04a325769bd63167a147befbe92ef90bf73a3b6c62483a33f3eabe18bbpftool-3.10.0-1160.90.1.el7.x86_64.rpmf59bfe8f6576b3594181ee0b78c833cebdb4c7ec6f5ea3950a4d863261708de4kernel-tools-3.10.0-1160.90.1.el7.x86_64.rpm1b51f9afb4bbf819af7e9945ea1bc83859f238da61968c3595e15b9438ef7fd7kernel-doc-3.10.0-1160.90.1.el7.noarch.rpm6c4fd3efe53de4ae2e3efc49baecdca84f4f5bccfa0d7cb2c5e05ef082b42e36kernel-debug-3.10.0-1160.90.1.el7.x86_64.rpme391d30656de06da5d4f1f021e84b75e97907824f27654997d7e1b6e6d56006dkernel-abi-whitelists-3.10.0-1160.90.1.el7.noarch.rpmc7bf8b4514eb48baae5bf8d71f0f5769459e0e0f2a6ea82b228dbd14afbaae93kernel-headers-3.10.0-1160.90.1.el7.x86_64.rpm4922ad2e5a87275be7d464a3b2983caf86c777941081f96271a65d66c068018bpython-perf-3.10.0-1160.90.1.el7.x86_64.rpm287afd725862c75b3bc9b5a2a6bd6f032963e86c856224219a7a7ab71d3b7987SLSA-2023:2077-1LibwebpSecurity Fix(es): * Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7libwebp-tools-0.3.0-11.el7.x86_64.rpm69ad43f31cdd66bae7427ae8e7675a2473f8ec82a42d9ccc18f3fb8b147f23bclibwebp-devel-0.3.0-11.el7.x86_64.rpmd0f7746496279510d8d9349af1eedf768d6a9f6728b052b90c745128df1dc164libwebp-devel-0.3.0-11.el7.i686.rpmacc9073bac4c34b94140c41c00723439d7f8bdb27affd320ba2f6c0f6110a03alibwebp-0.3.0-11.el7.i686.rpmfde748bfb7fb2f89d217f1ce683817d6111d46d5961c517d98af764ae8598aealibwebp-0.3.0-11.el7.x86_64.rpm28f595642a9bf838e0c24a74f183e3fe24bb477ecb200018354951c31784f6b2libwebp-java-0.3.0-11.el7.x86_64.rpm15ac95abcbc2b845c4bef4bba6549f898899e7f7c9df1c5eda18011ea7d24406SLSA-2023:3137-1FirefoxThis update upgrades Firefox to version 102.11.0 ESR. Security Fix(es): * Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205) * Mozilla: Crash in RLBox Expat driver (CVE-2023-32206) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207) * Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215) * Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211) * Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212) * Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.11.0-2.el7_9.x86_64.rpme2c2a1d54b202b045157a98bc48bef2d9e30b1946e632dd97f9d3f1eb32e031dfirefox-102.11.0-2.el7_9.i686.rpm217731f4536be9805e2c725616e4be6b623c1506a35bb55b2086030fcbc2b4e2SLSA-2023:3145-1Apr-UtilSecurity Fix(es): * apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7apr-util-mysql-1.5.2-6.el7_9.1.x86_64.rpmecbec100c816c813f091b250f8d4472ca80d76347e483adc7f48d49aa224e480apr-util-nss-1.5.2-6.el7_9.1.x86_64.rpm7df19e8165bbd56b4351b225ece0d4a43893a10dd5bcbf4acb5db7dba6d4f76bapr-util-devel-1.5.2-6.el7_9.1.i686.rpm77cee88e27df38a0c49fbe92f4b392e924026cf18b9fef8cbe7accdaf2d6de64apr-util-odbc-1.5.2-6.el7_9.1.x86_64.rpm6ff109d36706fc3357c18c1b1d96e6b19233ea875101a8a3a7553c35b322f02aapr-util-1.5.2-6.el7_9.1.i686.rpma10bfc1aff922fa7c434500ada8fe75f96726a33e8a55c4e6e71b02885860dccapr-util-ldap-1.5.2-6.el7_9.1.x86_64.rpme25308894da281c3d546aca086e3a57f0428e8d01bdf83792fe0036da195439bapr-util-1.5.2-6.el7_9.1.x86_64.rpmb9dcf09c4b5bb5cb5c8db172f981b3c8043fd17aac07c4e1aed8af74f7284dbfapr-util-openssl-1.5.2-6.el7_9.1.x86_64.rpm8a5ece8be05a373617dd4137d523928c8d3a789a142e17b132669e0a80629fb0apr-util-devel-1.5.2-6.el7_9.1.x86_64.rpm29b315ff9cdfd835b84e0a733d12f6e6bcda0ee7f46ff9aaf9530bea4db0e538apr-util-sqlite-1.5.2-6.el7_9.1.x86_64.rpm9934b4db3804226ad60d97ef34095433b3b413806f877b2eff7fcdee6c4b4e49apr-util-pgsql-1.5.2-6.el7_9.1.x86_64.rpmccbb8d25374e3a3b0ac4d6a4f53d75abb82e10b611965c16a761907a95e3297bSLSA-2023:3151-1ThunderbirdThis update upgrades Thunderbird to version 102.11.0. Security Fix(es): * Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205) * Mozilla: Crash in RLBox Expat driver (CVE-2023-32206) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207) * Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215) * Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211) * Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212) * Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.11.0-1.el7_9.x86_64.rpm83950be333d1640567c94fc1a971c081442598d46e203d365aee10ce5b49e3f8SLSA-2023:3263-1GitSecurity Fix(es): * git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652) * git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7perl-Git-1.8.3.1-25.el7_9.noarch.rpmc7b6358ffc05927f5d9a35c27857311630ebd75e9ef07749f33777b29b3d3d52git-email-1.8.3.1-25.el7_9.noarch.rpm97899af62ee4b49b14b3423aae26390a143e6c3bce6ae55155d2faa133fc486egit-all-1.8.3.1-25.el7_9.noarch.rpmefa5741496687d523e89c33aa496a53e2e81c5f1f739f0890ba0e60fa02915d3git-cvs-1.8.3.1-25.el7_9.noarch.rpm8010fe9f7a9f769ce948649f91321b0f50c10454b8ea402522e89b05b59681c0git-gnome-keyring-1.8.3.1-25.el7_9.x86_64.rpm78438f3c27a923f51e56b7a7b1d3cb53e65697751b833fd7e2f8a8a7a7f98080git-gui-1.8.3.1-25.el7_9.noarch.rpm294d6e517fc935fa5f592e1e91673aa0016f9d1d8a319ebd4c649f971eeaec3bemacs-git-el-1.8.3.1-25.el7_9.noarch.rpm0ab9001313770b6d4639542725fe6fe273360ba834f514b6d47e19e7a73b85cagit-p4-1.8.3.1-25.el7_9.noarch.rpme22b37264ccb2453f57e7d3f90c9a51f91fc95a312c06e94fffdda160ce0d998gitweb-1.8.3.1-25.el7_9.noarch.rpmccac8cdd7f8d8e0471b9b486349cd02e2c5e8a38dc886d8e3970a784a105c3fegit-1.8.3.1-25.el7_9.x86_64.rpm75e09efa67ede28fa48fc303a4b64f88ef0767c7a57862ba207b6c542a8c5129git-daemon-1.8.3.1-25.el7_9.x86_64.rpm4a7893c0ccb2136cef96a3a42d1c976c4708baae1006ab0401e236184119f805git-bzr-1.8.3.1-25.el7_9.noarch.rpm88099b0b0b0eac62df45f49512eee7277d55011dd5e1ebe315d4482e92118238emacs-git-1.8.3.1-25.el7_9.noarch.rpm204e0a02b8a7cb91e7ff10fc3c57ea2e69f3531aa62b2fe30f2a1b7922d0a20bgit-instaweb-1.8.3.1-25.el7_9.noarch.rpm3e83eeab3a710c7be5655e2df71272688ff9f0af44b02f2ce1a06bc46bd733d0git-svn-1.8.3.1-25.el7_9.x86_64.rpm58d5775c300153c42aaee661185813841751bf363ed31cf0603f16fcd891f5dfgit-hg-1.8.3.1-25.el7_9.noarch.rpm7dbe6883a220246b72b07b0883b4d5cc6a6394d76fdd54ea15ceb7b968c005cbperl-Git-SVN-1.8.3.1-25.el7_9.noarch.rpm5dd193a55fb659b5d314001e1658f8a453cb21ee5e08c6bdd3dd5cacdb018290gitk-1.8.3.1-25.el7_9.noarch.rpme756ea7f5b1836048bf353e2852378e1d28076550c1e611dbec1753e0c391526SLSA-2023:3481-1EmacsSecurity Fix(es): * emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7emacs-24.3-23.el7_9.1.x86_64.rpm16429ed85d33e15b552460c1b67de5294986c29daaa3d2c348e33ed9b1915302emacs-terminal-24.3-23.el7_9.1.noarch.rpme6304cdcc84e2f3b192eb747f376b7c28385031751e7f32ce62087cd4a4cc996emacs-el-24.3-23.el7_9.1.noarch.rpmcd07bf3dce1867952ff000c38af14043a31e2e230afd103c843157a81b64c7ceemacs-filesystem-24.3-23.el7_9.1.noarch.rpm52c8fb406a8e2b782b38536fe5e61ce36c031c3824cb32ce88b6bd2e9e6562d8emacs-nox-24.3-23.el7_9.1.x86_64.rpm379d8bbcd19407c44dc6b00af52973afecf4488c0b57609032725948563c02a3emacs-common-24.3-23.el7_9.1.x86_64.rpm77e5977105cc0b7645f5141a684adc2845813a0205881e1d0239961910937217SLSA-2023:3555-1PythonSecurity Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7python-2.7.5-93.el7_9.x86_64.rpmc2b14b2623f7080d71a784a26cc0e0917c121879174aed1d7498702cd5f58e48python-libs-2.7.5-93.el7_9.i686.rpm74a2f37e515525613a58e2d2e48cdef939554c6e985b556022f7a2fc3da193bapython-test-2.7.5-93.el7_9.x86_64.rpm1c508a26d568ab252f09be0a5a9844febd340580a46f9959c8ea9b7bd643c879python-tools-2.7.5-93.el7_9.x86_64.rpma141c7be5f16cb7d79c86a7d217c3c26170f59892f3d8449f155c95ef6bc7163python-devel-2.7.5-93.el7_9.x86_64.rpmc69106bbfeff385d12c48f00f9111f5e9551607cadaed31f7cea6303c465419ctkinter-2.7.5-93.el7_9.x86_64.rpm2af896618aad06c74e7d6aa51f936cd1def6ff4c2cdde61ad56f6c07dc53e989python-debug-2.7.5-93.el7_9.x86_64.rpm6a649dc6a6ed2a55d9dda6498f1f6fc0aea0e9e059c76f1ca4dcec9415f19cc2python-libs-2.7.5-93.el7_9.x86_64.rpma9911b8402a76fb873d4f8954d6ad8c3335a940617273561485f7ac44a10f3d3SLSA-2023:3556-1Python3Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7python3-idle-3.6.8-19.el7_9.i686.rpmc3213042d778d496f5b48723f2f16e839754e53017944827b719eba596409007python3-libs-3.6.8-19.el7_9.x86_64.rpmacc5dc6879fcb54764b1982a828c7bd0d818e94ffa4b7656abf8bac9d2311cc0python3-tkinter-3.6.8-19.el7_9.i686.rpm082e297fda5b60c723bf4d11eaf47f2eaf9ffbf10b10e1809432a722d32e4d28python3-idle-3.6.8-19.el7_9.x86_64.rpmabdbe62fff672d7c8c674af61906edf5de7a1fa2eafcf6ffc991bb4f61c01955python3-test-3.6.8-19.el7_9.x86_64.rpm9b4d40db2ba3248732de180ffd339f822c98eaab3dc446a63c83e244d3fdf998python3-debug-3.6.8-19.el7_9.i686.rpm1d9a91b8ff0dda6a911e2cc7d89c7520736632c95fca8785cbd9e7c937f3c62bpython3-debug-3.6.8-19.el7_9.x86_64.rpmaeabd980724b1d01314f93ee5368b188ace49f641ced64cb03f50c3daf80463epython3-devel-3.6.8-19.el7_9.x86_64.rpm06c47f05308ffd3e781f031941cf7e06cc0fd06ffb9dffe8191ab667bf295690python3-3.6.8-19.el7_9.i686.rpmb403cec0cf4d82052b1f34eab7ee866f48b4a38c847736a878041b92c9274b27python3-tkinter-3.6.8-19.el7_9.x86_64.rpm3fd7dd673a988c986805ed4ced6f19dc47d44f81aee291626dfcc9ae8f00fb27python3-libs-3.6.8-19.el7_9.i686.rpm85efb8f32cb59dd05a7a21f48cc2abe7711b7f2f1d19997cf4328a54e7b12d7bpython3-3.6.8-19.el7_9.x86_64.rpmeb546d5fe026dc6902621e56f6bc958568a1880997534d56ed5fe6b1f0ba3a1cpython3-test-3.6.8-19.el7_9.i686.rpmd6c13b289c5b6793a34b0b67f88ab0730fb99b111e10adf77ad54e09cbc26358python3-devel-3.6.8-19.el7_9.i686.rpmba765447ce9209db237e4814f289ef966e50753d880e591b84ea9dc9eb8b9032SLSA-2023:3563-1ThunderbirdThis update upgrades Thunderbird to version 102.12.0. Security Fix(es): * Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) * Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.12.0-1.el7_9.x86_64.rpm3d6ef4a4906929928258405965ed74368e1a192aa83d0105bc4f25fa1f799885SLSA-2023:3579-1FirefoxThis update upgrades Firefox to version 102.12.0 ESR. Security Fix(es): * Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) * Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.12.0-1.el7_9.i686.rpm85dd0bd1ea66050ffc9257d0c70173cc9db885ea8ca48b309c830c62eccb0f7efirefox-102.12.0-1.el7_9.x86_64.rpmb0eda21f63d6600d82d0eea6f78452939b615447a11748b6d3ff9dfca96df831SLSA-2023:3741-1C-AresSecurity Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7c-ares-devel-1.10.0-3.el7_9.1.i686.rpm4810d2e56485882183e34a8ddb72425fc96df44ff0690bc1d0acb024f9cfcc3cc-ares-1.10.0-3.el7_9.1.x86_64.rpm2767f9710da7c66679b27ee4c75b0eb4430dcb4a9d7d505a2a4a651218216a7ec-ares-devel-1.10.0-3.el7_9.1.x86_64.rpmc682f4cea6d4ae48a03518f7d4722b960bfb476a6edf9e96e80c3d43606fbe4bc-ares-1.10.0-3.el7_9.1.i686.rpm3bd881548e05c652d368e63a5a8e5487da80fb4dc7e9d59e8489f037d8214c1fSLSA-2023:3944-1Open-Vm-ToolsSecurity Fix(es): * open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * [ESXi] [SL7] vmtoolsd task is blocked in the uninterruptible state while attempting to delete (unlink) the file 'quiesce_manifest.xml' * [ESXi][SL7.9][open-vm-tools] Snapshot of the SL7 guest on the VMWare ESXi hypervisor failed vm hangslowScientific LinuxScientific Linux 7open-vm-tools-devel-11.0.5-3.el7_9.6.x86_64.rpme50c2f59eebd90a27a7c4b05f3ea63a278ef1587a393736a4a46837a2240e6e7open-vm-tools-desktop-11.0.5-3.el7_9.6.x86_64.rpm583a5c038ff4273c49f1bbaedd4c4fe343c81f9d4ddffcca1ac64a27cba33b63open-vm-tools-test-11.0.5-3.el7_9.6.x86_64.rpmdd3dbeab07c3601f04fd9276645e4d879bfb2591dbf218106a4679bc3f2d0e8fopen-vm-tools-11.0.5-3.el7_9.6.x86_64.rpmd91ad175421f9064d2b465745ffb5522d929f0ac6931a66fa5c9a45dcd359603SLSA-2023:4062-1ThunderbirdThis update upgrades Thunderbird to version 102.13.0. Security Fix(es): * Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) * Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 (CVE-2023-37211) * Mozilla: Fullscreen notification obscured (CVE-2023-37207) * Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.13.0-2.el7_9.x86_64.rpm457011a565fd0d609ffafae8889642b0098c1782e64d391a7ec242f940aff6acSLSA-2023:4079-1FirefoxThis update upgrades Firefox to version 102.13.0 ESR. Security Fix(es): * Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) * Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) * Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 (CVE-2023-37211) * Mozilla: Fullscreen notification obscured (CVE-2023-37207) * Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.13.0-2.el7_9.i686.rpm52525c06ded84e0af82ad1bb583015b6dd976b15c200a89929aea7970ebf182afirefox-102.13.0-2.el7_9.x86_64.rpm7d5b42ef904a7638edaf85655b8848a9b55128200dc6514220839294a292259aSLSA-2023:4151-1KernelSecurity Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * perf record -ag does not capture user space stack frames on s390x * SL7.9 - kernel: handle new reply code FILTERED_BY_HYPERVISORimportantScientific LinuxScientific Linux 7grub2-2.02-0.87.sl7_9.11.0.x86_64.rpm02fdac07bcfcd70a44e58b2b66eacfb4b878d5021d85e5f6121f77a9328b5667grub2-tools-extra-2.02-0.87.sl7_9.11.0.x86_64.rpm6251a806574027dfd31c399144e35a259a698a3a28c3b2eaa54e6a0f188107f2grub2-tools-minimal-2.02-0.87.sl7_9.11.0.x86_64.rpm51a9101328612f9d71fe72c145879aba98a2b5afbdf08e04f5f427f5f3597a1dkernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm13ddb32f504cbe0194aeead1151afc046b34cace7c5bc5193aed6bea6d4072c0kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpmacc68d033ea9e974d2f6f2041224aff5f46859c6e45c0b97997949bf6add434dkernel-devel-3.10.0-1160.95.1.el7.x86_64.rpmd427f4027b89aa13cbc836bcafb6b69a7c335d37b84efc738b9aef1c30395e72grub2-efi-ia32-2.02-0.87.sl7_9.11.0.x86_64.rpmacaf931aae56735cabdefc5d99313cac4725e5a2211b19f15562856065856345kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpmaa994b7f8e6f91bc84e63169d2c518b4435aef54a487d99b3edea56719ccea1cshim-ia32-15.6-3.sl7.x86_64.rpm39185186a7f6cb0cefcc2c1d26d1dda21996afa9106651c290f8c41b0421abeagrub2-efi-x64-2.02-0.87.sl7_9.11.0.x86_64.rpm183ae7eb980f05ea13f48d4e2f41c90d34dc8b23817fc19969ca0ef69feb718efwupdate-12-6.sl7_9.x86_64.rpmf05fee0dca5f4736b736d99beec247af393b5f3920e668a98800e582159f24bbkernel-3.10.0-1160.95.1.el7.x86_64.rpm6ae9d35124a1f80a46ab4f8ad9ad4a4c6237452120f67f04881a22b7cf579e1bfwupdate-libs-12-6.sl7_9.x86_64.rpmd01c9c211a1f3d7a0beba4f69ba33a6285d11dbc8477c2a44590600a2644bb2agrub2-efi-ia32-modules-2.02-0.87.sl7_9.11.0.noarch.rpm31fe7931059e9be7e6bdad1a83a200f77593f86750de08e65fc1b8af0cc6a34apython-perf-3.10.0-1160.95.1.el7.x86_64.rpm306970c6e447bbeb126a7e99d4524b45a0cc580e5bdd05b30c60bf497ba1b516kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm646b38c30483557716b7a9addd2326eb8be8c30c972d830094895917b94ee58cbpftool-3.10.0-1160.95.1.el7.x86_64.rpm94cc896650fb6c867857693598868f7e90d7dff12ea92cb57d97c491e5e61482grub2-tools-2.02-0.87.sl7_9.11.0.x86_64.rpm1f2405d5161a7e40d572c69b539a588a86c5b52608a8040c76236783c25fc617grub2-common-2.02-0.87.sl7_9.11.0.noarch.rpmdd912b0a96c6f9aac8dd2c44c40a7a57030b9096745740f69fa71baa2e3a2699grub2-efi-x64-modules-2.02-0.87.sl7_9.11.0.noarch.rpmd26326bb671444d05e22b08e86c63b1efb22eb88e56b619103e09c497c8226e0kernel-doc-3.10.0-1160.95.1.el7.noarch.rpme917b958908bfe5251fbdee329eea5285e1986be0982e74170ee9beda0630d9dshim-x64-15.6-3.sl7.x86_64.rpm37566ff2a06fd123d9213bb8a80c355ec75811dcd769220ff04bb2496db58147fwupdate-efi-12-6.sl7_9.x86_64.rpmb0363c1d769a27dd112cf4beed6f9537c150bb34e384b45e97e90c2a347d4ee2fwupdate-devel-12-6.sl7_9.x86_64.rpm76179cf91bf69a5f79b595984e40b0a455c76f97779731b2280fed8d72eefd6dkernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpmf1fceb068c5b4818015623b6b3e87d91effa4ec9d972bf8f01efe5212616907eshim-unsigned-x64-15.6-3.sl7.x86_64.rpmbdb026643e0ca5cacf8acb7778bb5dc9b09fe7c866ee8f14ccd1ece10450a61ekernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm32fdbe756f8ed96b782df457240816cd884b0705447ee0a2c0495b7c7d763830grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.11.0.x86_64.rpm50b51f12a760777c9387ad0e1191da8716f876f3065c894fa52cd0829f8fd131grub2-pc-modules-2.02-0.87.sl7_9.11.0.noarch.rpmd8a8f3c36a67551c955b05eede25d191e50c555f8ac86438772a6db95a0c530dshim-unsigned-ia32-15.6-3.sl7.x86_64.rpm2f1541a06e65a2d86848aca2d79f1640955593a7a68eec7a03a5a47d30f3ff76kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpmdd68286b55ee763dd8fc678c44f263ec5d96c35a4c9fe9786e7cd0cbe153e1abgrub2-efi-x64-cdboot-2.02-0.87.sl7_9.11.0.x86_64.rpm2db99f7c06c5210819d5f9eb42c9abe0b8d9655d0b77f07ef73c4dae95d96175grub2-pc-2.02-0.87.sl7_9.11.0.x86_64.rpm1681e6f273f637765446f401f3eb14c0d731bada9d85f03251efc8804bc51157perf-3.10.0-1160.95.1.el7.x86_64.rpm0376e3997d60d170fce182e5cf2799f5ecb39f38e863b4913c5a993031e684f5SLSA-2023:4152-1BindSecurity Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7bind-9.11.4-26.P2.el7_9.14.x86_64.rpm29acbdd8ef76126617364b40e3f2b7329905520c0fc2997cca1943ade2e2f170bind-lite-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm7b6ad4d11d5f58c4b785a685817819d9887e90dbf5b5ef896f2edfc520d31e44bind-libs-9.11.4-26.P2.el7_9.14.i686.rpm66a6af922faa347aaf91e64655d56f5d5b5e0d92890a2ae56f02c70c4864c95ebind-pkcs11-9.11.4-26.P2.el7_9.14.x86_64.rpm7e5d0f76854bfcfbe47690bb640b238c30e97e54e939c22322536c9d3f1faab0bind-pkcs11-devel-9.11.4-26.P2.el7_9.14.i686.rpm6ddd097023193aacaa88687e1a4c37c905a7d9941541c80818654a584728e67fbind-pkcs11-libs-9.11.4-26.P2.el7_9.14.i686.rpma5d4544e806cf573de6fb927d2bb437679f2696a34fa5f792d2b76af32bb0fdbbind-utils-9.11.4-26.P2.el7_9.14.x86_64.rpm2fb0d462a1b1db1a2725e1e0baf84fb76417bf2856005d9bd57c42907b8f5944bind-chroot-9.11.4-26.P2.el7_9.14.x86_64.rpm9d0985c47e21159f2ecc9df5c8ea8d2d70f5a56bd05aa6ed00ff25b36197c5e0bind-export-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm5390ad1a5f2685596965712efe2d275bed051f57873af3ebc42b4c416539c908bind-pkcs11-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm4a989308307618115dab799fbd00aee4a7f6fe5d19f641b5e77430d452959540bind-libs-lite-9.11.4-26.P2.el7_9.14.i686.rpm2bce489aca7599245223ffae177480f2dc3b14e16c637f40a5a0c0890534a3b9bind-pkcs11-utils-9.11.4-26.P2.el7_9.14.x86_64.rpm7ff549d1ea4277b8cf04054cc499a2ef031e3bc53062ab740d612d3516fc5a20bind-devel-9.11.4-26.P2.el7_9.14.x86_64.rpmbb0eaaa881ed826216814d893c4ba525c373dd290e9eb74f24da46f40a43cfc4bind-sdb-9.11.4-26.P2.el7_9.14.x86_64.rpmbae52c0b8227daab9989105f72a3a74c7f75cceabd06b9b47d5bb4971eb6e7abbind-export-devel-9.11.4-26.P2.el7_9.14.i686.rpm0b226d71c582c942d56ca8f9a799ebe69c336b8f097905bfb1fdbaa487202bacbind-export-libs-9.11.4-26.P2.el7_9.14.i686.rpm2846839473093619718e8ea04cd84b4d4f27feb87cfb515d70fa32df7c2d74debind-license-9.11.4-26.P2.el7_9.14.noarch.rpm718ac5e100a00cf62b780e12da17fbdb95ea1e171c609c2f38db53b9aa319d6abind-pkcs11-libs-9.11.4-26.P2.el7_9.14.x86_64.rpmaca48ff6d1d75402d11355ed6f532fef4a349812937782dee155e1eca0610460bind-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm840cda41fd97e0bc0d1665a201486780fde37112cb891fe0b94062ab0f5714dabind-sdb-chroot-9.11.4-26.P2.el7_9.14.x86_64.rpm9029c343cea2748a44100b3b0b89315ab0007e45171f7be07d3d0f50d093003cbind-devel-9.11.4-26.P2.el7_9.14.i686.rpm9bca8849fb777e9b638fcccb73d988d3b34353f26ce5efc93f02b31fb81f1926bind-libs-lite-9.11.4-26.P2.el7_9.14.x86_64.rpm574c4f30fafb93115de42de08603fa9bd6f0189f2f06247cb806b0cd4de33392bind-lite-devel-9.11.4-26.P2.el7_9.14.i686.rpme75f71ee6da51243433b0b1e77fbca1b79b3205e1068775255f44eafffc1b966bind-export-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm482ef3dbadd5c64e229c46f6548fc0573e6931d61e126f5be2ff411f6a8af5e0SLSA-2023:4166Moderate: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) (BZ#2217708) moderateScientific Linux 7java-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el7_9.i686.rpm7c3395ba0672303eeacd383463317845324c1aac2030233d7fea9558fff90549java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm0acdfddd0a7621da52715ba0b8b239c1f5f0ee2dd1a5c773c835ca249e20bf0fjava-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el7_9.x86_64.rpmabfdc2d0ba965927ba438926b19bfddef818fa2ca21eac00c883a8503c092d1bjava-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el7_9.i686.rpm2ddc1ee4b77ec9cc6bceb4a1e2ea40fe0f47deb48bfd326e384c36ac9d4e409djava-1.8.0-openjdk-javadoc-debug-1.8.0.382.b05-1.el7_9.noarch.rpmaeb291eb0b50c6df8df73995e0d169b30d8cf97bf536fa903e1482fb69575ee7java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.382.b05-1.el7_9.noarch.rpm5de760604ddd497ea668ecf2f0f19d63f3d41595ed6ccbed0d890e6840626418java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el7_9.i686.rpm06ed414d6eb74d917f79c66135606b847e084b887f2e7aaec07907cc1ce898d7java-1.8.0-openjdk-accessibility-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm3ff546cd8366a57d4613b8b3329c4002bb5521633b5497eb89a8fa4339cf2073java-1.8.0-openjdk-accessibility-debug-1.8.0.382.b05-1.el7_9.i686.rpm6b4b98b46d82621ea627ea494bcde7a01d57c52f499a3251a2026c7f45e1f5c8java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el7_9.i686.rpmd5cca96d47139cb3c734101fc7d16eb5da6b8791594b76cc9cb311c0d77b8436java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el7_9.i686.rpmbb19016336ad1ffef6ccc598a796d2259b59ba46531c2a4e8ba765475158f440java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm0c8b6ce7646a1b634638dabc81d075cfcb4eddc5f6776f6d7cd2bf7103e358ffjava-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm1f710135ab14b8921155c51224f1620959c92342f5ed6c4f9e8405eb1fec8ea8java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm324fc8fe94286881f47638b6e0fd83bcd142875e7620d79ce20d80bf130ac238SLSA-2023:4166-1Java-1.8.0-OpenjdkSecurity Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382)moderateScientific LinuxScientific Linux 7java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9.i686.rpmbe2517d7192e20c4080fe95929dfae8a9aea42cab14e7e51c138f6c266d5055cjava-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9.i686.rpm246498ddacd857113797505382a16215d170259474f568de21cdf337ff0f53efjava-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9.x86_64.rpm9c426e1a4c65a49038792a46eda61db38172a58b637f04a031cb8dc4de8cd1cajava-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9.x86_64.rpmb5b7073955ddd948e0c276da88d014744e6e2f2fd6ee40b993eff6af81b8a4fdjava-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-1.el7_9.noarch.rpm93929cce2fa47a2f63ccc5d1e84aa2cb89ffcac2fd09fe915b0e4d2f33145645java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.i686.rpm9ce39f54dfaeec78b581d0b325a8412dd482468778bca0f96a755e38f80736edjava-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9.i686.rpmbb44623d2ee60580b7a1a7816d0351bd036210246f3e3fee58c3cfe8719eae06java-1.8.0-openjdk-javadoc-1.8.0.382.b05-1.el7_9.noarch.rpmb5d809bd49184057cfaa02919c8737f8ae3c3d2a9bdcb764ac4e19bb9c1cf322java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9.x86_64.rpmca822420f5631ceffa2d5652b7666c8c2acde9aaae3d32837dc2295c8a4e1716java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9.x86_64.rpm61ba3d584fa8f470ae66e0853c79997ae4939c3e81ac78e8e782b29cd7143e60java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9.i686.rpme5be3aeb37544ea9645bd3ea4ef068cd56baa4982faba21298ec5db94b461cf1java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9.x86_64.rpmc9db4e28c818f4caf37c8ebf7d4db06219799d5bc58f51989d93edefd4ffea8cjava-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9.i686.rpm20fa5eebb058c93de0e25304267aeb15993df86f8e712172fb49e325dd4b2380java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.x86_64.rpm8fea289176fabde82dcb29089c11467714e6a9abf9507fdd3cd6f86f0f658177SLSA-2023:4233Moderate: Java-11-Openjdk Security And Bug Fix UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036) * OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041) * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193) * OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20) (BZ#2217709) moderateScientific Linux 7java-11-openjdk-jmods-debug-11.0.20.0.8-1.el7_9.i686.rpm79edb96529d10ef16a14e2daf18ca1395d47fa641003d863f312355ea68f741ejava-11-openjdk-debug-11.0.20.0.8-1.el7_9.x86_64.rpmc8be48c9d252511eec2ccf4cd7fc3fcf707e8d216f95966a6d70f958affc667ejava-11-openjdk-javadoc-zip-debug-11.0.20.0.8-1.el7_9.x86_64.rpm20371f5b12456cb60bdeb50594787a9915571aeb4bed66acd480282d857a7debjava-11-openjdk-javadoc-debug-11.0.20.0.8-1.el7_9.x86_64.rpmf9ae10bed9a2bf684c6e270d4e7462952312530edc183bd7a0c09962419cba8cjava-11-openjdk-devel-debug-11.0.20.0.8-1.el7_9.x86_64.rpma53b63613af856ef8200398dc244c8afa4d2cff0f22263536599d752979620a6java-11-openjdk-debug-11.0.20.0.8-1.el7_9.i686.rpmbb113cc3ec5a057138fb0938f2778346db9a4855c6c6a4a6b46f3e5bebe2c81ejava-11-openjdk-jmods-debug-11.0.20.0.8-1.el7_9.x86_64.rpmf931e5668f419210f43e2b6024127623b3fd6428cdb9dc043cb0a1aa036ca660java-11-openjdk-src-debug-11.0.20.0.8-1.el7_9.i686.rpm28344a7fd67e264329c9b07f5dcd8610dd66e448e5034ce1cf2fa55fcd234b92java-11-openjdk-src-debug-11.0.20.0.8-1.el7_9.x86_64.rpm33dc461e2082675b6e346795f300a91acdefa485e9233d3cf39f39b66e1fdae3java-11-openjdk-demo-debug-11.0.20.0.8-1.el7_9.x86_64.rpm8d383e463fb3b251593c23148d5c2ea67bdc3ba64601dd4ee6b8c2c249a85396java-11-openjdk-headless-debug-11.0.20.0.8-1.el7_9.x86_64.rpmde3b19406174e17155461c16bbb7ab46d6bab3ea373d9314d96cfbb7b5dea026java-11-openjdk-demo-debug-11.0.20.0.8-1.el7_9.i686.rpme71b46bf3b51c008b27b18cf8f8b4ab68e8fc6698382531f49ff66caebc79586java-11-openjdk-devel-debug-11.0.20.0.8-1.el7_9.i686.rpm27fddb078f6eb1a9cf97d83adca5712bce9b19d61c0f9f261094530b0daac735java-11-openjdk-headless-debug-11.0.20.0.8-1.el7_9.i686.rpmbfd172cc6c3047b7f2eaf10420625983b90ee8e61e0081b2db7b24e80cea299ejava-11-openjdk-static-libs-debug-11.0.20.0.8-1.el7_9.x86_64.rpm3bb27392b418c7c8899fc2e0856d3088e204b078c4dd1dc42cba2533e6055080java-11-openjdk-javadoc-zip-debug-11.0.20.0.8-1.el7_9.i686.rpmb45ea9aee2c7cbf87cf5e1a036fdaff5fc324eb0625524ea8333725f0c3f585fjava-11-openjdk-javadoc-debug-11.0.20.0.8-1.el7_9.i686.rpm4718a60737d866d51134e1997539125b97ffe020138b1154e117738222266221SLSA-2023:4233-1Java-11-OpenjdkSecurity Fix(es): * OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036) * OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041) * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193) * OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20)moderateScientific LinuxScientific Linux 7java-11-openjdk-jmods-11.0.20.0.8-1.el7_9.i686.rpm6b81768fbdd28e1f6d21396d5c56c492566e171f0b3ba69d6a53c6899d8e7669java-11-openjdk-devel-11.0.20.0.8-1.el7_9.x86_64.rpm44d5bb2962cf95018188e0e9322f1cb0749559717925095f014860d9a2d52a51java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9.i686.rpm181fec129c7d9092535329e8c13b10738f5b458b4bfc8e2b35f3d7a849fbf9e8java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9.i686.rpm8d254b5dd60cc5ae65759c71124065eebeadf32795a13e6e6b4c19d3453c5734java-11-openjdk-jmods-11.0.20.0.8-1.el7_9.x86_64.rpm9fd0134a61497cef62d71c58e257c28984fe6754e417330cc4d3f196e800f4a9java-11-openjdk-devel-11.0.20.0.8-1.el7_9.i686.rpm0c514dc36635d32c240308ef4dfc2b015bcc3c7223d010cf7ddf81ace4f6c9efjava-11-openjdk-javadoc-11.0.20.0.8-1.el7_9.x86_64.rpm28f51f4e0c1d3b94b428e29c38ff7cde48854235795a347f7bce25e3fc1a011ejava-11-openjdk-src-11.0.20.0.8-1.el7_9.x86_64.rpm27a31b28a2db95c6db0a33da9d25fcdf6f29d7a3c8a6c2fbf3a265bebec66a22java-11-openjdk-11.0.20.0.8-1.el7_9.i686.rpm256fef34638e88b726b4a2f1c25fe1c25f3b9f780bfbf76cd7707df050945acejava-11-openjdk-headless-11.0.20.0.8-1.el7_9.x86_64.rpm5eee4ef43ef2ae522c24da2c9567c7a10a8e69c762b7388de5a44a094fdc31f4java-11-openjdk-demo-11.0.20.0.8-1.el7_9.x86_64.rpme8ccbd4e99b30c1b578777648ae4a22f2925f73051c06ce99f714f6b60bbe707java-11-openjdk-src-11.0.20.0.8-1.el7_9.i686.rpme4a4b80fd40168ee4be8d2d45724d4732b643a3109f88120835280019c5d1ccbjava-11-openjdk-demo-11.0.20.0.8-1.el7_9.i686.rpmfb47826b6a6845ad11f4df022362b11cc86f8f707603371872e06ecc2a338833java-11-openjdk-11.0.20.0.8-1.el7_9.x86_64.rpm4277755e41d7df46ee4f348b36b869e49d17408bb01b498245bebd9ead246923java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9.x86_64.rpm58c77950e50ddc6351ef578222b43c1629ac54bd5dfb8e1739807702af220c16java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9.x86_64.rpm07ef48a92d0025a97f2a3ba7d19df6dbc2e00facba809f2d5dba5d74f097473djava-11-openjdk-headless-11.0.20.0.8-1.el7_9.i686.rpm8187223a55a7d29c536ef088992487a98eb5d02f73701a501a5b0a5a9973cb4cSLSA-2023:4326-1Iperf3Security Fix(es): * iperf3: memory allocation hazard and crash (CVE-2023-38403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7iperf3-devel-3.1.7-3.el7_9.x86_64.rpme53c0d01885458be4adac152217cf53d799662878939bc5fc691966f389e2f0fiperf3-3.1.7-3.el7_9.x86_64.rpm10a02c97f06d7be475a801b26dd8e756dbe815448697365a2aadfaa1deb0132fiperf3-3.1.7-3.el7_9.i686.rpmcfceef3822daabf5924b978c72905b741df7d00aaff0701b93f98cbe3c29aed7iperf3-devel-3.1.7-3.el7_9.i686.rpm3ec8a3704f101c48bf5e1ebb5799a8c4bbab428be5d54c451cae8049349698cbSLSA-2023:4382-1OpensshSecurity Fix(es): * openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7pam_ssh_agent_auth-0.10.3-2.23.el7_9.i686.rpm15137695c53e2f504a6425d916c4e8d918cde6ea488c14a409e5bea6d383234bopenssh-server-sysvinit-7.4p1-23.el7_9.x86_64.rpm533d76891a4fd3af080647599d3de4aa93943e29dd2ba22e6cb2099e9297fc57openssh-server-7.4p1-23.el7_9.x86_64.rpme49f21aa861a841c7277185e4773533fdf824307c3bd2a190dbf6a4993534f4eopenssh-clients-7.4p1-23.el7_9.x86_64.rpm42ff6594a5706664e867dec3f55c7c5f2f781a76387b4b0fbdd61dc761c122cfpam_ssh_agent_auth-0.10.3-2.23.el7_9.x86_64.rpm5f5a93beb057f9d2bd3fc6809afa4bde65bc5cf9e2777ff6ad037b47524bb0d9openssh-askpass-7.4p1-23.el7_9.x86_64.rpm99e3fab2ddbf75dc3fe4eec47c13b108bcc5f86943ae40c64600b06a5ca13894openssh-7.4p1-23.el7_9.x86_64.rpm46560001f786099f2c23e67c61af9ada89ce46dee0a69c0ab2d9c8fec4928e18openssh-keycat-7.4p1-23.el7_9.x86_64.rpmc40d827906c9369a9cec60464f73dccca0c426665c52635a716cfdced2f9757bopenssh-ldap-7.4p1-23.el7_9.x86_64.rpm9668bcfc1a63f462660cc217d76fb0cfb95877ffabac224267198051dc9fb002openssh-cavs-7.4p1-23.el7_9.x86_64.rpme4eb00f6b5814dad2c715cfb2570de1665b13cddf60578f8a644b88fb470b02bSLSA-2023:4461-1FirefoxThis update upgrades Firefox to version 102.14.0 ESR. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.14.0-1.el7_9.i686.rpm46d3174db667a468ed9cb3879dbbefb56ba6a15111095d9f94cf9309b018a57dfirefox-102.14.0-1.el7_9.x86_64.rpm773c59b1f0ce9ec001ca836d4986d4ec85972700c21e51b94e5f149abd14b401SLSA-2023:4495-1ThunderbirdThis update upgrades Thunderbird to version 102.14.0. Security Fix(es): * Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) * Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) * Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) * Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) * Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) * Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) * Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) * thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417) * Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.14.0-1.el7_9.x86_64.rpm90d4ca466a0c27ff92aa361e83fef3d2ad2a24f8ea729dc3ec89a46aab27f924SLSA-2023:4701Moderate: Subscription-Manager Security UpdateThe subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Red Hat entitlement platform. Security Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7subscription-manager-cockpit-1.24.52-2.sl7_9.noarch.rpmd4dce8973007bffbdb590385324bb6fd624bdf3bf42f093cc1011ce33043d590SLSA-2023:4701-1Subscription-ManagerSecurity Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEmoderateScientific LinuxScientific Linux 7subscription-manager-plugin-ostree-1.24.52-2.sl7_9.x86_64.rpm3aef89a2e5aa34e5153b964de89ed8dc97536a4197eca875550277ba3a329df9subscription-manager-initial-setup-addon-1.24.52-2.sl7_9.x86_64.rpmd004be8aedd432c0ea079c964d307e81a2899951816394458e645f88c5466994python-syspurpose-1.24.52-2.sl7_9.x86_64.rpmac777cf7e2eec23ec0e63b8c373ba4673dfdb5c5667d99d1fee87b23fff2d13fsubscription-manager-rhsm-certificates-1.24.52-2.sl7_9.x86_64.rpm59bac61f4807e35bfe6ffc7571678a2d01c64c5ac838510fa8f318f58ac36bb1subscription-manager-gui-1.24.52-2.sl7_9.x86_64.rpm6fb9aebcc5c57bd532ba287e48d4c86f54096c54d01da06ca6779a2cbc601385subscription-manager-1.24.52-2.sl7_9.x86_64.rpmdc72bb7a68002ce37e74d434c63040b2ee393b29fcf70bdbb4dd9c7a7ccd1570rhsm-gtk-1.24.52-2.sl7_9.x86_64.rpmd039aca531355bf6b59cbfe5391109d27d7b4cbf5d60e0c1abbd7b352cf62671subscription-manager-rhsm-1.24.52-2.sl7_9.x86_64.rpm65df3cd12882609a31cb34e044827a64bb72e46c7f0a99ec5a9b62a36431d403subscription-manager-plugin-container-1.24.52-2.sl7_9.x86_64.rpme9b395154b73f1f202917516bbfa4775d16da753e3ba2ec3deafc44316153c7dSLSA-2023:4766-1CupsSecurity Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7cups-devel-1.6.3-52.el7_9.x86_64.rpm7c3cbf4cc374bdfd8015361637a8b8a867b5d1fa69bb7beff755640f23f6c0cccups-devel-1.6.3-52.el7_9.i686.rpm5504cec28cb1a1e19235afb9c2c56e02ba69aff292d6eef5d78f8d969419ce01cups-libs-1.6.3-52.el7_9.i686.rpm88297a55377748d2933fc8de089f795e27b3865d49e549e260b3fac7215498c2cups-client-1.6.3-52.el7_9.x86_64.rpm95ca623b83f86e463b49c79bbb19ccec5cf0199fa1ed2271a0e9a2f67148c76acups-1.6.3-52.el7_9.x86_64.rpm5741a6d72fe6c707106827df879c07eb365b69af9fd6eda0c6234f9136df517ecups-filesystem-1.6.3-52.el7_9.noarch.rpm5d1fd0decc17e7916b5d62739789604e57922d2c7b52fd4b12ad62288f188d3fcups-ipptool-1.6.3-52.el7_9.x86_64.rpmad6a544566561c17ed080bcdc740b00c63bc540a587e056c9285079b223826d0cups-lpd-1.6.3-52.el7_9.x86_64.rpm8e901dc27343fab9c1d7dcc25456b2817c574fd7e5fee0e00f157ce6e0b1621bcups-libs-1.6.3-52.el7_9.x86_64.rpm0485f21088d13e839a97117b8bdbc2430f5d0d9120cde06179f95bbc56802dffSLSA-2023:4819-1KernelSecurity Fix(es): * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE Bug Fix(es): * nf_conntrack causing nfs to stall * Request to backport upstream commit 5e2d2cc2588b, 26a8b12747c9, and e98fa02c4f2e for SL 7.9.z * Fix soft lockup happens in gfs2_dir_get_hash_table()importantScientific LinuxScientific Linux 7kernel-tools-3.10.0-1160.99.1.el7.x86_64.rpm75fddc94eff778849051cd727cde8d2e2eab9f0dbe25819a1d54dea474ba2419kernel-headers-3.10.0-1160.99.1.el7.x86_64.rpm9480fa13131dc355affd38b22afae1755613b3600b7dfe14699c4747410c227dkernel-debug-devel-3.10.0-1160.99.1.el7.x86_64.rpm28326695252bb7d55df1dbaf43cc0761341058093df41ddfb46502f704eeb00bkernel-debug-3.10.0-1160.99.1.el7.x86_64.rpmfc472728cc201ee91ac0fce414ac4907d6c1ece852952923855f7af882ec7ad9perf-3.10.0-1160.99.1.el7.x86_64.rpmabce41dd1aee77f661942497306545ac92cb95691348aa373cb66d2ba7ff333ekernel-abi-whitelists-3.10.0-1160.99.1.el7.noarch.rpm9e4dfeb66bac590bd33a26a3790dd3dfddf021f04c63cb11861c56569690d705kernel-3.10.0-1160.99.1.el7.x86_64.rpm823739028f271b72b7c0eb70e840c904a8b2c7fe1a757ebe819051befaac9a4bpython-perf-3.10.0-1160.99.1.el7.x86_64.rpm4a3bc0876b9b50589d39ff0880f73c65154e7a10a4e70b2c23dee84821f34b77kernel-tools-libs-devel-3.10.0-1160.99.1.el7.x86_64.rpm60f1ab6f6adb06f4d334331206fa7a46354fb75c8c10b467c569acdcd60356f0kernel-tools-libs-3.10.0-1160.99.1.el7.x86_64.rpm7547e301ec4b71ab1cd94b53e76d74b88fcc61a279c782d4e4184374ab2db0cekernel-doc-3.10.0-1160.99.1.el7.noarch.rpm40076f29ea2adeb4fc645a3173cce4ffbd86b82d3feb16cdb794d8db0df3e4f6bpftool-3.10.0-1160.99.1.el7.x86_64.rpm3337d4a5bc9064ab0ff906f5ef8ce2a5f97898ed0755a9d76b507f6797caad8ckernel-devel-3.10.0-1160.99.1.el7.x86_64.rpmcd25d361321788c310c1156e50d2441ae63062eedaf5210068a9261acff274edSLSA-2023:4945-1ThunderbirdThis update upgrades Thunderbird to version 102.15.0. Security Fix(es): * Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) * Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) * Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) * Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) * Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) * Mozilla: Full screen notification obscured by external program (CVE-2023-4053) * Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) * Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) * Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) * Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.15.0-1.el7_9.x86_64.rpm46e739eeccfcee1be1adafb14c695e142b04362af9b6817cbffaed4730cfd694SLSA-2023:5019-1FirefoxThis update upgrades Firefox to version 102.15.0 ESR. Security Fix(es): * Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) * Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) * Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) * Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) * Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) * Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) * Mozilla: Full screen notification obscured by external program (CVE-2023-4053) * Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) * Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) * Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) * Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.15.0-1.el7_9.x86_64.rpm61891cfbf073416bacb946e6277177b91a65036cbce448a4d9487b556e7962f4firefox-102.15.0-1.el7_9.i686.rpma877db6eca1e072036ca6240b94335741438f65df125fbeb18d97deb9d69bd51SLSA-2023:5191-1ThunderbirdThis update upgrades Thunderbird to version 102.15.1. Security Fix(es): * libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-102.15.1-1.el7_9.x86_64.rpmba267354f3ea78058c39dc9a97779e0b13a6b2171755048856938aa03992073bSLSA-2023:5197-1FirefoxThis update upgrades Firefox to version 102.15.1 ESR. Security Fix(es): * libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-102.15.1-1.el7_9.i686.rpm85ef44035e869811a3f97325047aea5e33af2c1caabda824e7776c13b5ad9d4efirefox-102.15.1-1.el7_9.x86_64.rpmb4551ac8b815861793286454e211a169412783791af0ba5c020e2a9e36f12a88SLSA-2023:5217-1Open-Vm-ToolsSecurity Fix(es): * open-vm-tools: SAML token signature bypass (CVE-2023-20900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7open-vm-tools-test-11.0.5-3.el7_9.7.x86_64.rpm823f5bcaaa0eb97d719b79e3db244c2dd67d202054be1d9caef4383f73acc19fopen-vm-tools-desktop-11.0.5-3.el7_9.7.x86_64.rpm6abe1fc243914c55f8b9c4a529ee935f0c75fb9d8249afd6de81c1b72b9c160dopen-vm-tools-11.0.5-3.el7_9.7.x86_64.rpm5a7d14bd74c028a57867ba8c1d1ba693c9dd4a71176b504fe402adceae895764open-vm-tools-devel-11.0.5-3.el7_9.7.x86_64.rpmb9640d3d9d1264d159ccd03d4dc2a7ebd04170172e455b679e8c2046765becb7SLSA-2023:5461-1ImagemagickSecurity Fix(es): * ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS (CVE-2021-40211) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7ImageMagick-6.9.10.68-7.el7_9.i686.rpm88d53e3471be404073aacd2022f843d43aa504f504e01aaa542f1dfce7c30ef4ImageMagick-c++-6.9.10.68-7.el7_9.x86_64.rpmf1ef8a6d1457af646a1c6dc6f4c946a41d36b8fc073c2f40982be49691898167ImageMagick-devel-6.9.10.68-7.el7_9.i686.rpmb6bf0c4cc6844c9403adc6d56117609c51ee7422f0d38ee24b914f721b7208a9ImageMagick-c++-devel-6.9.10.68-7.el7_9.i686.rpm1935210bdf75f03b17edbea60aafce80c36c751efbd7e710642bb3f47338a94cImageMagick-c++-6.9.10.68-7.el7_9.i686.rpm2ceb28d62d9233df28ab04ede1331fc5e70c2e1a400e8c179b1a0486b14774d3ImageMagick-perl-6.9.10.68-7.el7_9.x86_64.rpmfb473c30a12109a02292af2b0109fa82b076c6c1868be07bedc1bb9fb743c208ImageMagick-doc-6.9.10.68-7.el7_9.x86_64.rpme66939f63c2e5a10e45ff7583c0f6a5e66a7f2b92e8cf14ac6ef2a3b552b46d7ImageMagick-devel-6.9.10.68-7.el7_9.x86_64.rpm9bd618b50bc740fe658ac25a4e8f4a2d683ccd4104c8c0f84652b388c2b5a03dImageMagick-6.9.10.68-7.el7_9.x86_64.rpm7aed22ca7f0431ae1c663475b14a974c97ff1c8acd8be1903ed9e103c637f3a2ImageMagick-c++-devel-6.9.10.68-7.el7_9.x86_64.rpm554f282b8a2f8ecda2b76fa9b51b4b9e2121579f5e4ca9ff1aeea6576a298136SLSA-2023:5475-1ThunderbirdThis update upgrades Thunderbird to version 115.3.1. Security Fix(es): * firefox: use-after-free in workers (CVE-2023-3600) * Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169) * Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171) * Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176) * libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7thunderbird-115.3.1-1.el7_9.x86_64.rpm8cab323b2f5657da63859e1c00c841e58c2d089d5cf0fa15633f5065c28579deSLSA-2023:5477-1FirefoxThis update upgrades Firefox to version 115.3.1 ESR. Security Fix(es): * firefox: use-after-free in workers (CVE-2023-3600) * Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169) * Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171) * Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176) * libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVEimportantScientific LinuxScientific Linux 7firefox-115.3.1-1.el7_9.i686.rpm7f4e2228d5d9d2949d16d30256d62fd9bf0ba6b0a2e2d47fe78ce28140e53ef0firefox-115.3.1-1.el7_9.x86_64.rpma4a269e22d3ff050ca22f748f613c9a75f87601b4c6f69dd657bb3e7bef41aa0SLSA-2023:5615Moderate: Libssh2 Security UpdateThe libssh2 packages provide a library that implements the SSH2 protocol. Security Fix(es): * libssh2: use-of-uninitialized-value in _libssh2_transport_read (CVE-2020-22218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7libssh2-devel-1.8.0-4.el7_9.1.i686.rpm009dbbbfdc6c1bbc675cce7495a9e81969032fc5c5ae59d06f1e05bd10769440libssh2-devel-1.8.0-4.el7_9.1.x86_64.rpmceafa4b990b4ff47b9232a9544bc5b7396e6d9300a0c4bcdeca6ba4ce1371521libssh2-1.8.0-4.el7_9.1.x86_64.rpm6f0a7a53236ae0d600edfd672bc8d32fae6195edefd1680fd75ef358115faf10libssh2-1.8.0-4.el7_9.1.i686.rpm5a3128e54547a71535b164de231c5b3027ed4ca833aab74478d77d773b81b146libssh2-docs-1.8.0-4.el7_9.1.noarch.rpm650f40d7ebbeca8d4c1ac5d73e0e22f5a985ad0880700d6681a2bd5ac77d5a87SLSA-2023:5616Important: Python-Reportlab Security UpdatePython-reportlab is a library used for generation of PDF documents. Security Fix(es): * python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7python-reportlab-2.5-11.el7_9.x86_64.rpm6aa94a449302c953ce792df4055fc1a3f90f43a4331b8f20449ad3cf5b7372ffpython-reportlab-docs-2.5-11.el7_9.x86_64.rpmcb7cee39beb801352402cce7e897d37a3dd27f7214894296337b6406712eec8aSLSA-2023:5622Important: Kernel Security And Bug Fix UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609) * kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180) * cifs: memory leak in smb2_query_symlink (BZ#2166706) * bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062) * NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604) importantScientific Linux 7perf-3.10.0-1160.102.1.el7.x86_64.rpme13f03ef1dbecc2f0401b1d2d37cf13112668a74de4528e3699c9162e000fce7python-perf-3.10.0-1160.102.1.el7.x86_64.rpma575dc41a38b86ba6a5810695c921e7619e1e2f3cc851b7191772556c8445fc6kernel-3.10.0-1160.102.1.el7.x86_64.rpm8456ae2be668b8c01e3404760d5c5c20101fe93cc7e475a9add9e165bcb8744dkernel-tools-libs-3.10.0-1160.102.1.el7.x86_64.rpm955dfd4ad62fbde7414671c80983250683118e07db34d953eb2b2728dacb38efkernel-devel-3.10.0-1160.102.1.el7.x86_64.rpm2b3eac029ce5cc3ebe613fd987c2cc5755ed4b779f64aff27e1dfdfb8651771ckernel-debug-devel-3.10.0-1160.102.1.el7.x86_64.rpmc8586683d09e71c02c70d426ef7e7968c7685ed3df97d3ae02e6476bac054c26kernel-tools-libs-devel-3.10.0-1160.102.1.el7.x86_64.rpm7a4a9eba9ac8bcd99d3892f35744aa1687f3d631a3841e2e8eb62ed0bfd4874ebpftool-3.10.0-1160.102.1.el7.x86_64.rpmf2ecdcd661c5d2880bc243b18d61eade1612a0fa12d1e2b646f53fc4c481f458kernel-tools-3.10.0-1160.102.1.el7.x86_64.rpm394b4a4157f66ce62e0972a0a55cce0f9d2db44d925e09490d2810081f0b0d5ekernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm7b4094d89b5e84246ea6c31607f1f362da35b5932c63d97df6dd14b608238b9ekernel-headers-3.10.0-1160.102.1.el7.x86_64.rpmfac89ec17332ba89ae0a8080edf732968ba6e1e16be9254c43f7a771fce7a164kernel-debug-3.10.0-1160.102.1.el7.x86_64.rpm7ee96c98d694bbd669f5882f922b4b663d951d2fcfe07d7831e4e2e96e9cd8f9kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm5c92588d3271e91f0d85560f158e9b6e7b04446a911c436632f0518e2d136901SLSA-2023:5691Important: Bind Security UpdateThe Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7bind-license-9.11.4-26.P2.el7_9.15.noarch.rpm1f2d553f8f24279612612680dbafddface901a6d1452b5d34a6ad88af38757f1bind-export-devel-9.11.4-26.P2.el7_9.15.i686.rpm95f585ef51d565420ddfe4b9dfce1622d3792cbf10af8d2c3f548d9b63d2eb8ebind-sdb-chroot-9.11.4-26.P2.el7_9.15.x86_64.rpm58471fb7e9d0ccf639ac4ebeddc9b966a23875505b5bbf4368e9080cf8c0ae39bind-libs-9.11.4-26.P2.el7_9.15.i686.rpm5df9ba6db0f2f8cc95f80fe842f43c409bd92b8c1a2d765ebfe2c0c6d50701ffbind-libs-9.11.4-26.P2.el7_9.15.x86_64.rpma168ea75edb8a7b39c15699c8febed2520ea1d99df02fa2d5440beaedaceeaffbind-export-devel-9.11.4-26.P2.el7_9.15.x86_64.rpmb32d0d507b984496b55516e0ec02eeae22030905f6ef8b74080722f0adde637bbind-devel-9.11.4-26.P2.el7_9.15.i686.rpme6650a58dc11021770d67bb32617b4c04540d9df62c721351acc7726ece9d3bbbind-pkcs11-utils-9.11.4-26.P2.el7_9.15.x86_64.rpm4eed10bb667dfc4971c95d9d93ade897fe93c4e7d221b8393462eee7501e150cbind-pkcs11-libs-9.11.4-26.P2.el7_9.15.x86_64.rpma705ea82b76f5ecd7c4632abc398745bad874d9cf14e0a674fe2cb9e1e1d6644bind-9.11.4-26.P2.el7_9.15.x86_64.rpmba891837c78bb03773d1b1e143a6769cefab02d2de47807948e69b783a397df4bind-sdb-9.11.4-26.P2.el7_9.15.x86_64.rpm6513a176e8b138a53fceecbe776c3b65ea4f31f8335eb485cb3334f05093fcb6bind-pkcs11-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm06992c1c6d9fa589d842073956eee1be92738fbd0b353a7e3b67774051cb42d3bind-utils-9.11.4-26.P2.el7_9.15.x86_64.rpmb10a650abea629a5b6e188287df5a45bc11e4147ea40dd087fe5d7c498183260bind-export-libs-9.11.4-26.P2.el7_9.15.i686.rpme1502396e3614ad3a8c7e51b30ad949380482473a8260a9391252c04c20c200ebind-lite-devel-9.11.4-26.P2.el7_9.15.i686.rpm4d7662bc5de69a43871484c65c73012998fb326d2e1cc770fb35ae5fffd5e995bind-export-libs-9.11.4-26.P2.el7_9.15.x86_64.rpm35fbd8117dfd541a110aaa5a30912cd15872f4701d9ce9e1e4dad76ad0f6d6bbbind-lite-devel-9.11.4-26.P2.el7_9.15.x86_64.rpmff3504db59f1af9765994d69f88c383447c70bf6ba23d3775d061be66e631191bind-chroot-9.11.4-26.P2.el7_9.15.x86_64.rpm1b044d428ce288b1b20083566f75f11524349db9fd060aae6b4ea7df2dc3ff4fbind-pkcs11-libs-9.11.4-26.P2.el7_9.15.i686.rpm6f4720e6664eab7dc8c0b9d43b52c1c577e2bcee1336234ab36079cefb81a7cabind-libs-lite-9.11.4-26.P2.el7_9.15.x86_64.rpm076d2419997ecf088330d9c732e699549026def60522c69730109edc94bb4f2ebind-pkcs11-devel-9.11.4-26.P2.el7_9.15.i686.rpm715efff7432a568ce183f654b9f4c69350cd92adaec5bef9ddebb74d29a9de10bind-pkcs11-9.11.4-26.P2.el7_9.15.x86_64.rpmbfac0bd5c2364efc678b08c266cee4929ec9b582f7c50a80ace8ffb28ac46738bind-libs-lite-9.11.4-26.P2.el7_9.15.i686.rpm51bfe6c18c927b4aa3922c703401d708be836b3bbb7d485f136e374abf132a67bind-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm9bc7a0fda0b7aad5df7f421582b7fe6f585daf922054aecccb961c1122878d2aSLSA-2023:5736Moderate: Java-11-Openjdk Security And Bug Fix UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 11.0.20 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 11.0.20.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2236229) * A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13217) * The serviceability agent would print an exception when encountering null addresses while producing thread dumps. These null values are now handled appropriately. (JDK-8243210) * The /usr/bin/jfr alternative is now owned by the java-11-openjdk package (RHEL-11320) * The jcmd tool is now provided by the java-11-openjdk-headless package, rather than java-1.8.0-openjdk-devel, to make it more accessible (RHEL-13227) moderateScientific Linux 7java-11-openjdk-debug-11.0.21.0.9-1.el7_9.x86_64.rpm852d5ebdda7e6e0a361e70d04a503a6103768771503e8bfd5106681681622faajava-11-openjdk-devel-11.0.21.0.9-1.el7_9.x86_64.rpm31573a285a0ce978a16cd2c795a604c932b450d1b870ff837c33674d71d21c44java-11-openjdk-devel-debug-11.0.21.0.9-1.el7_9.x86_64.rpmd5958af0dfdc7c5b371b50cbbc421223629494c767cd923987398b82b7dd5a47java-11-openjdk-jmods-11.0.21.0.9-1.el7_9.x86_64.rpm83585a3bbadda28e6c98442d96aeb494f16729be4b77d8c9e5d25bbafdf96187java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9.x86_64.rpm65299f6ccbee7059e1542ca7db8d3e8f4885c2e26734d3a3a1ccb76529d2cd64java-11-openjdk-src-11.0.21.0.9-1.el7_9.x86_64.rpme602c08e8604c159064411ae0655ee92d7b6422abbef5c7a13e27fc2ee92dc8ejava-11-openjdk-headless-debug-11.0.21.0.9-1.el7_9.x86_64.rpm2f1424773b3bf97109decbfbce83982ef90361700ca9bcd4e6c483ff7abfdd65java-11-openjdk-headless-debug-11.0.21.0.9-1.el7_9.i686.rpm867892df7b5ab9817c033f87d563690c8decdd9907f0932f66ad4827115b8394java-11-openjdk-devel-11.0.21.0.9-1.el7_9.i686.rpmeef4f88bea160aa6f3c213e3a3f8ffb7505ba8deacbde9871ea272046d1770d9java-11-openjdk-jmods-debug-11.0.21.0.9-1.el7_9.i686.rpm2b789ee027e297e9f6070c80624d1710aa44a1186f3d9ea81156ba947af7c62fjava-11-openjdk-javadoc-debug-11.0.21.0.9-1.el7_9.i686.rpmc87e82c8da8b407bd91a6b8c354ad494e4866a636fc9d58b6f5b7888279aaa53java-11-openjdk-javadoc-debug-11.0.21.0.9-1.el7_9.x86_64.rpm7dd0a1317bb451d71bf25e6898de171800448281ad5865fac3aba2361ab4797ejava-11-openjdk-src-debug-11.0.21.0.9-1.el7_9.i686.rpmef60fc8284635089a6a4e90a3daa4f7568066e984c8a935e3b4c7911df3fe7e4java-11-openjdk-static-libs-debug-11.0.21.0.9-1.el7_9.x86_64.rpm73236b4177b331b6182ded512b3964293092c169af420ff89e0d1ea0c0894d5ejava-11-openjdk-demo-debug-11.0.21.0.9-1.el7_9.x86_64.rpm83b5369cb37704d4e8c55b13b69c71835e5cc208df9b266211dcff06d9dd8010java-11-openjdk-src-11.0.21.0.9-1.el7_9.i686.rpm3fbd264abeb17ed7058526340788bdd44ed40eee3cd6a3c2d9b66a2dcb3fe4adjava-11-openjdk-11.0.21.0.9-1.el7_9.x86_64.rpmca02127332588becfad797011fbeee87663499d1d05caea52f61697392e69cf8java-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9.x86_64.rpm9b7f0e8d335fd74f8cda722e4cc0e1fc3c7afc98c03dae7b7982cb1fede98301java-11-openjdk-jmods-debug-11.0.21.0.9-1.el7_9.x86_64.rpm27fe7c8fa43755c6207dfb71ab365fdba13452d5d08a16b8282eeaaac791eacbjava-11-openjdk-devel-debug-11.0.21.0.9-1.el7_9.i686.rpm79d52c2faa70d6c36fe8db4c76d02c669be81949390abb2bbb2eec606adfc1f1java-11-openjdk-static-libs-11.0.21.0.9-1.el7_9.x86_64.rpmcbdd1d4c981960e812db20fc18392044094608c8aa47d1797342dc1fbaf647dcjava-11-openjdk-demo-11.0.21.0.9-1.el7_9.i686.rpm17b85cd96008ab269b824ad60eb2387310af37ef49ff057620299647190fd6cajava-11-openjdk-javadoc-zip-debug-11.0.21.0.9-1.el7_9.x86_64.rpmf7a2f24c0a950cd6be1535aefb47f15088778c8a20a4323b69874539a109fcf0java-11-openjdk-jmods-11.0.21.0.9-1.el7_9.i686.rpm532b08c6ba673d428336e8cad5d42ce0de15065f218a93190949fddf858060ffjava-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9.i686.rpm70170123103b1590d4a9330b995f642a10d677ec34ca872adb927d829bdcebbdjava-11-openjdk-debug-11.0.21.0.9-1.el7_9.i686.rpm88a4f0f227ded151ac7a1aa4ab1e538f2cc8314eef93b08bc14681e148db3732java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9.i686.rpmf5cf09cf91f67fa17b9023ea064e84edb5915a6e5958cfb3450b5a77ac2c9d49java-11-openjdk-src-debug-11.0.21.0.9-1.el7_9.x86_64.rpm99a2016d3f40a3ccd73128756b22f143a8b9cfcf585acb5ed46b81468717af8cjava-11-openjdk-11.0.21.0.9-1.el7_9.i686.rpma16956c879fd4befa343beb4eb1af596f2925cdaa0a5b6fb03a364593a9ed314java-11-openjdk-headless-11.0.21.0.9-1.el7_9.x86_64.rpm0569be2009302b5f1b9d2728285d563a1d031340591b2054384502482a17e1a5java-11-openjdk-demo-debug-11.0.21.0.9-1.el7_9.i686.rpmd6469bf88d85c6c3a1e20039bda579eec4957c26e68e223d554cb82bbf0774f7java-11-openjdk-javadoc-zip-debug-11.0.21.0.9-1.el7_9.i686.rpm451678b8e4f2b5e8f619def5c5b2f079f2e68683c07db695bddccfa0200f0e71java-11-openjdk-headless-11.0.21.0.9-1.el7_9.i686.rpmb9c4db2d2ae4a6d14d207725a0914da14ad214c0ca4081436debbf9441af8011java-11-openjdk-demo-11.0.21.0.9-1.el7_9.x86_64.rpm6b64894d3055d23192b286d5a29f1dbaa42b94c0639a14aee9e48e6d908067bfSLSA-2023:5761Moderate: Java-1.8.0-Openjdk Security UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: IOR deserialization issue in CORBA (8303384) (CVE-2023-22067) * OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13576) * The /usr/bin/jfr alternative is now owned by the java-1.8.0-openjdk package (RHEL-11319) moderateScientific Linux 7java-1.8.0-openjdk-debug-1.8.0.392.b08-2.el7_9.i686.rpm6d4e5f1ff90bc3c870c319b24b7cdbd0581bf1884eeee55a3a867103989da885java-1.8.0-openjdk-demo-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm7b531fc824bc53d0abb38ba0e791591b64025ea9089eaa65ff216419a6197b46java-1.8.0-openjdk-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm4b7ee7cb710573dbea4fb24a1c749a2b9434f35bb36626d86a8a59ecc96fdf70java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9.x86_64.rpm8951375cb2e20465100207c6130e226777bfce5762d57b3223467d98f2aedaa7java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9.i686.rpm0ff901d0c87829836df0499cc8f050a7c78aab35a06ed4bdeb4822feea48ec25java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.392.b08-2.el7_9.noarch.rpm8bde934721aa324b5b9764220e0c1b962de3f0855fe5e23b3a5dbd585bd704e3java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9.i686.rpm2efe8409b7d03beac4ebd8b78af58260d081ba1ff32fac107cf0ff2d4ead4c67java-1.8.0-openjdk-demo-debug-1.8.0.392.b08-2.el7_9.i686.rpm26d16630cfa11ac24776e2b350acda9a0a37b984a14d9fe092f79a94e23e691bjava-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-2.el7_9.noarch.rpm634b546eed00b6c45a2840094ba4420ec53b8c3de17c653d20d8a988dc9b84c7java-1.8.0-openjdk-headless-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm3c97d5503a057f4f3c9b0f824ba80233b203a547b12643351a388d5cfc8ca5efjava-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9.x86_64.rpm2b7ca53c76ffc6276f180e58660b5ac5001598d6c8065f75813d0623850e353bjava-1.8.0-openjdk-devel-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm5cd42567e4d7a4f162c012cf15c361cc029ea6600566e5d92133824af9c4cdbcjava-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9.i686.rpmc60dba6b1acc4e87d7e438c23c5c580b6eb35568518b8b4e85cd5150ac9aa13bjava-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9.i686.rpm79007f62ab4acc856f5c43abe124c3bfaa357cb9a3eddf7a495e20b322a61d54java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.i686.rpm519a0eb6d8b1904eb1654b9d3629bf6602005d4f48cb753c5b3f7f1030d4b0bejava-1.8.0-openjdk-accessibility-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm8bcb60f5f3ae465e3b17b6909719e446f3d8adaba73bfed62cd66c95ec743b91java-1.8.0-openjdk-javadoc-debug-1.8.0.392.b08-2.el7_9.noarch.rpmf4362e1341e135258824db551a80726f36017494058809085f93b2c69db69449java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.x86_64.rpm4f87d75a902f3896ae48e19f294116d334a09d032d925c4377cebf534b7c3bb0java-1.8.0-openjdk-headless-debug-1.8.0.392.b08-2.el7_9.i686.rpmd5ed498c8a3b53ec876d437bf2b245542e10de259dd96b786e1d91a0b4229873java-1.8.0-openjdk-accessibility-debug-1.8.0.392.b08-2.el7_9.i686.rpm47777a46061d05d7fc4a847b92468c40a80dcd64e4f8568e50c4cd67eaa60a31java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9.i686.rpmac9c0d53c1758d6d034d7f7239a2880d166ae8826ed99ea84d6ee622894f58e6java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9.x86_64.rpmf506e6ef5df5605321d537f68ff40d42d711a6f209d68556661d5e2a3c719eaajava-1.8.0-openjdk-javadoc-1.8.0.392.b08-2.el7_9.noarch.rpmd6086529ae7184f6ec7febbe66827324e584b18ad408731b120628934aab753bjava-1.8.0-openjdk-src-debug-1.8.0.392.b08-2.el7_9.x86_64.rpmff953990d41ff63f07054e8d929eb6e417835271f48fa6e9c67eb22bc65928f4java-1.8.0-openjdk-src-debug-1.8.0.392.b08-2.el7_9.i686.rpmd634bf2b90dd1b8177b18892fdb09d02ba538cf1810c5ec84d01aa5170293661java-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9.x86_64.rpm929ca13dd5b34103354a198b3a1734d85fb4db61b2e3e4f1025a2fc4baefb9c0java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9.x86_64.rpm4083134d733b18d2b411902de71ee6684bdd9f719b2bab0e490ba3810f0e8acbjava-1.8.0-openjdk-devel-debug-1.8.0.392.b08-2.el7_9.i686.rpm5117393083e60828018763fbccd46a6ec79b4761d11e92c2927edf5a9817a79aSLSA-2023:6162Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.4.0 ESR. Security Fix(es): * Mozilla: Queued up rendering could have allowed websites to clickjack (CVE-2023-5721) * Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 (CVE-2023-5730) * libvpx: crash related to VP9 encoding in libvpx (CVE-2023-44488) * Mozilla: Large WebGL draw could have led to a crash (CVE-2023-5724) * Mozilla: WebExtensions could open arbitrary URLs (CVE-2023-5725) * Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. (CVE-2023-5728) * Mozilla: Address bar spoofing via bidirectional characters (CVE-2023-5732) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.4.0-1.el7_9.x86_64.rpma2818ee16f2bfb49528f3b587a82a53d82d9f516d64e9f27e4e63949ed6ead0cfirefox-115.4.0-1.el7_9.i686.rpmc464ce10d380ecde30caa7b063c2748fa296105fd15a56027d421fafe3f01c5dSLSA-2023:6193Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.4.1. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7thunderbird-115.4.1-1.el7_9.x86_64.rpm4f12854f23f8507d9d17cd74099d024209bb120fc19de04179bb106de2b5f4fdSLSA-2023:6802Important: Xorg-X11-Server Security UpdateX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7xorg-x11-server-Xnest-1.20.4-24.el7_9.x86_64.rpm8b3af76b71595eafb3bc9e2357ae8f623eb7423afb54d8d73e655cf62dd808abxorg-x11-server-Xephyr-1.20.4-24.el7_9.x86_64.rpmf9b4df66849c9cc337987ce2622fa0ab9a8c46dda81aefd4d0ea9aa97c307c7exorg-x11-server-common-1.20.4-24.el7_9.x86_64.rpm1c89d6eb315ad483c31508533e687d1886a5ac9f57027d6c3c4cb64f2bcedf88xorg-x11-server-Xvfb-1.20.4-24.el7_9.x86_64.rpmdd61c82ae5cdd1ef658d696d111e1924727a8253be6b5905944ae86e34381783xorg-x11-server-devel-1.20.4-24.el7_9.x86_64.rpm85a7f65d174bf3a9d3be9759e63fa4770c1d49af7c2b2e821c07b370e766d381xorg-x11-server-devel-1.20.4-24.el7_9.i686.rpm75848218f62955bc8d5de3dea78d57d0c7e8a363d2126c2fa154ee40db68ac9fxorg-x11-server-Xwayland-1.20.4-24.el7_9.x86_64.rpma7658c5cc062175358e0b62294a8999b0327f5d1f60ff76b58c4684e489fb916xorg-x11-server-Xorg-1.20.4-24.el7_9.x86_64.rpmb529043f249d8d59b71689536112144a2b460d400e0eabf614db73c2f90c30ebxorg-x11-server-Xdmx-1.20.4-24.el7_9.x86_64.rpm08309adbef8892114d0d25caccb90286fb43ff27a8c8c93d53e71ac76c6b5a93xorg-x11-server-source-1.20.4-24.el7_9.noarch.rpm1846a73cc6684722f4bfcf6da7d2b6658bf132ac87414e2432e8d25b86ca5505SLSA-2023:6805Critical: Squid Security UpdateSquid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. criticalScientific Linux 7squid-sysvinit-3.5.20-17.el7_9.9.x86_64.rpm215cd76ccdf876aba2684bea20ee92b1b8e95e92e092dbb9eb2e24cd2d61cb9dsquid-3.5.20-17.el7_9.9.x86_64.rpmd9400d537dffeb41d81419bb5a6de65cceac4c2cfcafcbcc36519e0880e4a60fsquid-migration-script-3.5.20-17.el7_9.9.x86_64.rpm693170496ba38a2921ad1cb175cf751dc80ec6fb94e7f444747e6e6aa866cf66SLSA-2023:6823Important: Python3 Security UpdatePython is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7python3-3.6.8-21.el7_9.i686.rpmfdcc1331f8c544a07788a0de89bf6181901458deac5b6eb506282f8637672f5cpython3-test-3.6.8-21.el7_9.x86_64.rpm003c6c9c7020b4c7692c2c1c69cca45f48cf8a3c25e191b468b87bee36d73ca7python3-devel-3.6.8-21.el7_9.x86_64.rpm44c4e07a148f340dd3fc28d49493897663eb3f715ca54d8bcfaf17b4098106d9python3-3.6.8-21.el7_9.x86_64.rpm399a05764db67bc42803f45bb1b1b9133ebec0ea4140a6592d811e787f5eafc8python3-tkinter-3.6.8-21.el7_9.i686.rpm7911bfb953c2e1231eee3b516010f4dbefb5bff7d05dde735b844d64744b0f1bpython3-libs-3.6.8-21.el7_9.x86_64.rpm07b358ba123d2092e863ad59356750f8a6b69242c2941651e6e05f65070ecf1bpython3-devel-3.6.8-21.el7_9.i686.rpm0a91791ffb00ea9c47b1ff8e4611adf9887a58dc50276b6f60770f0cc764fad5python3-debug-3.6.8-21.el7_9.x86_64.rpmd9e4f392ed5495d446a99746a8dcb296d542ab66f9b30892168b1ff0a841c1e0python3-idle-3.6.8-21.el7_9.i686.rpmd7db2cdbb53476bcd10b225cf13884b9c299ef8fb5193a3abbf719e9fcd1e5c5python3-tkinter-3.6.8-21.el7_9.x86_64.rpmcb7dc766ba29afe689685ec4027d4218f2f3741409027162e8b129617942fd08python3-libs-3.6.8-21.el7_9.i686.rpm4c538f38c63d09975be3e3665a9eb615a5ba026664e6904beebcb6cdad32439fpython3-idle-3.6.8-21.el7_9.x86_64.rpmf20da14ddb766b44e71d481c3d622a541f9d744d2e2f4886e78f3e6fea63706dpython3-debug-3.6.8-21.el7_9.i686.rpm7d01ff505a3b881128ff44ad0e889ac1be03d859366fb033096dfa17438fc063python3-test-3.6.8-21.el7_9.i686.rpmf751495dad7bae107ae8919706d9e764fdb53654e81a5f33aca49726c6ef2d54SLSA-2023:6885PythonPython is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) --- This content is derived from https://access.redhat.com/errata/SLSA-2023:6885importantScientific LinuxScientific Linux 7tkinter-2.7.5-94.el7_9.x86_64.rpmb5b12bc491c983056da3d1bdf7a91feaa35bfa4efd8a905df65b2b9d575cb3e8python-devel-2.7.5-94.el7_9.x86_64.rpm7c8420d15e676e7537aa0c3a8583b385f774ca4f3d4b672d9375ad456373beb3python-debug-2.7.5-94.el7_9.x86_64.rpm6237b6e4118e2a52df74dab852be4a7bdb1939ad74bb4dcd67047203cd1fbdffpython-test-2.7.5-94.el7_9.x86_64.rpm52990a46e591ce98221560cfe2f7a892b9569c43b81c27e4d5b3ac8cb9711ae8python-libs-2.7.5-94.el7_9.x86_64.rpm4cc413074240bc16ce253acf8d95c1b13cb2488bb26346231fc3608c3518c367python-tools-2.7.5-94.el7_9.x86_64.rpm92eb690460d473bc548c0e792d41f57cf478f33857589c4f9d3d53abfa40fd30python-2.7.5-94.el7_9.x86_64.rpm3dc36426859b8749f3533a2417d688a30c7046388dc97788081ee1d3a862fa50python-libs-2.7.5-94.el7_9.i686.rpm1036daab80d95a984294968dd161f04ef98733546f39e22485bdfaa75a905b48SLSA-2023:6886Important: Plexus-Archiver Security UpdateThe Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives. Security Fix(es): * plexus-archiver: Arbitrary File Creation in AbstractUnArchiver (CVE-2023-37460) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7plexus-archiver-2.4.2-6.el7_9.noarch.rpmd4c40b7fcd518ff9c13322420bd4e38055be3009a0bc846abb5e604a27abddceplexus-archiver-javadoc-2.4.2-6.el7_9.noarch.rpm427b6286b12481cfd22c1f1d8857aee030e72469a4d5e1343b77fd0bf028e2c4SLSA-2023:7279Important: Open-Vm-Tools Security UpdateThe Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: SAML token signature bypass (CVE-2023-34058) * open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper (CVE-2023-34059) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7open-vm-tools-test-11.0.5-3.el7_9.9.x86_64.rpmd3c481bf0ca3f463f9c194381f37b1aa29795ae5b2a16d6bf93066b1dcc3e299open-vm-tools-desktop-11.0.5-3.el7_9.9.x86_64.rpma8808cfcef5c51215d5a6859ac8970fece174ce74b28d00b3fdb3b9b4c5fddb7open-vm-tools-11.0.5-3.el7_9.9.x86_64.rpmd178a2ea870f10652fcbe438a7d80518b3e263596e90e6e3ac78ce786c60162eopen-vm-tools-devel-11.0.5-3.el7_9.9.x86_64.rpmb894408477d4d6e9d7bbf1ac573dd8ce2b91745916e216fa276749d9bb15c816SLSA-2023:7423Important: Kernel Security UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead (CVE-2023-3611) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208) * hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7kernel-tools-3.10.0-1160.105.1.el7.x86_64.rpm2626b9dfed1509c5d518ab7f6c6aafdc2ac1003e85a7a341680dbf082eb675deperf-3.10.0-1160.105.1.el7.x86_64.rpm44f8e68a25de3ca31ab898319a0768308bf36a22ebe83aa04855d0f77f572249linux-firmware-20200421-81.git78c0348.el7_9.noarch.rpmdf92d3c5083d8aa8892d0c60397f4e5ed92f19b8e1cb20967370262dc6513906kernel-debug-3.10.0-1160.105.1.el7.x86_64.rpm529ccc3acba2d1f77afe89b0e91415cf2df73c41a2fc65cf81cd93e6412f4dd2kernel-tools-libs-3.10.0-1160.105.1.el7.x86_64.rpme0d906e1caf586eeb54910cd1ab6941fc9188f6f87644ca7e944614102be189dkernel-debug-devel-3.10.0-1160.105.1.el7.x86_64.rpmef9efb4624b6383bf095ea126f9c83db7e2d75c24641d224f821f315e1ce52b9kernel-tools-libs-devel-3.10.0-1160.105.1.el7.x86_64.rpm6c01fddfc2f36476e1615b0037ab28f12c8b23d55570d44fd276f09ba30c9806kernel-abi-whitelists-3.10.0-1160.105.1.el7.noarch.rpm91b1b60b76eed2a552f5780def812b0b560ac6053d08ce4de2f200898c4506f6kernel-3.10.0-1160.105.1.el7.x86_64.rpm17f6ff299f9ee45086367edcb5312448b91b08287558b87397e3adda04189482kernel-devel-3.10.0-1160.105.1.el7.x86_64.rpm6dbe2b4a6bbc85bc3526043ccc99b836dc91f22c4f70b35ce9177f908a219f0fpython-perf-3.10.0-1160.105.1.el7.x86_64.rpm59b5a6771869a09d85d43c7899cdd647e6d6f1a44d252c140747089c1d7c9e6fkernel-doc-3.10.0-1160.105.1.el7.noarch.rpmd9a95a80164f06a428809429fc003aa85748cdcd17e4d2df6d5e56ebe7104470bpftool-3.10.0-1160.105.1.el7.x86_64.rpm194c7f40dbdce9e5ad2d9e9ac561404c7e38531b1de65216289fefaf22857bf0kernel-headers-3.10.0-1160.105.1.el7.x86_64.rpm5ade4d77f73184c7baf9df4f1a6bf22a1a19813ebcff5c24561c9631c104611fSLSA-2023:7428Important: Tigervnc Security UpdateVirtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367) * xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7tigervnc-1.8.0-26.el7_9.x86_64.rpm998439e463a45278039ae8c8d47baeaf104aadf5ae3e203f1e6e63dd74787c64tigervnc-server-minimal-1.8.0-26.el7_9.x86_64.rpm7b1cdc67c45fb5b81f7323467f567268cea46b944ecc148c8fd33ba14cd59ceatigervnc-server-1.8.0-26.el7_9.x86_64.rpm1d138a871600959bbe9892e61b525cfa71389c2e40afb487bffe47c94cba0450tigervnc-server-applet-1.8.0-26.el7_9.noarch.rpm996d53bf0fdc75fd9c57dc7de4e7147fc276b8554bad6d70847605d3abcd1565tigervnc-icons-1.8.0-26.el7_9.noarch.rpmef6956ab3eaa71c40204278fba657f27c0e11df730a3f7847c3c640946ce5e72tigervnc-license-1.8.0-26.el7_9.noarch.rpm2aa6154d19d1ed9182e8c3b9d302b06424744ff0679ec404402d90d42ec0dc59tigervnc-server-module-1.8.0-26.el7_9.x86_64.rpm382433626ff6aebd55f5916957ee588933b97e128b2426a81a0bc9879d476b12SLSA-2023:7505Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.5.0. Security Fix(es): * Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7thunderbird-115.5.0-1.el7_9.x86_64.rpm5db75bde8daaf46ff7868d3752016f4d526c9070257c816e496b8b854328f66fSLSA-2023:7509Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.5.0 ESR. Security Fix(es): * Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.5.0-1.el7_9.i686.rpm58b1191d09f569ca50c90861a01fcc770c6b2e028dc183df026135250539e2d1firefox-115.5.0-1.el7_9.x86_64.rpmba1012b0871603647ec5923b92aab013438b1e5103c8071e806fda840e612157SLSA-2023:7513Moderate: Linux-Firmware Security UpdateThe linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7iwl2030-firmware-18.168.6.1-81.el7_9.noarch.rpmc80b56035c2231f62f39e828347adff98e06df09a972f4abe7ea09ec48259624iwl1000-firmware-39.31.5.1-81.el7_9.noarch.rpm0f34e9c6569a174840bda606a5788431fc09bd24adf91d82b80c4d1f2eb54dd7iwl135-firmware-18.168.6.1-81.el7_9.noarch.rpme5e3bab7f8f5589ee6a17eb313d12254953c3c21f63a08826d85ec2020d55284iwl5000-firmware-8.83.5.1_1-81.el7_9.noarch.rpmfc1ce06c78cdd48debb695745efea63eaad5284f2699eefc719d12c167fb2fd9iwl105-firmware-18.168.6.1-81.el7_9.noarch.rpmb879c2d7580862a690a51ae3a181e5d5776ac19aa212b674d0f807623a296ee5iwl4965-firmware-228.61.2.24-81.el7_9.noarch.rpmd03d86d600173989e9041041e9a468b2290325fbaf25ffd822609e233931fc8aiwl6000-firmware-9.221.4.1-81.el7_9.noarch.rpm162f3331cb3d5e64a061141c3a9e2f322f6fbb1e12d0b1a9fd931a5a9fee4e16iwl2000-firmware-18.168.6.1-81.el7_9.noarch.rpmae840c8717376e1d523b22f2386ec667ca1b635aba1fb6e20ae732da6869d05aiwl3160-firmware-25.30.13.0-81.el7_9.noarch.rpm41525ac7e6724bd4c9ea6831ded4b7866e8af5eaa7d0159d2517aa687d477209iwl5150-firmware-8.24.2.2-81.el7_9.noarch.rpm1e9c0a37d2b6a5b32105e6b1de05ed59d775eb38340533b2b6c71774c38d6460iwl100-firmware-39.31.5.1-81.el7_9.noarch.rpm8a7bf5a100adddff48301066d9cf50ba07dc49e8fe3e878c051ea4f2615fb170iwl6000g2a-firmware-18.168.6.1-81.el7_9.noarch.rpm723dba92e8f1c1c00498793b267d9c14e7e556ec0e01c597782dd1c8db999ddbiwl3945-firmware-15.32.2.9-81.el7_9.noarch.rpmface3fe8de08de6afc25fb51bd5b178813993c0a452d2767363b9ac2ae652f71iwl6000g2b-firmware-18.168.6.1-81.el7_9.noarch.rpm600345a505c735c250632a3d57da21b4e200e7a2f44e42edb6d58ab796366391iwl6050-firmware-41.28.5.1-81.el7_9.noarch.rpmb4f6feadde05b546328da0e0f2eb3559b34308e6170986220ff367fd99a12f54iwl7260-firmware-25.30.13.0-81.el7_9.noarch.rpma23ab5114a38337497f7bf572b518395bb7f162859fbdef592c104cacb74004aSLSA-2023:7743Low: Curl Security UpdateThe curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: Use-after-free triggered by an HTTP proxy deny response (CVE-2022-43552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. lowScientific Linux 7libcurl-devel-7.29.0-59.el7_9.2.i686.rpm498441bce0334939d92470989ef0bf8e02a2083d5797b49d89fc415356ca0cfelibcurl-7.29.0-59.el7_9.2.i686.rpmc7e5a1ff315c48a648de2d245401e7fec04c6eb5a9b8eb59a726d1e8c90de1cflibcurl-devel-7.29.0-59.el7_9.2.x86_64.rpmb3aa7055b00066c3754a1704e4ef12dae91b8b2e25ab5e8e9d27459db17d0036curl-7.29.0-59.el7_9.2.x86_64.rpmb1d71a1adf87744cfbd15084b3f7a06e72d51c58118ed7b6224ae5b4505723aalibcurl-7.29.0-59.el7_9.2.x86_64.rpmc52b5493c22bcb5e3b7995c1aebf4ba1b005ac1d65a61f4074146b2b03779792SLSA-2023:7783Important: Postgresql Security UpdatePostgreSQL is an advanced object-relational database management system (DBMS). Security Fix(es): * postgresql: Buffer overrun from integer overflow in array modification (CVE-2023-5869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7postgresql-contrib-9.2.24-9.el7_9.x86_64.rpm741a1dae7293037727b600dba20c327722f4b1df3b95c135b03aefcbebd87a3cpostgresql-libs-9.2.24-9.el7_9.i686.rpm5c4ad860099c03846bee5ca107b5d0f6a2a6e91a82ab2b09bc9f1dee0e44117epostgresql-plpython-9.2.24-9.el7_9.x86_64.rpm44d0882ae7e3b0682c6b3abd5a980a150f2938d1aa1dae66e1119e429cd09124postgresql-test-9.2.24-9.el7_9.x86_64.rpm9845a8aaad4bceea3ee21d571fc84ecd3aa61f1308260c42cf0954c4c519a0bdpostgresql-static-9.2.24-9.el7_9.x86_64.rpm295fc83d94836a9f03421dd47666204ed6588016a9b4bf408d1a48654d1ac0ddpostgresql-libs-9.2.24-9.el7_9.x86_64.rpm5588f9ad921a40763be94440941d88fceb1d546fc6f7137bfe104067579780ddpostgresql-docs-9.2.24-9.el7_9.x86_64.rpm9086c9558b5b164b54dbf963a0237d3bab03a30db662d100adcfb72bd267f211postgresql-9.2.24-9.el7_9.i686.rpma48fad0888f1b99f77b9983c25cf914cedc9362001926489cb57f56b1973b3bapostgresql-upgrade-9.2.24-9.el7_9.x86_64.rpm5abaf994b9145b83697a417448faeb7c2c20ddbbaceedc8812cb00ad1700c22fpostgresql-devel-9.2.24-9.el7_9.i686.rpm6ec387d40f42de7229a454500fd0f493f4956913fa46145a94a2f14ab56fd910postgresql-devel-9.2.24-9.el7_9.x86_64.rpmc3fa01e3b69d1d1b5f321eac8f16188fe5eb3ae4964a6a283b9bdff9c1a326dbpostgresql-static-9.2.24-9.el7_9.i686.rpmcbb2f795ef8f7fb625aa63da0a311b8e3bd52639d904af9f34460aba44b87460postgresql-9.2.24-9.el7_9.x86_64.rpmc902d80d63e50b7a4a56cf08053e31dd8de500fbc8e082238408279fb29b99fcpostgresql-plperl-9.2.24-9.el7_9.x86_64.rpm4b5f50ad4677c2daccaea86737614f874b91ceaf618230c20994385917400679postgresql-server-9.2.24-9.el7_9.x86_64.rpm10d7427c5a7f618ab4a37ec4235346c5b67e05a6c31907c37a10f657aa028a9cpostgresql-pltcl-9.2.24-9.el7_9.x86_64.rpmbe26b19fd4a14836d1b1c60182ef90ae89674923226c04056ef27806cfb3a7a7SLSA-2024:0006Important: Tigervnc Security UpdateVirtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7tigervnc-1.8.0-28.el7_9.x86_64.rpmd878ad53279d73a821eef6745e41475a13bf6423283929db83f80053934f9d91tigervnc-server-1.8.0-28.el7_9.x86_64.rpm4bf2bbb9e4b440fd8038341ae34a1568265ca33bf972538d5ae62c87fcf8bb57tigervnc-server-applet-1.8.0-28.el7_9.noarch.rpm67ceb09f8df51f16ab3fd644f1786a7b852bcb3aa254778657d553de5ba6da21tigervnc-icons-1.8.0-28.el7_9.noarch.rpma3c23f2b1a100a6c51e6b64162508b88c19f746dd453419871ef026be260547dtigervnc-server-module-1.8.0-28.el7_9.x86_64.rpma3860b641fa0d7eab0e113b080bd00faaf4be3d0aa40bdac4931ada911042945tigervnc-server-minimal-1.8.0-28.el7_9.x86_64.rpmf6d8b483b8f323a5d4421ef6ba62d6e49197813c5f80678794eff811746353bftigervnc-license-1.8.0-28.el7_9.noarch.rpm725cfd357b9e8cc80ab130a699df3de04f5e9f4d928e0b1894aeef8eda1b49acSLSA-2024:0009Important: Xorg-X11-Server Security UpdateX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7xorg-x11-server-Xephyr-1.20.4-25.el7_9.x86_64.rpmcee49abea6f49e118f90cc707b18ae33b6dc79604abbca789e699da46987d0ddxorg-x11-server-Xdmx-1.20.4-25.el7_9.x86_64.rpm840305e25a4a9e6849ed74c7c0abe5ff8f18eec807b11356bba40ba959498f2bxorg-x11-server-Xorg-1.20.4-25.el7_9.x86_64.rpm6d7a7c45531423fa11b19377c136e5b5762df48fa0f7c0fcb47e9ddb26c63a36xorg-x11-server-devel-1.20.4-25.el7_9.x86_64.rpm042254433f043342a8daffc045a0f1baf62ef247337be8a01ecbc28fe0fae13dxorg-x11-server-common-1.20.4-25.el7_9.x86_64.rpm3c3e3412caaef346ee605ffd15be54c3cf9de01db7e37f13c9cd36d9869ad100xorg-x11-server-Xvfb-1.20.4-25.el7_9.x86_64.rpm32e6a01863c31a84c3203c98f3d8c5b75c4b42c18369d2e2002e17ea646d9476xorg-x11-server-source-1.20.4-25.el7_9.noarch.rpm9f08f449f6688a64c204989c7e636b14856398128f86df97b31a841c4c4f01d5xorg-x11-server-devel-1.20.4-25.el7_9.i686.rpm89731ae94097e917ae4b164b58a0a9bb7bc739e427f6e5fdfe4347fdcc913ed9xorg-x11-server-Xwayland-1.20.4-25.el7_9.x86_64.rpm57b02626f21e3385750bbd68a73ca20b32fa8b5cd788d343fecd6e7b556c38e2xorg-x11-server-Xnest-1.20.4-25.el7_9.x86_64.rpme2f0a21015a38018eab2cf043f99c0c0dfcac6555a729c866ae1ae4167bef845SLSA-2024:0013Important: Gstreamer1-Plugins-Bad-Free Security UpdateGStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9.x86_64.rpm1c7679ecfb7c3e30c43580ee577edd1f7a4bebced66fa7cc49cf45894f055a02gstreamer1-plugins-bad-free-1.10.4-4.el7_9.x86_64.rpm98e891ff0ba2d212f81e6fcffe2f6ac670c72919a71da83c6a71dea4663473ddgstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9.i686.rpm0422289588e8fbc4fcea0da7706e2b1d7b67f4b1e0ae8f5ac894434016837713gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9.x86_64.rpmb2d48cf4954af8b2f90c0022a13d3e4d6fd0c9244562d721e1131bfe226e9b99gstreamer1-plugins-bad-free-1.10.4-4.el7_9.i686.rpmc23b206afed8176086ea06f99b1fd0ce60b41b7fc61fbbc04f903eb0a29df041gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9.i686.rpmb61e9981b5e312b3704c1e020036b8de4a1707248a2e1ac1587687067a7c2da9SLSA-2024:0026Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.6.0 ESR. Security Fix(es): * Mozilla: Heap-buffer-overflow affecting WebGL &lt;code&gt;DrawElementsInstanced&lt;/code&gt; method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: Potential exposure of uninitialized data in &lt;code&gt;EncryptingOutputStream&lt;/code&gt; (CVE-2023-6865) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in &lt;code&gt;nsTextFragment&lt;/code&gt; (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to &lt;code&gt;VideoBridge&lt;/code&gt; lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected &lt;code&gt;nsWindow::PickerOpen(void)&lt;/code&gt; in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in &lt;code&gt;nsDNSService&lt;/code&gt; (CVE-2023-6862) * Mozilla: Clickjacking permission prompts using the popup transition (CVE-2023-6867) * Mozilla: Undefined behavior in &lt;code&gt;ShutdownObserver()&lt;/code&gt; (CVE-2023-6863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.6.0-1.el7_9.i686.rpm69c640581c71c0fcbcc844e1c7ab75ce5967a37ef63077b83e49b20fe2262066firefox-115.6.0-1.el7_9.x86_64.rpm4537288ea302f365b22fa97445e724ca45ecdd860cffc10bd515a0bb469ff0d4SLSA-2024:0027Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.6.0. Security Fix(es): * Mozilla: Heap-buffer-overflow affecting WebGL &lt;code&gt;DrawElementsInstanced&lt;/code&gt; method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761) * Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in &lt;code&gt;nsTextFragment&lt;/code&gt; (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to &lt;code&gt;VideoBridge&lt;/code&gt; lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected &lt;code&gt;nsWindow::PickerOpen(void)&lt;/code&gt; in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in &lt;code&gt;nsDNSService&lt;/code&gt; (CVE-2023-6862) * Mozilla: Undefined behavior in &lt;code&gt;ShutdownObserver()&lt;/code&gt; (CVE-2023-6863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7thunderbird-115.6.0-1.el7_9.x86_64.rpm85c44c0c883e100578a0a631f899fed79f62dbec9ab43577a196f35601ce6491SLSA-2024:0145Moderate: Ipa Security UpdateRed Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * ipa: Invalid CSRF protection (CVE-2023-5455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7python2-ipaclient-4.6.8-5.sl7_9.16.noarch.rpmd7449b964ca0d93bd691b3924ebd4597c3b8facd93bf8a73d9cf9054d24e9a8fpython2-ipalib-4.6.8-5.sl7_9.16.noarch.rpm56e0cc913272d59c7bac25811815868a011c1fc23ace80a1dfb2e3b33e7e270aipa-server-common-4.6.8-5.sl7_9.16.noarch.rpm96243f825077947b9477fcc8b7a86ab5c4e9b866cfa4d1dbf347a5f72c5f3eb9ipa-server-4.6.8-5.sl7_9.16.x86_64.rpmf03862146dd4db15a83b169823cf14d89da885a51ac03510e7a08c5d5b30ac50ipa-python-compat-4.6.8-5.sl7_9.16.noarch.rpmafcf62d93d9c6a91c28564972d424fe96ecaeeb9ed15257c86cfaa7012870c73ipa-client-common-4.6.8-5.sl7_9.16.noarch.rpmf2091a24905e839d934bdaf36f89f52383937115fb0d809400ea63c071a3c41dipa-common-4.6.8-5.sl7_9.16.noarch.rpm8fea5b8c00ef9078db6c29ef767d003d4a5da6740b0db0d89644e69bb3af8321ipa-server-dns-4.6.8-5.sl7_9.16.noarch.rpme2e99bf84ccba419a2df4125eba8aed8e354faa2708417d7700e9d12a8d55e95ipa-client-4.6.8-5.sl7_9.16.x86_64.rpmda0d5ed9a7a6dfe1a4e0b203e502ae5b9e8e775b3d6cd40ea148201e26240d71python2-ipaserver-4.6.8-5.sl7_9.16.noarch.rpm9bd9a40c83b465f0f89ca7f784244c957a9c600914737dad342867a9296e32b8ipa-server-trust-ad-4.6.8-5.sl7_9.16.x86_64.rpmd7f66d4c07be14d31442e011c376c15eeafb0c8133224eeb4d6836e36fcc446fSLSA-2024:0223Important: Java-1.8.0-Openjdk Security And Bug Fix UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918) * OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952) * OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919) * OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921) * OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926) * OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * In the previous release in October 2023 (8u392), the RPMs were changed to use Provides for java, jre, java-headless, jre-headless, java-devel and java-sdk which included the full RPM version. This prevented the Provides being used to resolve a dependency on Java 1.8.0 (for example, "Requires: java-headless 1:1.8.0"). This change has now been reverted to the old "1:1.8.0" value. (RHEL-19630) importantScientific Linux 7java-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.x86_64.rpmdde02384d8965b1b5d6ac02d5562395e8fe7d3f32b169d0b51cc0f2dfb631fbbjava-1.8.0-openjdk-javadoc-debug-1.8.0.402.b06-1.el7_9.noarch.rpm7361b0a79cea7ab301e84e9020b9b80196032be58382076647de5d2b948e49f3java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.x86_64.rpme853059da15e811a901a2457d3f4e76c1b27a5373c129ad9f86bf0eddf06fc49java-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.i686.rpmc519dc68deaa751bc3dcbbc630673277ddb8f59797ed806b82fd67e85f786fefjava-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.i686.rpm620c3d2bb18afd18943ed7b931a59c98ce4e51172dc10098177bb7103f182343java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.i686.rpm52a2a65f175019a84d92d4e7bd10f7d4a2a1620549121bd84bd693877805471ejava-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.x86_64.rpme43196032476954d2186cde0d31f0d67a9370dee47e19b264e92180af5a684d6java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.x86_64.rpmc339e64ff249c0a41c74e0d45b4b815bab631775f0e020b764e158578ae46c1bjava-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.i686.rpm085e1ecffc8fa3229546ab90c2832c853b65822ac6f0fe89e7ebfb780eaf654djava-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9.noarch.rpm9aa443b30c29acafad890abd5905f52b22ba1b164609c1acedfc98b9ce4d5352java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.x86_64.rpm00ebf212d95b5f39a4d75a7a276972e1d57a8f069205ad78137c2b4234c9fe9cjava-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.x86_64.rpm74553d6272ba331071b0a8aa47bd77d1b45c025546a41fbe983d2afa1b8706d9java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.i686.rpm889e875141b1f5df42a57d5c71f58a8548998bfb66863a2a03b5d1c5a8ad52d0java-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm8b162f48db9c44de048a8cfadcf5c0d85378b8ee263bb29bfbc3ab366ca1dae3java-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.x86_64.rpmdac003986595c8b61e70b30a52b004ca526cb97e301b427cbed01379cdedb2bdjava-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.x86_64.rpm68d1d750ab3b071cdbbb360cc5ddc03e0ebadbabcc1f2638539fc1d5956a4313java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.i686.rpm8fb9d89cb92135c8fc87718624113eddd9147d572168cc7d2caab086bd6693f4java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.x86_64.rpmfa1ee407187fa3705573e8fb1c7d2667ff9e0cd286f3c00bb74fcad74cc54d5bjava-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.i686.rpm2eb2056b396149fceec9129c4f5d2384b123f0b519d48435af4f64f3119bcf26java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.i686.rpmeca089b02540431718b5f4ef73a50cece50caac23128e11c39153f3ee3f7ebb1java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.402.b06-1.el7_9.noarch.rpmffc2d73db443bdc8c362d206da1484d0cf3f1563ca371a9c05ef734371ad962djava-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm8d37d5dadbd56eefc491794e0a76f2299ab8ae87610534eea0bac073170a5091java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm08934624c43913ef01469cdb07033cb665925dc6b56d56924292e8cc8e584d6fjava-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.i686.rpm15db9a206370da709910dbb60050fc3e3d0a02caaba117531056355b9c0c0c02java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.i686.rpm6d4d26428da44b62bf2a54be4e62df24b42d6c7296d9edd6c637b7bcf5d487fdjava-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.i686.rpm2d2672bbf31410f48b8ea2820549fef9e3f3e7a657a6f11e5d93e68ce947b92ajava-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9.noarch.rpm32af6a7462dc10af31dab9f263885d789bbc4584699f3f005605131fd1d83a41java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.i686.rpmfc441b4c2acf427b4df871fde7a41cdcc91ada1fa9366ea47279e04f1b9bbcf2SLSA-2024:0232Important: Java-11-Openjdk Security UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918) * OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952) * OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919) * OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921) * OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926) * OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7java-11-openjdk-demo-11.0.22.0.7-1.el7_9.x86_64.rpm95576be2076e94f321be597b82c012c86361c5356cf844f86619cc6dd62c5e53java-11-openjdk-demo-debug-11.0.22.0.7-1.el7_9.i686.rpmb77dab4d298a73238d6e19e59114793eb49ccc4b03f8b3745f88f663a258b461java-11-openjdk-headless-debug-11.0.22.0.7-1.el7_9.x86_64.rpm6d197aafe764af0160b0da23049f3ccc5fdf7770a7dc473499cb49f1877e0556java-11-openjdk-javadoc-debug-11.0.22.0.7-1.el7_9.i686.rpm5f505af6d49f833135800b8034e962058f24a2cdc6fd6e2416e6dd1c5a33416ajava-11-openjdk-11.0.22.0.7-1.el7_9.i686.rpm44871757e5397e5f0ff59df1eb7d11c5e476976427db8a992bfe76678a5ef976java-11-openjdk-devel-11.0.22.0.7-1.el7_9.i686.rpmceccfdbf84e12de9260cf94520f64154cdc6d1360fa74a1c89b232487d28280ajava-11-openjdk-11.0.22.0.7-1.el7_9.x86_64.rpm0621d1509b6394e973480a59b6cab842c967101d2f8142acd7992a5835b7abf6java-11-openjdk-javadoc-zip-debug-11.0.22.0.7-1.el7_9.x86_64.rpm117319bd032a4ef64d49cb6a3414626071a4db2c0a48675251aa76d58ef0ef45java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.i686.rpm7d94af7086999a9b14e8120cbe8b493fc641a3f9a85ac573050754b086ca4983java-11-openjdk-demo-11.0.22.0.7-1.el7_9.i686.rpm0a870fe20b25057c5548716e32ce90d1cf6b9b48b62ddd5897ff858d015a1241java-11-openjdk-demo-debug-11.0.22.0.7-1.el7_9.x86_64.rpmf379918409d5321ce1d3e56701ae947f73fd7de655c676ef1ebb481da5dc4d0ajava-11-openjdk-src-11.0.22.0.7-1.el7_9.x86_64.rpm4d8de6773a7251746e3e975e65506206690bb5076927eb54b75b4f88586da265java-11-openjdk-headless-debug-11.0.22.0.7-1.el7_9.i686.rpm270bc9bd8a9e1788d554e01da8e07b794033669407fe0dc1b634c4e83abe9016java-11-openjdk-debug-11.0.22.0.7-1.el7_9.x86_64.rpm14c0faebea0f99195f73da800562e386075b28e459a8625e3e201d8e63402563java-11-openjdk-headless-11.0.22.0.7-1.el7_9.i686.rpm6f3305d38383c213fd8a31bf5e7e1e16283a81f3742f6eb3bf2767ac8c7f063ajava-11-openjdk-static-libs-debug-11.0.22.0.7-1.el7_9.x86_64.rpmb52efc2014e5e6f6d00b9da4f106a7de1d850bf2760d565d8b28636016bc67bajava-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.x86_64.rpma864487011f9047034551d8e309d9d5ff322b53faf35a191a2288ce5843af83bjava-11-openjdk-src-debug-11.0.22.0.7-1.el7_9.i686.rpm9e08bbbe35f812b16a16638c2d1fef2f52f8e61e61b2019485ceceac51e22c70java-11-openjdk-devel-11.0.22.0.7-1.el7_9.x86_64.rpm9042cb7ac96e9b3ee54b2247c2a1460f0a681ba4d518cec61cf4b2faddb8676ajava-11-openjdk-jmods-debug-11.0.22.0.7-1.el7_9.x86_64.rpm7fa496f97aeb3506611bc0a20c3d5fa84c17ae51a859d73309f751503ffba7d5java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.x86_64.rpmc4ed4a0b8d0e7c33b78a5c12d4401bb736d56959dd573c5e26515307bb64a057java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.i686.rpm9faa8250912a2be04d4498daa3fc0b40eacde1c144076c6837ae5e359414f50djava-11-openjdk-javadoc-zip-debug-11.0.22.0.7-1.el7_9.i686.rpmfd710de29dcdf89cf4e6a233122b7f1b405b370f13681049f6783212255b7829java-11-openjdk-static-libs-11.0.22.0.7-1.el7_9.x86_64.rpm16b90f808a79a23246d661893064bea524dda0549caddd283e53cdc6fe06e110java-11-openjdk-javadoc-debug-11.0.22.0.7-1.el7_9.x86_64.rpm63aa077fca3bd0309ad6339aa8b14d691f4a9b755adf23584a99e68160085564java-11-openjdk-jmods-debug-11.0.22.0.7-1.el7_9.i686.rpm93a3522634768c262c2df5da341d0091fd8fe113222a0ce5ffaded281821fecejava-11-openjdk-devel-debug-11.0.22.0.7-1.el7_9.i686.rpmc7dbfe21bc4a71451e335a05a632b07cc1adb551e534c024a5132c93a9a77ce6java-11-openjdk-headless-11.0.22.0.7-1.el7_9.x86_64.rpm1c8872e428cd92d18a092ac69b51494d8b91985e7bc91f71bb692468fe0a2efejava-11-openjdk-src-debug-11.0.22.0.7-1.el7_9.x86_64.rpm4f78d38cc22c0000c60437b76a9dd1ace7e0119b374a855849814b98a96d438cjava-11-openjdk-src-11.0.22.0.7-1.el7_9.i686.rpm61b2000c37c25a6f56e4b7a88453ac8e857d9ed505827d272dee685fb1d498e7java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.x86_64.rpm4febd8135ba4cbcfab1e3fa238eaf5fceb4953c4a302af5d76a0db173b025779java-11-openjdk-debug-11.0.22.0.7-1.el7_9.i686.rpm9e92a308ae9678956078aa4a638cf58cc7fe992fba72cc9ff3a922dd6a31faa0java-11-openjdk-devel-debug-11.0.22.0.7-1.el7_9.x86_64.rpmf69b67b651639c1296a154fc500e02fc359a0e90c11e825ae415abfcf8ff130ejava-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.i686.rpm0cbc4940043b1c9dded3f2e731211cf11c11667c64c68e2cc825b580799f0525SLSA-2024:0279Important: Gstreamer-Plugins-Bad-Free Security UpdateGStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7gstreamer-plugins-bad-free-0.10.23-24.el7_9.i686.rpm46c922e1d24d8284170b98e0f142a0e17802842adc3da065bd8330dd6c081de8gstreamer-plugins-bad-free-0.10.23-24.el7_9.x86_64.rpm0934f97f08c806631a7f63644847e920c09a8f047d70e4dd76a35325a5af8bfcgstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.x86_64.rpm1802aadbbbf0087d8e2cce0dea743ecbcfb25e897183784bc0d88b004d3ec389gstreamer-plugins-bad-free-devel-docs-0.10.23-24.el7_9.x86_64.rpm8bb33140410d396a3c1e09e1e7636cfad5641d474c614dc8ee90434eab1ff9e8gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.i686.rpm5a20bfc364ce0109eb22d83a993604bbec573e15b5e42800f244dc945aaaeae5SLSA-2024:0320Important: Xorg-X11-Server Security UpdateX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408) * xorg-x11-server: SELinux context corruption (CVE-2024-0409) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7xorg-x11-server-Xvfb-1.20.4-27.el7_9.x86_64.rpm6778e751e0074379445b1d618d7fb380c5b8271870391f2b1986b1bd1fe67941xorg-x11-server-Xnest-1.20.4-27.el7_9.x86_64.rpmcd1e3e50fd368947479e8e5a01613c78f88daba8f7e94234e7a486955b0f9c82xorg-x11-server-Xephyr-1.20.4-27.el7_9.x86_64.rpmaa8c44d5d0f90ec0e98953a3b942cbe1f5b3ef92c45406d0567237ab7aa01731xorg-x11-server-devel-1.20.4-27.el7_9.x86_64.rpm85adcaa8f4a114ef75b8f463a7f43cec7a4b0338b5d93d8113ad76b98f8a1647xorg-x11-server-Xorg-1.20.4-27.el7_9.x86_64.rpmf798bbfc8b5c38c89aa7580f8fcd9736d7fd8ea62cd463bde9226f0a81377da5xorg-x11-server-source-1.20.4-27.el7_9.noarch.rpmb91c387e09a82405d1b5936f85986ce2291a9efad65f4748183f9a74f9dfcdcaxorg-x11-server-Xwayland-1.20.4-27.el7_9.x86_64.rpmea9f77b8cd412fc9783b1337bffef758dfcb3f7c91723c38b1d9489afe87ce20xorg-x11-server-devel-1.20.4-27.el7_9.i686.rpm217bf7588963dcd2af78b1400a42ec3855b517a4b1add62c3dc961e707cdf8ecxorg-x11-server-Xdmx-1.20.4-27.el7_9.x86_64.rpm18d38bc6740bc3142d0035dc752c5df83be63f5fc7378db267c809bfdc988e38xorg-x11-server-common-1.20.4-27.el7_9.x86_64.rpmd97635105ed33d28798a218a9f1c3d98e74c9b36553f9b7786954b83e3f66984SLSA-2024:0343Moderate: Libraw Security UpdateLibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others). Security Fix(es): * LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp (CVE-2021-32142) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7LibRaw-static-0.19.4-2.el7_9.i686.rpmc07f0c388d53ef358304fbf5a890c8ed27ae53ac3562bf722810321531fd361eLibRaw-devel-0.19.4-2.el7_9.i686.rpmafe924b0d2eb987ea4ed17a7c86e6ce9a2aaa2203672a0e501e8f4542ce26df2LibRaw-devel-0.19.4-2.el7_9.x86_64.rpm9be290004a20cff637d7db3a166196299147d69eb4cfb37827fa64eb33766220LibRaw-0.19.4-2.el7_9.i686.rpm21fa8b7b6ecf815d8cbcb1a7a3246c238e96be77a9b0fbc6df94b230dd376b04LibRaw-static-0.19.4-2.el7_9.x86_64.rpm2efa6f2fff664a9e8d805395dd44f71dfb756e1fca4e1de635ea410afe69d9fdLibRaw-0.19.4-2.el7_9.x86_64.rpm2cd76b61d30079714ab546a2d5d8270a6da702c9b19f6b947fec49d03fed2b96SLSA-2024:0345Moderate: Python-Pillow Security UpdateThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (CVE-2023-44271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7python-pillow-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm81413d6b0956aff03a592b4b9dda1e107ea340a40c841e9f49fc0b8dcb778a61python-pillow-sane-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm7df5cda96de4345301564233d4f73210ecc6f5d4774f993730f56f7757b5ba0bpython-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm54388931d055924d06b0cd6dd8873d868143563199de035e45c51b6037afd611python-pillow-2.0.0-24.gitd1c6db8.el7_9.i686.rpm9f082ca45e31f71798f6cd9e202c15f116b73edcdb1e89449c37c22cecd24e1cpython-pillow-qt-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm754ea3a6ce7134fbc594c534a2a81bf845b369423871c9ad49f9afe6c9782099python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.i686.rpmb3a8eb943b033ae352a9449ade64acf785c669c3036d1f0bd7ad5e90e1208ecfpython-pillow-tk-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpmf871880a43e6660c4103602b302e99e38455494651f2e6bb410535f45868d30cpython-pillow-doc-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm5d329a9892fb932b1b2024236976baad22bd5ca3d6432851931ec97869baa662SLSA-2024:0346Important: Kernel Security And Bug Fix UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: netfilter: potential slab-out-of-bound access due to integer underflow (CVE-2023-42753) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * gfs2: kernel BUG at fs/gfs2/lops.c:135 (BZ#2196280) * ax88179_178a 2-6:1.0 (unregistered net_device) (uninitialized): Failed to read reg index 0x0006: -71 (RHEL-6302) importantScientific Linux 7kernel-tools-3.10.0-1160.108.1.el7.x86_64.rpm8ed03cdee3c6f96583e0d7213404eabcc01aea6a0df53bad7b20cb96666838f6kernel-abi-whitelists-3.10.0-1160.108.1.el7.noarch.rpme199f6b0dda918678870e94fd82b6509db5d1d81c304e2ec7ad19b2a8fbd12c2kernel-tools-libs-3.10.0-1160.108.1.el7.x86_64.rpm4d46be2e7f1aea69880cfb02c600953d0f848c3a5ea502388989bd44584e1956bpftool-3.10.0-1160.108.1.el7.x86_64.rpm5babb17a292aa655c2458056ebb1073456db49e369a7d1f10786a4bcc4acaf86kernel-3.10.0-1160.108.1.el7.x86_64.rpm8a44907d63ba2c431265cc97f497ed4998d58b0d716422b81ddfd3afbf936ba7kernel-devel-3.10.0-1160.108.1.el7.x86_64.rpm43098b52ac40ae5c5f3080ff5a42fc09262e882a822cb5e5947ced3dbdc2c2f4python-perf-3.10.0-1160.108.1.el7.x86_64.rpm0e68ec2adb0238e252e1999ecac0efb5b3bcfa1bf4994bd14f075785357dc109kernel-tools-libs-devel-3.10.0-1160.108.1.el7.x86_64.rpm43586f28a7c20ebfba8ae2fcf35a91780bf656a7a7a1207260a8d4b40891ad73kernel-debug-3.10.0-1160.108.1.el7.x86_64.rpmb8fd50e3df21e313479ea3dbd5a21d07fa1b057b799a1b8ada709fcaceebeb7dkernel-headers-3.10.0-1160.108.1.el7.x86_64.rpmd7d0b7a0b00169816abd24f0536b7af24067e2f68be53d15db85556474e0b6e8perf-3.10.0-1160.108.1.el7.x86_64.rpmafa2282ea672e08045f6e7e20b3f52587719e7a0c403ccdfb3ac75513028615bkernel-debug-devel-3.10.0-1160.108.1.el7.x86_64.rpm1ae9bb5868083ed0ac71b848de353773db99073a37d54e27867400e1dbb9c0a5kernel-doc-3.10.0-1160.108.1.el7.noarch.rpm4cdc3a356924241aae99ad3debebaa1c8e2294e2eb6a86c96c94fe7694ab834fSLSA-2024:0600Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.7.0 ESR. Security Fix(es): * Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.7.0-1.el7_9.x86_64.rpmea22ef001519caa8ff417d9c87f6b375b1082727fcec2747802342a6e993b3b4firefox-115.7.0-1.el7_9.i686.rpm07313088232c6184aaa18e6cd5f3a64d0bf5a4373276de8e6b05ec4a1a1c03e6SLSA-2024:0601Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.7.0. Security Fix(es): * Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7thunderbird-115.7.0-1.el7_9.x86_64.rpma8d93b2a5cfc9fd072a7304a659f1c3fdec5ad7756d516d0fc2b9aa00d0fbb79SLSA-2024:0629Important: Tigervnc Security UpdateVirtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7tigervnc-server-minimal-1.8.0-31.el7_9.x86_64.rpmb63f27490a21ca002b9b142c768efef20e9c395d54e892057bb58608cc204fa8tigervnc-1.8.0-31.el7_9.x86_64.rpm4b100d9b5c7636dfdfdfe41a637d0526490bce975df2325af3d0922939dd67catigervnc-server-1.8.0-31.el7_9.x86_64.rpmba082c4d938772188057ad42edcce544b2dcecc2a610d34c61c4ee758d772ed3tigervnc-icons-1.8.0-31.el7_9.noarch.rpm07a9abca01452eaa3c9dbfd9c5f9fb66ddcdef37278b8e4443d44e3fe33b27catigervnc-server-applet-1.8.0-31.el7_9.noarch.rpm1d4bb14474a252b9009725af3d0853209f7723cdaf3892644aef511b9cb15578tigervnc-license-1.8.0-31.el7_9.noarch.rpm160eddd328e690a5339dd325e0dd8209d4a6cf237f8895dbf0be2052411960a6tigervnc-server-module-1.8.0-31.el7_9.x86_64.rpmb0ca8ac5f2622ea90ff9de469ead08695c1b43cdcce2779c53ea534521fc95deSLSA-2024:0753Moderate: Linux-Firmware Security UpdateThe linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * (RCVE-2023-20592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7iwl7260-firmware-25.30.13.0-82.el7_9.noarch.rpme64a97d5c671efc4fa415bd4c532464a6262f62b1a9fa98a799c03487433ad0diwl6000g2b-firmware-18.168.6.1-82.el7_9.noarch.rpm141487a55bbc7dbdf9f830b07f80cbf8e2d34c75aac27fb2ac98237e6f2ab244iwl1000-firmware-39.31.5.1-82.el7_9.noarch.rpm54b17ad5fd3c9c574dfcefefb2a8834656fdd82cf152caf8b9ba308cebf7d1bdiwl5150-firmware-8.24.2.2-82.el7_9.noarch.rpmb7c434a206a59763ca232a0bb8e49701aa018d93b0d1cc041814e6d94bf50c4biwl6000g2a-firmware-18.168.6.1-82.el7_9.noarch.rpm0d692533b2a5ed4ed28868c7bb8334525076497de50353ad813da6fe07734284iwl135-firmware-18.168.6.1-82.el7_9.noarch.rpm95bfaba9b5653a83e20c9932b2930eb6bda85d510059a5c43cf550a53ae448e7linux-firmware-20200421-82.git78c0348.el7_9.noarch.rpma8777329c0b6e715eac602ff58a6429bca76e76ac70603206312441bf247a2adiwl6050-firmware-41.28.5.1-82.el7_9.noarch.rpmbede749692b47135cac3d83f3811deaaa856821d340a49e23c281a4da586f3bciwl105-firmware-18.168.6.1-82.el7_9.noarch.rpm3d0b10f45e5f0c5ae891adcb8584696e241ebe689ac0cfa747f6fccf7a5849aciwl3160-firmware-25.30.13.0-82.el7_9.noarch.rpmaf80422a01927bfdb8b5205ef9d97360eaa757c898688dc506466eca6f067406iwl2000-firmware-18.168.6.1-82.el7_9.noarch.rpmaf3ed29b25df5c8a78f4b10a974cdd2ebc5dbfc7a3ee9e2d5ef010fe20851f30iwl6000-firmware-9.221.4.1-82.el7_9.noarch.rpmdc0489d581ae27ffc1ce06e394aab2912de78a3f6f3bce244e7bab0692373006iwl2030-firmware-18.168.6.1-82.el7_9.noarch.rpm77d06de2dc9b5b81939baafdb9150ec3b9a5f407cb384ee53d17e1d0596d3aa5iwl5000-firmware-8.83.5.1_1-82.el7_9.noarch.rpme02af43fa4eead018ef3b96bc5e13b1753bfaad664429845c0aef433765ef060iwl100-firmware-39.31.5.1-82.el7_9.noarch.rpm91f90c313410f56aed94e461a0e925b6df6d91a3a93d1376dbcddc7e7e0fd5adiwl4965-firmware-228.61.2.24-82.el7_9.noarch.rpmda898bc4b4e3150cf1460c4eeda3405a39f7ce8892e7094414c529d30a296422iwl3945-firmware-15.32.2.9-82.el7_9.noarch.rpm097176fa2cb3c3f5caf9d1fa228090fd6d5c9dd78f8d212fcdc96ecf711a55cdSLSA-2024:0857Important: Python-Pillow Security UpdateThe python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities. Security Fix(es): * pillow: Arbitrary Code Execution via the environment parameter (CVE-2023-50447) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7python-pillow-tk-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm15ae81d0c24e554168f090c91b0bc2b5581f0d142a5bef76c9e770d4a7c29802python-pillow-2.0.0-25.gitd1c6db8.el7_9.i686.rpm791474fa898b4d6fa0ebdb548ed5799c07682da9ada08418be98c027169e4f32python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm0e5b6de2c1553be4d41141f38ee00540dee7f7bac9856cd13e3a5577bc44e79dpython-pillow-doc-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm7913772aeb3a93c0c8f76445b344a0e683bd79d3a9d15080fdb4a08d22c57993python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9.i686.rpm38a8568a5a6917fed7d4ca98920d155a2a4391e7172ea37054f73fe7c4afdb1epython-pillow-sane-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpmbc9b15bb3548fca39106e1dd305aafcfecdddb850043ac44e12acaa19d73175dpython-pillow-qt-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm4d006721fe89a5c6fa877246ae5304b6c0c98ca697495886f0d15e4cb52d2acepython-pillow-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm4e40b851a547086a74959ca0b2a31dfa750e1882e98dd5a8a56534c2f033e53aSLSA-2024:0957Important: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.8.0. Security Fix(es): * Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546) * Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547) * Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553) * Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548) * Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549) * Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550) * Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551) * Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7thunderbird-115.8.0-1.el7_9.x86_64.rpmb93f4388564d33caa2064835d37d025d08c1b8d66e51e872a3921bc0f40645d6SLSA-2024:0976Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.8.0 ESR. Security Fix(es): * Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546) * Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547) * Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553) * Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548) * Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549) * Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550) * Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551) * Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Scientific Linux 7firefox-115.8.0-1.el7_9.x86_64.rpm19645f18638c73e54e5a9ab313bc9cd6fd7f9324afe5a071c4b777a21e1ad939firefox-115.8.0-1.el7_9.i686.rpmf08e3beb43fee16a6bce5a10defd482ad304f42980b9ca9b7be65555bce9fc2aSLSA-2024:1249Important: Kernel Security And Bug Fix UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * (CVE-2024-26602, ?) * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921) * kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871) * kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment (CVE-2023-38409) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [rhel-7] INFO: possible circular locking dependency detected: store+0x70/0xe0 kernfs_fop_write+0xe3/0x190 (BZ#2161654) * qedf: Reading /sys/kernel/debug/qedf/hostX/stop_io_on_error can cause panic (BZ#2224973) importantScientific Linux 7python-perf-3.10.0-1160.114.2.el7.x86_64.rpm6219ccf626b63bfab99d033de385dba6b35d64154246c6fd87812ec21e8e9567kernel-devel-3.10.0-1160.114.2.el7.x86_64.rpmfda8c918fc3432c34e4268978b46c786654968f2a0601c6abdfe2d643733f990kernel-tools-libs-3.10.0-1160.114.2.el7.x86_64.rpm203be60922d3278b1b6d9471c79cab6f9bfa2a0fd05b05dc5fdca7042aa6fb6ekernel-headers-3.10.0-1160.114.2.el7.x86_64.rpm0a74334fadf5e361e000cdfd3914bab8064753102fdf58527a4c1f18e88ed0eakernel-3.10.0-1160.114.2.el7.x86_64.rpm49c52b78daffac4caa1ac6602573916787864be7bb05d7a94416bfb7544b3922perf-3.10.0-1160.114.2.el7.x86_64.rpmb5912c34f83560f9865f6f1fba4f654f7eea21409398c0b15be377e95e45cf5bkernel-debug-devel-3.10.0-1160.114.2.el7.x86_64.rpm791452b00d72645b5e5c89f1f04b9d21efbce3b90009de08924f5b4797d8903bkernel-tools-libs-devel-3.10.0-1160.114.2.el7.x86_64.rpma76baaa0c86b21c117e3b32b9378a3dc132095b00cba8c207c9c0293b4cba73dbpftool-3.10.0-1160.114.2.el7.x86_64.rpma734e79d3bc421f931d2d82589a7103260a56804728153892a0411b268848840kernel-abi-whitelists-3.10.0-1160.114.2.el7.noarch.rpm8451aa49628585a9f0906f5104d7d6ba5087251161b07861149fa5a68f34f516kernel-debug-3.10.0-1160.114.2.el7.x86_64.rpm6d80eb63b24244233b797ebcb16866ce03198e8bd8d097de606bad6f046bac58kernel-doc-3.10.0-1160.114.2.el7.noarch.rpm3d9873984d98e433540c1af5b1d24fed7014cee60c834f5793708a0f651dd30dkernel-tools-3.10.0-1160.114.2.el7.x86_64.rpm8a07d2f79c4bbcf23b91292c704d658bd4ea30c4d82402774a36dbd95a172f0bSLSA-2024:1486Critical: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.9.1 ESR. Security Fix(es): * nss: timing attack against RSA decryption (CVE-2023-5388) * Mozilla: Crash in NSS TLS method (CVE-2024-0743) * Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607) * Mozilla: Integer overflow could have led to out of bounds write (CVE-2024-2608) * Mozilla: Improve handling of out-of-memory conditions in ICU (CVE-2024-2616) * Mozilla: Improper handling of html and body tags enabled CSP nonce leakage (CVE-2024-2610) * Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions (CVE-2024-2611) * Mozilla: Self referencing object could have potentially led to a use-after-free (CVE-2024-2612) * Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 (CVE-2024-2614) * Mozilla: Privileged JavaScript Execution via Event Handlers (CVE-2024-29944) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. criticalScientific Linux 7firefox-115.9.1-1.el7_9.x86_64.rpmf288a71162f7c339c59ad0bdca178fcb27e415e0866b00db0cd176c57dbd1706firefox-115.9.1-1.el7_9.i686.rpm9518d749a87e95259d1331d59693d6a74d7e9eee033f5a31d1676c914155d44bSLSA-2024:1498Moderate: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.9.0. Security Fix(es): * nss: timing attack against RSA decryption (CVE-2023-5388) * Mozilla: Crash in NSS TLS method (CVE-2024-0743) * Mozilla: Leaking of encrypted email subjects to other conversations (CVE-2024-1936) * Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607) * Mozilla: Integer overflow could have led to out of bounds write (CVE-2024-2608) * Mozilla: Improper handling of html and body tags enabled CSP nonce leakage (CVE-2024-2610) * Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions (CVE-2024-2611) * Mozilla: Self referencing object could have potentially led to a use-after-free (CVE-2024-2612) * Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 (CVE-2024-2614) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7thunderbird-115.9.0-1.el7_9.x86_64.rpm633ac61bf649cbb0a8af1fe19bf02629b6aa72b06a1f7bc010f3e0191c081bf1SLSA-2024:1785Important: X.Org Server Security UpdateX.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7xorg-x11-server-devel-1.20.4-29.el7_9.x86_64.rpm9cd2ecb63df9fb22b407d4985082354910087069eb12747b1a3c8dbd91a376c8xorg-x11-server-Xephyr-1.20.4-29.el7_9.x86_64.rpm36081c9b9c87022032141d87cee179ca1e4bb24b8e3cec5f810f3ab3292b9879xorg-x11-server-common-1.20.4-29.el7_9.x86_64.rpmae83d82858bf83da7eb37ddae61f71b588879adba1aee004ba37fa6c2d6d282exorg-x11-server-source-1.20.4-29.el7_9.noarch.rpmb575bab4e5c503acc122713aa952b48ec27c1f2e2d71abe1d9a7e2e310d01e87xorg-x11-server-Xwayland-1.20.4-29.el7_9.x86_64.rpm3f71c6f0a460e254f7fa38a4f70022c2c16b0434b7420d55c85b95c33edfe2caxorg-x11-server-Xvfb-1.20.4-29.el7_9.x86_64.rpm75f7bf39ae5ecfa5c37a5fda81409b7a747e3ea195240253b07e5e2fbde9fbdexorg-x11-server-Xorg-1.20.4-29.el7_9.x86_64.rpm0592fe7d3f6d6942ecef2e6f48163fac7cf59b2d760479fb6110f81b240b650fxorg-x11-server-devel-1.20.4-29.el7_9.i686.rpmf7a93733b242167bb472f01c0d7ba503dbfa21a96eca2e2707ab2967e47c3791xorg-x11-server-Xnest-1.20.4-29.el7_9.x86_64.rpma8f92d3db45455d068361ebaa8af64275d656af1a44d0d7cf1c3db6e0ed91e53xorg-x11-server-Xdmx-1.20.4-29.el7_9.x86_64.rpm3387269f61804f0b2b7a9606c3a1344123086b21b9ae3e253996b289b54daa30SLSA-2024:1787Important: Squid Security UpdateSquid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Security Fix(es): * squid: denial of service in HTTP header parser (CVE-2024-25617) * squid: denial of service in HTTP request parsing (CVE-2023-50269) * squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285) * squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) * squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728) * squid: Denial of Service in SSL Certificate validation (CVE-2023-46724) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7squid-3.5.20-17.el7_9.10.x86_64.rpm535a00517c6bfbc2eca005ca05996bec350f327132f69dc9810e100b756d33b9squid-migration-script-3.5.20-17.el7_9.10.x86_64.rpm1e1ad8c5ac62df286ba1a1efb4176f3191425f71477815589b05339e2df1d1a2squid-sysvinit-3.5.20-17.el7_9.10.x86_64.rpm5730d09504f1aece6838c90069bffc2f453f55cf5381b7ff8a93a4031c6f26eeSLSA-2024:1817Moderate: Java-1.8.0-Openjdk Security UpdateThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.i686.rpmdd01fc33cf37f8a54346df5d03f247bc4d1c8065d17be7e0dc44bce99c32630ejava-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.i686.rpmb76d6c84c2a51474607dd5b89ad367198739336bf4d0d717fe379a4b107a1194java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9.noarch.rpm51d609b53a3edd23c2b078777e77bd319dc039533ad3a208bfb16b3a29af2c38java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.i686.rpmd6d71f3df48a3ed75ac0a571754ead18c5bc889da18c3ac6e7cec74bbc25e110java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.x86_64.rpm8a95eeea1fb14c5468160dd9015fd10e7323043f5cdee0eb301e88d8baaa3a6djava-1.8.0-openjdk-javadoc-debug-1.8.0.412.b08-1.el7_9.noarch.rpm32bc114411b39d13ebf0af4da7ce0d616d3d468dcb79216083faf5c157b03574java-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.i686.rpm6233de7740a123225cfc809c5dd0ca69df02afbd5c4c3617ab65430c0f91fbb8java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.x86_64.rpm4b8f078d24919936a039b9a6a20ae2eb785df559b2768b8bd03f9f2e75cc75cejava-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm6929e42135cc5b3160118cca0a986785bcd307dd581a4e9ebf6fde91bb59e5e6java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.412.b08-1.el7_9.noarch.rpm94cfa62d890d71ee0423d68a84ca416efa73088f89fd28aa08bd254071ea0dc8java-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.x86_64.rpmbb8720a43b0770f702a2a69d7eb270cdb045e73007fce293a10345e250c09917java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.i686.rpm88c0c30ef0a8545ceb2fca04440af566161c59dbf80592eaf32fd279a6d96057java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.x86_64.rpm5523d2b121cb76c5a23a0d7a0dd3e9fd938e5f25a5b398b79077570f0915a36ejava-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.i686.rpmc0a1975cbe1fe4c1361671feeb62ec6b042b7857ffc6c16fdd3a44afe6f7cd99java-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.x86_64.rpmdb697d3e8d1962d53c672af785b1660088386812b6283f7e4411faead1501646java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.i686.rpmd3f92ce1c50bcb1f3d2f20321ee32cebcacaccac3d641d2ba4f557c28bc47dc4java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.i686.rpm1e18f402b9c193cdbb34f248883971b11cc93698b212a6939e9a39804a76785cjava-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.x86_64.rpm502e113cb2543a3a4799877c200a64611d442bb8fffb7bcd44e50689866ce726java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.x86_64.rpma9d12d3814fde3710d495b3aa7014690427bdf0048df08200fa30df1cc9af6cdjava-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.i686.rpm8b7774447a244305f377bfb98fb92dccf701eb683776599a2c434451bed39e4ejava-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.i686.rpm80e519bed885acf426e7abafe523f22b410a4738b99d422abcad3e1f121f799fjava-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.x86_64.rpm4c8d2f27d85e9b6b854a7845dfd33dd362e517a68898ff465e7a7fd13eaa80efjava-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.i686.rpm86f31659058f688c5d9fb31cb83b1e8a61a0f1609448613d7b58f2aad6025143java-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm1894fd71dfa3138964caa76cbbfaf358a833d2897d72d6500ebc32a799320362java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.i686.rpmb61062c1696adf1365012cdb2d60c4557f7b54b96b6b07f3a0c987cb7cad38c3java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.x86_64.rpmdc6dc3d2a74a97e5c60ab5e0175706aa7b0e2f9b8d74159d7965cc12479a1fffjava-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9.noarch.rpmfae992f04223ed32dcc4c439a82ab270df358fe5e7f95ca14ea9d6f3b8c9234ajava-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.x86_64.rpmec52dc8077894df0b9eafe9b63a0f6478081b8ffc6b5a01cc48aab78106833b8SLSA-2024:1821Moderate: Java-11-Openjdk Security UpdateThe java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7java-11-openjdk-javadoc-zip-debug-11.0.23.0.9-2.el7_9.x86_64.rpm83bf9c4398525ee7235519d471d34273b1eab0a40c397efbb926105051049d04java-11-openjdk-src-debug-11.0.23.0.9-2.el7_9.x86_64.rpm433671636d3ff2ed55052ae80016a5bf3cc10113b000be4e054d38340c1fa348java-11-openjdk-headless-11.0.23.0.9-2.el7_9.x86_64.rpm4fcec7872a4167f05a2253652cd1080227bb44714c997916cc428c7dfeb7e72bjava-11-openjdk-javadoc-debug-11.0.23.0.9-2.el7_9.i686.rpm2287b02610b5ca856eef97c4399a7c05098956fe60f54c163b81bbd72d046135java-11-openjdk-static-libs-debug-11.0.23.0.9-2.el7_9.x86_64.rpm76348cd9945afc43080010a400c33dbe2f3caae0a92f79c52e4dd89a660fb45ajava-11-openjdk-jmods-debug-11.0.23.0.9-2.el7_9.x86_64.rpmc15a40f868117eb65143aef6ce9a4dd5e62a2848fbe4ceef0ad576ae4233329fjava-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9.i686.rpm66d7708d57587d0bbb7f3aa5da321a292b9a3ece5bc795f8a93ca187888a4f39java-11-openjdk-headless-debug-11.0.23.0.9-2.el7_9.x86_64.rpmf54a1040f9ff05f7c90bfd476058e20983715f79fe14e709ecb98fb8dcf8eee6java-11-openjdk-devel-debug-11.0.23.0.9-2.el7_9.x86_64.rpmddf698e9510fc5f9ebe182220b487f28838d9f0643f0d672f8205d4c081fb571java-11-openjdk-jmods-11.0.23.0.9-2.el7_9.i686.rpm8e8db98b1336dc22e9f6260200f7cf67fe6e41ab873dabe2d6da8233a5af5eb0java-11-openjdk-11.0.23.0.9-2.el7_9.i686.rpmc816cdd66389a18294ccd7d1f7daaf4e76e70c652ab59649ce25c61bff610cf1java-11-openjdk-demo-debug-11.0.23.0.9-2.el7_9.i686.rpm256ac25644e7dd3d70c4780b8ab3cbf37551086087ce78b6a20c5189b202f309java-11-openjdk-javadoc-debug-11.0.23.0.9-2.el7_9.x86_64.rpmc4840f9613e6ed3d1e856759f8ae2b64c39dadc5a6a0796a955744b1326c84c0java-11-openjdk-src-11.0.23.0.9-2.el7_9.x86_64.rpm73fcd8c65d03fd78b26fb9a5b37dfde0bb13a7536216b3cddd40d4f4d47401c2java-11-openjdk-javadoc-zip-debug-11.0.23.0.9-2.el7_9.i686.rpm0a63ee84ae817929cab3f49b5d8695161dba65b7afdaba91c208c647089b0a3djava-11-openjdk-demo-11.0.23.0.9-2.el7_9.i686.rpm275f3d258d3d6ec26e355436793272b83dd2333fcf504d9c954e6b5bf68ab735java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9.x86_64.rpm93b23fbbf28a017c1ce8b6adc2d68f6af0707cb664887246c334caa9c194701fjava-11-openjdk-demo-debug-11.0.23.0.9-2.el7_9.x86_64.rpmb1b6ee1e6944ff30f1b9fb7115caed23f4763fb38f08db5bd0389715532592a6java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9.x86_64.rpm8db4502addde63a3d96670c3a5c036dc93285bd28634f1d10d28d4d0f519295fjava-11-openjdk-demo-11.0.23.0.9-2.el7_9.x86_64.rpm4d62abd5413d28dec9654b5538b1a048c9bfa1143edb7b9dfbbfd0027246a157java-11-openjdk-headless-debug-11.0.23.0.9-2.el7_9.i686.rpmb92fafe1e4203272638d4871d2d5c87b17a94af5560426e97deb419dacb882c6java-11-openjdk-debug-11.0.23.0.9-2.el7_9.i686.rpm28d755e9c43b1d35a38ee0be97dc1383047b60341a0f054cca72ba9054d952e3java-11-openjdk-devel-11.0.23.0.9-2.el7_9.x86_64.rpm81c86fe4a514adee5f88ec8459181b1de99df7ed6982e9ed2c8dce31be634357java-11-openjdk-jmods-debug-11.0.23.0.9-2.el7_9.i686.rpme3893ad0cc9afa1d48812473113d15b0a69b9091e83c1bc1462589fef73b8cc8java-11-openjdk-devel-debug-11.0.23.0.9-2.el7_9.i686.rpmb78ba6a368741f19c8d8e34add033eb125d3146948b4e7fd6541b82e1dffbf0ajava-11-openjdk-debug-11.0.23.0.9-2.el7_9.x86_64.rpm42e0262d4474aaf0389974ee13fa2d981e491bbb07683f7b4c6329edf6557d83java-11-openjdk-headless-11.0.23.0.9-2.el7_9.i686.rpmd6ad00980db65031bf41c48fa478db9c382eb95e54302a445595034f1730aa0djava-11-openjdk-jmods-11.0.23.0.9-2.el7_9.x86_64.rpmd8dfa59d0f2dd9a44a3631795e37ab959edcb3877fbf631dc5a9ef2f99a76df6java-11-openjdk-devel-11.0.23.0.9-2.el7_9.i686.rpm9c9120e36d54a44510c9d8861582a75d6e6aad532ed4d28f57d2a960448564c9java-11-openjdk-src-debug-11.0.23.0.9-2.el7_9.i686.rpm40d48da8a29c49d1fa3e7bfe26af46afc08a5af9feeff7a65050876117edbbc3java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9.x86_64.rpm44d581cf158533a72118a6461a310d4da57a5b45aed55b41e97c27a29e277e7ajava-11-openjdk-11.0.23.0.9-2.el7_9.x86_64.rpm7bb1431fad617ee085a71171ba969888296b01db0f3fde4bbbc0178bad08cccejava-11-openjdk-javadoc-11.0.23.0.9-2.el7_9.i686.rpm7e33c0ced954204da3edbf3fe83aa47c1a89367b01943da62947679f686e75cajava-11-openjdk-src-11.0.23.0.9-2.el7_9.i686.rpmda5a45e8546769c6a9fb143e6392357a5b7219676762c3314699251c92d6b958SLSA-2024:1910Important: Firefox Security UpdateMozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 115.10.0 ESR. Security Fix(es): * GetBoundName in the JIT returned the wrong object (CVE-2024-3852) * Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854) * Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857) * Permission prompt input delay could expire when not in focus (CVE-2024-2609) * Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859) * Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861) * Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7firefox-115.10.0-1.el7_9.i686.rpm7aa2b7e271c8808b35f2e8c47723c3842c4604ae0ebbeec74b2b64f89c658cbbfirefox-115.10.0-1.el7_9.x86_64.rpmd474c789af4e006b84209b179f4e0c6be2a1a86df34b65a9c1b4b4944eba55a1SLSA-2024:1935Low: Thunderbird Security UpdateMozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 115.10.0. Security Fix(es): * Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. lowScientific Linux 7thunderbird-115.10.0-2.el7_9.x86_64.rpm3696d5d5fb5df0d910ac63a3812b6b8dcbd4f73d94a8e492276e66cd49d1d3a1SLSA-2024:1959Important: Shim Security UpdateThe shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547) * shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548) * shim: Out-of-bounds read printing error messages (CVE-2023-40546) * shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549) * shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550) * shim: out of bounds read when parsing MZ binaries (CVE-2023-40551) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. IMPORTANT: The new shim revokes ALL VERSIONS of GRUB2 before grub2-2.02-0.87.el7_9.14. Therefore GRUB2 MUST be updated to the latest version: grub2-2.02-0.87.el7_9.14 BEFORE or SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system. importantScientific Linux 7shim-unsigned-ia32-15.8-3.el7.x86_64.rpme205f2d8305e0b78da2a23ae1ec4d74aab02e8666f7ac0573866fdbf52ca7d5dshim-ia32-15.8-1.el7.x86_64.rpmf9b40dc9c290d5b52191e1ee291cb54f54bd2decf7caff9846910f154d7a87d3shim-unsigned-x64-15.8-3.el7.x86_64.rpm1960322489956f7c9e0fee46c0b1f582aa9f8f421121d9bb40fdee4ef68191bbshim-x64-15.8-1.el7.x86_64.rpm22cbf183fedbf7bd3f9d2d686e657129a007b4d766f3498f6633df7de49997c7mokutil-15.8-1.el7.x86_64.rpmc0381e57fd3d566a9d884ed245c28a97fb5db1c6f56b62d93a63077d718a1caaSLSA-2024:2002Moderate: Grub2 Security UpdateThe grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. moderateScientific Linux 7grub2-pc-modules-2.02-0.87.sl7_9.14.noarch.rpmde553d66e74eb6e3b7291f750da30dbb325c1c4eb33c4503ee423eebfa6049d4grub2-efi-x64-2.02-0.87.sl7_9.14.x86_64.rpm5f59ec5b5ba3c614f0f6472378271d2b953a6a574efee9bc5bd3eca363cb01edgrub2-pc-2.02-0.87.sl7_9.14.x86_64.rpm108388534ab5669c827705a133cc30f5e1641a6ecfbc597074fe1c98fd198215grub2-efi-x64-modules-2.02-0.87.sl7_9.14.noarch.rpmabb1623323af16e8fd73f12c1dba456f6b92b4a57d94672fc75150a79e8045ddgrub2-tools-minimal-2.02-0.87.sl7_9.14.x86_64.rpm9f04dd1ad4933b1c0e401399052fe39d4c87fa9af4983150928cd5dcc7f4d77fgrub2-efi-x64-cdboot-2.02-0.87.sl7_9.14.x86_64.rpm5de060c344853637840847f2dd6643619fb84110543232a75b7bbbff64326da4grub2-efi-ia32-2.02-0.87.sl7_9.14.x86_64.rpmb0752bb4a2a765df6f934dc5e17464bca7e00f5f5815c029c145afa6986c9641grub2-tools-extra-2.02-0.87.sl7_9.14.x86_64.rpm8a17558cb3dc6d0c38515fb2f16fefc7a0e1ed8b825c0f1ee8477bf43adbc06egrub2-efi-ia32-modules-2.02-0.87.sl7_9.14.noarch.rpm72fe341a890b11586020e592b63e0ec987d05506b3f1a23b53418e605a7f5d96grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.14.x86_64.rpm92183c4ed0632506a9dfa50d34fac96dc53b4ebdb641d69e1f705377fdf5db16grub2-2.02-0.87.sl7_9.14.x86_64.rpm516bae7d6c7518b69717c806a9cf27281aee56cfa3e37be492ebdd3c1db09675grub2-common-2.02-0.87.sl7_9.14.noarch.rpm9c52b9c63bdce728d5bf47d2c8c7a1de03c87359b8da295581efdce3ac56b976grub2-tools-2.02-0.87.sl7_9.14.x86_64.rpm926e8500cb90ae1aa6ae3931f1d2990822c04cb72f6a3a68ef2e735796469767SLSA-2024:2004Important: Kernel Security And Bug Fix UpdateThe kernel packages contain the Linux kernel, the core of any Linux operating system. Security fixes: * kernel: use after free in unix_stream_sendpage (CVE-2023-4622) * Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * kernel: irdma: Improper access control (CVE-2023-25775) * kernel: net/sched: sch_hfsc UAF (CVE-2023-4623) * kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) This update also fixes the following bugs: * NFS client closes active connection (RHEL-22193) * kernel panic at __list_del_entry from smb2_reconnect_server (RHEL-26301) * kernel: race condition when call to VT_RESIZEX ioctl and vc_cons[i].d is already NULL, causing a NULL pointer dereference. (RHEL-28639) * kernel: net/sched: sch_hfsc UAF (RHEL-16458) * kernel: irdma: Improper access control (RHEL-6299) * The message in RHEL 7 ?stack-protector: Kernel stack is corrupted in:? is triggered because perf_trace_buf_prepare() does not verify that per_cpu array perf_trace_buf has allocated per_cpu buffers in it. (RHEL-18052) * [rhel7] gfs2: Invalid metadata access in punch_hole (RHEL-28785) * UDP packets dropped due to SELinux denial (RHEL-27751) * Boot fails with kernel panic at acpi_device_hid+0x6 (RHEL-8721) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7kernel-devel-3.10.0-1160.118.1.el7.x86_64.rpm85c7c3767f97a197245c84b2d5d239e52a212f765679a2013ff68f6b5660fc0apython-perf-3.10.0-1160.118.1.el7.x86_64.rpm88255385c921df551bea5f3d19750b17a2eee06689d6b91a3f89eccf45f89913kernel-tools-libs-3.10.0-1160.118.1.el7.x86_64.rpm6a15f0c30a63a29a9fb0bcabab646c9d9ee1b32fd92514e6b5a68a2b1b3e8dc9bpftool-3.10.0-1160.118.1.el7.x86_64.rpm17c07e3477c895a66bb5c88501f56574d18b9212f014105fb2699c78b52ed894kernel-headers-3.10.0-1160.118.1.el7.x86_64.rpm1f1abf69033db1dd3be82b519f1fae78b9df2de0ed9ae8ddb293a58726748b72kernel-tools-3.10.0-1160.118.1.el7.x86_64.rpme7c74b0039e8ab1b1bbb5ea76ca60ac8fcf39cc7cae5be1c8a2e402d110eb944kernel-tools-libs-devel-3.10.0-1160.118.1.el7.x86_64.rpmf679408054e52eef048fa610a3e07716247e545532cc89f912203db8407a7e92kernel-3.10.0-1160.118.1.el7.x86_64.rpma215bf9176ac171af3703f8c45d6e6621d6f6d2ce4c2ea29341a7493e621608akernel-debug-devel-3.10.0-1160.118.1.el7.x86_64.rpm5faa45f1201c00caf00a824b5d0bef925ca3036d4cf259aec024b0ce5450c54dperf-3.10.0-1160.118.1.el7.x86_64.rpmcf3cc9c6705a2cbe65cd973ed0addde6d273fcac8437cecf5351a2ffbc98c213kernel-doc-3.10.0-1160.118.1.el7.noarch.rpm9b4424bfbc18595a30c25a73762427674af6836540345ff342cd74a998cb3d1akernel-abi-whitelists-3.10.0-1160.118.1.el7.noarch.rpm7d8361f62fafbcfaa2d6ec717398c300db78c693c85387ed4351ead083beb4bbkernel-debug-3.10.0-1160.118.1.el7.x86_64.rpm7a1fb05bbeaaa66ba9f9f65a88b7cfb485dada88626e074b6fccf90b5e194406SLSA-2024:2080Important: Tigervnc Security UpdateVirtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients. Security Fix(es): * xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. importantScientific Linux 7tigervnc-icons-1.8.0-33.el7_9.noarch.rpmfbb4c6d0df2b7888ffdd23d8b5619d0ac83f946c8b39084b08b95cdf80de40fetigervnc-server-1.8.0-33.el7_9.x86_64.rpm39886431c1b102e3aef949be9fe7107c0710a22ca042910dfe6462ced503dcb1tigervnc-server-minimal-1.8.0-33.el7_9.x86_64.rpma9dd08cdddf52dae3391416ea2ee088e60c58672abf9cb11b5c4ac55d735bc47tigervnc-server-applet-1.8.0-33.el7_9.noarch.rpmfdaa2953aba5d18d06f8d606541a1b2ec1b74cfef56f022ee0bc02f60c18889dtigervnc-license-1.8.0-33.el7_9.noarch.rpm194bd13249ee6ad299694362025856b55fe23b4054243b1c4e68abcb55cdbbd9tigervnc-server-module-1.8.0-33.el7_9.x86_64.rpmd7aa613f092e0e42839c77c6b97cb2a2a75091b3bbd0d42b00ef1cd14817735ftigervnc-1.8.0-33.el7_9.x86_64.rpm940566e6ba4ba98b4c9ed8c06be7ed68d2471417c41d545b2f6e5854198ede2cSLSA-2024:2881Important: Firefox Security UpdateThis update upgrades Firefox to version 115.11.0 ESR. Security Fix(es): * firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769) * firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777) importantScientific Linux 7firefox-115.11.0-1.el7_9.x86_64.rpm55b3f7841e4098f37f5a346f303ee689395bc9be8e5efe3b0e96a1e5ccb54f3afirefox-115.11.0-1.el7_9.i686.rpmfcb8f9aa002e42dfc510d097a721581620a8463d40e7b727bff2e5e03f417f29